Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
C.png

Overview

General Information

Sample Name:C.png (renamed file extension from png to dll)
Analysis ID:651257
MD5:8b81e6a7702f58b93fdc2b57ab401ffb
SHA1:2990b8adc8891564c404190bedab55df5027da32
SHA256:500f85201bcfc0ae49204bd31ed4f055cac1b0b7f8e74339907f5c14b8e711a8
Tags:dll
Infos:

Detection

CryptOne, Qbot
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Yara detected Qbot
Yara detected CryptOne packer
Sigma detected: Schedule system process
Maps a DLL or memory area into another process
Overwrites code with unconditional jumps - possibly settings hooks in foreign process
Writes to foreign memory regions
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Encrypted powershell cmdline option found
Machine Learning detection for sample
Allocates memory in foreign processes
Creates files in the system32 config directory
Injects code into the Windows Explorer (explorer.exe)
Uses schtasks.exe or at.exe to add and modify task schedules
Contains functionality to detect sleep reduction / modifications
Uses 32bit PE files
Queries the volume information (name, serial number etc) of a device
One or more processes crash
Contains functionality to query locales information (e.g. system language)
Very long cmdline option found, this is very uncommon (may be encrypted or packed)
Deletes files inside the Windows folder
May sleep (evasive loops) to hinder dynamic analysis
Uses code obfuscation techniques (call, push, ret)
Creates files inside the system directory
Found potential string decryption / allocating functions
Sample execution stops while process was sleeping (likely an evasion)
Contains functionality to call native functions
Contains functionality to check if a window is minimized (may be used to check if an application is visible)
Contains functionality to dynamically determine API calls
Contains functionality to record screenshots
Contains long sleeps (>= 3 min)
Enables debug privileges
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
AV process strings found (often used to terminate AV products)
PE file does not import any functions
Sample file is different than original file name gathered from version info
PE file contains an invalid checksum
Extensive use of GetProcAddress (often used to hide API calls)
PE file contains strange resources
Drops PE files
Tries to load missing DLLs
Checks if the current process is being debugged
Registers a DLL
Dropped file seen in connection with other malware
Found large amount of non-executed APIs
PE file overlay found
May check if the current machine is a sandbox (GetTickCount - Sleep)
Creates a process in suspended mode (likely to inject code)

Classification

  • System is w10x64
  • loaddll32.exe (PID: 2412 cmdline: loaddll32.exe "C:\Users\user\Desktop\C.dll" MD5: 7DEB5DB86C0AC789123DEC286286B938)
    • cmd.exe (PID: 1212 cmdline: cmd.exe /C rundll32.exe "C:\Users\user\Desktop\C.dll",#1 MD5: F3BDBE3BB6F734E357235F4D5898582D)
      • rundll32.exe (PID: 5620 cmdline: rundll32.exe "C:\Users\user\Desktop\C.dll",#1 MD5: D7CA562B0DB4F4DD0F03A89A1FDAD63D)
        • explorer.exe (PID: 1888 cmdline: C:\Windows\SysWOW64\explorer.exe MD5: 166AB1B9462E5C1D6D18EC5EC0B6A5F7)
        • WerFault.exe (PID: 3032 cmdline: C:\Windows\SysWOW64\WerFault.exe -u -p 5620 -s 752 MD5: 9E2B8ACAD48ECCA55C0230D63623661B)
    • explorer.exe (PID: 812 cmdline: C:\Windows\SysWOW64\explorer.exe MD5: 166AB1B9462E5C1D6D18EC5EC0B6A5F7)
      • schtasks.exe (PID: 6468 cmdline: "C:\Windows\system32\schtasks.exe" /Create /RU "NT AUTHORITY\SYSTEM" /Z /ST 17:57 /tn qsrshyj /ET 18:08 /tr "powershell.exe -encodedCommand cgBlAGcAcwB2AHIAMwAyAC4AZQB4AGUAIAAiAEMAOgBcAFUAcwBlAHIAcwBcAGoAbwBuAGUAcwBcAEQAZQBzAGsAdABvAHAAXABDAC4AZABsAGwAIgA=" /SC ONCE MD5: 15FF7D8324231381BAD48A052F85DF04)
        • conhost.exe (PID: 6480 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496)
  • powershell.exe (PID: 6532 cmdline: powershell.exe -encodedCommand cgBlAGcAcwB2AHIAMwAyAC4AZQB4AGUAIAAiAEMAOgBcAFUAcwBlAHIAcwBcAGoAbwBuAGUAcwBcAEQAZQBzAGsAdABvAHAAXABDAC4AZABsAGwAIgA= MD5: 95000560239032BC68B4C2FDFCDEF913)
    • conhost.exe (PID: 6540 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496)
    • regsvr32.exe (PID: 6664 cmdline: "C:\Windows\system32\regsvr32.exe" C:\Users\user\Desktop\C.dll MD5: D78B75FC68247E8A63ACBA846182740E)
      • regsvr32.exe (PID: 6676 cmdline: C:\Users\user\Desktop\C.dll MD5: 426E7499F6A7346F0410DEAD0805586B)
        • explorer.exe (PID: 6812 cmdline: C:\Windows\SysWOW64\explorer.exe MD5: 166AB1B9462E5C1D6D18EC5EC0B6A5F7)
          • conhost.exe (PID: 7032 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496)
  • powershell.exe (PID: 3732 cmdline: powershell.exe -encodedCommand cgBlAGcAcwB2AHIAMwAyAC4AZQB4AGUAIAAiAEMAOgBcAFUAcwBlAHIAcwBcAGoAbwBuAGUAcwBcAEQAZQBzAGsAdABvAHAAXABDAC4AZABsAGwAIgA= MD5: 95000560239032BC68B4C2FDFCDEF913)
    • conhost.exe (PID: 6124 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496)
    • regsvr32.exe (PID: 6404 cmdline: "C:\Windows\system32\regsvr32.exe" C:\Users\user\Desktop\C.dll MD5: D78B75FC68247E8A63ACBA846182740E)
      • regsvr32.exe (PID: 6408 cmdline: C:\Users\user\Desktop\C.dll MD5: 426E7499F6A7346F0410DEAD0805586B)
  • cleanup
{"Bot id": "AA", "Campaign": "1655971687", "Version": "403.780", "C2 list": ["38.70.253.226:2222", "47.23.89.60:993", "120.150.218.241:995", "117.248.109.38:21", "37.34.253.233:443", "86.132.14.70:2078", "111.125.245.116:995", "217.165.85.191:993", "176.45.232.204:995", "5.32.41.45:443", "93.48.80.198:995", "100.38.242.113:995", "94.59.252.166:2222", "74.14.5.179:2222", "71.13.93.154:2222", "193.253.44.249:2222", "108.60.213.141:443", "45.241.231.78:993", "217.128.122.65:2222", "40.134.246.185:995", "1.161.124.241:443", "70.46.220.114:443", "24.43.99.75:443", "32.221.224.140:995", "80.11.74.81:2222", "31.215.184.140:2222", "39.49.85.29:995", "67.209.195.198:443", "186.90.153.162:2222", "148.64.96.100:443", "67.165.206.193:993", "210.246.4.69:995", "208.107.221.224:443", "89.101.97.139:443", "88.234.116.71:443", "121.7.223.45:2222", "104.34.212.7:32103", "69.14.172.24:443", "41.228.22.180:443", "197.87.182.60:443", "24.178.196.158:2222", "1.161.124.241:995", "189.78.107.163:32101", "39.52.74.55:995", "2.34.12.8:443", "182.191.92.203:995", "173.21.10.71:2222", "39.41.2.45:995", "90.114.10.16:2222", "184.97.29.26:443", "76.25.142.196:443", "47.156.129.52:443", "24.55.67.176:443", "190.252.242.69:443", "70.51.132.161:2222", "72.252.157.93:995", "90.120.209.197:2078", "72.252.157.93:993", "72.252.157.93:990", "177.45.64.254:32101", "24.139.72.117:443", "187.250.202.2:443", "94.36.193.176:2222", "109.12.111.14:443", "89.86.33.217:443", "179.158.105.44:443", "63.143.92.99:995", "45.46.53.140:2222", "31.215.67.68:2222", "188.136.218.225:61202", "187.208.115.219:443", "31.215.184.140:1194", "39.57.60.246:995", "24.122.142.181:443", "84.241.8.23:32103", "191.250.120.152:443", "202.134.152.2:2222", "91.177.173.10:995", "148.0.43.48:443", "172.115.177.204:2222", "81.193.30.90:443", "68.204.15.28:443", "197.94.94.206:443", "87.109.229.215:995", "102.182.232.3:995", "196.203.37.215:80", "81.250.191.49:2222", "83.110.94.105:443", "201.176.6.24:995", "173.174.216.62:443", "31.215.70.37:443", "175.145.235.37:443", "174.69.215.101:443", "187.172.164.12:443", "201.172.23.68:2222", "41.84.249.56:995", "191.34.121.84:443", "113.53.152.11:443", "86.195.158.178:2222", "109.228.220.196:443", "82.41.63.217:443", "82.152.39.39:443", "106.51.48.188:50001", "103.246.242.202:443", "41.38.167.179:995", "98.50.191.202:443", "185.56.243.146:443", "191.112.28.64:443", "39.44.30.209:995", "47.157.227.70:443", "187.251.132.144:22", "31.35.28.29:443", "148.252.133.168:443", "42.103.132.91:2222", "180.129.108.214:995", "138.186.28.253:443", "89.137.52.44:443", "120.61.2.218:443", "122.118.129.227:995", "124.109.35.171:995", "75.99.168.194:61201", "103.91.182.114:2222", "37.210.156.247:2222", "58.105.167.36:50000", "187.207.131.50:61202", "76.70.9.169:2222", "187.211.80.39:443", "176.67.56.94:443", "103.116.178.85:995", "143.0.219.6:995", "79.80.80.29:2222"]}
SourceRuleDescriptionAuthorStrings
00000002.00000002.323381928.00000000010A0000.00000040.00001000.00020000.00000000.sdmpJoeSecurity_Qbot_1Yara detected QbotJoe Security
    00000018.00000002.393963522.0000000003B10000.00000040.00001000.00020000.00000000.sdmpJoeSecurity_Qbot_1Yara detected QbotJoe Security
      00000019.00000002.765579370.0000000002FB0000.00000040.80000000.00040000.00000000.sdmpJoeSecurity_Qbot_1Yara detected QbotJoe Security
        00000002.00000000.281557672.0000000001070000.00000040.00001000.00020000.00000000.sdmpJoeSecurity_CryptYara detected CryptOne packerJoe Security
          00000002.00000000.281557672.0000000001070000.00000040.00001000.00020000.00000000.sdmpJoeSecurity_Qbot_1Yara detected QbotJoe Security
            Click to see the 19 entries
            SourceRuleDescriptionAuthorStrings
            4.2.explorer.exe.3230000.0.raw.unpackJoeSecurity_Qbot_1Yara detected QbotJoe Security
              2.0.rundll32.exe.10a0000.6.unpackJoeSecurity_Qbot_1Yara detected QbotJoe Security
                24.2.regsvr32.exe.3af0000.2.unpackJoeSecurity_Qbot_1Yara detected QbotJoe Security
                  2.2.rundll32.exe.10c0000.3.unpackJoeSecurity_Qbot_1Yara detected QbotJoe Security
                    0.2.loaddll32.exe.2750184.1.unpackJoeSecurity_Qbot_1Yara detected QbotJoe Security
                      Click to see the 33 entries

                      Persistence and Installation Behavior

                      barindex
                      Source: Process startedAuthor: Joe Security: Data: Command: "C:\Windows\system32\schtasks.exe" /Create /RU "NT AUTHORITY\SYSTEM" /Z /ST 17:57 /tn qsrshyj /ET 18:08 /tr "powershell.exe -encodedCommand cgBlAGcAcwB2AHIAMwAyAC4AZQB4AGUAIAAiAEMAOgBcAFUAcwBlAHIAcwBcAGoAbwBuAGUAcwBcAEQAZQBzAGsAdABvAHAAXABDAC4AZABsAGwAIgA=" /SC ONCE, CommandLine: "C:\Windows\system32\schtasks.exe" /Create /RU "NT AUTHORITY\SYSTEM" /Z /ST 17:57 /tn qsrshyj /ET 18:08 /tr "powershell.exe -encodedCommand cgBlAGcAcwB2AHIAMwAyAC4AZQB4AGUAIAAiAEMAOgBcAFUAcwBlAHIAcwBcAGoAbwBuAGUAcwBcAEQAZQBzAGsAdABvAHAAXABDAC4AZABsAGwAIgA=" /SC ONCE, CommandLine|base64offset|contains: *j, Image: C:\Windows\SysWOW64\schtasks.exe, NewProcessName: C:\Windows\SysWOW64\schtasks.exe, OriginalFileName: C:\Windows\SysWOW64\schtasks.exe, ParentCommandLine: C:\Windows\SysWOW64\explorer.exe, ParentImage: C:\Windows\SysWOW64\explorer.exe, ParentProcessId: 812, ParentProcessName: explorer.exe, ProcessCommandLine: "C:\Windows\system32\schtasks.exe" /Create /RU "NT AUTHORITY\SYSTEM" /Z /ST 17:57 /tn qsrshyj /ET 18:08 /tr "powershell.exe -encodedCommand cgBlAGcAcwB2AHIAMwAyAC4AZQB4AGUAIAAiAEMAOgBcAFUAcwBlAHIAcwBcAGoAbwBuAGUAcwBcAEQAZQBzAGsAdABvAHAAXABDAC4AZABsAGwAIgA=" /SC ONCE, ProcessId: 6468, ProcessName: schtasks.exe
                      No Snort rule has matched

                      Click to jump to signature section

                      Show All Signature Results

                      AV Detection

                      barindex
                      Source: C.dllJoe Sandbox ML: detected
                      Source: 4.0.explorer.exe.3230000.0.unpackMalware Configuration Extractor: Qbot {"Bot id": "AA", "Campaign": "1655971687", "Version": "403.780", "C2 list": ["38.70.253.226:2222", "47.23.89.60:993", "120.150.218.241:995", "117.248.109.38:21", "37.34.253.233:443", "86.132.14.70:2078", "111.125.245.116:995", "217.165.85.191:993", "176.45.232.204:995", "5.32.41.45:443", "93.48.80.198:995", "100.38.242.113:995", "94.59.252.166:2222", "74.14.5.179:2222", "71.13.93.154:2222", "193.253.44.249:2222", "108.60.213.141:443", "45.241.231.78:993", "217.128.122.65:2222", "40.134.246.185:995", "1.161.124.241:443", "70.46.220.114:443", "24.43.99.75:443", "32.221.224.140:995", "80.11.74.81:2222", "31.215.184.140:2222", "39.49.85.29:995", "67.209.195.198:443", "186.90.153.162:2222", "148.64.96.100:443", "67.165.206.193:993", "210.246.4.69:995", "208.107.221.224:443", "89.101.97.139:443", "88.234.116.71:443", "121.7.223.45:2222", "104.34.212.7:32103", "69.14.172.24:443", "41.228.22.180:443", "197.87.182.60:443", "24.178.196.158:2222", "1.161.124.241:995", "189.78.107.163:32101", "39.52.74.55:995", "2.34.12.8:443", "182.191.92.203:995", "173.21.10.71:2222", "39.41.2.45:995", "90.114.10.16:2222", "184.97.29.26:443", "76.25.142.196:443", "47.156.129.52:443", "24.55.67.176:443", "190.252.242.69:443", "70.51.132.161:2222", "72.252.157.93:995", "90.120.209.197:2078", "72.252.157.93:993", "72.252.157.93:990", "177.45.64.254:32101", "24.139.72.117:443", "187.250.202.2:443", "94.36.193.176:2222", "109.12.111.14:443", "89.86.33.217:443", "179.158.105.44:443", "63.143.92.99:995", "45.46.53.140:2222", "31.215.67.68:2222", "188.136.218.225:61202", "187.208.115.219:443", "31.215.184.140:1194", "39.57.60.246:995", "24.122.142.181:443", "84.241.8.23:32103", "191.250.120.152:443", "202.134.152.2:2222", "91.177.173.10:995", "148.0.43.48:443", "172.115.177.204:2222", "81.193.30.90:443", "68.204.15.28:443", "197.94.94.206:443", "87.109.229.215:995", "102.182.232.3:995", "196.203.37.215:80", "81.250.191.49:2222", "83.110.94.105:443", "201.176.6.24:995", "173.174.216.62:443", "31.215.70.37:443", "175.145.235.37:443", "174.69.215.101:443", "187.172.164.12:443", "201.172.23.68:2222", "41.84.249.56:995", "191.34.121.84:443", "113.53.152.11:443", "86.195.158.178:2222", "109.228.220.196:443", "82.41.63.217:443", "82.152.39.39:443", "106.51.48.188:50001", "103.246.242.202:443", "41.38.167.179:995", "98.50.191.202:443", "185.56.243.146:443", "191.112.28.64:443", "39.44.30.209:995", "47.157.227.70:443", "187.251.132.144:22", "31.35.28.29:443", "148.252.133.168:443", "42.103.132.91:2222", "180.129.108.214:995", "138.186.28.253:443", "89.137.52.44:443", "120.61.2.218:443", "122.118.129.227:995", "124.109.35.171:995", "75.99.168.194:61201", "103.91.182.114:2222", "37.210.156.247:2222", "58.105.167.36:50000", "187.207.131.50:61202", "76.70.9.169:2222", "187.211.80.39:443", "176.67.56.94:443", "103.116.178.85:995", "143.0.219.6:995", "79.80.80.29:2222"]}
                      Source: C.dllStatic PE information: EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, BYTES_REVERSED_LO, 32BIT_MACHINE, DLL, BYTES_REVERSED_HI
                      Source: Binary string: amstream.pdb source: explorer.exe, 00000004.00000003.324038860.0000000005034000.00000004.00000800.00020000.00000000.sdmp, explorer.exe, 00000019.00000003.394565875.0000000003F4F000.00000004.00000800.00020000.00000000.sdmp
                      Source: Binary string: amstream.pdbGCTL source: explorer.exe, 00000004.00000003.324038860.0000000005034000.00000004.00000800.00020000.00000000.sdmp, explorer.exe, 00000019.00000003.394565875.0000000003F4F000.00000004.00000800.00020000.00000000.sdmp
                      Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_00B15A3C GetModuleHandleA,GetProcAddress,lstrcpyn,lstrcpyn,lstrcpyn,FindFirstFileA,FindClose,lstrlen,lstrcpyn,lstrlen,lstrcpyn,0_2_00B15A3C
                      Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_00B18F90 FindFirstFileA,FindClose,FileTimeToLocalFileTime,FileTimeToDosDateTime,0_2_00B18F90
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 2_2_009D5A3C GetModuleHandleA,GetProcAddress,lstrcpyn,lstrcpyn,lstrcpyn,FindFirstFileA,FindClose,lstrlen,lstrcpyn,lstrlen,lstrcpyn,2_2_009D5A3C
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 2_2_009D8F90 FindFirstFileA,FindClose,FileTimeToLocalFileTime,FileTimeToDosDateTime,2_2_009D8F90
                      Source: explorer.exe, 00000004.00000003.325177471.0000000005378000.00000004.00000800.00020000.00000000.sdmp, C.dllString found in binary or memory: http://crl.comodoca.com/AAACertificateServices.crl04
                      Source: explorer.exe, 00000004.00000003.325177471.0000000005378000.00000004.00000800.00020000.00000000.sdmp, C.dllString found in binary or memory: http://crl.sectigo.com/SectigoPublicCodeSigningCAR36.crl0y
                      Source: explorer.exe, 00000004.00000003.325177471.0000000005378000.00000004.00000800.00020000.00000000.sdmp, C.dllString found in binary or memory: http://crl.sectigo.com/SectigoPublicCodeSigningRootR46.crl0
                      Source: explorer.exe, 00000004.00000003.325177471.0000000005378000.00000004.00000800.00020000.00000000.sdmp, C.dllString found in binary or memory: http://crt.sectigo.com/SectigoPublicCodeSigningCAR36.crt0#
                      Source: explorer.exe, 00000004.00000003.325177471.0000000005378000.00000004.00000800.00020000.00000000.sdmp, C.dllString found in binary or memory: http://crt.sectigo.com/SectigoPublicCodeSigningRootR46.p7c0#
                      Source: explorer.exe, 00000004.00000003.325177471.0000000005378000.00000004.00000800.00020000.00000000.sdmp, C.dllString found in binary or memory: http://ocsp.comodoca.com0
                      Source: explorer.exe, 00000004.00000003.325177471.0000000005378000.00000004.00000800.00020000.00000000.sdmp, C.dllString found in binary or memory: http://ocsp.sectigo.com0
                      Source: explorer.exe, 00000004.00000003.325177471.0000000005378000.00000004.00000800.00020000.00000000.sdmp, C.dllString found in binary or memory: http://ocsp.sectigo.com0#
                      Source: loaddll32.exe, rundll32.exeString found in binary or memory: http://schemas.xmlsoap.org/soap/encoding/
                      Source: loaddll32.exe, 00000000.00000002.289505180.0000000000B11000.00000020.00000001.01000000.00000003.sdmp, rundll32.exe, 00000002.00000002.323140727.00000000009D1000.00000020.00000001.01000000.00000003.sdmp, explorer.exe, 00000004.00000003.325177471.0000000005378000.00000004.00000800.00020000.00000000.sdmp, regsvr32.exe, 00000018.00000002.393512133.0000000000401000.00000020.00000001.01000000.00000003.sdmp, C.dllString found in binary or memory: http://schemas.xmlsoap.org/soap/encoding/Nhttp://www.borland.com/namespaces/Types
                      Source: loaddll32.exe, rundll32.exeString found in binary or memory: http://www.borland.com/namespaces/Types
                      Source: regsvr32.exe, 00000018.00000002.393875981.00000000035D0000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: http://www.borland.com/namespaces/Types-IAppServerSOAP
                      Source: loaddll32.exe, 00000000.00000002.289505180.0000000000B11000.00000020.00000001.01000000.00000003.sdmp, rundll32.exe, 00000002.00000002.323140727.00000000009D1000.00000020.00000001.01000000.00000003.sdmp, explorer.exe, 00000004.00000003.325177471.0000000005378000.00000004.00000800.00020000.00000000.sdmp, regsvr32.exe, 00000018.00000002.393512133.0000000000401000.00000020.00000001.01000000.00000003.sdmp, C.dllString found in binary or memory: http://www.borland.com/namespaces/Typeslhttp://www.borland.com/namespaces/Types-IAppServerSOAP
                      Source: explorer.exe, 00000004.00000003.325177471.0000000005378000.00000004.00000800.00020000.00000000.sdmp, C.dllString found in binary or memory: https://sectigo.com/CPS0
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 2_2_009F6EBC GetObjectA,GetDC,CreateCompatibleDC,CreateBitmap,CreateCompatibleBitmap,GetDeviceCaps,GetDeviceCaps,SelectObject,GetDIBColorTable,GetDIBits,SelectObject,CreateDIBSection,GetDIBits,SelectObject,SelectPalette,RealizePalette,FillRect,SetTextColor,SetBkColor,SetDIBColorTable,PatBlt,CreateCompatibleDC,SelectObject,SelectPalette,RealizePalette,SetTextColor,SetBkColor,BitBlt,SelectPalette,SelectObject,DeleteDC,SelectPalette,2_2_009F6EBC
                      Source: C.dllStatic PE information: EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, BYTES_REVERSED_LO, 32BIT_MACHINE, DLL, BYTES_REVERSED_HI
                      Source: C:\Windows\SysWOW64\rundll32.exeProcess created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -u -p 5620 -s 752
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile deleted: C:\Windows\Temp\__PSScriptPolicyTest_et0gmkgs.0m3.ps1Jump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile created: C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShellJump to behavior
                      Source: C:\Windows\System32\loaddll32.exeCode function: String function: 00B16D1C appears 48 times
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: String function: 009D6D1C appears 48 times
                      Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_00B3CFCC NtdllDefWindowProc_A,0_2_00B3CFCC
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 2_2_009FCFCC NtdllDefWindowProc_A,2_2_009FCFCC
                      Source: C.dll.4.drStatic PE information: No import functions for PE file found
                      Source: C.dllBinary or memory string: OriginalFilenameDupefinder.exe> vs C.dll
                      Source: C.dllStatic PE information: Resource name: RT_BITMAP type: GLS_BINARY_LSB_FIRST
                      Source: C:\Windows\System32\loaddll32.exeSection loaded: ggr.dllJump to behavior
                      Source: C:\Windows\System32\loaddll32.exeSection loaded: jr3.dllJump to behavior
                      Source: C:\Windows\System32\regsvr32.exeSection loaded: sfc.dllJump to behavior
                      Source: C:\Windows\SysWOW64\regsvr32.exeSection loaded: sfc.dllJump to behavior
                      Source: C:\Windows\SysWOW64\regsvr32.exeSection loaded: ggr.dllJump to behavior
                      Source: C:\Windows\SysWOW64\regsvr32.exeSection loaded: jr3.dllJump to behavior
                      Source: C:\Windows\System32\regsvr32.exeSection loaded: sfc.dllJump to behavior
                      Source: C:\Windows\SysWOW64\regsvr32.exeSection loaded: sfc.dllJump to behavior
                      Source: Joe Sandbox ViewDropped File: C:\Users\user\Desktop\C.dll 73CBBE5DA2FCE01B57CAA2A39EA01DB26B84DD62631409CF4B3FCFDC4A09A2F7
                      Source: C.dll.4.drStatic PE information: Data appended to the last section found
                      Source: C:\Windows\System32\loaddll32.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
                      Source: unknownProcess created: C:\Windows\System32\loaddll32.exe loaddll32.exe "C:\Users\user\Desktop\C.dll"
                      Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /C rundll32.exe "C:\Users\user\Desktop\C.dll",#1
                      Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\C.dll",#1
                      Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\explorer.exe C:\Windows\SysWOW64\explorer.exe
                      Source: C:\Windows\SysWOW64\rundll32.exeProcess created: C:\Windows\SysWOW64\explorer.exe C:\Windows\SysWOW64\explorer.exe
                      Source: C:\Windows\SysWOW64\rundll32.exeProcess created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -u -p 5620 -s 752
                      Source: C:\Windows\SysWOW64\explorer.exeProcess created: C:\Windows\SysWOW64\schtasks.exe "C:\Windows\system32\schtasks.exe" /Create /RU "NT AUTHORITY\SYSTEM" /Z /ST 17:57 /tn qsrshyj /ET 18:08 /tr "powershell.exe -encodedCommand cgBlAGcAcwB2AHIAMwAyAC4AZQB4AGUAIAAiAEMAOgBcAFUAcwBlAHIAcwBcAGoAbwBuAGUAcwBcAEQAZQBzAGsAdABvAHAAXABDAC4AZABsAGwAIgA=" /SC ONCE
                      Source: C:\Windows\SysWOW64\schtasks.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                      Source: unknownProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powershell.exe -encodedCommand cgBlAGcAcwB2AHIAMwAyAC4AZQB4AGUAIAAiAEMAOgBcAFUAcwBlAHIAcwBcAGoAbwBuAGUAcwBcAEQAZQBzAGsAdABvAHAAXABDAC4AZABsAGwAIgA=
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\regsvr32.exe "C:\Windows\system32\regsvr32.exe" C:\Users\user\Desktop\C.dll
                      Source: C:\Windows\System32\regsvr32.exeProcess created: C:\Windows\SysWOW64\regsvr32.exe C:\Users\user\Desktop\C.dll
                      Source: C:\Windows\SysWOW64\regsvr32.exeProcess created: C:\Windows\SysWOW64\explorer.exe C:\Windows\SysWOW64\explorer.exe
                      Source: C:\Windows\SysWOW64\explorer.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                      Source: unknownProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powershell.exe -encodedCommand cgBlAGcAcwB2AHIAMwAyAC4AZQB4AGUAIAAiAEMAOgBcAFUAcwBlAHIAcwBcAGoAbwBuAGUAcwBcAEQAZQBzAGsAdABvAHAAXABDAC4AZABsAGwAIgA=
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\regsvr32.exe "C:\Windows\system32\regsvr32.exe" C:\Users\user\Desktop\C.dll
                      Source: C:\Windows\System32\regsvr32.exeProcess created: C:\Windows\SysWOW64\regsvr32.exe C:\Users\user\Desktop\C.dll
                      Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /C rundll32.exe "C:\Users\user\Desktop\C.dll",#1Jump to behavior
                      Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\explorer.exe C:\Windows\SysWOW64\explorer.exeJump to behavior
                      Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\C.dll",#1Jump to behavior
                      Source: C:\Windows\SysWOW64\rundll32.exeProcess created: C:\Windows\SysWOW64\explorer.exe C:\Windows\SysWOW64\explorer.exeJump to behavior
                      Source: C:\Windows\SysWOW64\explorer.exeProcess created: C:\Windows\SysWOW64\schtasks.exe "C:\Windows\system32\schtasks.exe" /Create /RU "NT AUTHORITY\SYSTEM" /Z /ST 17:57 /tn qsrshyj /ET 18:08 /tr "powershell.exe -encodedCommand cgBlAGcAcwB2AHIAMwAyAC4AZQB4AGUAIAAiAEMAOgBcAFUAcwBlAHIAcwBcAGoAbwBuAGUAcwBcAEQAZQBzAGsAdABvAHAAXABDAC4AZABsAGwAIgA=" /SC ONCEJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\regsvr32.exe "C:\Windows\system32\regsvr32.exe" C:\Users\user\Desktop\C.dllJump to behavior
                      Source: C:\Windows\System32\regsvr32.exeProcess created: C:\Windows\SysWOW64\regsvr32.exe C:\Users\user\Desktop\C.dllJump to behavior
                      Source: C:\Windows\SysWOW64\regsvr32.exeProcess created: C:\Windows\SysWOW64\explorer.exe C:\Windows\SysWOW64\explorer.exeJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\regsvr32.exe "C:\Windows\system32\regsvr32.exe" C:\Users\user\Desktop\C.dllJump to behavior
                      Source: C:\Windows\System32\regsvr32.exeProcess created: C:\Windows\SysWOW64\regsvr32.exe C:\Users\user\Desktop\C.dllJump to behavior
                      Source: C:\Windows\SysWOW64\explorer.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\IaeeomkaqJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeFile created: C:\ProgramData\Microsoft\Windows\WER\Temp\WERC572.tmpJump to behavior
                      Source: classification engineClassification label: mal100.troj.evad.winDLL@28/12@0/1
                      Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_00B19114 GetDiskFreeSpaceA,0_2_00B19114
                      Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_00B353DC GetLastError,FormatMessageA,0_2_00B353DC
                      Source: C:\Windows\System32\loaddll32.exeKey opened: HKEY_CURRENT_USER\Software\Borland\Delphi\LocalesJump to behavior
                      Source: C:\Windows\SysWOW64\rundll32.exeKey opened: HKEY_CURRENT_USER\Software\Borland\Delphi\LocalesJump to behavior
                      Source: C:\Windows\SysWOW64\regsvr32.exeKey opened: HKEY_USERS.DEFAULT\Software\Borland\Delphi\LocalesJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_64\mscorlib\ac26e2af62f23e37e645b5e44068a025\mscorlib.ni.dllJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_64\mscorlib\ac26e2af62f23e37e645b5e44068a025\mscorlib.ni.dllJump to behavior
                      Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\C.dll",#1
                      Source: C:\Windows\SysWOW64\explorer.exeMutant created: \Sessions\1\BaseNamedObjects\{A644AA43-420A-4699-971E-B9FC952EE63F}
                      Source: C:\Windows\System32\conhost.exeMutant created: \BaseNamedObjects\Local\SM0:6540:120:WilError_01
                      Source: C:\Windows\SysWOW64\explorer.exeMutant created: \BaseNamedObjects\{B392BFCE-678F-45E7-AC07-60731D963391}
                      Source: C:\Windows\SysWOW64\explorer.exeMutant created: \BaseNamedObjects\Global\{F4935CEA-067E-4885-957C-2F62BD7516DF}
                      Source: C:\Windows\System32\conhost.exeMutant created: \BaseNamedObjects\Local\SM0:7032:120:WilError_01
                      Source: C:\Windows\SysWOW64\explorer.exeMutant created: \Sessions\1\BaseNamedObjects\{B392BFCE-678F-45E7-AC07-60731D963391}
                      Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:6480:120:WilError_01
                      Source: C:\Windows\SysWOW64\explorer.exeMutant created: \Sessions\1\BaseNamedObjects\Global\{A644AA43-420A-4699-971E-B9FC952EE63F}
                      Source: C:\Windows\SysWOW64\WerFault.exeMutant created: \Sessions\1\BaseNamedObjects\Local\WERReportingForProcess5620
                      Source: C:\Windows\SysWOW64\explorer.exeMutant created: \BaseNamedObjects\{F4935CEA-067E-4885-957C-2F62BD7516DF}
                      Source: C:\Windows\System32\conhost.exeMutant created: \BaseNamedObjects\Local\SM0:6124:120:WilError_01
                      Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_00B2B20C FindResourceA,0_2_00B2B20C
                      Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\explorer.exe
                      Source: C:\Windows\SysWOW64\rundll32.exeProcess created: C:\Windows\SysWOW64\explorer.exe
                      Source: C:\Windows\SysWOW64\regsvr32.exeProcess created: C:\Windows\SysWOW64\explorer.exe
                      Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\explorer.exeJump to behavior
                      Source: C:\Windows\SysWOW64\rundll32.exeProcess created: C:\Windows\SysWOW64\explorer.exeJump to behavior
                      Source: C:\Windows\SysWOW64\regsvr32.exeProcess created: C:\Windows\SysWOW64\explorer.exeJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorrc.dllJump to behavior
                      Source: C.dllStatic file information: File size 1112443 > 1048576
                      Source: Binary string: amstream.pdb source: explorer.exe, 00000004.00000003.324038860.0000000005034000.00000004.00000800.00020000.00000000.sdmp, explorer.exe, 00000019.00000003.394565875.0000000003F4F000.00000004.00000800.00020000.00000000.sdmp
                      Source: Binary string: amstream.pdbGCTL source: explorer.exe, 00000004.00000003.324038860.0000000005034000.00000004.00000800.00020000.00000000.sdmp, explorer.exe, 00000019.00000003.394565875.0000000003F4F000.00000004.00000800.00020000.00000000.sdmp
                      Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_00BDB88C push 00BDB8FBh; ret 0_2_00BDB8F3
                      Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_00B1E0B4 push 00B1E230h; ret 0_2_00B1E228
                      Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_00B398B4 push 00B39984h; ret 0_2_00B3997C
                      Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_00B270A0 push 00B27148h; ret 0_2_00B27140
                      Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_00B41888 push 00B418B4h; ret 0_2_00B418AC
                      Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_00B3F8F8 push 00B3F924h; ret 0_2_00B3F91C
                      Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_00B16838 push 00B16864h; ret 0_2_00B1685C
                      Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_00B27028 push 00B2709Eh; ret 0_2_00B27096
                      Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_00B2A818 push ecx; mov dword ptr [esp], edx0_2_00B2A81D
                      Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_00B3D854 push 00B3D880h; ret 0_2_00B3D878
                      Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_00B2A85C push ecx; mov dword ptr [esp], edx0_2_00B2A861
                      Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_00B3A1CC push 00B3A1F8h; ret 0_2_00B3A1F0
                      Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_00B1E2B4 push 00B1E2E0h; ret 0_2_00B1E2D8
                      Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_00B17AD0 push 00B17AFCh; ret 0_2_00B17AF4
                      Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_00B1EAD0 push 00B1EAFCh; ret 0_2_00B1EAF4
                      Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_00B1E234 push 00B1E2A3h; ret 0_2_00B1E29B
                      Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_00B3BA28 push 00B3BA54h; ret 0_2_00B3BA4C
                      Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_00B3A21C push 00B3A248h; ret 0_2_00B3A240
                      Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_00B28A0C push 00B28A59h; ret 0_2_00B28A51
                      Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_00B27244 push 00B27270h; ret 0_2_00B27268
                      Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_00B3BBD4 push 00B3BC00h; ret 0_2_00B3BBF8
                      Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_00B16B00 push 00B16B2Ch; ret 0_2_00B16B24
                      Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_00B28B44 push 00B28B70h; ret 0_2_00B28B68
                      Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_00B274B0 push ecx; mov dword ptr [esp], ecx0_2_00B274B3
                      Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_00B3D48C push 00B3D4B8h; ret 0_2_00B3D4B0
                      Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_00B274D0 push ecx; mov dword ptr [esp], ecx0_2_00B274D3
                      Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_00B2A4D4 push ecx; mov dword ptr [esp], edx0_2_00B2A4D9
                      Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_00B3A4D4 push 00B3A500h; ret 0_2_00B3A4F8
                      Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_00B324DC push 00B3256Ch; ret 0_2_00B32564
                      Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_00B3D4C4 push 00B3D4FCh; ret 0_2_00B3D4F4
                      Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_00B3242C push 00B324D7h; ret 0_2_00B324CF
                      Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_00B3BDCC LoadLibraryA,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,0_2_00B3BDCC
                      Source: C.dll.4.drStatic PE information: real checksum: 0x109ebe should be: 0xa0a4
                      Source: C.dllStatic PE information: real checksum: 0x109ebe should be: 0x110071
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\regsvr32.exe "C:\Windows\system32\regsvr32.exe" C:\Users\user\Desktop\C.dll

                      Persistence and Installation Behavior

                      barindex
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile created: C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShellJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile created: C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractiveJump to behavior
                      Source: C:\Windows\SysWOW64\explorer.exeFile created: C:\Users\user\Desktop\C.dllJump to dropped file

                      Boot Survival

                      barindex
                      Source: C:\Windows\SysWOW64\explorer.exeProcess created: C:\Windows\SysWOW64\schtasks.exe "C:\Windows\system32\schtasks.exe" /Create /RU "NT AUTHORITY\SYSTEM" /Z /ST 17:57 /tn qsrshyj /ET 18:08 /tr "powershell.exe -encodedCommand cgBlAGcAcwB2AHIAMwAyAC4AZQB4AGUAIAAiAEMAOgBcAFUAcwBlAHIAcwBcAGoAbwBuAGUAcwBcAEQAZQBzAGsAdABvAHAAXABDAC4AZABsAGwAIgA=" /SC ONCE

                      Hooking and other Techniques for Hiding and Protection

                      barindex
                      Source: C:\Windows\System32\loaddll32.exeMemory written: PID: 812 base: 38F380 value: E9 63 6E EA 02 Jump to behavior
                      Source: C:\Windows\SysWOW64\regsvr32.exeMemory written: PID: 6812 base: 38F380 value: E9 63 6E C2 02 Jump to behavior
                      Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_00B39C84 IsIconic,GetWindowPlacement,GetWindowRect,0_2_00B39C84
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 2_2_00A212A4 IsIconic,GetWindowPlacement,GetWindowRect,GetWindowLongA,GetWindowLongA,ScreenToClient,ScreenToClient,2_2_00A212A4
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 2_2_009F9C84 IsIconic,GetWindowPlacement,GetWindowRect,2_2_009F9C84
                      Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_00B3BDCC LoadLibraryA,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,0_2_00B3BDCC
                      Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\regsvr32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\regsvr32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\conhost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\regsvr32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\regsvr32.exeProcess information set: NOOPENFILEERRORBOX

                      Malware Analysis System Evasion

                      barindex
                      Source: explorer.exe, 00000019.00000002.766149295.0000000003D80000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: SYSANALYZER.EXEH
                      Source: explorer.exe, 00000019.00000003.395367126.0000000003DFF000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000019.00000002.766189810.0000000003E05000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: FRIDA-WINJECTOR-HELPER-64.EXE
                      Source: explorer.exe, 00000019.00000003.395367126.0000000003DFF000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: TCPDUMP.EXEQ
                      Source: explorer.exe, 00000019.00000002.766149295.0000000003D80000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: FILEMON.EXEP
                      Source: explorer.exe, 00000019.00000002.766189810.0000000003E05000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: FRIDA-WINJECTOR-HELPER-64.EXEM
                      Source: explorer.exe, 00000019.00000002.766149295.0000000003D80000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: IMPORTREC.EXE
                      Source: explorer.exe, 00000019.00000002.766149295.0000000003D80000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: DUMPCAP.EXE{
                      Source: explorer.exe, 00000019.00000002.766149295.0000000003D80000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: WIRESHARK.EXEZ
                      Source: explorer.exe, 00000019.00000002.766149295.0000000003D80000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: PROCMON.EXEM
                      Source: explorer.exe, 00000019.00000003.395367126.0000000003DFF000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000019.00000002.766149295.0000000003D80000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: WINDUMP.EXE
                      Source: explorer.exe, 00000019.00000003.395367126.0000000003DFF000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: WIRESHARK.EXEW
                      Source: explorer.exe, 00000019.00000002.766149295.0000000003D80000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: PETOOLS.EXEC
                      Source: explorer.exe, 00000019.00000003.395367126.0000000003DFF000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: FRIDA-WINJECTOR-HELPER-64.EXEW
                      Source: explorer.exe, 00000019.00000002.766189810.0000000003E05000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: FRIDA-WINJECTOR-HELPER-32.EXE|
                      Source: explorer.exe, 00000019.00000002.766149295.0000000003D80000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: TCPDUMP.EXEE
                      Source: explorer.exe, 00000019.00000003.395367126.0000000003DFF000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: PROCMON.EXEW
                      Source: explorer.exe, 00000019.00000002.766149295.0000000003D80000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: SYSANALYZER.EXE
                      Source: explorer.exe, 00000019.00000002.766149295.0000000003D80000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: WINDUMP.EXE|
                      Source: explorer.exe, 00000019.00000003.395367126.0000000003DFF000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000019.00000002.766149295.0000000003D80000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: FILEMON.EXE
                      Source: explorer.exe, 00000019.00000003.395367126.0000000003DFF000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000019.00000002.766149295.0000000003D80000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: PROCMON.EXE
                      Source: explorer.exe, 00000019.00000003.395367126.0000000003DFF000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000019.00000002.766189810.0000000003E05000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: FRIDA-WINJECTOR-HELPER-32.EXE
                      Source: explorer.exe, 00000019.00000003.395367126.0000000003DFF000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: DUMPCAP.EXEP
                      Source: explorer.exe, 00000019.00000002.766149295.0000000003D80000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: SNIFF_HIT.EXEY
                      Source: explorer.exe, 00000019.00000003.395367126.0000000003DFF000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: PETOOLS.EXEV
                      Source: explorer.exe, 00000019.00000003.395367126.0000000003DFF000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: FILEMON.EXEW
                      Source: explorer.exe, 00000019.00000003.395367126.0000000003DFF000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000019.00000002.766149295.0000000003D80000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: PETOOLS.EXE
                      Source: explorer.exe, 00000019.00000003.395367126.0000000003DFF000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000019.00000002.766149295.0000000003D80000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: TCPDUMP.EXE
                      Source: explorer.exe, 00000019.00000002.766149295.0000000003D80000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: SNIFF_HIT.EXE
                      Source: explorer.exe, 00000019.00000002.766149295.0000000003D80000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: SNIFF_HIT.EXEN
                      Source: explorer.exe, 00000019.00000002.766163463.0000000003DFF000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: PROC_ANALYZER.EXE
                      Source: explorer.exe, 00000019.00000003.395367126.0000000003DFF000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: WINDUMP.EXEW
                      Source: explorer.exe, 00000019.00000003.395367126.0000000003DFF000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: FRIDA-WINJECTOR-HELPER-32.EXEV
                      Source: explorer.exe, 00000019.00000003.395367126.0000000003DFF000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000019.00000002.766149295.0000000003D80000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: DUMPCAP.EXE
                      Source: explorer.exe, 00000019.00000003.395367126.0000000003DFF000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000019.00000002.766149295.0000000003D80000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: WIRESHARK.EXE
                      Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_00B4047C0_2_00B4047C
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 2_2_00A0047C2_2_00A0047C
                      Source: C:\Windows\SysWOW64\explorer.exe TID: 6488Thread sleep time: -129000s >= -30000sJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 6620Thread sleep count: 1747 > 30Jump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 6620Thread sleep count: 2015 > 30Jump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 6588Thread sleep time: -922337203685477s >= -30000sJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 6640Thread sleep time: -922337203685477s >= -30000sJump to behavior
                      Source: C:\Windows\SysWOW64\regsvr32.exe TID: 6808Thread sleep count: 109 > 30Jump to behavior
                      Source: C:\Windows\SysWOW64\explorer.exe TID: 7024Thread sleep count: 105 > 30Jump to behavior
                      Source: C:\Windows\SysWOW64\explorer.exe TID: 7024Thread sleep time: -105000s >= -30000sJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 916Thread sleep count: 1529 > 30Jump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 5840Thread sleep count: 266 > 30Jump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 5832Thread sleep time: -922337203685477s >= -30000sJump to behavior
                      Source: C:\Windows\SysWOW64\explorer.exeLast function: Thread delayed
                      Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
                      Source: C:\Windows\SysWOW64\explorer.exeLast function: Thread delayed
                      Source: C:\Windows\SysWOW64\explorer.exeLast function: Thread delayed
                      Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
                      Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
                      Source: C:\Windows\SysWOW64\explorer.exeWindow / User API: threadDelayed 829Jump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 1747Jump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 2015Jump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 1529Jump to behavior
                      Source: C:\Windows\System32\loaddll32.exeAPI coverage: 6.1 %
                      Source: C:\Windows\SysWOW64\rundll32.exeAPI coverage: 5.7 %
                      Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_00B4047C0_2_00B4047C
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 2_2_00A0047C2_2_00A0047C
                      Source: C:\Windows\System32\loaddll32.exeProcess information queried: ProcessInformationJump to behavior
                      Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_00B3596C GetSystemInfo,0_2_00B3596C
                      Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_00B15A3C GetModuleHandleA,GetProcAddress,lstrcpyn,lstrcpyn,lstrcpyn,FindFirstFileA,FindClose,lstrlen,lstrcpyn,lstrlen,lstrcpyn,0_2_00B15A3C
                      Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_00B18F90 FindFirstFileA,FindClose,FileTimeToLocalFileTime,FileTimeToDosDateTime,0_2_00B18F90
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 2_2_009D5A3C GetModuleHandleA,GetProcAddress,lstrcpyn,lstrcpyn,lstrcpyn,FindFirstFileA,FindClose,lstrlen,lstrcpyn,lstrlen,lstrcpyn,2_2_009D5A3C
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: 2_2_009D8F90 FindFirstFileA,FindClose,FileTimeToLocalFileTime,FileTimeToDosDateTime,2_2_009D8F90
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
                      Source: C:\Windows\System32\loaddll32.exeAPI call chain: ExitProcess graph end nodegraph_0-14780
                      Source: C:\Windows\SysWOW64\rundll32.exeAPI call chain: ExitProcess graph end nodegraph_2-15769
                      Source: C:\Windows\SysWOW64\rundll32.exeAPI call chain: ExitProcess graph end nodegraph_2-15869
                      Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_00B3BDCC LoadLibraryA,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,0_2_00B3BDCC
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess token adjusted: DebugJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess token adjusted: DebugJump to behavior
                      Source: C:\Windows\SysWOW64\rundll32.exeProcess queried: DebugPortJump to behavior
                      Source: C:\Windows\SysWOW64\rundll32.exeProcess queried: DebugPortJump to behavior
                      Source: C:\Windows\System32\loaddll32.exeMemory protected: page write copy | page execute and write copy | page guardJump to behavior

                      HIPS / PFW / Operating System Protection Evasion

                      barindex
                      Source: C:\Windows\System32\loaddll32.exeSection loaded: unknown target: C:\Windows\SysWOW64\explorer.exe protection: execute and read and writeJump to behavior
                      Source: C:\Windows\SysWOW64\regsvr32.exeSection loaded: unknown target: C:\Windows\SysWOW64\explorer.exe protection: execute and read and writeJump to behavior
                      Source: C:\Windows\System32\loaddll32.exeMemory written: C:\Windows\SysWOW64\explorer.exe base: 3260000Jump to behavior
                      Source: C:\Windows\System32\loaddll32.exeMemory written: C:\Windows\SysWOW64\explorer.exe base: 38F380Jump to behavior
                      Source: C:\Windows\SysWOW64\regsvr32.exeMemory written: C:\Windows\SysWOW64\explorer.exe base: 2FE0000Jump to behavior
                      Source: C:\Windows\SysWOW64\regsvr32.exeMemory written: C:\Windows\SysWOW64\explorer.exe base: 38F380Jump to behavior
                      Source: unknownProcess created: Base64 decoded regsvr32.exe "C:\Users\jones\Desktop\C.dll"
                      Source: unknownProcess created: Base64 decoded regsvr32.exe "C:\Users\jones\Desktop\C.dll"
                      Source: C:\Windows\System32\loaddll32.exeMemory allocated: C:\Windows\SysWOW64\explorer.exe base: 3260000 protect: page read and writeJump to behavior
                      Source: C:\Windows\SysWOW64\regsvr32.exeMemory allocated: C:\Windows\SysWOW64\explorer.exe base: 2FE0000 protect: page read and writeJump to behavior
                      Source: C:\Windows\System32\loaddll32.exeMemory written: PID: 812 base: 3260000 value: 9CJump to behavior
                      Source: C:\Windows\System32\loaddll32.exeMemory written: PID: 812 base: 38F380 value: E9Jump to behavior
                      Source: C:\Windows\SysWOW64\regsvr32.exeMemory written: PID: 6812 base: 2FE0000 value: 9CJump to behavior
                      Source: C:\Windows\SysWOW64\regsvr32.exeMemory written: PID: 6812 base: 38F380 value: E9Jump to behavior
                      Source: C:\Windows\SysWOW64\explorer.exeProcess created: C:\Windows\SysWOW64\schtasks.exe "C:\Windows\system32\schtasks.exe" /Create /RU "NT AUTHORITY\SYSTEM" /Z /ST 17:57 /tn qsrshyj /ET 18:08 /tr "powershell.exe -encodedCommand cgBlAGcAcwB2AHIAMwAyAC4AZQB4AGUAIAAiAEMAOgBcAFUAcwBlAHIAcwBcAGoAbwBuAGUAcwBcAEQAZQBzAGsAdABvAHAAXABDAC4AZABsAGwAIgA=" /SC ONCE
                      Source: C:\Windows\SysWOW64\explorer.exeProcess created: C:\Windows\SysWOW64\schtasks.exe "C:\Windows\system32\schtasks.exe" /Create /RU "NT AUTHORITY\SYSTEM" /Z /ST 17:57 /tn qsrshyj /ET 18:08 /tr "powershell.exe -encodedCommand cgBlAGcAcwB2AHIAMwAyAC4AZQB4AGUAIAAiAEMAOgBcAFUAcwBlAHIAcwBcAGoAbwBuAGUAcwBcAEQAZQBzAGsAdABvAHAAXABDAC4AZABsAGwAIgA=" /SC ONCEJump to behavior
                      Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\explorer.exe C:\Windows\SysWOW64\explorer.exeJump to behavior
                      Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\C.dll",#1Jump to behavior
                      Source: C:\Windows\SysWOW64\rundll32.exeProcess created: C:\Windows\SysWOW64\explorer.exe C:\Windows\SysWOW64\explorer.exeJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\regsvr32.exe "C:\Windows\system32\regsvr32.exe" C:\Users\user\Desktop\C.dllJump to behavior
                      Source: C:\Windows\SysWOW64\regsvr32.exeProcess created: C:\Windows\SysWOW64\explorer.exe C:\Windows\SysWOW64\explorer.exeJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\regsvr32.exe "C:\Windows\system32\regsvr32.exe" C:\Users\user\Desktop\C.dllJump to behavior
                      Source: C:\Windows\System32\loaddll32.exeQueries volume information: C:\ VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\rundll32.exeQueries volume information: C:\ VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\explorer.exeQueries volume information: C:\ VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\explorer.exeQueries volume information: C:\ VolumeInformationJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Numerics\v4.0_4.0.0.0__b77a5c561934e089\System.Numerics.dll VolumeInformationJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package00113~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformationJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformationJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformationJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\regsvr32.exeQueries volume information: C:\ VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\explorer.exeQueries volume information: C:\ VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\explorer.exeQueries volume information: C:\ VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\explorer.exeQueries volume information: C:\ VolumeInformationJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Numerics\v4.0_4.0.0.0__b77a5c561934e089\System.Numerics.dll VolumeInformationJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformationJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformationJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformationJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformationJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package00113~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformationJump to behavior
                      Source: C:\Windows\System32\loaddll32.exeCode function: GetModuleFileNameA,RegOpenKeyExA,RegOpenKeyExA,RegOpenKeyExA,RegQueryValueExA,RegQueryValueExA,RegCloseKey,lstrcpyn,GetThreadLocale,GetLocaleInfoA,lstrlen,lstrcpyn,LoadLibraryExA,lstrcpyn,LoadLibraryExA,lstrcpyn,LoadLibraryExA,0_2_00B15BF4
                      Source: C:\Windows\System32\loaddll32.exeCode function: GetLocaleInfoA,GetACP,0_2_00B1D024
                      Source: C:\Windows\System32\loaddll32.exeCode function: GetLocaleInfoA,0_2_00B1BA08
                      Source: C:\Windows\System32\loaddll32.exeCode function: GetLocaleInfoA,0_2_00B1BA54
                      Source: C:\Windows\System32\loaddll32.exeCode function: lstrcpyn,GetThreadLocale,GetLocaleInfoA,lstrlen,lstrcpyn,LoadLibraryExA,lstrcpyn,LoadLibraryExA,lstrcpyn,LoadLibraryExA,0_2_00B15D00
                      Source: C:\Windows\System32\loaddll32.exeCode function: GetLocaleInfoA,0_2_00B16508
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: GetModuleFileNameA,RegOpenKeyExA,RegOpenKeyExA,RegOpenKeyExA,RegQueryValueExA,RegQueryValueExA,RegCloseKey,lstrcpyn,GetThreadLocale,GetLocaleInfoA,lstrlen,lstrcpyn,LoadLibraryExA,lstrcpyn,LoadLibraryExA,lstrcpyn,LoadLibraryExA,2_2_009D5BF4
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: GetLocaleInfoA,GetACP,2_2_009DD024
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: GetLocaleInfoA,2_2_009DBA08
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: GetLocaleInfoA,2_2_009DBA54
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: GetLocaleInfoA,2_2_009D6508
                      Source: C:\Windows\SysWOW64\rundll32.exeCode function: lstrcpyn,GetThreadLocale,GetLocaleInfoA,lstrlen,lstrcpyn,LoadLibraryExA,lstrcpyn,LoadLibraryExA,lstrcpyn,LoadLibraryExA,2_2_009D5D00
                      Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_00B1A4C0 GetLocalTime,0_2_00B1A4C0
                      Source: C:\Windows\System32\loaddll32.exeCode function: 0_2_00B1C9CC GetVersionExA,0_2_00B1C9CC
                      Source: loaddll32.exe, 00000000.00000003.276518369.0000000002CAF000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000002.00000000.281761673.0000000004B7F000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000002.00000003.277505237.0000000004B7F000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: bdagent.exe
                      Source: rundll32.exe, 00000002.00000000.281761673.0000000004B7F000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: cmdagent.exe
                      Source: loaddll32.exe, 00000000.00000003.276518369.0000000002CAF000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000002.00000000.281761673.0000000004B7F000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000002.00000003.277505237.0000000004B7F000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: vsserv.exe
                      Source: loaddll32.exe, 00000000.00000003.276518369.0000000002CAF000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000002.00000000.281761673.0000000004B7F000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000002.00000003.277505237.0000000004B7F000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: avp.exe
                      Source: rundll32.exe, 00000002.00000000.281761673.0000000004B7F000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: SavService.exe
                      Source: loaddll32.exe, 00000000.00000003.276518369.0000000002CAF000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000002.00000000.281761673.0000000004B7F000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000002.00000003.277505237.0000000004B7F000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: avgcsrvx.exe
                      Source: rundll32.exe, 00000002.00000000.281761673.0000000004B7F000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: dwengine.exe
                      Source: loaddll32.exe, 00000000.00000003.276518369.0000000002CAF000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000002.00000000.281761673.0000000004B7F000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000002.00000003.277505237.0000000004B7F000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: mcshield.exe
                      Source: rundll32.exe, 00000002.00000000.281761673.0000000004B7F000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: SAVAdminService.exe
                      Source: loaddll32.exe, 00000000.00000003.276518369.0000000002CAF000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000002.00000000.281761673.0000000004B7F000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000002.00000003.277505237.0000000004B7F000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: MsMpEng.exe

                      Stealing of Sensitive Information

                      barindex
                      Source: Yara matchFile source: 4.2.explorer.exe.3230000.0.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 2.0.rundll32.exe.10a0000.6.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 24.2.regsvr32.exe.3af0000.2.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 2.2.rundll32.exe.10c0000.3.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.loaddll32.exe.2750184.1.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 24.2.regsvr32.exe.3b10000.3.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 24.2.regsvr32.exe.3ac0184.1.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 25.2.explorer.exe.2fb0000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 2.0.rundll32.exe.1070184.1.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 2.2.rundll32.exe.1070184.1.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 2.0.rundll32.exe.1070184.1.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 2.0.rundll32.exe.1070184.5.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 4.0.explorer.exe.3230000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 2.0.rundll32.exe.10a0000.2.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 2.0.rundll32.exe.10c0000.7.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.loaddll32.exe.2750184.1.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 25.0.explorer.exe.2fb0000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 2.2.rundll32.exe.10c0000.3.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 2.2.rundll32.exe.10a0000.2.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.loaddll32.exe.2780000.2.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 2.0.rundll32.exe.10a0000.6.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.loaddll32.exe.27a0000.3.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 2.0.rundll32.exe.10c0000.3.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 4.2.explorer.exe.3230000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 24.2.regsvr32.exe.3af0000.2.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 2.0.rundll32.exe.1070184.5.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.loaddll32.exe.27a0000.3.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 25.2.explorer.exe.2fb0000.0.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 24.2.regsvr32.exe.3b10000.3.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 2.2.rundll32.exe.10a0000.2.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 25.0.explorer.exe.2fb0000.0.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 2.0.rundll32.exe.10c0000.7.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 24.2.regsvr32.exe.3ac0184.1.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 4.0.explorer.exe.3230000.0.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.loaddll32.exe.2780000.2.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 2.0.rundll32.exe.10a0000.2.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 2.2.rundll32.exe.1070184.1.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 2.0.rundll32.exe.10c0000.3.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 00000002.00000002.323381928.00000000010A0000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000018.00000002.393963522.0000000003B10000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000019.00000002.765579370.0000000002FB0000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000002.00000000.281557672.0000000001070000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000000.00000002.290253396.0000000002750000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000002.00000000.283835804.0000000001070000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000004.00000002.765540679.0000000003230000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000002.00000002.323413560.00000000010C0000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000018.00000002.393925531.0000000003AF0000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000002.00000000.283947623.00000000010C0000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000019.00000000.390120530.0000000002FB0000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000004.00000000.288483062.0000000003230000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000002.00000000.281698290.00000000010C0000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000000.00000002.290425745.00000000027A0000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000002.00000000.281670705.00000000010A0000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000002.00000002.323357187.0000000001070000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000018.00000002.393905257.0000000003AC0000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000002.00000000.283887210.00000000010A0000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000000.00000002.290335602.0000000002780000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000002.00000000.281557672.0000000001070000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000000.00000002.290253396.0000000002750000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000002.00000000.283835804.0000000001070000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000002.00000002.323357187.0000000001070000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000018.00000002.393905257.0000000003AC0000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY

                      Remote Access Functionality

                      barindex
                      Source: Yara matchFile source: 4.2.explorer.exe.3230000.0.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 2.0.rundll32.exe.10a0000.6.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 24.2.regsvr32.exe.3af0000.2.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 2.2.rundll32.exe.10c0000.3.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.loaddll32.exe.2750184.1.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 24.2.regsvr32.exe.3b10000.3.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 24.2.regsvr32.exe.3ac0184.1.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 25.2.explorer.exe.2fb0000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 2.0.rundll32.exe.1070184.1.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 2.2.rundll32.exe.1070184.1.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 2.0.rundll32.exe.1070184.1.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 2.0.rundll32.exe.1070184.5.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 4.0.explorer.exe.3230000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 2.0.rundll32.exe.10a0000.2.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 2.0.rundll32.exe.10c0000.7.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.loaddll32.exe.2750184.1.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 25.0.explorer.exe.2fb0000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 2.2.rundll32.exe.10c0000.3.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 2.2.rundll32.exe.10a0000.2.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.loaddll32.exe.2780000.2.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 2.0.rundll32.exe.10a0000.6.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.loaddll32.exe.27a0000.3.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 2.0.rundll32.exe.10c0000.3.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 4.2.explorer.exe.3230000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 24.2.regsvr32.exe.3af0000.2.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 2.0.rundll32.exe.1070184.5.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.loaddll32.exe.27a0000.3.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 25.2.explorer.exe.2fb0000.0.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 24.2.regsvr32.exe.3b10000.3.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 2.2.rundll32.exe.10a0000.2.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 25.0.explorer.exe.2fb0000.0.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 2.0.rundll32.exe.10c0000.7.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 24.2.regsvr32.exe.3ac0184.1.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 4.0.explorer.exe.3230000.0.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.loaddll32.exe.2780000.2.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 2.0.rundll32.exe.10a0000.2.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 2.2.rundll32.exe.1070184.1.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 2.0.rundll32.exe.10c0000.3.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 00000002.00000002.323381928.00000000010A0000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000018.00000002.393963522.0000000003B10000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000019.00000002.765579370.0000000002FB0000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000002.00000000.281557672.0000000001070000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000000.00000002.290253396.0000000002750000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000002.00000000.283835804.0000000001070000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000004.00000002.765540679.0000000003230000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000002.00000002.323413560.00000000010C0000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000018.00000002.393925531.0000000003AF0000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000002.00000000.283947623.00000000010C0000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000019.00000000.390120530.0000000002FB0000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000004.00000000.288483062.0000000003230000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000002.00000000.281698290.00000000010C0000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000000.00000002.290425745.00000000027A0000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000002.00000000.281670705.00000000010A0000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000002.00000002.323357187.0000000001070000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000018.00000002.393905257.0000000003AC0000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000002.00000000.283887210.00000000010A0000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000000.00000002.290335602.0000000002780000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000002.00000000.281557672.0000000001070000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000000.00000002.290253396.0000000002750000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000002.00000000.283835804.0000000001070000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000002.00000002.323357187.0000000001070000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000018.00000002.393905257.0000000003AC0000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
                      Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
                      Valid Accounts1
                      Command and Scripting Interpreter
                      1
                      Scheduled Task/Job
                      411
                      Process Injection
                      111
                      Masquerading
                      1
                      Credential API Hooking
                      1
                      System Time Discovery
                      Remote Services1
                      Screen Capture
                      Exfiltration Over Other Network MediumData ObfuscationEavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationModify System Partition
                      Default Accounts1
                      Scheduled Task/Job
                      1
                      DLL Side-Loading
                      1
                      Scheduled Task/Job
                      1
                      Disable or Modify Tools
                      LSASS Memory23
                      Security Software Discovery
                      Remote Desktop Protocol1
                      Credential API Hooking
                      Exfiltration Over BluetoothJunk DataExploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
                      Domain Accounts1
                      Native API
                      Logon Script (Windows)1
                      DLL Side-Loading
                      31
                      Virtualization/Sandbox Evasion
                      Security Account Manager1
                      Process Discovery
                      SMB/Windows Admin SharesData from Network Shared DriveAutomated ExfiltrationSteganographyExploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
                      Local Accounts1
                      PowerShell
                      Logon Script (Mac)Logon Script (Mac)411
                      Process Injection
                      NTDS31
                      Virtualization/Sandbox Evasion
                      Distributed Component Object ModelInput CaptureScheduled TransferProtocol ImpersonationSIM Card SwapCarrier Billing Fraud
                      Cloud AccountsCronNetwork Logon ScriptNetwork Logon Script11
                      Deobfuscate/Decode Files or Information
                      LSA Secrets11
                      Application Window Discovery
                      SSHKeyloggingData Transfer Size LimitsFallback ChannelsManipulate Device CommunicationManipulate App Store Rankings or Ratings
                      Replication Through Removable MediaLaunchdRc.commonRc.common2
                      Obfuscated Files or Information
                      Cached Domain Credentials1
                      Remote System Discovery
                      VNCGUI Input CaptureExfiltration Over C2 ChannelMultiband CommunicationJamming or Denial of ServiceAbuse Accessibility Features
                      External Remote ServicesScheduled TaskStartup ItemsStartup Items1
                      Regsvr32
                      DCSync1
                      File and Directory Discovery
                      Windows Remote ManagementWeb Portal CaptureExfiltration Over Alternative ProtocolCommonly Used PortRogue Wi-Fi Access PointsData Encrypted for Impact
                      Drive-by CompromiseCommand and Scripting InterpreterScheduled Task/JobScheduled Task/Job1
                      Rundll32
                      Proc Filesystem25
                      System Information Discovery
                      Shared WebrootCredential API HookingExfiltration Over Symmetric Encrypted Non-C2 ProtocolApplication Layer ProtocolDowngrade to Insecure ProtocolsGenerate Fraudulent Advertising Revenue
                      Exploit Public-Facing ApplicationPowerShellAt (Linux)At (Linux)1
                      DLL Side-Loading
                      /etc/passwd and /etc/shadowSystem Network Connections DiscoverySoftware Deployment ToolsData StagedExfiltration Over Asymmetric Encrypted Non-C2 ProtocolWeb ProtocolsRogue Cellular Base StationData Destruction
                      Supply Chain CompromiseAppleScriptAt (Windows)At (Windows)1
                      File Deletion
                      Network SniffingProcess DiscoveryTaint Shared ContentLocal Data StagingExfiltration Over Unencrypted/Obfuscated Non-C2 ProtocolFile Transfer ProtocolsData Encrypted for Impact
                      Hide Legend

                      Legend:

                      • Process
                      • Signature
                      • Created File
                      • DNS/IP Info
                      • Is Dropped
                      • Is Windows Process
                      • Number of created Registry Values
                      • Number of created Files
                      • Visual Basic
                      • Delphi
                      • Java
                      • .Net C# or VB.NET
                      • C, C++ or other language
                      • Is malicious
                      • Internet
                      behaviorgraph top1 signatures2 2 Behavior Graph ID: 651257 Sample: C.png Startdate: 23/06/2022 Architecture: WINDOWS Score: 100 66 Yara detected CryptOne packer 2->66 68 Yara detected Qbot 2->68 70 Sigma detected: Schedule system process 2->70 72 3 other signatures 2->72 9 loaddll32.exe 1 2->9         started        12 powershell.exe 11 2->12         started        14 powershell.exe 8 2->14         started        process3 signatures4 74 Overwrites code with unconditional jumps - possibly settings hooks in foreign process 9->74 76 Injects code into the Windows Explorer (explorer.exe) 9->76 78 Writes to foreign memory regions 9->78 82 3 other signatures 9->82 16 explorer.exe 8 1 9->16         started        20 cmd.exe 1 9->20         started        80 Creates files in the system32 config directory 12->80 22 regsvr32.exe 12->22         started        24 conhost.exe 12->24         started        26 regsvr32.exe 14->26         started        28 conhost.exe 14->28         started        process5 file6 50 C:\Users\user\Desktop\C.dll, PE32 16->50 dropped 64 Uses schtasks.exe or at.exe to add and modify task schedules 16->64 30 schtasks.exe 1 16->30         started        32 rundll32.exe 20->32         started        35 regsvr32.exe 22->35         started        37 regsvr32.exe 26->37         started        signatures7 process8 signatures9 39 conhost.exe 30->39         started        54 Contains functionality to detect sleep reduction / modifications 32->54 41 WerFault.exe 23 9 32->41         started        44 explorer.exe 32->44         started        56 Overwrites code with unconditional jumps - possibly settings hooks in foreign process 35->56 58 Injects code into the Windows Explorer (explorer.exe) 35->58 60 Writes to foreign memory regions 35->60 62 2 other signatures 35->62 46 explorer.exe 8 2 35->46         started        process10 dnsIp11 52 192.168.2.1 unknown unknown 41->52 48 conhost.exe 46->48         started        process12

                      This section contains all screenshots as thumbnails, including those not shown in the slideshow.


                      windows-stand
                      SourceDetectionScannerLabelLink
                      C.dll100%Joe Sandbox ML
                      No Antivirus matches
                      SourceDetectionScannerLabelLinkDownload
                      4.0.explorer.exe.3230000.0.unpack100%AviraHEUR/AGEN.1234562Download File
                      2.2.rundll32.exe.10c0000.3.unpack100%AviraHEUR/AGEN.1234562Download File
                      25.2.explorer.exe.2fb0000.0.unpack100%AviraHEUR/AGEN.1234562Download File
                      25.0.explorer.exe.2fb0000.0.unpack100%AviraHEUR/AGEN.1234562Download File
                      4.2.explorer.exe.3230000.0.unpack100%AviraHEUR/AGEN.1234562Download File
                      0.2.loaddll32.exe.27a0000.3.unpack100%AviraHEUR/AGEN.1234562Download File
                      24.2.regsvr32.exe.3b10000.3.unpack100%AviraHEUR/AGEN.1234562Download File
                      2.0.rundll32.exe.10c0000.7.unpack100%AviraHEUR/AGEN.1234562Download File
                      2.0.rundll32.exe.10c0000.3.unpack100%AviraHEUR/AGEN.1234562Download File
                      No Antivirus matches
                      SourceDetectionScannerLabelLink
                      http://crt.sectigo.com/SectigoPublicCodeSigningCAR36.crt0#0%URL Reputationsafe
                      http://www.borland.com/namespaces/Types-IAppServerSOAP0%VirustotalBrowse
                      http://www.borland.com/namespaces/Types-IAppServerSOAP0%Avira URL Cloudsafe
                      https://sectigo.com/CPS00%URL Reputationsafe
                      http://www.borland.com/namespaces/Types0%URL Reputationsafe
                      http://crt.sectigo.com/SectigoPublicCodeSigningRootR46.p7c0#0%URL Reputationsafe
                      http://crl.sectigo.com/SectigoPublicCodeSigningCAR36.crl0y0%URL Reputationsafe
                      http://crl.sectigo.com/SectigoPublicCodeSigningRootR46.crl00%URL Reputationsafe
                      http://ocsp.sectigo.com00%URL Reputationsafe
                      http://ocsp.sectigo.com0#0%URL Reputationsafe
                      http://www.borland.com/namespaces/Typeslhttp://www.borland.com/namespaces/Types-IAppServerSOAP0%Avira URL Cloudsafe
                      No contacted domains info
                      NameSourceMaliciousAntivirus DetectionReputation
                      http://crt.sectigo.com/SectigoPublicCodeSigningCAR36.crt0#explorer.exe, 00000004.00000003.325177471.0000000005378000.00000004.00000800.00020000.00000000.sdmp, C.dllfalse
                      • URL Reputation: safe
                      unknown
                      http://www.borland.com/namespaces/Types-IAppServerSOAPregsvr32.exe, 00000018.00000002.393875981.00000000035D0000.00000004.00001000.00020000.00000000.sdmpfalse
                      • 0%, Virustotal, Browse
                      • Avira URL Cloud: safe
                      unknown
                      https://sectigo.com/CPS0explorer.exe, 00000004.00000003.325177471.0000000005378000.00000004.00000800.00020000.00000000.sdmp, C.dllfalse
                      • URL Reputation: safe
                      unknown
                      http://www.borland.com/namespaces/Typesloaddll32.exe, rundll32.exefalse
                      • URL Reputation: safe
                      unknown
                      http://crt.sectigo.com/SectigoPublicCodeSigningRootR46.p7c0#explorer.exe, 00000004.00000003.325177471.0000000005378000.00000004.00000800.00020000.00000000.sdmp, C.dllfalse
                      • URL Reputation: safe
                      unknown
                      http://schemas.xmlsoap.org/soap/encoding/Nhttp://www.borland.com/namespaces/Typesloaddll32.exe, 00000000.00000002.289505180.0000000000B11000.00000020.00000001.01000000.00000003.sdmp, rundll32.exe, 00000002.00000002.323140727.00000000009D1000.00000020.00000001.01000000.00000003.sdmp, explorer.exe, 00000004.00000003.325177471.0000000005378000.00000004.00000800.00020000.00000000.sdmp, regsvr32.exe, 00000018.00000002.393512133.0000000000401000.00000020.00000001.01000000.00000003.sdmp, C.dllfalse
                        high
                        http://crl.sectigo.com/SectigoPublicCodeSigningCAR36.crl0yexplorer.exe, 00000004.00000003.325177471.0000000005378000.00000004.00000800.00020000.00000000.sdmp, C.dllfalse
                        • URL Reputation: safe
                        unknown
                        http://crl.sectigo.com/SectigoPublicCodeSigningRootR46.crl0explorer.exe, 00000004.00000003.325177471.0000000005378000.00000004.00000800.00020000.00000000.sdmp, C.dllfalse
                        • URL Reputation: safe
                        unknown
                        http://ocsp.sectigo.com0explorer.exe, 00000004.00000003.325177471.0000000005378000.00000004.00000800.00020000.00000000.sdmp, C.dllfalse
                        • URL Reputation: safe
                        unknown
                        http://schemas.xmlsoap.org/soap/encoding/loaddll32.exe, rundll32.exefalse
                          high
                          http://ocsp.sectigo.com0#explorer.exe, 00000004.00000003.325177471.0000000005378000.00000004.00000800.00020000.00000000.sdmp, C.dllfalse
                          • URL Reputation: safe
                          unknown
                          http://www.borland.com/namespaces/Typeslhttp://www.borland.com/namespaces/Types-IAppServerSOAPloaddll32.exe, 00000000.00000002.289505180.0000000000B11000.00000020.00000001.01000000.00000003.sdmp, rundll32.exe, 00000002.00000002.323140727.00000000009D1000.00000020.00000001.01000000.00000003.sdmp, explorer.exe, 00000004.00000003.325177471.0000000005378000.00000004.00000800.00020000.00000000.sdmp, regsvr32.exe, 00000018.00000002.393512133.0000000000401000.00000020.00000001.01000000.00000003.sdmp, C.dllfalse
                          • Avira URL Cloud: safe
                          unknown
                          • No. of IPs < 25%
                          • 25% < No. of IPs < 50%
                          • 50% < No. of IPs < 75%
                          • 75% < No. of IPs
                          IPDomainCountryFlagASNASN NameMalicious
                          IP
                          192.168.2.1
                          Joe Sandbox Version:35.0.0 Citrine
                          Analysis ID:651257
                          Start date and time: 23/06/202217:54:072022-06-23 17:54:07 +02:00
                          Joe Sandbox Product:CloudBasic
                          Overall analysis duration:0h 10m 8s
                          Hypervisor based Inspection enabled:false
                          Report type:full
                          Sample file name:C.png (renamed file extension from png to dll)
                          Cookbook file name:default.jbs
                          Analysis system description:Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 85, IE 11, Adobe Reader DC 19, Java 8 Update 211
                          Number of analysed new started processes analysed:45
                          Number of new started drivers analysed:0
                          Number of existing processes analysed:0
                          Number of existing drivers analysed:0
                          Number of injected processes analysed:0
                          Technologies:
                          • HCA enabled
                          • EGA enabled
                          • HDC enabled
                          • AMSI enabled
                          Analysis Mode:default
                          Analysis stop reason:Timeout
                          Detection:MAL
                          Classification:mal100.troj.evad.winDLL@28/12@0/1
                          EGA Information:
                          • Successful, ratio: 100%
                          HDC Information:
                          • Successful, ratio: 100% (good quality ratio 97.9%)
                          • Quality average: 79%
                          • Quality standard deviation: 25.3%
                          HCA Information:Failed
                          Cookbook Comments:
                          • Adjust boot time
                          • Enable AMSI
                          • Override analysis time to 240s for rundll32
                          • Exclude process from analysis (whitelisted): MpCmdRun.exe, audiodg.exe, BackgroundTransferHost.exe, WerFault.exe, WMIADAP.exe, backgroundTaskHost.exe, SgrmBroker.exe, conhost.exe, svchost.exe, wuapihost.exe
                          • Excluded IPs from analysis (whitelisted): 20.42.65.92
                          • Excluded domains from analysis (whitelisted): www.bing.com, ris.api.iris.microsoft.com, fs.microsoft.com, onedsblobprdeus17.eastus.cloudapp.azure.com, store-images.s-microsoft.com, login.live.com, blobcollector.events.data.trafficmanager.net, sls.update.microsoft.com, displaycatalog.mp.microsoft.com, img-prod-cms-rt-microsoft-com.akamaized.net, watson.telemetry.microsoft.com, arc.msn.com
                          • Not all processes where analyzed, report is missing behavior information
                          • Report creation exceeded maximum time and may have missing disassembly code information.
                          • Report size exceeded maximum capacity and may have missing behavior information.
                          • Report size getting too big, too many NtReadVirtualMemory calls found.
                          TimeTypeDescription
                          17:55:51API Interceptor1x Sleep call for process: WerFault.exe modified
                          17:55:54Task SchedulerRun new task: qsrshyj path: powershell.exe s>-encodedCommand cgBlAGcAcwB2AHIAMwAyAC4AZQB4AGUAIAAiAEMAOgBcAFUAcwBlAHIAcwBcAGoAbwBuAGUAcwBcAEQAZQBzAGsAdABvAHAAXABDAC4AZABsAGwAIgA=
                          No context
                          No context
                          No context
                          No context
                          MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                          C:\Users\user\Desktop\C.dllA.dllGet hashmaliciousBrowse
                            yVOTuAlq9R.dllGet hashmaliciousBrowse
                              A.dllGet hashmaliciousBrowse
                                Process:C:\Windows\SysWOW64\WerFault.exe
                                File Type:Little-endian UTF-16 Unicode text, with CRLF line terminators
                                Category:dropped
                                Size (bytes):65536
                                Entropy (8bit):1.0117567529304945
                                Encrypted:false
                                SSDEEP:192:6eia0oXUHBUZMX4jed+63QfJ/u7sfS274ItWc:7iMXcBUZMX4jeox/u7sfX4ItWc
                                MD5:54F18E493CADCD929663976CA5F17A33
                                SHA1:10D870E766B927D63A960EB4AF38C2DC8D71B310
                                SHA-256:A3434084795AC2543CD11ABCE386600DC5926A38AB79F9352686E2B75938E09B
                                SHA-512:8B08D492128B39F522590FE36D6DA0EB11601B18A344BB2C175E836B21343FE0D582691D12FC6B38A5F40B30482942395513D443370ACD73B33AFDD09396E147
                                Malicious:false
                                Preview:..V.e.r.s.i.o.n.=.1.....E.v.e.n.t.T.y.p.e.=.A.P.P.C.R.A.S.H.....E.v.e.n.t.T.i.m.e.=.1.3.3.0.0.4.7.3.3.3.5.5.4.2.5.2.8.4.....R.e.p.o.r.t.T.y.p.e.=.2.....C.o.n.s.e.n.t.=.1.....U.p.l.o.a.d.T.i.m.e.=.1.3.3.0.0.4.7.3.3.3.7.9.0.1.8.8.2.2.....R.e.p.o.r.t.S.t.a.t.u.s.=.5.2.4.3.8.4.....R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.2.4.0.d.8.5.2.a.-.7.1.6.5.-.4.4.e.c.-.9.a.6.f.-.2.7.8.2.8.3.e.0.9.2.8.6.....I.n.t.e.g.r.a.t.o.r.R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.d.4.c.8.9.b.c.d.-.4.a.3.2.-.4.a.a.d.-.9.4.0.2.-.8.d.3.4.9.3.3.9.8.7.b.c.....W.o.w.6.4.H.o.s.t.=.3.4.4.0.4.....W.o.w.6.4.G.u.e.s.t.=.3.3.2.....N.s.A.p.p.N.a.m.e.=.r.u.n.d.l.l.3.2...e.x.e.....O.r.i.g.i.n.a.l.F.i.l.e.n.a.m.e.=.R.U.N.D.L.L.3.2...E.X.E.....A.p.p.S.e.s.s.i.o.n.G.u.i.d.=.0.0.0.0.1.5.f.4.-.0.0.0.1.-.0.0.1.c.-.a.2.7.2.-.5.8.a.0.1.9.8.7.d.8.0.1.....T.a.r.g.e.t.A.p.p.I.d.=.W.:.0.0.0.0.f.5.1.9.f.e.e.c.4.8.6.d.e.8.7.e.d.7.3.c.b.9.2.d.3.c.a.c.8.0.2.4.0.0.0.0.0.0.0.0.!.0.0.0.0.b.c.c.5.d.c.3.2.2.2.0.3.4.d.3.f.2.5.7.f.1.f.d.3.5.8.8.9.e.5.b.e.9.0.f.0.9.
                                Process:C:\Windows\SysWOW64\WerFault.exe
                                File Type:Mini DuMP crash report, 14 streams, Thu Jun 23 15:55:36 2022, 0x1205a4 type
                                Category:dropped
                                Size (bytes):57838
                                Entropy (8bit):2.1042309247756124
                                Encrypted:false
                                SSDEEP:192:X9djCgxPpKDpO5Skba1sDat+nb7eq+gMRfMf7ujJ3NH3XZk3:Nfres5LbAsWtSb7v+gMRfMf7ujT3C3
                                MD5:7BECB9E17FFE597DB621DD00474A028F
                                SHA1:342A888D8E5BE12CE49B7257BFDD10996157953E
                                SHA-256:0885DE2845AD9CBFD02AE3E213772B47D9421020CCB384496EE8BC52174DE231
                                SHA-512:315AF49155418CC2025AB2CD3579887F402CBF3F7D23368F78D2F7E069C68183BCD153AA9BEC07C21213A7C22D602BEB73D5CFB8218C8EB6F855A9387FD15344
                                Malicious:false
                                Preview:MDMP....... ..........b....................................$...06..........T.......8...........T............"..............p...........\!...................................................................U...........B.......!......GenuineIntelW...........T............b.............................0..1...............W... .E.u.r.o.p.e. .S.t.a.n.d.a.r.d. .T.i.m.e.......................................W... .E.u.r.o.p.e. .D.a.y.l.i.g.h.t. .T.i.m.e.......................................1.7.1.3.4...1...x.8.6.f.r.e...r.s.4._.r.e.l.e.a.s.e...1.8.0.4.1.0.-.1.8.0.4.....................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                Process:C:\Windows\SysWOW64\WerFault.exe
                                File Type:XML 1.0 document, Little-endian UTF-16 Unicode text, with CRLF line terminators
                                Category:dropped
                                Size (bytes):8304
                                Entropy (8bit):3.69601606347328
                                Encrypted:false
                                SSDEEP:192:Rrl7r3GLNisE6b6YLtO96gUgmfTnSt+prT89bPpsfulm:RrlsNin6b6Y5a6zgmfTnStPCft
                                MD5:4445A8B13AAF59821E622DCE2A8DD128
                                SHA1:2B5F8061B40A635E2213863DD1009F10233C5792
                                SHA-256:500FE9F529AEF879FE842696EAF09CD4AF8DDCCD0EAA3E65EE9DCD36A235970A
                                SHA-512:D7988573490C4BC33043223CB3B702DF70F6DF5DADD5C15D0668E92330903E2DA095AA025D86E8BF56B6AC63CB983A4C9B3AFFA4903316EFA4C4A7CAFE563302
                                Malicious:false
                                Preview:..<.?.x.m.l. .v.e.r.s.i.o.n.=.".1...0.". .e.n.c.o.d.i.n.g.=.".U.T.F.-.1.6.".?.>.....<.W.E.R.R.e.p.o.r.t.M.e.t.a.d.a.t.a.>.......<.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.........<.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.1.0...0.<./.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.........<.B.u.i.l.d.>.1.7.1.3.4.<./.B.u.i.l.d.>.........<.P.r.o.d.u.c.t.>.(.0.x.3.0.).:. .W.i.n.d.o.w.s. .1.0. .P.r.o.<./.P.r.o.d.u.c.t.>.........<.E.d.i.t.i.o.n.>.P.r.o.f.e.s.s.i.o.n.a.l.<./.E.d.i.t.i.o.n.>.........<.B.u.i.l.d.S.t.r.i.n.g.>.1.7.1.3.4...1...a.m.d.6.4.f.r.e...r.s.4._.r.e.l.e.a.s.e...1.8.0.4.1.0.-.1.8.0.4.<./.B.u.i.l.d.S.t.r.i.n.g.>.........<.R.e.v.i.s.i.o.n.>.1.<./.R.e.v.i.s.i.o.n.>.........<.F.l.a.v.o.r.>.M.u.l.t.i.p.r.o.c.e.s.s.o.r. .F.r.e.e.<./.F.l.a.v.o.r.>.........<.A.r.c.h.i.t.e.c.t.u.r.e.>.X.6.4.<./.A.r.c.h.i.t.e.c.t.u.r.e.>.........<.L.C.I.D.>.1.0.3.3.<./.L.C.I.D.>.......<./.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.......<.P.r.o.c.e.s.s.I.n.f.o.r.m.a.t.i.o.n.>.........<.P.i.d.>.5.6.2.0.<./.P.i.d.>.......
                                Process:C:\Windows\SysWOW64\WerFault.exe
                                File Type:XML 1.0 document, ASCII text, with CRLF line terminators
                                Category:dropped
                                Size (bytes):4670
                                Entropy (8bit):4.4915021649958495
                                Encrypted:false
                                SSDEEP:48:cvIwSD8zsKJgtWI9/XWgc8sqYjI8fm8M4JCdsRZFur+q8/Oh84SrSRd:uITfYMmgrsqY5Jbmn8DWRd
                                MD5:5CA2D431F031D09DD4F6A50AF6FEA1B2
                                SHA1:C38EF3853317B73FACAAC5EAC8BDE5467D3C9506
                                SHA-256:9987A0225FBD3D679F22E9574E7698E0B8FDE5BFDD025AD3278DAB888403B4F4
                                SHA-512:2CBB3133E126488770D53C4D799E54ED759C388F97D2889AD68BB0A451034DEDAA15D9612FBD397BDD54BA5A34573349BC5F665855EEB67C8CCBA7B267FA0433
                                Malicious:false
                                Preview:<?xml version="1.0" encoding="UTF-8" standalone="yes"?>..<req ver="2">.. <tlm>.. <src>.. <desc>.. <mach>.. <os>.. <arg nm="vermaj" val="10" />.. <arg nm="vermin" val="0" />.. <arg nm="verbld" val="17134" />.. <arg nm="vercsdbld" val="1" />.. <arg nm="verqfe" val="1" />.. <arg nm="csdbld" val="1" />.. <arg nm="versp" val="0" />.. <arg nm="arch" val="9" />.. <arg nm="lcid" val="1033" />.. <arg nm="geoid" val="244" />.. <arg nm="sku" val="48" />.. <arg nm="domain" val="0" />.. <arg nm="prodsuite" val="256" />.. <arg nm="ntprodtype" val="1" />.. <arg nm="platid" val="2" />.. <arg nm="tmsi" val="1572546" />.. <arg nm="osinsty" val="1" />.. <arg nm="iever" val="11.1.17134.0-11.0.47" />.. <arg nm="portos" val="0" />.. <arg nm="ram" val="4096" />..
                                Process:C:\Windows\SysWOW64\explorer.exe
                                File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                Category:dropped
                                Size (bytes):4096
                                Entropy (8bit):4.396967862981054
                                Encrypted:false
                                SSDEEP:48:OEPx+6I8LgS72DsOA1dyqQrD1tXPFJhsppwAOY5iRYgZX0dB1mkK52wR6PD:nPxht2Dk1dyqIF9JhsLwAOhf2ZW2wIPD
                                MD5:C3D663CFCFDBF2D1EAA72A9FB7F6925D
                                SHA1:4032F9A0D27475295B9BD927B764D8167705DD0A
                                SHA-256:73CBBE5DA2FCE01B57CAA2A39EA01DB26B84DD62631409CF4B3FCFDC4A09A2F7
                                SHA-512:FCFC24C7A425B78C3443B50E6F508F92F076EC6B11993E4FC3105D1DB79F1A23064DABA2B379BAF7108AA5DE9FC161D68D61D200EEF6E153F2C84A2CF7CA037E
                                Malicious:true
                                Joe Sandbox View:
                                • Filename: A.dll, Detection: malicious, Browse
                                • Filename: yVOTuAlq9R.dll, Detection: malicious, Browse
                                • Filename: A.dll, Detection: malicious, Browse
                                Preview:MZP.....................@...............................................!..L.!..This program must be run under Win32..$7........................................................................................................................................PE..L....^B*..........................................@.............................................................................*"...0.......................0......................................................................................CODE................................ ..`DATA....L&.......(..................@...BSS.....i................................idata..*".......$..................@....reloc.......0......................@..P.rsrc........0......................@..P....................................@..P........................................................................................................................................................................................................................
                                Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                File Type:UTF-8 Unicode (with BOM) text, with CRLF line terminators
                                Category:dropped
                                Size (bytes):1027
                                Entropy (8bit):5.266336877220217
                                Encrypted:false
                                SSDEEP:24:BxSA0qPvNRBbx2DOXihLHPX5WcHjeTKKjX4CIym1ZJXH41cr2nxSAZv:BZ7vNXboOMDYcqDYB1Z5YZZv
                                MD5:7043F9EBD9E8ECB0CF05A7DE834A1C6F
                                SHA1:06776F55136BCC41165FB247ED67DE33EBD34A94
                                SHA-256:3D46A909B6B3B6FFC99182258A609B96035946A83A14DED7D40C9451D6ECF1C0
                                SHA-512:C6A528343FCEE14C247E2F1693902396DC464D2F0D0958FC459E443A2C73EFD7FAB6B9FE8D9B3ABE7EA8E66CFD7FBEDAB2D69A7D61C12D27C0DDA56218AC09E7
                                Malicious:false
                                Preview:.**********************..Windows PowerShell transcript start..Start time: 20220623175559..Username: WORKGROUP\SYSTEM..RunAs User: WORKGROUP\SYSTEM..Configuration Name: ..Machine: 724536 (Microsoft Windows NT 10.0.17134.0)..Host Application: powershell.exe -encodedCommand cgBlAGcAcwB2AHIAMwAyAC4AZQB4AGUAIAAiAEMAOgBcAFUAcwBlAHIAcwBcAGoAbwBuAGUAcwBcAEQAZQBzAGsAdABvAHAAXABDAC4AZABsAGwAIgA=..Process ID: 6532..PSVersion: 5.1.17134.1..PSEdition: Desktop..PSCompatibleVersions: 1.0, 2.0, 3.0, 4.0, 5.0, 5.1.17134.1..BuildVersion: 10.0.17134.1..CLRVersion: 4.0.30319.42000..WSManStackVersion: 3.0..PSRemotingProtocolVersion: 2.3..SerializationVersion: 1.1.0.1..**********************..**********************..Command start time: 20220623175559..**********************..PS>regsvr32.exe "C:\Users\user\Desktop\C.dll"..**********************..Command start time: 20220623175600..**********************..PS>$global:?..True..**********************..Windows PowerShell transcript end..End time: 2022062317560
                                Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                File Type:UTF-8 Unicode (with BOM) text, with CRLF line terminators
                                Category:dropped
                                Size (bytes):1027
                                Entropy (8bit):5.253338253653885
                                Encrypted:false
                                SSDEEP:24:BxSAKBqPvNRBbx2DOXihLHPX5WZHjeTKKjX4CIym1ZJXy51crHtnxSAZWt:BZKCvNXboOMDYZqDYB1Z80RZZWt
                                MD5:C3F08CE22BBE4449120C045B9846BACC
                                SHA1:8446967067BFEA86210A243E9E9EE81BB88AD006
                                SHA-256:5FD360FB512A4804273B078921ACCC689A1D0BAAE33729F63F57466E569D5252
                                SHA-512:8E6BE2F3F403032F1FD2A495247D0C6E83441DC534BCAE207079471706C33D02FAEF68A321BF07ECA4DAD3572F3FEFEE65F636425CBC5AD7D2DCD5A89329935E
                                Malicious:false
                                Preview:.**********************..Windows PowerShell transcript start..Start time: 20220623175702..Username: WORKGROUP\SYSTEM..RunAs User: WORKGROUP\SYSTEM..Configuration Name: ..Machine: 724536 (Microsoft Windows NT 10.0.17134.0)..Host Application: powershell.exe -encodedCommand cgBlAGcAcwB2AHIAMwAyAC4AZQB4AGUAIAAiAEMAOgBcAFUAcwBlAHIAcwBcAGoAbwBuAGUAcwBcAEQAZQBzAGsAdABvAHAAXABDAC4AZABsAGwAIgA=..Process ID: 3732..PSVersion: 5.1.17134.1..PSEdition: Desktop..PSCompatibleVersions: 1.0, 2.0, 3.0, 4.0, 5.0, 5.1.17134.1..BuildVersion: 10.0.17134.1..CLRVersion: 4.0.30319.42000..WSManStackVersion: 3.0..PSRemotingProtocolVersion: 2.3..SerializationVersion: 1.1.0.1..**********************..**********************..Command start time: 20220623175702..**********************..PS>regsvr32.exe "C:\Users\user\Desktop\C.dll"..**********************..Command start time: 20220623175702..**********************..PS>$global:?..True..**********************..Windows PowerShell transcript end..End time: 2022062317570
                                Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                File Type:data
                                Category:dropped
                                Size (bytes):64
                                Entropy (8bit):0.34726597513537405
                                Encrypted:false
                                SSDEEP:3:Nlll:Nll
                                MD5:446DD1CF97EABA21CF14D03AEBC79F27
                                SHA1:36E4CC7367E0C7B40F4A8ACE272941EA46373799
                                SHA-256:A7DE5177C68A64BD48B36D49E2853799F4EBCFA8E4761F7CC472F333DC5F65CF
                                SHA-512:A6D754709F30B122112AE30E5AB22486393C5021D33DA4D1304C061863D2E1E79E8AEB029CAE61261BB77D0E7BECD53A7B0106D6EA4368B4C302464E3D941CF7
                                Malicious:false
                                Preview:@...e...........................................................
                                Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                File Type:very short file (no magic)
                                Category:dropped
                                Size (bytes):1
                                Entropy (8bit):0.0
                                Encrypted:false
                                SSDEEP:3:U:U
                                MD5:C4CA4238A0B923820DCC509A6F75849B
                                SHA1:356A192B7913B04C54574D18C28D46E6395428AB
                                SHA-256:6B86B273FF34FCE19D6B804EFF5A3F5747ADA4EAA22F1D49C01E52DDB7875B4B
                                SHA-512:4DFF4EA340F0A823F15D3F4F01AB62EAE0E5DA579CCB851F8DB9DFE84C58B2B37B89903A740E1EE172DA793A6E79D560E5F7F9BD058A12A280433ED6FA46510A
                                Malicious:false
                                Preview:1
                                Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                File Type:very short file (no magic)
                                Category:dropped
                                Size (bytes):1
                                Entropy (8bit):0.0
                                Encrypted:false
                                SSDEEP:3:U:U
                                MD5:C4CA4238A0B923820DCC509A6F75849B
                                SHA1:356A192B7913B04C54574D18C28D46E6395428AB
                                SHA-256:6B86B273FF34FCE19D6B804EFF5A3F5747ADA4EAA22F1D49C01E52DDB7875B4B
                                SHA-512:4DFF4EA340F0A823F15D3F4F01AB62EAE0E5DA579CCB851F8DB9DFE84C58B2B37B89903A740E1EE172DA793A6E79D560E5F7F9BD058A12A280433ED6FA46510A
                                Malicious:false
                                Preview:1
                                Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                File Type:very short file (no magic)
                                Category:dropped
                                Size (bytes):1
                                Entropy (8bit):0.0
                                Encrypted:false
                                SSDEEP:3:U:U
                                MD5:C4CA4238A0B923820DCC509A6F75849B
                                SHA1:356A192B7913B04C54574D18C28D46E6395428AB
                                SHA-256:6B86B273FF34FCE19D6B804EFF5A3F5747ADA4EAA22F1D49C01E52DDB7875B4B
                                SHA-512:4DFF4EA340F0A823F15D3F4F01AB62EAE0E5DA579CCB851F8DB9DFE84C58B2B37B89903A740E1EE172DA793A6E79D560E5F7F9BD058A12A280433ED6FA46510A
                                Malicious:false
                                Preview:1
                                Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                File Type:very short file (no magic)
                                Category:dropped
                                Size (bytes):1
                                Entropy (8bit):0.0
                                Encrypted:false
                                SSDEEP:3:U:U
                                MD5:C4CA4238A0B923820DCC509A6F75849B
                                SHA1:356A192B7913B04C54574D18C28D46E6395428AB
                                SHA-256:6B86B273FF34FCE19D6B804EFF5A3F5747ADA4EAA22F1D49C01E52DDB7875B4B
                                SHA-512:4DFF4EA340F0A823F15D3F4F01AB62EAE0E5DA579CCB851F8DB9DFE84C58B2B37B89903A740E1EE172DA793A6E79D560E5F7F9BD058A12A280433ED6FA46510A
                                Malicious:false
                                Preview:1
                                File type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                Entropy (8bit):6.763003299581498
                                TrID:
                                • Win32 Dynamic Link Library (generic) (1002004/3) 97.97%
                                • Win32 Executable Delphi generic (14689/80) 1.44%
                                • Win16/32 Executable Delphi generic (2074/23) 0.20%
                                • Generic Win/DOS Executable (2004/3) 0.20%
                                • DOS Executable Generic (2002/1) 0.20%
                                File name:C.dll
                                File size:1112443
                                MD5:8b81e6a7702f58b93fdc2b57ab401ffb
                                SHA1:2990b8adc8891564c404190bedab55df5027da32
                                SHA256:500f85201bcfc0ae49204bd31ed4f055cac1b0b7f8e74339907f5c14b8e711a8
                                SHA512:957929d5000d17bd44d9ef21b5b1d6bf3c1e153527000ad545cec7fc8ed9470e15fb4c7316acfd66d3004cc109f2fc483daaebbc27ff1264fc6539c827618659
                                SSDEEP:24576:5vf3ZKnZDyYxr6AVIY7wOM058KJWljhx:NQFnXz+jh
                                TLSH:A4358D32B2D1D837D4721A7C9D5BB2E998747E105E2CE44E7ED44F4C1E3AA813A352A3
                                File Content Preview:MZP.....................@...............................................!..L.!..This program must be run under Win32..$7.......................................................................................................................................
                                Icon Hash:b99988fcd4f66e0f
                                Entrypoint:0x4cb88c
                                Entrypoint Section:CODE
                                Digitally signed:true
                                Imagebase:0x400000
                                Subsystem:windows gui
                                Image File Characteristics:EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, BYTES_REVERSED_LO, 32BIT_MACHINE, DLL, BYTES_REVERSED_HI
                                DLL Characteristics:
                                Time Stamp:0x2A425E19 [Fri Jun 19 22:22:17 1992 UTC]
                                TLS Callbacks:
                                CLR (.Net) Version:
                                OS Version Major:4
                                OS Version Minor:0
                                File Version Major:4
                                File Version Minor:0
                                Subsystem Version Major:4
                                Subsystem Version Minor:0
                                Import Hash:1e26e30a2a18779b13b95a18534c6e18
                                Signature Valid:
                                Signature Issuer:
                                Signature Validation Error:
                                Error Number:
                                Not Before, Not After
                                  Subject Chain
                                    Version:
                                    Thumbprint MD5:
                                    Thumbprint SHA-1:
                                    Thumbprint SHA-256:
                                    Serial:
                                    Instruction
                                    push ebp
                                    mov ebp, esp
                                    add esp, FFFFFFC4h
                                    mov eax, 004CB444h
                                    call 00007FF2185F6699h
                                    xor eax, eax
                                    push ebp
                                    push 004CB8F4h
                                    push dword ptr fs:[eax]
                                    mov dword ptr fs:[eax], esp
                                    mov eax, 004CFF60h
                                    mov edx, 004CB908h
                                    call 00007FF2185F4108h
                                    mov eax, 004CFF64h
                                    mov ecx, 004CB914h
                                    mov edx, dword ptr [004CFF60h]
                                    call 00007FF2185F43ABh
                                    push 004CB918h
                                    call 00007FF2185F6C31h
                                    xor ecx, ecx
                                    mov dl, 01h
                                    mov eax, dword ptr [004CAD84h]
                                    call 00007FF218624DD3h
                                    xor eax, eax
                                    pop edx
                                    pop ecx
                                    pop ecx
                                    mov dword ptr fs:[eax], edx
                                    push 004CB8FBh
                                    ret
                                    jmp 00007FF2185F3910h
                                    jmp 00007FF2186BB73Ah
                                    call 00007FF2185F3F7Dh
                                    NameVirtual AddressVirtual Size Is in Section
                                    IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                    IMAGE_DIRECTORY_ENTRY_IMPORT0xd00000x222a.idata
                                    IMAGE_DIRECTORY_ENTRY_RESOURCE0xe30000x29200.rsrc
                                    IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                    IMAGE_DIRECTORY_ENTRY_SECURITY0x1082000x15c8.rsrc
                                    IMAGE_DIRECTORY_ENTRY_BASERELOC0xd30000xf4ec.reloc
                                    IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                                    IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                    IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                    IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                    IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                    IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                    IMAGE_DIRECTORY_ENTRY_IAT0x00x0
                                    IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                    IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                                    IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                    NameVirtual AddressVirtual SizeRaw SizeXored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                    CODE0x10000xca91c0xcaa00False0.4416303593460827data6.5649128445152IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                    DATA0xcc0000x264c0x2800False0.41455078125data4.565771214115526IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                    BSS0xcf0000xf690x0False0empty0.0IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                    .idata0xd00000x222a0x2400False0.3534071180555556data4.874417112519602IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                    .reloc0xd30000xf4ec0xf600False0.5579427083333334data6.683497498888386IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_SHARED, IMAGE_SCN_MEM_READ
                                    .rsrc0xe30000x292000x29200False0.7685339095744681data7.27811291294995IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_SHARED, IMAGE_SCN_MEM_READ
                                    NameRVASizeTypeLanguageCountry
                                    SDFGSFASDF0xe3ca40x21c72dataFrenchCote dIvoire
                                    RT_CURSOR0x1059180x134data
                                    RT_CURSOR0x105a4c0x134data
                                    RT_CURSOR0x105b800x134data
                                    RT_CURSOR0x105cb40x134data
                                    RT_CURSOR0x105de80x134data
                                    RT_CURSOR0x105f1c0x134data
                                    RT_CURSOR0x1060500x134data
                                    RT_BITMAP0x1061840x1d0data
                                    RT_BITMAP0x1063540x1e4data
                                    RT_BITMAP0x1065380x1d0data
                                    RT_BITMAP0x1067080x1d0data
                                    RT_BITMAP0x1068d80x1d0data
                                    RT_BITMAP0x106aa80x1d0data
                                    RT_BITMAP0x106c780x1d0data
                                    RT_BITMAP0x106e480x1d0data
                                    RT_BITMAP0x1070180x1d0data
                                    RT_BITMAP0x1071e80x1d0data
                                    RT_BITMAP0x1073b80xe8GLS_BINARY_LSB_FIRST
                                    RT_ICON0x1074a00x2e8dBase IV DBT of @.DBF, block length 512, next free block index 40, next free block 49, next used block 48059EnglishUnited States
                                    RT_DIALOG0x1077880x52data
                                    RT_STRING0x1077dc0x1ecdata
                                    RT_STRING0x1079c80x370data
                                    RT_STRING0x107d380x3d4data
                                    RT_STRING0x10810c0x36cdata
                                    RT_STRING0x1084780x3ecdata
                                    RT_STRING0x1088640x30cdata
                                    RT_STRING0x108b700x394data
                                    RT_STRING0x108f040x1e4data
                                    RT_STRING0x1090e80x1a4data
                                    RT_STRING0x10928c0x11cdata
                                    RT_STRING0x1093a80x2b8data
                                    RT_STRING0x1096600xe0data
                                    RT_STRING0x1097400x10cdata
                                    RT_STRING0x10984c0x370data
                                    RT_STRING0x109bbc0x3c4data
                                    RT_STRING0x109f800x3b8data
                                    RT_STRING0x10a3380x3b0data
                                    RT_STRING0x10a6e80xf0data
                                    RT_STRING0x10a7d80xc0data
                                    RT_STRING0x10a8980x2d8data
                                    RT_STRING0x10ab700x49cdata
                                    RT_STRING0x10b00c0x388data
                                    RT_STRING0x10b3940x2f0data
                                    RT_RCDATA0x10b6840x10data
                                    RT_RCDATA0x10b6940x5f0data
                                    RT_RCDATA0x10bc840x134Delphi compiled form 'Tp0'
                                    RT_GROUP_CURSOR0x10bdb80x14Lotus unknown worksheet or configuration, revision 0x1
                                    RT_GROUP_CURSOR0x10bdcc0x14Lotus unknown worksheet or configuration, revision 0x1
                                    RT_GROUP_CURSOR0x10bde00x14Lotus unknown worksheet or configuration, revision 0x1
                                    RT_GROUP_CURSOR0x10bdf40x14Lotus unknown worksheet or configuration, revision 0x1
                                    RT_GROUP_CURSOR0x10be080x14Lotus unknown worksheet or configuration, revision 0x1
                                    RT_GROUP_CURSOR0x10be1c0x14Lotus unknown worksheet or configuration, revision 0x1
                                    RT_GROUP_CURSOR0x10be300x14Lotus unknown worksheet or configuration, revision 0x1
                                    RT_GROUP_ICON0x10be440x14dataEnglishUnited States
                                    RT_VERSION0x10be580x204dataChineseChina
                                    DLLImport
                                    kernel32.dllDeleteCriticalSection, LeaveCriticalSection, EnterCriticalSection, InitializeCriticalSection, VirtualFree, VirtualAlloc, LocalFree, LocalAlloc, GetVersion, GetCurrentThreadId, InterlockedDecrement, InterlockedIncrement, VirtualQuery, WideCharToMultiByte, MultiByteToWideChar, lstrlenA, lstrcpynA, LoadLibraryExA, GetThreadLocale, GetStartupInfoA, GetProcAddress, GetModuleHandleA, GetModuleFileNameA, GetLocaleInfoA, GetCommandLineA, FreeLibrary, FindFirstFileA, FindClose, ExitProcess, WriteFile, UnhandledExceptionFilter, RtlUnwind, RaiseException, GetStdHandle
                                    user32.dllGetKeyboardType, LoadStringA, MessageBoxA, CharNextA
                                    advapi32.dllRegQueryValueExA, RegOpenKeyExA, RegCloseKey
                                    oleaut32.dllSysFreeString, SysReAllocStringLen, SysAllocStringLen
                                    kernel32.dllTlsSetValue, TlsGetValue, TlsFree, TlsAlloc, LocalFree, LocalAlloc
                                    advapi32.dllRegQueryValueExA, RegOpenKeyExA, RegCloseKey, GetUserNameW
                                    kernel32.dlllstrcpyA, WriteFile, WaitForSingleObject, VirtualQuery, VirtualAlloc, Sleep, SizeofResource, SetThreadLocale, SetFilePointer, SetEvent, SetErrorMode, SetEndOfFile, ResetEvent, ReadFile, MultiByteToWideChar, MulDiv, LockResource, LoadResource, LoadLibraryA, LeaveCriticalSection, InitializeCriticalSection, GlobalUnlock, GlobalReAlloc, GlobalHandle, GlobalLock, GlobalFree, GlobalFindAtomA, GlobalDeleteAtom, GlobalAlloc, GlobalAddAtomA, GetVersionExA, GetVersion, GetTickCount, GetThreadLocale, GetTempPathA, GetSystemInfo, GetStringTypeExA, GetStdHandle, GetProcAddress, GetModuleHandleA, GetModuleFileNameA, GetLocaleInfoA, GetLocalTime, GetLastError, GetFullPathNameA, GetFileSize, GetDiskFreeSpaceA, GetDateFormatA, GetCurrentThreadId, GetCurrentProcessId, GetCPInfo, GetACP, FreeResource, InterlockedExchange, FreeLibrary, FormatMessageA, FindResourceA, FindFirstFileA, FindClose, FileTimeToLocalFileTime, FileTimeToDosDateTime, EnumCalendarInfoA, EnterCriticalSection, DeleteFileA, DeleteCriticalSection, CreateThread, CreateFileA, CreateEventA, CompareStringA, CloseHandle
                                    version.dllVerQueryValueA, GetFileVersionInfoSizeA, GetFileVersionInfoA
                                    gdi32.dllUnrealizeObject, StretchBlt, SetWindowOrgEx, SetViewportOrgEx, SetTextColor, SetStretchBltMode, SetROP2, SetPixel, SetDIBColorTable, SetBrushOrgEx, SetBkMode, SetBkColor, SelectPalette, SelectObject, SaveDC, RestoreDC, RectVisible, RealizePalette, PatBlt, MoveToEx, MaskBlt, LineTo, IntersectClipRect, GetWindowOrgEx, GetTextMetricsA, GetTextExtentPoint32A, GetTextCharset, GetSystemPaletteEntries, GetStockObject, GetPixel, GetPaletteEntries, GetObjectA, GetDeviceCaps, GetDIBits, GetDIBColorTable, GetDCOrgEx, GetCurrentPositionEx, GetClipBox, GetBrushOrgEx, GetBitmapBits, ExcludeClipRect, DeleteObject, DeleteDC, CreateSolidBrush, CreatePenIndirect, CreatePalette, CreateHalftonePalette, CreateFontIndirectA, CreateDIBitmap, CreateDIBSection, CreateCompatibleDC, CreateCompatibleBitmap, CreateBrushIndirect, CreateBitmap, BitBlt
                                    user32.dllCreateWindowExA, WindowFromPoint, WinHelpA, WaitMessage, UpdateWindow, UnregisterClassA, UnhookWindowsHookEx, TranslateMessage, TranslateMDISysAccel, TrackPopupMenu, SystemParametersInfoA, ShowWindow, ShowScrollBar, ShowOwnedPopups, ShowCursor, SetWindowsHookExA, SetWindowPos, SetWindowPlacement, SetWindowLongA, SetTimer, SetScrollRange, SetScrollPos, SetScrollInfo, SetRect, SetPropA, SetParent, SetMenuItemInfoA, SetMenu, SetForegroundWindow, SetFocus, SetCursor, SetClassLongA, SetCapture, SetActiveWindow, SendMessageA, ScrollWindow, ScreenToClient, RemovePropA, RemoveMenu, ReleaseDC, ReleaseCapture, RegisterWindowMessageA, RegisterClipboardFormatA, RegisterClassA, RedrawWindow, PtInRect, PostQuitMessage, PostMessageA, PeekMessageA, OffsetRect, OemToCharA, MessageBoxA, MapWindowPoints, MapVirtualKeyA, LoadStringA, LoadKeyboardLayoutA, LoadIconA, LoadCursorA, LoadBitmapA, KillTimer, IsZoomed, IsWindowVisible, IsWindowEnabled, IsWindow, IsRectEmpty, IsIconic, IsDialogMessageA, IsChild, InvalidateRect, IntersectRect, InsertMenuItemA, InsertMenuA, InflateRect, GetWindowThreadProcessId, GetWindowTextA, GetWindowRect, GetWindowPlacement, GetWindowLongA, GetWindowDC, GetTopWindow, GetSystemMetrics, GetSystemMenu, GetSysColorBrush, GetSysColor, GetSubMenu, GetScrollRange, GetScrollPos, GetScrollInfo, GetPropA, GetParent, GetWindow, GetMenuStringA, GetMenuState, GetMenuItemInfoA, GetMenuItemID, GetMenuItemCount, GetMenu, GetLastActivePopup, GetKeyboardState, GetKeyboardLayoutList, GetKeyboardLayout, GetKeyState, GetKeyNameTextA, GetIconInfo, GetForegroundWindow, GetFocus, GetDesktopWindow, GetDCEx, GetDC, GetCursorPos, GetCursor, GetClientRect, GetClassNameA, GetClassInfoA, GetCapture, GetActiveWindow, FrameRect, FindWindowA, FillRect, EqualRect, EnumWindows, EnumThreadWindows, EndPaint, EnableWindow, EnableScrollBar, EnableMenuItem, DrawTextA, DrawMenuBar, DrawIconEx, DrawIcon, DrawFrameControl, DrawEdge, DispatchMessageA, DestroyWindow, DestroyMenu, DestroyIcon, DestroyCursor, DeleteMenu, DefWindowProcA, DefMDIChildProcA, DefFrameProcA, CreatePopupMenu, CreateMenu, CreateIcon, CopyIcon, ClientToScreen, CheckMenuItem, CallWindowProcA, CallNextHookEx, BeginPaint, CharNextA, CharLowerA, CharUpperBuffA, CharToOemA, AdjustWindowRectEx, ActivateKeyboardLayout
                                    ole32.dllIsEqualGUID, CoTaskMemFree, StringFromCLSID, CoCreateGuid
                                    kernel32.dllSleep
                                    oleaut32.dllSafeArrayPtrOfIndex, SafeArrayPutElement, SafeArrayGetElement, SafeArrayUnaccessData, SafeArrayAccessData, SafeArrayGetUBound, SafeArrayGetLBound, SafeArrayCreate, VariantChangeType, VariantCopyInd, VariantCopy, VariantClear, VariantInit
                                    ole32.dllCoCreateInstance, CoUninitialize, CoInitialize
                                    oleaut32.dllCreateErrorInfo, GetErrorInfo, SetErrorInfo, SysFreeString
                                    comctl32.dllImageList_SetIconSize, ImageList_GetIconSize, ImageList_Write, ImageList_Read, ImageList_GetDragImage, ImageList_DragShowNolock, ImageList_SetDragCursorImage, ImageList_DragMove, ImageList_DragLeave, ImageList_DragEnter, ImageList_EndDrag, ImageList_BeginDrag, ImageList_Remove, ImageList_DrawEx, ImageList_Draw, ImageList_GetBkColor, ImageList_SetBkColor, ImageList_ReplaceIcon, ImageList_Add, ImageList_GetImageCount, ImageList_Destroy, ImageList_Create, InitCommonControls
                                    Language of compilation systemCountry where language is spokenMap
                                    FrenchCote dIvoire
                                    EnglishUnited States
                                    ChineseChina
                                    No network behavior found

                                    Click to jump to process

                                    Click to jump to process

                                    Click to dive into process behavior distribution

                                    Click to jump to process

                                    Target ID:0
                                    Start time:17:55:13
                                    Start date:23/06/2022
                                    Path:C:\Windows\System32\loaddll32.exe
                                    Wow64 process (32bit):true
                                    Commandline:loaddll32.exe "C:\Users\user\Desktop\C.dll"
                                    Imagebase:0x140000
                                    File size:116736 bytes
                                    MD5 hash:7DEB5DB86C0AC789123DEC286286B938
                                    Has elevated privileges:true
                                    Has administrator privileges:true
                                    Programmed in:Borland Delphi
                                    Yara matches:
                                    • Rule: JoeSecurity_Crypt, Description: Yara detected CryptOne packer, Source: 00000000.00000002.290253396.0000000002750000.00000040.00001000.00020000.00000000.sdmp, Author: Joe Security
                                    • Rule: JoeSecurity_Qbot_1, Description: Yara detected Qbot, Source: 00000000.00000002.290253396.0000000002750000.00000040.00001000.00020000.00000000.sdmp, Author: Joe Security
                                    • Rule: JoeSecurity_Qbot_1, Description: Yara detected Qbot, Source: 00000000.00000002.290425745.00000000027A0000.00000040.00001000.00020000.00000000.sdmp, Author: Joe Security
                                    • Rule: JoeSecurity_Qbot_1, Description: Yara detected Qbot, Source: 00000000.00000002.290335602.0000000002780000.00000040.00001000.00020000.00000000.sdmp, Author: Joe Security
                                    Reputation:high

                                    Target ID:1
                                    Start time:17:55:13
                                    Start date:23/06/2022
                                    Path:C:\Windows\SysWOW64\cmd.exe
                                    Wow64 process (32bit):true
                                    Commandline:cmd.exe /C rundll32.exe "C:\Users\user\Desktop\C.dll",#1
                                    Imagebase:0x1190000
                                    File size:232960 bytes
                                    MD5 hash:F3BDBE3BB6F734E357235F4D5898582D
                                    Has elevated privileges:true
                                    Has administrator privileges:true
                                    Programmed in:C, C++ or other language
                                    Reputation:high

                                    Target ID:2
                                    Start time:17:55:14
                                    Start date:23/06/2022
                                    Path:C:\Windows\SysWOW64\rundll32.exe
                                    Wow64 process (32bit):true
                                    Commandline:rundll32.exe "C:\Users\user\Desktop\C.dll",#1
                                    Imagebase:0x1120000
                                    File size:61952 bytes
                                    MD5 hash:D7CA562B0DB4F4DD0F03A89A1FDAD63D
                                    Has elevated privileges:true
                                    Has administrator privileges:true
                                    Programmed in:Borland Delphi
                                    Yara matches:
                                    • Rule: JoeSecurity_Qbot_1, Description: Yara detected Qbot, Source: 00000002.00000002.323381928.00000000010A0000.00000040.00001000.00020000.00000000.sdmp, Author: Joe Security
                                    • Rule: JoeSecurity_Crypt, Description: Yara detected CryptOne packer, Source: 00000002.00000000.281557672.0000000001070000.00000040.00001000.00020000.00000000.sdmp, Author: Joe Security
                                    • Rule: JoeSecurity_Qbot_1, Description: Yara detected Qbot, Source: 00000002.00000000.281557672.0000000001070000.00000040.00001000.00020000.00000000.sdmp, Author: Joe Security
                                    • Rule: JoeSecurity_Crypt, Description: Yara detected CryptOne packer, Source: 00000002.00000000.283835804.0000000001070000.00000040.00001000.00020000.00000000.sdmp, Author: Joe Security
                                    • Rule: JoeSecurity_Qbot_1, Description: Yara detected Qbot, Source: 00000002.00000000.283835804.0000000001070000.00000040.00001000.00020000.00000000.sdmp, Author: Joe Security
                                    • Rule: JoeSecurity_Qbot_1, Description: Yara detected Qbot, Source: 00000002.00000002.323413560.00000000010C0000.00000040.00001000.00020000.00000000.sdmp, Author: Joe Security
                                    • Rule: JoeSecurity_Qbot_1, Description: Yara detected Qbot, Source: 00000002.00000000.283947623.00000000010C0000.00000040.00001000.00020000.00000000.sdmp, Author: Joe Security
                                    • Rule: JoeSecurity_Qbot_1, Description: Yara detected Qbot, Source: 00000002.00000000.281698290.00000000010C0000.00000040.00001000.00020000.00000000.sdmp, Author: Joe Security
                                    • Rule: JoeSecurity_Qbot_1, Description: Yara detected Qbot, Source: 00000002.00000000.281670705.00000000010A0000.00000040.00001000.00020000.00000000.sdmp, Author: Joe Security
                                    • Rule: JoeSecurity_Crypt, Description: Yara detected CryptOne packer, Source: 00000002.00000002.323357187.0000000001070000.00000040.00001000.00020000.00000000.sdmp, Author: Joe Security
                                    • Rule: JoeSecurity_Qbot_1, Description: Yara detected Qbot, Source: 00000002.00000002.323357187.0000000001070000.00000040.00001000.00020000.00000000.sdmp, Author: Joe Security
                                    • Rule: JoeSecurity_Qbot_1, Description: Yara detected Qbot, Source: 00000002.00000000.283887210.00000000010A0000.00000040.00001000.00020000.00000000.sdmp, Author: Joe Security
                                    Reputation:high

                                    Target ID:4
                                    Start time:17:55:33
                                    Start date:23/06/2022
                                    Path:C:\Windows\SysWOW64\explorer.exe
                                    Wow64 process (32bit):true
                                    Commandline:C:\Windows\SysWOW64\explorer.exe
                                    Imagebase:0x2d0000
                                    File size:3611360 bytes
                                    MD5 hash:166AB1B9462E5C1D6D18EC5EC0B6A5F7
                                    Has elevated privileges:true
                                    Has administrator privileges:true
                                    Programmed in:C, C++ or other language
                                    Yara matches:
                                    • Rule: JoeSecurity_Qbot_1, Description: Yara detected Qbot, Source: 00000004.00000002.765540679.0000000003230000.00000040.80000000.00040000.00000000.sdmp, Author: Joe Security
                                    • Rule: JoeSecurity_Qbot_1, Description: Yara detected Qbot, Source: 00000004.00000000.288483062.0000000003230000.00000040.80000000.00040000.00000000.sdmp, Author: Joe Security
                                    Reputation:high

                                    Target ID:5
                                    Start time:17:55:33
                                    Start date:23/06/2022
                                    Path:C:\Windows\SysWOW64\explorer.exe
                                    Wow64 process (32bit):
                                    Commandline:C:\Windows\SysWOW64\explorer.exe
                                    Imagebase:
                                    File size:3611360 bytes
                                    MD5 hash:166AB1B9462E5C1D6D18EC5EC0B6A5F7
                                    Has elevated privileges:true
                                    Has administrator privileges:true
                                    Programmed in:C, C++ or other language
                                    Reputation:high

                                    Target ID:6
                                    Start time:17:55:33
                                    Start date:23/06/2022
                                    Path:C:\Windows\SysWOW64\WerFault.exe
                                    Wow64 process (32bit):true
                                    Commandline:C:\Windows\SysWOW64\WerFault.exe -u -p 5620 -s 752
                                    Imagebase:0x940000
                                    File size:434592 bytes
                                    MD5 hash:9E2B8ACAD48ECCA55C0230D63623661B
                                    Has elevated privileges:true
                                    Has administrator privileges:true
                                    Programmed in:C, C++ or other language
                                    Reputation:high

                                    Target ID:19
                                    Start time:17:55:52
                                    Start date:23/06/2022
                                    Path:C:\Windows\SysWOW64\schtasks.exe
                                    Wow64 process (32bit):true
                                    Commandline:"C:\Windows\system32\schtasks.exe" /Create /RU "NT AUTHORITY\SYSTEM" /Z /ST 17:57 /tn qsrshyj /ET 18:08 /tr "powershell.exe -encodedCommand cgBlAGcAcwB2AHIAMwAyAC4AZQB4AGUAIAAiAEMAOgBcAFUAcwBlAHIAcwBcAGoAbwBuAGUAcwBcAEQAZQBzAGsAdABvAHAAXABDAC4AZABsAGwAIgA=" /SC ONCE
                                    Imagebase:0xa70000
                                    File size:185856 bytes
                                    MD5 hash:15FF7D8324231381BAD48A052F85DF04
                                    Has elevated privileges:true
                                    Has administrator privileges:true
                                    Programmed in:C, C++ or other language
                                    Reputation:high

                                    Target ID:20
                                    Start time:17:55:53
                                    Start date:23/06/2022
                                    Path:C:\Windows\System32\conhost.exe
                                    Wow64 process (32bit):false
                                    Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                    Imagebase:0x7ff647620000
                                    File size:625664 bytes
                                    MD5 hash:EA777DEEA782E8B4D7C7C33BBF8A4496
                                    Has elevated privileges:true
                                    Has administrator privileges:true
                                    Programmed in:C, C++ or other language
                                    Reputation:high

                                    Target ID:21
                                    Start time:17:55:54
                                    Start date:23/06/2022
                                    Path:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                    Wow64 process (32bit):false
                                    Commandline:powershell.exe -encodedCommand cgBlAGcAcwB2AHIAMwAyAC4AZQB4AGUAIAAiAEMAOgBcAFUAcwBlAHIAcwBcAGoAbwBuAGUAcwBcAEQAZQBzAGsAdABvAHAAXABDAC4AZABsAGwAIgA=
                                    Imagebase:0x7ff6ba650000
                                    File size:447488 bytes
                                    MD5 hash:95000560239032BC68B4C2FDFCDEF913
                                    Has elevated privileges:true
                                    Has administrator privileges:true
                                    Programmed in:.Net C# or VB.NET
                                    Reputation:high

                                    Target ID:22
                                    Start time:17:55:54
                                    Start date:23/06/2022
                                    Path:C:\Windows\System32\conhost.exe
                                    Wow64 process (32bit):false
                                    Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                    Imagebase:0x7ff647620000
                                    File size:625664 bytes
                                    MD5 hash:EA777DEEA782E8B4D7C7C33BBF8A4496
                                    Has elevated privileges:true
                                    Has administrator privileges:true
                                    Programmed in:C, C++ or other language
                                    Reputation:high

                                    Target ID:23
                                    Start time:17:55:59
                                    Start date:23/06/2022
                                    Path:C:\Windows\System32\regsvr32.exe
                                    Wow64 process (32bit):false
                                    Commandline:"C:\Windows\system32\regsvr32.exe" C:\Users\user\Desktop\C.dll
                                    Imagebase:0x7ff68a4e0000
                                    File size:24064 bytes
                                    MD5 hash:D78B75FC68247E8A63ACBA846182740E
                                    Has elevated privileges:true
                                    Has administrator privileges:true
                                    Programmed in:C, C++ or other language

                                    Target ID:24
                                    Start time:17:56:00
                                    Start date:23/06/2022
                                    Path:C:\Windows\SysWOW64\regsvr32.exe
                                    Wow64 process (32bit):true
                                    Commandline: C:\Users\user\Desktop\C.dll
                                    Imagebase:0xcc0000
                                    File size:20992 bytes
                                    MD5 hash:426E7499F6A7346F0410DEAD0805586B
                                    Has elevated privileges:true
                                    Has administrator privileges:true
                                    Programmed in:Borland Delphi
                                    Yara matches:
                                    • Rule: JoeSecurity_Qbot_1, Description: Yara detected Qbot, Source: 00000018.00000002.393963522.0000000003B10000.00000040.00001000.00020000.00000000.sdmp, Author: Joe Security
                                    • Rule: JoeSecurity_Qbot_1, Description: Yara detected Qbot, Source: 00000018.00000002.393925531.0000000003AF0000.00000040.00001000.00020000.00000000.sdmp, Author: Joe Security
                                    • Rule: JoeSecurity_Crypt, Description: Yara detected CryptOne packer, Source: 00000018.00000002.393905257.0000000003AC0000.00000040.00001000.00020000.00000000.sdmp, Author: Joe Security
                                    • Rule: JoeSecurity_Qbot_1, Description: Yara detected Qbot, Source: 00000018.00000002.393905257.0000000003AC0000.00000040.00001000.00020000.00000000.sdmp, Author: Joe Security

                                    Target ID:25
                                    Start time:17:56:19
                                    Start date:23/06/2022
                                    Path:C:\Windows\SysWOW64\explorer.exe
                                    Wow64 process (32bit):true
                                    Commandline:C:\Windows\SysWOW64\explorer.exe
                                    Imagebase:0x2d0000
                                    File size:3611360 bytes
                                    MD5 hash:166AB1B9462E5C1D6D18EC5EC0B6A5F7
                                    Has elevated privileges:true
                                    Has administrator privileges:true
                                    Programmed in:C, C++ or other language
                                    Yara matches:
                                    • Rule: JoeSecurity_Qbot_1, Description: Yara detected Qbot, Source: 00000019.00000002.765579370.0000000002FB0000.00000040.80000000.00040000.00000000.sdmp, Author: Joe Security
                                    • Rule: JoeSecurity_Qbot_1, Description: Yara detected Qbot, Source: 00000019.00000000.390120530.0000000002FB0000.00000040.80000000.00040000.00000000.sdmp, Author: Joe Security

                                    Target ID:27
                                    Start time:17:56:25
                                    Start date:23/06/2022
                                    Path:C:\Windows\System32\conhost.exe
                                    Wow64 process (32bit):false
                                    Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                    Imagebase:0x7ff647620000
                                    File size:625664 bytes
                                    MD5 hash:EA777DEEA782E8B4D7C7C33BBF8A4496
                                    Has elevated privileges:true
                                    Has administrator privileges:true
                                    Programmed in:C, C++ or other language

                                    Target ID:35
                                    Start time:17:57:00
                                    Start date:23/06/2022
                                    Path:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                    Wow64 process (32bit):false
                                    Commandline:powershell.exe -encodedCommand cgBlAGcAcwB2AHIAMwAyAC4AZQB4AGUAIAAiAEMAOgBcAFUAcwBlAHIAcwBcAGoAbwBuAGUAcwBcAEQAZQBzAGsAdABvAHAAXABDAC4AZABsAGwAIgA=
                                    Imagebase:0x7ff6ba650000
                                    File size:447488 bytes
                                    MD5 hash:95000560239032BC68B4C2FDFCDEF913
                                    Has elevated privileges:true
                                    Has administrator privileges:true
                                    Programmed in:.Net C# or VB.NET

                                    Target ID:36
                                    Start time:17:57:00
                                    Start date:23/06/2022
                                    Path:C:\Windows\System32\conhost.exe
                                    Wow64 process (32bit):false
                                    Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                    Imagebase:0x7ff647620000
                                    File size:625664 bytes
                                    MD5 hash:EA777DEEA782E8B4D7C7C33BBF8A4496
                                    Has elevated privileges:true
                                    Has administrator privileges:true
                                    Programmed in:C, C++ or other language

                                    Target ID:37
                                    Start time:17:57:02
                                    Start date:23/06/2022
                                    Path:C:\Windows\System32\regsvr32.exe
                                    Wow64 process (32bit):false
                                    Commandline:"C:\Windows\system32\regsvr32.exe" C:\Users\user\Desktop\C.dll
                                    Imagebase:0x7ff68a4e0000
                                    File size:24064 bytes
                                    MD5 hash:D78B75FC68247E8A63ACBA846182740E
                                    Has elevated privileges:true
                                    Has administrator privileges:true
                                    Programmed in:C, C++ or other language

                                    Target ID:38
                                    Start time:17:57:03
                                    Start date:23/06/2022
                                    Path:C:\Windows\SysWOW64\regsvr32.exe
                                    Wow64 process (32bit):true
                                    Commandline: C:\Users\user\Desktop\C.dll
                                    Imagebase:0xcc0000
                                    File size:20992 bytes
                                    MD5 hash:426E7499F6A7346F0410DEAD0805586B
                                    Has elevated privileges:true
                                    Has administrator privileges:true
                                    Programmed in:C, C++ or other language

                                    Reset < >

                                      Execution Graph

                                      Execution Coverage:3.5%
                                      Dynamic/Decrypted Code Coverage:100%
                                      Signature Coverage:2.4%
                                      Total number of Nodes:2000
                                      Total number of Limit Nodes:50
                                      execution_graph 16237 b33894 16253 b2b9f4 RtlEnterCriticalSection 16237->16253 16239 b338e7 16255 b33828 16239->16255 16240 b2b65c 56 API calls 16245 b338ab 16240->16245 16244 b33828 3 API calls 16251 b338fb 16244->16251 16245->16239 16245->16240 16247 b350b8 3 API calls 16245->16247 16254 b34e24 RtlEnterCriticalSection RtlLeaveCriticalSection RtlEnterCriticalSection 16245->16254 16246 b33926 16263 b2ba58 RtlLeaveCriticalSection 16246->16263 16247->16245 16249 b2b65c 56 API calls 16249->16251 16250 b33930 16251->16246 16251->16249 16262 b34f90 RtlLeaveCriticalSection RtlEnterCriticalSection RtlLeaveCriticalSection 16251->16262 16253->16245 16254->16245 16264 b33598 RtlEnterCriticalSection 16255->16264 16257 b33839 16258 b33871 16257->16258 16260 b33860 DeleteObject 16257->16260 16265 b335a4 RtlLeaveCriticalSection 16258->16265 16260->16257 16261 b33886 16261->16244 16262->16251 16263->16250 16264->16257 16265->16261 16266 b2ae98 16273 b2a9f8 RtlEnterCriticalSection 16266->16273 16268 b2aea8 16274 b2aa60 16268->16274 16270 b2aec2 16278 b2aab0 RtlLeaveCriticalSection 16270->16278 16272 b2aed9 16273->16268 16275 b2aa73 16274->16275 16277 b2aa92 16274->16277 16276 b2b65c 56 API calls 16275->16276 16275->16277 16276->16275 16277->16270 16278->16272 14718 bdb88c 14727 b167f0 14718->14727 14724 bdb8ce LoadLibraryA 14759 b44f74 14724->14759 14726 bdb8e6 14728 b167fb 14727->14728 14767 b13ecc 14728->14767 14731 b1427c 14732 b14280 14731->14732 14735 b14290 14731->14735 14732->14735 14995 b142ec 14732->14995 14733 b142be 14737 b14534 14733->14737 14735->14733 15000 b128ec 14735->15000 14738 b14538 14737->14738 14743 b144f0 14737->14743 14739 b1427c 14738->14739 14741 b14556 14738->14741 14742 b14548 14738->14742 14738->14743 14746 b142ec 25 API calls 14739->14746 14748 b14290 14739->14748 14740 b142be 14740->14724 14745 b142ec 25 API calls 14741->14745 14744 b1427c 25 API calls 14742->14744 14743->14739 14747 b14533 14743->14747 14749 b144fe 14743->14749 14744->14743 14755 b14569 14745->14755 14746->14748 14747->14724 14748->14740 14752 b128ec 11 API calls 14748->14752 14750 b14511 14749->14750 14751 b14528 14749->14751 15004 b14874 14750->15004 14754 b14874 25 API calls 14751->14754 14752->14740 14756 b14516 14754->14756 14757 b1427c 25 API calls 14755->14757 14756->14724 14758 b14595 14757->14758 14758->14724 14760 b44f8a 14759->14760 14766 b45063 14760->14766 15014 b2b41c 14760->15014 14762 b4501a 14762->14766 15024 b164b0 14762->15024 14764 b45051 15030 b1c200 14764->15030 14766->14726 14768 b13f12 14767->14768 14769 b14138 14768->14769 14770 b13f8b 14768->14770 14772 b14170 14769->14772 14776 b14181 14769->14776 14781 b13e6c 14770->14781 14786 b140ac 14772->14786 14775 b1417a 14775->14776 14777 b141bc FreeLibrary 14776->14777 14778 b141e0 14776->14778 14777->14776 14779 b141e9 14778->14779 14780 b141ef ExitProcess 14778->14780 14779->14780 14782 b13ea8 14781->14782 14783 b13e7b 14781->14783 14782->14731 14783->14782 14792 b159b8 14783->14792 14796 b128cc 14783->14796 14787 b140b6 GetStdHandle WriteFile GetStdHandle WriteFile 14786->14787 14788 b1410d 14786->14788 14787->14775 14790 b14116 MessageBoxA 14788->14790 14791 b14129 14788->14791 14790->14791 14791->14775 14793 b159e4 14792->14793 14794 b159c8 GetModuleFileNameA 14792->14794 14793->14783 14802 b15bf4 GetModuleFileNameA RegOpenKeyExA 14794->14802 14797 b128d1 14796->14797 14800 b128e4 14796->14800 14841 b122f8 14797->14841 14798 b128d7 14798->14800 14852 b12a28 14798->14852 14800->14783 14803 b15c77 14802->14803 14804 b15c37 RegOpenKeyExA 14802->14804 14820 b15a3c GetModuleHandleA 14803->14820 14804->14803 14805 b15c55 RegOpenKeyExA 14804->14805 14805->14803 14807 b15d00 lstrcpyn GetThreadLocale GetLocaleInfoA 14805->14807 14809 b15d37 14807->14809 14810 b15e1a 14807->14810 14809->14810 14813 b15d47 lstrlen 14809->14813 14810->14793 14811 b15cbc RegQueryValueExA 14812 b15cde RegCloseKey 14811->14812 14814 b15cda 14811->14814 14812->14793 14815 b15d5f 14813->14815 14814->14812 14815->14810 14816 b15d84 lstrcpyn LoadLibraryExA 14815->14816 14817 b15dac 14815->14817 14816->14817 14817->14810 14818 b15db6 lstrcpyn LoadLibraryExA 14817->14818 14818->14810 14819 b15de8 lstrcpyn LoadLibraryExA 14818->14819 14819->14810 14821 b15aa4 14820->14821 14822 b15a64 GetProcAddress 14820->14822 14824 b15bc6 RegQueryValueExA 14821->14824 14833 b15ad7 14821->14833 14837 b15a28 14821->14837 14822->14821 14823 b15a75 14822->14823 14823->14821 14827 b15a8b lstrcpyn 14823->14827 14824->14811 14824->14812 14825 b15aea lstrcpyn 14832 b15b08 14825->14832 14827->14824 14828 b15bb2 lstrcpyn 14828->14824 14830 b15a28 CharNextA 14830->14832 14831 b15a28 CharNextA 14831->14833 14832->14824 14832->14828 14832->14830 14834 b15b27 lstrcpyn FindFirstFileA 14832->14834 14833->14824 14833->14825 14834->14824 14835 b15b52 FindClose lstrlen 14834->14835 14835->14824 14836 b15b71 lstrcpyn lstrlen 14835->14836 14836->14832 14838 b15a30 14837->14838 14839 b15a3b 14838->14839 14840 b15a2a CharNextA 14838->14840 14839->14824 14839->14831 14840->14838 14842 b12311 14841->14842 14843 b1230c 14841->14843 14845 b1233e RtlEnterCriticalSection 14842->14845 14846 b12348 14842->14846 14849 b1231d 14842->14849 14858 b11c0c RtlInitializeCriticalSection 14843->14858 14845->14846 14846->14849 14865 b12204 14846->14865 14849->14798 14850 b12473 14850->14798 14851 b12469 RtlLeaveCriticalSection 14851->14850 14853 b129dc 14852->14853 14854 b12a01 14853->14854 14967 b167a4 14853->14967 14975 b129d0 14854->14975 14859 b11c30 RtlEnterCriticalSection 14858->14859 14860 b11c3a 14858->14860 14859->14860 14861 b11c58 LocalAlloc 14860->14861 14862 b11c72 14861->14862 14863 b11cc1 14862->14863 14864 b11cb7 RtlLeaveCriticalSection 14862->14864 14863->14842 14864->14863 14868 b12214 14865->14868 14866 b12240 14870 b12264 14866->14870 14876 b12018 14866->14876 14868->14866 14868->14870 14871 b12178 14868->14871 14870->14850 14870->14851 14880 b119cc 14871->14880 14873 b12188 14874 b12195 14873->14874 14889 b120ec 14873->14889 14874->14868 14877 b1206d 14876->14877 14879 b12036 14876->14879 14877->14879 14931 b11f68 14877->14931 14879->14870 14885 b119e8 14880->14885 14882 b119f2 14896 b118b8 14882->14896 14884 b119fe 14884->14873 14885->14882 14885->14884 14887 b11a43 14885->14887 14900 b11724 14885->14900 14908 b11620 14885->14908 14912 b11800 14887->14912 14919 b120a0 14889->14919 14892 b11620 LocalAlloc 14893 b12110 14892->14893 14895 b12118 14893->14895 14923 b11e44 14893->14923 14895->14874 14898 b118fe 14896->14898 14897 b1192e 14897->14884 14898->14897 14899 b1191a VirtualAlloc 14898->14899 14899->14897 14899->14898 14901 b11733 VirtualAlloc 14900->14901 14903 b11760 14901->14903 14904 b11783 14901->14904 14916 b115d8 14903->14916 14904->14885 14907 b11770 VirtualFree 14907->14904 14909 b1163c 14908->14909 14910 b115d8 LocalAlloc 14909->14910 14911 b11682 14910->14911 14911->14885 14915 b1182f 14912->14915 14913 b11888 14913->14884 14914 b1185c VirtualFree 14914->14915 14915->14913 14915->14914 14917 b11580 LocalAlloc 14916->14917 14918 b115e3 14917->14918 14918->14904 14918->14907 14920 b120b2 14919->14920 14921 b120a9 14919->14921 14920->14892 14921->14920 14928 b11e74 14921->14928 14924 b11e61 14923->14924 14925 b11e52 14923->14925 14924->14895 14926 b12018 9 API calls 14925->14926 14927 b11e5f 14926->14927 14927->14895 14929 b12488 9 API calls 14928->14929 14930 b11e95 14929->14930 14930->14920 14932 b11f7e 14931->14932 14933 b11fa9 14932->14933 14934 b11fbd 14932->14934 14943 b12006 14932->14943 14944 b11b80 14933->14944 14935 b11b80 3 API calls 14934->14935 14937 b11fbb 14935->14937 14938 b11e44 9 API calls 14937->14938 14937->14943 14939 b11fe1 14938->14939 14940 b11ffb 14939->14940 14954 b11e98 14939->14954 14959 b11690 14940->14959 14943->14879 14945 b11ba6 14944->14945 14946 b11bff 14944->14946 14963 b1194c 14945->14963 14946->14937 14949 b11620 LocalAlloc 14950 b11bc3 14949->14950 14951 b11bda 14950->14951 14952 b11800 VirtualFree 14950->14952 14951->14946 14953 b11690 LocalAlloc 14951->14953 14952->14951 14953->14946 14955 b11e9d 14954->14955 14957 b11eab 14954->14957 14956 b11e74 9 API calls 14955->14956 14958 b11eaa 14956->14958 14957->14940 14958->14940 14960 b1169b 14959->14960 14961 b116b6 14960->14961 14962 b115d8 LocalAlloc 14960->14962 14961->14943 14962->14961 14964 b11983 14963->14964 14965 b119c3 14964->14965 14966 b1199d VirtualFree 14964->14966 14965->14949 14966->14964 14968 b167b3 14967->14968 14969 b167d9 TlsGetValue 14967->14969 14968->14854 14970 b167e3 14969->14970 14971 b167be 14969->14971 14970->14854 14978 b166e8 14971->14978 14973 b167c3 TlsGetValue 14974 b167d2 14973->14974 14974->14854 14985 b14210 14975->14985 14979 b166ee 14978->14979 14982 b16712 14979->14982 14984 b166d4 LocalAlloc 14979->14984 14981 b1670e 14981->14982 14983 b1671e TlsSetValue 14981->14983 14982->14973 14983->14982 14984->14981 14988 b14138 14985->14988 14990 b14151 14988->14990 14989 b1417a 14992 b141bc FreeLibrary 14989->14992 14993 b141e0 ExitProcess 14989->14993 14990->14989 14991 b140ac 5 API calls 14990->14991 14991->14989 14992->14989 14996 b142f0 14995->14996 14997 b14314 14995->14997 14998 b128cc 25 API calls 14996->14998 14997->14735 14999 b142fd 14998->14999 14999->14735 15001 b128f1 15000->15001 15002 b12904 15000->15002 15001->15002 15003 b12a28 11 API calls 15001->15003 15002->14733 15003->15002 15005 b14881 15004->15005 15009 b148b1 15004->15009 15007 b1488d 15005->15007 15008 b142ec 25 API calls 15005->15008 15007->14756 15008->15009 15010 b14228 15009->15010 15011 b1422e 15010->15011 15013 b14249 15010->15013 15012 b128ec 11 API calls 15011->15012 15011->15013 15012->15013 15013->15007 15015 b2b432 15014->15015 15017 b2b467 15015->15017 15050 b2b290 15015->15050 15038 b2b374 15017->15038 15020 b2b492 15022 b2b4aa 15020->15022 15064 b2b318 15020->15064 15022->14762 15025 b164c0 15024->15025 15026 b164f1 15024->15026 15025->15026 15027 b15a00 30 API calls 15025->15027 15026->14764 15028 b164e0 LoadStringA 15027->15028 15029 b14318 25 API calls 15028->15029 15029->15026 15031 b1c20c 15030->15031 15032 b19850 56 API calls 15031->15032 15033 b1c239 15032->15033 15034 b1427c 25 API calls 15033->15034 15035 b1c244 15034->15035 15036 b14228 11 API calls 15035->15036 15037 b1c259 15036->15037 15037->14766 15039 b2b3f2 15038->15039 15042 b2b39e 15038->15042 15040 b14228 11 API calls 15039->15040 15041 b2b409 15040->15041 15041->15020 15059 b2b2e8 15041->15059 15042->15039 15043 b2b374 81 API calls 15042->15043 15044 b2b3b6 15043->15044 15077 b159b0 15044->15077 15048 b2b3e4 15085 b2b20c 15048->15085 15051 b167a4 4 API calls 15050->15051 15052 b2b296 15051->15052 15054 b167a4 4 API calls 15052->15054 15055 b2b2b3 15052->15055 15053 b167a4 4 API calls 15056 b2b2be 15053->15056 15054->15055 15055->15053 15057 b167a4 4 API calls 15056->15057 15058 b2b2de 15057->15058 15058->15017 15060 b167a4 4 API calls 15059->15060 15061 b2b2f0 15060->15061 15062 b2b313 15061->15062 15063 b2b65c 56 API calls 15061->15063 15062->15020 15063->15061 15065 b167a4 4 API calls 15064->15065 15066 b2b31f 15065->15066 15067 b167a4 4 API calls 15066->15067 15068 b2b32f 15067->15068 15372 b2b744 15068->15372 15071 b167a4 4 API calls 15072 b2b343 15071->15072 15375 b2b54c 15072->15375 15074 b2b354 15075 b2b35f 15074->15075 15076 b167a4 4 API calls 15074->15076 15075->15022 15076->15075 15093 b15988 VirtualQuery 15077->15093 15080 b15a00 15081 b15a27 15080->15081 15083 b15a0a 15080->15083 15081->15048 15082 b159b8 30 API calls 15084 b15a20 15082->15084 15083->15081 15083->15082 15084->15048 15086 b2b21d 15085->15086 15087 b2b22c FindResourceA 15086->15087 15088 b2b23c 15087->15088 15092 b2b268 15087->15092 15095 b2dcdc 15088->15095 15090 b2b24d 15099 b2d658 15090->15099 15092->15039 15094 b159a2 15093->15094 15094->15080 15096 b2dce6 15095->15096 15104 b2dda4 FindResourceA 15096->15104 15098 b2dd14 15098->15090 15121 b2de60 15099->15121 15101 b2d674 15125 b2fe94 15101->15125 15103 b2d68f 15103->15092 15105 b2ddd0 LoadResource 15104->15105 15106 b2ddc9 15104->15106 15108 b2dde3 15105->15108 15109 b2ddea SizeofResource LockResource 15105->15109 15114 b2dd34 15106->15114 15111 b2dd34 56 API calls 15108->15111 15112 b2de08 15109->15112 15113 b2dde9 15111->15113 15112->15098 15113->15109 15115 b164b0 56 API calls 15114->15115 15116 b2dd6d 15115->15116 15117 b1c200 56 API calls 15116->15117 15118 b2dd7c 15117->15118 15119 b14228 11 API calls 15118->15119 15120 b2dd96 15119->15120 15120->15105 15122 b2de6a 15121->15122 15123 b128cc 25 API calls 15122->15123 15124 b2de83 15123->15124 15124->15101 15152 b3027c 15125->15152 15128 b2ff41 15130 b302a0 56 API calls 15128->15130 15129 b2ff0c 15178 b302a0 15129->15178 15132 b2ff52 15130->15132 15134 b2ff5b 15132->15134 15135 b2ff68 15132->15135 15137 b302a0 56 API calls 15134->15137 15138 b302a0 56 API calls 15135->15138 15143 b2ff34 15137->15143 15140 b2ff83 15138->15140 15192 b2fe34 15140->15192 15157 b2ab0c 15143->15157 15146 b167a4 4 API calls 15147 b2ffdc 15146->15147 15168 b3516c 15147->15168 15148 b300ac 15148->15103 15149 b3006c 15149->15148 15198 b2b65c 15149->15198 15202 b2ea40 15152->15202 15155 b2fecd 15155->15128 15155->15129 15158 b2ab19 15157->15158 15217 b2a9f8 RtlEnterCriticalSection 15158->15217 15160 b2abf3 15218 b2aab0 RtlLeaveCriticalSection 15160->15218 15161 b2b65c 56 API calls 15163 b2ab50 15161->15163 15163->15161 15167 b2abb2 15163->15167 15219 b2a534 15163->15219 15164 b2ac0a 15164->15146 15166 b2b65c 56 API calls 15166->15167 15167->15160 15167->15166 15169 b351d2 15168->15169 15175 b35185 15168->15175 15169->15149 15170 b351a9 15171 b351ba 15170->15171 15223 b35208 15170->15223 15173 b351c6 15171->15173 15228 b35234 15171->15228 15173->15169 15231 b35264 15173->15231 15175->15170 15176 b1c280 56 API calls 15175->15176 15176->15170 15179 b2ea40 56 API calls 15178->15179 15180 b302b5 15179->15180 15292 b14318 15180->15292 15185 b2ea40 56 API calls 15186 b2ff17 15185->15186 15187 b2adbc 15186->15187 15303 b2ad68 15187->15303 15193 b1427c 25 API calls 15192->15193 15195 b2fe4c 15193->15195 15196 b2fe7b 15195->15196 15328 b19850 15195->15328 15331 b2b1e8 15195->15331 15196->15143 15199 b2b666 15198->15199 15200 b2b67a 15199->15200 15361 b2b5e8 15199->15361 15200->15149 15205 b2ea4b 15202->15205 15203 b2ea85 15203->15155 15206 b2e500 15203->15206 15205->15203 15209 b2ea8c 15205->15209 15207 b1c280 56 API calls 15206->15207 15208 b2e511 15207->15208 15208->15155 15210 b2ea9e 15209->15210 15211 b2eab9 15210->15211 15213 b1c280 15210->15213 15211->15205 15214 b1c287 15213->15214 15215 b164b0 56 API calls 15214->15215 15216 b1c29f 15215->15216 15216->15211 15217->15163 15218->15164 15220 b2a56a 15219->15220 15222 b2a54c 15219->15222 15220->15163 15221 b2b65c 56 API calls 15221->15222 15222->15220 15222->15221 15243 b34254 15223->15243 15268 b34754 15228->15268 15244 b34289 15243->15244 15245 b343bc 15243->15245 15259 b33598 RtlEnterCriticalSection 15244->15259 15264 b1424c 15245->15264 15269 b347e1 15268->15269 15270 b34769 15268->15270 15293 b142ec 25 API calls 15292->15293 15294 b14328 15293->15294 15295 b14228 11 API calls 15294->15295 15296 b14340 15295->15296 15297 b14740 15296->15297 15298 b146f4 15297->15298 15299 b142ec 25 API calls 15298->15299 15301 b1472f 15298->15301 15300 b1470b 15299->15300 15300->15301 15302 b128ec 11 API calls 15300->15302 15301->15185 15302->15301 15317 b2a9f8 RtlEnterCriticalSection 15303->15317 15305 b2ad79 15318 b2a85c 15305->15318 15309 b2adad 15317->15305 15319 b2a898 15318->15319 15321 b2a873 15318->15321 15323 b2aab0 RtlLeaveCriticalSection 15319->15323 15320 b2b65c 56 API calls 15320->15321 15321->15319 15321->15320 15324 b2a4d4 15321->15324 15323->15309 15325 b2a4e9 15324->15325 15327 b2a50a 15324->15327 15325->15327 15327->15321 15336 b19864 15328->15336 15332 b2b1f4 15331->15332 15333 b2b1fe 15331->15333 15332->15195 15357 b2b1a8 15333->15357 15337 b19888 15336->15337 15339 b198b3 15337->15339 15349 b19458 15337->15349 15340 b1990b 15339->15340 15347 b198c8 15339->15347 15341 b14318 25 API calls 15340->15341 15343 b1985f 15341->15343 15342 b19901 15344 b14874 25 API calls 15342->15344 15343->15195 15344->15343 15345 b14228 11 API calls 15345->15347 15346 b14874 25 API calls 15346->15347 15347->15342 15347->15345 15347->15346 15348 b19458 56 API calls 15347->15348 15348->15347 15351 b19481 15349->15351 15350 b19492 15352 b197af 11 API calls 15350->15352 15351->15350 15354 b19582 56 API calls 15351->15354 15355 b1953a 11 API calls 15351->15355 15356 b1944c 11 API calls 15351->15356 15353 b197c4 15352->15353 15353->15339 15354->15351 15355->15351 15356->15351 15358 b2b1e3 15357->15358 15360 b2b1b8 15357->15360 15358->15195 15359 b2b65c 56 API calls 15359->15360 15360->15358 15360->15359 15362 b164b0 56 API calls 15361->15362 15373 b2b65c 56 API calls 15372->15373 15374 b2b33c 15373->15374 15374->15071 15376 b2b557 15375->15376 15377 b2b5e8 56 API calls 15376->15377 15378 b2b56b 15376->15378 15377->15378 15379 b2b65c 56 API calls 15378->15379 15380 b2b574 15379->15380 15380->15074 16596 b27a8c 16597 b27abb 16596->16597 16604 b274f0 16597->16604 16664 b27014 16604->16664 16606 b27527 16607 b27549 16606->16607 16608 b2753d 16606->16608 16610 b276fd 16607->16610 16611 b275c3 16607->16611 16612 b27680 16607->16612 16613 b276c1 16607->16613 16614 b276e4 16607->16614 16615 b2766a 16607->16615 16616 b2762b 16607->16616 16617 b276a8 16607->16617 16618 b275a9 16607->16618 16619 b2768f 16607->16619 16620 b276cf 16607->16620 16667 b27484 16608->16667 16621 b1c2bc 56 API calls 16610->16621 16625 b275e5 16611->16625 16626 b275c9 16611->16626 16695 b2411c 16612->16695 16732 b2887c 16613->16732 16741 b25c20 16614->16741 16692 b240b4 16615->16692 16629 b27631 16616->16629 16640 b27650 16616->16640 16714 b2839c 16617->16714 16670 b23e9c 16618->16670 16701 b28330 16619->16701 16737 b23fb8 16620->16737 16624 b27544 16621->16624 16633 b14934 SysFreeString 16624->16633 16645 b27611 16625->16645 16646 b275f9 16625->16646 16674 b27e30 16626->16674 16688 b27ea4 16629->16688 16630 b2769c 16635 b240f0 65 API calls 16630->16635 16643 b27739 16633->16643 16635->16624 16648 b23e9c 65 API calls 16640->16648 16649 b1424c 11 API calls 16643->16649 16653 b23e9c 65 API calls 16645->16653 16684 b2408c 16646->16684 16647 b240f0 65 API calls 16647->16624 16648->16624 16651 b27746 16649->16651 16654 b1fdbc 16651->16654 16653->16624 16655 b1fdc6 16654->16655 16656 b1fddb 16654->16656 16657 b1fdf3 16655->16657 16658 b1fdcd 16655->16658 16661 b1faa8 16656->16661 18125 b1fd10 16657->18125 16658->16656 16660 b1fa18 65 API calls 16658->16660 16660->16656 16662 b1fa94 65 API calls 16661->16662 16663 b1faae 16662->16663 16784 b1f7fc 16664->16784 16668 b1c2bc 56 API calls 16667->16668 16669 b274a7 16668->16669 16669->16624 16671 b23eb3 16670->16671 16672 b23eac 16670->16672 16671->16624 16673 b1fa18 65 API calls 16672->16673 16673->16671 16675 b27e42 16674->16675 16787 b27b30 16675->16787 16678 b240f0 16679 b24104 16678->16679 16680 b240fd 16678->16680 16682 b1427c 25 API calls 16679->16682 16681 b1fa18 65 API calls 16680->16681 16681->16679 16683 b24118 16682->16683 16683->16624 16685 b240a0 16684->16685 16686 b24099 16684->16686 16685->16624 16687 b1fa18 65 API calls 16686->16687 16687->16685 16689 b27ebd 16688->16689 16807 b27ed0 16689->16807 16693 b1fa94 65 API calls 16692->16693 16694 b240ba 16693->16694 16694->16624 16696 b2413f 16695->16696 16697 b240f0 65 API calls 16696->16697 16698 b24149 16697->16698 16699 b14228 11 API calls 16698->16699 16700 b2415e 16699->16700 16700->16624 16702 b2833e 16701->16702 16708 b28349 16701->16708 16703 b28352 16702->16703 16704 b28343 16702->16704 16817 b28200 16703->16817 16706 b28347 16704->16706 16707 b2835b 16704->16707 16712 b14228 11 API calls 16706->16712 16822 b28280 16707->16822 16708->16630 16709 b28359 16709->16630 16713 b2836b 16712->16713 16713->16630 16715 b283d5 16714->16715 16716 b283c8 16714->16716 16718 b28330 29 API calls 16715->16718 16716->16715 16717 b283cc 16716->16717 16719 b283d0 16717->16719 16720 b283ee 16717->16720 16723 b283e1 16718->16723 16721 b14934 SysFreeString 16719->16721 16720->16723 16830 b14970 16720->16830 16721->16723 16724 b14228 11 API calls 16723->16724 16725 b276b5 16724->16725 16726 b2416c 16725->16726 16727 b24180 16726->16727 16728 b24179 16726->16728 16840 b14c60 16727->16840 16729 b1fa18 65 API calls 16728->16729 16729->16727 16733 b2888b 16732->16733 16734 b28896 16733->16734 16853 b28868 16733->16853 16734->16624 16738 b23fc5 16737->16738 16739 b23fcc 16737->16739 16740 b1fa18 65 API calls 16738->16740 16739->16624 16740->16739 16742 b25c29 16741->16742 16742->16742 16743 b15924 13 API calls 16742->16743 16744 b25c5a 16743->16744 16745 b15924 13 API calls 16744->16745 16746 b25c68 16745->16746 16747 b1fa94 65 API calls 16746->16747 16748 b25c70 16747->16748 16856 b25bd8 16748->16856 16750 b25caf 16860 b25b80 16750->16860 16751 b25c79 16751->16750 16754 b25f2e 16751->16754 16753 b25cbb 16864 b25ac0 16753->16864 16756 b14f0c 13 API calls 16754->16756 16759 b25f4e 16756->16759 16757 b25cc7 16868 b15810 16757->16868 16761 b14f0c 13 API calls 16759->16761 16760 b25cd8 16875 b255a8 16760->16875 16762 b25f61 16761->16762 16762->16624 16765 b1fdbc 73 API calls 16766 b25cfd 16765->16766 16885 b256e8 16766->16885 16768 b25d05 16769 b2408c 65 API calls 16768->16769 16770 b25f11 16768->16770 16771 b1fa94 65 API calls 16768->16771 16773 b23e9c 65 API calls 16768->16773 16774 b240b4 65 API calls 16768->16774 16776 b23fb8 65 API calls 16768->16776 16777 b2416c 69 API calls 16768->16777 16779 b1fdbc 73 API calls 16768->16779 16782 b240f0 65 API calls 16768->16782 16890 b240dc 16768->16890 16893 b241d0 16768->16893 16897 b241a4 16768->16897 16901 b259b4 16768->16901 16769->16768 16905 b25708 16770->16905 16771->16768 16773->16768 16774->16768 16776->16768 16777->16768 16779->16768 16782->16768 16785 b1fa94 65 API calls 16784->16785 16786 b1f806 16785->16786 16786->16606 16788 b27b51 16787->16788 16790 b27b5c 16787->16790 16799 b18af0 16788->16799 16793 b27b5a 16790->16793 16794 b1427c 25 API calls 16790->16794 16791 b14228 11 API calls 16792 b275d6 16791->16792 16792->16678 16793->16791 16795 b27b91 16794->16795 16795->16793 16803 b187c0 16795->16803 16798 b1427c 25 API calls 16798->16793 16800 b18b00 16799->16800 16801 b14318 25 API calls 16800->16801 16802 b18b08 16801->16802 16802->16793 16804 b187ce 16803->16804 16805 b14874 25 API calls 16804->16805 16806 b187d9 16805->16806 16806->16798 16808 b14228 11 API calls 16807->16808 16809 b27efe 16808->16809 16810 b27f50 16809->16810 16811 b27b30 25 API calls 16809->16811 16815 b144f0 25 API calls 16809->16815 16812 b27f6e 16810->16812 16813 b145a8 25 API calls 16810->16813 16811->16809 16814 b14228 11 API calls 16812->16814 16813->16812 16816 b27641 16814->16816 16815->16809 16816->16647 16818 b2820f 16817->16818 16819 b2821a 16818->16819 16827 b281ec 16818->16827 16819->16709 16823 b2839c 29 API calls 16822->16823 16824 b282a8 16823->16824 16825 b14934 SysFreeString 16824->16825 16826 b282c7 16825->16826 16826->16630 16828 b1427c 25 API calls 16827->16828 16829 b281fb 16828->16829 16829->16709 16831 b14934 16830->16831 16832 b14978 16830->16832 16834 b14948 16831->16834 16835 b1493a SysFreeString 16831->16835 16832->16831 16833 b14983 SysReAllocStringLen 16832->16833 16836 b14993 16833->16836 16837 b14904 16833->16837 16834->16723 16835->16834 16836->16723 16838 b14920 16837->16838 16839 b14910 SysAllocStringLen 16837->16839 16838->16723 16839->16837 16839->16838 16841 b14c73 16840->16841 16844 b14a28 16841->16844 16843 b14ca2 16843->16624 16845 b14a30 SysAllocStringLen 16844->16845 16846 b14934 16844->16846 16849 b14a40 SysFreeString 16845->16849 16850 b14904 16845->16850 16847 b14948 16846->16847 16848 b1493a SysFreeString 16846->16848 16847->16843 16848->16847 16849->16843 16851 b14920 16850->16851 16852 b14910 SysAllocStringLen 16850->16852 16851->16843 16852->16850 16852->16851 16854 b1fdbc 73 API calls 16853->16854 16855 b28877 16854->16855 16855->16624 16857 b25be2 16856->16857 16858 b1f25c 56 API calls 16857->16858 16859 b25c1c 16857->16859 16858->16859 16859->16751 16861 b25b8f 16860->16861 16910 b15804 16861->16910 16863 b25ba8 16863->16753 16865 b25ad4 16864->16865 16866 b15804 30 API calls 16865->16866 16867 b25ae9 16866->16867 16867->16757 16869 b15815 16868->16869 16870 b15827 16868->16870 16970 b15830 16869->16970 16871 b15924 13 API calls 16870->16871 16874 b1582e 16871->16874 16874->16760 16876 b255c0 16875->16876 16879 b255d7 16876->16879 16978 b1f43c 16876->16978 16878 b2560c SafeArrayCreate 16880 b25627 16878->16880 16881 b2562c 16878->16881 16879->16878 16879->16879 16883 b1f43c 56 API calls 16880->16883 16882 b1fa94 65 API calls 16881->16882 16884 b25634 16882->16884 16883->16881 16884->16765 16985 b25650 16885->16985 16888 b1f6e4 57 API calls 16889 b256ff 16888->16889 16889->16768 16891 b1fa94 65 API calls 16890->16891 16892 b240e2 16891->16892 16892->16768 16894 b241e4 16893->16894 16895 b241dd 16893->16895 16894->16768 16896 b1fa18 65 API calls 16895->16896 16896->16894 16898 b241b1 16897->16898 16899 b241b8 16897->16899 16900 b1fa18 65 API calls 16898->16900 16899->16768 16900->16899 16902 b259bf 16901->16902 16989 b2586c 16902->16989 16904 b259d1 16904->16768 16906 b25650 57 API calls 16905->16906 16907 b25712 SafeArrayUnaccessData 16906->16907 16908 b1f6e4 57 API calls 16907->16908 16909 b2571d 16908->16909 16909->16624 16913 b15678 16910->16913 16914 b15697 16913->16914 16918 b156b1 16913->16918 16915 b156a2 16914->16915 16916 b12a28 11 API calls 16914->16916 16927 b15670 16915->16927 16916->16915 16920 b156fb 16918->16920 16921 b12a28 11 API calls 16918->16921 16919 b156ac 16919->16863 16922 b128cc 25 API calls 16920->16922 16924 b15708 16920->16924 16921->16920 16923 b15747 16922->16923 16923->16924 16930 b15658 16923->16930 16924->16919 16926 b15678 30 API calls 16924->16926 16926->16924 16928 b15924 13 API calls 16927->16928 16929 b15675 16928->16929 16929->16919 16933 b15138 16930->16933 16932 b15663 16932->16924 16934 b1514d 16933->16934 16935 b15173 16933->16935 16936 b15152 16934->16936 16937 b15195 16934->16937 16938 b1427c 25 API calls 16935->16938 16947 b15190 16935->16947 16940 b15157 16936->16940 16941 b151a9 16936->16941 16939 b14970 3 API calls 16937->16939 16937->16947 16938->16935 16939->16937 16943 b151bd 16940->16943 16944 b1515c 16940->16944 16941->16947 16952 b15004 16941->16952 16943->16947 16948 b15138 30 API calls 16943->16948 16945 b15161 16944->16945 16946 b151de 16944->16946 16945->16935 16945->16947 16950 b1520f 16945->16950 16946->16947 16957 b1501c 16946->16957 16947->16932 16948->16943 16950->16947 16966 b15960 16950->16966 16953 b15014 16952->16953 16955 b1500d 16952->16955 16954 b12a28 11 API calls 16953->16954 16956 b1501b 16954->16956 16955->16941 16956->16941 16964 b15036 16957->16964 16958 b1427c 25 API calls 16958->16964 16959 b14970 3 API calls 16959->16964 16960 b15004 11 API calls 16960->16964 16961 b15138 30 API calls 16961->16964 16962 b15122 16962->16946 16963 b1501c 30 API calls 16963->16964 16964->16958 16964->16959 16964->16960 16964->16961 16964->16962 16964->16963 16965 b15960 13 API calls 16964->16965 16965->16964 16968 b15967 16966->16968 16967 b15981 16967->16950 16968->16967 16969 b15924 13 API calls 16968->16969 16969->16967 16973 b15850 16970->16973 16977 b158f8 16970->16977 16971 b15670 13 API calls 16972 b15825 16971->16972 16972->16760 16974 b128cc 25 API calls 16973->16974 16973->16977 16975 b158ba 16974->16975 16976 b15658 30 API calls 16975->16976 16975->16977 16976->16977 16977->16971 16979 b164b0 56 API calls 16978->16979 16980 b1f45c 16979->16980 16981 b1c1c4 25 API calls 16980->16981 16982 b1f46b 16981->16982 16983 b14228 11 API calls 16982->16983 16984 b1f485 16983->16984 16984->16879 16986 b25663 16985->16986 16987 b25671 SafeArrayAccessData 16986->16987 16988 b1f6e4 57 API calls 16986->16988 16987->16888 16988->16987 16990 b25885 16989->16990 16991 b1f6e4 57 API calls 16990->16991 16993 b25893 16990->16993 16991->16993 16992 b258c3 16995 b258d8 16992->16995 16997 b1f6e4 57 API calls 16992->16997 16993->16992 17017 b25740 16993->17017 16998 b25923 VariantInit 16995->16998 17001 b258fe SafeArrayPtrOfIndex 16995->17001 17021 b25444 16995->17021 16997->16995 16999 b25951 16998->16999 17000 b2593f 16998->17000 17030 b20300 16999->17030 17024 b20070 17000->17024 17005 b1f6e4 57 API calls 17001->17005 17009 b25914 17005->17009 17006 b1f6e4 57 API calls 17006->16992 17007 b25949 SafeArrayPutElement 17013 b1f6e4 57 API calls 17007->17013 17010 b1fdbc 73 API calls 17009->17010 17012 b2591e 17010->17012 17012->16904 17014 b2598e 17013->17014 17015 b1fa94 65 API calls 17014->17015 17018 b25754 17017->17018 17019 b25444 2 API calls 17018->17019 17020 b2576b 17018->17020 17019->17020 17020->16992 17020->17006 17022 b26e74 2 API calls 17021->17022 17023 b2544c 17022->17023 17023->16998 17023->17001 17025 b20050 17024->17025 17108 b15290 17025->17108 17031 b20310 17030->17031 17032 b2031c 17030->17032 17033 b1fdbc 73 API calls 17031->17033 17034 b20322 17032->17034 17035 b20333 17032->17035 17036 b20319 17033->17036 17037 b20300 115 API calls 17034->17037 17038 b204f8 17035->17038 17039 b203d0 17035->17039 17040 b20470 17035->17040 17041 b204d0 17035->17041 17042 b20414 17035->17042 17043 b203fa 17035->17043 17044 b2049a 17035->17044 17045 b204be 17035->17045 17046 b20462 17035->17046 17047 b204e2 17035->17047 17048 b203c4 17035->17048 17049 b203e5 17035->17049 17050 b20485 17035->17050 17051 b20448 17035->17051 17052 b2042e 17035->17052 17053 b204ac 17035->17053 17054 b204ed 17035->17054 17065 b20399 17035->17065 17036->17007 17062 b2032e 17037->17062 17055 b20502 17038->17055 17056 b20507 17038->17056 17153 b20c6c 17039->17153 17334 b21784 17040->17334 17407 b21188 17041->17407 17208 b21c98 17042->17208 17197 b22030 17043->17197 17374 b20bc4 17044->17374 17396 b20e3c 17045->17396 17327 b200e4 17046->17327 17436 b2017c 17047->17436 17069 b1f7fc 65 API calls 17048->17069 17164 b206c4 17049->17164 17363 b20b14 17050->17363 17286 b22408 17051->17286 17241 b22970 17052->17241 17385 b20d64 17053->17385 17441 b201c8 17054->17441 17077 b20512 17055->17077 17078 b20505 17055->17078 17446 b20130 17056->17446 17062->17007 17064 b203b8 17088 b1fa94 65 API calls 17064->17088 17065->17064 17086 b203a8 17065->17086 17069->17062 17081 b1f2b0 58 API calls 17077->17081 17453 b20294 17078->17453 17079 b2048c 17370 b23f78 17079->17370 17081->17062 17082 b204a1 17381 b23f18 17082->17381 17084 b204b3 17142 b1f2b0 17086->17142 17087 b204c5 17088->17062 17090 b204d7 17091 b203d7 17093 b203ec 17107 b2408c 65 API calls 17107->17062 17109 b152a0 17108->17109 17112 b1499c 17109->17112 17113 b149b5 17112->17113 17114 b149be 17112->17114 17115 b14934 SysFreeString 17113->17115 17116 b149f1 17114->17116 17127 b14368 MultiByteToWideChar 17114->17127 17117 b149bc 17115->17117 17128 b14d8c 17116->17128 17120 b149dc 17120->17116 17127->17120 17463 b252c0 17142->17463 17154 b20d05 17153->17154 17155 b20c85 17153->17155 17157 b206c4 92 API calls 17154->17157 17155->17154 17156 b20cc7 17155->17156 17158 b20cc0 17155->17158 17156->17158 17159 b1f2b0 58 API calls 17156->17159 17157->17158 17158->17091 17159->17158 17165 b206f0 17164->17165 17166 b208c1 17164->17166 17165->17166 17169 b208b1 17165->17169 17170 b20755 17165->17170 17171 b2089e 17165->17171 17172 b2081c 17165->17172 17181 b2074b 17165->17181 17167 b208d4 17166->17167 17168 b208cd 17166->17168 17177 b2052c 89 API calls 17167->17177 17175 b208d2 17168->17175 17176 b208e4 17168->17176 17501 b205e0 VariantInit 17169->17501 17179 b1f2b0 58 API calls 17170->17179 17170->17181 17173 b206c4 92 API calls 17171->17173 17489 b2052c 17172->17489 17173->17181 17177->17181 17179->17181 17181->17093 17198 b22171 17197->17198 17199 b2204b 17197->17199 17200 b21c98 88 API calls 17198->17200 17199->17198 17201 b20401 17199->17201 17202 b220b0 17199->17202 17200->17201 17204 b23fe4 17201->17204 17202->17201 17203 b1f2b0 58 API calls 17202->17203 17203->17201 17209 b21e40 17208->17209 17210 b21cad 17208->17210 17211 b21e50 17209->17211 17212 b21e49 17209->17212 17210->17209 17213 b2041b 17210->17213 17214 b21e30 17210->17214 17215 b21d16 17210->17215 17216 b21d94 17210->17216 17217 b21e1f 17210->17217 17220 b21ad8 85 API calls 17211->17220 17218 b21e60 17212->17218 17219 b21e4e 17212->17219 17237 b24008 17213->17237 17727 b21b9c VariantInit 17214->17727 17215->17213 17225 b1f2b0 58 API calls 17215->17225 17715 b21ad8 17216->17715 17222 b21c98 88 API calls 17217->17222 17220->17213 17222->17213 17225->17213 17242 b22b40 17241->17242 17243 b22985 17241->17243 17244 b22b50 17242->17244 17245 b22b49 17242->17245 17243->17242 17246 b22b30 17243->17246 17247 b22a36 17243->17247 17248 b22a58 17243->17248 17249 b22b1f 17243->17249 17250 b22b05 17243->17250 17251 b22a68 17243->17251 17257 b229ee 17243->17257 17258 b20435 17243->17258 17259 b22758 85 API calls 17244->17259 17255 b22b60 17245->17255 17256 b22b4e 17245->17256 17254 b22874 60 API calls 17246->17254 17743 b22874 VariantInit 17247->17743 17261 b22874 60 API calls 17248->17261 17253 b22970 89 API calls 17249->17253 17759 b22814 VariantInit 17250->17759 17747 b22758 17251->17747 17253->17258 17254->17258 17257->17258 17264 b1f2b0 58 API calls 17257->17264 17282 b24034 17258->17282 17259->17258 17261->17258 17264->17258 17287 b2259e 17286->17287 17288 b2241d 17286->17288 17289 b225a7 17287->17289 17290 b225ae 17287->17290 17288->17287 17291 b2044f 17288->17291 17292 b2257d 17288->17292 17293 b224c2 17288->17293 17294 b22563 17288->17294 17295 b22486 17288->17295 17296 b224e4 17288->17296 17297 b2258e 17288->17297 17300 b225be 17289->17300 17301 b225ac 17289->17301 17302 b221c0 89 API calls 17290->17302 17323 b24060 17291->17323 17298 b22408 93 API calls 17292->17298 17775 b2230c VariantInit 17293->17775 17793 b222ac VariantInit 17294->17793 17295->17291 17307 b1f2b0 58 API calls 17295->17307 17779 b221c0 17296->17779 17299 b2230c 60 API calls 17297->17299 17298->17291 17299->17291 17302->17291 17307->17291 17328 b2374c 85 API calls 17327->17328 17329 b20102 17328->17329 17330 b2416c 69 API calls 17329->17330 17335 b21911 17334->17335 17336 b21797 17334->17336 17337 b21921 17335->17337 17338 b2191a 17335->17338 17336->17335 17339 b218f2 17336->17339 17340 b21902 17336->17340 17341 b21889 17336->17341 17348 b217fb 17336->17348 17356 b20477 17336->17356 17347 b215cc 86 API calls 17337->17347 17345 b21930 17338->17345 17346 b2191f 17338->17346 17343 b21784 89 API calls 17339->17343 17826 b21694 VariantInit 17340->17826 17812 b215cc 17341->17812 17343->17356 17347->17356 17350 b1f2b0 58 API calls 17348->17350 17348->17356 17350->17356 17356->17107 17364 b20b2a 17363->17364 17369 b20b3a 17363->17369 17365 b20b3e 17364->17365 17366 b20b2c 17364->17366 17367 b1f2b0 58 API calls 17365->17367 17365->17369 17368 b206c4 92 API calls 17366->17368 17366->17369 17367->17369 17368->17369 17369->17079 17375 b20bea 17374->17375 17376 b20bda 17374->17376 17375->17082 17377 b20bee 17376->17377 17378 b20bdc 17376->17378 17377->17375 17379 b1f2b0 58 API calls 17377->17379 17378->17375 17380 b206c4 92 API calls 17378->17380 17379->17375 17380->17375 17386 b20dea 17385->17386 17387 b20d79 17385->17387 17388 b206c4 92 API calls 17386->17388 17387->17386 17389 b20db5 17387->17389 17390 b20db1 17387->17390 17388->17390 17389->17390 17391 b1f2b0 58 API calls 17389->17391 17390->17084 17391->17390 17397 b20ed6 17396->17397 17398 b20e55 17396->17398 17399 b21188 92 API calls 17397->17399 17398->17397 17400 b20e99 17398->17400 17401 b20e92 17398->17401 17399->17401 17400->17401 17402 b1f2b0 58 API calls 17400->17402 17401->17087 17402->17401 17408 b211b4 17407->17408 17409 b2137f 17407->17409 17408->17409 17410 b21356 17408->17410 17411 b21222 17408->17411 17412 b212ce 17408->17412 17413 b2136c 17408->17413 17430 b2120f 17408->17430 17414 b21392 17409->17414 17415 b2138b 17409->17415 17416 b21188 92 API calls 17410->17416 17422 b1f2b0 58 API calls 17411->17422 17411->17430 17867 b20fd0 17412->17867 17879 b20f24 VariantInit 17413->17879 17420 b20fd0 89 API calls 17414->17420 17418 b21390 17415->17418 17419 b213a5 17415->17419 17416->17430 17420->17430 17422->17430 17430->17090 17898 b23df0 17436->17898 17438 b2019a 17907 b23d24 17441->17907 17926 b23024 17446->17926 17454 b202b6 17453->17454 17455 b202a9 17453->17455 17464 b252f3 17463->17464 17465 b25309 17463->17465 17899 b23e00 17898->17899 17901 b23e10 17898->17901 17900 b23e19 17899->17900 17903 b23e02 17899->17903 17900->17901 17901->17438 17903->17901 17908 b23d43 17907->17908 17909 b23d33 17907->17909 17911 b23d9a 17908->17911 17914 b23d3c 17908->17914 17910 b23d58 17909->17910 17913 b23d61 17909->17913 17909->17914 17913->17910 17914->17910 17927 b2302c 17926->17927 17927->17927 18126 b1fd26 18125->18126 18127 b1fd1f 18125->18127 18129 b1fd3d 18126->18129 18130 b1fd2f VariantCopy 18126->18130 18128 b1fa18 65 API calls 18127->18128 18128->18126 18131 b1fd44 18129->18131 18132 b1fd5b 18129->18132 18133 b1f6e4 57 API calls 18130->18133 18134 b1427c 25 API calls 18131->18134 18135 b1fd8c 18132->18135 18136 b1fd7c 18132->18136 18140 b1fd3b 18132->18140 18133->18140 18134->18140 18138 b26e74 2 API calls 18135->18138 18143 b1fb3c 18136->18143 18139 b1fd95 18138->18139 18139->18140 18141 b1fdaa VariantCopy 18139->18141 18140->16656 18142 b1f6e4 57 API calls 18141->18142 18142->18140 18144 b1fb66 18143->18144 18145 b1fb5c 18143->18145 18147 b1fb7a 18144->18147 18148 b1fced VariantCopy 18144->18148 18146 b1f6e4 57 API calls 18145->18146 18146->18144 18150 b1fc1a SafeArrayCreate 18147->18150 18153 b1fbb8 SafeArrayGetLBound 18147->18153 18149 b1f6e4 57 API calls 18148->18149 18163 b1fceb 18149->18163 18151 b1fc35 18150->18151 18152 b1fc3a 18150->18152 18154 b1f43c 56 API calls 18151->18154 18155 b1fa94 65 API calls 18152->18155 18156 b1f6e4 57 API calls 18153->18156 18154->18152 18159 b1fc45 18155->18159 18157 b1fbdf SafeArrayGetUBound 18156->18157 18158 b1f6e4 57 API calls 18157->18158 18158->18147 18160 b1fc92 SafeArrayPtrOfIndex 18159->18160 18159->18163 18161 b1f6e4 57 API calls 18160->18161 18162 b1fcb1 SafeArrayPtrOfIndex 18161->18162 18164 b1f6e4 57 API calls 18162->18164 18163->18140 18164->18159 18489 b2aee4 18496 b2a9f8 RtlEnterCriticalSection 18489->18496 18491 b2aef7 18497 b2a930 18491->18497 18495 b2af2a 18496->18491 18507 b2a818 18497->18507 18501 b2a9f0 18506 b2aab0 RtlLeaveCriticalSection 18501->18506 18502 b2a95c 18502->18501 18503 b2b65c 56 API calls 18502->18503 18504 b2a818 56 API calls 18502->18504 18505 b2b54c 56 API calls 18502->18505 18503->18502 18504->18502 18505->18502 18506->18495 18508 b2a854 18507->18508 18511 b2a82f 18507->18511 18508->18502 18512 b2a8a0 18508->18512 18509 b2b65c 56 API calls 18509->18511 18511->18508 18511->18509 18520 b2a3a8 18511->18520 18513 b2a8d0 18512->18513 18514 b164b0 56 API calls 18513->18514 18515 b2a8f3 18514->18515 18516 b1c200 56 API calls 18515->18516 18517 b2a905 18516->18517 18518 b14228 11 API calls 18517->18518 18519 b2a922 18518->18519 18519->18502 18521 b2a3bb 18520->18521 18522 b2a3c4 18520->18522 18526 b2a348 18521->18526 18524 b2a3da 18522->18524 18525 b2a348 56 API calls 18522->18525 18524->18511 18525->18524 18527 b2a366 18526->18527 18528 b2a39e 18526->18528 18527->18528 18529 b2b65c 56 API calls 18527->18529 18528->18522 18529->18527 20805 b2addc 20813 b2a9f8 RtlEnterCriticalSection 20805->20813 20807 b2adec 20809 b2ae29 20807->20809 20814 b2aa04 20807->20814 20819 b2aa1c 20807->20819 20823 b2aab0 RtlLeaveCriticalSection 20809->20823 20812 b2ae40 20813->20807 20815 b2a818 56 API calls 20814->20815 20816 b2aa0e 20815->20816 20817 b2aa19 20816->20817 20824 b2a578 20816->20824 20817->20807 20820 b2aa50 20819->20820 20822 b2aa34 20819->20822 20820->20807 20821 b2b65c 56 API calls 20821->20822 20822->20820 20822->20821 20823->20812 20825 b2a5a7 20824->20825 20826 b2a4d4 56 API calls 20825->20826 20827 b2a5bf 20826->20827 20828 b1c2bc 56 API calls 20827->20828 20829 b2a5ee 20827->20829 20828->20829 20830 b14228 11 API calls 20829->20830 20831 b2a612 20830->20831 20831->20817 20880 b359c4 20887 b12ac8 20880->20887 20883 b35aa8 73BEB380 20884 b35a1e 73BEAEF0 20885 b35a8a 73BEAEF0 20884->20885 20886 b35a3e 73BEAEF0 73BEAEF0 73BEAEF0 20884->20886 20885->20883 20886->20883 20888 b12ad4 73BEAC50 73BEAD70 20887->20888 20888->20883 20888->20884 18716 b348cc 18717 b348e7 18716->18717 18718 b34963 18717->18718 18719 b348eb 18717->18719 18737 b2bc2c 18718->18737 18721 b33dc4 RtlEnterCriticalSection 18719->18721 18723 b348f3 18721->18723 18722 b3496e 18724 b33dc4 RtlEnterCriticalSection 18723->18724 18725 b3490b 18724->18725 18730 b337bc 18725->18730 18728 b33dd4 RtlLeaveCriticalSection 18729 b3493e 18728->18729 18742 b33598 RtlEnterCriticalSection 18730->18742 18732 b337d2 18733 b33802 18732->18733 18736 b33694 2 API calls 18732->18736 18743 b335a4 RtlLeaveCriticalSection 18733->18743 18735 b33817 18735->18728 18736->18733 18738 b2bc30 18737->18738 18739 b2bc36 18737->18739 18738->18722 18744 b2bc40 18739->18744 18742->18732 18743->18735 18745 b2bc83 18744->18745 18746 b2bc66 18744->18746 18747 b142c0 11 API calls 18745->18747 18748 b1c2bc 56 API calls 18746->18748 18747->18746 18749 b2bcdb 18748->18749 18750 b14228 11 API calls 18749->18750 18751 b2bc3d 18750->18751 18751->18722 15381 b18930 15382 b1893d 15381->15382 15383 b18955 CompareStringA 15382->15383 18752 b17630 18756 b12b24 18752->18756 18754 b17643 CreateWindowExA 18755 b1767b 18754->18755 18756->18754 18768 b2f230 18769 b2f292 18768->18769 18770 b2f243 18768->18770 18771 b2f2a0 90 API calls 18769->18771 18779 b2f2a0 18770->18779 18772 b2f29c 18771->18772 18776 b2f275 18806 b2e934 18776->18806 18778 b2f28a 18780 b2f2b0 18779->18780 18782 b2f2c6 18780->18782 18810 b2f7a8 18780->18810 18824 b2e6d8 18780->18824 18827 b2f644 18782->18827 18785 b2e6d8 56 API calls 18786 b2f2ce 18785->18786 18786->18785 18787 b2f33a 18786->18787 18830 b2eff4 18786->18830 18789 b2f644 56 API calls 18787->18789 18790 b2f26d 18789->18790 18791 b2e7f0 18790->18791 18792 b2e8e9 18791->18792 18803 b2e81d 18791->18803 18793 b14228 11 API calls 18792->18793 18796 b2e8fe 18793->18796 18794 b2e8cc 18795 b2e934 56 API calls 18794->18795 18797 b2e8e1 18795->18797 18796->18776 18797->18776 18798 b142c0 11 API calls 18798->18803 18799 b2e0e0 56 API calls 18799->18803 18800 b2b65c 56 API calls 18800->18803 18803->18794 18803->18798 18803->18799 18803->18800 18804 b2b96c 58 API calls 18803->18804 19385 b2e774 18803->19385 19393 b2e004 18803->19393 19399 b2b750 18803->19399 18804->18803 18807 b2e940 18806->18807 18808 b2e95e 18806->18808 18807->18808 18809 b2b65c 56 API calls 18807->18809 18808->18778 18809->18807 18811 b302a0 56 API calls 18810->18811 18812 b2f7e3 18811->18812 18813 b14748 25 API calls 18812->18813 18814 b2f8a2 18812->18814 18850 b2ea2c 18812->18850 18855 b2f78c 18812->18855 18813->18812 18815 b2f8cc 18814->18815 18816 b2f8bd 18814->18816 18819 b2ea2c 56 API calls 18815->18819 18821 b2f8ca 18815->18821 18860 b2fb2c 18816->18860 18819->18821 18822 b14228 11 API calls 18821->18822 18823 b2f977 18822->18823 18823->18780 18825 b3047c 56 API calls 18824->18825 18826 b2e6e2 18825->18826 18826->18780 18828 b2e5a4 56 API calls 18827->18828 18829 b2f64b 18828->18829 18829->18786 18831 b2f02a 18830->18831 18832 b302a0 56 API calls 18831->18832 18833 b2f035 18832->18833 18834 b302a0 56 API calls 18833->18834 18835 b2f040 18834->18835 18836 b2f078 18835->18836 18837 b2f072 18835->18837 18838 b2f07b 18835->18838 18849 b2f0e0 18836->18849 19351 b2ec40 18836->19351 19345 b2ef50 18837->19345 19348 b2eda0 18838->19348 18842 b2f0a3 18844 b2f0c7 18842->18844 19356 b2eeb0 18842->19356 18845 b1424c 11 API calls 18844->18845 18844->18849 18846 b2f206 18845->18846 18847 b15924 13 API calls 18846->18847 18848 b2f214 18847->18848 18848->18786 18849->18786 18925 b3058c 18850->18925 18854 b2ea3b 18854->18812 18856 b3058c 56 API calls 18855->18856 18857 b2f79a 18856->18857 18858 b2e500 56 API calls 18857->18858 18859 b2f7a4 18858->18859 18859->18812 18861 b2fb35 18860->18861 18861->18861 18862 b2fba1 18861->18862 18863 b2e500 56 API calls 18861->18863 18865 b2fdd0 18862->18865 18866 b2fdf0 18862->18866 18867 b2fdd9 18862->18867 18868 b2fcfe 18862->18868 18869 b2fce2 18862->18869 18870 b2fc00 18862->18870 18871 b2fc60 18862->18871 18872 b2fca6 18862->18872 18873 b2fc87 18862->18873 18874 b2fc44 18862->18874 18875 b2fcc4 18862->18875 18876 b2fd6c 18862->18876 18917 b2fc25 18862->18917 18863->18862 18864 b1424c 11 API calls 18888 b2fe11 18864->18888 19148 b2fa10 18865->19148 19165 b2fa6c 18866->19165 19155 b2f5f8 18867->19155 18880 b2ea1c 56 API calls 18868->18880 19120 b301c0 18869->19120 18889 b2ea1c 56 API calls 18870->18889 18882 b2f48c 56 API calls 18871->18882 19068 b302dc 18872->19068 19060 b2f370 18873->19060 19053 b2eadc 18874->19053 19090 b30398 18875->19090 18878 b2ea1c 56 API calls 18876->18878 18891 b2fd74 18878->18891 18892 b2fd06 18880->18892 18893 b2fc6b 18882->18893 18895 b14934 SysFreeString 18888->18895 18896 b2fc08 18889->18896 18900 b2fd92 18891->18900 18901 b2fd78 18891->18901 18902 b2fd10 18892->18902 18903 b2fd0a 18892->18903 18904 b27c54 56 API calls 18893->18904 18906 b2fe19 18895->18906 18897 b2fc2a 18896->18897 18898 b2fc0c 18896->18898 19039 b2f58c 18897->19039 19012 b2f48c 18898->19012 18899 b28484 29 API calls 18899->18917 18911 b2f48c 56 API calls 18900->18911 18909 b3047c 56 API calls 18901->18909 18914 b3047c 56 API calls 18902->18914 18912 b2fd2a 18903->18912 18913 b2fd0e 18903->18913 18904->18917 18905 b28370 29 API calls 18905->18917 18907 b1424c 11 API calls 18906->18907 18915 b2fe26 18907->18915 18909->18917 18911->18917 18918 b3047c 56 API calls 18912->18918 18921 b2f48c 56 API calls 18913->18921 18914->18917 18915->18821 18917->18864 18920 b2fd32 18918->18920 19130 b2eb34 18920->19130 18922 b2fd58 18921->18922 19145 b2f9d0 18922->19145 18966 b3047c 18925->18966 18928 b30670 18957 b302a0 56 API calls 18928->18957 18929 b3063a 18951 b30984 56 API calls 18929->18951 18930 b306f9 18956 b30500 56 API calls 18930->18956 18931 b30698 18961 b30500 56 API calls 18931->18961 18932 b3065e 18955 b30984 56 API calls 18932->18955 18933 b306be 18948 b30984 56 API calls 18933->18948 18934 b3061c 18969 b304d8 18934->18969 18935 b306dc 18952 b30500 56 API calls 18935->18952 18936 b30680 18980 b30500 18936->18980 18937 b306a6 18991 b30530 18937->18991 18938 b306ea 18954 b30984 56 API calls 18938->18954 18939 b30628 18976 b30984 18939->18976 18940 b306af 18946 b30984 56 API calls 18940->18946 18941 b3068e 18985 b30490 18941->18985 18942 b306cd 18950 b30984 56 API calls 18942->18950 18943 b3064c 18953 b30984 56 API calls 18943->18953 18944 b14228 11 API calls 18958 b2ea34 18944->18958 18962 b30622 18946->18962 18948->18962 18950->18962 18951->18962 18952->18962 18953->18962 18954->18962 18955->18962 18956->18962 18957->18962 18963 b2e524 18958->18963 18961->18962 18962->18944 18964 b1c2bc 56 API calls 18963->18964 18965 b2e547 18964->18965 18965->18854 18967 b2ea40 56 API calls 18966->18967 18968 b30489 18967->18968 18968->18928 18968->18929 18968->18930 18968->18931 18968->18932 18968->18933 18968->18934 18968->18935 18968->18936 18968->18937 18968->18938 18968->18939 18968->18940 18968->18941 18968->18942 18968->18943 18968->18962 18970 b304e4 18969->18970 18971 b2e6d8 56 API calls 18970->18971 18972 b304f6 18970->18972 18974 b3058c 56 API calls 18970->18974 18971->18970 18973 b2f644 56 API calls 18972->18973 18975 b304fd 18973->18975 18974->18970 18975->18962 18977 b309c3 18976->18977 18978 b30994 18976->18978 18977->18962 18978->18977 18979 b2ea40 56 API calls 18978->18979 18979->18978 18981 b2ea40 56 API calls 18980->18981 18982 b3051a 18981->18982 18983 b30984 56 API calls 18982->18983 18984 b3052b 18983->18984 18984->18962 18986 b304a6 18985->18986 18987 b302a0 56 API calls 18986->18987 18988 b304b6 18986->18988 18987->18986 18989 b14228 11 API calls 18988->18989 18990 b304cb 18989->18990 18990->18962 18998 b3053c 18991->18998 18992 b30582 18993 b2f644 56 API calls 18992->18993 18995 b30589 18993->18995 18995->18962 18996 b3058c 56 API calls 18996->18998 18997 b30984 56 API calls 18997->18998 18998->18992 18998->18996 18998->18997 18999 b2e6d8 56 API calls 18998->18999 19001 b2f644 56 API calls 18998->19001 19002 b2ea1c 18998->19002 19005 b30728 18998->19005 18999->18998 19001->18998 19003 b3047c 56 API calls 19002->19003 19004 b2ea26 19003->19004 19004->18998 19006 b302a0 56 API calls 19005->19006 19007 b30748 19006->19007 19008 b3058c 56 API calls 19007->19008 19009 b3074f 19008->19009 19010 b14228 11 API calls 19009->19010 19011 b30764 19010->19011 19011->18998 19013 b3047c 56 API calls 19012->19013 19014 b2f49a 19013->19014 19015 b2f544 19014->19015 19016 b2f536 19014->19016 19017 b2f51a 19014->19017 19018 b2f528 19014->19018 19019 b2f4d9 19014->19019 19020 b2f50c 19014->19020 19177 b2e518 19015->19177 19025 b1427c 25 API calls 19016->19025 19022 b1427c 25 API calls 19017->19022 19023 b1427c 25 API calls 19018->19023 19024 b2ea40 56 API calls 19019->19024 19027 b1427c 25 API calls 19020->19027 19026 b2f50a 19022->19026 19023->19026 19028 b2f4e7 19024->19028 19025->19026 19034 b2f988 19026->19034 19027->19026 19029 b14318 25 API calls 19028->19029 19030 b2f4f5 19029->19030 19031 b14740 25 API calls 19030->19031 19032 b2f4fc 19031->19032 19033 b2ea40 56 API calls 19032->19033 19033->19026 19180 b2b050 19034->19180 19036 b2f9a1 19037 b2e518 56 API calls 19036->19037 19038 b2f9b2 19036->19038 19037->19038 19038->18917 19040 b3047c 56 API calls 19039->19040 19041 b2f599 19040->19041 19042 b2f5a7 19041->19042 19043 b2f59d 19041->19043 19046 b2ea40 56 API calls 19042->19046 19044 b2f5c1 19043->19044 19045 b2f5a1 19043->19045 19049 b2ea40 56 API calls 19044->19049 19047 b2f5a5 19045->19047 19048 b2f5db 19045->19048 19051 b2f5b7 19046->19051 19052 b2e518 56 API calls 19047->19052 19050 b2ea40 56 API calls 19048->19050 19049->19051 19050->19051 19051->18917 19052->19051 19054 b302dc 62 API calls 19053->19054 19055 b2eafc 19054->19055 19056 b2eb0c 19055->19056 19057 b2e518 56 API calls 19055->19057 19058 b14228 11 API calls 19056->19058 19057->19056 19059 b2eb26 19058->19059 19059->18917 19061 b3047c 56 API calls 19060->19061 19062 b2f37d 19061->19062 19063 b2f391 19062->19063 19064 b2f381 19062->19064 19066 b2f5f8 56 API calls 19063->19066 19065 b2ea40 56 API calls 19064->19065 19067 b2f38f 19065->19067 19066->19067 19067->18917 19069 b2ea1c 56 API calls 19068->19069 19070 b30302 19069->19070 19071 b3030a 19070->19071 19072 b30320 19070->19072 19073 b30398 62 API calls 19071->19073 19074 b3047c 56 API calls 19072->19074 19076 b30314 19073->19076 19075 b3032c 19074->19075 19077 b30330 19075->19077 19078 b30336 19075->19078 19082 b14934 SysFreeString 19076->19082 19079 b30347 19077->19079 19080 b30334 19077->19080 19081 b2ea40 56 API calls 19078->19081 19084 b2ea40 56 API calls 19079->19084 19086 b2e518 56 API calls 19080->19086 19083 b30345 19081->19083 19085 b2fcb1 19082->19085 19087 b14874 25 API calls 19083->19087 19084->19083 19085->18905 19086->19083 19088 b30367 19087->19088 19089 b2ea40 56 API calls 19088->19089 19089->19076 19091 b2ea1c 56 API calls 19090->19091 19092 b303bc 19091->19092 19093 b303c4 19092->19093 19094 b303da 19092->19094 19095 b302dc 62 API calls 19093->19095 19096 b3047c 56 API calls 19094->19096 19116 b303ce 19095->19116 19097 b303e6 19096->19097 19098 b303f0 19097->19098 19099 b303ea 19097->19099 19100 b2ea40 56 API calls 19098->19100 19101 b30419 19099->19101 19102 b303ee 19099->19102 19103 b303ff 19100->19103 19105 b2ea40 56 API calls 19101->19105 19106 b2e518 56 API calls 19102->19106 19107 b14d8c 2 API calls 19103->19107 19104 b14228 11 API calls 19108 b30466 19104->19108 19109 b30428 19105->19109 19106->19116 19110 b30409 19107->19110 19111 b14228 11 API calls 19108->19111 19112 b14874 25 API calls 19109->19112 19113 b2ea40 56 API calls 19110->19113 19114 b2fccf 19111->19114 19115 b30433 19112->19115 19113->19116 19114->18899 19117 b2ea40 56 API calls 19115->19117 19116->19104 19118 b30440 19117->19118 19190 b163bc 19118->19190 19121 b3047c 56 API calls 19120->19121 19122 b301f7 19121->19122 19123 b2e518 56 API calls 19122->19123 19125 b30200 19122->19125 19123->19125 19124 b302a0 56 API calls 19124->19125 19125->19124 19127 b30233 19125->19127 19204 b2e550 19125->19204 19128 b14228 11 API calls 19127->19128 19129 b30269 19128->19129 19129->18917 19131 b2eb47 19130->19131 19132 b2e6d8 56 API calls 19131->19132 19133 b2eb5c 19132->19133 19136 b2eb68 19133->19136 19209 b2bea8 19133->19209 19135 b2e6d8 56 API calls 19135->19136 19136->19135 19137 b2ebb7 19136->19137 19138 b2ea1c 56 API calls 19136->19138 19141 b2f58c 56 API calls 19136->19141 19143 b2f7a8 87 API calls 19136->19143 19144 b2f644 56 API calls 19136->19144 19214 b2f63c 19136->19214 19139 b2f644 56 API calls 19137->19139 19138->19136 19140 b2ebbe 19139->19140 19140->18917 19141->19136 19143->19136 19144->19136 19224 b2dfac 19145->19224 19147 b2f9f8 19147->18917 19230 b30b94 19148->19230 19151 b288bc 73 API calls 19152 b2fa49 19151->19152 19153 b1faa8 65 API calls 19152->19153 19154 b2fa5e 19153->19154 19154->18917 19156 b2ea1c 56 API calls 19155->19156 19157 b2f605 19156->19157 19158 b2f620 19157->19158 19159 b2f609 19157->19159 19161 b2f58c 56 API calls 19158->19161 19160 b3047c 56 API calls 19159->19160 19162 b2f610 19160->19162 19163 b2f61e 19161->19163 19164 b2ea40 56 API calls 19162->19164 19163->18917 19164->19163 19166 b2ea1c 56 API calls 19165->19166 19167 b2fa8c 19166->19167 19168 b2fa90 19167->19168 19169 b2fab9 19167->19169 19171 b3047c 56 API calls 19168->19171 19170 b2f48c 56 API calls 19169->19170 19172 b2fada 19170->19172 19174 b2fa9b 19171->19174 19173 b2dfac 25 API calls 19172->19173 19173->19174 19175 b14228 11 API calls 19174->19175 19176 b2fb15 19175->19176 19176->18917 19178 b2e500 56 API calls 19177->19178 19179 b2e522 19178->19179 19179->19026 19188 b2b9f4 RtlEnterCriticalSection 19180->19188 19182 b2b0a2 19189 b2ba58 RtlLeaveCriticalSection 19182->19189 19183 b2b65c 56 API calls 19185 b2b068 19183->19185 19185->19182 19185->19183 19187 b2b08f 19185->19187 19186 b2b0b9 19186->19036 19187->19036 19188->19185 19189->19186 19191 b14934 SysFreeString 19190->19191 19194 b163dc 19191->19194 19192 b1643d 19193 b14934 SysFreeString 19192->19193 19195 b16452 19193->19195 19194->19192 19196 b14d8c 2 API calls 19194->19196 19195->19116 19197 b163f1 19196->19197 19198 b1642b 19197->19198 19199 b1641e 19197->19199 19201 b14934 SysFreeString 19198->19201 19200 b14d8c 2 API calls 19199->19200 19202 b16429 19200->19202 19201->19202 19203 b14970 3 API calls 19202->19203 19203->19192 19205 b27c54 56 API calls 19204->19205 19206 b2e556 19205->19206 19207 b2e562 19206->19207 19208 b2e518 56 API calls 19206->19208 19207->19125 19208->19207 19210 b2bf09 19209->19210 19213 b2bebc 19209->19213 19210->19136 19211 b2beec 19211->19136 19212 b2b744 56 API calls 19212->19213 19213->19211 19213->19212 19217 b2e5a4 19214->19217 19218 b3047c 56 API calls 19217->19218 19219 b2e5b1 19218->19219 19220 b2e5c4 19219->19220 19221 b3058c 56 API calls 19219->19221 19220->19136 19222 b2e5bf 19221->19222 19223 b2e518 56 API calls 19222->19223 19223->19220 19225 b2dfb5 19224->19225 19226 b1427c 25 API calls 19225->19226 19227 b2dfdb 19226->19227 19228 b1427c 25 API calls 19227->19228 19229 b2dfe6 19228->19229 19229->19147 19231 b1fa94 65 API calls 19230->19231 19232 b30bbb 19231->19232 19233 b2ea1c 56 API calls 19232->19233 19234 b30bc3 19233->19234 19235 b30d51 19234->19235 19237 b30d12 19234->19237 19238 b30cd0 19234->19238 19239 b30c94 19234->19239 19240 b30cfb 19234->19240 19241 b30d3e 19234->19241 19242 b30c7c 19234->19242 19243 b30cbc 19234->19243 19244 b30c61 19234->19244 19245 b30c46 19234->19245 19246 b30ce4 19234->19246 19247 b30c2a 19234->19247 19248 b30d28 19234->19248 19249 b30ca8 19234->19249 19236 b1c280 56 API calls 19235->19236 19251 b30c41 19236->19251 19258 b3047c 56 API calls 19237->19258 19312 b2f448 19238->19312 19259 b2f370 56 API calls 19239->19259 19256 b30398 62 API calls 19240->19256 19262 b2f5f8 56 API calls 19241->19262 19257 b2f58c 56 API calls 19242->19257 19304 b2f3f8 19243->19304 19255 b2f58c 56 API calls 19244->19255 19253 b2f58c 56 API calls 19245->19253 19254 b302dc 62 API calls 19246->19254 19250 b3047c 56 API calls 19247->19250 19323 b309cc 19248->19323 19296 b2f3b4 19249->19296 19265 b30c32 19250->19265 19290 b1faa8 65 API calls 19251->19290 19267 b30c4e 19253->19267 19268 b30cef 19254->19268 19269 b30c69 19255->19269 19270 b30d06 19256->19270 19271 b30c84 19257->19271 19272 b30d1a 19258->19272 19273 b30c9c 19259->19273 19276 b30d46 19262->19276 19265->19251 19289 b27014 65 API calls 19265->19289 19279 b23e9c 65 API calls 19267->19279 19280 b240f0 65 API calls 19268->19280 19281 b23e9c 65 API calls 19269->19281 19282 b2416c 69 API calls 19270->19282 19283 b23e9c 65 API calls 19271->19283 19284 b2408c 65 API calls 19272->19284 19285 b240b4 65 API calls 19273->19285 19274 b30d31 19286 b1fdbc 73 API calls 19274->19286 19288 b23fb8 65 API calls 19276->19288 19277 b240dc 65 API calls 19277->19251 19279->19251 19280->19251 19281->19251 19282->19251 19283->19251 19284->19251 19285->19251 19286->19251 19287 b240b4 65 API calls 19287->19251 19288->19251 19289->19251 19291 b30d7d 19290->19291 19292 b14934 SysFreeString 19291->19292 19293 b30d85 19292->19293 19294 b14228 11 API calls 19293->19294 19295 b2fa35 19294->19295 19295->19151 19297 b3047c 56 API calls 19296->19297 19298 b2f3c1 19297->19298 19299 b2f3d5 19298->19299 19300 b2f3c5 19298->19300 19302 b2f5f8 56 API calls 19299->19302 19301 b2ea40 56 API calls 19300->19301 19303 b2f3d3 19301->19303 19302->19303 19303->19287 19305 b3047c 56 API calls 19304->19305 19306 b2f405 19305->19306 19307 b2f419 19306->19307 19308 b2f409 19306->19308 19310 b2f5f8 56 API calls 19307->19310 19309 b2ea40 56 API calls 19308->19309 19311 b2f417 19309->19311 19310->19311 19311->19277 19313 b3047c 56 API calls 19312->19313 19314 b2f455 19313->19314 19315 b2f469 19314->19315 19316 b2f459 19314->19316 19318 b2f5f8 56 API calls 19315->19318 19317 b2ea40 56 API calls 19316->19317 19319 b2f467 19317->19319 19318->19319 19320 b240c8 19319->19320 19321 b1fa94 65 API calls 19320->19321 19322 b240ce 19321->19322 19322->19251 19324 b2e5a4 56 API calls 19323->19324 19325 b309f8 19324->19325 19326 b2ea40 56 API calls 19325->19326 19327 b30a3c 19326->19327 19328 b2ea40 56 API calls 19327->19328 19329 b30a5e 19328->19329 19330 b2de60 25 API calls 19329->19330 19331 b30a72 19330->19331 19332 b302dc 62 API calls 19331->19332 19333 b30a8e 19332->19333 19334 b2ea40 56 API calls 19333->19334 19335 b30a9e 19334->19335 19336 b2ea40 56 API calls 19335->19336 19337 b30abd 19336->19337 19342 b26f2c RtlEnterCriticalSection 19337->19342 19339 b1c280 56 API calls 19341 b30af9 19339->19341 19340 b30ac8 19340->19339 19340->19341 19341->19274 19343 b26f77 19342->19343 19344 b26fcd RtlLeaveCriticalSection 19343->19344 19344->19340 19360 b30910 19345->19360 19347 b2ef75 19347->18836 19349 b30910 58 API calls 19348->19349 19350 b2edc5 19349->19350 19350->18836 19355 b2ec4f 19351->19355 19352 b2ecb2 19352->18842 19353 b317fc 56 API calls 19353->19355 19354 b15804 30 API calls 19354->19355 19355->19352 19355->19353 19355->19354 19358 b2eedc 19356->19358 19357 b2ef0a 19357->18844 19358->19357 19359 b2b1a8 56 API calls 19358->19359 19359->19357 19367 b2e970 19360->19367 19363 b2e970 58 API calls 19365 b30946 19363->19365 19364 b2acfc 56 API calls 19366 b3097a 19364->19366 19365->19364 19365->19366 19366->19347 19373 b2e985 19367->19373 19368 b2e9e2 19374 b2ac68 19368->19374 19369 b2e9ef 19371 b2ad68 58 API calls 19369->19371 19372 b2e9eb 19371->19372 19372->19363 19372->19365 19373->19368 19373->19369 19373->19372 19383 b2a9f8 RtlEnterCriticalSection 19374->19383 19376 b2acc7 19384 b2aab0 RtlLeaveCriticalSection 19376->19384 19378 b2b65c 56 API calls 19381 b2ac85 19378->19381 19379 b2acde 19379->19372 19380 b2a4d4 56 API calls 19380->19381 19381->19376 19381->19378 19381->19380 19382 b2acbc 19381->19382 19382->19372 19383->19381 19384->19379 19403 b2b9f4 RtlEnterCriticalSection 19385->19403 19387 b2e7cc 19404 b2ba58 RtlLeaveCriticalSection 19387->19404 19389 b2b65c 56 API calls 19391 b2e786 19389->19391 19390 b2e7e3 19390->18803 19391->19387 19391->19389 19392 b2b54c 56 API calls 19391->19392 19392->19391 19394 b2e013 19393->19394 19395 b14318 25 API calls 19394->19395 19398 b2e044 19394->19398 19396 b2e034 19395->19396 19405 b14788 19396->19405 19398->18803 19400 b2b75d 19399->19400 19401 b2b5e8 56 API calls 19400->19401 19402 b2b771 19400->19402 19401->19402 19402->18803 19403->19391 19404->19390 19410 b14738 19405->19410 19407 b147cc 19407->19398 19408 b14796 19408->19407 19409 b14874 25 API calls 19408->19409 19409->19407 19411 b146f4 19410->19411 19412 b142ec 25 API calls 19411->19412 19414 b1472f 19411->19414 19413 b1470b 19412->19413 19413->19414 19415 b128ec 11 API calls 19413->19415 19414->19408 19415->19414 20921 b2af38 20928 b2a9f8 RtlEnterCriticalSection 20921->20928 20923 b2af49 20929 b2a6fc 20923->20929 20927 b2af85 20928->20923 20930 b2a73f 20929->20930 20932 b2a70e 20929->20932 20934 b2aab0 RtlLeaveCriticalSection 20930->20934 20931 b2b65c 56 API calls 20931->20932 20932->20930 20932->20931 20933 b2a534 56 API calls 20932->20933 20933->20932 20934->20927 15421 b14a28 15422 b14a30 SysAllocStringLen 15421->15422 15423 b14934 15421->15423 15426 b14a40 SysFreeString 15422->15426 15427 b14904 15422->15427 15424 b14948 15423->15424 15425 b1493a SysFreeString 15423->15425 15425->15424 15428 b14920 15427->15428 15429 b14910 SysAllocStringLen 15427->15429 15429->15427 15429->15428 19714 b3242c 19715 b32445 19714->19715 19727 b324ae 19714->19727 19728 b2ae4c 19715->19728 19721 b32467 19722 b167a4 4 API calls 19721->19722 19723 b32476 19722->19723 19752 b15e6c 19723->19752 19725 b3249f 19755 b31024 RtlDeleteCriticalSection CloseHandle 19725->19755 19756 b2a9f8 RtlEnterCriticalSection 19728->19756 19730 b2ae5c 19757 b2aabc 19730->19757 19734 b2ae8d 19735 b321f8 19734->19735 19780 b2b9f4 RtlEnterCriticalSection 19735->19780 19737 b32235 19781 b2ba58 RtlLeaveCriticalSection 19737->19781 19739 b3224c 19742 b2e3d0 19739->19742 19740 b2b65c 56 API calls 19741 b32208 19740->19741 19741->19737 19741->19740 19743 b2e472 19742->19743 19744 b2e3ec 19742->19744 19743->19721 19782 b2b9f4 RtlEnterCriticalSection 19744->19782 19746 b2e453 19783 b2ba58 RtlLeaveCriticalSection 19746->19783 19748 b2b65c 56 API calls 19750 b2e3f6 19748->19750 19749 b2e46a 19749->19721 19750->19746 19750->19748 19751 b2b54c 56 API calls 19750->19751 19751->19750 19784 b15e94 19752->19784 19754 b15e71 19754->19725 19755->19727 19756->19730 19758 b2ab05 19757->19758 19761 b2aad0 19757->19761 19763 b2aab0 RtlLeaveCriticalSection 19758->19763 19759 b2b65c 56 API calls 19759->19761 19761->19758 19761->19759 19762 b2b54c 56 API calls 19761->19762 19764 b2a658 19761->19764 19762->19761 19763->19734 19770 b2a66b 19764->19770 19771 b2a690 19764->19771 19765 b2b65c 56 API calls 19765->19770 19766 b2b65c 56 API calls 19766->19771 19768 b2a638 VirtualQuery 19768->19771 19769 b2a6f6 19769->19761 19770->19765 19770->19771 19772 b2b54c 56 API calls 19770->19772 19776 b2a638 19770->19776 19771->19766 19771->19768 19773 b2b54c 56 API calls 19771->19773 19775 b2a6c1 19771->19775 19772->19770 19773->19771 19774 b2a638 VirtualQuery 19774->19775 19775->19769 19775->19774 19777 b2a649 19776->19777 19778 b2a642 19776->19778 19777->19770 19779 b15988 VirtualQuery 19778->19779 19779->19777 19780->19741 19781->19739 19782->19750 19783->19749 19785 b15ea0 19784->19785 19786 b15ec2 19784->19786 19785->19786 19787 b15ea7 19785->19787 19790 b128ec 11 API calls 19786->19790 19791 b15ee7 19786->19791 19788 b128ec 11 API calls 19787->19788 19789 b15ebf 19788->19789 19789->19754 19790->19791 19791->19754 15384 b15d00 lstrcpyn GetThreadLocale GetLocaleInfoA 15385 b15d37 15384->15385 15386 b15e1a 15384->15386 15385->15386 15387 b15d47 lstrlen 15385->15387 15388 b15d5f 15387->15388 15388->15386 15389 b15d84 lstrcpyn LoadLibraryExA 15388->15389 15390 b15dac 15388->15390 15389->15390 15390->15386 15391 b15db6 lstrcpyn LoadLibraryExA 15390->15391 15391->15386 15392 b15de8 lstrcpyn LoadLibraryExA 15391->15392 15392->15386 15393 b14970 15394 b14934 15393->15394 15395 b14978 15393->15395 15397 b14948 15394->15397 15398 b1493a SysFreeString 15394->15398 15395->15394 15396 b14983 SysReAllocStringLen 15395->15396 15399 b14993 15396->15399 15400 b14904 15396->15400 15398->15397 15401 b14920 15400->15401 15402 b14910 SysAllocStringLen 15400->15402 15402->15400 15402->15401 15430 b3e278 15431 b3e281 15430->15431 15437 b5ccec 15431->15437 15436 b3e2b7 15438 b5ccfd 15437->15438 15458 b59974 15438->15458 15440 b5cd21 15441 b32294 VirtualAlloc 15440->15441 15442 b5cd2c 15441->15442 15464 b34864 15442->15464 15444 b5cd3e 15468 b34a0c 15444->15468 15447 b5cd80 15472 b4a79c 15447->15472 15448 b5cd73 15449 b14228 11 API calls 15448->15449 15451 b5cd7e 15449->15451 15454 b14228 11 API calls 15451->15454 15453 b1427c 25 API calls 15453->15451 15455 b3e297 GetSystemMetrics 15454->15455 15456 b5a030 15455->15456 15457 b3e2a7 GetSystemMetrics 15456->15457 15457->15436 15459 b5997e 15458->15459 15477 b31204 15459->15477 15461 b59994 15481 b3406c 15461->15481 15463 b599b3 15463->15440 15465 b3486a 15464->15465 15466 b335b0 27 API calls 15465->15466 15467 b34885 15466->15467 15467->15444 15469 b34a1e 15468->15469 15510 b34990 15469->15510 15543 b4a59c 15472->15543 15474 b4a7a9 15475 b1427c 25 API calls 15474->15475 15476 b4a7b3 15475->15476 15476->15453 15478 b3120b 15477->15478 15479 b3122e 15478->15479 15485 b313bc 15478->15485 15479->15461 15482 b34072 15481->15482 15500 b335b0 15482->15500 15484 b34094 15484->15463 15486 b313d0 15485->15486 15488 b31402 15486->15488 15489 b3188c 15486->15489 15488->15479 15490 b3189c 15489->15490 15491 b318d5 15490->15491 15493 b3188c 56 API calls 15490->15493 15494 b317fc 15490->15494 15491->15488 15493->15490 15495 b3181a 15494->15495 15496 b31808 15494->15496 15498 b2b65c 56 API calls 15495->15498 15497 b2b5e8 56 API calls 15496->15497 15497->15495 15499 b31824 15498->15499 15499->15490 15501 b335cb 15500->15501 15508 b33598 RtlEnterCriticalSection 15501->15508 15503 b335d5 15504 b128cc 25 API calls 15503->15504 15507 b33632 15503->15507 15504->15507 15506 b33683 15506->15484 15509 b335a4 RtlLeaveCriticalSection 15507->15509 15508->15503 15509->15506 15517 b33dc4 15510->15517 15518 b33dd1 15517->15518 15519 b33dcb RtlEnterCriticalSection 15517->15519 15520 b33744 15518->15520 15519->15518 15532 b33598 RtlEnterCriticalSection 15520->15532 15522 b3375d 15523 b335b0 27 API calls 15522->15523 15524 b33779 15523->15524 15533 b33694 15524->15533 15526 b33797 15540 b335a4 RtlLeaveCriticalSection 15526->15540 15528 b337ac 15529 b33dd4 15528->15529 15530 b33de1 15529->15530 15531 b33ddb RtlLeaveCriticalSection 15529->15531 15530->15447 15530->15448 15531->15530 15532->15522 15534 b33740 15533->15534 15535 b336aa 15533->15535 15534->15526 15541 b33598 RtlEnterCriticalSection 15535->15541 15538 b336b8 15542 b335a4 RtlLeaveCriticalSection 15538->15542 15539 b3371a 15539->15526 15540->15528 15541->15538 15542->15539 15544 b4a5cc 15543->15544 15545 b4a717 15543->15545 15548 b14228 11 API calls 15544->15548 15546 b14228 11 API calls 15545->15546 15547 b4a746 15546->15547 15547->15474 15549 b4a5e9 GetKeyboardLayoutList 15548->15549 15549->15545 15550 b4a600 15549->15550 15550->15545 15556 b197d0 15550->15556 15553 b4a667 RegQueryValueExA 15554 b4a6ec RegCloseKey 15553->15554 15555 b4a69d 15553->15555 15554->15474 15555->15554 15557 b197ff RegOpenKeyExA 15556->15557 15558 b197e0 15556->15558 15557->15550 15557->15553 15558->15557 15559 b19458 56 API calls 15558->15559 15559->15557 15403 b32350 GetClassInfoA 15404 b32380 15403->15404 15405 b323a9 15404->15405 15406 b3239f RegisterClassA 15404->15406 15407 b3238e UnregisterClassA 15404->15407 15413 b175d8 15405->15413 15406->15405 15407->15406 15409 b323d7 15410 b323f4 15409->15410 15417 b32294 15409->15417 15412 b323eb SetWindowLongA 15412->15410 15420 b12b24 15413->15420 15415 b175eb CreateWindowExA 15416 b17625 15415->15416 15416->15409 15418 b322a4 VirtualAlloc 15417->15418 15419 b322d2 15417->15419 15418->15419 15419->15412 15420->15415

                                      Control-flow Graph

                                      C-Code - Quality: 66%
                                      			E00B15BF4(intOrPtr __eax) {
                                      				intOrPtr _v8;
                                      				void* _v12;
                                      				char _v15;
                                      				char _v17;
                                      				char _v18;
                                      				char _v22;
                                      				int _v28;
                                      				char _v289;
                                      				long _t44;
                                      				long _t61;
                                      				long _t63;
                                      				CHAR* _t70;
                                      				CHAR* _t72;
                                      				struct HINSTANCE__* _t78;
                                      				struct HINSTANCE__* _t84;
                                      				char* _t94;
                                      				void* _t95;
                                      				intOrPtr _t99;
                                      				struct HINSTANCE__* _t107;
                                      				void* _t110;
                                      				void* _t112;
                                      				intOrPtr _t113;
                                      
                                      				_t110 = _t112;
                                      				_t113 = _t112 + 0xfffffee0;
                                      				_v8 = __eax;
                                      				GetModuleFileNameA(0,  &_v289, 0x105);
                                      				_v22 = 0;
                                      				_t44 = RegOpenKeyExA(0x80000001, "Software\\Borland\\Locales", 0, 0xf0019,  &_v12); // executed
                                      				if(_t44 == 0) {
                                      					L3:
                                      					_push(_t110);
                                      					_push(0xb15cf9);
                                      					_push( *[fs:eax]);
                                      					 *[fs:eax] = _t113;
                                      					_v28 = 5;
                                      					E00B15A3C( &_v289, 0x105);
                                      					if(RegQueryValueExA(_v12,  &_v289, 0, 0,  &_v22,  &_v28) != 0 && RegQueryValueExA(_v12, E00B15E60, 0, 0,  &_v22,  &_v28) != 0) {
                                      						_v22 = 0;
                                      					}
                                      					_v18 = 0;
                                      					_pop(_t99);
                                      					 *[fs:eax] = _t99;
                                      					_push(E00B15D00);
                                      					return RegCloseKey(_v12);
                                      				} else {
                                      					_t61 = RegOpenKeyExA(0x80000002, "Software\\Borland\\Locales", 0, 0xf0019,  &_v12); // executed
                                      					if(_t61 == 0) {
                                      						goto L3;
                                      					} else {
                                      						_t63 = RegOpenKeyExA(0x80000001, "Software\\Borland\\Delphi\\Locales", 0, 0xf0019,  &_v12); // executed
                                      						if(_t63 != 0) {
                                      							_push(0x105);
                                      							_push(_v8);
                                      							_push( &_v289);
                                      							L00B114A4();
                                      							GetLocaleInfoA(GetThreadLocale(), 3,  &_v17, 5); // executed
                                      							_t107 = 0;
                                      							if(_v289 != 0 && (_v17 != 0 || _v22 != 0)) {
                                      								_t70 =  &_v289;
                                      								_push(_t70);
                                      								L00B114AC();
                                      								_t94 = _t70 +  &_v289;
                                      								L12:
                                      								if( *_t94 != 0x2e && _t94 !=  &_v289) {
                                      									_t94 = _t94 - 1;
                                      									goto L12;
                                      								}
                                      								_t72 =  &_v289;
                                      								if(_t94 != _t72) {
                                      									_t95 = _t94 + 1;
                                      									if(_v22 != 0) {
                                      										_push(0x105 - _t95 - _t72);
                                      										_push( &_v22);
                                      										_push(_t95);
                                      										L00B114A4();
                                      										_t107 = LoadLibraryExA( &_v289, 0, 2);
                                      									}
                                      									if(_t107 == 0 && _v17 != 0) {
                                      										_push(0x105 - _t95 -  &_v289);
                                      										_push( &_v17);
                                      										_push(_t95);
                                      										L00B114A4();
                                      										_t78 = LoadLibraryExA( &_v289, 0, 2); // executed
                                      										_t107 = _t78;
                                      										if(_t107 == 0) {
                                      											_v15 = 0;
                                      											_push(0x105 - _t95 -  &_v289);
                                      											_push( &_v17);
                                      											_push(_t95);
                                      											L00B114A4();
                                      											_t84 = LoadLibraryExA( &_v289, 0, 2); // executed
                                      											_t107 = _t84;
                                      										}
                                      									}
                                      								}
                                      							}
                                      							return _t107;
                                      						} else {
                                      							goto L3;
                                      						}
                                      					}
                                      				}
                                      			}

























                                      0x00b15bf5
                                      0x00b15bf7
                                      0x00b15bff
                                      0x00b15c10
                                      0x00b15c15
                                      0x00b15c2e
                                      0x00b15c35
                                      0x00b15c77
                                      0x00b15c79
                                      0x00b15c7a
                                      0x00b15c7f
                                      0x00b15c82
                                      0x00b15c85
                                      0x00b15c97
                                      0x00b15cba
                                      0x00b15cda
                                      0x00b15cda
                                      0x00b15cde
                                      0x00b15ce4
                                      0x00b15ce7
                                      0x00b15cea
                                      0x00b15cf8
                                      0x00b15c37
                                      0x00b15c4c
                                      0x00b15c53
                                      0x00000000
                                      0x00b15c55
                                      0x00b15c6a
                                      0x00b15c71
                                      0x00b15d00
                                      0x00b15d08
                                      0x00b15d0f
                                      0x00b15d10
                                      0x00b15d23
                                      0x00b15d28
                                      0x00b15d31
                                      0x00b15d47
                                      0x00b15d4d
                                      0x00b15d4e
                                      0x00b15d5b
                                      0x00b15d60
                                      0x00b15d63
                                      0x00b15d5f
                                      0x00000000
                                      0x00b15d5f
                                      0x00b15d6f
                                      0x00b15d77
                                      0x00b15d7d
                                      0x00b15d82
                                      0x00b15d8f
                                      0x00b15d93
                                      0x00b15d94
                                      0x00b15d95
                                      0x00b15daa
                                      0x00b15daa
                                      0x00b15dae
                                      0x00b15dc7
                                      0x00b15dcb
                                      0x00b15dcc
                                      0x00b15dcd
                                      0x00b15ddd
                                      0x00b15de2
                                      0x00b15de6
                                      0x00b15de8
                                      0x00b15dfd
                                      0x00b15e01
                                      0x00b15e02
                                      0x00b15e03
                                      0x00b15e13
                                      0x00b15e18
                                      0x00b15e18
                                      0x00b15de6
                                      0x00b15dae
                                      0x00b15d77
                                      0x00b15e21
                                      0x00000000
                                      0x00000000
                                      0x00000000
                                      0x00b15c71
                                      0x00b15c53

                                      APIs
                                      • GetModuleFileNameA.KERNEL32(00000000,?,00000105,108B00BD,00BDC0A4), ref: 00B15C10
                                      • RegOpenKeyExA.ADVAPI32(80000001,Software\Borland\Locales,00000000,000F0019,?,00000000,?,00000105,108B00BD,00BDC0A4), ref: 00B15C2E
                                      • RegOpenKeyExA.ADVAPI32(80000002,Software\Borland\Locales,00000000,000F0019,?,80000001,Software\Borland\Locales,00000000,000F0019,?,00000000,?,00000105,108B00BD,00BDC0A4), ref: 00B15C4C
                                      • RegOpenKeyExA.ADVAPI32(80000001,Software\Borland\Delphi\Locales,00000000,000F0019,?,80000002,Software\Borland\Locales,00000000,000F0019,?,80000001,Software\Borland\Locales,00000000,000F0019,?,00000000), ref: 00B15C6A
                                      • RegQueryValueExA.ADVAPI32(?,?,00000000,00000000,?,?,00000000,00B15CF9,?,80000001,Software\Borland\Locales,00000000,000F0019,?,00000000,?), ref: 00B15CB3
                                      • RegQueryValueExA.ADVAPI32(?,00B15E60,00000000,00000000,?,?,?,?,00000000,00000000,?,?,00000000,00B15CF9,?,80000001), ref: 00B15CD1
                                      • RegCloseKey.ADVAPI32(?,00B15D00,00000000,?,?,00000000,00B15CF9,?,80000001,Software\Borland\Locales,00000000,000F0019,?,00000000,?,00000105), ref: 00B15CF3
                                      • lstrcpyn.KERNEL32(?,?,00000105,80000001,Software\Borland\Delphi\Locales,00000000,000F0019,?,80000002,Software\Borland\Locales,00000000,000F0019,?,80000001,Software\Borland\Locales,00000000), ref: 00B15D10
                                      • GetThreadLocale.KERNEL32(00000003,?,00000005,?,?,00000105,80000001,Software\Borland\Delphi\Locales,00000000,000F0019,?,80000002,Software\Borland\Locales,00000000,000F0019,?), ref: 00B15D1D
                                      • GetLocaleInfoA.KERNEL32(00000000,00000003,?,00000005,?,?,00000105,80000001,Software\Borland\Delphi\Locales,00000000,000F0019,?,80000002,Software\Borland\Locales,00000000,000F0019), ref: 00B15D23
                                      • lstrlen.KERNEL32(?,00000000,00000003,?,00000005,?,?,00000105,80000001,Software\Borland\Delphi\Locales,00000000,000F0019,?,80000002,Software\Borland\Locales,00000000), ref: 00B15D4E
                                      • lstrcpyn.KERNEL32(00000001,?,00000105,?,00000000,00000003,?,00000005,?,?,00000105,80000001,Software\Borland\Delphi\Locales,00000000,000F0019,?), ref: 00B15D95
                                      • LoadLibraryExA.KERNEL32(?,00000000,00000002,00000001,?,00000105,?,00000000,00000003,?,00000005,?,?,00000105,80000001,Software\Borland\Delphi\Locales), ref: 00B15DA5
                                      • lstrcpyn.KERNEL32(00000001,?,00000105,?,00000000,00000003,?,00000005,?,?,00000105,80000001,Software\Borland\Delphi\Locales,00000000,000F0019,?), ref: 00B15DCD
                                      • LoadLibraryExA.KERNEL32(?,00000000,00000002,00000001,?,00000105,?,00000000,00000003,?,00000005,?,?,00000105,80000001,Software\Borland\Delphi\Locales), ref: 00B15DDD
                                      • lstrcpyn.KERNEL32(00000001,?,00000105,?,00000000,00000002,00000001,?,00000105,?,00000000,00000003,?,00000005,?,?), ref: 00B15E03
                                      • LoadLibraryExA.KERNEL32(?,00000000,00000002,00000001,?,00000105,?,00000000,00000002,00000001,?,00000105,?,00000000,00000003,?), ref: 00B15E13
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.289505180.0000000000B11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B10000, based on PE: true
                                      • Associated: 00000000.00000002.289475761.0000000000B10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.289928975.0000000000BDC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.289986188.0000000000BE3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_b10000_loaddll32.jbxd
                                      Similarity
                                      • API ID: lstrcpyn$LibraryLoadOpen$LocaleQueryValue$CloseFileInfoModuleNameThreadlstrlen
                                      • String ID: Software\Borland\Delphi\Locales$Software\Borland\Locales
                                      • API String ID: 1759228003-2375825460
                                      • Opcode ID: 9402693aa9f423147dec32eccb8c974cdaa2e286aca0a000552e85555d07fcd7
                                      • Instruction ID: 05d8e4d36b12ae8e04813db74a33e51310ff1ee49943e8b5f318fd2678766cc9
                                      • Opcode Fuzzy Hash: 9402693aa9f423147dec32eccb8c974cdaa2e286aca0a000552e85555d07fcd7
                                      • Instruction Fuzzy Hash: A8512371E4061DBAEB21DAA8DC46FEF76ECDB44744F8444E1B704E6182D6B49A848FA0
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      Control-flow Graph

                                      • Executed
                                      • Not Executed
                                      control_flow_graph 24 b15d00-b15d31 lstrcpyn GetThreadLocale GetLocaleInfoA 25 b15d37-b15d3b 24->25 26 b15e1a-b15e21 24->26 27 b15d47-b15d5d lstrlen 25->27 28 b15d3d-b15d41 25->28 29 b15d60-b15d63 27->29 28->26 28->27 30 b15d65-b15d6d 29->30 31 b15d6f-b15d77 29->31 30->31 32 b15d5f 30->32 31->26 33 b15d7d-b15d82 31->33 32->29 34 b15d84-b15daa lstrcpyn LoadLibraryExA 33->34 35 b15dac-b15dae 33->35 34->35 35->26 36 b15db0-b15db4 35->36 36->26 37 b15db6-b15de6 lstrcpyn LoadLibraryExA 36->37 37->26 38 b15de8-b15e18 lstrcpyn LoadLibraryExA 37->38 38->26
                                      C-Code - Quality: 61%
                                      			E00B15D00() {
                                      				void* _t28;
                                      				void* _t30;
                                      				struct HINSTANCE__* _t36;
                                      				struct HINSTANCE__* _t42;
                                      				char* _t51;
                                      				void* _t52;
                                      				struct HINSTANCE__* _t59;
                                      				void* _t61;
                                      
                                      				_push(0x105);
                                      				_push( *((intOrPtr*)(_t61 - 4)));
                                      				_push(_t61 - 0x11d);
                                      				L00B114A4();
                                      				GetLocaleInfoA(GetThreadLocale(), 3, _t61 - 0xd, 5); // executed
                                      				_t59 = 0;
                                      				if( *(_t61 - 0x11d) == 0 ||  *(_t61 - 0xd) == 0 &&  *((char*)(_t61 - 0x12)) == 0) {
                                      					L14:
                                      					return _t59;
                                      				} else {
                                      					_t28 = _t61 - 0x11d;
                                      					_push(_t28);
                                      					L00B114AC();
                                      					_t51 = _t28 + _t61 - 0x11d;
                                      					L5:
                                      					if( *_t51 != 0x2e && _t51 != _t61 - 0x11d) {
                                      						_t51 = _t51 - 1;
                                      						goto L5;
                                      					}
                                      					_t30 = _t61 - 0x11d;
                                      					if(_t51 != _t30) {
                                      						_t52 = _t51 + 1;
                                      						if( *((char*)(_t61 - 0x12)) != 0) {
                                      							_push(0x105 - _t52 - _t30);
                                      							_push(_t61 - 0x12);
                                      							_push(_t52);
                                      							L00B114A4();
                                      							_t59 = LoadLibraryExA(_t61 - 0x11d, 0, 2);
                                      						}
                                      						if(_t59 == 0 &&  *(_t61 - 0xd) != 0) {
                                      							_push(0x105 - _t52 - _t61 - 0x11d);
                                      							_push(_t61 - 0xd);
                                      							_push(_t52);
                                      							L00B114A4();
                                      							_t36 = LoadLibraryExA(_t61 - 0x11d, 0, 2); // executed
                                      							_t59 = _t36;
                                      							if(_t59 == 0) {
                                      								 *((char*)(_t61 - 0xb)) = 0;
                                      								_push(0x105 - _t52 - _t61 - 0x11d);
                                      								_push(_t61 - 0xd);
                                      								_push(_t52);
                                      								L00B114A4();
                                      								_t42 = LoadLibraryExA(_t61 - 0x11d, 0, 2); // executed
                                      								_t59 = _t42;
                                      							}
                                      						}
                                      					}
                                      					goto L14;
                                      				}
                                      			}











                                      0x00b15d00
                                      0x00b15d08
                                      0x00b15d0f
                                      0x00b15d10
                                      0x00b15d23
                                      0x00b15d28
                                      0x00b15d31
                                      0x00b15e1a
                                      0x00b15e21
                                      0x00b15d47
                                      0x00b15d47
                                      0x00b15d4d
                                      0x00b15d4e
                                      0x00b15d5b
                                      0x00b15d60
                                      0x00b15d63
                                      0x00b15d5f
                                      0x00000000
                                      0x00b15d5f
                                      0x00b15d6f
                                      0x00b15d77
                                      0x00b15d7d
                                      0x00b15d82
                                      0x00b15d8f
                                      0x00b15d93
                                      0x00b15d94
                                      0x00b15d95
                                      0x00b15daa
                                      0x00b15daa
                                      0x00b15dae
                                      0x00b15dc7
                                      0x00b15dcb
                                      0x00b15dcc
                                      0x00b15dcd
                                      0x00b15ddd
                                      0x00b15de2
                                      0x00b15de6
                                      0x00b15de8
                                      0x00b15dfd
                                      0x00b15e01
                                      0x00b15e02
                                      0x00b15e03
                                      0x00b15e13
                                      0x00b15e18
                                      0x00b15e18
                                      0x00b15de6
                                      0x00b15dae
                                      0x00000000
                                      0x00b15d77

                                      APIs
                                      • lstrcpyn.KERNEL32(?,?,00000105,80000001,Software\Borland\Delphi\Locales,00000000,000F0019,?,80000002,Software\Borland\Locales,00000000,000F0019,?,80000001,Software\Borland\Locales,00000000), ref: 00B15D10
                                      • GetThreadLocale.KERNEL32(00000003,?,00000005,?,?,00000105,80000001,Software\Borland\Delphi\Locales,00000000,000F0019,?,80000002,Software\Borland\Locales,00000000,000F0019,?), ref: 00B15D1D
                                      • GetLocaleInfoA.KERNEL32(00000000,00000003,?,00000005,?,?,00000105,80000001,Software\Borland\Delphi\Locales,00000000,000F0019,?,80000002,Software\Borland\Locales,00000000,000F0019), ref: 00B15D23
                                      • lstrlen.KERNEL32(?,00000000,00000003,?,00000005,?,?,00000105,80000001,Software\Borland\Delphi\Locales,00000000,000F0019,?,80000002,Software\Borland\Locales,00000000), ref: 00B15D4E
                                      • lstrcpyn.KERNEL32(00000001,?,00000105,?,00000000,00000003,?,00000005,?,?,00000105,80000001,Software\Borland\Delphi\Locales,00000000,000F0019,?), ref: 00B15D95
                                      • LoadLibraryExA.KERNEL32(?,00000000,00000002,00000001,?,00000105,?,00000000,00000003,?,00000005,?,?,00000105,80000001,Software\Borland\Delphi\Locales), ref: 00B15DA5
                                      • lstrcpyn.KERNEL32(00000001,?,00000105,?,00000000,00000003,?,00000005,?,?,00000105,80000001,Software\Borland\Delphi\Locales,00000000,000F0019,?), ref: 00B15DCD
                                      • LoadLibraryExA.KERNEL32(?,00000000,00000002,00000001,?,00000105,?,00000000,00000003,?,00000005,?,?,00000105,80000001,Software\Borland\Delphi\Locales), ref: 00B15DDD
                                      • lstrcpyn.KERNEL32(00000001,?,00000105,?,00000000,00000002,00000001,?,00000105,?,00000000,00000003,?,00000005,?,?), ref: 00B15E03
                                      • LoadLibraryExA.KERNEL32(?,00000000,00000002,00000001,?,00000105,?,00000000,00000002,00000001,?,00000105,?,00000000,00000003,?), ref: 00B15E13
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.289505180.0000000000B11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B10000, based on PE: true
                                      • Associated: 00000000.00000002.289475761.0000000000B10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.289928975.0000000000BDC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.289986188.0000000000BE3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_b10000_loaddll32.jbxd
                                      Similarity
                                      • API ID: lstrcpyn$LibraryLoad$Locale$InfoThreadlstrlen
                                      • String ID: Software\Borland\Delphi\Locales$Software\Borland\Locales
                                      • API String ID: 1599918012-2375825460
                                      • Opcode ID: f3baee5bd0de15422c30ddad9afe84534a1bcc0a91144b9d07d6272a5e3d68ec
                                      • Instruction ID: 8456bfad43858fdd23deca786254304b08c423bce576b27ad50272a15d46f15a
                                      • Opcode Fuzzy Hash: f3baee5bd0de15422c30ddad9afe84534a1bcc0a91144b9d07d6272a5e3d68ec
                                      • Instruction Fuzzy Hash: 58318B72E0055CAAEF35D9B8DC86FEE77EC8B44740F8445E1A605E6182E6749FC48F50
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      Control-flow Graph

                                      • Executed
                                      • Not Executed
                                      control_flow_graph 140 b2b20c-b2b21b 141 b2b223-b2b23a call b146e8 FindResourceA 140->141 142 b2b21d 140->142 145 b2b289-b2b28e 141->145 146 b2b23c-b2b263 call b2dcdc call b2d658 141->146 142->141 150 b2b268-b2b27f call b13380 146->150 150->145
                                      C-Code - Quality: 65%
                                      			E00B2B20C(void* __eax, struct HINSTANCE__* __edx) {
                                      				intOrPtr _v8;
                                      				void* __ebx;
                                      				void* __ecx;
                                      				void* __edi;
                                      				void* __esi;
                                      				void* __ebp;
                                      				signed int _t10;
                                      				intOrPtr _t15;
                                      				struct HINSTANCE__* _t20;
                                      				intOrPtr* _t22;
                                      				intOrPtr _t30;
                                      				void* _t32;
                                      				intOrPtr* _t35;
                                      				intOrPtr _t38;
                                      				intOrPtr _t40;
                                      
                                      				_t38 = _t40;
                                      				_push(_t22);
                                      				_t35 = _t22;
                                      				_t20 = __edx;
                                      				_t32 = __eax;
                                      				if(__edx == 0) {
                                      					_t20 =  *0xbdf668; // 0xb10000
                                      				}
                                      				_t10 = FindResourceA(_t20, E00B146E8(_t32), 0xa) & 0xffffff00 | _t9 != 0x00000000;
                                      				_t43 = _t10;
                                      				if(_t10 == 0) {
                                      					return _t10;
                                      				} else {
                                      					_v8 = E00B2DCDC(_t20, 1, 0xa, _t32);
                                      					_push(_t38);
                                      					_push(0xb2b280);
                                      					_push( *[fs:eax]);
                                      					 *[fs:eax] = _t40;
                                      					_t15 = E00B2D658(_v8, _t20,  *_t35, _t32, _t35, _t43); // executed
                                      					 *_t35 = _t15;
                                      					_pop(_t30);
                                      					 *[fs:eax] = _t30;
                                      					_push(E00B2B287);
                                      					return E00B13380(_v8);
                                      				}
                                      			}


















                                      0x00b2b20d
                                      0x00b2b20f
                                      0x00b2b213
                                      0x00b2b215
                                      0x00b2b217
                                      0x00b2b21b
                                      0x00b2b21d
                                      0x00b2b21d
                                      0x00b2b235
                                      0x00b2b238
                                      0x00b2b23a
                                      0x00b2b28e
                                      0x00b2b23c
                                      0x00b2b24d
                                      0x00b2b252
                                      0x00b2b253
                                      0x00b2b258
                                      0x00b2b25b
                                      0x00b2b263
                                      0x00b2b268
                                      0x00b2b26c
                                      0x00b2b26f
                                      0x00b2b272
                                      0x00b2b27f
                                      0x00b2b27f

                                      APIs
                                      • FindResourceA.KERNEL32(00000000,00000000,0000000A), ref: 00B2B22E
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.289505180.0000000000B11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B10000, based on PE: true
                                      • Associated: 00000000.00000002.289475761.0000000000B10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.289928975.0000000000BDC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.289986188.0000000000BE3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_b10000_loaddll32.jbxd
                                      Similarity
                                      • API ID: FindResource
                                      • String ID:
                                      • API String ID: 1635176832-0
                                      • Opcode ID: 5b1332b0a23761d912515da914609e6306293b782e95674db2d5c40777469010
                                      • Instruction ID: 9657b8c277bfc1612b59c163f40a8590a8f30dce05584b6512e7b5421455688d
                                      • Opcode Fuzzy Hash: 5b1332b0a23761d912515da914609e6306293b782e95674db2d5c40777469010
                                      • Instruction Fuzzy Hash: 6601DF31304304AFE710DB69FC92D6AB7EDDB8A71076144BAF508D7651DE619C018260
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      Control-flow Graph

                                      C-Code - Quality: 82%
                                      			E00B2DDA4(void* __eax, struct HINSTANCE__* __edx, CHAR* _a4) {
                                      				CHAR* _v8;
                                      				void* __ebx;
                                      				void* __ecx;
                                      				void* __edi;
                                      				void* __esi;
                                      				void* __ebp;
                                      				struct HRSRC__* _t12;
                                      				void* _t18;
                                      				void* _t23;
                                      				CHAR* _t24;
                                      				void* _t25;
                                      				struct HRSRC__* _t29;
                                      				void* _t30;
                                      				struct HINSTANCE__* _t31;
                                      				void* _t32;
                                      
                                      				_v8 = _t24;
                                      				_t31 = __edx;
                                      				_t23 = __eax;
                                      				_t12 = FindResourceA(__edx, _v8, _a4); // executed
                                      				_t29 = _t12;
                                      				 *(_t23 + 0x10) = _t29;
                                      				_t33 = _t29;
                                      				if(_t29 == 0) {
                                      					E00B2DD34(_t23, _t24, _t29, _t31, _t33, _t32);
                                      					_pop(_t24);
                                      				}
                                      				_t5 = _t23 + 0x10; // 0xb2de48
                                      				_t30 = LoadResource(_t31,  *_t5);
                                      				 *(_t23 + 0x14) = _t30;
                                      				_t34 = _t30;
                                      				if(_t30 == 0) {
                                      					E00B2DD34(_t23, _t24, _t30, _t31, _t34, _t32);
                                      				}
                                      				_t7 = _t23 + 0x10; // 0xb2de48
                                      				_push(SizeofResource(_t31,  *_t7));
                                      				_t8 = _t23 + 0x14; // 0xb2d988
                                      				_t18 = LockResource( *_t8);
                                      				_pop(_t25);
                                      				return E00B2D948(_t23, _t25, _t18);
                                      			}


















                                      0x00b2ddab
                                      0x00b2ddae
                                      0x00b2ddb0
                                      0x00b2ddbb
                                      0x00b2ddc0
                                      0x00b2ddc2
                                      0x00b2ddc5
                                      0x00b2ddc7
                                      0x00b2ddca
                                      0x00b2ddcf
                                      0x00b2ddcf
                                      0x00b2ddd0
                                      0x00b2ddda
                                      0x00b2dddc
                                      0x00b2dddf
                                      0x00b2dde1
                                      0x00b2dde4
                                      0x00b2dde9
                                      0x00b2ddea
                                      0x00b2ddf4
                                      0x00b2ddf5
                                      0x00b2ddf9
                                      0x00b2de02
                                      0x00b2de0d

                                      APIs
                                      • FindResourceA.KERNEL32(00000000,?,?), ref: 00B2DDBB
                                      • LoadResource.KERNEL32(00000000,00B2DE48,00000000,?,?,00B29AC8,00000000,00000001,00000000,?,00B2DD14,?,?,00B2B4C6,00000000), ref: 00B2DDD5
                                      • SizeofResource.KERNEL32(00000000,00B2DE48,00000000,00B2DE48,00000000,?,?,00B29AC8,00000000,00000001,00000000,?,00B2DD14,?,?,00B2B4C6), ref: 00B2DDEF
                                      • LockResource.KERNEL32(00B2D988,00000000,00000000,00B2DE48,00000000,00B2DE48,00000000,?,?,00B29AC8,00000000,00000001,00000000,?,00B2DD14,?), ref: 00B2DDF9
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.289505180.0000000000B11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B10000, based on PE: true
                                      • Associated: 00000000.00000002.289475761.0000000000B10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.289928975.0000000000BDC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.289986188.0000000000BE3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_b10000_loaddll32.jbxd
                                      Similarity
                                      • API ID: Resource$FindLoadLockSizeof
                                      • String ID:
                                      • API String ID: 3473537107-0
                                      • Opcode ID: e0f9c00353409598e5e2768b8fa927d36c29e3d16e926a6810523d72146c99a3
                                      • Instruction ID: cbe53fc07543b91c145f95c958d8d6c694cf5d047ab617ea6bb067277f992b15
                                      • Opcode Fuzzy Hash: e0f9c00353409598e5e2768b8fa927d36c29e3d16e926a6810523d72146c99a3
                                      • Instruction Fuzzy Hash: 68F031B36056146F5744EF5CF881DAB77ECEE883A032005A9F90CC7206DA35ED414775
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      Control-flow Graph

                                      C-Code - Quality: 68%
                                      			E00B11C0C() {
                                      				void* _t11;
                                      				signed int _t13;
                                      				intOrPtr _t19;
                                      				void* _t20;
                                      				intOrPtr _t23;
                                      
                                      				_push(_t23);
                                      				_push(E00B11CC2);
                                      				_push( *[fs:edx]);
                                      				 *[fs:edx] = _t23;
                                      				_push(0xbdf5cc);
                                      				L00B11560();
                                      				if( *0xbdf04d != 0) {
                                      					_push(0xbdf5cc);
                                      					L00B11568();
                                      				}
                                      				E00B115D0(0xbdf5ec);
                                      				E00B115D0(0xbdf5fc);
                                      				E00B115D0(0xbdf628);
                                      				_t11 = LocalAlloc(0, 0xff8); // executed
                                      				 *0xbdf624 = _t11;
                                      				if( *0xbdf624 != 0) {
                                      					_t13 = 3;
                                      					do {
                                      						_t20 =  *0xbdf624; // 0xa34878
                                      						 *((intOrPtr*)(_t20 + _t13 * 4 - 0xc)) = 0;
                                      						_t13 = _t13 + 1;
                                      					} while (_t13 != 0x401);
                                      					 *((intOrPtr*)(0xbdf610)) = 0xbdf60c;
                                      					 *0xbdf60c = 0xbdf60c;
                                      					 *0xbdf618 = 0xbdf60c;
                                      					 *0xbdf5c4 = 1;
                                      				}
                                      				_pop(_t19);
                                      				 *[fs:eax] = _t19;
                                      				_push(E00B11CC9);
                                      				if( *0xbdf04d != 0) {
                                      					_push(0xbdf5cc);
                                      					L00B11570();
                                      					return 0;
                                      				}
                                      				return 0;
                                      			}








                                      0x00b11c11
                                      0x00b11c12
                                      0x00b11c17
                                      0x00b11c1a
                                      0x00b11c1d
                                      0x00b11c22
                                      0x00b11c2e
                                      0x00b11c30
                                      0x00b11c35
                                      0x00b11c35
                                      0x00b11c3f
                                      0x00b11c49
                                      0x00b11c53
                                      0x00b11c5f
                                      0x00b11c64
                                      0x00b11c70
                                      0x00b11c72
                                      0x00b11c77
                                      0x00b11c77
                                      0x00b11c7f
                                      0x00b11c83
                                      0x00b11c84
                                      0x00b11c90
                                      0x00b11c93
                                      0x00b11c95
                                      0x00b11c9a
                                      0x00b11c9a
                                      0x00b11ca3
                                      0x00b11ca6
                                      0x00b11ca9
                                      0x00b11cb5
                                      0x00b11cb7
                                      0x00b11cbc
                                      0x00000000
                                      0x00b11cbc
                                      0x00b11cc1

                                      APIs
                                      • RtlInitializeCriticalSection.KERNEL32(00BDF5CC,00000000,00B11CC2,?,?,00B124A6), ref: 00B11C22
                                      • RtlEnterCriticalSection.KERNEL32(00BDF5CC,00BDF5CC,00000000,00B11CC2,?,?,00B124A6), ref: 00B11C35
                                      • LocalAlloc.KERNEL32(00000000,00000FF8,00BDF5CC,00000000,00B11CC2,?,?,00B124A6), ref: 00B11C5F
                                      • RtlLeaveCriticalSection.KERNEL32(00BDF5CC,00B11CC9,00000000,00B11CC2,?,?,00B124A6), ref: 00B11CBC
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.289505180.0000000000B11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B10000, based on PE: true
                                      • Associated: 00000000.00000002.289475761.0000000000B10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.289928975.0000000000BDC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.289986188.0000000000BE3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_b10000_loaddll32.jbxd
                                      Similarity
                                      • API ID: CriticalSection$AllocEnterInitializeLeaveLocal
                                      • String ID:
                                      • API String ID: 730355536-0
                                      • Opcode ID: 6b236a2a752442507edc511e86a4311ebb0338bb8f050bfbbb7c9d8339b42d6f
                                      • Instruction ID: 23f83d25014e548520b819d68d42b45063003c388081e8b1e035e0ae2a2ec538
                                      • Opcode Fuzzy Hash: 6b236a2a752442507edc511e86a4311ebb0338bb8f050bfbbb7c9d8339b42d6f
                                      • Instruction Fuzzy Hash: 1C018EB064E2425AD311AF2CA9167B4B7C1D7A5744F8088F7E203CB7E2F9B48880CB91
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      Control-flow Graph

                                      C-Code - Quality: 55%
                                      			_entry_(void* __ebx, void* __ecx, void* __edi, void* __esi, void* __eflags) {
                                      				intOrPtr _t19;
                                      				intOrPtr _t21;
                                      				void* _t26;
                                      
                                      				E00B167F0(0xbdb444);
                                      				_push(_t26);
                                      				_push(0xbdb8f4);
                                      				_push( *[fs:eax]);
                                      				 *[fs:eax] = _t26 + 0xffffffc4;
                                      				E00B1427C(0xbdff60, 0xbdb908);
                                      				_t19 =  *0xbdff60; // 0x2652014
                                      				E00B14534(0xbdff64, 0xbdb914, _t19);
                                      				LoadLibraryA("ggr"); // executed
                                      				E00B44F74(__ebx, 0, 1, __edi, __esi); // executed
                                      				_pop(_t21);
                                      				 *[fs:eax] = _t21;
                                      				_push(0xbdb8fb);
                                      				return 0;
                                      			}






                                      0x00bdb897
                                      0x00bdb89e
                                      0x00bdb89f
                                      0x00bdb8a4
                                      0x00bdb8a7
                                      0x00bdb8b4
                                      0x00bdb8c3
                                      0x00bdb8c9
                                      0x00bdb8d3
                                      0x00bdb8e1
                                      0x00bdb8e8
                                      0x00bdb8eb
                                      0x00bdb8ee
                                      0x00bdb8f3

                                      APIs
                                      • LoadLibraryA.KERNEL32(ggr,00000000,00BDB8F4), ref: 00BDB8D3
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.289505180.0000000000B11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B10000, based on PE: true
                                      • Associated: 00000000.00000002.289475761.0000000000B10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.289928975.0000000000BDC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.289986188.0000000000BE3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_b10000_loaddll32.jbxd
                                      Similarity
                                      • API ID: LibraryLoad
                                      • String ID: ggr
                                      • API String ID: 1029625771-644803015
                                      • Opcode ID: c8d3dc0077b6dd52081993e03fbc9518755ec1c0817d5bddde71114c3e5e2a8b
                                      • Instruction ID: 7f348465e5a983b74210d5cc56789bf781351f75661d33db2355605df6a9c4bd
                                      • Opcode Fuzzy Hash: c8d3dc0077b6dd52081993e03fbc9518755ec1c0817d5bddde71114c3e5e2a8b
                                      • Instruction Fuzzy Hash: 19F0E5313092458B8705A7ACAC73C29F3C9D78AF0439204F3F501837A1FF259D10D651
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      Control-flow Graph

                                      • Executed
                                      • Not Executed
                                      control_flow_graph 74 b122f8-b1230a 75 b12315-b1231b 74->75 76 b1230c call b11c0c 74->76 78 b12327-b1233c 75->78 79 b1231d-b12322 75->79 80 b12311-b12313 76->80 82 b12348-b12351 78->82 83 b1233e-b12343 RtlEnterCriticalSection 78->83 81 b1247b-b12484 79->81 80->75 80->79 84 b12353 82->84 85 b12358-b1235e 82->85 83->82 84->85 86 b12364-b12368 85->86 87 b123f7-b123fd 85->87 90 b1236a 86->90 91 b1236d-b1237c 86->91 88 b12449-b1244b call b12204 87->88 89 b123ff-b1240c 87->89 99 b12450-b12467 88->99 92 b1241b-b12447 call b13c6c 89->92 93 b1240e-b12416 89->93 90->91 91->87 94 b1237e-b1238c 91->94 92->81 93->92 97 b123a8-b123ac 94->97 98 b1238e-b12392 94->98 105 b123b1-b123cc 97->105 106 b123ae 97->106 101 b12394 98->101 102 b12397-b123a6 98->102 103 b12473 99->103 104 b12469-b1246e RtlLeaveCriticalSection 99->104 101->102 107 b123ce-b123f2 call b13c6c 102->107 104->103 105->107 106->105 107->81
                                      APIs
                                        • Part of subcall function 00B11C0C: RtlInitializeCriticalSection.KERNEL32(00BDF5CC,00000000,00B11CC2,?,?,00B124A6), ref: 00B11C22
                                        • Part of subcall function 00B11C0C: RtlEnterCriticalSection.KERNEL32(00BDF5CC,00BDF5CC,00000000,00B11CC2,?,?,00B124A6), ref: 00B11C35
                                        • Part of subcall function 00B11C0C: LocalAlloc.KERNEL32(00000000,00000FF8,00BDF5CC,00000000,00B11CC2,?,?,00B124A6), ref: 00B11C5F
                                        • Part of subcall function 00B11C0C: RtlLeaveCriticalSection.KERNEL32(00BDF5CC,00B11CC9,00000000,00B11CC2,?,?,00B124A6), ref: 00B11CBC
                                      • RtlEnterCriticalSection.KERNEL32(00BDF5CC,00000000,00B12474), ref: 00B12343
                                      • RtlLeaveCriticalSection.KERNEL32(00BDF5CC,00B1247B), ref: 00B1246E
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.289505180.0000000000B11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B10000, based on PE: true
                                      • Associated: 00000000.00000002.289475761.0000000000B10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.289928975.0000000000BDC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.289986188.0000000000BE3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_b10000_loaddll32.jbxd
                                      Similarity
                                      • API ID: CriticalSection$EnterLeave$AllocInitializeLocal
                                      • String ID:
                                      • API String ID: 2227675388-0
                                      • Opcode ID: c2dafca9ccef5e7a873bf1cfe04d5ca0d6ada778caec018e4c5b1fbb55fc420f
                                      • Instruction ID: d0c1fa253e576c14f9408961fcc96872ee1fbd364991fae4a0633385942b54cb
                                      • Opcode Fuzzy Hash: c2dafca9ccef5e7a873bf1cfe04d5ca0d6ada778caec018e4c5b1fbb55fc420f
                                      • Instruction Fuzzy Hash: 5741D3B1A053028FDB14CF28FC912B9B7E0F755314B9481FAD412C77A1F6349991CB44
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      Control-flow Graph

                                      • Executed
                                      • Not Executed
                                      control_flow_graph 110 b14970-b14972 111 b14934-b14938 110->111 112 b14978-b1497d 110->112 114 b14948 111->114 115 b1493a-b14947 SysFreeString 111->115 112->111 113 b14983-b1498d SysReAllocStringLen 112->113 116 b14993 113->116 117 b14904-b1490e 113->117 115->114 119 b14920 117->119 120 b14910-b1491a SysAllocStringLen 117->120 120->117 120->119
                                      C-Code - Quality: 60%
                                      			E00B14970(signed int __eax, void* __edx) {
                                      				signed int _t4;
                                      				void* _t5;
                                      				signed char _t16;
                                      				void* _t18;
                                      				void* _t19;
                                      				void* _t23;
                                      
                                      				_t18 = __edx;
                                      				_t4 = __eax;
                                      				if(__edx == 0) {
                                      					L10:
                                      					_t19 =  *_t4;
                                      					if(_t19 != 0) {
                                      						 *_t4 = 0;
                                      						_push(_t4);
                                      						L00B114F4();
                                      						_t5 = _t19;
                                      						return _t5;
                                      					}
                                      					return _t4;
                                      				} else {
                                      					__ecx =  *(__edx - 4);
                                      					__ecx =  *(__edx - 4) >> 1;
                                      					if(__ecx == 0) {
                                      						goto L10;
                                      					} else {
                                      						_push(__ecx);
                                      						_push(__edx);
                                      						_push(__eax); // executed
                                      						L00B114EC(); // executed
                                      						if(__eax == 0) {
                                      							__eax = __eax & 0x0000007f;
                                      							__edx =  *__esp;
                                      							_t23 = _t18;
                                      							_t16 = _t4 & 0x0000007f;
                                      							if( *0xbdf008 != 0) {
                                      								 *0xbdf008();
                                      							}
                                      							if(_t16 != 0) {
                                      								if(_t16 <= 0x18) {
                                      									_t2 = _t16 + 0xbdc048; // 0xd7c9c8cc
                                      									_t16 =  *_t2;
                                      								}
                                      							} else {
                                      								_t16 =  *(E00B167A4() + 4);
                                      							}
                                      							return E00B129D0(_t23);
                                      						} else {
                                      							return __eax;
                                      						}
                                      					}
                                      				}
                                      			}









                                      0x00b14970
                                      0x00b14970
                                      0x00b14972
                                      0x00b14934
                                      0x00b14934
                                      0x00b14938
                                      0x00b1493a
                                      0x00b14940
                                      0x00b14942
                                      0x00b14947
                                      0x00000000
                                      0x00b14947
                                      0x00b14948
                                      0x00b14978
                                      0x00b14978
                                      0x00b1497b
                                      0x00b1497d
                                      0x00000000
                                      0x00b14983
                                      0x00b14983
                                      0x00b14984
                                      0x00b14985
                                      0x00b14986
                                      0x00b1498d
                                      0x00b12a28
                                      0x00b12a2b
                                      0x00b129de
                                      0x00b129e2
                                      0x00b129ec
                                      0x00b129f2
                                      0x00b129f2
                                      0x00b129fa
                                      0x00b12a0c
                                      0x00b12a12
                                      0x00b12a12
                                      0x00b12a12
                                      0x00b129fc
                                      0x00b12a01
                                      0x00b12a01
                                      0x00b12a25
                                      0x00b14993
                                      0x00b14993
                                      0x00b14993
                                      0x00b1498d
                                      0x00b1497d

                                      APIs
                                      • SysFreeString.OLEAUT32 ref: 00B14942
                                      • SysReAllocStringLen.OLEAUT32(?,?,?), ref: 00B14986
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.289505180.0000000000B11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B10000, based on PE: true
                                      • Associated: 00000000.00000002.289475761.0000000000B10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.289928975.0000000000BDC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.289986188.0000000000BE3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_b10000_loaddll32.jbxd
                                      Similarity
                                      • API ID: String$AllocFree
                                      • String ID:
                                      • API String ID: 344208780-0
                                      • Opcode ID: 30af372732d717d2b7e7ea3a8fde1a8ae9bbb0e328117705c45d18cc1208a5f5
                                      • Instruction ID: 698c2db9dafab957ba9b97ebbb3949ef616e65f80156074585bef76df31e4f4e
                                      • Opcode Fuzzy Hash: 30af372732d717d2b7e7ea3a8fde1a8ae9bbb0e328117705c45d18cc1208a5f5
                                      • Instruction Fuzzy Hash: D5D012B85011015DEA249A288841BB722EDDBD2B40BED89E8B4015B245DB349D80DB30
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      Control-flow Graph

                                      • Executed
                                      • Not Executed
                                      control_flow_graph 121 b14a28-b14a2a 122 b14a30-b14a3a SysAllocStringLen 121->122 123 b14934-b14938 121->123 126 b14a40-b14a4a SysFreeString 122->126 127 b14904-b1490e 122->127 124 b14948 123->124 125 b1493a-b14947 SysFreeString 123->125 125->124 129 b14920 127->129 130 b14910-b1491a SysAllocStringLen 127->130 130->127 130->129
                                      C-Code - Quality: 56%
                                      			E00B14A28(signed int __eax, void* __ecx, void* __edx) {
                                      				void* _t4;
                                      				signed char _t15;
                                      				void* _t18;
                                      				void* _t19;
                                      				void* _t23;
                                      
                                      				_t18 = __edx;
                                      				_t3 = __eax;
                                      				if(__ecx == 0) {
                                      					_t19 =  *__eax;
                                      					if(_t19 != 0) {
                                      						 *__eax = 0;
                                      						_push(__eax);
                                      						L00B114F4();
                                      						_t4 = _t19;
                                      						return _t4;
                                      					}
                                      					return __eax;
                                      				} else {
                                      					_push(__eax);
                                      					_push(__ecx);
                                      					_push(__edx); // executed
                                      					L00B114E4(); // executed
                                      					if(__eax == 0) {
                                      						__eax = __eax & 0x0000007f;
                                      						__edx =  *__esp;
                                      						_t23 = _t18;
                                      						_t15 = _t3 & 0x0000007f;
                                      						if( *0xbdf008 != 0) {
                                      							 *0xbdf008();
                                      						}
                                      						if(_t15 != 0) {
                                      							if(_t15 <= 0x18) {
                                      								_t2 = _t15 + 0xbdc048; // 0xd7c9c8cc
                                      								_t15 =  *_t2;
                                      							}
                                      						} else {
                                      							_t15 =  *(E00B167A4() + 4);
                                      						}
                                      						return E00B129D0(_t23);
                                      					} else {
                                      						_pop(__edx);
                                      						_push( *__edx);
                                      						 *__edx = __eax;
                                      						L00B114F4();
                                      						return __eax;
                                      					}
                                      				}
                                      			}








                                      0x00b14a28
                                      0x00b14a28
                                      0x00b14a2a
                                      0x00b14934
                                      0x00b14938
                                      0x00b1493a
                                      0x00b14940
                                      0x00b14942
                                      0x00b14947
                                      0x00000000
                                      0x00b14947
                                      0x00b14948
                                      0x00b14a30
                                      0x00b14a30
                                      0x00b14a31
                                      0x00b14a32
                                      0x00b14a33
                                      0x00b14a3a
                                      0x00b12a28
                                      0x00b12a2b
                                      0x00b129de
                                      0x00b129e2
                                      0x00b129ec
                                      0x00b129f2
                                      0x00b129f2
                                      0x00b129fa
                                      0x00b12a0c
                                      0x00b12a12
                                      0x00b12a12
                                      0x00b12a12
                                      0x00b129fc
                                      0x00b12a01
                                      0x00b12a01
                                      0x00b12a25
                                      0x00b14a40
                                      0x00b14a40
                                      0x00b14a41
                                      0x00b14a43
                                      0x00b14a45
                                      0x00b14a4a
                                      0x00b14a4a
                                      0x00b14a3a

                                      APIs
                                      • SysFreeString.OLEAUT32 ref: 00B14942
                                      • SysAllocStringLen.OLEAUT32(?,?), ref: 00B14A33
                                      • SysFreeString.OLEAUT32(00000000), ref: 00B14A45
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.289505180.0000000000B11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B10000, based on PE: true
                                      • Associated: 00000000.00000002.289475761.0000000000B10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.289928975.0000000000BDC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.289986188.0000000000BE3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_b10000_loaddll32.jbxd
                                      Similarity
                                      • API ID: String$Free$Alloc
                                      • String ID:
                                      • API String ID: 986138563-0
                                      • Opcode ID: 7cb16d255c1eead8cba927419972f0c082703771b48429d5ed4271250b9f85eb
                                      • Instruction ID: 15b4ed4598a4b52a6fe961cba3460296aed970a9be1de5577cf169377a63e822
                                      • Opcode Fuzzy Hash: 7cb16d255c1eead8cba927419972f0c082703771b48429d5ed4271250b9f85eb
                                      • Instruction Fuzzy Hash: 06C012B81122026CEA292B7449028FB67D8EE827447C808F9B90085202DA28C8D2A920
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      Control-flow Graph

                                      • Executed
                                      • Not Executed
                                      control_flow_graph 131 b11724-b11731 132 b11733-b11738 131->132 133 b1173a-b11740 131->133 134 b11746-b1175e VirtualAlloc 132->134 133->134 135 b11760-b1176e call b115d8 134->135 136 b11783-b11786 134->136 135->136 139 b11770-b11781 VirtualFree 135->139 139->136
                                      C-Code - Quality: 100%
                                      			E00B11724(void* __eax, void** __edx) {
                                      				void* _t3;
                                      				void** _t8;
                                      				void* _t11;
                                      				long _t14;
                                      
                                      				_t8 = __edx;
                                      				if(__eax >= 0x100000) {
                                      					_t14 = __eax + 0x0000ffff & 0xffff0000;
                                      				} else {
                                      					_t14 = 0x100000;
                                      				}
                                      				_t8[1] = _t14;
                                      				_t3 = VirtualAlloc(0, _t14, 0x2000, 1); // executed
                                      				_t11 = _t3;
                                      				 *_t8 = _t11;
                                      				if(_t11 != 0) {
                                      					_t3 = E00B115D8(0xbdf5ec, _t8);
                                      					if(_t3 == 0) {
                                      						VirtualFree( *_t8, 0, 0x8000);
                                      						 *_t8 = 0;
                                      						return 0;
                                      					}
                                      				}
                                      				return _t3;
                                      			}







                                      0x00b11727
                                      0x00b11731
                                      0x00b11740
                                      0x00b11733
                                      0x00b11733
                                      0x00b11733
                                      0x00b11746
                                      0x00b11753
                                      0x00b11758
                                      0x00b1175a
                                      0x00b1175e
                                      0x00b11767
                                      0x00b1176e
                                      0x00b1177a
                                      0x00b11781
                                      0x00000000
                                      0x00b11781
                                      0x00b1176e
                                      0x00b11786

                                      APIs
                                      • VirtualAlloc.KERNEL32(00000000,?,00002000,00000001,?,?,?,00B11A2D), ref: 00B11753
                                      • VirtualFree.KERNEL32(00000000,00000000,00008000,00000000,?,00002000,00000001,?,?,?,00B11A2D), ref: 00B1177A
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.289505180.0000000000B11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B10000, based on PE: true
                                      • Associated: 00000000.00000002.289475761.0000000000B10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.289928975.0000000000BDC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.289986188.0000000000BE3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_b10000_loaddll32.jbxd
                                      Similarity
                                      • API ID: Virtual$AllocFree
                                      • String ID:
                                      • API String ID: 2087232378-0
                                      • Opcode ID: d54bebd3495fe6518873a17e804f4eeabb9162f958f1b8aca1587c65e3dcaab5
                                      • Instruction ID: 2a6a87adfd103a1698eed247ea392956c5db3815c503fa4aa5e85720fd1a65a7
                                      • Opcode Fuzzy Hash: d54bebd3495fe6518873a17e804f4eeabb9162f958f1b8aca1587c65e3dcaab5
                                      • Instruction Fuzzy Hash: 6EF027B3F0022017DB61596D4CC1BD256C6DF957A0F6404F0FB0CEF3C8D6A18C8182A1
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      Control-flow Graph

                                      • Executed
                                      • Not Executed
                                      control_flow_graph 153 b175d8-b17620 call b12b24 CreateWindowExA call b12b14 157 b17625-b1762c 153->157
                                      C-Code - Quality: 100%
                                      			E00B175D8(long __eax, CHAR* __edx, void* _a4, struct HINSTANCE__* _a8, struct HMENU__* _a12, struct HWND__* _a16, int _a20, int _a24, int _a28, int _a32, long _a36) {
                                      				CHAR* _v8;
                                      				void* _t13;
                                      				struct HWND__* _t24;
                                      				CHAR* _t29;
                                      				long _t32;
                                      
                                      				_v8 = _t29;
                                      				_t32 = __eax;
                                      				_t13 = E00B12B24();
                                      				_t24 = CreateWindowExA(_t32, __edx, _v8, _a36, _a32, _a28, _a24, _a20, _a16, _a12, _a8, _a4); // executed
                                      				E00B12B14(_t13);
                                      				return _t24;
                                      			}








                                      0x00b175df
                                      0x00b175e4
                                      0x00b175e6
                                      0x00b17617
                                      0x00b17620
                                      0x00b1762c

                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.289505180.0000000000B11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B10000, based on PE: true
                                      • Associated: 00000000.00000002.289475761.0000000000B10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.289928975.0000000000BDC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.289986188.0000000000BE3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_b10000_loaddll32.jbxd
                                      Similarity
                                      • API ID: CreateWindow
                                      • String ID:
                                      • API String ID: 716092398-0
                                      • Opcode ID: a672b2eb1d9e3a805781367aad54b4842a78cc4b7917898f4b96461fb7ca0a24
                                      • Instruction ID: 0874dc00bc0ddb64ebcd8e648a6d8fb0b5a9ba91214076d7db88a2bed329aae0
                                      • Opcode Fuzzy Hash: a672b2eb1d9e3a805781367aad54b4842a78cc4b7917898f4b96461fb7ca0a24
                                      • Instruction Fuzzy Hash: 38F07AB2604118AF8B84DE9DEC81EDB77ECEB4C2A0B054165BA0CD3201D634ED518BA0
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      Control-flow Graph

                                      • Executed
                                      • Not Executed
                                      control_flow_graph 158 b159b8-b159c6 159 b159f3-b159fe 158->159 160 b159c8-b159df GetModuleFileNameA call b15bf4 158->160 162 b159e4-b159eb 160->162 162->159 163 b159ed-b159f0 162->163 163->159
                                      C-Code - Quality: 100%
                                      			E00B159B8(void* __eax) {
                                      				char _v272;
                                      				intOrPtr _t14;
                                      				void* _t16;
                                      				intOrPtr _t18;
                                      				intOrPtr _t19;
                                      
                                      				_t16 = __eax;
                                      				if( *((intOrPtr*)(__eax + 0x10)) == 0) {
                                      					_t3 = _t16 + 4; // 0xb10000
                                      					GetModuleFileNameA( *_t3,  &_v272, 0x105);
                                      					_t14 = E00B15BF4(_t19); // executed
                                      					_t18 = _t14;
                                      					 *((intOrPtr*)(_t16 + 0x10)) = _t18;
                                      					if(_t18 == 0) {
                                      						_t5 = _t16 + 4; // 0xb10000
                                      						 *((intOrPtr*)(_t16 + 0x10)) =  *_t5;
                                      					}
                                      				}
                                      				_t7 = _t16 + 0x10; // 0xb10000
                                      				return  *_t7;
                                      			}








                                      0x00b159c0
                                      0x00b159c6
                                      0x00b159d2
                                      0x00b159d6
                                      0x00b159df
                                      0x00b159e4
                                      0x00b159e6
                                      0x00b159eb
                                      0x00b159ed
                                      0x00b159f0
                                      0x00b159f0
                                      0x00b159eb
                                      0x00b159f3
                                      0x00b159fe

                                      APIs
                                      • GetModuleFileNameA.KERNEL32(00B10000,?,00000105,108B00BD,00000000,00B15A20,00B2B3E4,?,00000000,00B2B40A,?,?,00000000,?,00B2B483), ref: 00B159D6
                                        • Part of subcall function 00B15BF4: GetModuleFileNameA.KERNEL32(00000000,?,00000105,108B00BD,00BDC0A4), ref: 00B15C10
                                        • Part of subcall function 00B15BF4: RegOpenKeyExA.ADVAPI32(80000001,Software\Borland\Locales,00000000,000F0019,?,00000000,?,00000105,108B00BD,00BDC0A4), ref: 00B15C2E
                                        • Part of subcall function 00B15BF4: RegOpenKeyExA.ADVAPI32(80000002,Software\Borland\Locales,00000000,000F0019,?,80000001,Software\Borland\Locales,00000000,000F0019,?,00000000,?,00000105,108B00BD,00BDC0A4), ref: 00B15C4C
                                        • Part of subcall function 00B15BF4: RegOpenKeyExA.ADVAPI32(80000001,Software\Borland\Delphi\Locales,00000000,000F0019,?,80000002,Software\Borland\Locales,00000000,000F0019,?,80000001,Software\Borland\Locales,00000000,000F0019,?,00000000), ref: 00B15C6A
                                        • Part of subcall function 00B15BF4: RegQueryValueExA.ADVAPI32(?,?,00000000,00000000,?,?,00000000,00B15CF9,?,80000001,Software\Borland\Locales,00000000,000F0019,?,00000000,?), ref: 00B15CB3
                                        • Part of subcall function 00B15BF4: RegQueryValueExA.ADVAPI32(?,00B15E60,00000000,00000000,?,?,?,?,00000000,00000000,?,?,00000000,00B15CF9,?,80000001), ref: 00B15CD1
                                        • Part of subcall function 00B15BF4: RegCloseKey.ADVAPI32(?,00B15D00,00000000,?,?,00000000,00B15CF9,?,80000001,Software\Borland\Locales,00000000,000F0019,?,00000000,?,00000105), ref: 00B15CF3
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.289505180.0000000000B11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B10000, based on PE: true
                                      • Associated: 00000000.00000002.289475761.0000000000B10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.289928975.0000000000BDC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.289986188.0000000000BE3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_b10000_loaddll32.jbxd
                                      Similarity
                                      • API ID: Open$FileModuleNameQueryValue$Close
                                      • String ID:
                                      • API String ID: 2796650324-0
                                      • Opcode ID: c92e517641b2b4fd91be27f2a27198873e27df336b57998948ba745165383069
                                      • Instruction ID: fcbd639cc3fce67fda112e03381b3d93a8a64253f66c4b41ed78b90942776c64
                                      • Opcode Fuzzy Hash: c92e517641b2b4fd91be27f2a27198873e27df336b57998948ba745165383069
                                      • Instruction Fuzzy Hash: 36E0ED71A00614DBCB20DF9CC8C1A8637D8AB48764F444A92AD54CF346D7B5DD948BD5
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      Control-flow Graph

                                      C-Code - Quality: 100%
                                      			E00B18930(void* __eax, void* __edx) {
                                      				int _t3;
                                      				char* _t5;
                                      				int _t7;
                                      				int _t10;
                                      				void* _t12;
                                      
                                      				_t12 = __eax;
                                      				_t3 = E00B144E8(__edx);
                                      				_t5 = E00B146E8(__edx);
                                      				_t7 = E00B144E8(_t12);
                                      				_t10 = CompareStringA(0x400, 1, E00B146E8(_t12), _t7, _t5, _t3); // executed
                                      				return _t10 - 2;
                                      			}








                                      0x00b18934
                                      0x00b18938
                                      0x00b18940
                                      0x00b18948
                                      0x00b1895d
                                      0x00b18967

                                      APIs
                                      • CompareStringA.KERNEL32(00000400,00000001,00000000,00000000,00000000,00000000,?,?,00B18977,?,?,00B18D71), ref: 00B1895D
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.289505180.0000000000B11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B10000, based on PE: true
                                      • Associated: 00000000.00000002.289475761.0000000000B10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.289928975.0000000000BDC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.289986188.0000000000BE3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_b10000_loaddll32.jbxd
                                      Similarity
                                      • API ID: CompareString
                                      • String ID:
                                      • API String ID: 1825529933-0
                                      • Opcode ID: 7a97947de377c4f51268352574cf2924ac5472c08644cf5ede9ec7408a82dda4
                                      • Instruction ID: 13638491a80478d8a73f369f4a3f73ca83e2594a7b17e21c905c266fb5356498
                                      • Opcode Fuzzy Hash: 7a97947de377c4f51268352574cf2924ac5472c08644cf5ede9ec7408a82dda4
                                      • Instruction Fuzzy Hash: 2AD0C7D53815102BE650B57C0D83FDA01CC8B19716F4244F6B608F7343CA598D8102B5
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      Control-flow Graph

                                      • Executed
                                      • Not Executed
                                      control_flow_graph 173 b118b8-b118fc 174 b1193a-b11940 173->174 175 b11942-b11949 174->175 176 b118fe-b11908 174->176 177 b1190a 176->177 178 b1190c-b11910 176->178 177->178 179 b11912 178->179 180 b11916-b11918 178->180 179->180 181 b11938 180->181 182 b1191a-b1192c VirtualAlloc 180->182 181->174 182->181 183 b1192e-b11936 182->183 183->175
                                      C-Code - Quality: 100%
                                      			E00B118B8(signed int __eax, void** __ecx, intOrPtr __edx) {
                                      				signed int _v20;
                                      				void** _v24;
                                      				void* _t15;
                                      				void** _t16;
                                      				void* _t17;
                                      				signed int _t27;
                                      				intOrPtr* _t29;
                                      				void* _t31;
                                      				intOrPtr* _t32;
                                      
                                      				_v24 = __ecx;
                                      				 *_t32 = __edx;
                                      				_t31 = __eax & 0xfffff000;
                                      				_v20 = __eax +  *_t32 + 0x00000fff & 0xfffff000;
                                      				 *_v24 = _t31;
                                      				_t15 = _v20 - _t31;
                                      				_v24[1] = _t15;
                                      				_t29 =  *0xbdf5ec; // 0xa35eac
                                      				while(_t29 != 0xbdf5ec) {
                                      					_t17 =  *(_t29 + 8);
                                      					_t27 =  *((intOrPtr*)(_t29 + 0xc)) + _t17;
                                      					if(_t31 > _t17) {
                                      						_t17 = _t31;
                                      					}
                                      					if(_t27 > _v20) {
                                      						_t27 = _v20;
                                      					}
                                      					if(_t27 > _t17) {
                                      						_t15 = VirtualAlloc(_t17, _t27 - _t17, 0x1000, 4); // executed
                                      						if(_t15 == 0) {
                                      							_t16 = _v24;
                                      							 *_t16 = 0;
                                      							return _t16;
                                      						}
                                      					}
                                      					_t29 =  *_t29;
                                      				}
                                      				return _t15;
                                      			}












                                      0x00b118bf
                                      0x00b118c3
                                      0x00b118ca
                                      0x00b118df
                                      0x00b118e7
                                      0x00b118ed
                                      0x00b118f3
                                      0x00b118f6
                                      0x00b1193a
                                      0x00b118fe
                                      0x00b11904
                                      0x00b11908
                                      0x00b1190a
                                      0x00b1190a
                                      0x00b11910
                                      0x00b11912
                                      0x00b11912
                                      0x00b11918
                                      0x00b11925
                                      0x00b1192c
                                      0x00b1192e
                                      0x00b11934
                                      0x00000000
                                      0x00b11934
                                      0x00b1192c
                                      0x00b11938
                                      0x00b11938
                                      0x00b11949

                                      APIs
                                      • VirtualAlloc.KERNEL32(?,?,00001000,00000004), ref: 00B11925
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.289505180.0000000000B11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B10000, based on PE: true
                                      • Associated: 00000000.00000002.289475761.0000000000B10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.289928975.0000000000BDC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.289986188.0000000000BE3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_b10000_loaddll32.jbxd
                                      Similarity
                                      • API ID: AllocVirtual
                                      • String ID:
                                      • API String ID: 4275171209-0
                                      • Opcode ID: d74cffd5f617620091fc1762ef4bbee7cf2244b6e5049ceb25f5f939ba14cad1
                                      • Instruction ID: f8ff9f4c208b8adde08278c81b4d6cb02b678abe3f4e00d500b533e56c677141
                                      • Opcode Fuzzy Hash: d74cffd5f617620091fc1762ef4bbee7cf2244b6e5049ceb25f5f939ba14cad1
                                      • Instruction Fuzzy Hash: B9118272A057019FC3109F2DDC80A6AB7E5EFD47A0F55C9BCE6A897354E630AC818B41
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      Control-flow Graph

                                      • Executed
                                      • Not Executed
                                      control_flow_graph 184 b32294-b322a2 185 b32310-b32329 184->185 186 b322a4-b322cd VirtualAlloc call b12ac8 184->186 188 b322d2-b322e2 call b3228c 186->188 191 b322e5-b32308 call b3228c 188->191 194 b3230a 191->194 194->185
                                      C-Code - Quality: 100%
                                      			E00B32294(intOrPtr _a4, intOrPtr _a8) {
                                      				void* _t14;
                                      				void _t15;
                                      				intOrPtr _t25;
                                      				char* _t26;
                                      				void* _t35;
                                      
                                      				if( *0xbdf88c == 0) {
                                      					_t14 = VirtualAlloc(0, 0x1000, 0x1000, 0x40); // executed
                                      					_t35 = _t14;
                                      					_t15 =  *0xbdf888; // 0x9f0000
                                      					 *_t35 = _t15;
                                      					_t1 = _t35 + 4; // 0x4
                                      					E00B12AC8(0xbdc618, 2, _t1);
                                      					_t2 = _t35 + 5; // 0x5
                                      					 *((intOrPtr*)(_t35 + 6)) = E00B3228C(_t2, E00B3226C);
                                      					_t4 = _t35 + 0xa; // 0xa
                                      					_t26 = _t4;
                                      					do {
                                      						 *_t26 = 0xe8;
                                      						_t5 = _t35 + 4; // 0x4
                                      						 *((intOrPtr*)(_t26 + 1)) = E00B3228C(_t26, _t5);
                                      						 *((intOrPtr*)(_t26 + 5)) =  *0xbdf88c;
                                      						 *0xbdf88c = _t26;
                                      						_t26 = _t26 + 0xd;
                                      					} while (_t26 - _t35 < 0xffc);
                                      					 *0xbdf888 = _t35;
                                      				}
                                      				_t25 =  *0xbdf88c;
                                      				 *0xbdf88c =  *((intOrPtr*)(_t25 + 5));
                                      				 *((intOrPtr*)(_t25 + 5)) = _a4;
                                      				 *((intOrPtr*)(_t25 + 9)) = _a8;
                                      				return  *0xbdf88c;
                                      			}








                                      0x00b322a2
                                      0x00b322b2
                                      0x00b322b7
                                      0x00b322b9
                                      0x00b322be
                                      0x00b322c0
                                      0x00b322cd
                                      0x00b322d7
                                      0x00b322df
                                      0x00b322e2
                                      0x00b322e2
                                      0x00b322e5
                                      0x00b322e5
                                      0x00b322e8
                                      0x00b322f2
                                      0x00b322f7
                                      0x00b322fa
                                      0x00b322fc
                                      0x00b32303
                                      0x00b3230a
                                      0x00b3230a
                                      0x00b32312
                                      0x00b32317
                                      0x00b3231c
                                      0x00b32322
                                      0x00b32329

                                      APIs
                                      • VirtualAlloc.KERNEL32(00000000,00001000,00001000,00000040), ref: 00B322B2
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.289505180.0000000000B11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B10000, based on PE: true
                                      • Associated: 00000000.00000002.289475761.0000000000B10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.289928975.0000000000BDC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.289986188.0000000000BE3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_b10000_loaddll32.jbxd
                                      Similarity
                                      • API ID: AllocVirtual
                                      • String ID:
                                      • API String ID: 4275171209-0
                                      • Opcode ID: 13e64d6149194afe7957880a5164cfa86c76cffeb5f65bd44acafe138262d03f
                                      • Instruction ID: e78b0c8b5d6ae10c57e2ee144a2efabea24c440fcd860daa1397cd9662b11dbe
                                      • Opcode Fuzzy Hash: 13e64d6149194afe7957880a5164cfa86c76cffeb5f65bd44acafe138262d03f
                                      • Instruction Fuzzy Hash: 051157352043069FC714DF18DC80B82FBE4EF88350F20C5BAE9998B385E370E9148BA5
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      C-Code - Quality: 90%
                                      			E00B3BDCC(void* __ebx, void* __ecx) {
                                      				char _v5;
                                      				intOrPtr _t2;
                                      				intOrPtr _t6;
                                      				intOrPtr _t108;
                                      				intOrPtr _t111;
                                      
                                      				_t2 =  *0xbdfa50; // 0x2650dc8
                                      				E00B3BBC4(_t2);
                                      				_push(_t111);
                                      				_push(0xb3c17f);
                                      				_push( *[fs:eax]);
                                      				 *[fs:eax] = _t111;
                                      				 *0xbdfa4c =  *0xbdfa4c + 1;
                                      				if( *0xbdfa48 == 0) {
                                      					 *0xbdfa48 = LoadLibraryA("uxtheme.dll");
                                      					if( *0xbdfa48 > 0) {
                                      						 *0xbdf988 = GetProcAddress( *0xbdfa48, "OpenThemeData");
                                      						 *0xbdf98c = GetProcAddress( *0xbdfa48, "CloseThemeData");
                                      						 *0xbdf990 = GetProcAddress( *0xbdfa48, "DrawThemeBackground");
                                      						 *0xbdf994 = GetProcAddress( *0xbdfa48, "DrawThemeText");
                                      						 *0xbdf998 = GetProcAddress( *0xbdfa48, "GetThemeBackgroundContentRect");
                                      						 *0xbdf99c = GetProcAddress( *0xbdfa48, "GetThemeBackgroundContentRect");
                                      						 *0xbdf9a0 = GetProcAddress( *0xbdfa48, "GetThemePartSize");
                                      						 *0xbdf9a4 = GetProcAddress( *0xbdfa48, "GetThemeTextExtent");
                                      						 *0xbdf9a8 = GetProcAddress( *0xbdfa48, "GetThemeTextMetrics");
                                      						 *0xbdf9ac = GetProcAddress( *0xbdfa48, "GetThemeBackgroundRegion");
                                      						 *0xbdf9b0 = GetProcAddress( *0xbdfa48, "HitTestThemeBackground");
                                      						 *0xbdf9b4 = GetProcAddress( *0xbdfa48, "DrawThemeEdge");
                                      						 *0xbdf9b8 = GetProcAddress( *0xbdfa48, "DrawThemeIcon");
                                      						 *0xbdf9bc = GetProcAddress( *0xbdfa48, "IsThemePartDefined");
                                      						 *0xbdf9c0 = GetProcAddress( *0xbdfa48, "IsThemeBackgroundPartiallyTransparent");
                                      						 *0xbdf9c4 = GetProcAddress( *0xbdfa48, "GetThemeColor");
                                      						 *0xbdf9c8 = GetProcAddress( *0xbdfa48, "GetThemeMetric");
                                      						 *0xbdf9cc = GetProcAddress( *0xbdfa48, "GetThemeString");
                                      						 *0xbdf9d0 = GetProcAddress( *0xbdfa48, "GetThemeBool");
                                      						 *0xbdf9d4 = GetProcAddress( *0xbdfa48, "GetThemeInt");
                                      						 *0xbdf9d8 = GetProcAddress( *0xbdfa48, "GetThemeEnumValue");
                                      						 *0xbdf9dc = GetProcAddress( *0xbdfa48, "GetThemePosition");
                                      						 *0xbdf9e0 = GetProcAddress( *0xbdfa48, "GetThemeFont");
                                      						 *0xbdf9e4 = GetProcAddress( *0xbdfa48, "GetThemeRect");
                                      						 *0xbdf9e8 = GetProcAddress( *0xbdfa48, "GetThemeMargins");
                                      						 *0xbdf9ec = GetProcAddress( *0xbdfa48, "GetThemeIntList");
                                      						 *0xbdf9f0 = GetProcAddress( *0xbdfa48, "GetThemePropertyOrigin");
                                      						 *0xbdf9f4 = GetProcAddress( *0xbdfa48, "SetWindowTheme");
                                      						 *0xbdf9f8 = GetProcAddress( *0xbdfa48, "GetThemeFilename");
                                      						 *0xbdf9fc = GetProcAddress( *0xbdfa48, "GetThemeSysColor");
                                      						 *0xbdfa00 = GetProcAddress( *0xbdfa48, "GetThemeSysColorBrush");
                                      						 *0xbdfa04 = GetProcAddress( *0xbdfa48, "GetThemeSysBool");
                                      						 *0xbdfa08 = GetProcAddress( *0xbdfa48, "GetThemeSysSize");
                                      						 *0xbdfa0c = GetProcAddress( *0xbdfa48, "GetThemeSysFont");
                                      						 *0xbdfa10 = GetProcAddress( *0xbdfa48, "GetThemeSysString");
                                      						 *0xbdfa14 = GetProcAddress( *0xbdfa48, "GetThemeSysInt");
                                      						 *0xbdfa18 = GetProcAddress( *0xbdfa48, "IsThemeActive");
                                      						 *0xbdfa1c = GetProcAddress( *0xbdfa48, "IsAppThemed");
                                      						 *0xbdfa20 = GetProcAddress( *0xbdfa48, "GetWindowTheme");
                                      						 *0xbdfa24 = GetProcAddress( *0xbdfa48, "EnableThemeDialogTexture");
                                      						 *0xbdfa28 = GetProcAddress( *0xbdfa48, "IsThemeDialogTextureEnabled");
                                      						 *0xbdfa2c = GetProcAddress( *0xbdfa48, "GetThemeAppProperties");
                                      						 *0xbdfa30 = GetProcAddress( *0xbdfa48, "SetThemeAppProperties");
                                      						 *0xbdfa34 = GetProcAddress( *0xbdfa48, "GetCurrentThemeName");
                                      						 *0xbdfa38 = GetProcAddress( *0xbdfa48, "GetThemeDocumentationProperty");
                                      						 *0xbdfa3c = GetProcAddress( *0xbdfa48, "DrawThemeParentBackground");
                                      						 *0xbdfa40 = GetProcAddress( *0xbdfa48, "EnableTheming");
                                      					}
                                      				}
                                      				_v5 =  *0xbdfa48 > 0;
                                      				_pop(_t108);
                                      				 *[fs:eax] = _t108;
                                      				_push(0xb3c186);
                                      				_t6 =  *0xbdfa50; // 0x2650dc8
                                      				return E00B3BBCC(_t6);
                                      			}








                                      0x00b3bdd6
                                      0x00b3bddb
                                      0x00b3bde2
                                      0x00b3bde3
                                      0x00b3bde8
                                      0x00b3bdeb
                                      0x00b3bdee
                                      0x00b3bdf7
                                      0x00b3be07
                                      0x00b3be0c
                                      0x00b3be1f
                                      0x00b3be31
                                      0x00b3be43
                                      0x00b3be55
                                      0x00b3be67
                                      0x00b3be79
                                      0x00b3be8b
                                      0x00b3be9d
                                      0x00b3beaf
                                      0x00b3bec1
                                      0x00b3bed3
                                      0x00b3bee5
                                      0x00b3bef7
                                      0x00b3bf09
                                      0x00b3bf1b
                                      0x00b3bf2d
                                      0x00b3bf3f
                                      0x00b3bf51
                                      0x00b3bf63
                                      0x00b3bf75
                                      0x00b3bf87
                                      0x00b3bf99
                                      0x00b3bfab
                                      0x00b3bfbd
                                      0x00b3bfcf
                                      0x00b3bfe1
                                      0x00b3bff3
                                      0x00b3c005
                                      0x00b3c017
                                      0x00b3c029
                                      0x00b3c03b
                                      0x00b3c04d
                                      0x00b3c05f
                                      0x00b3c071
                                      0x00b3c083
                                      0x00b3c095
                                      0x00b3c0a7
                                      0x00b3c0b9
                                      0x00b3c0cb
                                      0x00b3c0dd
                                      0x00b3c0ef
                                      0x00b3c101
                                      0x00b3c113
                                      0x00b3c125
                                      0x00b3c137
                                      0x00b3c149
                                      0x00b3c15b
                                      0x00b3c15b
                                      0x00b3be0c
                                      0x00b3c163
                                      0x00b3c169
                                      0x00b3c16c
                                      0x00b3c16f
                                      0x00b3c174
                                      0x00b3c17e

                                      APIs
                                      • LoadLibraryA.KERNEL32(uxtheme.dll,00000000,00B3C17F), ref: 00B3BE02
                                      • GetProcAddress.KERNEL32(00000000,OpenThemeData), ref: 00B3BE1A
                                      • GetProcAddress.KERNEL32(00000000,CloseThemeData), ref: 00B3BE2C
                                      • GetProcAddress.KERNEL32(00000000,DrawThemeBackground), ref: 00B3BE3E
                                      • GetProcAddress.KERNEL32(00000000,DrawThemeText), ref: 00B3BE50
                                      • GetProcAddress.KERNEL32(00000000,GetThemeBackgroundContentRect), ref: 00B3BE62
                                      • GetProcAddress.KERNEL32(00000000,GetThemeBackgroundContentRect), ref: 00B3BE74
                                      • GetProcAddress.KERNEL32(00000000,GetThemePartSize), ref: 00B3BE86
                                      • GetProcAddress.KERNEL32(00000000,GetThemeTextExtent), ref: 00B3BE98
                                      • GetProcAddress.KERNEL32(00000000,GetThemeTextMetrics), ref: 00B3BEAA
                                      • GetProcAddress.KERNEL32(00000000,GetThemeBackgroundRegion), ref: 00B3BEBC
                                      • GetProcAddress.KERNEL32(00000000,HitTestThemeBackground), ref: 00B3BECE
                                      • GetProcAddress.KERNEL32(00000000,DrawThemeEdge), ref: 00B3BEE0
                                      • GetProcAddress.KERNEL32(00000000,DrawThemeIcon), ref: 00B3BEF2
                                      • GetProcAddress.KERNEL32(00000000,IsThemePartDefined), ref: 00B3BF04
                                      • GetProcAddress.KERNEL32(00000000,IsThemeBackgroundPartiallyTransparent), ref: 00B3BF16
                                      • GetProcAddress.KERNEL32(00000000,GetThemeColor), ref: 00B3BF28
                                      • GetProcAddress.KERNEL32(00000000,GetThemeMetric), ref: 00B3BF3A
                                      • GetProcAddress.KERNEL32(00000000,GetThemeString), ref: 00B3BF4C
                                      • GetProcAddress.KERNEL32(00000000,GetThemeBool), ref: 00B3BF5E
                                      • GetProcAddress.KERNEL32(00000000,GetThemeInt), ref: 00B3BF70
                                      • GetProcAddress.KERNEL32(00000000,GetThemeEnumValue), ref: 00B3BF82
                                      • GetProcAddress.KERNEL32(00000000,GetThemePosition), ref: 00B3BF94
                                      • GetProcAddress.KERNEL32(00000000,GetThemeFont), ref: 00B3BFA6
                                      • GetProcAddress.KERNEL32(00000000,GetThemeRect), ref: 00B3BFB8
                                      • GetProcAddress.KERNEL32(00000000,GetThemeMargins), ref: 00B3BFCA
                                      • GetProcAddress.KERNEL32(00000000,GetThemeIntList), ref: 00B3BFDC
                                      • GetProcAddress.KERNEL32(00000000,GetThemePropertyOrigin), ref: 00B3BFEE
                                      • GetProcAddress.KERNEL32(00000000,SetWindowTheme), ref: 00B3C000
                                      • GetProcAddress.KERNEL32(00000000,GetThemeFilename), ref: 00B3C012
                                      • GetProcAddress.KERNEL32(00000000,GetThemeSysColor), ref: 00B3C024
                                      • GetProcAddress.KERNEL32(00000000,GetThemeSysColorBrush), ref: 00B3C036
                                      • GetProcAddress.KERNEL32(00000000,GetThemeSysBool), ref: 00B3C048
                                      • GetProcAddress.KERNEL32(00000000,GetThemeSysSize), ref: 00B3C05A
                                      • GetProcAddress.KERNEL32(00000000,GetThemeSysFont), ref: 00B3C06C
                                      • GetProcAddress.KERNEL32(00000000,GetThemeSysString), ref: 00B3C07E
                                      • GetProcAddress.KERNEL32(00000000,GetThemeSysInt), ref: 00B3C090
                                      • GetProcAddress.KERNEL32(00000000,IsThemeActive), ref: 00B3C0A2
                                      • GetProcAddress.KERNEL32(00000000,IsAppThemed), ref: 00B3C0B4
                                      • GetProcAddress.KERNEL32(00000000,GetWindowTheme), ref: 00B3C0C6
                                      • GetProcAddress.KERNEL32(00000000,EnableThemeDialogTexture), ref: 00B3C0D8
                                      • GetProcAddress.KERNEL32(00000000,IsThemeDialogTextureEnabled), ref: 00B3C0EA
                                      • GetProcAddress.KERNEL32(00000000,GetThemeAppProperties), ref: 00B3C0FC
                                      • GetProcAddress.KERNEL32(00000000,SetThemeAppProperties), ref: 00B3C10E
                                      • GetProcAddress.KERNEL32(00000000,GetCurrentThemeName), ref: 00B3C120
                                      • GetProcAddress.KERNEL32(00000000,GetThemeDocumentationProperty), ref: 00B3C132
                                      • GetProcAddress.KERNEL32(00000000,DrawThemeParentBackground), ref: 00B3C144
                                      • GetProcAddress.KERNEL32(00000000,EnableTheming), ref: 00B3C156
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.289505180.0000000000B11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B10000, based on PE: true
                                      • Associated: 00000000.00000002.289475761.0000000000B10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.289928975.0000000000BDC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.289986188.0000000000BE3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_b10000_loaddll32.jbxd
                                      Similarity
                                      • API ID: AddressProc$LibraryLoad
                                      • String ID: CloseThemeData$DrawThemeBackground$DrawThemeEdge$DrawThemeIcon$DrawThemeParentBackground$DrawThemeText$EnableThemeDialogTexture$EnableTheming$GetCurrentThemeName$GetThemeAppProperties$GetThemeBackgroundContentRect$GetThemeBackgroundRegion$GetThemeBool$GetThemeColor$GetThemeDocumentationProperty$GetThemeEnumValue$GetThemeFilename$GetThemeFont$GetThemeInt$GetThemeIntList$GetThemeMargins$GetThemeMetric$GetThemePartSize$GetThemePosition$GetThemePropertyOrigin$GetThemeRect$GetThemeString$GetThemeSysBool$GetThemeSysColor$GetThemeSysColorBrush$GetThemeSysFont$GetThemeSysInt$GetThemeSysSize$GetThemeSysString$GetThemeTextExtent$GetThemeTextMetrics$GetWindowTheme$HitTestThemeBackground$IsAppThemed$IsThemeActive$IsThemeBackgroundPartiallyTransparent$IsThemeDialogTextureEnabled$IsThemePartDefined$OpenThemeData$SetThemeAppProperties$SetWindowTheme$uxtheme.dll
                                      • API String ID: 2238633743-2910565190
                                      • Opcode ID: 76312cd6b6495c3395d31d0f4d2aabc7de953ad25bcdbf2ea2fe101c40148e81
                                      • Instruction ID: fd34fcdcc4b324d8af087cfdfaa406478b45f31e39674a5e868a9b392e3ee5e0
                                      • Opcode Fuzzy Hash: 76312cd6b6495c3395d31d0f4d2aabc7de953ad25bcdbf2ea2fe101c40148e81
                                      • Instruction Fuzzy Hash: 5BA138B0A46751AFDB00EFF4ECA2A757BF8EB0570076445F2B401DF265EAB9D8408B19
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      C-Code - Quality: 53%
                                      			E00B15A3C(char* __eax, intOrPtr __edx) {
                                      				char* _v8;
                                      				intOrPtr _v12;
                                      				intOrPtr _v16;
                                      				struct _WIN32_FIND_DATAA _v334;
                                      				char _v595;
                                      				void* _t45;
                                      				char* _t54;
                                      				char* _t64;
                                      				void* _t83;
                                      				intOrPtr* _t84;
                                      				char* _t90;
                                      				struct HINSTANCE__* _t91;
                                      				char* _t93;
                                      				void* _t94;
                                      				char* _t95;
                                      				void* _t96;
                                      
                                      				_v12 = __edx;
                                      				_v8 = __eax;
                                      				_v16 = _v8;
                                      				_t91 = GetModuleHandleA("kernel32.dll");
                                      				if(_t91 == 0) {
                                      					L4:
                                      					if( *_v8 != 0x5c) {
                                      						_t93 = _v8 + 2;
                                      						goto L10;
                                      					} else {
                                      						if( *((char*)(_v8 + 1)) == 0x5c) {
                                      							_t95 = E00B15A28(_v8 + 2);
                                      							if( *_t95 != 0) {
                                      								_t14 = _t95 + 1; // 0x1
                                      								_t93 = E00B15A28(_t14);
                                      								if( *_t93 != 0) {
                                      									L10:
                                      									_t83 = _t93 - _v8;
                                      									_push(_t83 + 1);
                                      									_push(_v8);
                                      									_push( &_v595);
                                      									L00B114A4();
                                      									while( *_t93 != 0) {
                                      										_t90 = E00B15A28(_t93 + 1);
                                      										_t45 = _t90 - _t93;
                                      										if(_t45 + _t83 + 1 <= 0x105) {
                                      											_push(_t45 + 1);
                                      											_push(_t93);
                                      											_push( &(( &_v595)[_t83]));
                                      											L00B114A4();
                                      											_t94 = FindFirstFileA( &_v595,  &_v334);
                                      											if(_t94 != 0xffffffff) {
                                      												FindClose(_t94);
                                      												_t54 =  &(_v334.cFileName);
                                      												_push(_t54);
                                      												L00B114AC();
                                      												if(_t54 + _t83 + 1 + 1 <= 0x105) {
                                      													 *((char*)(_t96 + _t83 - 0x24f)) = 0x5c;
                                      													_push(0x105 - _t83 - 1);
                                      													_push( &(_v334.cFileName));
                                      													_push( &(( &(( &_v595)[_t83]))[1]));
                                      													L00B114A4();
                                      													_t64 =  &(_v334.cFileName);
                                      													_push(_t64);
                                      													L00B114AC();
                                      													_t83 = _t83 + _t64 + 1;
                                      													_t93 = _t90;
                                      													continue;
                                      												}
                                      											}
                                      										}
                                      										goto L17;
                                      									}
                                      									_push(_v12);
                                      									_push( &_v595);
                                      									_push(_v8);
                                      									L00B114A4();
                                      								}
                                      							}
                                      						}
                                      					}
                                      				} else {
                                      					_t84 = GetProcAddress(_t91, "GetLongPathNameA");
                                      					if(_t84 == 0) {
                                      						goto L4;
                                      					} else {
                                      						_push(0x105);
                                      						_push( &_v595);
                                      						_push(_v8);
                                      						if( *_t84() == 0) {
                                      							goto L4;
                                      						} else {
                                      							_push(_v12);
                                      							_push( &_v595);
                                      							_push(_v8);
                                      							L00B114A4();
                                      						}
                                      					}
                                      				}
                                      				L17:
                                      				return _v16;
                                      			}



















                                      0x00b15a48
                                      0x00b15a4b
                                      0x00b15a51
                                      0x00b15a5e
                                      0x00b15a62
                                      0x00b15aa4
                                      0x00b15aaa
                                      0x00b15ae7
                                      0x00000000
                                      0x00b15aac
                                      0x00b15ab3
                                      0x00b15ac4
                                      0x00b15ac9
                                      0x00b15acf
                                      0x00b15ad7
                                      0x00b15adc
                                      0x00b15aea
                                      0x00b15aec
                                      0x00b15af2
                                      0x00b15af6
                                      0x00b15afd
                                      0x00b15afe
                                      0x00b15ba9
                                      0x00b15b10
                                      0x00b15b14
                                      0x00b15b21
                                      0x00b15b28
                                      0x00b15b29
                                      0x00b15b32
                                      0x00b15b33
                                      0x00b15b4b
                                      0x00b15b50
                                      0x00b15b53
                                      0x00b15b58
                                      0x00b15b5e
                                      0x00b15b5f
                                      0x00b15b6f
                                      0x00b15b71
                                      0x00b15b81
                                      0x00b15b88
                                      0x00b15b92
                                      0x00b15b93
                                      0x00b15b98
                                      0x00b15b9e
                                      0x00b15b9f
                                      0x00b15ba5
                                      0x00b15ba7
                                      0x00000000
                                      0x00b15ba7
                                      0x00b15b6f
                                      0x00b15b50
                                      0x00000000
                                      0x00b15b21
                                      0x00b15bb5
                                      0x00b15bbc
                                      0x00b15bc0
                                      0x00b15bc1
                                      0x00b15bc1
                                      0x00b15adc
                                      0x00b15ac9
                                      0x00b15ab3
                                      0x00b15a64
                                      0x00b15a6f
                                      0x00b15a73
                                      0x00000000
                                      0x00b15a75
                                      0x00b15a75
                                      0x00b15a80
                                      0x00b15a84
                                      0x00b15a89
                                      0x00000000
                                      0x00b15a8b
                                      0x00b15a8e
                                      0x00b15a95
                                      0x00b15a99
                                      0x00b15a9a
                                      0x00b15a9a
                                      0x00b15a89
                                      0x00b15a73
                                      0x00b15bc6
                                      0x00b15bcf

                                      APIs
                                      • GetModuleHandleA.KERNEL32(kernel32.dll,?,108B00BD,00BDC0A4,?,00B15C9C,00000000,00B15CF9,?,80000001,Software\Borland\Locales,00000000,000F0019,?,00000000,?), ref: 00B15A59
                                      • GetProcAddress.KERNEL32(00000000,GetLongPathNameA), ref: 00B15A6A
                                      • lstrcpyn.KERNEL32(?,?,?,?,108B00BD,00BDC0A4,?,00B15C9C,00000000,00B15CF9,?,80000001,Software\Borland\Locales,00000000,000F0019,?), ref: 00B15A9A
                                      • lstrcpyn.KERNEL32(?,?,?,kernel32.dll,?,108B00BD,00BDC0A4,?,00B15C9C,00000000,00B15CF9,?,80000001,Software\Borland\Locales,00000000,000F0019), ref: 00B15AFE
                                      • lstrcpyn.KERNEL32(?,?,00000001,?,?,?,kernel32.dll,?,108B00BD,00BDC0A4,?,00B15C9C,00000000,00B15CF9,?,80000001), ref: 00B15B33
                                      • FindFirstFileA.KERNEL32(?,?,?,?,00000001,?,?,?,kernel32.dll,?,108B00BD,00BDC0A4,?,00B15C9C,00000000,00B15CF9), ref: 00B15B46
                                      • FindClose.KERNEL32(00000000,?,?,?,?,00000001,?,?,?,kernel32.dll,?,108B00BD,00BDC0A4,?,00B15C9C,00000000), ref: 00B15B53
                                      • lstrlen.KERNEL32(?,00000000,?,?,?,?,00000001,?,?,?,kernel32.dll,?,108B00BD,00BDC0A4,?,00B15C9C), ref: 00B15B5F
                                      • lstrcpyn.KERNEL32(0000005D,?,00000104), ref: 00B15B93
                                      • lstrlen.KERNEL32(?,0000005D,?,00000104), ref: 00B15B9F
                                      • lstrcpyn.KERNEL32(?,0000005C,?,?,0000005D,?,00000104), ref: 00B15BC1
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.289505180.0000000000B11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B10000, based on PE: true
                                      • Associated: 00000000.00000002.289475761.0000000000B10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.289928975.0000000000BDC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.289986188.0000000000BE3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_b10000_loaddll32.jbxd
                                      Similarity
                                      • API ID: lstrcpyn$Findlstrlen$AddressCloseFileFirstHandleModuleProc
                                      • String ID: GetLongPathNameA$\$kernel32.dll
                                      • API String ID: 3245196872-1565342463
                                      • Opcode ID: 38b91c6a27818aac7f35f732d8a6879ee2ce141f3bbbffd431d8fcbf6f10ee71
                                      • Instruction ID: ae2bac29e959a5fcf3ac285ae5cd15cd20d9f33f42665212e2f459008d94d6b0
                                      • Opcode Fuzzy Hash: 38b91c6a27818aac7f35f732d8a6879ee2ce141f3bbbffd431d8fcbf6f10ee71
                                      • Instruction Fuzzy Hash: C2418D72D00619EBCB20DEA8CD85EDEB3ECDF84310F9805E1A549E7242D6349E848B54
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      C-Code - Quality: 79%
                                      			E00B39C84(void* __edi, struct HWND__* _a4, signed int _a8) {
                                      				struct _WINDOWPLACEMENT _v48;
                                      				void* __ebx;
                                      				void* __esi;
                                      				void* __ebp;
                                      				signed int _t19;
                                      				intOrPtr _t21;
                                      				struct HWND__* _t23;
                                      
                                      				_t19 = _a8;
                                      				_t23 = _a4;
                                      				if( *0xbdf91d != 0) {
                                      					if((_t19 & 0x00000003) == 0) {
                                      						if(IsIconic(_t23) == 0) {
                                      							GetWindowRect(_t23,  &(_v48.rcNormalPosition));
                                      						} else {
                                      							GetWindowPlacement(_t23,  &_v48);
                                      						}
                                      						return E00B39BF4( &(_v48.rcNormalPosition), _t19);
                                      					}
                                      					return 0x12340042;
                                      				}
                                      				_t21 =  *0xbdf8f8; // 0xb39c84
                                      				 *0xbdf8f8 = E00B39A84(1, _t19, _t21, __edi, _t23);
                                      				return  *0xbdf8f8(_t23, _t19);
                                      			}










                                      0x00b39c8c
                                      0x00b39c8f
                                      0x00b39c99
                                      0x00b39cc3
                                      0x00b39cd4
                                      0x00b39ce7
                                      0x00b39cd6
                                      0x00b39cdb
                                      0x00b39cdb
                                      0x00000000
                                      0x00b39cf1
                                      0x00000000
                                      0x00b39cc5
                                      0x00b39ca0
                                      0x00b39cad
                                      0x00000000

                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.289505180.0000000000B11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B10000, based on PE: true
                                      • Associated: 00000000.00000002.289475761.0000000000B10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.289928975.0000000000BDC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.289986188.0000000000BE3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_b10000_loaddll32.jbxd
                                      Similarity
                                      • API ID: AddressProc
                                      • String ID: MonitorFromWindow
                                      • API String ID: 190572456-2842599566
                                      • Opcode ID: 1089c745699b57353d40cf03929a965b94fb251c27e5ef003b10e89bb65545f9
                                      • Instruction ID: b991951716f12669871d463dc6b6b03fe4b5330b4941ea51bd8dc756ce668919
                                      • Opcode Fuzzy Hash: 1089c745699b57353d40cf03929a965b94fb251c27e5ef003b10e89bb65545f9
                                      • Instruction Fuzzy Hash: 4001D67194A119AA8B00EB549CC19FFB3ECEF01310FA440A2FC2293201EF759E4197E5
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      C-Code - Quality: 58%
                                      			E00B4047C(void* __eax, void* __ebx, void* __edi, void* __esi) {
                                      				char _v8;
                                      				CHAR* _t20;
                                      				long _t25;
                                      				intOrPtr _t30;
                                      				void* _t34;
                                      				intOrPtr _t37;
                                      
                                      				_push(0);
                                      				_t34 = __eax;
                                      				_push(_t37);
                                      				_push(0xb404f9);
                                      				_push( *[fs:eax]);
                                      				 *[fs:eax] = _t37;
                                      				E00B3FEDC(__eax);
                                      				_t25 = GetTickCount();
                                      				do {
                                      					Sleep(0);
                                      				} while (GetTickCount() - _t25 <= 0x3e8);
                                      				E00B3FADC(_t34, _t25,  &_v8, 0, __edi, _t34);
                                      				if(_v8 != 0) {
                                      					_t20 = E00B146E8(_v8);
                                      					WinHelpA( *((intOrPtr*)( *((intOrPtr*)( *((intOrPtr*)(_t34 + 0x1c)))) + 0xc))(), _t20, 9, 0);
                                      				}
                                      				_pop(_t30);
                                      				 *[fs:eax] = _t30;
                                      				_push(0xb40500);
                                      				return E00B14228( &_v8);
                                      			}









                                      0x00b4047f
                                      0x00b40483
                                      0x00b40487
                                      0x00b40488
                                      0x00b4048d
                                      0x00b40490
                                      0x00b40495
                                      0x00b4049f
                                      0x00b404a1
                                      0x00b404a3
                                      0x00b404af
                                      0x00b404bd
                                      0x00b404c6
                                      0x00b404cf
                                      0x00b404de
                                      0x00b404de
                                      0x00b404e5
                                      0x00b404e8
                                      0x00b404eb
                                      0x00b404f8

                                      APIs
                                        • Part of subcall function 00B3FEDC: WinHelpA.USER32 ref: 00B3FEEB
                                      • GetTickCount.KERNEL32 ref: 00B4049A
                                      • Sleep.KERNEL32(00000000,00000000,00B404F9,?,?,00000000,00000000,?,00B40472), ref: 00B404A3
                                      • GetTickCount.KERNEL32 ref: 00B404A8
                                      • WinHelpA.USER32 ref: 00B404DE
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.289505180.0000000000B11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B10000, based on PE: true
                                      • Associated: 00000000.00000002.289475761.0000000000B10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.289928975.0000000000BDC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.289986188.0000000000BE3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_b10000_loaddll32.jbxd
                                      Similarity
                                      • API ID: CountHelpTick$Sleep
                                      • String ID:
                                      • API String ID: 2438605093-0
                                      • Opcode ID: 2b94c82505cc659574e63988afe654d2d0468363cd37d88f47e7143899312a50
                                      • Instruction ID: 296048540e6c90164a09155595c880bbdf7346c0a0219e8f2f8fce3ba0d93ce4
                                      • Opcode Fuzzy Hash: 2b94c82505cc659574e63988afe654d2d0468363cd37d88f47e7143899312a50
                                      • Instruction Fuzzy Hash: 3501AD34710204AFE311FBA4DC52BADB3F8DB08B00FA141F1F600D7692DB749E409961
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      C-Code - Quality: 100%
                                      			E00B18F90(void* __eax) {
                                      				short _v6;
                                      				short _v8;
                                      				struct _FILETIME _v16;
                                      				struct _WIN32_FIND_DATAA _v336;
                                      				void* _t16;
                                      
                                      				_t16 = FindFirstFileA(E00B146E8(__eax),  &_v336);
                                      				if(_t16 == 0xffffffff) {
                                      					L3:
                                      					_v8 = 0xffffffff;
                                      				} else {
                                      					FindClose(_t16);
                                      					if((_v336.dwFileAttributes & 0x00000010) != 0) {
                                      						goto L3;
                                      					} else {
                                      						FileTimeToLocalFileTime( &(_v336.ftLastWriteTime),  &_v16);
                                      						if(FileTimeToDosDateTime( &_v16,  &_v6,  &_v8) == 0) {
                                      							goto L3;
                                      						}
                                      					}
                                      				}
                                      				return _v8;
                                      			}








                                      0x00b18fab
                                      0x00b18fb3
                                      0x00b18fe9
                                      0x00b18fe9
                                      0x00b18fb5
                                      0x00b18fb6
                                      0x00b18fc2
                                      0x00000000
                                      0x00b18fc4
                                      0x00b18fcf
                                      0x00b18fe7
                                      0x00000000
                                      0x00000000
                                      0x00b18fe7
                                      0x00b18fc2
                                      0x00b18ff7

                                      APIs
                                      • FindFirstFileA.KERNEL32(00000000,?), ref: 00B18FAB
                                      • FindClose.KERNEL32(00000000,00000000,?), ref: 00B18FB6
                                      • FileTimeToLocalFileTime.KERNEL32(?,?), ref: 00B18FCF
                                      • FileTimeToDosDateTime.KERNEL32 ref: 00B18FE0
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.289505180.0000000000B11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B10000, based on PE: true
                                      • Associated: 00000000.00000002.289475761.0000000000B10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.289928975.0000000000BDC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.289986188.0000000000BE3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_b10000_loaddll32.jbxd
                                      Similarity
                                      • API ID: FileTime$Find$CloseDateFirstLocal
                                      • String ID:
                                      • API String ID: 2659516521-0
                                      • Opcode ID: 9f61c25bb551bc6150c669710fa06ffe61ab05e2590045b11eab567f278e58f4
                                      • Instruction ID: 4e64f373137f00e847815323bdb81c59c11d917ac66319b8e1d3a889cee280b9
                                      • Opcode Fuzzy Hash: 9f61c25bb551bc6150c669710fa06ffe61ab05e2590045b11eab567f278e58f4
                                      • Instruction Fuzzy Hash: 52F0A476D0120C66CB20D7E58D859CEB3ECDB05314F9046E2B555D2191EA35DB854B91
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      C-Code - Quality: 58%
                                      			E00B353DC(void* __ebx) {
                                      				char _v260;
                                      				char _v264;
                                      				long _t21;
                                      				void* _t22;
                                      				intOrPtr _t27;
                                      				void* _t32;
                                      
                                      				_v264 = 0;
                                      				_push(_t32);
                                      				_push(0xb35478);
                                      				_push( *[fs:eax]);
                                      				 *[fs:eax] = _t32 + 0xfffffefc;
                                      				_t21 = GetLastError();
                                      				if(_t21 == 0 || FormatMessageA(0x1000, 0, _t21, 0x400,  &_v260, 0x100, 0) == 0) {
                                      					E00B35388(_t22);
                                      				} else {
                                      					E00B14498( &_v264, 0x100,  &_v260);
                                      					E00B1C1C4(_v264, 1);
                                      					E00B13BC0();
                                      				}
                                      				_pop(_t27);
                                      				 *[fs:eax] = _t27;
                                      				_push(0xb3547f);
                                      				return E00B14228( &_v264);
                                      			}









                                      0x00b353e8
                                      0x00b353f0
                                      0x00b353f1
                                      0x00b353f6
                                      0x00b353f9
                                      0x00b35401
                                      0x00b35405
                                      0x00b3545a
                                      0x00b3542b
                                      0x00b3543c
                                      0x00b3544e
                                      0x00b35453
                                      0x00b35453
                                      0x00b35461
                                      0x00b35464
                                      0x00b35467
                                      0x00b35477

                                      APIs
                                      • GetLastError.KERNEL32(00000000,00B35478), ref: 00B353FC
                                      • FormatMessageA.KERNEL32(00001000,00000000,00000000,00000400,?,00000100,00000000,00000000,00B35478), ref: 00B35422
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.289505180.0000000000B11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B10000, based on PE: true
                                      • Associated: 00000000.00000002.289475761.0000000000B10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.289928975.0000000000BDC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.289986188.0000000000BE3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_b10000_loaddll32.jbxd
                                      Similarity
                                      • API ID: ErrorFormatLastMessage
                                      • String ID:
                                      • API String ID: 3479602957-0
                                      • Opcode ID: d0dc2a26a13ccb9be1436574f7fe6e77c67b398234a9b9fc2d8a7fdab87db219
                                      • Instruction ID: f57de1951ddacf4c5d8b14a131f4cabcd1631afbd297d4daf9681fd69a1a7e11
                                      • Opcode Fuzzy Hash: d0dc2a26a13ccb9be1436574f7fe6e77c67b398234a9b9fc2d8a7fdab87db219
                                      • Instruction Fuzzy Hash: 6001A7702447456FE735EB60CC92BE973ECE758701FA144F0BA44A22C2EAF0ADC08A64
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      C-Code - Quality: 46%
                                      			E00B1D024(int __eax, void* __ebx, void* __eflags) {
                                      				char _v11;
                                      				char _v16;
                                      				intOrPtr _t28;
                                      				void* _t31;
                                      				void* _t33;
                                      
                                      				_t33 = __eflags;
                                      				_v16 = 0;
                                      				_push(_t31);
                                      				_push(0xb1d088);
                                      				_push( *[fs:edx]);
                                      				 *[fs:edx] = _t31 + 0xfffffff4;
                                      				GetLocaleInfoA(__eax, 0x1004,  &_v11, 7);
                                      				E00B14498( &_v16, 7,  &_v11);
                                      				_push(_v16);
                                      				E00B18C68(7, GetACP(), _t33);
                                      				_pop(_t28);
                                      				 *[fs:eax] = _t28;
                                      				_push(0xb1d08f);
                                      				return E00B14228( &_v16);
                                      			}








                                      0x00b1d024
                                      0x00b1d02d
                                      0x00b1d032
                                      0x00b1d033
                                      0x00b1d038
                                      0x00b1d03b
                                      0x00b1d04a
                                      0x00b1d05a
                                      0x00b1d062
                                      0x00b1d06b
                                      0x00b1d074
                                      0x00b1d077
                                      0x00b1d07a
                                      0x00b1d087

                                      APIs
                                      • GetLocaleInfoA.KERNEL32(?,00001004,?,00000007,00000000,00B1D088), ref: 00B1D04A
                                      • GetACP.KERNEL32(?,?,00001004,?,00000007,00000000,00B1D088), ref: 00B1D063
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.289505180.0000000000B11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B10000, based on PE: true
                                      • Associated: 00000000.00000002.289475761.0000000000B10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.289928975.0000000000BDC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.289986188.0000000000BE3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_b10000_loaddll32.jbxd
                                      Similarity
                                      • API ID: InfoLocale
                                      • String ID:
                                      • API String ID: 2299586839-0
                                      • Opcode ID: d0c5e7705b33d91ee7bdd2e9d8c57bf6c3fc992749fdb7820dcc05f71c2e4fa9
                                      • Instruction ID: fb02a9a21edc6c043f2241941b7a0690940d0bda64e55b8059ae7390c858ba0d
                                      • Opcode Fuzzy Hash: d0c5e7705b33d91ee7bdd2e9d8c57bf6c3fc992749fdb7820dcc05f71c2e4fa9
                                      • Instruction Fuzzy Hash: 0CF09671E04208AFEB00EBA1D852DDDB7EAE789710F90C5B4B11096691EA7465848650
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      C-Code - Quality: 100%
                                      			E00B19114(CHAR* _a4, intOrPtr* _a8, intOrPtr* _a12) {
                                      				long _v8;
                                      				long _v12;
                                      				long _v16;
                                      				long _v20;
                                      				intOrPtr _v24;
                                      				signed int _v28;
                                      				CHAR* _t25;
                                      				int _t26;
                                      				intOrPtr _t31;
                                      				intOrPtr _t34;
                                      				intOrPtr* _t37;
                                      				intOrPtr* _t38;
                                      				intOrPtr _t46;
                                      				intOrPtr _t48;
                                      
                                      				_t25 = _a4;
                                      				if(_t25 == 0) {
                                      					_t25 = 0;
                                      				}
                                      				_t26 = GetDiskFreeSpaceA(_t25,  &_v8,  &_v12,  &_v16,  &_v20);
                                      				_v28 = _v8 * _v12;
                                      				_v24 = 0;
                                      				_t46 = _v24;
                                      				_t31 = E00B152BC(_v28, _t46, _v16, 0);
                                      				_t37 = _a8;
                                      				 *_t37 = _t31;
                                      				 *((intOrPtr*)(_t37 + 4)) = _t46;
                                      				_t48 = _v24;
                                      				_t34 = E00B152BC(_v28, _t48, _v20, 0);
                                      				_t38 = _a12;
                                      				 *_t38 = _t34;
                                      				 *((intOrPtr*)(_t38 + 4)) = _t48;
                                      				return _t26;
                                      			}

















                                      0x00b1911b
                                      0x00b19120
                                      0x00b19122
                                      0x00b19122
                                      0x00b19135
                                      0x00b19144
                                      0x00b19147
                                      0x00b19154
                                      0x00b19157
                                      0x00b1915c
                                      0x00b1915f
                                      0x00b19161
                                      0x00b1916e
                                      0x00b19171
                                      0x00b19176
                                      0x00b19179
                                      0x00b1917b
                                      0x00b19184

                                      APIs
                                      • GetDiskFreeSpaceA.KERNEL32(?,?,?,?,?), ref: 00B19135
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.289505180.0000000000B11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B10000, based on PE: true
                                      • Associated: 00000000.00000002.289475761.0000000000B10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.289928975.0000000000BDC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.289986188.0000000000BE3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_b10000_loaddll32.jbxd
                                      Similarity
                                      • API ID: DiskFreeSpace
                                      • String ID:
                                      • API String ID: 1705453755-0
                                      • Opcode ID: 13bd77e9d43a1e7e74ae15c6d85478154ed17cb5e6915e1f6b17b1dce90fc017
                                      • Instruction ID: 2045ce4f8d0c1148b19e6bce6dd61e7b446fb9f81426f0819bc97aa97fa550b6
                                      • Opcode Fuzzy Hash: 13bd77e9d43a1e7e74ae15c6d85478154ed17cb5e6915e1f6b17b1dce90fc017
                                      • Instruction Fuzzy Hash: C7110CB5A00609AF9B00CF99C8819EFB7F9EFC8300B54C569A418E7250E6319A418BA0
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      C-Code - Quality: 53%
                                      			E00B3CFCC(intOrPtr __eax, intOrPtr* __edx) {
                                      				intOrPtr _v8;
                                      				intOrPtr _t12;
                                      				intOrPtr _t21;
                                      				intOrPtr _t22;
                                      				intOrPtr _t25;
                                      
                                      				_v8 = __eax;
                                      				_t22 =  *__edx;
                                      				_t26 = _t22 - 0x113;
                                      				if(_t22 != 0x113) {
                                      					_push( *((intOrPtr*)(__edx + 8)));
                                      					_push( *((intOrPtr*)(__edx + 4)));
                                      					_push(_t22);
                                      					_t12 =  *((intOrPtr*)(_v8 + 0x34));
                                      					_push(_t12);
                                      					L00B170B4();
                                      					 *((intOrPtr*)(__edx + 0xc)) = _t12;
                                      					return _t12;
                                      				}
                                      				_push(0xb3d006);
                                      				_push( *[fs:eax]);
                                      				 *[fs:eax] = _t25;
                                      				E00B13584(_v8, _t26);
                                      				_pop(_t21);
                                      				 *[fs:eax] = _t21;
                                      				return 0;
                                      			}








                                      0x00b3cfd5
                                      0x00b3cfd8
                                      0x00b3cfda
                                      0x00b3cfe0
                                      0x00b3d024
                                      0x00b3d028
                                      0x00b3d029
                                      0x00b3d02d
                                      0x00b3d030
                                      0x00b3d031
                                      0x00b3d036
                                      0x00000000
                                      0x00b3d036
                                      0x00b3cfe5
                                      0x00b3cfea
                                      0x00b3cfed
                                      0x00b3cff7
                                      0x00b3cffe
                                      0x00b3d001
                                      0x00000000

                                      APIs
                                      • NtdllDefWindowProc_A.USER32(?,?,?,?), ref: 00B3D031
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.289505180.0000000000B11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B10000, based on PE: true
                                      • Associated: 00000000.00000002.289475761.0000000000B10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.289928975.0000000000BDC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.289986188.0000000000BE3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_b10000_loaddll32.jbxd
                                      Similarity
                                      • API ID: NtdllProc_Window
                                      • String ID:
                                      • API String ID: 4255912815-0
                                      • Opcode ID: bfffa3abf335e94d33228d4b7607d46bf7cc8cef2e15ea2f13d5cfbf2634be82
                                      • Instruction ID: 640bbc83dea8a3b8e4d5901657bc851a23df223f29a29b569f4773103dd34d09
                                      • Opcode Fuzzy Hash: bfffa3abf335e94d33228d4b7607d46bf7cc8cef2e15ea2f13d5cfbf2634be82
                                      • Instruction Fuzzy Hash: B4F09676604204EF9B14DF9AE891C96B7ECEB4DB60B6140E6F904D7641D631AD00CB70
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      C-Code - Quality: 94%
                                      			E00B3596C(intOrPtr __eax, intOrPtr __edx) {
                                      				intOrPtr _v8;
                                      				intOrPtr _v12;
                                      				char _v48;
                                      				struct _SYSTEM_INFO* _t17;
                                      				unsigned int _t20;
                                      				unsigned int _t22;
                                      				signed int _t31;
                                      				intOrPtr _t33;
                                      
                                      				_v12 = __edx;
                                      				_v8 = __eax;
                                      				_t17 =  &_v48;
                                      				GetSystemInfo(_t17);
                                      				_t33 = _v8;
                                      				_t31 = _v12 - 1;
                                      				if(_t31 >= 0) {
                                      					if( *((short*)( &_v48 + 0x20)) == 3) {
                                      						do {
                                      							_t20 =  *(_t33 + _t31 * 4) >> 0x10;
                                      							 *(_t33 + _t31 * 4) = _t20;
                                      							_t31 = _t31 - 1;
                                      						} while (_t31 >= 0);
                                      						return _t20;
                                      					} else {
                                      						goto L2;
                                      					}
                                      					do {
                                      						L2:
                                      						asm("bswap eax");
                                      						_t22 =  *(_t33 + _t31 * 4) >> 8;
                                      						 *(_t33 + _t31 * 4) = _t22;
                                      						_t31 = _t31 - 1;
                                      					} while (_t31 >= 0);
                                      					return _t22;
                                      				}
                                      				return _t17;
                                      			}











                                      0x00b35972
                                      0x00b35975
                                      0x00b35978
                                      0x00b3597c
                                      0x00b35981
                                      0x00b35987
                                      0x00b35988
                                      0x00b35992
                                      0x00b359a5
                                      0x00b359ae
                                      0x00b359b6
                                      0x00b359b9
                                      0x00b359b9
                                      0x00000000
                                      0x00000000
                                      0x00000000
                                      0x00000000
                                      0x00b35994
                                      0x00b35994
                                      0x00b35997
                                      0x00b35999
                                      0x00b3599c
                                      0x00b3599f
                                      0x00b3599f
                                      0x00000000
                                      0x00b35994
                                      0x00b359c0

                                      APIs
                                      • GetSystemInfo.KERNEL32(?), ref: 00B3597C
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.289505180.0000000000B11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B10000, based on PE: true
                                      • Associated: 00000000.00000002.289475761.0000000000B10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.289928975.0000000000BDC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.289986188.0000000000BE3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_b10000_loaddll32.jbxd
                                      Similarity
                                      • API ID: InfoSystem
                                      • String ID:
                                      • API String ID: 31276548-0
                                      • Opcode ID: c6048104c638c541340ce2ec1bb51321c2e4c5cd6fcf2df8e8ab43e7b8385c1d
                                      • Instruction ID: f2ac3e6ec41113541e8dfa41a40217f20c9f03380b2af17cc0ae7879b619692f
                                      • Opcode Fuzzy Hash: c6048104c638c541340ce2ec1bb51321c2e4c5cd6fcf2df8e8ab43e7b8385c1d
                                      • Instruction Fuzzy Hash: 18F06271A01509DBCF25DF98C484998B7F4FB96311B6182E9D448DB242EB30A695CB91
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      C-Code - Quality: 51%
                                      			E00B16508(int __eax, void* __ebx, void* __eflags) {
                                      				char _v8;
                                      				char _v15;
                                      				char _v20;
                                      				intOrPtr _t29;
                                      				void* _t32;
                                      
                                      				_v20 = 0;
                                      				_push(_t32);
                                      				_push(0xb1656e);
                                      				_push( *[fs:edx]);
                                      				 *[fs:edx] = _t32 + 0xfffffff0;
                                      				GetLocaleInfoA(__eax, 0x1004,  &_v15, 7);
                                      				E00B14498( &_v20, 7,  &_v15);
                                      				E00B12D90(_v20,  &_v8);
                                      				if(_v8 != 0) {
                                      				}
                                      				_pop(_t29);
                                      				 *[fs:eax] = _t29;
                                      				_push(0xb16575);
                                      				return E00B14228( &_v20);
                                      			}








                                      0x00b16511
                                      0x00b16516
                                      0x00b16517
                                      0x00b1651c
                                      0x00b1651f
                                      0x00b1652e
                                      0x00b1653e
                                      0x00b16549
                                      0x00b16554
                                      0x00b16554
                                      0x00b1655a
                                      0x00b1655d
                                      0x00b16560
                                      0x00b1656d

                                      APIs
                                      • GetLocaleInfoA.KERNEL32(?,00001004,?,00000007,00000000,00B1656E), ref: 00B1652E
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.289505180.0000000000B11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B10000, based on PE: true
                                      • Associated: 00000000.00000002.289475761.0000000000B10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.289928975.0000000000BDC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.289986188.0000000000BE3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_b10000_loaddll32.jbxd
                                      Similarity
                                      • API ID: InfoLocale
                                      • String ID:
                                      • API String ID: 2299586839-0
                                      • Opcode ID: 0ae39c12f0d91face782093657f2b79059c388b5e481c55ee3cf0487611fcbfe
                                      • Instruction ID: 124ce78c45609e8000d3851f3fdb39c506f76db6b0ef9dac69711025a176b826
                                      • Opcode Fuzzy Hash: 0ae39c12f0d91face782093657f2b79059c388b5e481c55ee3cf0487611fcbfe
                                      • Instruction Fuzzy Hash: FBF0683090430DAFEB15DF95CC42ADEB3F7F785710F8189B5B51457594EBB42684C690
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      C-Code - Quality: 100%
                                      			E00B1BA08(int __eax, void* __ecx, int __edx, intOrPtr _a4) {
                                      				char _v260;
                                      				int _t5;
                                      				intOrPtr _t10;
                                      				void* _t18;
                                      
                                      				_t18 = __ecx;
                                      				_t10 = _a4;
                                      				_t5 = GetLocaleInfoA(__eax, __edx,  &_v260, 0x100);
                                      				_t19 = _t5;
                                      				if(_t5 <= 0) {
                                      					return E00B1427C(_t10, _t18);
                                      				}
                                      				return E00B14318(_t10, _t5 - 1,  &_v260, _t19);
                                      			}







                                      0x00b1ba13
                                      0x00b1ba15
                                      0x00b1ba26
                                      0x00b1ba2b
                                      0x00b1ba2d
                                      0x00000000
                                      0x00b1ba45
                                      0x00000000

                                      APIs
                                      • GetLocaleInfoA.KERNEL32(?,?,?,00000100), ref: 00B1BA26
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.289505180.0000000000B11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B10000, based on PE: true
                                      • Associated: 00000000.00000002.289475761.0000000000B10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.289928975.0000000000BDC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.289986188.0000000000BE3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_b10000_loaddll32.jbxd
                                      Similarity
                                      • API ID: InfoLocale
                                      • String ID:
                                      • API String ID: 2299586839-0
                                      • Opcode ID: f6a94eead9cefece2eb5aac40f5f9a21e6d9853252b509449bec8942537678e6
                                      • Instruction ID: 7912498c9da0cb3267172479b9f0883a62d7812d6fbcd839695e7223261e391c
                                      • Opcode Fuzzy Hash: f6a94eead9cefece2eb5aac40f5f9a21e6d9853252b509449bec8942537678e6
                                      • Instruction Fuzzy Hash: 18E09231B1021856D714A5699C82EE6729CDB58310F8042BAB904C7352EEB09DC046E9
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      C-Code - Quality: 100%
                                      			E00B1C9CC() {
                                      				char _v128;
                                      				intOrPtr _v132;
                                      				signed int _v136;
                                      				intOrPtr _v140;
                                      				intOrPtr _v144;
                                      				int _t7;
                                      				struct _OSVERSIONINFOA* _t18;
                                      
                                      				_t18->dwOSVersionInfoSize = 0x94;
                                      				_t7 = GetVersionExA(_t18);
                                      				if(_t7 != 0) {
                                      					 *0xbdc0d4 = _v132;
                                      					 *0xbdc0d8 = _v144;
                                      					 *0xbdc0dc = _v140;
                                      					if( *0xbdc0d4 != 1) {
                                      						 *0xbdc0e0 = _v136;
                                      					} else {
                                      						 *0xbdc0e0 = _v136 & 0x0000ffff;
                                      					}
                                      					return E00B14498(0xbdc0e4, 0x80,  &_v128);
                                      				}
                                      				return _t7;
                                      			}










                                      0x00b1c9d2
                                      0x00b1c9da
                                      0x00b1c9e1
                                      0x00b1c9e7
                                      0x00b1c9f0
                                      0x00b1c9f9
                                      0x00b1ca05
                                      0x00b1ca1b
                                      0x00b1ca07
                                      0x00b1ca10
                                      0x00b1ca10
                                      0x00000000
                                      0x00b1ca2e
                                      0x00b1ca39

                                      APIs
                                      • GetVersionExA.KERNEL32(?,00B1E284,00000000,00B1E29C), ref: 00B1C9DA
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.289505180.0000000000B11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B10000, based on PE: true
                                      • Associated: 00000000.00000002.289475761.0000000000B10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.289928975.0000000000BDC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.289986188.0000000000BE3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_b10000_loaddll32.jbxd
                                      Similarity
                                      • API ID: Version
                                      • String ID:
                                      • API String ID: 1889659487-0
                                      • Opcode ID: a4e4527b83b9f91104414c971f784cd38f9905df75f3ae8a1499f9c40856c296
                                      • Instruction ID: 20a05ffa850ba3d83b4185418fd8157321804a4a3d9c87b85b1f1adf1245d9c7
                                      • Opcode Fuzzy Hash: a4e4527b83b9f91104414c971f784cd38f9905df75f3ae8a1499f9c40856c296
                                      • Instruction Fuzzy Hash: C4F01770985302CFC300DF28D951755BBE4EB48310F80896AE499C7790FB348844CB52
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      C-Code - Quality: 79%
                                      			E00B1BA54(int __eax, char __ecx, int __edx) {
                                      				char _v16;
                                      				char _t5;
                                      				char _t6;
                                      
                                      				_push(__ecx);
                                      				_t6 = __ecx;
                                      				if(GetLocaleInfoA(__eax, __edx,  &_v16, 2) <= 0) {
                                      					_t5 = _t6;
                                      				} else {
                                      					_t5 = _v16;
                                      				}
                                      				return _t5;
                                      			}






                                      0x00b1ba57
                                      0x00b1ba58
                                      0x00b1ba6e
                                      0x00b1ba75
                                      0x00b1ba70
                                      0x00b1ba70
                                      0x00b1ba70
                                      0x00b1ba7b

                                      APIs
                                      • GetLocaleInfoA.KERNEL32(00000000,0000000F,?,00000002,0000002C,?,?,00000000,00B1D336,00000000,00B1D54F,?,?,00000000,00000000), ref: 00B1BA67
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.289505180.0000000000B11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B10000, based on PE: true
                                      • Associated: 00000000.00000002.289475761.0000000000B10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.289928975.0000000000BDC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.289986188.0000000000BE3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_b10000_loaddll32.jbxd
                                      Similarity
                                      • API ID: InfoLocale
                                      • String ID:
                                      • API String ID: 2299586839-0
                                      • Opcode ID: fd5ba39e849951279b5acf8a6e5d147b96b911ad66fa8928d55352a2fae2e1b6
                                      • Instruction ID: 4f4cd961628863b6ff964c9a13f3cdffe7e0bf0da0ff232a753258f2f6f4994b
                                      • Opcode Fuzzy Hash: fd5ba39e849951279b5acf8a6e5d147b96b911ad66fa8928d55352a2fae2e1b6
                                      • Instruction Fuzzy Hash: 45D05E6631E2907AE310555A6D85DFB4BDCCEC57A0F5040B9B588C6212D6008C469371
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      C-Code - Quality: 100%
                                      			E00B1A4C0() {
                                      				struct _SYSTEMTIME* _t2;
                                      
                                      				GetLocalTime(_t2);
                                      				return _t2->wYear;
                                      			}




                                      0x00b1a4c4
                                      0x00b1a4d0

                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.289505180.0000000000B11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B10000, based on PE: true
                                      • Associated: 00000000.00000002.289475761.0000000000B10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.289928975.0000000000BDC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.289986188.0000000000BE3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_b10000_loaddll32.jbxd
                                      Similarity
                                      • API ID: LocalTime
                                      • String ID:
                                      • API String ID: 481472006-0
                                      • Opcode ID: 7aadbfac04d8761d49b717b560fbde9be9c670a3c2a0388696d83df2bc3f1af8
                                      • Instruction ID: 797702ccb6f6ed15d5b583011a1e26ddbd9fbf972309fc1f9b0772a5b2687a7c
                                      • Opcode Fuzzy Hash: 7aadbfac04d8761d49b717b560fbde9be9c670a3c2a0388696d83df2bc3f1af8
                                      • Instruction Fuzzy Hash: F6A01128808802028280332C0C032AA3280E800A20FC80BE0ACF8003E2EA2A02A082EB
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      C-Code - Quality: 100%
                                      			E00B1E7C4() {
                                      				struct HINSTANCE__* _v8;
                                      				intOrPtr _t46;
                                      				void* _t91;
                                      
                                      				_v8 = GetModuleHandleA("oleaut32.dll");
                                      				 *0xbdf7a8 = E00B1E798("VariantChangeTypeEx", E00B1E314, _t91);
                                      				 *0xbdf7ac = E00B1E798("VarNeg", E00B1E344, _t91);
                                      				 *0xbdf7b0 = E00B1E798("VarNot", E00B1E344, _t91);
                                      				 *0xbdf7b4 = E00B1E798("VarAdd", E00B1E350, _t91);
                                      				 *0xbdf7b8 = E00B1E798("VarSub", E00B1E350, _t91);
                                      				 *0xbdf7bc = E00B1E798("VarMul", E00B1E350, _t91);
                                      				 *0xbdf7c0 = E00B1E798("VarDiv", E00B1E350, _t91);
                                      				 *0xbdf7c4 = E00B1E798("VarIdiv", E00B1E350, _t91);
                                      				 *0xbdf7c8 = E00B1E798("VarMod", E00B1E350, _t91);
                                      				 *0xbdf7cc = E00B1E798("VarAnd", E00B1E350, _t91);
                                      				 *0xbdf7d0 = E00B1E798("VarOr", E00B1E350, _t91);
                                      				 *0xbdf7d4 = E00B1E798("VarXor", E00B1E350, _t91);
                                      				 *0xbdf7d8 = E00B1E798("VarCmp", E00B1E35C, _t91);
                                      				 *0xbdf7dc = E00B1E798("VarI4FromStr", E00B1E368, _t91);
                                      				 *0xbdf7e0 = E00B1E798("VarR4FromStr", E00B1E3D4, _t91);
                                      				 *0xbdf7e4 = E00B1E798("VarR8FromStr", E00B1E440, _t91);
                                      				 *0xbdf7e8 = E00B1E798("VarDateFromStr", E00B1E4AC, _t91);
                                      				 *0xbdf7ec = E00B1E798("VarCyFromStr", E00B1E518, _t91);
                                      				 *0xbdf7f0 = E00B1E798("VarBoolFromStr", E00B1E584, _t91);
                                      				 *0xbdf7f4 = E00B1E798("VarBstrFromCy", E00B1E604, _t91);
                                      				 *0xbdf7f8 = E00B1E798("VarBstrFromDate", E00B1E674, _t91);
                                      				_t46 = E00B1E798("VarBstrFromBool", E00B1E6E4, _t91);
                                      				 *0xbdf7fc = _t46;
                                      				return _t46;
                                      			}






                                      0x00b1e7d2
                                      0x00b1e7e6
                                      0x00b1e7fc
                                      0x00b1e812
                                      0x00b1e828
                                      0x00b1e83e
                                      0x00b1e854
                                      0x00b1e86a
                                      0x00b1e880
                                      0x00b1e896
                                      0x00b1e8ac
                                      0x00b1e8c2
                                      0x00b1e8d8
                                      0x00b1e8ee
                                      0x00b1e904
                                      0x00b1e91a
                                      0x00b1e930
                                      0x00b1e946
                                      0x00b1e95c
                                      0x00b1e972
                                      0x00b1e988
                                      0x00b1e99e
                                      0x00b1e9ae
                                      0x00b1e9b4
                                      0x00b1e9bb

                                      APIs
                                      • GetModuleHandleA.KERNEL32(oleaut32.dll), ref: 00B1E7CD
                                        • Part of subcall function 00B1E798: GetProcAddress.KERNEL32(00000000), ref: 00B1E7B1
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.289505180.0000000000B11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B10000, based on PE: true
                                      • Associated: 00000000.00000002.289475761.0000000000B10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.289928975.0000000000BDC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.289986188.0000000000BE3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_b10000_loaddll32.jbxd
                                      Similarity
                                      • API ID: AddressHandleModuleProc
                                      • String ID: VarAdd$VarAnd$VarBoolFromStr$VarBstrFromBool$VarBstrFromCy$VarBstrFromDate$VarCmp$VarCyFromStr$VarDateFromStr$VarDiv$VarI4FromStr$VarIdiv$VarMod$VarMul$VarNeg$VarNot$VarOr$VarR4FromStr$VarR8FromStr$VarSub$VarXor$VariantChangeTypeEx$oleaut32.dll
                                      • API String ID: 1646373207-1918263038
                                      • Opcode ID: eaf722e628326499179a76704d4fe243144795cb7da050066311ae9a6db73b45
                                      • Instruction ID: d05a7b96f3bb116504805e21a1b52b8af5c62d5960351f390ad4ee1c88ac8b89
                                      • Opcode Fuzzy Hash: eaf722e628326499179a76704d4fe243144795cb7da050066311ae9a6db73b45
                                      • Instruction Fuzzy Hash: 7141FB626493099A73446B6D78514EAFBDDEE447203E044BBFC36CB799ED30ECC04A29
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      C-Code - Quality: 52%
                                      			E00B35628(struct HDC__* __eax, void* __ebx, int __ecx, int __edx, void* __edi, void* __esi, int _a4, int _a8, struct HDC__* _a12, int _a16, int _a20, int _a24, int _a28, struct HDC__* _a32, int _a36, int _a40) {
                                      				int _v8;
                                      				int _v12;
                                      				char _v13;
                                      				struct HDC__* _v20;
                                      				void* _v24;
                                      				void* _v28;
                                      				long _v32;
                                      				long _v36;
                                      				intOrPtr _v40;
                                      				intOrPtr* _t78;
                                      				intOrPtr _t87;
                                      				struct HDC__* _t88;
                                      				intOrPtr _t91;
                                      				struct HDC__* _t92;
                                      				struct HDC__* _t135;
                                      				int _t162;
                                      				intOrPtr _t169;
                                      				intOrPtr _t171;
                                      				struct HDC__* _t173;
                                      				int _t175;
                                      				void* _t177;
                                      				void* _t178;
                                      				intOrPtr _t179;
                                      
                                      				_t177 = _t178;
                                      				_t179 = _t178 + 0xffffffdc;
                                      				_v12 = __ecx;
                                      				_v8 = __edx;
                                      				_t173 = __eax;
                                      				_t175 = _a16;
                                      				_t162 = _a20;
                                      				_v13 = 1;
                                      				_t78 =  *0xbde62c; // 0xbdc0d4
                                      				if( *_t78 != 2 || _t162 != _a40 || _t175 != _a36) {
                                      					_v40 = 0;
                                      					_push(0);
                                      					L00B16E94();
                                      					_v20 = E00B35484(0);
                                      					_push(_t177);
                                      					_push(0xb358a8);
                                      					_push( *[fs:eax]);
                                      					 *[fs:eax] = _t179;
                                      					_push(_t175);
                                      					_push(_t162);
                                      					_push(_a32);
                                      					L00B16E8C();
                                      					_v24 = E00B35484(_a32);
                                      					_v28 = SelectObject(_v20, _v24);
                                      					_push(0);
                                      					_t87 =  *0xbdf894; // 0x350808d9
                                      					_push(_t87);
                                      					_t88 = _a32;
                                      					_push(_t88);
                                      					L00B16FC4();
                                      					_v40 = _t88;
                                      					_push(0);
                                      					_push(_v40);
                                      					_push(_a32);
                                      					L00B16FC4();
                                      					if(_v40 == 0) {
                                      						_push(0xffffffff);
                                      						_t91 =  *0xbdf894; // 0x350808d9
                                      						_push(_t91);
                                      						_t92 = _v20;
                                      						_push(_t92);
                                      						L00B16FC4();
                                      						_v40 = _t92;
                                      					} else {
                                      						_push(0xffffffff);
                                      						_push(_v40);
                                      						_t135 = _v20;
                                      						_push(_t135);
                                      						L00B16FC4();
                                      						_v40 = _t135;
                                      					}
                                      					_push(_v20);
                                      					L00B16F9C();
                                      					StretchBlt(_v20, 0, 0, _t162, _t175, _a12, _a8, _a4, _t162, _t175, 0xcc0020);
                                      					StretchBlt(_v20, 0, 0, _t162, _t175, _a32, _a28, _a24, _t162, _t175, 0x440328);
                                      					_v32 = SetTextColor(_t173, 0);
                                      					_v36 = SetBkColor(_t173, 0xffffff);
                                      					StretchBlt(_t173, _v8, _v12, _a40, _a36, _a12, _a8, _a4, _t162, _t175, 0x8800c6);
                                      					StretchBlt(_t173, _v8, _v12, _a40, _a36, _v20, 0, 0, _t162, _t175, 0x660046);
                                      					SetTextColor(_t173, _v32);
                                      					SetBkColor(_t173, _v36);
                                      					if(_v28 != 0) {
                                      						SelectObject(_v20, _v28);
                                      					}
                                      					DeleteObject(_v24);
                                      					_pop(_t169);
                                      					 *[fs:eax] = _t169;
                                      					_push(0xb358af);
                                      					if(_v40 != 0) {
                                      						_push(0);
                                      						_push(_v40);
                                      						_push(_v20);
                                      						L00B16FC4();
                                      					}
                                      					return DeleteDC(_v20);
                                      				} else {
                                      					_push(1);
                                      					_push(1);
                                      					_push(_a32);
                                      					L00B16E8C();
                                      					_v24 = E00B35484(_a32);
                                      					_v24 = SelectObject(_a12, _v24);
                                      					_push(_t177);
                                      					_push(0xb356fb);
                                      					_push( *[fs:eax]);
                                      					 *[fs:eax] = _t179;
                                      					MaskBlt(_t173, _v8, _v12, _a40, _a36, _a32, _a28, _a24, _v24, _a8, _a4, E00B17590(0xaa0029, 0xcc0020));
                                      					_pop(_t171);
                                      					 *[fs:eax] = _t171;
                                      					_push(0xb358af);
                                      					_v24 = SelectObject(_a12, _v24);
                                      					return DeleteObject(_v24);
                                      				}
                                      			}


























                                      0x00b35629
                                      0x00b3562b
                                      0x00b35631
                                      0x00b35634
                                      0x00b35637
                                      0x00b35639
                                      0x00b3563c
                                      0x00b3563f
                                      0x00b35643
                                      0x00b3564b
                                      0x00b35704
                                      0x00b35707
                                      0x00b35709
                                      0x00b35713
                                      0x00b35718
                                      0x00b35719
                                      0x00b3571e
                                      0x00b35721
                                      0x00b35724
                                      0x00b35725
                                      0x00b35729
                                      0x00b3572a
                                      0x00b35734
                                      0x00b35744
                                      0x00b35747
                                      0x00b35749
                                      0x00b3574e
                                      0x00b3574f
                                      0x00b35752
                                      0x00b35753
                                      0x00b35758
                                      0x00b3575b
                                      0x00b35760
                                      0x00b35764
                                      0x00b35765
                                      0x00b3576e
                                      0x00b35784
                                      0x00b35786
                                      0x00b3578b
                                      0x00b3578c
                                      0x00b3578f
                                      0x00b35790
                                      0x00b35795
                                      0x00b35770
                                      0x00b35770
                                      0x00b35775
                                      0x00b35776
                                      0x00b35779
                                      0x00b3577a
                                      0x00b3577f
                                      0x00b3577f
                                      0x00b3579b
                                      0x00b3579c
                                      0x00b357be
                                      0x00b357e0
                                      0x00b357ed
                                      0x00b357fb
                                      0x00b35822
                                      0x00b35847
                                      0x00b35851
                                      0x00b3585b
                                      0x00b35864
                                      0x00b3586e
                                      0x00b3586e
                                      0x00b35877
                                      0x00b3587e
                                      0x00b35881
                                      0x00b35884
                                      0x00b3588d
                                      0x00b3588f
                                      0x00b35894
                                      0x00b35898
                                      0x00b35899
                                      0x00b35899
                                      0x00b358a7
                                      0x00b35663
                                      0x00b35663
                                      0x00b35665
                                      0x00b3566a
                                      0x00b3566b
                                      0x00b35675
                                      0x00b35685
                                      0x00b3568a
                                      0x00b3568b
                                      0x00b35690
                                      0x00b35693
                                      0x00b356cf
                                      0x00b356d6
                                      0x00b356d9
                                      0x00b356dc
                                      0x00b356ee
                                      0x00b356fa
                                      0x00b356fa

                                      APIs
                                      • 73BEA520.GDI32(?,00000001,00000001), ref: 00B3566B
                                      • SelectObject.GDI32(?,?), ref: 00B35680
                                      • MaskBlt.GDI32(?,?,?,?,?,?,?,?,?,?,?,00000000,00000000,00B356FB,?,?), ref: 00B356CF
                                      • SelectObject.GDI32(?,?), ref: 00B356E9
                                      • DeleteObject.GDI32(?), ref: 00B356F5
                                      • 73BEA590.GDI32(00000000), ref: 00B35709
                                      • 73BEA520.GDI32(?,?,?,00000000,00B358A8,?,00000000), ref: 00B3572A
                                      • SelectObject.GDI32(?,?), ref: 00B3573F
                                      • 73BEB410.GDI32(?,350808D9,00000000,?,?,?,?,?,00000000,00B358A8,?,00000000), ref: 00B35753
                                      • 73BEB410.GDI32(?,?,00000000,?,350808D9,00000000,?,?,?,?,?,00000000,00B358A8,?,00000000), ref: 00B35765
                                      • 73BEB410.GDI32(?,00000000,000000FF,?,?,00000000,?,350808D9,00000000,?,?,?,?,?,00000000,00B358A8), ref: 00B3577A
                                      • 73BEB410.GDI32(?,350808D9,000000FF,?,?,00000000,?,350808D9,00000000,?,?,?,?,?,00000000,00B358A8), ref: 00B35790
                                      • 73BEB150.GDI32(?,?,350808D9,000000FF,?,?,00000000,?,350808D9,00000000,?,?,?,?,?,00000000), ref: 00B3579C
                                      • StretchBlt.GDI32(?,00000000,00000000,?,?,?,?,?,?,?,00CC0020), ref: 00B357BE
                                      • StretchBlt.GDI32(?,00000000,00000000,?,?,00000000,?,?,?,?,00440328), ref: 00B357E0
                                      • SetTextColor.GDI32(?,00000000), ref: 00B357E8
                                      • SetBkColor.GDI32(?,00FFFFFF), ref: 00B357F6
                                      • StretchBlt.GDI32(?,?,?,?,?,?,?,?,?,?,008800C6), ref: 00B35822
                                      • StretchBlt.GDI32(?,?,?,?,?,?,00000000,00000000,?,?,00660046), ref: 00B35847
                                      • SetTextColor.GDI32(?,?), ref: 00B35851
                                      • SetBkColor.GDI32(?,?), ref: 00B3585B
                                      • SelectObject.GDI32(?,00000000), ref: 00B3586E
                                      • DeleteObject.GDI32(?), ref: 00B35877
                                      • 73BEB410.GDI32(?,00000000,00000000,00B358AF,?,?,?,?,?,?,?,?,00000000,00000000,?,?), ref: 00B35899
                                      • DeleteDC.GDI32(?), ref: 00B358A2
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.289505180.0000000000B11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B10000, based on PE: true
                                      • Associated: 00000000.00000002.289475761.0000000000B10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.289928975.0000000000BDC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.289986188.0000000000BE3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_b10000_loaddll32.jbxd
                                      Similarity
                                      • API ID: Object$B410$ColorSelectStretch$Delete$A520Text$A590B150Mask
                                      • String ID:
                                      • API String ID: 3348367721-0
                                      • Opcode ID: 89cb3afc579a5e9f0db0a9681335daad836d56712daf812164c774fa5ee9004c
                                      • Instruction ID: d24ff36d01d52194c39db333d0e8a442c599824f45444410a8e97a6c63b6d7b3
                                      • Opcode Fuzzy Hash: 89cb3afc579a5e9f0db0a9681335daad836d56712daf812164c774fa5ee9004c
                                      • Instruction Fuzzy Hash: 7F818DB2A00209AFDB50EFA8CD85EEFB7FCAB0D710F510594F618E7281D635AD408B61
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      C-Code - Quality: 51%
                                      			E00B37584(void* __eax, long __ecx, intOrPtr __edx) {
                                      				void* _v8;
                                      				intOrPtr _v12;
                                      				struct HDC__* _v16;
                                      				struct HDC__* _v20;
                                      				char _v21;
                                      				void* _v28;
                                      				void* _v32;
                                      				intOrPtr _v92;
                                      				intOrPtr _v96;
                                      				int _v108;
                                      				int _v112;
                                      				void _v116;
                                      				void* _t64;
                                      				int _t65;
                                      				intOrPtr _t66;
                                      				long _t77;
                                      				void* _t107;
                                      				intOrPtr _t116;
                                      				intOrPtr _t117;
                                      				long _t120;
                                      				intOrPtr _t123;
                                      				void* _t127;
                                      				void* _t129;
                                      				intOrPtr _t130;
                                      
                                      				_t127 = _t129;
                                      				_t130 = _t129 + 0xffffff90;
                                      				_t120 = __ecx;
                                      				_t123 = __edx;
                                      				_t107 = __eax;
                                      				_v8 = 0;
                                      				if(__eax == 0 || GetObjectA(__eax, 0x54,  &_v116) == 0) {
                                      					return _v8;
                                      				} else {
                                      					E00B36A78(_t107);
                                      					_v12 = 0;
                                      					_v20 = 0;
                                      					_push(_t127);
                                      					_push(0xb3777f);
                                      					_push( *[fs:eax]);
                                      					 *[fs:eax] = _t130;
                                      					_push(0);
                                      					L00B171A4();
                                      					_v12 = E00B35484(0);
                                      					_push(_v12);
                                      					L00B16E94();
                                      					_v20 = E00B35484(_v12);
                                      					_push(0);
                                      					_push(1);
                                      					_push(1);
                                      					_push(_v108);
                                      					_t64 = _v112;
                                      					_push(_t64);
                                      					L00B16E7C();
                                      					_v8 = _t64;
                                      					if(_v8 == 0) {
                                      						L17:
                                      						_t65 = 0;
                                      						_pop(_t116);
                                      						 *[fs:eax] = _t116;
                                      						_push(0xb37786);
                                      						if(_v20 != 0) {
                                      							_t65 = DeleteDC(_v20);
                                      						}
                                      						if(_v12 != 0) {
                                      							_t66 = _v12;
                                      							_push(_t66);
                                      							_push(0);
                                      							L00B173DC();
                                      							return _t66;
                                      						}
                                      						return _t65;
                                      					} else {
                                      						_v32 = SelectObject(_v20, _v8);
                                      						if(__ecx != 0x1fffffff) {
                                      							_push(_v12);
                                      							L00B16E94();
                                      							_v16 = E00B35484(_v12);
                                      							_push(_t127);
                                      							_push(0xb37737);
                                      							_push( *[fs:eax]);
                                      							 *[fs:eax] = _t130;
                                      							if(_v96 == 0) {
                                      								_v21 = 0;
                                      							} else {
                                      								_v21 = 1;
                                      								_v92 = 0;
                                      								_t107 = E00B36EBC(_t107, _t123, _t123, 0,  &_v116);
                                      							}
                                      							_v28 = SelectObject(_v16, _t107);
                                      							if(_t123 != 0) {
                                      								_push(0);
                                      								_push(_t123);
                                      								_push(_v16);
                                      								L00B16FC4();
                                      								_push(_v16);
                                      								L00B16F9C();
                                      								_push(0);
                                      								_push(_t123);
                                      								_push(_v20);
                                      								L00B16FC4();
                                      								_push(_v20);
                                      								L00B16F9C();
                                      							}
                                      							_t77 = SetBkColor(_v16, _t120);
                                      							_push(0xcc0020);
                                      							_push(0);
                                      							_push(0);
                                      							_push(_v16);
                                      							_push(_v108);
                                      							_push(_v112);
                                      							_push(0);
                                      							_push(0);
                                      							_push(_v20);
                                      							L00B16E74();
                                      							SetBkColor(_v16, _t77);
                                      							if(_v28 != 0) {
                                      								SelectObject(_v16, _v28);
                                      							}
                                      							if(_v21 != 0) {
                                      								DeleteObject(_t107);
                                      							}
                                      							_pop(_t117);
                                      							 *[fs:eax] = _t117;
                                      							_push(0xb3773e);
                                      							return DeleteDC(_v16);
                                      						} else {
                                      							PatBlt(_v20, 0, 0, _v112, _v108, 0x42);
                                      							if(_v32 != 0) {
                                      								SelectObject(_v20, _v32);
                                      							}
                                      							goto L17;
                                      						}
                                      					}
                                      				}
                                      			}



























                                      0x00b37585
                                      0x00b37587
                                      0x00b3758d
                                      0x00b3758f
                                      0x00b37591
                                      0x00b37595
                                      0x00b3759a
                                      0x00b3778f
                                      0x00b375b4
                                      0x00b375b6
                                      0x00b375bd
                                      0x00b375c2
                                      0x00b375c7
                                      0x00b375c8
                                      0x00b375cd
                                      0x00b375d0
                                      0x00b375d3
                                      0x00b375d5
                                      0x00b375df
                                      0x00b375e5
                                      0x00b375e6
                                      0x00b375f0
                                      0x00b375f3
                                      0x00b375f5
                                      0x00b375f7
                                      0x00b375fc
                                      0x00b375fd
                                      0x00b37600
                                      0x00b37601
                                      0x00b37606
                                      0x00b3760d
                                      0x00b37751
                                      0x00b37751
                                      0x00b37753
                                      0x00b37756
                                      0x00b37759
                                      0x00b37762
                                      0x00b37768
                                      0x00b37768
                                      0x00b37771
                                      0x00b37773
                                      0x00b37776
                                      0x00b37777
                                      0x00b37779
                                      0x00000000
                                      0x00b37779
                                      0x00b3777e
                                      0x00b37613
                                      0x00b37620
                                      0x00b37629
                                      0x00b3764a
                                      0x00b3764b
                                      0x00b37655
                                      0x00b3765a
                                      0x00b3765b
                                      0x00b37660
                                      0x00b37663
                                      0x00b3766a
                                      0x00b3768a
                                      0x00b3766c
                                      0x00b3766c
                                      0x00b37672
                                      0x00b37686
                                      0x00b37686
                                      0x00b37698
                                      0x00b3769d
                                      0x00b3769f
                                      0x00b376a1
                                      0x00b376a5
                                      0x00b376a6
                                      0x00b376ae
                                      0x00b376af
                                      0x00b376b4
                                      0x00b376b6
                                      0x00b376ba
                                      0x00b376bb
                                      0x00b376c3
                                      0x00b376c4
                                      0x00b376c4
                                      0x00b376ce
                                      0x00b376d5
                                      0x00b376da
                                      0x00b376dc
                                      0x00b376e1
                                      0x00b376e5
                                      0x00b376e9
                                      0x00b376ea
                                      0x00b376ec
                                      0x00b376f1
                                      0x00b376f2
                                      0x00b376fc
                                      0x00b37705
                                      0x00b3770f
                                      0x00b3770f
                                      0x00b37718
                                      0x00b3771b
                                      0x00b3771b
                                      0x00b37722
                                      0x00b37725
                                      0x00b37728
                                      0x00b37736
                                      0x00b3762b
                                      0x00b3763d
                                      0x00b37742
                                      0x00b3774c
                                      0x00b3774c
                                      0x00000000
                                      0x00b37742
                                      0x00b37629
                                      0x00b3760d

                                      APIs
                                      • GetObjectA.GDI32(?,00000054,?), ref: 00B375A7
                                      • 73BEAC50.USER32(00000000,00000000,00B3777F,?,?,00000054,?), ref: 00B375D5
                                      • 73BEA590.GDI32(?,00000000,00000000,00B3777F,?,?,00000054,?), ref: 00B375E6
                                      • 73BEA410.GDI32(?,?,00000001,00000001,00000000,?,00000000,00000000,00B3777F,?,?,00000054,?), ref: 00B37601
                                      • SelectObject.GDI32(?,00000000), ref: 00B3761B
                                      • PatBlt.GDI32(?,00000000,00000000,?,?,00000042), ref: 00B3763D
                                      • 73BEA590.GDI32(?,?,00000000,?,?,00000001,00000001,00000000,?,00000000,00000000,00B3777F,?,?,00000054,?), ref: 00B3764B
                                      • SelectObject.GDI32(?), ref: 00B37693
                                      • 73BEB410.GDI32(?,?,00000000,?,?,00000000,00B37737,?,?,?,00000000,?,?,00000001,00000001,00000000), ref: 00B376A6
                                      • 73BEB150.GDI32(?,?,?,00000000,?,?,00000000,00B37737,?,?,?,00000000,?,?,00000001,00000001), ref: 00B376AF
                                      • 73BEB410.GDI32(?,?,00000000,?,?,?,00000000,?,?,00000000,00B37737,?,?,?,00000000,?), ref: 00B376BB
                                      • 73BEB150.GDI32(?,?,?,00000000,?,?,?,00000000,?,?,00000000,00B37737,?,?,?,00000000), ref: 00B376C4
                                      • SetBkColor.GDI32(?), ref: 00B376CE
                                      • 73BF97E0.GDI32(?,00000000,00000000,?,?,?,00000000,00000000,00CC0020,?,?,?,?,00000000,00B37737), ref: 00B376F2
                                      • SetBkColor.GDI32(?,00000000), ref: 00B376FC
                                      • SelectObject.GDI32(?,00000000), ref: 00B3770F
                                      • DeleteObject.GDI32 ref: 00B3771B
                                      • DeleteDC.GDI32(?), ref: 00B37731
                                      • SelectObject.GDI32(?,00000000), ref: 00B3774C
                                      • DeleteDC.GDI32(00000000), ref: 00B37768
                                      • 73BEB380.USER32(00000000,00000000,00B37786,00000001,00000000,?,00000000,00000000,00B3777F,?,?,00000054,?), ref: 00B37779
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.289505180.0000000000B11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B10000, based on PE: true
                                      • Associated: 00000000.00000002.289475761.0000000000B10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.289928975.0000000000BDC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.289986188.0000000000BE3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_b10000_loaddll32.jbxd
                                      Similarity
                                      • API ID: Object$Select$Delete$A590B150B410Color$A410B380
                                      • String ID:
                                      • API String ID: 2498167796-0
                                      • Opcode ID: 9c4978e8a5df1db9596db3191df294b65b745d57b6c538044d02da89bef469f9
                                      • Instruction ID: 96fd8322650bb96ed8dca1e603238be05e71b7974e957658a281837b355d4f03
                                      • Opcode Fuzzy Hash: 9c4978e8a5df1db9596db3191df294b65b745d57b6c538044d02da89bef469f9
                                      • Instruction Fuzzy Hash: 0651FAB5E44209BFDB20DBE8CC56FEEB7FCAB08700F604495B614E7281DA75A9418B60
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      C-Code - Quality: 65%
                                      			E00B382A0(intOrPtr __eax, void* __ebx, void* __ecx, intOrPtr* __edx, void* __edi, void* __esi, char* _a4) {
                                      				intOrPtr _v8;
                                      				intOrPtr* _v12;
                                      				void* _v16;
                                      				struct HDC__* _v20;
                                      				char _v24;
                                      				intOrPtr* _v28;
                                      				intOrPtr _v32;
                                      				intOrPtr _v36;
                                      				signed int _v37;
                                      				intOrPtr _v44;
                                      				void* _v48;
                                      				struct HDC__* _v52;
                                      				intOrPtr _v56;
                                      				intOrPtr* _v60;
                                      				intOrPtr* _v64;
                                      				short _v66;
                                      				short _v68;
                                      				signed short _v70;
                                      				signed short _v72;
                                      				void* _v76;
                                      				intOrPtr _v172;
                                      				char _v174;
                                      				intOrPtr _t150;
                                      				signed int _t160;
                                      				intOrPtr _t163;
                                      				void* _t166;
                                      				void* _t174;
                                      				void* _t183;
                                      				signed int _t188;
                                      				intOrPtr _t189;
                                      				struct HDC__* _t190;
                                      				struct HDC__* _t204;
                                      				signed int _t208;
                                      				signed short _t214;
                                      				intOrPtr _t241;
                                      				intOrPtr* _t245;
                                      				intOrPtr _t251;
                                      				intOrPtr _t289;
                                      				intOrPtr _t290;
                                      				intOrPtr _t295;
                                      				signed int _t297;
                                      				signed int _t317;
                                      				void* _t319;
                                      				void* _t320;
                                      				signed int _t321;
                                      				void* _t322;
                                      				void* _t323;
                                      				void* _t324;
                                      				intOrPtr _t325;
                                      
                                      				_t316 = __edi;
                                      				_t323 = _t324;
                                      				_t325 = _t324 + 0xffffff54;
                                      				_t319 = __ecx;
                                      				_v12 = __edx;
                                      				_v8 = __eax;
                                      				_v52 = 0;
                                      				_v44 = 0;
                                      				_v60 = 0;
                                      				 *((intOrPtr*)( *_v12 + 0xc))(__edi, __esi, __ebx, _t322);
                                      				_v37 = _v36 == 0xc;
                                      				if(_v37 != 0) {
                                      					_v36 = 0x28;
                                      				}
                                      				_v28 = E00B128CC(_v36 + 0x40c);
                                      				_v64 = _v28;
                                      				_push(_t323);
                                      				_push(0xb387bd);
                                      				_push( *[fs:edx]);
                                      				 *[fs:edx] = _t325;
                                      				_push(_t323);
                                      				_push(0xb38790);
                                      				_push( *[fs:edx]);
                                      				 *[fs:edx] = _t325;
                                      				if(_v37 == 0) {
                                      					 *((intOrPtr*)( *_v12 + 0xc))();
                                      					_t320 = _t319 - _v36;
                                      					_t150 =  *((intOrPtr*)(_v64 + 0x10));
                                      					if(_t150 != 3 && _t150 != 0) {
                                      						_v60 = E00B13350(1);
                                      						if(_a4 == 0) {
                                      							E00B12D70( &_v174, 0xe);
                                      							_v174 = 0x4d42;
                                      							_v172 = _v36 + _t320;
                                      							_a4 =  &_v174;
                                      						}
                                      						 *((intOrPtr*)( *_v60 + 0x10))();
                                      						 *((intOrPtr*)( *_v60 + 0x10))();
                                      						 *((intOrPtr*)( *_v60 + 0x10))();
                                      						E00B2D564(_v60,  *_v60, _v12, _t316, _t320, _t320, 0);
                                      						 *((intOrPtr*)( *_v60 + 0x14))();
                                      						_v12 = _v60;
                                      					}
                                      				} else {
                                      					 *((intOrPtr*)( *_v12 + 0xc))();
                                      					_t251 = _v64;
                                      					E00B12D70(_t251, 0x28);
                                      					_t241 = _t251;
                                      					 *(_t241 + 4) = _v72 & 0x0000ffff;
                                      					 *(_t241 + 8) = _v70 & 0x0000ffff;
                                      					 *((short*)(_t241 + 0xc)) = _v68;
                                      					 *((short*)(_t241 + 0xe)) = _v66;
                                      					_t320 = _t319 - 0xc;
                                      				}
                                      				_t245 = _v64;
                                      				 *_t245 = _v36;
                                      				_v32 = _v28 + _v36;
                                      				if( *((short*)(_t245 + 0xc)) != 1) {
                                      					E00B35370();
                                      				}
                                      				if(_v36 == 0x28) {
                                      					_t214 =  *(_t245 + 0xe);
                                      					if(_t214 == 0x10 || _t214 == 0x20) {
                                      						if( *((intOrPtr*)(_t245 + 0x10)) == 3) {
                                      							E00B2D4F4(_v12, 0xc, _v32);
                                      							_v32 = _v32 + 0xc;
                                      							_t320 = _t320 - 0xc;
                                      						}
                                      					}
                                      				}
                                      				if( *(_t245 + 0x20) == 0) {
                                      					 *(_t245 + 0x20) = E00B355F4( *(_t245 + 0xe));
                                      				}
                                      				_t317 = _v37 & 0x000000ff;
                                      				_t257 =  *(_t245 + 0x20) * 0;
                                      				E00B2D4F4(_v12,  *(_t245 + 0x20) * 0, _v32);
                                      				_t321 = _t320 -  *(_t245 + 0x20) * 0;
                                      				if( *(_t245 + 0x14) == 0) {
                                      					_t297 =  *(_t245 + 0xe) & 0x0000ffff;
                                      					_t208 = E00B35614( *((intOrPtr*)(_t245 + 4)), 0x20, _t297);
                                      					asm("cdq");
                                      					_t257 = _t208 * (( *(_t245 + 8) ^ _t297) - _t297);
                                      					 *(_t245 + 0x14) = _t208 * (( *(_t245 + 8) ^ _t297) - _t297);
                                      				}
                                      				_t160 =  *(_t245 + 0x14);
                                      				if(_t321 > _t160) {
                                      					_t321 = _t160;
                                      				}
                                      				if(_v37 != 0) {
                                      					_t160 = E00B358BC(_v32);
                                      				}
                                      				_push(0);
                                      				L00B171A4();
                                      				_v16 = E00B35484(_t160);
                                      				_push(_t323);
                                      				_push(0xb3870b);
                                      				_push( *[fs:edx]);
                                      				 *[fs:edx] = _t325;
                                      				_t163 =  *((intOrPtr*)(_v64 + 0x10));
                                      				if(_t163 == 0 || _t163 == 3) {
                                      					if( *0xbdc670 == 0) {
                                      						_push(0);
                                      						_push(0);
                                      						_push( &_v24);
                                      						_push(0);
                                      						_push(_v28);
                                      						_t166 = _v16;
                                      						_push(_t166);
                                      						L00B16E9C();
                                      						_v44 = _t166;
                                      						if(_v44 == 0 || _v24 == 0) {
                                      							if(GetLastError() != 0) {
                                      								E00B1D738(_t245, _t257, _t317, _t321);
                                      							} else {
                                      								E00B35370();
                                      							}
                                      						}
                                      						_push(_t323);
                                      						_push( *[fs:eax]);
                                      						 *[fs:eax] = _t325;
                                      						E00B2D4F4(_v12, _t321, _v24);
                                      						_pop(_t289);
                                      						 *[fs:eax] = _t289;
                                      						_t290 = 0xb386da;
                                      						 *[fs:eax] = _t290;
                                      						_push(0xb38712);
                                      						_t174 = _v16;
                                      						_push(_t174);
                                      						_push(0);
                                      						L00B173DC();
                                      						return _t174;
                                      					} else {
                                      						goto L27;
                                      					}
                                      				} else {
                                      					L27:
                                      					_v20 = 0;
                                      					_v24 = E00B128CC(_t321);
                                      					_push(_t323);
                                      					_push(0xb38673);
                                      					_push( *[fs:edx]);
                                      					 *[fs:edx] = _t325;
                                      					_t263 = _t321;
                                      					E00B2D4F4(_v12, _t321, _v24);
                                      					_push(_v16);
                                      					L00B16E94();
                                      					_v20 = E00B35484(_v16);
                                      					_push(1);
                                      					_push(1);
                                      					_t183 = _v16;
                                      					_push(_t183);
                                      					L00B16E8C();
                                      					_v48 = SelectObject(_v20, _t183);
                                      					_v56 = 0;
                                      					_t188 =  *(_v64 + 0x20);
                                      					if(_t188 > 0) {
                                      						_t263 = _t188;
                                      						_v52 = E00B35B74(0, _t188);
                                      						_push(0);
                                      						_push(_v52);
                                      						_t204 = _v20;
                                      						_push(_t204);
                                      						L00B16FC4();
                                      						_v56 = _t204;
                                      						_push(_v20);
                                      						L00B16F9C();
                                      					}
                                      					_push(_t323);
                                      					_push(0xb38647);
                                      					_push( *[fs:edx]);
                                      					 *[fs:edx] = _t325;
                                      					_push(0);
                                      					_t189 = _v28;
                                      					_push(_t189);
                                      					_push(_v24);
                                      					_push(4);
                                      					_push(_t189);
                                      					_t190 = _v20;
                                      					_push(_t190);
                                      					L00B16EA4();
                                      					_v44 = _t190;
                                      					if(_v44 == 0) {
                                      						if(GetLastError() != 0) {
                                      							E00B1D738(_t245, _t263, _t317, _t321);
                                      						} else {
                                      							E00B35370();
                                      						}
                                      					}
                                      					_pop(_t295);
                                      					 *[fs:eax] = _t295;
                                      					_push(0xb3864e);
                                      					if(_v56 != 0) {
                                      						_push(0xffffffff);
                                      						_push(_v56);
                                      						_push(_v20);
                                      						L00B16FC4();
                                      					}
                                      					return DeleteObject(SelectObject(_v20, _v48));
                                      				}
                                      			}




















































                                      0x00b382a0
                                      0x00b382a1
                                      0x00b382a3
                                      0x00b382ac
                                      0x00b382ae
                                      0x00b382b1
                                      0x00b382b6
                                      0x00b382bb
                                      0x00b382c0
                                      0x00b382d0
                                      0x00b382d7
                                      0x00b382df
                                      0x00b382e1
                                      0x00b382e1
                                      0x00b382f8
                                      0x00b382fe
                                      0x00b38303
                                      0x00b38304
                                      0x00b38309
                                      0x00b3830c
                                      0x00b38311
                                      0x00b38312
                                      0x00b38317
                                      0x00b3831a
                                      0x00b38321
                                      0x00b38380
                                      0x00b38383
                                      0x00b38389
                                      0x00b3838f
                                      0x00b383a9
                                      0x00b383b0
                                      0x00b383bf
                                      0x00b383c4
                                      0x00b383d2
                                      0x00b383de
                                      0x00b383de
                                      0x00b383ee
                                      0x00b383fe
                                      0x00b38412
                                      0x00b38421
                                      0x00b38433
                                      0x00b38439
                                      0x00b38439
                                      0x00b38323
                                      0x00b38333
                                      0x00b38336
                                      0x00b38342
                                      0x00b38347
                                      0x00b3834d
                                      0x00b38354
                                      0x00b3835b
                                      0x00b38363
                                      0x00b38367
                                      0x00b38367
                                      0x00b3843c
                                      0x00b38442
                                      0x00b3844a
                                      0x00b38452
                                      0x00b38454
                                      0x00b38454
                                      0x00b3845d
                                      0x00b3845f
                                      0x00b38467
                                      0x00b38473
                                      0x00b38480
                                      0x00b38485
                                      0x00b38489
                                      0x00b38489
                                      0x00b38473
                                      0x00b38467
                                      0x00b38490
                                      0x00b3849b
                                      0x00b3849b
                                      0x00b384a1
                                      0x00b384ad
                                      0x00b384b6
                                      0x00b384c8
                                      0x00b384ce
                                      0x00b384d0
                                      0x00b384dc
                                      0x00b384e6
                                      0x00b384eb
                                      0x00b384ee
                                      0x00b384ee
                                      0x00b384f1
                                      0x00b384f6
                                      0x00b384f8
                                      0x00b384f8
                                      0x00b384fe
                                      0x00b38503
                                      0x00b38503
                                      0x00b38508
                                      0x00b3850a
                                      0x00b38514
                                      0x00b38519
                                      0x00b3851a
                                      0x00b3851f
                                      0x00b38522
                                      0x00b38528
                                      0x00b3852d
                                      0x00b3853b
                                      0x00b3867a
                                      0x00b3867c
                                      0x00b38681
                                      0x00b38682
                                      0x00b38687
                                      0x00b38688
                                      0x00b3868b
                                      0x00b3868c
                                      0x00b38691
                                      0x00b38698
                                      0x00b386a7
                                      0x00b386b0
                                      0x00b386a9
                                      0x00b386a9
                                      0x00b386a9
                                      0x00b386a7
                                      0x00b386b7
                                      0x00b386bd
                                      0x00b386c0
                                      0x00b386cb
                                      0x00b386d2
                                      0x00b386d5
                                      0x00b386f4
                                      0x00b386f7
                                      0x00b386fa
                                      0x00b386ff
                                      0x00b38702
                                      0x00b38703
                                      0x00b38705
                                      0x00b3870a
                                      0x00000000
                                      0x00000000
                                      0x00000000
                                      0x00b38541
                                      0x00b38541
                                      0x00b38543
                                      0x00b3854d
                                      0x00b38552
                                      0x00b38553
                                      0x00b38558
                                      0x00b3855b
                                      0x00b38561
                                      0x00b38566
                                      0x00b3856e
                                      0x00b3856f
                                      0x00b38579
                                      0x00b3857c
                                      0x00b3857e
                                      0x00b38580
                                      0x00b38583
                                      0x00b38584
                                      0x00b38593
                                      0x00b38598
                                      0x00b3859e
                                      0x00b385a3
                                      0x00b385a5
                                      0x00b385b1
                                      0x00b385b4
                                      0x00b385b9
                                      0x00b385ba
                                      0x00b385bd
                                      0x00b385be
                                      0x00b385c3
                                      0x00b385c9
                                      0x00b385ca
                                      0x00b385ca
                                      0x00b385d1
                                      0x00b385d2
                                      0x00b385d7
                                      0x00b385da
                                      0x00b385dd
                                      0x00b385df
                                      0x00b385e2
                                      0x00b385e6
                                      0x00b385e7
                                      0x00b385e9
                                      0x00b385ea
                                      0x00b385ed
                                      0x00b385ee
                                      0x00b385f3
                                      0x00b385fa
                                      0x00b38603
                                      0x00b3860c
                                      0x00b38605
                                      0x00b38605
                                      0x00b38605
                                      0x00b38603
                                      0x00b38613
                                      0x00b38616
                                      0x00b38619
                                      0x00b38622
                                      0x00b38624
                                      0x00b38629
                                      0x00b3862d
                                      0x00b3862e
                                      0x00b3862e
                                      0x00b38646
                                      0x00b38646

                                      APIs
                                      • 73BEAC50.USER32(00000000,?,00000000,00B387BD,?,?), ref: 00B3850A
                                      • 73BEA590.GDI32(00000001,00000000,00B38673,?,00000000,00B3870B,?,00000000,?,00000000,00B387BD,?,?), ref: 00B3856F
                                      • 73BEA520.GDI32(00000001,00000001,00000001,00000001,00000000,00B38673,?,00000000,00B3870B,?,00000000,?,00000000,00B387BD,?,?), ref: 00B38584
                                      • SelectObject.GDI32(?,00000000), ref: 00B3858E
                                      • 73BEB410.GDI32(?,?,00000000,?,00000000,00000001,00000001,00000001,00000001,00000000,00B38673,?,00000000,00B3870B,?,00000000), ref: 00B385BE
                                      • 73BEB150.GDI32(?,?,?,00000000,?,00000000,00000001,00000001,00000001,00000001,00000000,00B38673,?,00000000,00B3870B), ref: 00B385CA
                                      • 73BEA7F0.GDI32(?,?,00000004,00000000,?,00000000,00000000,00B38647,?,?,00000000,00000001,00000001,00000001,00000001,00000000), ref: 00B385EE
                                      • GetLastError.KERNEL32(?,?,00000004,00000000,?,00000000,00000000,00B38647,?,?,00000000,00000001,00000001,00000001,00000001,00000000), ref: 00B385FC
                                      • 73BEB410.GDI32(?,00000000,000000FF,00B3864E,00000000,?,00000000,00000000,00B38647,?,?,00000000,00000001,00000001,00000001,00000001), ref: 00B3862E
                                      • SelectObject.GDI32(?,?), ref: 00B3863B
                                      • DeleteObject.GDI32(00000000), ref: 00B38641
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.289505180.0000000000B11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B10000, based on PE: true
                                      • Associated: 00000000.00000002.289475761.0000000000B10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.289928975.0000000000BDC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.289986188.0000000000BE3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_b10000_loaddll32.jbxd
                                      Similarity
                                      • API ID: Object$B410Select$A520A590B150DeleteErrorLast
                                      • String ID: ($BM
                                      • API String ID: 3415089252-2980357723
                                      • Opcode ID: cb1d37d841b21564f3b8213073158b1d1578c10dae9f4ac527c86ed6b069d0ee
                                      • Instruction ID: 30b16213125adfea705414f84a84f0890636ebddbc39c2c042753ad1db162502
                                      • Opcode Fuzzy Hash: cb1d37d841b21564f3b8213073158b1d1578c10dae9f4ac527c86ed6b069d0ee
                                      • Instruction Fuzzy Hash: B5D11B74A002189FDF14DFA8D895AAEBBF5FF48300F5484A5F904EB395DB349881CB65
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      C-Code - Quality: 71%
                                      			E00B37A88(intOrPtr* __eax, void* __ebx, signed int __ecx, intOrPtr __edx, void* __edi, void* __esi, void* __eflags) {
                                      				intOrPtr _v8;
                                      				void* _v12;
                                      				char _v13;
                                      				struct tagPOINT _v21;
                                      				struct HDC__* _v28;
                                      				void* _v32;
                                      				intOrPtr _t78;
                                      				struct HDC__* _t80;
                                      				signed int _t82;
                                      				signed int _t83;
                                      				signed int _t84;
                                      				char _t85;
                                      				void* _t92;
                                      				struct HDC__* _t115;
                                      				void* _t136;
                                      				struct HDC__* _t160;
                                      				intOrPtr* _t164;
                                      				intOrPtr _t172;
                                      				intOrPtr _t176;
                                      				intOrPtr _t178;
                                      				intOrPtr _t180;
                                      				int* _t184;
                                      				intOrPtr _t186;
                                      				void* _t188;
                                      				void* _t189;
                                      				intOrPtr _t190;
                                      
                                      				_t165 = __ecx;
                                      				_t188 = _t189;
                                      				_t190 = _t189 + 0xffffffe4;
                                      				_t184 = __ecx;
                                      				_v8 = __edx;
                                      				_t164 = __eax;
                                      				_t186 =  *((intOrPtr*)(__eax + 0x28));
                                      				_t172 =  *0xb37cd4; // 0xf
                                      				E00B3516C(_v8, __ecx, _t172);
                                      				E00B38018(_t164);
                                      				_v12 = 0;
                                      				_v13 = 0;
                                      				_t78 =  *((intOrPtr*)(_t186 + 0x10));
                                      				if(_t78 != 0) {
                                      					_push(0xffffffff);
                                      					_push(_t78);
                                      					_t160 =  *(_v8 + 4);
                                      					_push(_t160);
                                      					L00B16FC4();
                                      					_v12 = _t160;
                                      					_push( *(_v8 + 4));
                                      					L00B16F9C();
                                      					_v13 = 1;
                                      				}
                                      				_push(0xc);
                                      				_t80 =  *(_v8 + 4);
                                      				_push(_t80);
                                      				L00B16F24();
                                      				_push(_t80);
                                      				_push(0xe);
                                      				_t82 =  *(_v8 + 4);
                                      				L00B16F24();
                                      				_t83 = _t82;
                                      				_t84 = _t83 * _t82;
                                      				if(_t84 > 8) {
                                      					L4:
                                      					_t85 = 0;
                                      				} else {
                                      					_t165 =  *(_t186 + 0x28) & 0x0000ffff;
                                      					if(_t84 < ( *(_t186 + 0x2a) & 0x0000ffff) * ( *(_t186 + 0x28) & 0x0000ffff)) {
                                      						_t85 = 1;
                                      					} else {
                                      						goto L4;
                                      					}
                                      				}
                                      				if(_t85 == 0) {
                                      					if(E00B37E14(_t164) == 0) {
                                      						SetStretchBltMode(E00B35098(_v8), 3);
                                      					}
                                      				} else {
                                      					GetBrushOrgEx( *(_v8 + 4),  &_v21);
                                      					SetStretchBltMode( *(_v8 + 4), 4);
                                      					SetBrushOrgEx( *(_v8 + 4), _v21, _v21.y,  &_v21);
                                      				}
                                      				_push(_t188);
                                      				_push(0xb37cc4);
                                      				_push( *[fs:eax]);
                                      				 *[fs:eax] = _t190;
                                      				if( *((intOrPtr*)( *_t164 + 0x28))() != 0) {
                                      					E00B37FB8(_t164, _t165);
                                      				}
                                      				_t92 = E00B37D58(_t164);
                                      				_t176 =  *0xb37cd4; // 0xf
                                      				E00B3516C(_t92, _t165, _t176);
                                      				if( *((intOrPtr*)( *_t164 + 0x28))() == 0) {
                                      					StretchBlt( *(_v8 + 4),  *_t184, _t184[1], _t184[2] -  *_t184, _t184[3] - _t184[1],  *(E00B37D58(_t164) + 4), 0, 0,  *(_t186 + 0x1c),  *(_t186 + 0x20),  *(_v8 + 0x20));
                                      					_pop(_t178);
                                      					 *[fs:eax] = _t178;
                                      					_push(0xb37ccb);
                                      					if(_v13 != 0) {
                                      						_push(0xffffffff);
                                      						_push(_v12);
                                      						_t115 =  *(_v8 + 4);
                                      						_push(_t115);
                                      						L00B16FC4();
                                      						return _t115;
                                      					}
                                      					return 0;
                                      				} else {
                                      					_v32 = 0;
                                      					_v28 = 0;
                                      					_push(_t188);
                                      					_push(0xb37c59);
                                      					_push( *[fs:eax]);
                                      					 *[fs:eax] = _t190;
                                      					L00B16E94();
                                      					_v28 = E00B35484(0);
                                      					_v32 = SelectObject(_v28,  *(_t186 + 0xc));
                                      					E00B35628( *(_v8 + 4), _t164, _t184[1],  *_t184, _t184, _t186, 0, 0, _v28,  *(_t186 + 0x20),  *(_t186 + 0x1c), 0, 0,  *(E00B37D58(_t164) + 4), _t184[3] - _t184[1], _t184[2] -  *_t184);
                                      					_t136 = 0;
                                      					_t180 = 0;
                                      					 *[fs:eax] = _t180;
                                      					_push(0xb37c9e);
                                      					if(_v32 != 0) {
                                      						_t136 = SelectObject(_v28, _v32);
                                      					}
                                      					if(_v28 != 0) {
                                      						return DeleteDC(_v28);
                                      					}
                                      					return _t136;
                                      				}
                                      			}





























                                      0x00b37a88
                                      0x00b37a89
                                      0x00b37a8b
                                      0x00b37a91
                                      0x00b37a93
                                      0x00b37a96
                                      0x00b37a98
                                      0x00b37a9b
                                      0x00b37aa4
                                      0x00b37aab
                                      0x00b37ab2
                                      0x00b37ab5
                                      0x00b37ab9
                                      0x00b37abe
                                      0x00b37ac0
                                      0x00b37ac2
                                      0x00b37ac6
                                      0x00b37ac9
                                      0x00b37aca
                                      0x00b37acf
                                      0x00b37ad8
                                      0x00b37ad9
                                      0x00b37ade
                                      0x00b37ade
                                      0x00b37ae2
                                      0x00b37ae7
                                      0x00b37aea
                                      0x00b37aeb
                                      0x00b37af0
                                      0x00b37af1
                                      0x00b37af6
                                      0x00b37afa
                                      0x00b37b01
                                      0x00b37b02
                                      0x00b37b07
                                      0x00b37b18
                                      0x00b37b18
                                      0x00b37b09
                                      0x00b37b0d
                                      0x00b37b16
                                      0x00b37b1c
                                      0x00000000
                                      0x00000000
                                      0x00000000
                                      0x00b37b16
                                      0x00b37b20
                                      0x00b37b63
                                      0x00b37b70
                                      0x00b37b70
                                      0x00b37b22
                                      0x00b37b2d
                                      0x00b37b3b
                                      0x00b37b53
                                      0x00b37b53
                                      0x00b37b77
                                      0x00b37b78
                                      0x00b37b7d
                                      0x00b37b80
                                      0x00b37b8c
                                      0x00b37b90
                                      0x00b37b90
                                      0x00b37b97
                                      0x00b37b9c
                                      0x00b37ba2
                                      0x00b37bb0
                                      0x00b37c99
                                      0x00b37ca0
                                      0x00b37ca3
                                      0x00b37ca6
                                      0x00b37caf
                                      0x00b37cb1
                                      0x00b37cb6
                                      0x00b37cba
                                      0x00b37cbd
                                      0x00b37cbe
                                      0x00000000
                                      0x00b37cbe
                                      0x00b37cc3
                                      0x00b37bb6
                                      0x00b37bb8
                                      0x00b37bbd
                                      0x00b37bc2
                                      0x00b37bc3
                                      0x00b37bc8
                                      0x00b37bcb
                                      0x00b37bd0
                                      0x00b37bda
                                      0x00b37bea
                                      0x00b37c24
                                      0x00b37c29
                                      0x00b37c2b
                                      0x00b37c2e
                                      0x00b37c31
                                      0x00b37c3a
                                      0x00b37c44
                                      0x00b37c44
                                      0x00b37c4d
                                      0x00000000
                                      0x00b37c53
                                      0x00b37c58
                                      0x00b37c58

                                      APIs
                                        • Part of subcall function 00B38018: 73BEAC50.USER32(00000000,?,?,?,?,00B36C4F,00000000,00B36CDB), ref: 00B3806E
                                        • Part of subcall function 00B38018: 73BEAD70.GDI32(00000000,0000000C,00000000,?,?,?,?,00B36C4F,00000000,00B36CDB), ref: 00B38083
                                        • Part of subcall function 00B38018: 73BEAD70.GDI32(00000000,0000000E,00000000,0000000C,00000000,?,?,?,?,00B36C4F,00000000,00B36CDB), ref: 00B3808D
                                        • Part of subcall function 00B38018: CreateHalftonePalette.GDI32(00000000,00000000,?,?,?,?,00B36C4F,00000000,00B36CDB), ref: 00B380B1
                                        • Part of subcall function 00B38018: 73BEB380.USER32(00000000,00000000,00000000,?,?,?,?,00B36C4F,00000000,00B36CDB), ref: 00B380BC
                                      • 73BEB410.GDI32(?,?,000000FF), ref: 00B37ACA
                                      • 73BEB150.GDI32(?,?,?,000000FF), ref: 00B37AD9
                                      • 73BEAD70.GDI32(?,0000000C), ref: 00B37AEB
                                      • 73BEAD70.GDI32(?,0000000E,00000000,?,0000000C), ref: 00B37AFA
                                      • GetBrushOrgEx.GDI32(?,?,0000000E,00000000,?,0000000C), ref: 00B37B2D
                                      • SetStretchBltMode.GDI32(?,00000004), ref: 00B37B3B
                                      • SetBrushOrgEx.GDI32(?,?,?,?,?,00000004,?,?,0000000E,00000000,?,0000000C), ref: 00B37B53
                                      • SetStretchBltMode.GDI32(00000000,00000003), ref: 00B37B70
                                      • 73BEA590.GDI32(00000000,00000000,00B37C59,?,?,0000000E,00000000,?,0000000C), ref: 00B37BD0
                                      • SelectObject.GDI32(?,?), ref: 00B37BE5
                                      • SelectObject.GDI32(?,00000000), ref: 00B37C44
                                      • DeleteDC.GDI32(00000000), ref: 00B37C53
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.289505180.0000000000B11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B10000, based on PE: true
                                      • Associated: 00000000.00000002.289475761.0000000000B10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.289928975.0000000000BDC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.289986188.0000000000BE3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_b10000_loaddll32.jbxd
                                      Similarity
                                      • API ID: BrushModeObjectSelectStretch$A590B150B380B410CreateDeleteHalftonePalette
                                      • String ID:
                                      • API String ID: 2051775979-0
                                      • Opcode ID: f4390f1cf79a2a91a43b90e57a1c4088e8df864e802cf4b4b73b0427aaf38a0a
                                      • Instruction ID: 5f0e62ef7acda3af9e8ef130809630d9807e5aa200e6edabc97e16a859fc18fe
                                      • Opcode Fuzzy Hash: f4390f1cf79a2a91a43b90e57a1c4088e8df864e802cf4b4b73b0427aaf38a0a
                                      • Instruction Fuzzy Hash: 4F7119B5A44605AFCB60DFA8C995F9EBBF8EF08300F6485A4B508E7291DB34ED45CB50
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      C-Code - Quality: 51%
                                      			E00B35494(struct HDC__* __eax, void* __ebx, void* __ecx, void* __edx, void* __edi, void* __esi) {
                                      				void* _v8;
                                      				int _v12;
                                      				int _v16;
                                      				void* _v20;
                                      				int _v24;
                                      				struct HDC__* _v28;
                                      				struct HDC__* _v32;
                                      				int _v48;
                                      				int _v52;
                                      				void _v56;
                                      				int _t37;
                                      				void* _t41;
                                      				int _t43;
                                      				void* _t47;
                                      				void* _t72;
                                      				intOrPtr _t79;
                                      				intOrPtr _t80;
                                      				void* _t85;
                                      				void* _t87;
                                      				void* _t88;
                                      				intOrPtr _t89;
                                      
                                      				_t87 = _t88;
                                      				_t89 = _t88 + 0xffffffcc;
                                      				asm("movsd");
                                      				asm("movsd");
                                      				_t71 = __ecx;
                                      				_v8 = __eax;
                                      				_push(0);
                                      				L00B16E94();
                                      				_v28 = __eax;
                                      				_push(0);
                                      				L00B16E94();
                                      				_v32 = __eax;
                                      				_push(_t87);
                                      				_push(0xb355e2);
                                      				_push( *[fs:eax]);
                                      				 *[fs:eax] = _t89;
                                      				_t37 = GetObjectA(_v8, 0x18,  &_v56);
                                      				if(__ecx == 0) {
                                      					_push(0);
                                      					L00B171A4();
                                      					_v24 = _t37;
                                      					if(_v24 == 0) {
                                      						E00B353DC(__ecx);
                                      					}
                                      					_push(_t87);
                                      					_push(0xb35551);
                                      					_push( *[fs:eax]);
                                      					 *[fs:eax] = _t89;
                                      					_push(_v12);
                                      					_push(_v16);
                                      					_t41 = _v24;
                                      					_push(_t41);
                                      					L00B16E8C();
                                      					_v20 = _t41;
                                      					if(_v20 == 0) {
                                      						E00B353DC(_t71);
                                      					}
                                      					_pop(_t79);
                                      					 *[fs:eax] = _t79;
                                      					_push(0xb35558);
                                      					_t43 = _v24;
                                      					_push(_t43);
                                      					_push(0);
                                      					L00B173DC();
                                      					return _t43;
                                      				} else {
                                      					_push(0);
                                      					_push(1);
                                      					_push(1);
                                      					_push(_v12);
                                      					_t47 = _v16;
                                      					_push(_t47);
                                      					L00B16E7C();
                                      					_v20 = _t47;
                                      					if(_v20 != 0) {
                                      						_t72 = SelectObject(_v28, _v8);
                                      						_t85 = SelectObject(_v32, _v20);
                                      						StretchBlt(_v32, 0, 0, _v16, _v12, _v28, 0, 0, _v52, _v48, 0xcc0020);
                                      						if(_t72 != 0) {
                                      							SelectObject(_v28, _t72);
                                      						}
                                      						if(_t85 != 0) {
                                      							SelectObject(_v32, _t85);
                                      						}
                                      					}
                                      					_pop(_t80);
                                      					 *[fs:eax] = _t80;
                                      					_push(0xb355e9);
                                      					DeleteDC(_v28);
                                      					return DeleteDC(_v32);
                                      				}
                                      			}
























                                      0x00b35495
                                      0x00b35497
                                      0x00b354a2
                                      0x00b354a3
                                      0x00b354a4
                                      0x00b354a6
                                      0x00b354a9
                                      0x00b354ab
                                      0x00b354b0
                                      0x00b354b3
                                      0x00b354b5
                                      0x00b354ba
                                      0x00b354bf
                                      0x00b354c0
                                      0x00b354c5
                                      0x00b354c8
                                      0x00b354d5
                                      0x00b354dc
                                      0x00b354f6
                                      0x00b354f8
                                      0x00b354fd
                                      0x00b35504
                                      0x00b35506
                                      0x00b35506
                                      0x00b3550d
                                      0x00b3550e
                                      0x00b35513
                                      0x00b35516
                                      0x00b3551c
                                      0x00b35520
                                      0x00b35521
                                      0x00b35524
                                      0x00b35525
                                      0x00b3552a
                                      0x00b35531
                                      0x00b35533
                                      0x00b35533
                                      0x00b3553a
                                      0x00b3553d
                                      0x00b35540
                                      0x00b35545
                                      0x00b35548
                                      0x00b35549
                                      0x00b3554b
                                      0x00b35550
                                      0x00b354de
                                      0x00b354de
                                      0x00b354e0
                                      0x00b354e2
                                      0x00b354e7
                                      0x00b354e8
                                      0x00b354eb
                                      0x00b354ec
                                      0x00b354f1
                                      0x00b3555c
                                      0x00b3556b
                                      0x00b3557a
                                      0x00b355a1
                                      0x00b355a8
                                      0x00b355af
                                      0x00b355af
                                      0x00b355b6
                                      0x00b355bd
                                      0x00b355bd
                                      0x00b355b6
                                      0x00b355c4
                                      0x00b355c7
                                      0x00b355ca
                                      0x00b355d3
                                      0x00b355e1
                                      0x00b355e1

                                      APIs
                                      • 73BEA590.GDI32(00000000), ref: 00B354AB
                                      • 73BEA590.GDI32(00000000,00000000), ref: 00B354B5
                                      • GetObjectA.GDI32(?,00000018,?), ref: 00B354D5
                                      • 73BEA410.GDI32(?,?,00000001,00000001,00000000,00000000,00B355E2,?,00000000,00000000), ref: 00B354EC
                                      • 73BEAC50.USER32(00000000,00000000,00B355E2,?,00000000,00000000), ref: 00B354F8
                                      • 73BEA520.GDI32(00000000,?,?,00000000,00B35551,?,00000000,00000000,00B355E2,?,00000000,00000000), ref: 00B35525
                                      • 73BEB380.USER32(00000000,00000000,00B35558,00000000,00B35551,?,00000000,00000000,00B355E2,?,00000000,00000000), ref: 00B3554B
                                      • SelectObject.GDI32(?,?), ref: 00B35566
                                      • SelectObject.GDI32(?,00000000), ref: 00B35575
                                      • StretchBlt.GDI32(?,00000000,00000000,?,?,?,00000000,00000000,?,?,00CC0020), ref: 00B355A1
                                      • SelectObject.GDI32(?,00000000), ref: 00B355AF
                                      • SelectObject.GDI32(?,00000000), ref: 00B355BD
                                      • DeleteDC.GDI32(?), ref: 00B355D3
                                      • DeleteDC.GDI32(?), ref: 00B355DC
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.289505180.0000000000B11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B10000, based on PE: true
                                      • Associated: 00000000.00000002.289475761.0000000000B10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.289928975.0000000000BDC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.289986188.0000000000BE3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_b10000_loaddll32.jbxd
                                      Similarity
                                      • API ID: Object$Select$A590Delete$A410A520B380Stretch
                                      • String ID:
                                      • API String ID: 956127455-0
                                      • Opcode ID: d371c1f3e80d2ff6321f5a0533f2beea07c978cd0210d6a8a8149f22e0ce1121
                                      • Instruction ID: 0eca0aae8a4d1c932b6ff2132e30b4c148ee8436d6925f7cbf2ff1472d5ef928
                                      • Opcode Fuzzy Hash: d371c1f3e80d2ff6321f5a0533f2beea07c978cd0210d6a8a8149f22e0ce1121
                                      • Instruction Fuzzy Hash: 6141FA72A44609AFDB10DBE8DC42FEFB7FCEB08700F514494B614E7281D6B5AD408B60
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      C-Code - Quality: 100%
                                      			E00B17688(intOrPtr* __eax, int* __edx, intOrPtr* _a4, intOrPtr* _a8) {
                                      				intOrPtr* _v8;
                                      				struct HWND__* _t19;
                                      				int* _t20;
                                      				int* _t26;
                                      				int* _t27;
                                      
                                      				_t26 = _t20;
                                      				_t27 = __edx;
                                      				_v8 = __eax;
                                      				_t19 = FindWindowA("MouseZ", "Magellan MSWHEEL");
                                      				 *_v8 = RegisterClipboardFormatA("MSWHEEL_ROLLMSG");
                                      				 *_t27 = RegisterClipboardFormatA("MSH_WHEELSUPPORT_MSG");
                                      				 *_t26 = RegisterClipboardFormatA("MSH_SCROLL_LINES_MSG");
                                      				if( *_t27 == 0 || _t19 == 0) {
                                      					 *_a8 = 0;
                                      				} else {
                                      					 *_a8 = SendMessageA(_t19,  *_t27, 0, 0);
                                      				}
                                      				if( *_t26 == 0 || _t19 == 0) {
                                      					 *_a4 = 3;
                                      				} else {
                                      					 *_a4 = SendMessageA(_t19,  *_t26, 0, 0);
                                      				}
                                      				return _t19;
                                      			}








                                      0x00b1768f
                                      0x00b17691
                                      0x00b17693
                                      0x00b176a5
                                      0x00b176b4
                                      0x00b176c0
                                      0x00b176cc
                                      0x00b176d1
                                      0x00b176f0
                                      0x00b176d7
                                      0x00b176e7
                                      0x00b176e7
                                      0x00b176f5
                                      0x00b17712
                                      0x00b176fb
                                      0x00b1770b
                                      0x00b1770b
                                      0x00b1771f

                                      APIs
                                      • FindWindowA.USER32 ref: 00B176A0
                                      • RegisterClipboardFormatA.USER32(MSWHEEL_ROLLMSG), ref: 00B176AC
                                      • RegisterClipboardFormatA.USER32(MSH_WHEELSUPPORT_MSG), ref: 00B176BB
                                      • RegisterClipboardFormatA.USER32(MSH_SCROLL_LINES_MSG), ref: 00B176C7
                                      • SendMessageA.USER32 ref: 00B176DF
                                      • SendMessageA.USER32 ref: 00B17703
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.289505180.0000000000B11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B10000, based on PE: true
                                      • Associated: 00000000.00000002.289475761.0000000000B10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.289928975.0000000000BDC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.289986188.0000000000BE3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_b10000_loaddll32.jbxd
                                      Similarity
                                      • API ID: ClipboardFormatRegister$MessageSend$FindWindow
                                      • String ID: MSH_SCROLL_LINES_MSG$MSH_WHEELSUPPORT_MSG$MSWHEEL_ROLLMSG$Magellan MSWHEEL$MouseZ
                                      • API String ID: 1416857345-3736581797
                                      • Opcode ID: 024254fb882559385a6cc81a051226c6963bbfabd64dd64ae7cf54d5f8fd7482
                                      • Instruction ID: 83103ec26cea4700d145c334e118bb73dcab6e6d9cfb096c2e57355b7fef8b37
                                      • Opcode Fuzzy Hash: 024254fb882559385a6cc81a051226c6963bbfabd64dd64ae7cf54d5f8fd7482
                                      • Instruction Fuzzy Hash: F4111C70288301AFE7119F68CC82BAAB7F8EF45710FA044A5F8448B291DEB05C81CB64
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      C-Code - Quality: 57%
                                      			E00B3F5BC(void* __eax, void* __ecx, intOrPtr __edx) {
                                      				intOrPtr _v8;
                                      				struct HDC__* _v12;
                                      				struct tagRECT _v28;
                                      				struct tagRECT _v44;
                                      				char _v56;
                                      				char _v72;
                                      				signed char _t43;
                                      				struct HDC__* _t55;
                                      				void* _t74;
                                      				signed int _t77;
                                      				int _t78;
                                      				int _t79;
                                      				void* _t92;
                                      				intOrPtr _t105;
                                      				void* _t114;
                                      				void* _t117;
                                      				void* _t120;
                                      				void* _t122;
                                      				intOrPtr _t123;
                                      
                                      				_t120 = _t122;
                                      				_t123 = _t122 + 0xffffffbc;
                                      				_t92 = __ecx;
                                      				_v8 = __edx;
                                      				_t114 = __eax;
                                      				_t43 = GetWindowLongA(E00B60FC0(_v8), 0xffffffec);
                                      				if((_t43 & 0x00000002) == 0) {
                                      					return _t43;
                                      				} else {
                                      					GetWindowRect(E00B60FC0(_v8),  &_v44);
                                      					OffsetRect( &_v44,  ~(_v44.left),  ~(_v44.top));
                                      					_t55 = E00B60FC0(_v8);
                                      					_push(_t55);
                                      					L00B1729C();
                                      					_v12 = _t55;
                                      					_push(_t120);
                                      					_push(0xb3f717);
                                      					_push( *[fs:edx]);
                                      					 *[fs:edx] = _t123;
                                      					asm("movsd");
                                      					asm("movsd");
                                      					asm("movsd");
                                      					asm("movsd");
                                      					_t117 = _t114;
                                      					if(_t92 != 0) {
                                      						_t77 = GetWindowLongA(E00B60FC0(_v8), 0xfffffff0);
                                      						if((_t77 & 0x00100000) != 0 && (_t77 & 0x00200000) != 0) {
                                      							_t78 = GetSystemMetrics(2);
                                      							_t79 = GetSystemMetrics(3);
                                      							InflateRect( &_v28, 0xfffffffe, 0xfffffffe);
                                      							E00B2A228(_v28.right - _t78, _v28.right, _v28.bottom - _t79,  &_v72, _v28.bottom);
                                      							asm("movsd");
                                      							asm("movsd");
                                      							asm("movsd");
                                      							asm("movsd");
                                      							_t117 = _t117;
                                      							FillRect(_v12,  &_v28, GetSysColorBrush(0xf));
                                      						}
                                      					}
                                      					ExcludeClipRect(_v12, _v44.left + 2, _v44.top + 2, _v44.right - 2, _v44.bottom - 2);
                                      					E00B3F1F4( &_v56, 2);
                                      					E00B3F148(_t117,  &_v56, _v12, 0,  &_v44);
                                      					_pop(_t105);
                                      					 *[fs:eax] = _t105;
                                      					_push(0xb3f71e);
                                      					_push(_v12);
                                      					_t74 = E00B60FC0(_v8);
                                      					_push(_t74);
                                      					L00B173DC();
                                      					return _t74;
                                      				}
                                      			}






















                                      0x00b3f5bd
                                      0x00b3f5bf
                                      0x00b3f5c5
                                      0x00b3f5c7
                                      0x00b3f5ca
                                      0x00b3f5d7
                                      0x00b3f5df
                                      0x00b3f724
                                      0x00b3f5e5
                                      0x00b3f5f2
                                      0x00b3f607
                                      0x00b3f60f
                                      0x00b3f614
                                      0x00b3f615
                                      0x00b3f61a
                                      0x00b3f61f
                                      0x00b3f620
                                      0x00b3f625
                                      0x00b3f628
                                      0x00b3f632
                                      0x00b3f633
                                      0x00b3f634
                                      0x00b3f635
                                      0x00b3f636
                                      0x00b3f639
                                      0x00b3f646
                                      0x00b3f650
                                      0x00b3f65b
                                      0x00b3f664
                                      0x00b3f673
                                      0x00b3f68d
                                      0x00b3f699
                                      0x00b3f69a
                                      0x00b3f69b
                                      0x00b3f69c
                                      0x00b3f69d
                                      0x00b3f6ae
                                      0x00b3f6ae
                                      0x00b3f650
                                      0x00b3f6d3
                                      0x00b3f6df
                                      0x00b3f6f2
                                      0x00b3f6f9
                                      0x00b3f6fc
                                      0x00b3f6ff
                                      0x00b3f707
                                      0x00b3f70b
                                      0x00b3f710
                                      0x00b3f711
                                      0x00b3f716
                                      0x00b3f716

                                      APIs
                                      • GetWindowLongA.USER32 ref: 00B3F5D7
                                      • GetWindowRect.USER32 ref: 00B3F5F2
                                      • OffsetRect.USER32(?,?,?), ref: 00B3F607
                                      • 73BEB080.USER32(00000000,?,?,?,00000000,?,00000000,000000EC), ref: 00B3F615
                                      • GetWindowLongA.USER32 ref: 00B3F646
                                      • GetSystemMetrics.USER32 ref: 00B3F65B
                                      • GetSystemMetrics.USER32 ref: 00B3F664
                                      • InflateRect.USER32(?,000000FE,000000FE), ref: 00B3F673
                                      • GetSysColorBrush.USER32(0000000F), ref: 00B3F6A0
                                      • FillRect.USER32 ref: 00B3F6AE
                                      • ExcludeClipRect.GDI32(?,?,?,?,?,00000000,00B3F717,?,00000000,?,?,?,00000000,?,00000000,000000EC), ref: 00B3F6D3
                                      • 73BEB380.USER32(00000000,?,00B3F71E,?,?,00000000,00B3F717,?,00000000,?,?,?,00000000,?,00000000,000000EC), ref: 00B3F711
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.289505180.0000000000B11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B10000, based on PE: true
                                      • Associated: 00000000.00000002.289475761.0000000000B10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.289928975.0000000000BDC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.289986188.0000000000BE3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_b10000_loaddll32.jbxd
                                      Similarity
                                      • API ID: Rect$Window$LongMetricsSystem$B080B380BrushClipColorExcludeFillInflateOffset
                                      • String ID:
                                      • API String ID: 3936689491-0
                                      • Opcode ID: 920870bff5a498358431fbc6013f719a44308ea72ab35a79f7d24a29f44e0408
                                      • Instruction ID: 4d624d0fb38a27f140a88e1e1307e7a4ee5873db5beaee3ffb2ab4a33336ab26
                                      • Opcode Fuzzy Hash: 920870bff5a498358431fbc6013f719a44308ea72ab35a79f7d24a29f44e0408
                                      • Instruction Fuzzy Hash: 1F412E72A44109ABDB11EAE8DD42EEFB7FDEF49310F5001A0F914F7251CA74AE458764
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      C-Code - Quality: 88%
                                      			E00B3A030(struct HDC__* _a4, RECT* _a8, _Unknown_base(*)()* _a12, long _a16) {
                                      				struct tagPOINT _v12;
                                      				int _v16;
                                      				struct tagRECT _v32;
                                      				struct tagRECT _v48;
                                      				void* __ebx;
                                      				void* __edi;
                                      				void* __esi;
                                      				void* __ebp;
                                      				void* _t60;
                                      				int _t61;
                                      				RECT* _t64;
                                      				struct HDC__* _t65;
                                      
                                      				_t64 = _a8;
                                      				_t65 = _a4;
                                      				if( *0xbdf923 != 0) {
                                      					_t61 = 0;
                                      					if(_a12 == 0) {
                                      						L14:
                                      						return _t61;
                                      					}
                                      					_v32.left = 0;
                                      					_v32.top = 0;
                                      					_v32.right = GetSystemMetrics(0);
                                      					_v32.bottom = GetSystemMetrics(1);
                                      					if(_t65 == 0) {
                                      						if(_t64 == 0 || IntersectRect( &_v32,  &_v32, _t64) != 0) {
                                      							L13:
                                      							_t61 = _a12(0x12340042, _t65,  &_v32, _a16);
                                      						} else {
                                      							_t61 = 1;
                                      						}
                                      						goto L14;
                                      					}
                                      					_v16 = GetClipBox(_t65,  &_v48);
                                      					if(GetDCOrgEx(_t65,  &_v12) == 0) {
                                      						goto L14;
                                      					}
                                      					OffsetRect( &_v32,  ~(_v12.x),  ~(_v12.y));
                                      					if(IntersectRect( &_v32,  &_v32,  &_v48) == 0 || _t64 != 0) {
                                      						if(IntersectRect( &_v32,  &_v32, _t64) != 0) {
                                      							goto L13;
                                      						}
                                      						if(_v16 == 1) {
                                      							_t61 = 1;
                                      						}
                                      						goto L14;
                                      					} else {
                                      						goto L13;
                                      					}
                                      				}
                                      				 *0xbdf910 = E00B39A84(7, _t60,  *0xbdf910, _t64, _t65);
                                      				_t61 = EnumDisplayMonitors(_t65, _t64, _a12, _a16);
                                      				goto L14;
                                      			}















                                      0x00b3a039
                                      0x00b3a03c
                                      0x00b3a046
                                      0x00b3a076
                                      0x00b3a07c
                                      0x00b3a138
                                      0x00b3a140
                                      0x00b3a140
                                      0x00b3a084
                                      0x00b3a089
                                      0x00b3a094
                                      0x00b3a09f
                                      0x00b3a0a4
                                      0x00b3a10d
                                      0x00b3a125
                                      0x00b3a136
                                      0x00b3a121
                                      0x00b3a121
                                      0x00b3a121
                                      0x00000000
                                      0x00b3a10d
                                      0x00b3a0b0
                                      0x00b3a0bf
                                      0x00000000
                                      0x00000000
                                      0x00b3a0d1
                                      0x00b3a0e9
                                      0x00b3a0ff
                                      0x00000000
                                      0x00000000
                                      0x00b3a105
                                      0x00b3a107
                                      0x00b3a107
                                      0x00000000
                                      0x00000000
                                      0x00000000
                                      0x00000000
                                      0x00b3a0e9
                                      0x00b3a05a
                                      0x00b3a06f
                                      0x00000000

                                      APIs
                                      • EnumDisplayMonitors.USER32(?,?,?,?), ref: 00B3A069
                                      • GetSystemMetrics.USER32 ref: 00B3A08E
                                      • GetSystemMetrics.USER32 ref: 00B3A099
                                      • GetClipBox.GDI32(?,?), ref: 00B3A0AB
                                      • GetDCOrgEx.GDI32(?,?), ref: 00B3A0B8
                                      • OffsetRect.USER32(?,?,?), ref: 00B3A0D1
                                      • IntersectRect.USER32 ref: 00B3A0E2
                                      • IntersectRect.USER32 ref: 00B3A0F8
                                        • Part of subcall function 00B39A84: GetProcAddress.KERNEL32(75BA0000,00000000), ref: 00B39B04
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.289505180.0000000000B11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B10000, based on PE: true
                                      • Associated: 00000000.00000002.289475761.0000000000B10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.289928975.0000000000BDC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.289986188.0000000000BE3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_b10000_loaddll32.jbxd
                                      Similarity
                                      • API ID: Rect$IntersectMetricsSystem$AddressClipDisplayEnumMonitorsOffsetProc
                                      • String ID: EnumDisplayMonitors
                                      • API String ID: 362875416-2491903729
                                      • Opcode ID: 5ad10ad09852430a6c582f16816094897a3978d87499ca098c124eae30e7d72c
                                      • Instruction ID: 139c88948867770ab81ffdb2e70ac6763b78caad83f16875b9c829fb96f0c783
                                      • Opcode Fuzzy Hash: 5ad10ad09852430a6c582f16816094897a3978d87499ca098c124eae30e7d72c
                                      • Instruction Fuzzy Hash: EE310E7290560AAFDB10DFA4DC44AEFB7FCEB0A310F604166F915E3141EA75DA418BA1
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      C-Code - Quality: 72%
                                      			E00B1D284(void* __ebx, void* __edx, void* __edi, void* __esi) {
                                      				char _v8;
                                      				char _v12;
                                      				char _v16;
                                      				char _v20;
                                      				char _v24;
                                      				char _v28;
                                      				char _v32;
                                      				char _v36;
                                      				char _v40;
                                      				char _v44;
                                      				char _v48;
                                      				char _v52;
                                      				char _v56;
                                      				char _v60;
                                      				char _v64;
                                      				char _v68;
                                      				void* _t104;
                                      				void* _t111;
                                      				void* _t133;
                                      				intOrPtr _t183;
                                      				intOrPtr _t193;
                                      				intOrPtr _t194;
                                      
                                      				_t191 = __esi;
                                      				_t190 = __edi;
                                      				_t193 = _t194;
                                      				_t133 = 8;
                                      				do {
                                      					_push(0);
                                      					_push(0);
                                      					_t133 = _t133 - 1;
                                      				} while (_t133 != 0);
                                      				_push(__ebx);
                                      				_push(_t193);
                                      				_push(0xb1d54f);
                                      				_push( *[fs:eax]);
                                      				 *[fs:eax] = _t194;
                                      				E00B1D110();
                                      				E00B1BAB8(__ebx, __edi, __esi);
                                      				_t196 =  *0xbdf750;
                                      				if( *0xbdf750 != 0) {
                                      					E00B1BC90(__esi, _t196);
                                      				}
                                      				_t132 = GetThreadLocale();
                                      				E00B1BA08(_t43, 0, 0x14,  &_v20);
                                      				E00B1427C(0xbdf684, _v20);
                                      				E00B1BA08(_t43, 0xb1d564, 0x1b,  &_v24);
                                      				 *0xbdf688 = E00B18C68(0xb1d564, 0, _t196);
                                      				E00B1BA08(_t132, 0xb1d564, 0x1c,  &_v28);
                                      				 *0xbdf689 = E00B18C68(0xb1d564, 0, _t196);
                                      				 *0xbdf68a = E00B1BA54(_t132, 0x2c, 0xf);
                                      				 *0xbdf68b = E00B1BA54(_t132, 0x2e, 0xe);
                                      				E00B1BA08(_t132, 0xb1d564, 0x19,  &_v32);
                                      				 *0xbdf68c = E00B18C68(0xb1d564, 0, _t196);
                                      				 *0xbdf68d = E00B1BA54(_t132, 0x2f, 0x1d);
                                      				E00B1BA08(_t132, "m/d/yy", 0x1f,  &_v40);
                                      				E00B1BD40(_v40, _t132,  &_v36, _t190, _t191, _t196);
                                      				E00B1427C(0xbdf690, _v36);
                                      				E00B1BA08(_t132, "mmmm d, yyyy", 0x20,  &_v48);
                                      				E00B1BD40(_v48, _t132,  &_v44, _t190, _t191, _t196);
                                      				E00B1427C(0xbdf694, _v44);
                                      				 *0xbdf698 = E00B1BA54(_t132, 0x3a, 0x1e);
                                      				E00B1BA08(_t132, 0xb1d598, 0x28,  &_v52);
                                      				E00B1427C(0xbdf69c, _v52);
                                      				E00B1BA08(_t132, 0xb1d5a4, 0x29,  &_v56);
                                      				E00B1427C(0xbdf6a0, _v56);
                                      				E00B14228( &_v12);
                                      				E00B14228( &_v16);
                                      				E00B1BA08(_t132, 0xb1d564, 0x25,  &_v60);
                                      				_t104 = E00B18C68(0xb1d564, 0, _t196);
                                      				_t197 = _t104;
                                      				if(_t104 != 0) {
                                      					E00B142C0( &_v8, 0xb1d5bc);
                                      				} else {
                                      					E00B142C0( &_v8, 0xb1d5b0);
                                      				}
                                      				E00B1BA08(_t132, 0xb1d564, 0x23,  &_v64);
                                      				_t111 = E00B18C68(0xb1d564, 0, _t197);
                                      				_t198 = _t111;
                                      				if(_t111 == 0) {
                                      					E00B1BA08(_t132, 0xb1d564, 0x1005,  &_v68);
                                      					if(E00B18C68(0xb1d564, 0, _t198) != 0) {
                                      						E00B142C0( &_v12, 0xb1d5d8);
                                      					} else {
                                      						E00B142C0( &_v16, 0xb1d5c8);
                                      					}
                                      				}
                                      				_push(_v12);
                                      				_push(_v8);
                                      				_push(":mm");
                                      				_push(_v16);
                                      				E00B145A8();
                                      				_push(_v12);
                                      				_push(_v8);
                                      				_push(":mm:ss");
                                      				_push(_v16);
                                      				E00B145A8();
                                      				 *0xbdf752 = E00B1BA54(_t132, 0x2c, 0xc);
                                      				_pop(_t183);
                                      				 *[fs:eax] = _t183;
                                      				_push(0xb1d556);
                                      				return E00B1424C( &_v68, 0x10);
                                      			}

























                                      0x00b1d284
                                      0x00b1d284
                                      0x00b1d285
                                      0x00b1d287
                                      0x00b1d28c
                                      0x00b1d28c
                                      0x00b1d28e
                                      0x00b1d290
                                      0x00b1d290
                                      0x00b1d293
                                      0x00b1d296
                                      0x00b1d297
                                      0x00b1d29c
                                      0x00b1d29f
                                      0x00b1d2a2
                                      0x00b1d2a7
                                      0x00b1d2ac
                                      0x00b1d2b3
                                      0x00b1d2b5
                                      0x00b1d2b5
                                      0x00b1d2bf
                                      0x00b1d2ce
                                      0x00b1d2db
                                      0x00b1d2f0
                                      0x00b1d2ff
                                      0x00b1d314
                                      0x00b1d323
                                      0x00b1d336
                                      0x00b1d349
                                      0x00b1d35e
                                      0x00b1d36d
                                      0x00b1d380
                                      0x00b1d395
                                      0x00b1d3a0
                                      0x00b1d3ad
                                      0x00b1d3c2
                                      0x00b1d3cd
                                      0x00b1d3da
                                      0x00b1d3ed
                                      0x00b1d402
                                      0x00b1d40f
                                      0x00b1d424
                                      0x00b1d431
                                      0x00b1d439
                                      0x00b1d441
                                      0x00b1d456
                                      0x00b1d460
                                      0x00b1d465
                                      0x00b1d467
                                      0x00b1d480
                                      0x00b1d469
                                      0x00b1d471
                                      0x00b1d471
                                      0x00b1d495
                                      0x00b1d49f
                                      0x00b1d4a4
                                      0x00b1d4a6
                                      0x00b1d4b8
                                      0x00b1d4c9
                                      0x00b1d4e2
                                      0x00b1d4cb
                                      0x00b1d4d3
                                      0x00b1d4d3
                                      0x00b1d4c9
                                      0x00b1d4e7
                                      0x00b1d4ea
                                      0x00b1d4ed
                                      0x00b1d4f2
                                      0x00b1d4ff
                                      0x00b1d504
                                      0x00b1d507
                                      0x00b1d50a
                                      0x00b1d50f
                                      0x00b1d51c
                                      0x00b1d52f
                                      0x00b1d536
                                      0x00b1d539
                                      0x00b1d53c
                                      0x00b1d54e

                                      APIs
                                      • GetThreadLocale.KERNEL32(00000000,00B1D54F,?,?,00000000,00000000), ref: 00B1D2BA
                                        • Part of subcall function 00B1BA08: GetLocaleInfoA.KERNEL32(?,?,?,00000100), ref: 00B1BA26
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.289505180.0000000000B11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B10000, based on PE: true
                                      • Associated: 00000000.00000002.289475761.0000000000B10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.289928975.0000000000BDC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.289986188.0000000000BE3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_b10000_loaddll32.jbxd
                                      Similarity
                                      • API ID: Locale$InfoThread
                                      • String ID: AMPM$:mm$:mm:ss$AMPM $m/d/yy$mmmm d, yyyy
                                      • API String ID: 4232894706-2493093252
                                      • Opcode ID: b820bfa661d82d5f5488d07bcec64fed0e1b9de063c621500f243540c91d73df
                                      • Instruction ID: 8019b3e1f06b6086af22012080e7cec0320904972a86d272073e688a83ec0828
                                      • Opcode Fuzzy Hash: b820bfa661d82d5f5488d07bcec64fed0e1b9de063c621500f243540c91d73df
                                      • Instruction Fuzzy Hash: FE616D317142499BDB00EBA4D881ADEBBE6EF99300FD094B5F101AB756DF38D985CB50
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      C-Code - Quality: 77%
                                      			E00B1FB3C(short* __eax, intOrPtr __ecx, intOrPtr* __edx) {
                                      				char _v260;
                                      				char _v768;
                                      				char _v772;
                                      				short* _v776;
                                      				intOrPtr _v780;
                                      				char _v784;
                                      				signed int _v788;
                                      				signed short* _v792;
                                      				char _v796;
                                      				char _v800;
                                      				intOrPtr* _v804;
                                      				void* __ebp;
                                      				signed char _t47;
                                      				signed int _t54;
                                      				void* _t62;
                                      				intOrPtr* _t73;
                                      				intOrPtr* _t91;
                                      				void* _t93;
                                      				void* _t95;
                                      				void* _t98;
                                      				void* _t99;
                                      				intOrPtr* _t108;
                                      				void* _t112;
                                      				intOrPtr _t113;
                                      				char* _t114;
                                      				void* _t115;
                                      
                                      				_t100 = __ecx;
                                      				_v780 = __ecx;
                                      				_t91 = __edx;
                                      				_v776 = __eax;
                                      				if(( *(__edx + 1) & 0x00000020) == 0) {
                                      					E00B1F6E4(0x80070057);
                                      				}
                                      				_t47 =  *_t91;
                                      				if((_t47 & 0x00000fff) != 0xc) {
                                      					_push(_t91);
                                      					_push(_v776);
                                      					L00B1E2FC();
                                      					return E00B1F6E4(_v776);
                                      				} else {
                                      					if((_t47 & 0x00000040) == 0) {
                                      						_v792 =  *((intOrPtr*)(_t91 + 8));
                                      					} else {
                                      						_v792 =  *((intOrPtr*)( *((intOrPtr*)(_t91 + 8))));
                                      					}
                                      					_v788 =  *_v792 & 0x0000ffff;
                                      					_t93 = _v788 - 1;
                                      					if(_t93 < 0) {
                                      						L9:
                                      						_push( &_v772);
                                      						_t54 = _v788;
                                      						_push(_t54);
                                      						_push(0xc);
                                      						L00B1E758();
                                      						_t113 = _t54;
                                      						if(_t113 == 0) {
                                      							E00B1F43C(_t100);
                                      						}
                                      						E00B1FA94(_v776);
                                      						 *_v776 = 0x200c;
                                      						 *((intOrPtr*)(_v776 + 8)) = _t113;
                                      						_t95 = _v788 - 1;
                                      						if(_t95 < 0) {
                                      							L14:
                                      							_t97 = _v788 - 1;
                                      							if(E00B1FAB0(_v788 - 1, _t115) != 0) {
                                      								L00B1E790();
                                      								E00B1F6E4(_v792);
                                      								L00B1E790();
                                      								E00B1F6E4( &_v260);
                                      								_v780(_t113,  &_v260,  &_v800, _v792,  &_v260,  &_v796);
                                      							}
                                      							_t62 = E00B1FAE0(_t97, _t115);
                                      						} else {
                                      							_t98 = _t95 + 1;
                                      							_t73 =  &_v768;
                                      							_t108 =  &_v260;
                                      							do {
                                      								 *_t108 =  *_t73;
                                      								_t108 = _t108 + 4;
                                      								_t73 = _t73 + 8;
                                      								_t98 = _t98 - 1;
                                      							} while (_t98 != 0);
                                      							do {
                                      								goto L14;
                                      							} while (_t62 != 0);
                                      							return _t62;
                                      						}
                                      					} else {
                                      						_t99 = _t93 + 1;
                                      						_t112 = 0;
                                      						_t114 =  &_v772;
                                      						do {
                                      							_v804 = _t114;
                                      							_push(_v804 + 4);
                                      							_t18 = _t112 + 1; // 0x1
                                      							_push(_v792);
                                      							L00B1E760();
                                      							E00B1F6E4(_v792);
                                      							_push( &_v784);
                                      							_t21 = _t112 + 1; // 0x1
                                      							_push(_v792);
                                      							L00B1E768();
                                      							E00B1F6E4(_v792);
                                      							 *_v804 = _v784 -  *((intOrPtr*)(_v804 + 4)) + 1;
                                      							_t112 = _t112 + 1;
                                      							_t114 = _t114 + 8;
                                      							_t99 = _t99 - 1;
                                      						} while (_t99 != 0);
                                      						goto L9;
                                      					}
                                      				}
                                      			}





























                                      0x00b1fb3c
                                      0x00b1fb48
                                      0x00b1fb4e
                                      0x00b1fb50
                                      0x00b1fb5a
                                      0x00b1fb61
                                      0x00b1fb61
                                      0x00b1fb66
                                      0x00b1fb74
                                      0x00b1fced
                                      0x00b1fcf4
                                      0x00b1fcf5
                                      0x00000000
                                      0x00b1fb7a
                                      0x00b1fb7d
                                      0x00b1fb8f
                                      0x00b1fb7f
                                      0x00b1fb84
                                      0x00b1fb84
                                      0x00b1fb9e
                                      0x00b1fbaa
                                      0x00b1fbad
                                      0x00b1fc1a
                                      0x00b1fc20
                                      0x00b1fc21
                                      0x00b1fc27
                                      0x00b1fc28
                                      0x00b1fc2a
                                      0x00b1fc2f
                                      0x00b1fc33
                                      0x00b1fc35
                                      0x00b1fc35
                                      0x00b1fc40
                                      0x00b1fc4b
                                      0x00b1fc56
                                      0x00b1fc5f
                                      0x00b1fc62
                                      0x00b1fc7e
                                      0x00b1fc85
                                      0x00b1fc90
                                      0x00b1fca7
                                      0x00b1fcac
                                      0x00b1fcc0
                                      0x00b1fcc5
                                      0x00b1fcd8
                                      0x00b1fcd8
                                      0x00b1fce1
                                      0x00b1fc64
                                      0x00b1fc64
                                      0x00b1fc65
                                      0x00b1fc6b
                                      0x00b1fc71
                                      0x00b1fc73
                                      0x00b1fc75
                                      0x00b1fc78
                                      0x00b1fc7b
                                      0x00b1fc7b
                                      0x00b1fc7e
                                      0x00000000
                                      0x00000000
                                      0x00000000
                                      0x00b1fc7e
                                      0x00b1fbaf
                                      0x00b1fbaf
                                      0x00b1fbb0
                                      0x00b1fbb2
                                      0x00b1fbb8
                                      0x00b1fbba
                                      0x00b1fbc9
                                      0x00b1fbca
                                      0x00b1fbd4
                                      0x00b1fbd5
                                      0x00b1fbda
                                      0x00b1fbe5
                                      0x00b1fbe6
                                      0x00b1fbf0
                                      0x00b1fbf1
                                      0x00b1fbf6
                                      0x00b1fc11
                                      0x00b1fc13
                                      0x00b1fc14
                                      0x00b1fc17
                                      0x00b1fc17
                                      0x00000000
                                      0x00b1fbb8
                                      0x00b1fbad

                                      APIs
                                      • SafeArrayGetLBound.OLEAUT32(?,00000001,?), ref: 00B1FBD5
                                      • SafeArrayGetUBound.OLEAUT32(?,00000001,?), ref: 00B1FBF1
                                      • SafeArrayCreate.OLEAUT32(0000000C,?,?), ref: 00B1FC2A
                                      • SafeArrayPtrOfIndex.OLEAUT32(?,?,?), ref: 00B1FCA7
                                      • SafeArrayPtrOfIndex.OLEAUT32(00000000,?,?), ref: 00B1FCC0
                                      • VariantCopy.OLEAUT32(?), ref: 00B1FCF5
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.289505180.0000000000B11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B10000, based on PE: true
                                      • Associated: 00000000.00000002.289475761.0000000000B10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.289928975.0000000000BDC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.289986188.0000000000BE3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_b10000_loaddll32.jbxd
                                      Similarity
                                      • API ID: ArraySafe$BoundIndex$CopyCreateVariant
                                      • String ID:
                                      • API String ID: 351091851-3916222277
                                      • Opcode ID: 1637a73e56f6c814b651d0282bdc9763110833d29606e8994f0fda8ef278c806
                                      • Instruction ID: 6533a25a9d046b6f18722388d5eb808853dfddf662d138aa0d47a4196847c58f
                                      • Opcode Fuzzy Hash: 1637a73e56f6c814b651d0282bdc9763110833d29606e8994f0fda8ef278c806
                                      • Instruction Fuzzy Hash: 8451ED7590062E9BDB22DB58C891AE9B3FDEF58310F8041E5E909E7212D6309FC5CF65
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      C-Code - Quality: 67%
                                      			E00B39DB4(struct HMONITOR__* _a4, struct tagMONITORINFO* _a8) {
                                      				void _v20;
                                      				void* __ebx;
                                      				void* __edi;
                                      				void* __esi;
                                      				void* __ebp;
                                      				void* _t23;
                                      				int _t24;
                                      				struct HMONITOR__* _t27;
                                      				struct tagMONITORINFO* _t29;
                                      				intOrPtr* _t31;
                                      
                                      				_t29 = _a8;
                                      				_t27 = _a4;
                                      				if( *0xbdf920 != 0) {
                                      					_t24 = 0;
                                      					if(_t27 == 0x12340042 && _t29 != 0 && _t29->cbSize >= 0x28 && SystemParametersInfoA(0x30, 0,  &_v20, 0) != 0) {
                                      						_t29->rcMonitor.left = 0;
                                      						_t29->rcMonitor.top = 0;
                                      						_t29->rcMonitor.right = GetSystemMetrics(0);
                                      						_t29->rcMonitor.bottom = GetSystemMetrics(1);
                                      						asm("movsd");
                                      						asm("movsd");
                                      						asm("movsd");
                                      						asm("movsd");
                                      						_t31 = _t29;
                                      						 *(_t31 + 0x24) = 1;
                                      						if( *_t31 >= 0x4c) {
                                      							_push("DISPLAY");
                                      							_push(_t31 + 0x28);
                                      							L00B16E54();
                                      						}
                                      						_t24 = 1;
                                      					}
                                      				} else {
                                      					 *0xbdf904 = E00B39A84(4, _t23,  *0xbdf904, _t27, _t29);
                                      					_t24 = GetMonitorInfoA(_t27, _t29);
                                      				}
                                      				return _t24;
                                      			}













                                      0x00b39dbd
                                      0x00b39dc0
                                      0x00b39dca
                                      0x00b39def
                                      0x00b39df7
                                      0x00b39e17
                                      0x00b39e1c
                                      0x00b39e27
                                      0x00b39e32
                                      0x00b39e3c
                                      0x00b39e3d
                                      0x00b39e3e
                                      0x00b39e3f
                                      0x00b39e40
                                      0x00b39e41
                                      0x00b39e4b
                                      0x00b39e4d
                                      0x00b39e55
                                      0x00b39e56
                                      0x00b39e56
                                      0x00b39e5b
                                      0x00b39e5b
                                      0x00b39dcc
                                      0x00b39dde
                                      0x00b39deb
                                      0x00b39deb
                                      0x00b39e65

                                      APIs
                                      • GetMonitorInfoA.USER32(?,?), ref: 00B39DE5
                                      • SystemParametersInfoA.USER32(00000030,00000000,?,00000000), ref: 00B39E0C
                                      • GetSystemMetrics.USER32 ref: 00B39E21
                                      • GetSystemMetrics.USER32 ref: 00B39E2C
                                      • lstrcpy.KERNEL32(?,DISPLAY), ref: 00B39E56
                                        • Part of subcall function 00B39A84: GetProcAddress.KERNEL32(75BA0000,00000000), ref: 00B39B04
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.289505180.0000000000B11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B10000, based on PE: true
                                      • Associated: 00000000.00000002.289475761.0000000000B10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.289928975.0000000000BDC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.289986188.0000000000BE3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_b10000_loaddll32.jbxd
                                      Similarity
                                      • API ID: System$InfoMetrics$AddressMonitorParametersProclstrcpy
                                      • String ID: DISPLAY$GetMonitorInfo
                                      • API String ID: 1539801207-1633989206
                                      • Opcode ID: e31b3d83043c2bf17248c0ff0704d7d96c2595620cb33e14477d14fa09b286fa
                                      • Instruction ID: 5997d1b30e5151323cab9624e4593d02b37dca13567aaece4cd45769a285bf8d
                                      • Opcode Fuzzy Hash: e31b3d83043c2bf17248c0ff0704d7d96c2595620cb33e14477d14fa09b286fa
                                      • Instruction Fuzzy Hash: 5311B4326063159FD720CF64DC447B7B7E9EB45B11F20497AE94A87250E7B0E948C7A1
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      C-Code - Quality: 79%
                                      			E00B140AC(void* __ecx) {
                                      				long _v4;
                                      				int _t3;
                                      
                                      				if( *0xbdf04c == 0) {
                                      					if( *0xbdc030 == 0) {
                                      						_t3 = MessageBoxA(0, "Runtime error     at 00000000", "Error", 0);
                                      					}
                                      					return _t3;
                                      				} else {
                                      					if( *0xbdf220 == 0xd7b2 &&  *0xbdf228 > 0) {
                                      						 *0xbdf238();
                                      					}
                                      					WriteFile(GetStdHandle(0xfffffff5), "Runtime error     at 00000000", 0x1e,  &_v4, 0);
                                      					return WriteFile(GetStdHandle(0xfffffff5), E00B14134, 2,  &_v4, 0);
                                      				}
                                      			}





                                      0x00b140b4
                                      0x00b14114
                                      0x00b14124
                                      0x00b14124
                                      0x00b1412a
                                      0x00b140b6
                                      0x00b140bf
                                      0x00b140cf
                                      0x00b140cf
                                      0x00b140eb
                                      0x00b1410c
                                      0x00b1410c

                                      APIs
                                      • GetStdHandle.KERNEL32(000000F5,Runtime error at 00000000,0000001E,00BDB89C,00000000,?,00B1417A,?,?,00BDF638,?,?,00BDC0BC,00B16835,00BDB89C), ref: 00B140E5
                                      • WriteFile.KERNEL32(00000000,000000F5,Runtime error at 00000000,0000001E,00BDB89C,00000000,?,00B1417A,?,?,00BDF638,?,?,00BDC0BC,00B16835,00BDB89C), ref: 00B140EB
                                      • GetStdHandle.KERNEL32(000000F5,00B14134,00000002,00BDB89C,00000000,00000000,000000F5,Runtime error at 00000000,0000001E,00BDB89C,00000000,?,00B1417A,?,?,00BDF638), ref: 00B14100
                                      • WriteFile.KERNEL32(00000000,000000F5,00B14134,00000002,00BDB89C,00000000,00000000,000000F5,Runtime error at 00000000,0000001E,00BDB89C,00000000,?,00B1417A,?,?), ref: 00B14106
                                      • MessageBoxA.USER32 ref: 00B14124
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.289505180.0000000000B11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B10000, based on PE: true
                                      • Associated: 00000000.00000002.289475761.0000000000B10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.289928975.0000000000BDC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.289986188.0000000000BE3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_b10000_loaddll32.jbxd
                                      Similarity
                                      • API ID: FileHandleWrite$Message
                                      • String ID: Error$Runtime error at 00000000
                                      • API String ID: 1570097196-2970929446
                                      • Opcode ID: 9763b5c48106f6f19302765e6db75dcc2d2a4622be06353276f3431afb2d8f6a
                                      • Instruction ID: a7c54756c7392d522684d15ebe5d4e984579d8dd9569fa87719597d691aaef8e
                                      • Opcode Fuzzy Hash: 9763b5c48106f6f19302765e6db75dcc2d2a4622be06353276f3431afb2d8f6a
                                      • Instruction Fuzzy Hash: 20F0BB55685301B5EA20B7545C07FE9AADCC704F25FD486E7B311E61E3EBA444C4CB11
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      C-Code - Quality: 26%
                                      			E00B359C4(void* __ebx) {
                                      				intOrPtr _v8;
                                      				char _v1000;
                                      				char _v1004;
                                      				char _v1032;
                                      				signed int _v1034;
                                      				short _v1036;
                                      				void* _t24;
                                      				intOrPtr _t25;
                                      				intOrPtr _t27;
                                      				intOrPtr _t29;
                                      				intOrPtr _t45;
                                      				intOrPtr _t52;
                                      				void* _t54;
                                      				void* _t55;
                                      
                                      				_t54 = _t55;
                                      				_v1036 = 0x300;
                                      				_v1034 = 0x10;
                                      				_t25 = E00B12AC8(_t24, 0x40,  &_v1032);
                                      				_push(0);
                                      				L00B171A4();
                                      				_v8 = _t25;
                                      				_push(_t54);
                                      				_push(0xb35ac1);
                                      				_push( *[fs:eax]);
                                      				 *[fs:eax] = _t55 + 0xfffffbf8;
                                      				_push(0x68);
                                      				_t27 = _v8;
                                      				_push(_t27);
                                      				L00B16F24();
                                      				_t45 = _t27;
                                      				if(_t45 >= 0x10) {
                                      					_push( &_v1032);
                                      					_push(8);
                                      					_push(0);
                                      					_push(_v8);
                                      					L00B16F4C();
                                      					if(_v1004 != 0xc0c0c0) {
                                      						_push(_t54 + (_v1034 & 0x0000ffff) * 4 - 0x424);
                                      						_push(8);
                                      						_push(_t45 - 8);
                                      						_push(_v8);
                                      						L00B16F4C();
                                      					} else {
                                      						_push( &_v1004);
                                      						_push(1);
                                      						_push(_t45 - 8);
                                      						_push(_v8);
                                      						L00B16F4C();
                                      						_push(_t54 + (_v1034 & 0x0000ffff) * 4 - 0x420);
                                      						_push(7);
                                      						_push(_t45 - 7);
                                      						_push(_v8);
                                      						L00B16F4C();
                                      						_push( &_v1000);
                                      						_push(1);
                                      						_push(7);
                                      						_push(_v8);
                                      						L00B16F4C();
                                      					}
                                      				}
                                      				_pop(_t52);
                                      				 *[fs:eax] = _t52;
                                      				_push(0xb35ac8);
                                      				_t29 = _v8;
                                      				_push(_t29);
                                      				_push(0);
                                      				L00B173DC();
                                      				return _t29;
                                      			}

















                                      0x00b359c5
                                      0x00b359ce
                                      0x00b359d7
                                      0x00b359eb
                                      0x00b359f0
                                      0x00b359f2
                                      0x00b359f7
                                      0x00b359fc
                                      0x00b359fd
                                      0x00b35a02
                                      0x00b35a05
                                      0x00b35a08
                                      0x00b35a0a
                                      0x00b35a0d
                                      0x00b35a0e
                                      0x00b35a13
                                      0x00b35a18
                                      0x00b35a24
                                      0x00b35a25
                                      0x00b35a27
                                      0x00b35a2c
                                      0x00b35a2d
                                      0x00b35a3c
                                      0x00b35a98
                                      0x00b35a99
                                      0x00b35a9e
                                      0x00b35aa2
                                      0x00b35aa3
                                      0x00b35a3e
                                      0x00b35a44
                                      0x00b35a45
                                      0x00b35a4c
                                      0x00b35a50
                                      0x00b35a51
                                      0x00b35a64
                                      0x00b35a65
                                      0x00b35a6a
                                      0x00b35a6e
                                      0x00b35a6f
                                      0x00b35a7a
                                      0x00b35a7b
                                      0x00b35a7d
                                      0x00b35a82
                                      0x00b35a83
                                      0x00b35a83
                                      0x00b35a3c
                                      0x00b35aaa
                                      0x00b35aad
                                      0x00b35ab0
                                      0x00b35ab5
                                      0x00b35ab8
                                      0x00b35ab9
                                      0x00b35abb
                                      0x00b35ac0

                                      APIs
                                      • 73BEAC50.USER32(00000000), ref: 00B359F2
                                      • 73BEAD70.GDI32(?,00000068,00000000,00B35AC1,?,00000000), ref: 00B35A0E
                                      • 73BEAEF0.GDI32(?,00000000,00000008,?,?,00000068,00000000,00B35AC1,?,00000000), ref: 00B35A2D
                                      • 73BEAEF0.GDI32(?,-00000008,00000001,00C0C0C0,?,00000000,00000008,?,?,00000068,00000000,00B35AC1,?,00000000), ref: 00B35A51
                                      • 73BEAEF0.GDI32(?,00000000,00000007,?,?,-00000008,00000001,00C0C0C0,?,00000000,00000008,?,?,00000068,00000000,00B35AC1), ref: 00B35A6F
                                      • 73BEAEF0.GDI32(?,00000007,00000001,?,?,00000000,00000007,?,?,-00000008,00000001,00C0C0C0,?,00000000,00000008,?), ref: 00B35A83
                                      • 73BEAEF0.GDI32(?,00000000,00000008,?,?,00000000,00000008,?,?,00000068,00000000,00B35AC1,?,00000000), ref: 00B35AA3
                                      • 73BEB380.USER32(00000000,?,00B35AC8,00B35AC1,?,00000000), ref: 00B35ABB
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.289505180.0000000000B11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B10000, based on PE: true
                                      • Associated: 00000000.00000002.289475761.0000000000B10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.289928975.0000000000BDC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.289986188.0000000000BE3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_b10000_loaddll32.jbxd
                                      Similarity
                                      • API ID: B380
                                      • String ID:
                                      • API String ID: 120756276-0
                                      • Opcode ID: 597bb32221cb3daa171326f74717dd12ad051f5b89e474c5e1e65588eb9d62bb
                                      • Instruction ID: fe7e2332cd8dab65be6fcc85ea75b1730dbe1df1af8e8f0f628a4977001b4293
                                      • Opcode Fuzzy Hash: 597bb32221cb3daa171326f74717dd12ad051f5b89e474c5e1e65588eb9d62bb
                                      • Instruction Fuzzy Hash: 49213EB1A40208BAEB10DBA4DDC6FAE73FCEB48704F9005D1FB04E7581D675AE959B24
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      C-Code - Quality: 76%
                                      			E00B4A59C(intOrPtr __eax, void* __ebx, void* __fp0) {
                                      				intOrPtr _v8;
                                      				int _v12;
                                      				void* _v16;
                                      				char _v20;
                                      				void* _v24;
                                      				struct HKL__* _v280;
                                      				char _v536;
                                      				char _v600;
                                      				char _v604;
                                      				char _v608;
                                      				char _v612;
                                      				void* _t60;
                                      				intOrPtr _t106;
                                      				intOrPtr _t111;
                                      				void* _t117;
                                      				void* _t118;
                                      				intOrPtr _t119;
                                      				void* _t129;
                                      
                                      				_t129 = __fp0;
                                      				_t117 = _t118;
                                      				_t119 = _t118 + 0xfffffda0;
                                      				_v612 = 0;
                                      				_v8 = __eax;
                                      				_push(_t117);
                                      				_push(0xb4a747);
                                      				_push( *[fs:eax]);
                                      				 *[fs:eax] = _t119;
                                      				if( *((intOrPtr*)(_v8 + 0x34)) != 0) {
                                      					L11:
                                      					_pop(_t106);
                                      					 *[fs:eax] = _t106;
                                      					_push(0xb4a74e);
                                      					return E00B14228( &_v612);
                                      				} else {
                                      					 *((intOrPtr*)(_v8 + 0x34)) = E00B13350(1);
                                      					E00B14228(_v8 + 0x38);
                                      					_t60 = GetKeyboardLayoutList(0x40,  &_v280) - 1;
                                      					if(_t60 < 0) {
                                      						L10:
                                      						 *((char*)( *((intOrPtr*)(_v8 + 0x34)) + 0x1d)) = 0;
                                      						E00B2D218( *((intOrPtr*)(_v8 + 0x34)), 1);
                                      						goto L11;
                                      					} else {
                                      						_v20 = _t60 + 1;
                                      						_v24 =  &_v280;
                                      						do {
                                      							if(E00B65A90( *_v24) == 0) {
                                      								goto L9;
                                      							} else {
                                      								_v608 =  *_v24;
                                      								_v604 = 0;
                                      								if(RegOpenKeyExA(0x80000002, E00B197D0( &_v600,  &_v608, "System\\CurrentControlSet\\Control\\Keyboard Layouts\\%.8x", _t129, 0), 0, 0x20019,  &_v16) != 0) {
                                      									goto L9;
                                      								} else {
                                      									_push(_t117);
                                      									_push(0xb4a703);
                                      									_push( *[fs:eax]);
                                      									 *[fs:eax] = _t119;
                                      									_v12 = 0x100;
                                      									if(RegQueryValueExA(_v16, "layout text", 0, 0,  &_v536,  &_v12) == 0) {
                                      										E00B14498( &_v612, 0x100,  &_v536);
                                      										 *((intOrPtr*)( *((intOrPtr*)( *((intOrPtr*)(_v8 + 0x34)))) + 0x3c))();
                                      										if( *_v24 ==  *((intOrPtr*)(_v8 + 0x3c))) {
                                      											E00B14498(_v8 + 0x38, 0x100,  &_v536);
                                      										}
                                      									}
                                      									_pop(_t111);
                                      									 *[fs:eax] = _t111;
                                      									_push(0xb4a70a);
                                      									return RegCloseKey(_v16);
                                      								}
                                      							}
                                      							goto L12;
                                      							L9:
                                      							_v24 = _v24 + 4;
                                      							_t38 =  &_v20;
                                      							 *_t38 = _v20 - 1;
                                      						} while ( *_t38 != 0);
                                      						goto L10;
                                      					}
                                      				}
                                      				L12:
                                      			}





















                                      0x00b4a59c
                                      0x00b4a59d
                                      0x00b4a59f
                                      0x00b4a5a8
                                      0x00b4a5ae
                                      0x00b4a5b3
                                      0x00b4a5b4
                                      0x00b4a5b9
                                      0x00b4a5bc
                                      0x00b4a5c6
                                      0x00b4a728
                                      0x00b4a730
                                      0x00b4a733
                                      0x00b4a736
                                      0x00b4a746
                                      0x00b4a5cc
                                      0x00b4a5db
                                      0x00b4a5e4
                                      0x00b4a5f7
                                      0x00b4a5fa
                                      0x00b4a717
                                      0x00b4a71d
                                      0x00b4a723
                                      0x00000000
                                      0x00b4a600
                                      0x00b4a601
                                      0x00b4a60a
                                      0x00b4a60d
                                      0x00b4a619
                                      0x00000000
                                      0x00b4a61f
                                      0x00b4a631
                                      0x00b4a637
                                      0x00b4a661
                                      0x00000000
                                      0x00b4a667
                                      0x00b4a669
                                      0x00b4a66a
                                      0x00b4a66f
                                      0x00b4a672
                                      0x00b4a675
                                      0x00b4a69b
                                      0x00b4a6ae
                                      0x00b4a6c6
                                      0x00b4a6d4
                                      0x00b4a6e7
                                      0x00b4a6e7
                                      0x00b4a6d4
                                      0x00b4a6ee
                                      0x00b4a6f1
                                      0x00b4a6f4
                                      0x00b4a702
                                      0x00b4a702
                                      0x00b4a661
                                      0x00000000
                                      0x00b4a70a
                                      0x00b4a70a
                                      0x00b4a70e
                                      0x00b4a70e
                                      0x00b4a70e
                                      0x00000000
                                      0x00b4a60d
                                      0x00b4a5fa
                                      0x00000000

                                      APIs
                                      • GetKeyboardLayoutList.USER32(00000040,?,00000000,00B4A747,?,02651458,?,00B4A7A9,00000000,?,00B5CD8F), ref: 00B4A5F2
                                      • RegOpenKeyExA.ADVAPI32(80000002,00000000), ref: 00B4A65A
                                      • RegQueryValueExA.ADVAPI32(?,layout text,00000000,00000000,?,00000100,00000000,00B4A703,?,80000002,00000000), ref: 00B4A694
                                      • RegCloseKey.ADVAPI32(?,00B4A70A,00000000,?,00000100,00000000,00B4A703,?,80000002,00000000), ref: 00B4A6FD
                                      Strings
                                      • layout text, xrefs: 00B4A68B
                                      • System\CurrentControlSet\Control\Keyboard Layouts\%.8x, xrefs: 00B4A644
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.289505180.0000000000B11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B10000, based on PE: true
                                      • Associated: 00000000.00000002.289475761.0000000000B10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.289928975.0000000000BDC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.289986188.0000000000BE3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_b10000_loaddll32.jbxd
                                      Similarity
                                      • API ID: CloseKeyboardLayoutListOpenQueryValue
                                      • String ID: System\CurrentControlSet\Control\Keyboard Layouts\%.8x$layout text
                                      • API String ID: 1703357764-2652665750
                                      • Opcode ID: 6069b27d3090218ae7f94f8bbd3e1610fc328f7af2a06609b164811c2a707177
                                      • Instruction ID: 45a1dc1f6df7f330c843880c204d8e17b0eac869fd2ad75c45ed030dedb8ee7d
                                      • Opcode Fuzzy Hash: 6069b27d3090218ae7f94f8bbd3e1610fc328f7af2a06609b164811c2a707177
                                      • Instruction Fuzzy Hash: E3411474A44209AFDB21DF94C981BEEB7F8EB48700F9140E1E904A7251D774AF80AB62
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      C-Code - Quality: 47%
                                      			E00B39E88(intOrPtr _a4, intOrPtr* _a8) {
                                      				void _v20;
                                      				void* __ebx;
                                      				void* __edi;
                                      				void* __esi;
                                      				void* __ebp;
                                      				void* _t23;
                                      				int _t24;
                                      				intOrPtr _t26;
                                      				intOrPtr _t27;
                                      				intOrPtr* _t29;
                                      				intOrPtr* _t31;
                                      
                                      				_t29 = _a8;
                                      				_t27 = _a4;
                                      				if( *0xbdf921 != 0) {
                                      					_t24 = 0;
                                      					if(_t27 == 0x12340042 && _t29 != 0 &&  *_t29 >= 0x28 && SystemParametersInfoA(0x30, 0,  &_v20, 0) != 0) {
                                      						 *((intOrPtr*)(_t29 + 4)) = 0;
                                      						 *((intOrPtr*)(_t29 + 8)) = 0;
                                      						 *((intOrPtr*)(_t29 + 0xc)) = GetSystemMetrics(0);
                                      						 *((intOrPtr*)(_t29 + 0x10)) = GetSystemMetrics(1);
                                      						asm("movsd");
                                      						asm("movsd");
                                      						asm("movsd");
                                      						asm("movsd");
                                      						_t31 = _t29;
                                      						 *(_t31 + 0x24) = 1;
                                      						if( *_t31 >= 0x4c) {
                                      							_push("DISPLAY");
                                      							_push(_t31 + 0x28);
                                      							L00B16E54();
                                      						}
                                      						_t24 = 1;
                                      					}
                                      				} else {
                                      					_t26 =  *0xbdf908; // 0xb39e88
                                      					 *0xbdf908 = E00B39A84(5, _t23, _t26, _t27, _t29);
                                      					_t24 =  *0xbdf908(_t27, _t29);
                                      				}
                                      				return _t24;
                                      			}














                                      0x00b39e91
                                      0x00b39e94
                                      0x00b39e9e
                                      0x00b39ec3
                                      0x00b39ecb
                                      0x00b39eeb
                                      0x00b39ef0
                                      0x00b39efb
                                      0x00b39f06
                                      0x00b39f10
                                      0x00b39f11
                                      0x00b39f12
                                      0x00b39f13
                                      0x00b39f14
                                      0x00b39f15
                                      0x00b39f1f
                                      0x00b39f21
                                      0x00b39f29
                                      0x00b39f2a
                                      0x00b39f2a
                                      0x00b39f2f
                                      0x00b39f2f
                                      0x00b39ea0
                                      0x00b39ea5
                                      0x00b39eb2
                                      0x00b39ebf
                                      0x00b39ebf
                                      0x00b39f39

                                      APIs
                                      • SystemParametersInfoA.USER32(00000030,00000000,?,00000000), ref: 00B39EE0
                                      • GetSystemMetrics.USER32 ref: 00B39EF5
                                      • GetSystemMetrics.USER32 ref: 00B39F00
                                      • lstrcpy.KERNEL32(?,DISPLAY), ref: 00B39F2A
                                        • Part of subcall function 00B39A84: GetProcAddress.KERNEL32(75BA0000,00000000), ref: 00B39B04
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.289505180.0000000000B11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B10000, based on PE: true
                                      • Associated: 00000000.00000002.289475761.0000000000B10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.289928975.0000000000BDC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.289986188.0000000000BE3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_b10000_loaddll32.jbxd
                                      Similarity
                                      • API ID: System$Metrics$AddressInfoParametersProclstrcpy
                                      • String ID: DISPLAY$GetMonitorInfoA
                                      • API String ID: 2545840971-1370492664
                                      • Opcode ID: fbacff8e1eaa8e0dfdca3a45a1448be32596d0335e82eebee3fa52e9f039d431
                                      • Instruction ID: f1ea907cf367ece47454846220bae6fa8c365ab9518ed1890e8363e57ee26ae6
                                      • Opcode Fuzzy Hash: fbacff8e1eaa8e0dfdca3a45a1448be32596d0335e82eebee3fa52e9f039d431
                                      • Instruction Fuzzy Hash: 0C11D031B06705AFD720DF618C94BABB7E8EB05710F20457AE95AD7240EBB4B844CBA0
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      C-Code - Quality: 47%
                                      			E00B39F5C(intOrPtr _a4, intOrPtr* _a8) {
                                      				void _v20;
                                      				void* __ebx;
                                      				void* __edi;
                                      				void* __esi;
                                      				void* __ebp;
                                      				void* _t23;
                                      				int _t24;
                                      				intOrPtr _t26;
                                      				intOrPtr _t27;
                                      				intOrPtr* _t29;
                                      				intOrPtr* _t31;
                                      
                                      				_t29 = _a8;
                                      				_t27 = _a4;
                                      				if( *0xbdf922 != 0) {
                                      					_t24 = 0;
                                      					if(_t27 == 0x12340042 && _t29 != 0 &&  *_t29 >= 0x28 && SystemParametersInfoA(0x30, 0,  &_v20, 0) != 0) {
                                      						 *((intOrPtr*)(_t29 + 4)) = 0;
                                      						 *((intOrPtr*)(_t29 + 8)) = 0;
                                      						 *((intOrPtr*)(_t29 + 0xc)) = GetSystemMetrics(0);
                                      						 *((intOrPtr*)(_t29 + 0x10)) = GetSystemMetrics(1);
                                      						asm("movsd");
                                      						asm("movsd");
                                      						asm("movsd");
                                      						asm("movsd");
                                      						_t31 = _t29;
                                      						 *(_t31 + 0x24) = 1;
                                      						if( *_t31 >= 0x4c) {
                                      							_push("DISPLAY");
                                      							_push(_t31 + 0x28);
                                      							L00B16E54();
                                      						}
                                      						_t24 = 1;
                                      					}
                                      				} else {
                                      					_t26 =  *0xbdf90c; // 0xb39f5c
                                      					 *0xbdf90c = E00B39A84(6, _t23, _t26, _t27, _t29);
                                      					_t24 =  *0xbdf90c(_t27, _t29);
                                      				}
                                      				return _t24;
                                      			}














                                      0x00b39f65
                                      0x00b39f68
                                      0x00b39f72
                                      0x00b39f97
                                      0x00b39f9f
                                      0x00b39fbf
                                      0x00b39fc4
                                      0x00b39fcf
                                      0x00b39fda
                                      0x00b39fe4
                                      0x00b39fe5
                                      0x00b39fe6
                                      0x00b39fe7
                                      0x00b39fe8
                                      0x00b39fe9
                                      0x00b39ff3
                                      0x00b39ff5
                                      0x00b39ffd
                                      0x00b39ffe
                                      0x00b39ffe
                                      0x00b3a003
                                      0x00b3a003
                                      0x00b39f74
                                      0x00b39f79
                                      0x00b39f86
                                      0x00b39f93
                                      0x00b39f93
                                      0x00b3a00d

                                      APIs
                                      • SystemParametersInfoA.USER32(00000030,00000000,?,00000000), ref: 00B39FB4
                                      • GetSystemMetrics.USER32 ref: 00B39FC9
                                      • GetSystemMetrics.USER32 ref: 00B39FD4
                                      • lstrcpy.KERNEL32(?,DISPLAY), ref: 00B39FFE
                                        • Part of subcall function 00B39A84: GetProcAddress.KERNEL32(75BA0000,00000000), ref: 00B39B04
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.289505180.0000000000B11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B10000, based on PE: true
                                      • Associated: 00000000.00000002.289475761.0000000000B10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.289928975.0000000000BDC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.289986188.0000000000BE3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_b10000_loaddll32.jbxd
                                      Similarity
                                      • API ID: System$Metrics$AddressInfoParametersProclstrcpy
                                      • String ID: DISPLAY$GetMonitorInfoW
                                      • API String ID: 2545840971-2774842281
                                      • Opcode ID: 9d7caf7b3481320c1b4f05ded08470f9dbe390f9358f239cbcfb9958b259df7a
                                      • Instruction ID: ff7a0935a15554212e4a41bf94a50a51aa92b2654fb3e2d62057355cd90bc2a8
                                      • Opcode Fuzzy Hash: 9d7caf7b3481320c1b4f05ded08470f9dbe390f9358f239cbcfb9958b259df7a
                                      • Instruction Fuzzy Hash: 1111D6716063059FD724CF649C547A7B7E8EB05710F20857AEC86D7280EB70B944CB92
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      C-Code - Quality: 67%
                                      			E00B36DB4(int __eax, void* __ecx, intOrPtr __edx) {
                                      				intOrPtr _v8;
                                      				int _v12;
                                      				struct HDC__* _v16;
                                      				void* _v20;
                                      				struct tagRGBQUAD _v1044;
                                      				int _t16;
                                      				struct HDC__* _t18;
                                      				int _t31;
                                      				int _t34;
                                      				intOrPtr _t41;
                                      				void* _t43;
                                      				void* _t46;
                                      				void* _t48;
                                      				intOrPtr _t49;
                                      
                                      				_t16 = __eax;
                                      				_t46 = _t48;
                                      				_t49 = _t48 + 0xfffffbf0;
                                      				_v8 = __edx;
                                      				_t43 = __eax;
                                      				if(__eax == 0 ||  *((short*)(__ecx + 0x26)) > 8) {
                                      					L4:
                                      					return _t16;
                                      				} else {
                                      					_t16 = E00B35C18(_v8, 0xff,  &_v1044);
                                      					_t34 = _t16;
                                      					if(_t34 == 0) {
                                      						goto L4;
                                      					} else {
                                      						_push(0);
                                      						L00B171A4();
                                      						_v12 = _t16;
                                      						_t18 = _v12;
                                      						_push(_t18);
                                      						L00B16E94();
                                      						_v16 = _t18;
                                      						_v20 = SelectObject(_v16, _t43);
                                      						_push(_t46);
                                      						_push(0xb36e63);
                                      						_push( *[fs:eax]);
                                      						 *[fs:eax] = _t49;
                                      						SetDIBColorTable(_v16, 0, _t34,  &_v1044);
                                      						_pop(_t41);
                                      						 *[fs:eax] = _t41;
                                      						_push(0xb36e6a);
                                      						SelectObject(_v16, _v20);
                                      						DeleteDC(_v16);
                                      						_t31 = _v12;
                                      						_push(_t31);
                                      						_push(0);
                                      						L00B173DC();
                                      						return _t31;
                                      					}
                                      				}
                                      			}

















                                      0x00b36db4
                                      0x00b36db5
                                      0x00b36db7
                                      0x00b36dbf
                                      0x00b36dc2
                                      0x00b36dc6
                                      0x00b36e6a
                                      0x00b36e6f
                                      0x00b36dd7
                                      0x00b36de5
                                      0x00b36dea
                                      0x00b36dee
                                      0x00000000
                                      0x00b36df0
                                      0x00b36df0
                                      0x00b36df2
                                      0x00b36df7
                                      0x00b36dfa
                                      0x00b36dfd
                                      0x00b36dfe
                                      0x00b36e03
                                      0x00b36e10
                                      0x00b36e15
                                      0x00b36e16
                                      0x00b36e1b
                                      0x00b36e1e
                                      0x00b36e2f
                                      0x00b36e36
                                      0x00b36e39
                                      0x00b36e3c
                                      0x00b36e49
                                      0x00b36e52
                                      0x00b36e57
                                      0x00b36e5a
                                      0x00b36e5b
                                      0x00b36e5d
                                      0x00b36e62
                                      0x00b36e62
                                      0x00b36dee

                                      APIs
                                        • Part of subcall function 00B35C18: GetObjectA.GDI32(?,00000004), ref: 00B35C2F
                                        • Part of subcall function 00B35C18: 73BEAEA0.GDI32(?,00000000,?,?,?,00000004,?,000000FF,?,?,?,00B36DEA), ref: 00B35C52
                                      • 73BEAC50.USER32(00000000), ref: 00B36DF2
                                      • 73BEA590.GDI32(?,00000000), ref: 00B36DFE
                                      • SelectObject.GDI32(?), ref: 00B36E0B
                                      • SetDIBColorTable.GDI32(?,00000000,00000000,?,00000000,00B36E63,?,?,?,?,00000000), ref: 00B36E2F
                                      • SelectObject.GDI32(?,?), ref: 00B36E49
                                      • DeleteDC.GDI32(?), ref: 00B36E52
                                      • 73BEB380.USER32(00000000,?,?,?,?,00B36E6A,?,00000000,00B36E63,?,?,?,?,00000000), ref: 00B36E5D
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.289505180.0000000000B11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B10000, based on PE: true
                                      • Associated: 00000000.00000002.289475761.0000000000B10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.289928975.0000000000BDC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.289986188.0000000000BE3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_b10000_loaddll32.jbxd
                                      Similarity
                                      • API ID: Object$Select$A590B380ColorDeleteTable
                                      • String ID:
                                      • API String ID: 980243606-0
                                      • Opcode ID: 7e6633ec78f5e32be7092f6c55b88a22c2cb58f57733acb83aa92a4dcdc50818
                                      • Instruction ID: a887af4aa5702758d9ab81dc0bfd38c115830426e3403692cad7ee8057a7d7e8
                                      • Opcode Fuzzy Hash: 7e6633ec78f5e32be7092f6c55b88a22c2cb58f57733acb83aa92a4dcdc50818
                                      • Instruction Fuzzy Hash: 20111C76E04219BBDB10EBE8DC51AEEB7FCEB08704F5084E5F914E7241D6B59E808B60
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      C-Code - Quality: 67%
                                      			E00B31064(void* __eax, void* __ebx, void* __edi, void* __esi) {
                                      				char _v5;
                                      				intOrPtr* _v12;
                                      				long _v16;
                                      				char _v20;
                                      				char _v24;
                                      				long _t22;
                                      				char _t29;
                                      				void* _t53;
                                      				intOrPtr _t61;
                                      				intOrPtr* _t62;
                                      				intOrPtr _t63;
                                      				intOrPtr _t66;
                                      				intOrPtr _t67;
                                      				void* _t72;
                                      				void* _t73;
                                      				intOrPtr _t74;
                                      
                                      				_t72 = _t73;
                                      				_t74 = _t73 + 0xffffffec;
                                      				_push(__esi);
                                      				_push(__edi);
                                      				_t53 = __eax;
                                      				_t22 = GetCurrentThreadId();
                                      				_t62 =  *0xbde638; // 0xbdf034
                                      				if(_t22 !=  *_t62) {
                                      					_v24 = GetCurrentThreadId();
                                      					_v20 = 0;
                                      					_t61 =  *0xbde3fc; // 0xb2716c
                                      					E00B1C2BC(_t53, _t61, 1, __edi, __esi, 0,  &_v24);
                                      					E00B13BC0();
                                      				}
                                      				if(_t53 <= 0) {
                                      					E00B3103C();
                                      				} else {
                                      					E00B31048(_t53);
                                      				}
                                      				_v16 = 0;
                                      				_push(0xbdf870);
                                      				L00B16C5C();
                                      				_push(_t72);
                                      				_push(0xb311f2);
                                      				_push( *[fs:eax]);
                                      				 *[fs:eax] = _t74;
                                      				_v16 = InterlockedExchange(0xbdc614, _v16);
                                      				_push(_t72);
                                      				_push(0xb311d3);
                                      				_push( *[fs:eax]);
                                      				 *[fs:eax] = _t74;
                                      				if(_v16 == 0 ||  *((intOrPtr*)(_v16 + 8)) <= 0) {
                                      					_t29 = 0;
                                      				} else {
                                      					_t29 = 1;
                                      				}
                                      				_v5 = _t29;
                                      				if(_v5 == 0) {
                                      					L14:
                                      					_pop(_t63);
                                      					 *[fs:eax] = _t63;
                                      					_push(0xb311da);
                                      					return E00B13380(_v16);
                                      				} else {
                                      					if( *((intOrPtr*)(_v16 + 8)) > 0) {
                                      						_v12 = E00B2B65C(_v16, 0);
                                      						E00B2B54C(_v16, 0);
                                      						L00B16DB4();
                                      						 *[fs:eax] = _t74;
                                      						 *[fs:eax] = _t74;
                                      						 *((intOrPtr*)( *_v12 + 8))( *[fs:eax], _t72,  *[fs:eax], 0xb3119d, _t72, 0xbdf870);
                                      						_pop(_t66);
                                      						 *[fs:eax] = _t66;
                                      						_t67 = 0xb3116e;
                                      						 *[fs:eax] = _t67;
                                      						_push(0xb311a4);
                                      						_push(0xbdf870);
                                      						L00B16C5C();
                                      						return 0;
                                      					} else {
                                      						goto L14;
                                      					}
                                      				}
                                      			}



















                                      0x00b31065
                                      0x00b31067
                                      0x00b3106b
                                      0x00b3106c
                                      0x00b3106d
                                      0x00b3106f
                                      0x00b31074
                                      0x00b3107c
                                      0x00b31083
                                      0x00b31086
                                      0x00b31090
                                      0x00b3109d
                                      0x00b310a2
                                      0x00b310a2
                                      0x00b310a9
                                      0x00b310b4
                                      0x00b310ab
                                      0x00b310ad
                                      0x00b310ad
                                      0x00b310bb
                                      0x00b310be
                                      0x00b310c3
                                      0x00b310ca
                                      0x00b310cb
                                      0x00b310d0
                                      0x00b310d3
                                      0x00b310e4
                                      0x00b310e9
                                      0x00b310ea
                                      0x00b310ef
                                      0x00b310f2
                                      0x00b310f9
                                      0x00b31104
                                      0x00b31108
                                      0x00b31108
                                      0x00b31108
                                      0x00b3110a
                                      0x00b31111
                                      0x00b311bd
                                      0x00b311bf
                                      0x00b311c2
                                      0x00b311c5
                                      0x00b311d2
                                      0x00b31117
                                      0x00b311b7
                                      0x00b31126
                                      0x00b3112e
                                      0x00b31138
                                      0x00b31148
                                      0x00b31156
                                      0x00b31161
                                      0x00b31166
                                      0x00b31169
                                      0x00b31187
                                      0x00b3118a
                                      0x00b3118d
                                      0x00b31192
                                      0x00b31197
                                      0x00b3119c
                                      0x00000000
                                      0x00000000
                                      0x00000000
                                      0x00b311b7

                                      APIs
                                      • GetCurrentThreadId.KERNEL32 ref: 00B3106F
                                      • GetCurrentThreadId.KERNEL32 ref: 00B3107E
                                        • Part of subcall function 00B3103C: ResetEvent.KERNEL32(000001A8,00B310B9), ref: 00B31042
                                      • RtlEnterCriticalSection.KERNEL32(00BDF870), ref: 00B310C3
                                      • InterlockedExchange.KERNEL32(00BDC614,?), ref: 00B310DF
                                      • RtlLeaveCriticalSection.KERNEL32(00BDF870,00000000,00B311D3,?,00000000,00B311F2,?,00BDF870), ref: 00B31138
                                      • RtlEnterCriticalSection.KERNEL32(00BDF870,00B311A4,00B311D3,?,00000000,00B311F2,?,00BDF870), ref: 00B31197
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.289505180.0000000000B11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B10000, based on PE: true
                                      • Associated: 00000000.00000002.289475761.0000000000B10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.289928975.0000000000BDC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.289986188.0000000000BE3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_b10000_loaddll32.jbxd
                                      Similarity
                                      • API ID: CriticalSection$CurrentEnterThread$EventExchangeInterlockedLeaveReset
                                      • String ID:
                                      • API String ID: 2189153385-0
                                      • Opcode ID: 9c3dbdb031aef1ea3cc0d27f826d17b7b8984897fd153dbd6199379d2b2b210c
                                      • Instruction ID: fe14996c8237a0e3be9216739a9246f9c7c7e45d92b73dc152855f761d328342
                                      • Opcode Fuzzy Hash: 9c3dbdb031aef1ea3cc0d27f826d17b7b8984897fd153dbd6199379d2b2b210c
                                      • Instruction Fuzzy Hash: DA31B230A04B44AFD711DFA8DC52AA9B7FCEB09700FA588F5F900E7661EB359940DA61
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      C-Code - Quality: 68%
                                      			E00B35EC4(intOrPtr* __eax, void* __ebx, signed int __ecx, intOrPtr __edx, void* __edi, void* __esi, void* __eflags, int _a4, signed int* _a8) {
                                      				intOrPtr* _v8;
                                      				intOrPtr _v12;
                                      				signed int _v16;
                                      				intOrPtr _v20;
                                      				signed int _v24;
                                      				signed int _v32;
                                      				signed short _v44;
                                      				int _t36;
                                      				signed int _t37;
                                      				signed short _t38;
                                      				signed int _t39;
                                      				signed short _t43;
                                      				signed int* _t47;
                                      				signed int _t51;
                                      				intOrPtr _t61;
                                      				void* _t67;
                                      				void* _t68;
                                      				void* _t69;
                                      				intOrPtr _t70;
                                      
                                      				_t68 = _t69;
                                      				_t70 = _t69 + 0xffffff90;
                                      				_v16 = __ecx;
                                      				_v12 = __edx;
                                      				_v8 = __eax;
                                      				_t47 = _a8;
                                      				_v24 = _v16 << 4;
                                      				_v20 = E00B18764(_v24, __eflags);
                                      				 *[fs:edx] = _t70;
                                      				_t51 = _v24;
                                      				 *((intOrPtr*)( *_v8 + 0xc))( *[fs:edx], 0xb361bb, _t68, __edi, __esi, __ebx, _t67);
                                      				if(( *_t47 | _t47[1]) != 0) {
                                      					_t36 = _a4;
                                      					 *_t36 =  *_t47;
                                      					 *(_t36 + 4) = _t47[1];
                                      				} else {
                                      					 *_a4 = GetSystemMetrics(0xb);
                                      					_t36 = GetSystemMetrics(0xc);
                                      					 *(_a4 + 4) = _t36;
                                      				}
                                      				_push(0);
                                      				L00B171A4();
                                      				_v44 = _t36;
                                      				if(_v44 == 0) {
                                      					E00B35388(_t51);
                                      				}
                                      				_push(_t68);
                                      				_push(0xb35fad);
                                      				_push( *[fs:edx]);
                                      				 *[fs:edx] = _t70;
                                      				_push(0xe);
                                      				_t37 = _v44;
                                      				_push(_t37);
                                      				L00B16F24();
                                      				_push(0xc);
                                      				_t38 = _v44;
                                      				_push(_t38);
                                      				L00B16F24();
                                      				_t39 = _t37 * _t38;
                                      				if(_t39 <= 8) {
                                      					__eflags = 1;
                                      					_v32 = 1 << _t39;
                                      				} else {
                                      					_v32 = 0x7fffffff;
                                      				}
                                      				_pop(_t61);
                                      				 *[fs:eax] = _t61;
                                      				_push(0xb35fb4);
                                      				_t43 = _v44;
                                      				_push(_t43);
                                      				_push(0);
                                      				L00B173DC();
                                      				return _t43;
                                      			}






















                                      0x00b35ec5
                                      0x00b35ec7
                                      0x00b35ecd
                                      0x00b35ed0
                                      0x00b35ed3
                                      0x00b35ed6
                                      0x00b35edf
                                      0x00b35eea
                                      0x00b35ef8
                                      0x00b35efe
                                      0x00b35f06
                                      0x00b35f0e
                                      0x00b35f2b
                                      0x00b35f30
                                      0x00b35f35
                                      0x00b35f10
                                      0x00b35f1a
                                      0x00b35f1e
                                      0x00b35f26
                                      0x00b35f26
                                      0x00b35f38
                                      0x00b35f3a
                                      0x00b35f3f
                                      0x00b35f46
                                      0x00b35f48
                                      0x00b35f48
                                      0x00b35f4f
                                      0x00b35f50
                                      0x00b35f55
                                      0x00b35f58
                                      0x00b35f5b
                                      0x00b35f5d
                                      0x00b35f60
                                      0x00b35f61
                                      0x00b35f68
                                      0x00b35f6a
                                      0x00b35f6d
                                      0x00b35f6e
                                      0x00b35f77
                                      0x00b35f7d
                                      0x00b35f8f
                                      0x00b35f91
                                      0x00b35f7f
                                      0x00b35f7f
                                      0x00b35f7f
                                      0x00b35f96
                                      0x00b35f99
                                      0x00b35f9c
                                      0x00b35fa1
                                      0x00b35fa4
                                      0x00b35fa5
                                      0x00b35fa7
                                      0x00b35fac

                                      APIs
                                      • GetSystemMetrics.USER32 ref: 00B35F12
                                      • GetSystemMetrics.USER32 ref: 00B35F1E
                                      • 73BEAC50.USER32(00000000), ref: 00B35F3A
                                      • 73BEAD70.GDI32(00000000,0000000E,00000000,00B35FAD,?,00000000), ref: 00B35F61
                                      • 73BEAD70.GDI32(00000000,0000000C,00000000,0000000E,00000000,00B35FAD,?,00000000), ref: 00B35F6E
                                      • 73BEB380.USER32(00000000,00000000,00B35FB4,0000000E,00000000,00B35FAD,?,00000000), ref: 00B35FA7
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.289505180.0000000000B11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B10000, based on PE: true
                                      • Associated: 00000000.00000002.289475761.0000000000B10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.289928975.0000000000BDC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.289986188.0000000000BE3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_b10000_loaddll32.jbxd
                                      Similarity
                                      • API ID: MetricsSystem$B380
                                      • String ID:
                                      • API String ID: 3145338429-0
                                      • Opcode ID: c5f41ebc16c1820c67202cfcd41d9555cd6f0deb0289c47f985bf66a1ce958f2
                                      • Instruction ID: a9cfa00ada87305acd787e1672be593e0d8c03bf0071c44fbe3dd1fb3ae44e5a
                                      • Opcode Fuzzy Hash: c5f41ebc16c1820c67202cfcd41d9555cd6f0deb0289c47f985bf66a1ce958f2
                                      • Instruction Fuzzy Hash: AF316B74A00644EFEB10DFA4C881AAEBBF5FF49710F6085A4F814AB390D670AD41CB60
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      C-Code - Quality: 45%
                                      			E00B3631C(struct HBITMAP__* __eax, void* __ebx, struct tagBITMAPINFO* __ecx, void* __edx, void* __edi, void* __esi, void* __eflags, intOrPtr _a4, void* _a8) {
                                      				char _v5;
                                      				struct HDC__* _v12;
                                      				struct HDC__* _v16;
                                      				struct HDC__* _t29;
                                      				struct tagBITMAPINFO* _t32;
                                      				intOrPtr _t39;
                                      				struct HBITMAP__* _t43;
                                      				void* _t46;
                                      
                                      				_t32 = __ecx;
                                      				_t43 = __eax;
                                      				E00B361CC(__eax, _a4, __ecx);
                                      				_v12 = 0;
                                      				_push(0);
                                      				L00B16E94();
                                      				_v16 = 0;
                                      				_push(_t46);
                                      				_push(0xb363b9);
                                      				_push( *[fs:eax]);
                                      				 *[fs:eax] = _t46 + 0xfffffff4;
                                      				if(__edx != 0) {
                                      					_push(0);
                                      					_push(__edx);
                                      					_t29 = _v16;
                                      					_push(_t29);
                                      					L00B16FC4();
                                      					_v12 = _t29;
                                      					_push(_v16);
                                      					L00B16F9C();
                                      				}
                                      				_v5 = GetDIBits(_v16, _t43, 0, _t32->bmiHeader.biHeight, _a8, _t32, 0) != 0;
                                      				_pop(_t39);
                                      				 *[fs:eax] = _t39;
                                      				_push(0xb363c0);
                                      				if(_v12 != 0) {
                                      					_push(0);
                                      					_push(_v12);
                                      					_push(_v16);
                                      					L00B16FC4();
                                      				}
                                      				return DeleteDC(_v16);
                                      			}











                                      0x00b36325
                                      0x00b36329
                                      0x00b36332
                                      0x00b36339
                                      0x00b3633c
                                      0x00b3633e
                                      0x00b36343
                                      0x00b36348
                                      0x00b36349
                                      0x00b3634e
                                      0x00b36351
                                      0x00b36356
                                      0x00b36358
                                      0x00b3635a
                                      0x00b3635b
                                      0x00b3635e
                                      0x00b3635f
                                      0x00b36364
                                      0x00b3636a
                                      0x00b3636b
                                      0x00b3636b
                                      0x00b36389
                                      0x00b3638f
                                      0x00b36392
                                      0x00b36395
                                      0x00b3639e
                                      0x00b363a0
                                      0x00b363a5
                                      0x00b363a9
                                      0x00b363aa
                                      0x00b363aa
                                      0x00b363b8

                                      APIs
                                        • Part of subcall function 00B361CC: GetObjectA.GDI32(?,00000054), ref: 00B361E0
                                      • 73BEA590.GDI32(00000000), ref: 00B3633E
                                      • 73BEB410.GDI32(?,?,00000000,00000000,00B363B9,?,00000000), ref: 00B3635F
                                      • 73BEB150.GDI32(?,?,?,00000000,00000000,00B363B9,?,00000000), ref: 00B3636B
                                      • GetDIBits.GDI32(?,?,00000000,?,?,?,00000000), ref: 00B36382
                                      • 73BEB410.GDI32(?,00000000,00000000,00B363C0,?,00000000), ref: 00B363AA
                                      • DeleteDC.GDI32(?), ref: 00B363B3
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.289505180.0000000000B11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B10000, based on PE: true
                                      • Associated: 00000000.00000002.289475761.0000000000B10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.289928975.0000000000BDC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.289986188.0000000000BE3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_b10000_loaddll32.jbxd
                                      Similarity
                                      • API ID: B410$A590B150BitsDeleteObject
                                      • String ID:
                                      • API String ID: 3837315262-0
                                      • Opcode ID: 95d5c0954e564904a65df5fa0268717e3fceed8efe30d128091b2a7e51401e30
                                      • Instruction ID: ca19a60d6a760f680bef6e0a70dd4668bc38da1b4eaa08d88e53f1459bf0b1c4
                                      • Opcode Fuzzy Hash: 95d5c0954e564904a65df5fa0268717e3fceed8efe30d128091b2a7e51401e30
                                      • Instruction Fuzzy Hash: 99112E75A04204BFDB10DBADCC81F9EB7FCEF49710F5184A4B518E7291E675AD408764
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      C-Code - Quality: 71%
                                      			E00B11CD0() {
                                      				void* _t2;
                                      				void* _t3;
                                      				void* _t14;
                                      				intOrPtr* _t19;
                                      				intOrPtr _t23;
                                      				intOrPtr _t26;
                                      				intOrPtr _t28;
                                      
                                      				_t26 = _t28;
                                      				if( *0xbdf5c4 == 0) {
                                      					return _t2;
                                      				} else {
                                      					_push(_t26);
                                      					_push(0xb11da6);
                                      					_push( *[fs:edx]);
                                      					 *[fs:edx] = _t28;
                                      					if( *0xbdf04d != 0) {
                                      						_push(0xbdf5cc);
                                      						L00B11568();
                                      					}
                                      					 *0xbdf5c4 = 0;
                                      					_t3 =  *0xbdf624; // 0xa34878
                                      					LocalFree(_t3);
                                      					 *0xbdf624 = 0;
                                      					_t19 =  *0xbdf5ec; // 0xa35eac
                                      					while(_t19 != 0xbdf5ec) {
                                      						VirtualFree( *(_t19 + 8), 0, 0x8000);
                                      						_t19 =  *_t19;
                                      					}
                                      					E00B115D0(0xbdf5ec);
                                      					E00B115D0(0xbdf5fc);
                                      					E00B115D0(0xbdf628);
                                      					_t14 =  *0xbdf5e4; // 0xa35878
                                      					while(_t14 != 0) {
                                      						 *0xbdf5e4 =  *_t14;
                                      						LocalFree(_t14);
                                      						_t14 =  *0xbdf5e4; // 0xa35878
                                      					}
                                      					_pop(_t23);
                                      					 *[fs:eax] = _t23;
                                      					_push(0xb11dad);
                                      					if( *0xbdf04d != 0) {
                                      						_push(0xbdf5cc);
                                      						L00B11570();
                                      					}
                                      					_push(0xbdf5cc);
                                      					L00B11578();
                                      					return 0;
                                      				}
                                      			}










                                      0x00b11cd1
                                      0x00b11cdb
                                      0x00b11daf
                                      0x00b11ce1
                                      0x00b11ce3
                                      0x00b11ce4
                                      0x00b11ce9
                                      0x00b11cec
                                      0x00b11cf6
                                      0x00b11cf8
                                      0x00b11cfd
                                      0x00b11cfd
                                      0x00b11d02
                                      0x00b11d09
                                      0x00b11d0f
                                      0x00b11d16
                                      0x00b11d1b
                                      0x00b11d35
                                      0x00b11d2e
                                      0x00b11d33
                                      0x00b11d33
                                      0x00b11d42
                                      0x00b11d4c
                                      0x00b11d56
                                      0x00b11d5b
                                      0x00b11d62
                                      0x00b11d66
                                      0x00b11d6d
                                      0x00b11d72
                                      0x00b11d77
                                      0x00b11d7d
                                      0x00b11d80
                                      0x00b11d83
                                      0x00b11d8f
                                      0x00b11d91
                                      0x00b11d96
                                      0x00b11d96
                                      0x00b11d9b
                                      0x00b11da0
                                      0x00b11da5
                                      0x00b11da5

                                      APIs
                                      • RtlEnterCriticalSection.KERNEL32(00BDF5CC,00000000,00B11DA6), ref: 00B11CFD
                                      • LocalFree.KERNEL32(00A34878,00000000,00B11DA6), ref: 00B11D0F
                                      • VirtualFree.KERNEL32(?,00000000,00008000,00A34878,00000000,00B11DA6), ref: 00B11D2E
                                      • LocalFree.KERNEL32(00A35878,?,00000000,00008000,00A34878,00000000,00B11DA6), ref: 00B11D6D
                                      • RtlLeaveCriticalSection.KERNEL32(00BDF5CC,00B11DAD,00A34878,00000000,00B11DA6), ref: 00B11D96
                                      • RtlDeleteCriticalSection.KERNEL32(00BDF5CC,00B11DAD,00A34878,00000000,00B11DA6), ref: 00B11DA0
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.289505180.0000000000B11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B10000, based on PE: true
                                      • Associated: 00000000.00000002.289475761.0000000000B10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.289928975.0000000000BDC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.289986188.0000000000BE3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_b10000_loaddll32.jbxd
                                      Similarity
                                      • API ID: CriticalFreeSection$Local$DeleteEnterLeaveVirtual
                                      • String ID:
                                      • API String ID: 3782394904-0
                                      • Opcode ID: bfd113e371b63fedbae673b8fa017dd125e1447736597c44034624acc61d08b6
                                      • Instruction ID: a75fbda57eb09d99c9414f65e49eb36f59a483083883ce0d48d305801621bac4
                                      • Opcode Fuzzy Hash: bfd113e371b63fedbae673b8fa017dd125e1447736597c44034624acc61d08b6
                                      • Instruction Fuzzy Hash: 4A11B47460A6425ED710AF6CBC56BB5B7DAE7A5704FC048F3F203872A1E960C880C760
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      C-Code - Quality: 87%
                                      			E00B35B74(struct HDC__* __eax, signed int __ecx) {
                                      				char _v1036;
                                      				signed int _v1038;
                                      				struct tagRGBQUAD _v1048;
                                      				short _v1066;
                                      				short* _t15;
                                      				void* _t18;
                                      				struct HDC__* _t23;
                                      				void* _t26;
                                      				short* _t31;
                                      				short* _t32;
                                      
                                      				_t31 = 0;
                                      				 *_t32 = 0x300;
                                      				if(__eax == 0) {
                                      					_v1038 = __ecx;
                                      					E00B12AC8(_t26, __ecx << 2,  &_v1036);
                                      				} else {
                                      					_push(0);
                                      					L00B16E94();
                                      					_t23 = __eax;
                                      					_t18 = SelectObject(__eax, __eax);
                                      					_v1066 = GetDIBColorTable(_t23, 0, 0x100,  &_v1048);
                                      					SelectObject(_t23, _t18);
                                      					DeleteDC(_t23);
                                      				}
                                      				if(_v1038 != 0) {
                                      					if(_v1038 != 0x10 || E00B35ADC(_t32) == 0) {
                                      						E00B3596C( &_v1036, _v1038 & 0x0000ffff);
                                      					}
                                      					_t15 = _t32;
                                      					_push(_t15);
                                      					L00B16EBC();
                                      					_t31 = _t15;
                                      				}
                                      				return _t31;
                                      			}













                                      0x00b35b7f
                                      0x00b35b81
                                      0x00b35b89
                                      0x00b35bc3
                                      0x00b35bd1
                                      0x00b35b8b
                                      0x00b35b8b
                                      0x00b35b8d
                                      0x00b35b92
                                      0x00b35b96
                                      0x00b35baf
                                      0x00b35bb6
                                      0x00b35bbc
                                      0x00b35bbc
                                      0x00b35bdc
                                      0x00b35be4
                                      0x00b35bfa
                                      0x00b35bfa
                                      0x00b35bff
                                      0x00b35c01
                                      0x00b35c02
                                      0x00b35c07
                                      0x00b35c07
                                      0x00b35c14

                                      APIs
                                      • 73BEA590.GDI32(00000000,00000000,?,?,00B38063,?,?,?,?,00B36C4F,00000000,00B36CDB), ref: 00B35B8D
                                      • SelectObject.GDI32(00000000,00000000), ref: 00B35B96
                                      • GetDIBColorTable.GDI32(00000000,00000000,00000100,?,00000000,00000000,00000000,00000000,?,?,00B38063,?,?,?,?,00B36C4F), ref: 00B35BAA
                                      • SelectObject.GDI32(00000000,00000000), ref: 00B35BB6
                                      • DeleteDC.GDI32(00000000), ref: 00B35BBC
                                      • 73BEA8F0.GDI32(?,00000000,?,?,00B38063,?,?,?,?,00B36C4F,00000000,00B36CDB), ref: 00B35C02
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.289505180.0000000000B11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B10000, based on PE: true
                                      • Associated: 00000000.00000002.289475761.0000000000B10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.289928975.0000000000BDC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.289986188.0000000000BE3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_b10000_loaddll32.jbxd
                                      Similarity
                                      • API ID: ObjectSelect$A590ColorDeleteTable
                                      • String ID:
                                      • API String ID: 1056449717-0
                                      • Opcode ID: 51e7dc9b8e2b7936394e1b89e8001dead6ba83b8a03920836762a65d0fd4e157
                                      • Instruction ID: 6fbb0ff9237bfbbd8eaacd0915da9142abf0b061ef50a7302284ebeec2c0d826
                                      • Opcode Fuzzy Hash: 51e7dc9b8e2b7936394e1b89e8001dead6ba83b8a03920836762a65d0fd4e157
                                      • Instruction Fuzzy Hash: 4701B56120471066D620BB299C43FABB3F8DFC0710F64C99DF58887282F6758C8483A6
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      C-Code - Quality: 100%
                                      			E00B35264(void* __eax) {
                                      				void* _t36;
                                      
                                      				_t36 = __eax;
                                      				UnrealizeObject(E00B34A40( *((intOrPtr*)(__eax + 0x14))));
                                      				SelectObject( *(_t36 + 4), E00B34A40( *((intOrPtr*)(_t36 + 0x14))));
                                      				if(E00B34B20( *((intOrPtr*)(_t36 + 0x14))) != 0) {
                                      					SetBkColor( *(_t36 + 4),  !(E00B33D80(E00B34A04( *((intOrPtr*)(_t36 + 0x14))))));
                                      					return SetBkMode( *(_t36 + 4), 1);
                                      				} else {
                                      					SetBkColor( *(_t36 + 4), E00B33D80(E00B34A04( *((intOrPtr*)(_t36 + 0x14)))));
                                      					return SetBkMode( *(_t36 + 4), 2);
                                      				}
                                      			}




                                      0x00b35265
                                      0x00b35270
                                      0x00b35282
                                      0x00b35291
                                      0x00b352cb
                                      0x00b352dc
                                      0x00b35293
                                      0x00b352a5
                                      0x00b352b6
                                      0x00b352b6

                                      APIs
                                        • Part of subcall function 00B34A40: CreateBrushIndirect.GDI32(?), ref: 00B34AEA
                                      • UnrealizeObject.GDI32(00000000), ref: 00B35270
                                      • SelectObject.GDI32(?,00000000), ref: 00B35282
                                      • SetBkColor.GDI32(?,00000000), ref: 00B352A5
                                      • SetBkMode.GDI32(?,00000002), ref: 00B352B0
                                      • SetBkColor.GDI32(?,00000000), ref: 00B352CB
                                      • SetBkMode.GDI32(?,00000001), ref: 00B352D6
                                        • Part of subcall function 00B33D80: GetSysColor.USER32(?), ref: 00B33D8A
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.289505180.0000000000B11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B10000, based on PE: true
                                      • Associated: 00000000.00000002.289475761.0000000000B10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.289928975.0000000000BDC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.289986188.0000000000BE3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_b10000_loaddll32.jbxd
                                      Similarity
                                      • API ID: Color$ModeObject$BrushCreateIndirectSelectUnrealize
                                      • String ID:
                                      • API String ID: 3527656728-0
                                      • Opcode ID: 14f6aa9631b8364fae043b54f33af7ef634752645c4b6b2fabfca5e3adb34395
                                      • Instruction ID: f7e36ca77dd1e443cdc55634a706f5fbe49d6f1eae1b0b9b061746d1dec7d4e3
                                      • Opcode Fuzzy Hash: 14f6aa9631b8364fae043b54f33af7ef634752645c4b6b2fabfca5e3adb34395
                                      • Instruction Fuzzy Hash: 2DF074B5645240ABCE04FFA8E9C6E4B7BE8AF08301B5444D0B904DF247CA65F8519735
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      C-Code - Quality: 65%
                                      			E00B131F0() {
                                      				void* _v8;
                                      				char _v12;
                                      				int _v16;
                                      				signed short _t12;
                                      				signed short _t14;
                                      				intOrPtr _t27;
                                      				void* _t29;
                                      				void* _t31;
                                      				intOrPtr _t32;
                                      
                                      				_t29 = _t31;
                                      				_t32 = _t31 + 0xfffffff4;
                                      				_v12 =  *0xbdc020 & 0x0000ffff;
                                      				if(RegOpenKeyExA(0x80000002, "SOFTWARE\\Borland\\Delphi\\RTL", 0, 1,  &_v8) != 0) {
                                      					_t12 =  *0xbdc020; // 0x27f
                                      					_t14 = _t12 & 0x0000ffc0 | _v12 & 0x0000003f;
                                      					 *0xbdc020 = _t14;
                                      					return _t14;
                                      				} else {
                                      					_push(_t29);
                                      					_push(0xb13261);
                                      					_push( *[fs:eax]);
                                      					 *[fs:eax] = _t32;
                                      					_v16 = 4;
                                      					RegQueryValueExA(_v8, "FPUMaskValue", 0, 0,  &_v12,  &_v16);
                                      					_pop(_t27);
                                      					 *[fs:eax] = _t27;
                                      					_push(0xb13268);
                                      					return RegCloseKey(_v8);
                                      				}
                                      			}












                                      0x00b131f1
                                      0x00b131f3
                                      0x00b131fd
                                      0x00b13219
                                      0x00b13268
                                      0x00b1327a
                                      0x00b1327d
                                      0x00b13286
                                      0x00b1321b
                                      0x00b1321d
                                      0x00b1321e
                                      0x00b13223
                                      0x00b13226
                                      0x00b13229
                                      0x00b13245
                                      0x00b1324c
                                      0x00b1324f
                                      0x00b13252
                                      0x00b13260
                                      0x00b13260

                                      APIs
                                      • RegOpenKeyExA.ADVAPI32(80000002,SOFTWARE\Borland\Delphi\RTL,00000000,00000001,?), ref: 00B13212
                                      • RegQueryValueExA.ADVAPI32(?,FPUMaskValue,00000000,00000000,?,00000004,00000000,00B13261,?,80000002,SOFTWARE\Borland\Delphi\RTL,00000000,00000001,?), ref: 00B13245
                                      • RegCloseKey.ADVAPI32(?,00B13268,00000000,?,00000004,00000000,00B13261,?,80000002,SOFTWARE\Borland\Delphi\RTL,00000000,00000001,?), ref: 00B1325B
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.289505180.0000000000B11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B10000, based on PE: true
                                      • Associated: 00000000.00000002.289475761.0000000000B10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.289928975.0000000000BDC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.289986188.0000000000BE3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_b10000_loaddll32.jbxd
                                      Similarity
                                      • API ID: CloseOpenQueryValue
                                      • String ID: FPUMaskValue$SOFTWARE\Borland\Delphi\RTL
                                      • API String ID: 3677997916-4173385793
                                      • Opcode ID: 4fc18507212198c2ccd9d522121c70ef3b43fd7d42a73a244427eb21d59f831f
                                      • Instruction ID: 42112dfebcc4365eeaf244c5111df33d4ef10db895f648f930dfd025db812b99
                                      • Opcode Fuzzy Hash: 4fc18507212198c2ccd9d522121c70ef3b43fd7d42a73a244427eb21d59f831f
                                      • Instruction Fuzzy Hash: CF017975944309B9DB11EF94DC42BE9B7ECEB08F00F9045E5FA04E7690F6745690C754
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      C-Code - Quality: 64%
                                      			E00B24350(signed short* __eax, intOrPtr __ecx, signed short* __edx, void* __edi, void* __fp0) {
                                      				signed short* _v8;
                                      				signed short* _v12;
                                      				intOrPtr _v16;
                                      				signed int _v18;
                                      				signed int _v20;
                                      				void* _v24;
                                      				void* _v28;
                                      				char _v44;
                                      				void* __ebp;
                                      				void* _t119;
                                      				signed int _t207;
                                      				intOrPtr _t216;
                                      				intOrPtr _t217;
                                      				intOrPtr _t250;
                                      				intOrPtr _t255;
                                      				intOrPtr _t259;
                                      				intOrPtr _t264;
                                      				intOrPtr _t268;
                                      				void* _t271;
                                      				void* _t273;
                                      				intOrPtr _t274;
                                      
                                      				_t278 = __fp0;
                                      				_t269 = __edi;
                                      				_t271 = _t273;
                                      				_t274 = _t273 + 0xffffffd8;
                                      				_v16 = __ecx;
                                      				_v12 = __edx;
                                      				_v8 = __eax;
                                      				_t204 =  *_v8;
                                      				if(( *_v8 & 0x00000fff) >= 0x10f) {
                                      					if(E00B26E74(_t204,  &_v24) == 0) {
                                      						E00B1F34C(__ecx);
                                      					}
                                      					_push( &_v20);
                                      					_t216 = _v16;
                                      					if( *((intOrPtr*)( *_v24 + 8))() == 0) {
                                      						_t207 =  *_v12;
                                      						if((_t207 & 0x00000fff) >= 0x10f) {
                                      							if(E00B26E74(_t207,  &_v28) != 0) {
                                      								_push( &_v18);
                                      								_t217 = _v16;
                                      								if( *((intOrPtr*)( *_v28 + 4))() == 0) {
                                      									_t119 = E00B1F34C(_t217);
                                      									goto L35;
                                      								} else {
                                      									if( *_v8 == _v18) {
                                      										_t119 =  *((intOrPtr*)( *_v28 + 0x2c))(_v16);
                                      										goto L35;
                                      									} else {
                                      										_push( &_v44);
                                      										L00B1E2EC();
                                      										_push(_t271);
                                      										_push(0xb24675);
                                      										_push( *[fs:eax]);
                                      										 *[fs:eax] = _t274;
                                      										_t219 = _v18 & 0x0000ffff;
                                      										E00B20300( &_v44, _v18 & 0x0000ffff, _v8, _t269, _t278);
                                      										E00B1FDBC(_v8,  &_v44);
                                      										if( *_v8 != _v18) {
                                      											E00B1F25C(_t219);
                                      										}
                                      										_pop(_t250);
                                      										 *[fs:eax] = _t250;
                                      										_push(0xb2467c);
                                      										return E00B1FA94( &_v44);
                                      									}
                                      								}
                                      							} else {
                                      								_t119 = E00B1F34C(_t216);
                                      								goto L35;
                                      							}
                                      						} else {
                                      							if(_t207 ==  *_v8) {
                                      								_t119 = E00B250AC(_v8, _v16, _v12, _t278);
                                      								goto L35;
                                      							} else {
                                      								_push( &_v44);
                                      								L00B1E2EC();
                                      								_push(_t271);
                                      								_push(0xb245c6);
                                      								_push( *[fs:eax]);
                                      								 *[fs:eax] = _t274;
                                      								_t224 =  *_v12 & 0x0000ffff;
                                      								E00B20300( &_v44,  *_v12 & 0x0000ffff, _v8, _t269, _t278);
                                      								E00B1FDBC(_v8,  &_v44);
                                      								if( *_v8 !=  *_v12) {
                                      									E00B1F25C(_t224);
                                      								}
                                      								_pop(_t255);
                                      								 *[fs:eax] = _t255;
                                      								_push(0xb245cd);
                                      								return E00B1FA94( &_v44);
                                      							}
                                      						}
                                      					} else {
                                      						if( *_v12 == _v20) {
                                      							_t119 =  *((intOrPtr*)( *_v24 + 0x2c))(_v16);
                                      							goto L35;
                                      						} else {
                                      							_push( &_v44);
                                      							L00B1E2EC();
                                      							_push(_t271);
                                      							_push(0xb2452b);
                                      							_push( *[fs:eax]);
                                      							 *[fs:eax] = _t274;
                                      							_t228 = _v20 & 0x0000ffff;
                                      							E00B20300( &_v44, _v20 & 0x0000ffff, _v12, _t269, _t278);
                                      							if(_v44 != _v20) {
                                      								E00B1F25C(_t228);
                                      							}
                                      							 *((intOrPtr*)( *_v24 + 0x2c))(_v16);
                                      							_pop(_t259);
                                      							 *[fs:eax] = _t259;
                                      							_push(0xb24695);
                                      							return E00B1FA94( &_v44);
                                      						}
                                      					}
                                      				} else {
                                      					if(E00B26E74( *_v12,  &_v28) != 0) {
                                      						_push( &_v18);
                                      						if( *((intOrPtr*)( *_v28 + 4))() == 0) {
                                      							_push( &_v44);
                                      							L00B1E2EC();
                                      							_push(_t271);
                                      							_push(0xb2448b);
                                      							_push( *[fs:eax]);
                                      							 *[fs:eax] = _t274;
                                      							_t234 =  *_v8 & 0x0000ffff;
                                      							E00B20300( &_v44,  *_v8 & 0x0000ffff, _v12, __edi, __fp0);
                                      							if( *_v8 != _v44) {
                                      								E00B1F25C(_t234);
                                      							}
                                      							E00B250AC(_v8, _v16,  &_v44, _t278);
                                      							_pop(_t264);
                                      							 *[fs:eax] = _t264;
                                      							_push(0xb24695);
                                      							return E00B1FA94( &_v44);
                                      						} else {
                                      							if( *_v8 == _v18) {
                                      								_t119 =  *((intOrPtr*)( *_v28 + 0x2c))(_v16);
                                      								goto L35;
                                      							} else {
                                      								_push( &_v44);
                                      								L00B1E2EC();
                                      								_push(_t271);
                                      								_push(0xb24410);
                                      								_push( *[fs:eax]);
                                      								 *[fs:eax] = _t274;
                                      								_t239 = _v18 & 0x0000ffff;
                                      								E00B20300( &_v44, _v18 & 0x0000ffff, _v8, __edi, __fp0);
                                      								E00B1FDBC(_v8,  &_v44);
                                      								if( *_v8 != _v18) {
                                      									E00B1F25C(_t239);
                                      								}
                                      								_pop(_t268);
                                      								 *[fs:eax] = _t268;
                                      								_push(0xb24417);
                                      								return E00B1FA94( &_v44);
                                      							}
                                      						}
                                      					} else {
                                      						_t119 = E00B1F34C(__ecx);
                                      						L35:
                                      						return _t119;
                                      					}
                                      				}
                                      			}
























                                      0x00b24350
                                      0x00b24350
                                      0x00b24351
                                      0x00b24353
                                      0x00b24357
                                      0x00b2435a
                                      0x00b2435d
                                      0x00b24363
                                      0x00b24370
                                      0x00b244a1
                                      0x00b244a3
                                      0x00b244a3
                                      0x00b244ab
                                      0x00b244af
                                      0x00b244bc
                                      0x00b2454c
                                      0x00b24559
                                      0x00b245ef
                                      0x00b245fe
                                      0x00b24602
                                      0x00b2460f
                                      0x00b24690
                                      0x00000000
                                      0x00b24611
                                      0x00b2461b
                                      0x00b2468b
                                      0x00000000
                                      0x00b2461d
                                      0x00b24620
                                      0x00b24621
                                      0x00b24628
                                      0x00b24629
                                      0x00b2462e
                                      0x00b24631
                                      0x00b24634
                                      0x00b2463e
                                      0x00b24649
                                      0x00b24658
                                      0x00b2465a
                                      0x00b2465a
                                      0x00b24661
                                      0x00b24664
                                      0x00b24667
                                      0x00b24674
                                      0x00b24674
                                      0x00b2461b
                                      0x00b245f1
                                      0x00b245f1
                                      0x00000000
                                      0x00b245f1
                                      0x00b2455f
                                      0x00b24568
                                      0x00b245d6
                                      0x00000000
                                      0x00b2456a
                                      0x00b2456d
                                      0x00b2456e
                                      0x00b24575
                                      0x00b24576
                                      0x00b2457b
                                      0x00b2457e
                                      0x00b24584
                                      0x00b2458d
                                      0x00b24598
                                      0x00b245a9
                                      0x00b245ab
                                      0x00b245ab
                                      0x00b245b2
                                      0x00b245b5
                                      0x00b245b8
                                      0x00b245c5
                                      0x00b245c5
                                      0x00b24568
                                      0x00b244c2
                                      0x00b244cc
                                      0x00b24541
                                      0x00000000
                                      0x00b244ce
                                      0x00b244d1
                                      0x00b244d2
                                      0x00b244d9
                                      0x00b244da
                                      0x00b244df
                                      0x00b244e2
                                      0x00b244e5
                                      0x00b244ef
                                      0x00b244fc
                                      0x00b244fe
                                      0x00b244fe
                                      0x00b24512
                                      0x00b24517
                                      0x00b2451a
                                      0x00b2451d
                                      0x00b2452a
                                      0x00b2452a
                                      0x00b244cc
                                      0x00b24376
                                      0x00b24386
                                      0x00b24395
                                      0x00b243a6
                                      0x00b24431
                                      0x00b24432
                                      0x00b24439
                                      0x00b2443a
                                      0x00b2443f
                                      0x00b24442
                                      0x00b24448
                                      0x00b24451
                                      0x00b24460
                                      0x00b24462
                                      0x00b24462
                                      0x00b24470
                                      0x00b24477
                                      0x00b2447a
                                      0x00b2447d
                                      0x00b2448a
                                      0x00b243ac
                                      0x00b243b6
                                      0x00b24426
                                      0x00000000
                                      0x00b243b8
                                      0x00b243bb
                                      0x00b243bc
                                      0x00b243c3
                                      0x00b243c4
                                      0x00b243c9
                                      0x00b243cc
                                      0x00b243cf
                                      0x00b243d9
                                      0x00b243e4
                                      0x00b243f3
                                      0x00b243f5
                                      0x00b243f5
                                      0x00b243fc
                                      0x00b243ff
                                      0x00b24402
                                      0x00b2440f
                                      0x00b2440f
                                      0x00b243b6
                                      0x00b24388
                                      0x00b24388
                                      0x00b24695
                                      0x00b24699
                                      0x00b24699
                                      0x00b24386

                                      APIs
                                      • VariantInit.OLEAUT32(?), ref: 00B243BC
                                      • VariantInit.OLEAUT32(?), ref: 00B244D2
                                        • Part of subcall function 00B26E74: RtlEnterCriticalSection.KERNEL32(00BDF82C,?,?,?,00000000,?,00B25340,00000000,00B253E6,?,?,?,?,?,00B1F2DF,00000000), ref: 00B26EAA
                                        • Part of subcall function 00B26E74: RtlLeaveCriticalSection.KERNEL32(00BDF82C,00B26F23,?,00BDF82C,?,?,?,00000000,?,00B25340,00000000,00B253E6), ref: 00B26F16
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.289505180.0000000000B11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B10000, based on PE: true
                                      • Associated: 00000000.00000002.289475761.0000000000B10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.289928975.0000000000BDC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.289986188.0000000000BE3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_b10000_loaddll32.jbxd
                                      Similarity
                                      • API ID: CriticalInitSectionVariant$EnterLeave
                                      • String ID:
                                      • API String ID: 2777075435-0
                                      • Opcode ID: 920ad189934fe511a379e783a30fd78b94ba5dc4dcf7a7a9093f629327261f0e
                                      • Instruction ID: 1cfb63a01967b25fce6c4ba30b0cf03b28cab29cc0ab329d47b089b4df9d0816
                                      • Opcode Fuzzy Hash: 920ad189934fe511a379e783a30fd78b94ba5dc4dcf7a7a9093f629327261f0e
                                      • Instruction Fuzzy Hash: 51B11539A00219EFCB10EFA4E4918EDB7F9FF49710F9044E1E808A7A15D734AE85DB64
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      C-Code - Quality: 78%
                                      			E00B38018(struct HPALETTE__* __eax) {
                                      				struct HPALETTE__* _t21;
                                      				char _t28;
                                      				signed int _t30;
                                      				struct HPALETTE__* _t36;
                                      				struct HPALETTE__* _t37;
                                      				struct HDC__* _t38;
                                      				intOrPtr _t39;
                                      
                                      				_t21 = __eax;
                                      				_t36 = __eax;
                                      				_t39 =  *((intOrPtr*)(__eax + 0x28));
                                      				if( *((char*)(__eax + 0x30)) == 0 &&  *(_t39 + 0x10) == 0 &&  *((intOrPtr*)(_t39 + 0x14)) != 0) {
                                      					_t22 =  *((intOrPtr*)(_t39 + 0x14));
                                      					if( *((intOrPtr*)(_t39 + 0x14)) ==  *((intOrPtr*)(_t39 + 8))) {
                                      						E00B36A78(_t22);
                                      					}
                                      					_t21 = E00B35B74( *((intOrPtr*)(_t39 + 0x14)), 1 <<  *(_t39 + 0x3e));
                                      					_t37 = _t21;
                                      					 *(_t39 + 0x10) = _t37;
                                      					if(_t37 == 0) {
                                      						_push(0);
                                      						L00B171A4();
                                      						_t21 = E00B35484(_t21);
                                      						_t38 = _t21;
                                      						if( *((char*)(_t39 + 0x71)) != 0) {
                                      							L9:
                                      							_t28 = 1;
                                      						} else {
                                      							_push(0xc);
                                      							_push(_t38);
                                      							L00B16F24();
                                      							_push(0xe);
                                      							_push(_t38);
                                      							L00B16F24();
                                      							_t30 = _t21 * _t21;
                                      							_t21 = ( *(_t39 + 0x2a) & 0x0000ffff) * ( *(_t39 + 0x28) & 0x0000ffff);
                                      							if(_t30 < _t21) {
                                      								goto L9;
                                      							} else {
                                      								_t28 = 0;
                                      							}
                                      						}
                                      						 *((char*)(_t39 + 0x71)) = _t28;
                                      						if(_t28 != 0) {
                                      							_t21 = CreateHalftonePalette(_t38);
                                      							 *(_t39 + 0x10) = _t21;
                                      						}
                                      						_push(_t38);
                                      						_push(0);
                                      						L00B173DC();
                                      						if( *(_t39 + 0x10) == 0) {
                                      							 *((char*)(_t36 + 0x30)) = 1;
                                      							return _t21;
                                      						}
                                      					}
                                      				}
                                      				return _t21;
                                      			}










                                      0x00b38018
                                      0x00b3801c
                                      0x00b3801e
                                      0x00b38025
                                      0x00b3803f
                                      0x00b38045
                                      0x00b38047
                                      0x00b38047
                                      0x00b3805e
                                      0x00b38063
                                      0x00b38065
                                      0x00b3806a
                                      0x00b3806c
                                      0x00b3806e
                                      0x00b38073
                                      0x00b38078
                                      0x00b3807e
                                      0x00b380a7
                                      0x00b380a7
                                      0x00b38080
                                      0x00b38080
                                      0x00b38082
                                      0x00b38083
                                      0x00b3808a
                                      0x00b3808c
                                      0x00b3808d
                                      0x00b38092
                                      0x00b3809d
                                      0x00b380a1
                                      0x00000000
                                      0x00b380a3
                                      0x00b380a3
                                      0x00b380a3
                                      0x00b380a1
                                      0x00b380a9
                                      0x00b380ae
                                      0x00b380b1
                                      0x00b380b6
                                      0x00b380b6
                                      0x00b380b9
                                      0x00b380ba
                                      0x00b380bc
                                      0x00b380c5
                                      0x00b380c7
                                      0x00000000
                                      0x00b380c7
                                      0x00b380c5
                                      0x00b3806a
                                      0x00b380cf

                                      APIs
                                      • 73BEAC50.USER32(00000000,?,?,?,?,00B36C4F,00000000,00B36CDB), ref: 00B3806E
                                      • 73BEAD70.GDI32(00000000,0000000C,00000000,?,?,?,?,00B36C4F,00000000,00B36CDB), ref: 00B38083
                                      • 73BEAD70.GDI32(00000000,0000000E,00000000,0000000C,00000000,?,?,?,?,00B36C4F,00000000,00B36CDB), ref: 00B3808D
                                      • CreateHalftonePalette.GDI32(00000000,00000000,?,?,?,?,00B36C4F,00000000,00B36CDB), ref: 00B380B1
                                      • 73BEB380.USER32(00000000,00000000,00000000,?,?,?,?,00B36C4F,00000000,00B36CDB), ref: 00B380BC
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.289505180.0000000000B11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B10000, based on PE: true
                                      • Associated: 00000000.00000002.289475761.0000000000B10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.289928975.0000000000BDC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.289986188.0000000000BE3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_b10000_loaddll32.jbxd
                                      Similarity
                                      • API ID: B380CreateHalftonePalette
                                      • String ID:
                                      • API String ID: 178651289-0
                                      • Opcode ID: 0fba0536c1c151285a3fdbdbd370115afa4dc770d1e103635745386161a291d9
                                      • Instruction ID: cc9614a7fc18338b93b2fe956813b4191a6d9d83fd21964ad553da70fe9b397b
                                      • Opcode Fuzzy Hash: 0fba0536c1c151285a3fdbdbd370115afa4dc770d1e103635745386161a291d9
                                      • Instruction Fuzzy Hash: 8411E6216813999EDB34EF24D8417EE3BE0EF11351F5401A1FC409B281DBB48C98C7A2
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      C-Code - Quality: 40%
                                      			E00B35ADC(intOrPtr __eax) {
                                      				char _v5;
                                      				intOrPtr _v12;
                                      				intOrPtr _t14;
                                      				intOrPtr _t16;
                                      				intOrPtr _t18;
                                      				intOrPtr _t21;
                                      				intOrPtr _t30;
                                      				void* _t32;
                                      				void* _t34;
                                      				intOrPtr _t35;
                                      
                                      				_t32 = _t34;
                                      				_t35 = _t34 + 0xfffffff8;
                                      				_v5 = 0;
                                      				if( *0xbdf894 == 0) {
                                      					return _v5;
                                      				} else {
                                      					_push(0);
                                      					L00B171A4();
                                      					_v12 = __eax;
                                      					_push(_t32);
                                      					_push(0xb35b62);
                                      					_push( *[fs:edx]);
                                      					 *[fs:edx] = _t35;
                                      					_push(0x68);
                                      					_t14 = _v12;
                                      					_push(_t14);
                                      					L00B16F24();
                                      					if(_t14 >= 0x10) {
                                      						_push(__eax + 4);
                                      						_push(8);
                                      						_push(0);
                                      						_t18 =  *0xbdf894; // 0x350808d9
                                      						_push(_t18);
                                      						L00B16F34();
                                      						_push(__eax + ( *(__eax + 2) & 0x0000ffff) * 4 - 0x1c);
                                      						_push(8);
                                      						_push(8);
                                      						_t21 =  *0xbdf894; // 0x350808d9
                                      						_push(_t21);
                                      						L00B16F34();
                                      						_v5 = 1;
                                      					}
                                      					_pop(_t30);
                                      					 *[fs:eax] = _t30;
                                      					_push(0xb35b69);
                                      					_t16 = _v12;
                                      					_push(_t16);
                                      					_push(0);
                                      					L00B173DC();
                                      					return _t16;
                                      				}
                                      			}













                                      0x00b35add
                                      0x00b35adf
                                      0x00b35ae5
                                      0x00b35af0
                                      0x00b35b70
                                      0x00b35af2
                                      0x00b35af2
                                      0x00b35af4
                                      0x00b35af9
                                      0x00b35afe
                                      0x00b35aff
                                      0x00b35b04
                                      0x00b35b07
                                      0x00b35b0a
                                      0x00b35b0c
                                      0x00b35b0f
                                      0x00b35b10
                                      0x00b35b18
                                      0x00b35b1d
                                      0x00b35b1e
                                      0x00b35b20
                                      0x00b35b22
                                      0x00b35b27
                                      0x00b35b28
                                      0x00b35b35
                                      0x00b35b36
                                      0x00b35b38
                                      0x00b35b3a
                                      0x00b35b3f
                                      0x00b35b40
                                      0x00b35b45
                                      0x00b35b45
                                      0x00b35b4b
                                      0x00b35b4e
                                      0x00b35b51
                                      0x00b35b56
                                      0x00b35b59
                                      0x00b35b5a
                                      0x00b35b5c
                                      0x00b35b61
                                      0x00b35b61

                                      APIs
                                      • 73BEAC50.USER32(00000000), ref: 00B35AF4
                                      • 73BEAD70.GDI32(?,00000068,00000000,00B35B62,?,00000000), ref: 00B35B10
                                      • 73BEAEA0.GDI32(350808D9,00000000,00000008,?,?,00000068,00000000,00B35B62,?,00000000), ref: 00B35B28
                                      • 73BEAEA0.GDI32(350808D9,00000008,00000008,?,350808D9,00000000,00000008,?,?,00000068,00000000,00B35B62,?,00000000), ref: 00B35B40
                                      • 73BEB380.USER32(00000000,?,00B35B69,00B35B62,?,00000000), ref: 00B35B5C
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.289505180.0000000000B11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B10000, based on PE: true
                                      • Associated: 00000000.00000002.289475761.0000000000B10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.289928975.0000000000BDC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.289986188.0000000000BE3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_b10000_loaddll32.jbxd
                                      Similarity
                                      • API ID: B380
                                      • String ID:
                                      • API String ID: 120756276-0
                                      • Opcode ID: 44e116c24c13e29776b481d0ef69205078913e2c582b6b97c3504800676efd0f
                                      • Instruction ID: 62ba5e65da977270486e56aed697c0f1bc56e1944e119df761d4617de25dabff
                                      • Opcode Fuzzy Hash: 44e116c24c13e29776b481d0ef69205078913e2c582b6b97c3504800676efd0f
                                      • Instruction Fuzzy Hash: 2611E13168D244BEFB10CFA49C42FA9BBE8E705700F9480D6F5049B1C1EA769545C721
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      C-Code - Quality: 64%
                                      			E00B1BC90(void* __esi, void* __eflags) {
                                      				char _v8;
                                      				intOrPtr* _t18;
                                      				intOrPtr _t26;
                                      				void* _t27;
                                      				long _t29;
                                      				intOrPtr _t32;
                                      				void* _t33;
                                      
                                      				_t33 = __eflags;
                                      				_push(0);
                                      				_push(_t32);
                                      				_push(0xb1bd27);
                                      				_push( *[fs:eax]);
                                      				 *[fs:eax] = _t32;
                                      				E00B1BA08(GetThreadLocale(), 0xb1bd3c, 0x100b,  &_v8);
                                      				_t29 = E00B18C68(0xb1bd3c, 1, _t33);
                                      				if(_t29 + 0xfffffffd - 3 < 0) {
                                      					EnumCalendarInfoA(E00B1BBDC, GetThreadLocale(), _t29, 4);
                                      					_t27 = 7;
                                      					_t18 = 0xbdf770;
                                      					do {
                                      						 *_t18 = 0xffffffff;
                                      						_t18 = _t18 + 4;
                                      						_t27 = _t27 - 1;
                                      					} while (_t27 != 0);
                                      					EnumCalendarInfoA(E00B1BC18, GetThreadLocale(), _t29, 3);
                                      				}
                                      				_pop(_t26);
                                      				 *[fs:eax] = _t26;
                                      				_push(0xb1bd2e);
                                      				return E00B14228( &_v8);
                                      			}










                                      0x00b1bc90
                                      0x00b1bc93
                                      0x00b1bc98
                                      0x00b1bc99
                                      0x00b1bc9e
                                      0x00b1bca1
                                      0x00b1bcb7
                                      0x00b1bcc9
                                      0x00b1bcd3
                                      0x00b1bce3
                                      0x00b1bce8
                                      0x00b1bced
                                      0x00b1bcf2
                                      0x00b1bcf2
                                      0x00b1bcf8
                                      0x00b1bcfb
                                      0x00b1bcfb
                                      0x00b1bd0c
                                      0x00b1bd0c
                                      0x00b1bd13
                                      0x00b1bd16
                                      0x00b1bd19
                                      0x00b1bd26

                                      APIs
                                      • GetThreadLocale.KERNEL32(?,00000000,00B1BD27,?,?,00000000), ref: 00B1BCA8
                                        • Part of subcall function 00B1BA08: GetLocaleInfoA.KERNEL32(?,?,?,00000100), ref: 00B1BA26
                                      • GetThreadLocale.KERNEL32(00000000,00000004,00000000,00B1BD27,?,?,00000000), ref: 00B1BCD8
                                      • EnumCalendarInfoA.KERNEL32(Function_0000BBDC,00000000,00000000,00000004), ref: 00B1BCE3
                                      • GetThreadLocale.KERNEL32(00000000,00000003,00000000,00B1BD27,?,?,00000000), ref: 00B1BD01
                                      • EnumCalendarInfoA.KERNEL32(Function_0000BC18,00000000,00000000,00000003), ref: 00B1BD0C
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.289505180.0000000000B11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B10000, based on PE: true
                                      • Associated: 00000000.00000002.289475761.0000000000B10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.289928975.0000000000BDC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.289986188.0000000000BE3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_b10000_loaddll32.jbxd
                                      Similarity
                                      • API ID: Locale$InfoThread$CalendarEnum
                                      • String ID:
                                      • API String ID: 4102113445-0
                                      • Opcode ID: 4a42c3ea63e4e2806426e8a2f42d6e6a976df452639ba1297e20dd92b2b5174d
                                      • Instruction ID: fb18cf437d3ce19f5bac26d353991a4697934f166b774786930b0c9ee1d5d4ca
                                      • Opcode Fuzzy Hash: 4a42c3ea63e4e2806426e8a2f42d6e6a976df452639ba1297e20dd92b2b5174d
                                      • Instruction Fuzzy Hash: D001A271204248ABE701A774DC13FEA76D8DB45B14FE145F0F400AABD1DB749EC082A4
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      C-Code - Quality: 83%
                                      			E00B1BD40(void* __eax, void* __ebx, void* __edx, void* __edi, void* __esi, void* __eflags) {
                                      				intOrPtr _v8;
                                      				char _v12;
                                      				intOrPtr _v16;
                                      				char _v20;
                                      				char _v24;
                                      				void* _t41;
                                      				signed int _t45;
                                      				signed int _t47;
                                      				signed int _t49;
                                      				signed int _t51;
                                      				intOrPtr _t75;
                                      				void* _t76;
                                      				signed int _t77;
                                      				signed int _t83;
                                      				signed int _t92;
                                      				intOrPtr _t111;
                                      				void* _t122;
                                      				void* _t124;
                                      				intOrPtr _t127;
                                      				void* _t128;
                                      
                                      				_t128 = __eflags;
                                      				_push(0);
                                      				_push(0);
                                      				_push(0);
                                      				_push(0);
                                      				_push(0);
                                      				_t122 = __edx;
                                      				_t124 = __eax;
                                      				_push(_t127);
                                      				_push(0xb1bf0a);
                                      				_push( *[fs:eax]);
                                      				 *[fs:eax] = _t127;
                                      				_t92 = 1;
                                      				E00B14228(__edx);
                                      				E00B1BA08(GetThreadLocale(), 0xb1bf20, 0x1009,  &_v12);
                                      				if(E00B18C68(0xb1bf20, 1, _t128) + 0xfffffffd - 3 < 0) {
                                      					while(1) {
                                      						_t41 = E00B144E8(_t124);
                                      						__eflags = _t92 - _t41;
                                      						if(_t92 > _t41) {
                                      							break;
                                      						}
                                      						__eflags =  *(_t124 + _t92 - 1) & 0x000000ff;
                                      						asm("bt [0xbdc11c], eax");
                                      						if(( *(_t124 + _t92 - 1) & 0x000000ff) >= 0) {
                                      							_t45 = E00B192C8(_t124 + _t92 - 1, 2, 0xb1bf24);
                                      							__eflags = _t45;
                                      							if(_t45 != 0) {
                                      								_t47 = E00B192C8(_t124 + _t92 - 1, 4, 0xb1bf34);
                                      								__eflags = _t47;
                                      								if(_t47 != 0) {
                                      									_t49 = E00B192C8(_t124 + _t92 - 1, 2, 0xb1bf4c);
                                      									__eflags = _t49;
                                      									if(_t49 != 0) {
                                      										_t51 =  *(_t124 + _t92 - 1) - 0x59;
                                      										__eflags = _t51;
                                      										if(_t51 == 0) {
                                      											L24:
                                      											E00B144F0(_t122, 0xb1bf64);
                                      											L26:
                                      											_t92 = _t92 + 1;
                                      											__eflags = _t92;
                                      											continue;
                                      										}
                                      										__eflags = _t51 != 0x20;
                                      										if(_t51 != 0x20) {
                                      											E00B14410();
                                      											E00B144F0(_t122, _v24);
                                      											goto L26;
                                      										}
                                      										goto L24;
                                      									}
                                      									E00B144F0(_t122, 0xb1bf58);
                                      									_t92 = _t92 + 1;
                                      									goto L26;
                                      								}
                                      								E00B144F0(_t122, 0xb1bf44);
                                      								_t92 = _t92 + 3;
                                      								goto L26;
                                      							}
                                      							E00B144F0(_t122, 0xb1bf30);
                                      							_t92 = _t92 + 1;
                                      							goto L26;
                                      						}
                                      						_v8 = E00B1CDF8(_t124, _t92);
                                      						E00B14748(_t124, _v8, _t92,  &_v20);
                                      						E00B144F0(_t122, _v20);
                                      						_t92 = _t92 + _v8;
                                      					}
                                      					L28:
                                      					_pop(_t111);
                                      					 *[fs:eax] = _t111;
                                      					_push(0xb1bf11);
                                      					return E00B1424C( &_v24, 4);
                                      				}
                                      				_t75 =  *0xbdf748; // 0x9
                                      				_t76 = _t75 - 4;
                                      				if(_t76 == 0 || _t76 + 0xfffffff3 - 2 < 0) {
                                      					_t77 = 1;
                                      				} else {
                                      					_t77 = 0;
                                      				}
                                      				if(_t77 == 0) {
                                      					E00B1427C(_t122, _t124);
                                      				} else {
                                      					while(_t92 <= E00B144E8(_t124)) {
                                      						_t83 =  *(_t124 + _t92 - 1) - 0x47;
                                      						__eflags = _t83;
                                      						if(_t83 != 0) {
                                      							__eflags = _t83 != 0x20;
                                      							if(_t83 != 0x20) {
                                      								E00B14410();
                                      								E00B144F0(_t122, _v16);
                                      							}
                                      						}
                                      						_t92 = _t92 + 1;
                                      						__eflags = _t92;
                                      					}
                                      				}
                                      			}























                                      0x00b1bd40
                                      0x00b1bd45
                                      0x00b1bd46
                                      0x00b1bd47
                                      0x00b1bd48
                                      0x00b1bd49
                                      0x00b1bd4d
                                      0x00b1bd4f
                                      0x00b1bd53
                                      0x00b1bd54
                                      0x00b1bd59
                                      0x00b1bd5c
                                      0x00b1bd5f
                                      0x00b1bd66
                                      0x00b1bd7e
                                      0x00b1bd96
                                      0x00b1bee0
                                      0x00b1bee2
                                      0x00b1bee7
                                      0x00b1bee9
                                      0x00000000
                                      0x00000000
                                      0x00b1bdff
                                      0x00b1be04
                                      0x00b1be0b
                                      0x00b1be49
                                      0x00b1be4e
                                      0x00b1be50
                                      0x00b1be6f
                                      0x00b1be74
                                      0x00b1be76
                                      0x00b1be97
                                      0x00b1be9c
                                      0x00b1be9e
                                      0x00b1beb3
                                      0x00b1beb3
                                      0x00b1beb5
                                      0x00b1bebb
                                      0x00b1bec2
                                      0x00b1bedf
                                      0x00b1bedf
                                      0x00b1bedf
                                      0x00000000
                                      0x00b1bedf
                                      0x00b1beb7
                                      0x00b1beb9
                                      0x00b1bed0
                                      0x00b1beda
                                      0x00000000
                                      0x00b1beda
                                      0x00000000
                                      0x00b1beb9
                                      0x00b1bea7
                                      0x00b1beac
                                      0x00000000
                                      0x00b1beac
                                      0x00b1be7f
                                      0x00b1be84
                                      0x00000000
                                      0x00b1be84
                                      0x00b1be59
                                      0x00b1be5e
                                      0x00000000
                                      0x00b1be5e
                                      0x00b1be16
                                      0x00b1be24
                                      0x00b1be2e
                                      0x00b1be33
                                      0x00b1be33
                                      0x00b1beef
                                      0x00b1bef1
                                      0x00b1bef4
                                      0x00b1bef7
                                      0x00b1bf09
                                      0x00b1bf09
                                      0x00b1bd9c
                                      0x00b1bda1
                                      0x00b1bda4
                                      0x00b1bdb2
                                      0x00b1bdae
                                      0x00b1bdae
                                      0x00b1bdae
                                      0x00b1bdb6
                                      0x00b1bdf1
                                      0x00b1bdb8
                                      0x00b1bddd
                                      0x00b1bdbe
                                      0x00b1bdbe
                                      0x00b1bdc0
                                      0x00b1bdc2
                                      0x00b1bdc4
                                      0x00b1bdcd
                                      0x00b1bdd7
                                      0x00b1bdd7
                                      0x00b1bdc4
                                      0x00b1bddc
                                      0x00b1bddc
                                      0x00b1bddc
                                      0x00b1bde8

                                      APIs
                                      • GetThreadLocale.KERNEL32(?,00000000,00B1BF0A,?,?,?,?,00000000,00000000,00000000,00000000,00000000), ref: 00B1BD6F
                                        • Part of subcall function 00B1BA08: GetLocaleInfoA.KERNEL32(?,?,?,00000100), ref: 00B1BA26
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.289505180.0000000000B11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B10000, based on PE: true
                                      • Associated: 00000000.00000002.289475761.0000000000B10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.289928975.0000000000BDC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.289986188.0000000000BE3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_b10000_loaddll32.jbxd
                                      Similarity
                                      • API ID: Locale$InfoThread
                                      • String ID: eeee$ggg$yyyy
                                      • API String ID: 4232894706-1253427255
                                      • Opcode ID: c2195403323d8483b3f359a1faf9d45e402f0af0bbde2b92e1a30c069d7106a3
                                      • Instruction ID: a5b7283244eb10b4e3aca4aa71778201889d37351bc6ade3a7d5aad2b058731c
                                      • Opcode Fuzzy Hash: c2195403323d8483b3f359a1faf9d45e402f0af0bbde2b92e1a30c069d7106a3
                                      • Instruction Fuzzy Hash: 9541DC763041054BCB15EB78E892AFEB7E6DB85304BE449F5E541C3356DB30ADC286A1
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      C-Code - Quality: 88%
                                      			E00B3E6F0(void* __eax, void* __ebx, intOrPtr __edx, void* __edi, void* __esi) {
                                      				char _v8;
                                      				char _v12;
                                      				intOrPtr _v16;
                                      				char _v20;
                                      				char _v24;
                                      				char _v28;
                                      				void* _t46;
                                      				int _t56;
                                      				void* _t68;
                                      				void* _t71;
                                      				void* _t85;
                                      				intOrPtr _t89;
                                      				intOrPtr _t91;
                                      				intOrPtr _t92;
                                      				intOrPtr _t93;
                                      				intOrPtr _t94;
                                      				intOrPtr _t97;
                                      				intOrPtr _t102;
                                      				void* _t108;
                                      				intOrPtr _t110;
                                      				void* _t113;
                                      
                                      				_v28 = 0;
                                      				_t110 = __edx;
                                      				_t85 = __eax;
                                      				_push(_t113);
                                      				_push(0xb3e8ce);
                                      				_push( *[fs:eax]);
                                      				 *[fs:eax] = _t113 + 0xffffffe8;
                                      				if(__edx == 0) {
                                      					L8:
                                      					if( *((intOrPtr*)(_t85 + 0x20c)) == 0) {
                                      						L12:
                                      						if(_t110 != 0 &&  *((intOrPtr*)(_t110 + 0x30)) ==  *((intOrPtr*)(_t85 + 0x30))) {
                                      							_t92 =  *0xb3db18; // 0xb3db64
                                      							if(E00B13514(_t110, _t92) == 0) {
                                      								_t93 =  *0xbdc0a0; // 0x0
                                      								if(E00B13514(_t110, _t93) == 0) {
                                      									_t94 =  *0xbdc0a0; // 0x0
                                      									if(E00B13514(_t110, _t94) == 0 && E00B3E6C0(E00B132C8(_t110), "TDBEdit") == 0 && E00B3E6C0(E00B132C8(_t110), "TDBMemo") == 0) {
                                      										_t46 = E00B61298(_t85);
                                      										_t132 = _t46;
                                      										if(_t46 != 0) {
                                      											E00B3E8FC(_t85, _t110, _t132);
                                      											_t56 = E00B60FC0(_t110);
                                      											SendMessageA(E00B60FC0(_t85), 0x469, _t56, 0);
                                      										}
                                      										 *((intOrPtr*)(_t85 + 0x20c)) = _t110;
                                      										_t97 =  *0xbdc0a0; // 0x0
                                      										if(E00B13514(_t110, _t97) != 0) {
                                      											E00B18AF0( &_v28);
                                      											E00B5A894(_t110, _t85, _v28, _t110);
                                      										}
                                      									}
                                      								}
                                      							}
                                      						}
                                      						_pop(_t91);
                                      						 *[fs:eax] = _t91;
                                      						_push(0xb3e8d5);
                                      						return E00B14228( &_v28);
                                      					}
                                      					if(E00B61298(_t85) != 0) {
                                      						SendMessageA(E00B60FC0(_t85), 0x469, 0, 0);
                                      					}
                                      					 *((intOrPtr*)(_t85 + 0x20c)) = 0;
                                      					goto L12;
                                      				}
                                      				_t68 = E00B5DCF0( *((intOrPtr*)(__eax + 0x30))) - 1;
                                      				if(_t68 >= 0) {
                                      					_v8 = _t68 + 1;
                                      					_t108 = 0;
                                      					do {
                                      						_t71 = E00B5DCB4( *((intOrPtr*)(_t85 + 0x30)), _t108);
                                      						_t102 =  *0xb3db18; // 0xb3db64
                                      						if(E00B13514(_t71, _t102) != 0 && _t85 != E00B5DCB4( *((intOrPtr*)(_t85 + 0x30)), _t108) && _t110 ==  *((intOrPtr*)(E00B5DCB4( *((intOrPtr*)(_t85 + 0x30)), _t108) + 0x20c))) {
                                      							_v24 =  *((intOrPtr*)(_t110 + 8));
                                      							_v20 = 0xb;
                                      							_v16 =  *((intOrPtr*)(E00B5DCB4( *((intOrPtr*)(_t85 + 0x30)), _t108) + 8));
                                      							_v12 = 0xb;
                                      							_t89 =  *0xbde5d4; // 0xb3d484
                                      							E00B1C2BC(_t85, _t89, 1, _t108, _t110, 1,  &_v24);
                                      							E00B13BC0();
                                      						}
                                      						_t108 = _t108 + 1;
                                      						_t16 =  &_v8;
                                      						 *_t16 = _v8 - 1;
                                      					} while ( *_t16 != 0);
                                      				}
                                      			}
























                                      0x00b3e6fb
                                      0x00b3e6fe
                                      0x00b3e700
                                      0x00b3e704
                                      0x00b3e705
                                      0x00b3e70a
                                      0x00b3e70d
                                      0x00b3e712
                                      0x00b3e7a9
                                      0x00b3e7b0
                                      0x00b3e7db
                                      0x00b3e7dd
                                      0x00b3e7f1
                                      0x00b3e7fe
                                      0x00b3e806
                                      0x00b3e813
                                      0x00b3e81b
                                      0x00b3e828
                                      0x00b3e85a
                                      0x00b3e85f
                                      0x00b3e861
                                      0x00b3e867
                                      0x00b3e870
                                      0x00b3e883
                                      0x00b3e883
                                      0x00b3e888
                                      0x00b3e890
                                      0x00b3e89d
                                      0x00b3e8a9
                                      0x00b3e8b3
                                      0x00b3e8b3
                                      0x00b3e89d
                                      0x00b3e828
                                      0x00b3e813
                                      0x00b3e7fe
                                      0x00b3e8ba
                                      0x00b3e8bd
                                      0x00b3e8c0
                                      0x00b3e8cd
                                      0x00b3e8cd
                                      0x00b3e7bb
                                      0x00b3e7ce
                                      0x00b3e7ce
                                      0x00b3e7d5
                                      0x00000000
                                      0x00b3e7d5
                                      0x00b3e720
                                      0x00b3e723
                                      0x00b3e72a
                                      0x00b3e72d
                                      0x00b3e72f
                                      0x00b3e734
                                      0x00b3e739
                                      0x00b3e746
                                      0x00b3e76b
                                      0x00b3e76e
                                      0x00b3e77f
                                      0x00b3e782
                                      0x00b3e78c
                                      0x00b3e799
                                      0x00b3e79e
                                      0x00b3e79e
                                      0x00b3e7a3
                                      0x00b3e7a4
                                      0x00b3e7a4
                                      0x00b3e7a4
                                      0x00b3e72f

                                      APIs
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.289505180.0000000000B11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B10000, based on PE: true
                                      • Associated: 00000000.00000002.289475761.0000000000B10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.289928975.0000000000BDC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.289986188.0000000000BE3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_b10000_loaddll32.jbxd
                                      Similarity
                                      • API ID: MessageSend
                                      • String ID: TDBEdit$TDBMemo
                                      • API String ID: 3850602802-2833401046
                                      • Opcode ID: 48f902b410597c5da8c900f8eb6d231aea2d9793269ba988204db7323cc4ee7f
                                      • Instruction ID: 2f83adfbeae0a3d8c53d15b5302a7a3fff166aaab31e4b31858e15b262ab8a6d
                                      • Opcode Fuzzy Hash: 48f902b410597c5da8c900f8eb6d231aea2d9793269ba988204db7323cc4ee7f
                                      • Instruction Fuzzy Hash: 88414F70B142059BEB10EF69D8827AE77E5EF41B00FA445E2FC10EB396DA74ED468790
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      C-Code - Quality: 100%
                                      			E00B1D820() {
                                      				_Unknown_base(*)()* _t1;
                                      				struct HINSTANCE__* _t3;
                                      
                                      				_t1 = GetModuleHandleA("kernel32.dll");
                                      				_t3 = _t1;
                                      				if(_t3 != 0) {
                                      					_t1 = GetProcAddress(_t3, "GetDiskFreeSpaceExA");
                                      					 *0xbdc140 = _t1;
                                      				}
                                      				if( *0xbdc140 == 0) {
                                      					 *0xbdc140 = E00B19114;
                                      					return E00B19114;
                                      				}
                                      				return _t1;
                                      			}





                                      0x00b1d826
                                      0x00b1d82b
                                      0x00b1d82f
                                      0x00b1d837
                                      0x00b1d83c
                                      0x00b1d83c
                                      0x00b1d848
                                      0x00b1d84f
                                      0x00000000
                                      0x00b1d84f
                                      0x00b1d855

                                      APIs
                                      • GetModuleHandleA.KERNEL32(kernel32.dll,?,00B1E289,00000000,00B1E29C), ref: 00B1D826
                                      • GetProcAddress.KERNEL32(00000000,GetDiskFreeSpaceExA), ref: 00B1D837
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.289505180.0000000000B11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B10000, based on PE: true
                                      • Associated: 00000000.00000002.289475761.0000000000B10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.289928975.0000000000BDC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.289986188.0000000000BE3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_b10000_loaddll32.jbxd
                                      Similarity
                                      • API ID: AddressHandleModuleProc
                                      • String ID: GetDiskFreeSpaceExA$kernel32.dll
                                      • API String ID: 1646373207-3712701948
                                      • Opcode ID: 0c2c9c5e4dab878fabae76ed3ea817f175ff595c834b6d6c53c22eb57a7d0f8e
                                      • Instruction ID: fde90c9d00e9b8d6d4aba5856a731ae07fcc5ec50173940e057feffdb168d8e5
                                      • Opcode Fuzzy Hash: 0c2c9c5e4dab878fabae76ed3ea817f175ff595c834b6d6c53c22eb57a7d0f8e
                                      • Instruction Fuzzy Hash: 8ED0C7A1745397ABDF109BBDECD569167E4E751711B9001FAE00167153FBB448C4C610
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      C-Code - Quality: 82%
                                      			E00B1F89C(intOrPtr* __eax) {
                                      				char _v260;
                                      				char _v768;
                                      				char _v772;
                                      				intOrPtr* _v776;
                                      				signed short* _v780;
                                      				char _v784;
                                      				signed int _v788;
                                      				char _v792;
                                      				intOrPtr* _v796;
                                      				signed char _t43;
                                      				intOrPtr* _t60;
                                      				void* _t79;
                                      				void* _t81;
                                      				void* _t84;
                                      				void* _t85;
                                      				intOrPtr* _t92;
                                      				void* _t96;
                                      				char* _t97;
                                      				void* _t98;
                                      
                                      				_v776 = __eax;
                                      				if(( *(_v776 + 1) & 0x00000020) == 0) {
                                      					E00B1F6E4(0x80070057);
                                      				}
                                      				_t43 =  *_v776;
                                      				if((_t43 & 0x00000fff) == 0xc) {
                                      					if((_t43 & 0x00000040) == 0) {
                                      						_v780 =  *((intOrPtr*)(_v776 + 8));
                                      					} else {
                                      						_v780 =  *((intOrPtr*)( *((intOrPtr*)(_v776 + 8))));
                                      					}
                                      					_v788 =  *_v780 & 0x0000ffff;
                                      					_t79 = _v788 - 1;
                                      					if(_t79 >= 0) {
                                      						_t85 = _t79 + 1;
                                      						_t96 = 0;
                                      						_t97 =  &_v772;
                                      						do {
                                      							_v796 = _t97;
                                      							_push(_v796 + 4);
                                      							_t22 = _t96 + 1; // 0x1
                                      							_push(_v780);
                                      							L00B1E760();
                                      							E00B1F6E4(_v780);
                                      							_push( &_v784);
                                      							_t25 = _t96 + 1; // 0x1
                                      							_push(_v780);
                                      							L00B1E768();
                                      							E00B1F6E4(_v780);
                                      							 *_v796 = _v784 -  *((intOrPtr*)(_v796 + 4)) + 1;
                                      							_t96 = _t96 + 1;
                                      							_t97 = _t97 + 8;
                                      							_t85 = _t85 - 1;
                                      						} while (_t85 != 0);
                                      					}
                                      					_t81 = _v788 - 1;
                                      					if(_t81 >= 0) {
                                      						_t84 = _t81 + 1;
                                      						_t60 =  &_v768;
                                      						_t92 =  &_v260;
                                      						do {
                                      							 *_t92 =  *_t60;
                                      							_t92 = _t92 + 4;
                                      							_t60 = _t60 + 8;
                                      							_t84 = _t84 - 1;
                                      						} while (_t84 != 0);
                                      						do {
                                      							goto L12;
                                      						} while (E00B1F840(_t83, _t98) != 0);
                                      						goto L15;
                                      					}
                                      					L12:
                                      					_t83 = _v788 - 1;
                                      					if(E00B1F810(_v788 - 1, _t98) != 0) {
                                      						_push( &_v792);
                                      						_push( &_v260);
                                      						_push(_v780);
                                      						L00B1E790();
                                      						E00B1F6E4(_v780);
                                      						E00B1FA94(_v792);
                                      					}
                                      				}
                                      				L15:
                                      				_push(_v776);
                                      				L00B1E2F4();
                                      				return E00B1F6E4(_v776);
                                      			}






















                                      0x00b1f8a8
                                      0x00b1f8b8
                                      0x00b1f8bf
                                      0x00b1f8bf
                                      0x00b1f8ca
                                      0x00b1f8d8
                                      0x00b1f8e7
                                      0x00b1f905
                                      0x00b1f8e9
                                      0x00b1f8f4
                                      0x00b1f8f4
                                      0x00b1f914
                                      0x00b1f920
                                      0x00b1f923
                                      0x00b1f925
                                      0x00b1f926
                                      0x00b1f928
                                      0x00b1f92e
                                      0x00b1f930
                                      0x00b1f93f
                                      0x00b1f940
                                      0x00b1f94a
                                      0x00b1f94b
                                      0x00b1f950
                                      0x00b1f95b
                                      0x00b1f95c
                                      0x00b1f966
                                      0x00b1f967
                                      0x00b1f96c
                                      0x00b1f987
                                      0x00b1f989
                                      0x00b1f98a
                                      0x00b1f98d
                                      0x00b1f98d
                                      0x00b1f92e
                                      0x00b1f996
                                      0x00b1f999
                                      0x00b1f99b
                                      0x00b1f99c
                                      0x00b1f9a2
                                      0x00b1f9a8
                                      0x00b1f9aa
                                      0x00b1f9ac
                                      0x00b1f9af
                                      0x00b1f9b2
                                      0x00b1f9b2
                                      0x00b1f9b5
                                      0x00000000
                                      0x00000000
                                      0x00000000
                                      0x00b1f9b5
                                      0x00b1f9b5
                                      0x00b1f9bc
                                      0x00b1f9c7
                                      0x00b1f9cf
                                      0x00b1f9d6
                                      0x00b1f9dd
                                      0x00b1f9de
                                      0x00b1f9e3
                                      0x00b1f9ee
                                      0x00b1f9ee
                                      0x00b1f9fc
                                      0x00b1fa00
                                      0x00b1fa06
                                      0x00b1fa07
                                      0x00b1fa17

                                      APIs
                                      • SafeArrayGetLBound.OLEAUT32(?,00000001,?), ref: 00B1F94B
                                      • SafeArrayGetUBound.OLEAUT32(?,00000001,?), ref: 00B1F967
                                      • SafeArrayPtrOfIndex.OLEAUT32(?,?,?), ref: 00B1F9DE
                                      • VariantClear.OLEAUT32(?), ref: 00B1FA07
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.289505180.0000000000B11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B10000, based on PE: true
                                      • Associated: 00000000.00000002.289475761.0000000000B10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.289928975.0000000000BDC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.289986188.0000000000BE3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_b10000_loaddll32.jbxd
                                      Similarity
                                      • API ID: ArraySafe$Bound$ClearIndexVariant
                                      • String ID:
                                      • API String ID: 920484758-0
                                      • Opcode ID: 606e87adaf89f2c46ebcbd9362d1b5640fbca68e444a53fe52eb81bedf211c8f
                                      • Instruction ID: e53b3d0d18bb20accfbef42682a9107942443aa2fca5d54a04affd01dda85621
                                      • Opcode Fuzzy Hash: 606e87adaf89f2c46ebcbd9362d1b5640fbca68e444a53fe52eb81bedf211c8f
                                      • Instruction Fuzzy Hash: BE41F879A0061A9FCB62EB58C890BD9B3FDEF59310F4041E5E549A7212DA34AFC0CF54
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      C-Code - Quality: 100%
                                      			E00B1BF74(intOrPtr* __eax, intOrPtr __ecx, void* __edx, void* __fp0, intOrPtr _a4) {
                                      				intOrPtr _v8;
                                      				intOrPtr _v12;
                                      				char _v273;
                                      				char _v534;
                                      				char _v790;
                                      				struct _MEMORY_BASIC_INFORMATION _v820;
                                      				char _v824;
                                      				intOrPtr _v828;
                                      				char _v832;
                                      				intOrPtr _v836;
                                      				char _v840;
                                      				intOrPtr _v844;
                                      				char _v848;
                                      				char* _v852;
                                      				char _v856;
                                      				char _v860;
                                      				char _v1116;
                                      				void* __edi;
                                      				struct HINSTANCE__* _t40;
                                      				intOrPtr _t51;
                                      				struct HINSTANCE__* _t53;
                                      				void* _t69;
                                      				void* _t73;
                                      				intOrPtr _t74;
                                      				intOrPtr _t83;
                                      				intOrPtr _t86;
                                      				intOrPtr* _t87;
                                      				void* _t93;
                                      
                                      				_t93 = __fp0;
                                      				_v8 = __ecx;
                                      				_t73 = __edx;
                                      				_t87 = __eax;
                                      				VirtualQuery(__edx,  &_v820, 0x1c);
                                      				if(_v820.State != 0x1000 || GetModuleFileNameA(_v820.AllocationBase,  &_v534, 0x105) == 0) {
                                      					_t40 =  *0xbdf668; // 0xb10000
                                      					GetModuleFileNameA(_t40,  &_v534, 0x105);
                                      					_v12 = E00B1BF68(_t73);
                                      				} else {
                                      					_v12 = _t73 - _v820.AllocationBase;
                                      				}
                                      				E00B191EC( &_v273, 0x104, E00B1CFBC(0x5c) + 1);
                                      				_t74 = 0xb1c0f4;
                                      				_t86 = 0xb1c0f4;
                                      				_t83 =  *0xb17b08; // 0xb17b54
                                      				if(E00B13514(_t87, _t83) != 0) {
                                      					_t74 = E00B146E8( *((intOrPtr*)(_t87 + 4)));
                                      					_t69 = E00B19188(_t74, 0xb1c0f4);
                                      					if(_t69 != 0 &&  *((char*)(_t74 + _t69 - 1)) != 0x2e) {
                                      						_t86 = 0xb1c0f8;
                                      					}
                                      				}
                                      				_t51 =  *0xbde5f4; // 0xb17898
                                      				_t16 = _t51 + 4; // 0xffec
                                      				_t53 =  *0xbdf668; // 0xb10000
                                      				LoadStringA(E00B15A00(_t53),  *_t16,  &_v790, 0x100);
                                      				E00B132D0( *_t87,  &_v1116);
                                      				_v860 =  &_v1116;
                                      				_v856 = 4;
                                      				_v852 =  &_v273;
                                      				_v848 = 6;
                                      				_v844 = _v12;
                                      				_v840 = 5;
                                      				_v836 = _t74;
                                      				_v832 = 6;
                                      				_v828 = _t86;
                                      				_v824 = 6;
                                      				E00B19810(_v8,  &_v790, _a4, _t93, 4,  &_v860);
                                      				return E00B19188(_v8, _t86);
                                      			}































                                      0x00b1bf74
                                      0x00b1bf80
                                      0x00b1bf83
                                      0x00b1bf85
                                      0x00b1bf91
                                      0x00b1bfa0
                                      0x00b1bfca
                                      0x00b1bfd0
                                      0x00b1bfdc
                                      0x00b1bfe1
                                      0x00b1bfe7
                                      0x00b1bfe7
                                      0x00b1c005
                                      0x00b1c00a
                                      0x00b1c00f
                                      0x00b1c016
                                      0x00b1c023
                                      0x00b1c02d
                                      0x00b1c031
                                      0x00b1c038
                                      0x00b1c041
                                      0x00b1c041
                                      0x00b1c038
                                      0x00b1c052
                                      0x00b1c057
                                      0x00b1c05b
                                      0x00b1c066
                                      0x00b1c073
                                      0x00b1c07e
                                      0x00b1c084
                                      0x00b1c091
                                      0x00b1c097
                                      0x00b1c0a1
                                      0x00b1c0a7
                                      0x00b1c0ae
                                      0x00b1c0b4
                                      0x00b1c0bb
                                      0x00b1c0c1
                                      0x00b1c0dd
                                      0x00b1c0f0

                                      APIs
                                      • VirtualQuery.KERNEL32(?,?,0000001C), ref: 00B1BF91
                                      • GetModuleFileNameA.KERNEL32(?,?,00000105), ref: 00B1BFB5
                                      • GetModuleFileNameA.KERNEL32(00B10000,?,00000105), ref: 00B1BFD0
                                      • LoadStringA.USER32 ref: 00B1C066
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.289505180.0000000000B11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B10000, based on PE: true
                                      • Associated: 00000000.00000002.289475761.0000000000B10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.289928975.0000000000BDC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.289986188.0000000000BE3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_b10000_loaddll32.jbxd
                                      Similarity
                                      • API ID: FileModuleName$LoadQueryStringVirtual
                                      • String ID:
                                      • API String ID: 3990497365-0
                                      • Opcode ID: c0cd6cbba6104a3fed3351d422030cfea8e3cef2be14642983e749a86b610e9e
                                      • Instruction ID: 41ed6d16c192449b1b9eca297c9e03610648eb5c74e409e912111374dacf2cbf
                                      • Opcode Fuzzy Hash: c0cd6cbba6104a3fed3351d422030cfea8e3cef2be14642983e749a86b610e9e
                                      • Instruction Fuzzy Hash: 96411D71A402589BDB21DB68CC85BDAB7FDAB18300F8440E5A948E7252EB759FC8CF50
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      C-Code - Quality: 100%
                                      			E00B1D110() {
                                      				char _v152;
                                      				short _v410;
                                      				signed short _t14;
                                      				signed int _t16;
                                      				int _t18;
                                      				void* _t20;
                                      				void* _t23;
                                      				int _t24;
                                      				int _t26;
                                      				signed int _t30;
                                      				signed int _t31;
                                      				signed int _t32;
                                      				signed int _t37;
                                      				int* _t39;
                                      				short* _t41;
                                      				void* _t49;
                                      
                                      				 *0xbdf744 = 0x409;
                                      				 *0xbdf748 = 9;
                                      				 *0xbdf74c = 1;
                                      				_t14 = GetThreadLocale();
                                      				if(_t14 != 0) {
                                      					 *0xbdf744 = _t14;
                                      				}
                                      				if(_t14 != 0) {
                                      					 *0xbdf748 = _t14 & 0x3ff;
                                      					 *0xbdf74c = (_t14 & 0x0000ffff) >> 0xa;
                                      				}
                                      				memcpy(0xbdc11c, 0xb1d264, 8 << 2);
                                      				if( *0xbdc0d4 != 2) {
                                      					_t16 = GetSystemMetrics(0x4a);
                                      					__eflags = _t16;
                                      					 *0xbdf751 = _t16 & 0xffffff00 | _t16 != 0x00000000;
                                      					_t18 = GetSystemMetrics(0x2a);
                                      					__eflags = _t18;
                                      					_t31 = _t30 & 0xffffff00 | _t18 != 0x00000000;
                                      					 *0xbdf750 = _t31;
                                      					__eflags = _t31;
                                      					if(__eflags != 0) {
                                      						return E00B1D098(__eflags, _t49);
                                      					}
                                      				} else {
                                      					_t20 = E00B1D0F8();
                                      					if(_t20 != 0) {
                                      						 *0xbdf751 = 0;
                                      						 *0xbdf750 = 0;
                                      						return _t20;
                                      					}
                                      					E00B1D098(__eflags, _t49);
                                      					_t37 = 0x20;
                                      					_t23 = E00B12EB8(0xbdc11c, 0x20, 0xb1d264);
                                      					_t32 = _t30 & 0xffffff00 | __eflags != 0x00000000;
                                      					 *0xbdf750 = _t32;
                                      					__eflags = _t32;
                                      					if(_t32 != 0) {
                                      						 *0xbdf751 = 0;
                                      						return _t23;
                                      					}
                                      					_t24 = 0x80;
                                      					_t39 =  &_v152;
                                      					do {
                                      						 *_t39 = _t24;
                                      						_t24 = _t24 + 1;
                                      						_t39 =  &(_t39[0]);
                                      						__eflags = _t24 - 0x100;
                                      					} while (_t24 != 0x100);
                                      					_t26 =  *0xbdf744; // 0x409
                                      					GetStringTypeA(_t26, 2,  &_v152, 0x80,  &_v410);
                                      					_t18 = 0x80;
                                      					_t41 =  &_v410;
                                      					while(1) {
                                      						__eflags =  *_t41 - 2;
                                      						_t37 = _t37 & 0xffffff00 |  *_t41 == 0x00000002;
                                      						 *0xbdf751 = _t37;
                                      						__eflags = _t37;
                                      						if(_t37 != 0) {
                                      							goto L17;
                                      						}
                                      						_t41 = _t41 + 2;
                                      						_t18 = _t18 - 1;
                                      						__eflags = _t18;
                                      						if(_t18 != 0) {
                                      							continue;
                                      						} else {
                                      							return _t18;
                                      						}
                                      						L18:
                                      					}
                                      				}
                                      				L17:
                                      				return _t18;
                                      				goto L18;
                                      			}



















                                      0x00b1d11c
                                      0x00b1d126
                                      0x00b1d130
                                      0x00b1d13a
                                      0x00b1d141
                                      0x00b1d143
                                      0x00b1d143
                                      0x00b1d14b
                                      0x00b1d157
                                      0x00b1d163
                                      0x00b1d163
                                      0x00b1d177
                                      0x00b1d180
                                      0x00b1d22f
                                      0x00b1d234
                                      0x00b1d239
                                      0x00b1d240
                                      0x00b1d245
                                      0x00b1d247
                                      0x00b1d24a
                                      0x00b1d250
                                      0x00b1d252
                                      0x00000000
                                      0x00b1d25a
                                      0x00b1d186
                                      0x00b1d186
                                      0x00b1d18d
                                      0x00b1d18f
                                      0x00b1d196
                                      0x00000000
                                      0x00b1d196
                                      0x00b1d1a3
                                      0x00b1d1b3
                                      0x00b1d1b5
                                      0x00b1d1ba
                                      0x00b1d1bd
                                      0x00b1d1c3
                                      0x00b1d1c5
                                      0x00b1d1c7
                                      0x00000000
                                      0x00b1d1c7
                                      0x00b1d1d3
                                      0x00b1d1d8
                                      0x00b1d1de
                                      0x00b1d1de
                                      0x00b1d1e0
                                      0x00b1d1e1
                                      0x00b1d1e2
                                      0x00b1d1e2
                                      0x00b1d1fe
                                      0x00b1d204
                                      0x00b1d209
                                      0x00b1d20e
                                      0x00b1d214
                                      0x00b1d214
                                      0x00b1d218
                                      0x00b1d21b
                                      0x00b1d221
                                      0x00b1d223
                                      0x00000000
                                      0x00000000
                                      0x00b1d225
                                      0x00b1d228
                                      0x00b1d228
                                      0x00b1d229
                                      0x00000000
                                      0x00000000
                                      0x00000000
                                      0x00000000
                                      0x00000000
                                      0x00b1d229
                                      0x00b1d214
                                      0x00b1d261
                                      0x00b1d261
                                      0x00000000

                                      APIs
                                      • GetStringTypeA.KERNEL32(00000409,00000002,?,00000080,?), ref: 00B1D204
                                      • GetThreadLocale.KERNEL32 ref: 00B1D13A
                                        • Part of subcall function 00B1D098: GetCPInfo.KERNEL32(00000000,?), ref: 00B1D0B1
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.289505180.0000000000B11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B10000, based on PE: true
                                      • Associated: 00000000.00000002.289475761.0000000000B10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.289928975.0000000000BDC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.289986188.0000000000BE3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_b10000_loaddll32.jbxd
                                      Similarity
                                      • API ID: InfoLocaleStringThreadType
                                      • String ID:
                                      • API String ID: 1505017576-0
                                      • Opcode ID: 0858b9105df833b5f207058f459ddb2acfd9387a64b0d1b3878bf9b81daa0aa6
                                      • Instruction ID: 592d29ae158c78ca4568c510cc5244c7987471770f546765d9eac99e734186ad
                                      • Opcode Fuzzy Hash: 0858b9105df833b5f207058f459ddb2acfd9387a64b0d1b3878bf9b81daa0aa6
                                      • Instruction Fuzzy Hash: E2310521A4A3879AD710DB24EC217E57BD4EB42300F9840E6E9899B392EF748DC5C761
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      C-Code - Quality: 64%
                                      			E00B36BFC(intOrPtr __eax, void* __edx) {
                                      				intOrPtr _v8;
                                      				void* __ebx;
                                      				void* __ecx;
                                      				void* __esi;
                                      				void* __ebp;
                                      				intOrPtr _t33;
                                      				struct HDC__* _t47;
                                      				intOrPtr _t54;
                                      				intOrPtr _t58;
                                      				struct HDC__* _t66;
                                      				void* _t67;
                                      				intOrPtr _t76;
                                      				void* _t81;
                                      				intOrPtr _t82;
                                      				intOrPtr _t84;
                                      				intOrPtr _t86;
                                      
                                      				_t84 = _t86;
                                      				_push(_t67);
                                      				_v8 = __eax;
                                      				_t33 = _v8;
                                      				if( *((intOrPtr*)(_t33 + 0x58)) == 0) {
                                      					return _t33;
                                      				} else {
                                      					E00B34E24(_v8);
                                      					_push(_t84);
                                      					_push(0xb36cdb);
                                      					_push( *[fs:eax]);
                                      					 *[fs:eax] = _t86;
                                      					E00B37F18( *((intOrPtr*)(_v8 + 0x58)));
                                      					E00B36A78( *( *((intOrPtr*)( *((intOrPtr*)(_v8 + 0x58)) + 0x28)) + 8));
                                      					_t47 = E00B38018( *((intOrPtr*)(_v8 + 0x58)));
                                      					_push(0);
                                      					L00B16E94();
                                      					_t66 = _t47;
                                      					_t81 =  *( *((intOrPtr*)( *((intOrPtr*)(_v8 + 0x58)) + 0x28)) + 8);
                                      					if(_t81 == 0) {
                                      						 *((intOrPtr*)(_v8 + 0x5c)) = 0;
                                      					} else {
                                      						 *((intOrPtr*)(_v8 + 0x5c)) = SelectObject(_t66, _t81);
                                      					}
                                      					_t54 =  *((intOrPtr*)( *((intOrPtr*)(_v8 + 0x58)) + 0x28));
                                      					_t82 =  *((intOrPtr*)(_t54 + 0x10));
                                      					if(_t82 == 0) {
                                      						 *((intOrPtr*)(_v8 + 0x60)) = 0;
                                      					} else {
                                      						_push(0xffffffff);
                                      						_push(_t82);
                                      						_push(_t66);
                                      						L00B16FC4();
                                      						 *((intOrPtr*)(_v8 + 0x60)) = _t54;
                                      						_push(_t66);
                                      						L00B16F9C();
                                      					}
                                      					E00B35118(_v8, _t66);
                                      					_t58 =  *0xbdc8fc; // 0x2650acc
                                      					E00B2B96C(_t58, _t66, _t67, _v8, _t82);
                                      					_pop(_t76);
                                      					 *[fs:eax] = _t76;
                                      					_push(0xb36ce2);
                                      					return E00B34F90(_v8);
                                      				}
                                      			}



















                                      0x00b36bfd
                                      0x00b36bff
                                      0x00b36c02
                                      0x00b36c05
                                      0x00b36c0c
                                      0x00b36ce6
                                      0x00b36c12
                                      0x00b36c15
                                      0x00b36c1c
                                      0x00b36c1d
                                      0x00b36c22
                                      0x00b36c25
                                      0x00b36c2e
                                      0x00b36c3f
                                      0x00b36c4a
                                      0x00b36c4f
                                      0x00b36c51
                                      0x00b36c56
                                      0x00b36c61
                                      0x00b36c66
                                      0x00b36c7c
                                      0x00b36c68
                                      0x00b36c72
                                      0x00b36c72
                                      0x00b36c85
                                      0x00b36c88
                                      0x00b36c8d
                                      0x00b36cab
                                      0x00b36c8f
                                      0x00b36c8f
                                      0x00b36c91
                                      0x00b36c92
                                      0x00b36c93
                                      0x00b36c9b
                                      0x00b36c9e
                                      0x00b36c9f
                                      0x00b36c9f
                                      0x00b36cb3
                                      0x00b36cbb
                                      0x00b36cc0
                                      0x00b36cc7
                                      0x00b36cca
                                      0x00b36ccd
                                      0x00b36cda
                                      0x00b36cda

                                      APIs
                                        • Part of subcall function 00B34E24: RtlEnterCriticalSection.KERNEL32(00BDF8C8,00000000,00B338D2,00000000,00B33931), ref: 00B34E2C
                                        • Part of subcall function 00B34E24: RtlLeaveCriticalSection.KERNEL32(00BDF8C8,00BDF8C8,00000000,00B338D2,00000000,00B33931), ref: 00B34E39
                                        • Part of subcall function 00B34E24: RtlEnterCriticalSection.KERNEL32(00000038,00BDF8C8,00BDF8C8,00000000,00B338D2,00000000,00B33931), ref: 00B34E42
                                        • Part of subcall function 00B38018: 73BEAC50.USER32(00000000,?,?,?,?,00B36C4F,00000000,00B36CDB), ref: 00B3806E
                                        • Part of subcall function 00B38018: 73BEAD70.GDI32(00000000,0000000C,00000000,?,?,?,?,00B36C4F,00000000,00B36CDB), ref: 00B38083
                                        • Part of subcall function 00B38018: 73BEAD70.GDI32(00000000,0000000E,00000000,0000000C,00000000,?,?,?,?,00B36C4F,00000000,00B36CDB), ref: 00B3808D
                                        • Part of subcall function 00B38018: CreateHalftonePalette.GDI32(00000000,00000000,?,?,?,?,00B36C4F,00000000,00B36CDB), ref: 00B380B1
                                        • Part of subcall function 00B38018: 73BEB380.USER32(00000000,00000000,00000000,?,?,?,?,00B36C4F,00000000,00B36CDB), ref: 00B380BC
                                      • 73BEA590.GDI32(00000000,00000000,00B36CDB), ref: 00B36C51
                                      • SelectObject.GDI32(00000000,?), ref: 00B36C6A
                                      • 73BEB410.GDI32(00000000,?,000000FF,00000000,00000000,00B36CDB), ref: 00B36C93
                                      • 73BEB150.GDI32(00000000,00000000,?,000000FF,00000000,00000000,00B36CDB), ref: 00B36C9F
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.289505180.0000000000B11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B10000, based on PE: true
                                      • Associated: 00000000.00000002.289475761.0000000000B10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.289928975.0000000000BDC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.289986188.0000000000BE3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_b10000_loaddll32.jbxd
                                      Similarity
                                      • API ID: CriticalSection$Enter$A590B150B380B410CreateHalftoneLeaveObjectPaletteSelect
                                      • String ID:
                                      • API String ID: 2198039625-0
                                      • Opcode ID: a4b5f9a3a7527c438a1fc02a4263e034972bed5b6e1750d6934d39e6617801f2
                                      • Instruction ID: 3f93db7820f56d393aa50a9be1e3d35193863ad650c2773c008954cb74153b1a
                                      • Opcode Fuzzy Hash: a4b5f9a3a7527c438a1fc02a4263e034972bed5b6e1750d6934d39e6617801f2
                                      • Instruction Fuzzy Hash: 8931D274A00614EFC714EB69D981D5DB3F5FF48320BA281E0B804AB362D730EE80EB50
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      C-Code - Quality: 93%
                                      			E00B32350(intOrPtr _a4, short _a6, intOrPtr _a8) {
                                      				struct _WNDCLASSA _v44;
                                      				struct HINSTANCE__* _t6;
                                      				CHAR* _t8;
                                      				struct HINSTANCE__* _t9;
                                      				int _t10;
                                      				void* _t11;
                                      				struct HINSTANCE__* _t13;
                                      				struct HINSTANCE__* _t19;
                                      				CHAR* _t20;
                                      				struct HWND__* _t22;
                                      				CHAR* _t24;
                                      
                                      				_t6 =  *0xbdf668; // 0xb10000
                                      				 *0xbdc62c = _t6;
                                      				_t8 =  *0xbdc640; // 0xb32340
                                      				_t9 =  *0xbdf668; // 0xb10000
                                      				_t10 = GetClassInfoA(_t9, _t8,  &_v44);
                                      				asm("sbb eax, eax");
                                      				_t11 = _t10 + 1;
                                      				if(_t11 == 0 || L00B170B4 != _v44.lpfnWndProc) {
                                      					if(_t11 != 0) {
                                      						_t19 =  *0xbdf668; // 0xb10000
                                      						_t20 =  *0xbdc640; // 0xb32340
                                      						UnregisterClassA(_t20, _t19);
                                      					}
                                      					RegisterClassA(0xbdc61c);
                                      				}
                                      				_t13 =  *0xbdf668; // 0xb10000
                                      				_t24 =  *0xbdc640; // 0xb32340
                                      				_t22 = E00B175D8(0x80, _t24, 0, _t13, 0, 0, 0, 0, 0, 0, 0x80000000);
                                      				if(_a6 != 0) {
                                      					SetWindowLongA(_t22, 0xfffffffc, E00B32294(_a4, _a8));
                                      				}
                                      				return _t22;
                                      			}














                                      0x00b32357
                                      0x00b3235c
                                      0x00b32365
                                      0x00b3236b
                                      0x00b32371
                                      0x00b32379
                                      0x00b3237b
                                      0x00b3237e
                                      0x00b3238c
                                      0x00b3238e
                                      0x00b32394
                                      0x00b3239a
                                      0x00b3239a
                                      0x00b323a4
                                      0x00b323a4
                                      0x00b323ba
                                      0x00b323c7
                                      0x00b323d7
                                      0x00b323de
                                      0x00b323ef
                                      0x00b323ef
                                      0x00b323fa

                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.289505180.0000000000B11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B10000, based on PE: true
                                      • Associated: 00000000.00000002.289475761.0000000000B10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.289928975.0000000000BDC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.289986188.0000000000BE3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_b10000_loaddll32.jbxd
                                      Similarity
                                      • API ID: Class$InfoLongRegisterUnregisterWindow
                                      • String ID:
                                      • API String ID: 4025006896-0
                                      • Opcode ID: 40012338ec434bded6de2070fb0cbb168be0bbd769ed75310c82aa5705d32ae5
                                      • Instruction ID: 625fc731596c30f4a7e38cfe82c5991c1c00b683e3984605e374924c543f84bb
                                      • Opcode Fuzzy Hash: 40012338ec434bded6de2070fb0cbb168be0bbd769ed75310c82aa5705d32ae5
                                      • Instruction Fuzzy Hash: CD0184712492066BCB10EFA8DC51FAAB7EDEB09310F2081A1FA04D72A1EE35D980C764
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      C-Code - Quality: 80%
                                      			E00B34254(void* __eax, void* __ebx, void* __ecx) {
                                      				signed int _v8;
                                      				struct tagLOGFONTA _v68;
                                      				char _v72;
                                      				char _v76;
                                      				char _v80;
                                      				intOrPtr _t76;
                                      				intOrPtr _t81;
                                      				void* _t100;
                                      				void* _t107;
                                      				void* _t116;
                                      				intOrPtr _t126;
                                      				void* _t137;
                                      				void* _t138;
                                      				intOrPtr _t139;
                                      
                                      				_t137 = _t138;
                                      				_t139 = _t138 + 0xffffffb4;
                                      				_v80 = 0;
                                      				_v76 = 0;
                                      				_v72 = 0;
                                      				_t116 = __eax;
                                      				_push(_t137);
                                      				_push(0xb343dd);
                                      				_push( *[fs:eax]);
                                      				 *[fs:eax] = _t139;
                                      				_v8 =  *((intOrPtr*)(__eax + 0x10));
                                      				if( *((intOrPtr*)(_v8 + 8)) != 0) {
                                      					__eflags = 0;
                                      					 *[fs:eax] = 0;
                                      					_push(0xb343e4);
                                      					return E00B1424C( &_v80, 3);
                                      				} else {
                                      					_t76 =  *0xbdf8e0; // 0x2650a30
                                      					E00B33598(_t76);
                                      					_push(_t137);
                                      					_push(0xb343b5);
                                      					_push( *[fs:eax]);
                                      					 *[fs:eax] = _t139;
                                      					if( *((intOrPtr*)(_v8 + 8)) == 0) {
                                      						_v68.lfHeight =  *(_v8 + 0x14);
                                      						_v68.lfWidth = 0;
                                      						_v68.lfEscapement = 0;
                                      						_v68.lfOrientation = 0;
                                      						if(( *(_v8 + 0x19) & 0x00000001) == 0) {
                                      							_v68.lfWeight = 0x190;
                                      						} else {
                                      							_v68.lfWeight = 0x2bc;
                                      						}
                                      						_v68.lfItalic = _v8 & 0xffffff00 | ( *(_v8 + 0x19) & 0x00000002) != 0x00000000;
                                      						_v68.lfUnderline = _v8 & 0xffffff00 | ( *(_v8 + 0x19) & 0x00000004) != 0x00000000;
                                      						_v68.lfStrikeOut = _v8 & 0xffffff00 | ( *(_v8 + 0x19) & 0x00000008) != 0x00000000;
                                      						_v68.lfCharSet =  *((intOrPtr*)(_v8 + 0x1a));
                                      						E00B1448C( &_v72, _v8 + 0x1b,  *(_v8 + 0x19) & 0x00000008);
                                      						_t100 = E00B18930(_v72, "Default");
                                      						_t146 = _t100;
                                      						if(_t100 != 0) {
                                      							__eflags = _v8 + 0x1b;
                                      							E00B1448C( &_v80, _v8 + 0x1b, _v8 + 0x1b);
                                      							E00B19220( &(_v68.lfFaceName), _v80);
                                      						} else {
                                      							E00B1448C( &_v76, "\rMS Sans Serif", _t146);
                                      							E00B19220( &(_v68.lfFaceName), _v76);
                                      						}
                                      						_v68.lfQuality = 0;
                                      						_v68.lfOutPrecision = 0;
                                      						_v68.lfClipPrecision = 0;
                                      						_t107 = E00B34538(_t116) - 1;
                                      						if(_t107 == 0) {
                                      							_v68.lfPitchAndFamily = 2;
                                      						} else {
                                      							if(_t107 == 1) {
                                      								_v68.lfPitchAndFamily = 1;
                                      							} else {
                                      								_v68.lfPitchAndFamily = 0;
                                      							}
                                      						}
                                      						 *((intOrPtr*)(_v8 + 8)) = CreateFontIndirectA( &_v68);
                                      					}
                                      					_pop(_t126);
                                      					 *[fs:eax] = _t126;
                                      					_push(0xb343bc);
                                      					_t81 =  *0xbdf8e0; // 0x2650a30
                                      					return E00B335A4(_t81);
                                      				}
                                      			}

















                                      0x00b34255
                                      0x00b34257
                                      0x00b3425d
                                      0x00b34260
                                      0x00b34263
                                      0x00b34266
                                      0x00b3426a
                                      0x00b3426b
                                      0x00b34270
                                      0x00b34273
                                      0x00b34279
                                      0x00b34283
                                      0x00b343c2
                                      0x00b343c7
                                      0x00b343ca
                                      0x00b343dc
                                      0x00b34289
                                      0x00b34289
                                      0x00b3428e
                                      0x00b34295
                                      0x00b34296
                                      0x00b3429b
                                      0x00b3429e
                                      0x00b342a8
                                      0x00b342b4
                                      0x00b342b9
                                      0x00b342be
                                      0x00b342c3
                                      0x00b342cd
                                      0x00b342d8
                                      0x00b342cf
                                      0x00b342cf
                                      0x00b342cf
                                      0x00b342e9
                                      0x00b342f6
                                      0x00b34303
                                      0x00b3430c
                                      0x00b34318
                                      0x00b34325
                                      0x00b3432a
                                      0x00b3432c
                                      0x00b3434e
                                      0x00b34351
                                      0x00b3435c
                                      0x00b3432e
                                      0x00b34336
                                      0x00b34341
                                      0x00b34341
                                      0x00b34361
                                      0x00b34365
                                      0x00b34369
                                      0x00b34374
                                      0x00b34376
                                      0x00b3437e
                                      0x00b34378
                                      0x00b3437a
                                      0x00b34384
                                      0x00b3437c
                                      0x00b3438a
                                      0x00b3438a
                                      0x00b3437a
                                      0x00b3439a
                                      0x00b3439a
                                      0x00b3439f
                                      0x00b343a2
                                      0x00b343a5
                                      0x00b343aa
                                      0x00b343b4
                                      0x00b343b4

                                      APIs
                                        • Part of subcall function 00B33598: RtlEnterCriticalSection.KERNEL32(?,00B335D5), ref: 00B3359C
                                      • CreateFontIndirectA.GDI32(?), ref: 00B34392
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.289505180.0000000000B11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B10000, based on PE: true
                                      • Associated: 00000000.00000002.289475761.0000000000B10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.289928975.0000000000BDC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.289986188.0000000000BE3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_b10000_loaddll32.jbxd
                                      Similarity
                                      • API ID: CreateCriticalEnterFontIndirectSection
                                      • String ID: MS Sans Serif$Default
                                      • API String ID: 2931345757-2137701257
                                      • Opcode ID: 49856868d251a3605e0addaf84dc18da418b246c74ce66f4c4288eddd937ad3f
                                      • Instruction ID: f3c6569d67d626ddac30a5418044517b012fd844314861d1837f53dcce7402b6
                                      • Opcode Fuzzy Hash: 49856868d251a3605e0addaf84dc18da418b246c74ce66f4c4288eddd937ad3f
                                      • Instruction Fuzzy Hash: 74513731A08288DFDB01DFA8C481BDDBBF6EF48304F6540A9E800A7352D774AE45DB69
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      C-Code - Quality: 72%
                                      			E00B1A790(void* __eax, void* __ebx, intOrPtr* __edx, void* __esi, intOrPtr _a4) {
                                      				char _v8;
                                      				short _v18;
                                      				short _v22;
                                      				struct _SYSTEMTIME _v24;
                                      				char _v280;
                                      				char* _t32;
                                      				intOrPtr* _t49;
                                      				intOrPtr _t58;
                                      				void* _t63;
                                      				void* _t67;
                                      
                                      				_v8 = 0;
                                      				_t49 = __edx;
                                      				_t63 = __eax;
                                      				_push(_t67);
                                      				_push(0xb1a86e);
                                      				_push( *[fs:eax]);
                                      				 *[fs:eax] = _t67 + 0xfffffeec;
                                      				E00B14228(__edx);
                                      				_v24 =  *((intOrPtr*)(_a4 - 0xe));
                                      				_v22 =  *((intOrPtr*)(_a4 - 0x10));
                                      				_v18 =  *((intOrPtr*)(_a4 - 0x12));
                                      				if(_t63 > 2) {
                                      					E00B142C0( &_v8, 0xb1a890);
                                      				} else {
                                      					E00B142C0( &_v8, 0xb1a884);
                                      				}
                                      				_t32 = E00B146E8(_v8);
                                      				if(GetDateFormatA(GetThreadLocale(), 4,  &_v24, _t32,  &_v280, 0x100) != 0) {
                                      					E00B14498(_t49, 0x100,  &_v280);
                                      					if(_t63 == 1 &&  *((char*)( *_t49)) == 0x30) {
                                      						E00B14748( *_t49, E00B144E8( *_t49) - 1, 2, _t49);
                                      					}
                                      				}
                                      				_pop(_t58);
                                      				 *[fs:eax] = _t58;
                                      				_push(0xb1a875);
                                      				return E00B14228( &_v8);
                                      			}













                                      0x00b1a79d
                                      0x00b1a7a0
                                      0x00b1a7a2
                                      0x00b1a7a6
                                      0x00b1a7a7
                                      0x00b1a7ac
                                      0x00b1a7af
                                      0x00b1a7b4
                                      0x00b1a7c0
                                      0x00b1a7cb
                                      0x00b1a7d6
                                      0x00b1a7dd
                                      0x00b1a7f6
                                      0x00b1a7df
                                      0x00b1a7e7
                                      0x00b1a7e7
                                      0x00b1a80a
                                      0x00b1a823
                                      0x00b1a832
                                      0x00b1a838
                                      0x00b1a853
                                      0x00b1a853
                                      0x00b1a838
                                      0x00b1a85a
                                      0x00b1a85d
                                      0x00b1a860
                                      0x00b1a86d

                                      APIs
                                      • GetThreadLocale.KERNEL32(00000004,?,00000000,?,00000100,00000000,00B1A86E), ref: 00B1A816
                                      • GetDateFormatA.KERNEL32(00000000,00000004,?,00000000,?,00000100,00000000,00B1A86E), ref: 00B1A81C
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.289505180.0000000000B11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B10000, based on PE: true
                                      • Associated: 00000000.00000002.289475761.0000000000B10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.289928975.0000000000BDC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.289986188.0000000000BE3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_b10000_loaddll32.jbxd
                                      Similarity
                                      • API ID: DateFormatLocaleThread
                                      • String ID: yyyy
                                      • API String ID: 3303714858-3145165042
                                      • Opcode ID: 20c42f4b317cc63cec1b686ac8d29ce45f330427d09aec0b1614eab81543516f
                                      • Instruction ID: 0f27ff042e7bc40a82380ae01aa7bfa75b9c21ed9f1b563112e80824dca6287b
                                      • Opcode Fuzzy Hash: 20c42f4b317cc63cec1b686ac8d29ce45f330427d09aec0b1614eab81543516f
                                      • Instruction Fuzzy Hash: F1216278611108ABDB01EB98C842AEE73F8EF09300FD100E5F904E7351D770AE81C766
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      C-Code - Quality: 44%
                                      			E00B3E278(char __edx, void* __edi, void* __esi, void* __fp0) {
                                      				char _v5;
                                      				void* __ebx;
                                      				void* __ecx;
                                      				void* __ebp;
                                      				void* _t15;
                                      				signed int _t24;
                                      				signed int _t25;
                                      				signed int _t28;
                                      				void* _t31;
                                      				void* _t34;
                                      				void* _t35;
                                      				char _t36;
                                      				signed int _t40;
                                      				void* _t42;
                                      				void* _t43;
                                      				void* _t44;
                                      				void* _t45;
                                      				void* _t50;
                                      
                                      				_t50 = __fp0;
                                      				_t43 = __esi;
                                      				_t42 = __edi;
                                      				_t36 = __edx;
                                      				if(__edx != 0) {
                                      					_t45 = _t45 + 0xfffffff0;
                                      					_t15 = E00B13694(_t15, _t44);
                                      				}
                                      				_v5 = _t36;
                                      				_t34 = _t15;
                                      				E00B5CCEC(_t34, _t35, 0, _t42, _t43, _t50);
                                      				E00B5A030(_t34, GetSystemMetrics(2));
                                      				E00B5A054(_t34, GetSystemMetrics(0x14));
                                      				_t24 =  *(_t34 + 0x4c);
                                      				_t40 = _t24;
                                      				_t25 = _t24 >> 1;
                                      				if(0 < 0) {
                                      					asm("adc eax, 0x0");
                                      				}
                                      				E00B5A054(_t34, _t40 + _t25);
                                      				 *((char*)(_t34 + 0x208)) = 1;
                                      				 *((char*)(_t34 + 0x21f)) = 0;
                                      				 *((short*)(_t34 + 0x21c)) = 0;
                                      				 *((short*)(_t34 + 0x210)) = 0;
                                      				 *((short*)(_t34 + 0x212)) = 0x64;
                                      				 *((intOrPtr*)(_t34 + 0x214)) = 1;
                                      				 *((char*)(_t34 + 0x228)) = 1;
                                      				 *((char*)(_t34 + 0x229)) = 1;
                                      				 *((char*)(_t34 + 0x21e)) = 1;
                                      				_t28 =  *0xb3e340; // 0x80
                                      				 *(_t34 + 0x50) =  !_t28 &  *(_t34 + 0x50);
                                      				_t31 = _t34;
                                      				if(_v5 != 0) {
                                      					E00B136EC(_t31);
                                      					_pop( *[fs:0x0]);
                                      				}
                                      				return _t34;
                                      			}





















                                      0x00b3e278
                                      0x00b3e278
                                      0x00b3e278
                                      0x00b3e278
                                      0x00b3e27f
                                      0x00b3e281
                                      0x00b3e284
                                      0x00b3e284
                                      0x00b3e289
                                      0x00b3e28c
                                      0x00b3e292
                                      0x00b3e2a2
                                      0x00b3e2b2
                                      0x00b3e2b7
                                      0x00b3e2ba
                                      0x00b3e2bc
                                      0x00b3e2be
                                      0x00b3e2c0
                                      0x00b3e2c0
                                      0x00b3e2c7
                                      0x00b3e2cc
                                      0x00b3e2d3
                                      0x00b3e2da
                                      0x00b3e2e3
                                      0x00b3e2ec
                                      0x00b3e2f5
                                      0x00b3e2ff
                                      0x00b3e306
                                      0x00b3e30d
                                      0x00b3e314
                                      0x00b3e31e
                                      0x00b3e321
                                      0x00b3e327
                                      0x00b3e329
                                      0x00b3e32e
                                      0x00b3e335
                                      0x00b3e33d

                                      APIs
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.289505180.0000000000B11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B10000, based on PE: true
                                      • Associated: 00000000.00000002.289475761.0000000000B10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.289928975.0000000000BDC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.289986188.0000000000BE3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_b10000_loaddll32.jbxd
                                      Similarity
                                      • API ID: MetricsSystem
                                      • String ID: d
                                      • API String ID: 4116985748-2564639436
                                      • Opcode ID: 728cbbd2f56e114c6f9b8b56b4f7a5ab12ab8ad9ff3e2c093fbbfee888ec0bec
                                      • Instruction ID: 70ac059b04117a7bd42b2c8fab7b9addce6f162dbc0088408a53e079f9eae6e5
                                      • Opcode Fuzzy Hash: 728cbbd2f56e114c6f9b8b56b4f7a5ab12ab8ad9ff3e2c093fbbfee888ec0bec
                                      • Instruction Fuzzy Hash: DA118F216443848BEB41EF6888CA3C53AD19F15308F1841F8ED588F3CBEABBD54C8366
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      C-Code - Quality: 68%
                                      			E00B39D1C(intOrPtr _a4, intOrPtr _a8, signed int _a12) {
                                      				void* __ebx;
                                      				void* __edi;
                                      				void* __esi;
                                      				void* __ebp;
                                      				void* _t15;
                                      				void* _t16;
                                      				intOrPtr _t18;
                                      				signed int _t19;
                                      				void* _t20;
                                      				intOrPtr _t21;
                                      
                                      				_t19 = _a12;
                                      				if( *0xbdf91f != 0) {
                                      					_t16 = 0;
                                      					if((_t19 & 0x00000003) != 0) {
                                      						L7:
                                      						_t16 = 0x12340042;
                                      					} else {
                                      						_t21 = _a4;
                                      						if(_t21 >= 0 && _t21 < GetSystemMetrics(0) && _a8 >= 0 && GetSystemMetrics(1) > _a8) {
                                      							goto L7;
                                      						}
                                      					}
                                      				} else {
                                      					_t18 =  *0xbdf900; // 0xb39d1c
                                      					 *0xbdf900 = E00B39A84(3, _t15, _t18, _t19, _t20);
                                      					_t16 =  *0xbdf900(_a4, _a8, _t19);
                                      				}
                                      				return _t16;
                                      			}













                                      0x00b39d22
                                      0x00b39d2c
                                      0x00b39d56
                                      0x00b39d5f
                                      0x00b39d87
                                      0x00b39d87
                                      0x00b39d61
                                      0x00b39d61
                                      0x00b39d66
                                      0x00000000
                                      0x00000000
                                      0x00b39d66
                                      0x00b39d2e
                                      0x00b39d33
                                      0x00b39d40
                                      0x00b39d52
                                      0x00b39d52
                                      0x00b39d92

                                      APIs
                                      • GetSystemMetrics.USER32 ref: 00B39D6A
                                      • GetSystemMetrics.USER32 ref: 00B39D7C
                                        • Part of subcall function 00B39A84: GetProcAddress.KERNEL32(75BA0000,00000000), ref: 00B39B04
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.289505180.0000000000B11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B10000, based on PE: true
                                      • Associated: 00000000.00000002.289475761.0000000000B10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.289928975.0000000000BDC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.289986188.0000000000BE3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_b10000_loaddll32.jbxd
                                      Similarity
                                      • API ID: MetricsSystem$AddressProc
                                      • String ID: MonitorFromPoint
                                      • API String ID: 1792783759-1072306578
                                      • Opcode ID: 98f57fd958d6ff1a070437af6a4864d2b1d83af6b3d3578362ae44497ff4c09f
                                      • Instruction ID: d9544adecf1adb0e521b166ea16ccf52ff1c4757ba8fa286321ce49caaa191ba
                                      • Opcode Fuzzy Hash: 98f57fd958d6ff1a070437af6a4864d2b1d83af6b3d3578362ae44497ff4c09f
                                      • Instruction Fuzzy Hash: B201D63160A249EFDF005F68DC56B6ABBE5EB80354F244176F9058B122D7B1AD008BA0
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      C-Code - Quality: 68%
                                      			E00B39BF4(intOrPtr* _a4, signed int _a8) {
                                      				void* __ebx;
                                      				void* __edi;
                                      				void* __esi;
                                      				void* __ebp;
                                      				intOrPtr* _t14;
                                      				intOrPtr _t16;
                                      				signed int _t17;
                                      				void* _t18;
                                      				void* _t19;
                                      
                                      				_t17 = _a8;
                                      				_t14 = _a4;
                                      				if( *0xbdf91e != 0) {
                                      					_t19 = 0;
                                      					if((_t17 & 0x00000003) != 0 ||  *((intOrPtr*)(_t14 + 8)) > 0 &&  *((intOrPtr*)(_t14 + 0xc)) > 0 && GetSystemMetrics(0) >  *_t14 && GetSystemMetrics(1) >  *((intOrPtr*)(_t14 + 4))) {
                                      						_t19 = 0x12340042;
                                      					}
                                      				} else {
                                      					_t16 =  *0xbdf8fc; // 0xb39bf4
                                      					 *0xbdf8fc = E00B39A84(2, _t14, _t16, _t17, _t18);
                                      					_t19 =  *0xbdf8fc(_t14, _t17);
                                      				}
                                      				return _t19;
                                      			}












                                      0x00b39bfa
                                      0x00b39bfd
                                      0x00b39c07
                                      0x00b39c2c
                                      0x00b39c35
                                      0x00b39c5c
                                      0x00b39c5c
                                      0x00b39c09
                                      0x00b39c0e
                                      0x00b39c1b
                                      0x00b39c28
                                      0x00b39c28
                                      0x00b39c67

                                      APIs
                                      • GetSystemMetrics.USER32 ref: 00B39C45
                                      • GetSystemMetrics.USER32 ref: 00B39C51
                                        • Part of subcall function 00B39A84: GetProcAddress.KERNEL32(75BA0000,00000000), ref: 00B39B04
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.289505180.0000000000B11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B10000, based on PE: true
                                      • Associated: 00000000.00000002.289475761.0000000000B10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.289928975.0000000000BDC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.289986188.0000000000BE3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_b10000_loaddll32.jbxd
                                      Similarity
                                      • API ID: MetricsSystem$AddressProc
                                      • String ID: MonitorFromRect
                                      • API String ID: 1792783759-4033241945
                                      • Opcode ID: 4bc36b450f25fbc1b311352af2cc0635618cc8546727017565e9267110bc8383
                                      • Instruction ID: 54496e5b6e8dac8246c083cbfd88c2502cb9e2e96e70282346270cbebcfdf969
                                      • Opcode Fuzzy Hash: 4bc36b450f25fbc1b311352af2cc0635618cc8546727017565e9267110bc8383
                                      • Instruction Fuzzy Hash: E501D631205205EFDB109B14D9C5B66FBD9DB41351F7890E3EC45CB202C6B1DD40EBA1
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      C-Code - Quality: 100%
                                      			E00B39B6C(int _a4) {
                                      				void* __ebx;
                                      				void* __ebp;
                                      				signed int _t2;
                                      				signed int _t3;
                                      				int _t8;
                                      				void* _t12;
                                      				void* _t13;
                                      				void* _t17;
                                      				void* _t18;
                                      
                                      				_t8 = _a4;
                                      				if( *0xbdf91c == 0) {
                                      					 *0xbdf8f4 = E00B39A84(0, _t8,  *0xbdf8f4, _t17, _t18);
                                      					return GetSystemMetrics(_t8);
                                      				}
                                      				_t3 = _t2 | 0xffffffff;
                                      				_t12 = _t8 + 0xffffffb4 - 2;
                                      				__eflags = _t12;
                                      				if(__eflags < 0) {
                                      					_t3 = 0;
                                      				} else {
                                      					if(__eflags == 0) {
                                      						_t8 = 0;
                                      					} else {
                                      						_t13 = _t12 - 1;
                                      						__eflags = _t13;
                                      						if(_t13 == 0) {
                                      							_t8 = 1;
                                      						} else {
                                      							__eflags = _t13 - 0xffffffffffffffff;
                                      							if(_t13 - 0xffffffffffffffff < 0) {
                                      								_t3 = 1;
                                      							}
                                      						}
                                      					}
                                      				}
                                      				__eflags = _t3 - 0xffffffff;
                                      				if(_t3 != 0xffffffff) {
                                      					return _t3;
                                      				} else {
                                      					return GetSystemMetrics(_t8);
                                      				}
                                      			}












                                      0x00b39b70
                                      0x00b39b7a
                                      0x00b39b8e
                                      0x00000000
                                      0x00b39b94
                                      0x00b39b9c
                                      0x00b39ba4
                                      0x00b39ba4
                                      0x00b39ba7
                                      0x00b39bbb
                                      0x00b39ba9
                                      0x00b39ba9
                                      0x00b39bbf
                                      0x00b39bab
                                      0x00b39bab
                                      0x00b39bab
                                      0x00b39bac
                                      0x00b39bc3
                                      0x00b39bae
                                      0x00b39baf
                                      0x00b39bb2
                                      0x00b39bb4
                                      0x00b39bb4
                                      0x00b39bb2
                                      0x00b39bac
                                      0x00b39ba9
                                      0x00b39bc8
                                      0x00b39bcb
                                      0x00b39bd5
                                      0x00b39bcd
                                      0x00000000
                                      0x00b39bce

                                      APIs
                                      • GetSystemMetrics.USER32 ref: 00B39BCE
                                        • Part of subcall function 00B39A84: GetProcAddress.KERNEL32(75BA0000,00000000), ref: 00B39B04
                                      • GetSystemMetrics.USER32 ref: 00B39B94
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.289505180.0000000000B11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B10000, based on PE: true
                                      • Associated: 00000000.00000002.289475761.0000000000B10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.289928975.0000000000BDC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.289986188.0000000000BE3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_b10000_loaddll32.jbxd
                                      Similarity
                                      • API ID: MetricsSystem$AddressProc
                                      • String ID: GetSystemMetrics
                                      • API String ID: 1792783759-96882338
                                      • Opcode ID: c9461cddd16fdacbe6625fec9e87580cdde698e8d74589c461601afbb05689ce
                                      • Instruction ID: bd7c87371974d74bbfd302d870dd5799b6242fa7cbb4bf06f781452e6e57441f
                                      • Opcode Fuzzy Hash: c9461cddd16fdacbe6625fec9e87580cdde698e8d74589c461601afbb05689ce
                                      • Instruction Fuzzy Hash: 66F090305192029ACB105B38FDD46B2F6CAD742330FB44BE2E522871D5F9F59A449A61
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      Execution Graph

                                      Execution Coverage:3.9%
                                      Dynamic/Decrypted Code Coverage:100%
                                      Signature Coverage:0%
                                      Total number of Nodes:2000
                                      Total number of Limit Nodes:60
                                      execution_graph 16706 9eae98 16713 9ea9f8 RtlEnterCriticalSection 16706->16713 16708 9eaea8 16714 9eaa60 16708->16714 16710 9eaec2 16718 9eaab0 RtlLeaveCriticalSection 16710->16718 16712 9eaed9 16713->16708 16716 9eaa73 16714->16716 16717 9eaa92 16714->16717 16715 9eb65c 42 API calls 16715->16716 16716->16715 16716->16717 16717->16710 16718->16712 16734 9f3894 16750 9eb9f4 RtlEnterCriticalSection 16734->16750 16736 9f38e7 16756 9f3828 16736->16756 16737 9eb65c 42 API calls 16739 9f38ab 16737->16739 16739->16736 16739->16737 16751 9f4e24 RtlEnterCriticalSection RtlLeaveCriticalSection RtlEnterCriticalSection 16739->16751 16752 9f50b8 16739->16752 16741 9f3828 3 API calls 16748 9f38fb 16741->16748 16743 9f3926 16764 9eba58 RtlLeaveCriticalSection 16743->16764 16746 9eb65c 42 API calls 16746->16748 16747 9f3930 16748->16743 16748->16746 16763 9f4f90 RtlLeaveCriticalSection RtlEnterCriticalSection RtlLeaveCriticalSection 16748->16763 16750->16739 16751->16739 16753 9f510b 16752->16753 16754 9f50c3 16752->16754 16753->16739 16754->16753 16755 9f50d4 SelectObject SelectObject SelectObject 16754->16755 16755->16753 16765 9f3598 RtlEnterCriticalSection 16756->16765 16758 9f3871 16766 9f35a4 RtlLeaveCriticalSection 16758->16766 16759 9f3839 16759->16758 16762 9f3860 DeleteObject 16759->16762 16761 9f3886 16761->16741 16762->16759 16763->16748 16764->16747 16765->16759 16766->16761 16428 a03dac 16429 a03e45 16428->16429 16430 a03dca 16428->16430 16431 a03e47 16430->16431 16436 a03dd8 16430->16436 16432 a044e0 48 API calls 16431->16432 16432->16429 16433 a03e2e 16437 a044e0 16433->16437 16435 a1dcb4 42 API calls 16435->16436 16436->16433 16436->16435 16438 a044e9 16437->16438 16441 a04a20 16438->16441 16440 a044f6 16440->16429 16442 a04b12 16441->16442 16443 a04a37 16441->16443 16442->16440 16443->16442 16462 a03fc0 16443->16462 16446 a04a71 16448 a0462c 48 API calls 16446->16448 16447 a04a97 16449 a03fc0 2 API calls 16447->16449 16450 a04a83 16448->16450 16451 a04aa5 16449->16451 16452 a0462c 48 API calls 16450->16452 16453 a04aa9 16451->16453 16454 a04acf 16451->16454 16461 a04a95 16452->16461 16456 a0462c 48 API calls 16453->16456 16465 a0462c 16454->16465 16458 a04abb 16456->16458 16460 a0462c 48 API calls 16458->16460 16459 a0462c 48 API calls 16459->16461 16460->16461 16461->16440 16477 a03f40 16462->16477 16464 a03fce 16464->16446 16464->16447 16466 a04652 16465->16466 16467 a03f40 2 API calls 16466->16467 16468 a0466b 16466->16468 16467->16468 16469 a03f40 2 API calls 16468->16469 16470 a046b9 16469->16470 16496 a04524 16470->16496 16472 a046d3 16500 a043a8 16472->16500 16474 a04704 16475 a03f40 2 API calls 16474->16475 16476 a0470f 16475->16476 16476->16459 16485 a20fc0 16477->16485 16479 a03f5d GetWindowLongA 16480 a03f9a 16479->16480 16481 a03f7a 16479->16481 16483 a03ec4 GetWindowLongA 16480->16483 16487 a03ec4 16481->16487 16484 a03f86 16483->16484 16484->16464 16486 a20fca 16485->16486 16486->16479 16488 a03ed9 16487->16488 16492 a03ef2 16487->16492 16489 a03eed 16488->16489 16493 a03e90 16488->16493 16491 a03e90 GetWindowLongA 16489->16491 16489->16492 16491->16492 16492->16484 16494 a03e9f 16493->16494 16495 a03eb4 GetWindowLongA 16494->16495 16495->16489 16497 a04561 16496->16497 16498 9f3d80 GetSysColor 16497->16498 16499 a04606 16498->16499 16499->16472 16501 a043be 16500->16501 16506 a043b6 16500->16506 16502 a043fd 16501->16502 16503 a043ed 16501->16503 16501->16506 16505 a20b78 45 API calls 16502->16505 16507 a20b78 16503->16507 16505->16506 16506->16474 16508 a20b92 IsWindowVisible 16507->16508 16509 a20b9c 16507->16509 16508->16509 16510 a20bc7 16509->16510 16511 a20bad ScrollWindow 16509->16511 16512 a20c41 16510->16512 16514 a20c13 SetWindowPos 16510->16514 16515 a1dcb4 16510->16515 16511->16510 16512->16506 16514->16510 16516 a1dcc6 16515->16516 16517 a1dcd1 16516->16517 16518 a1dcdc 16516->16518 16519 9eb65c 42 API calls 16517->16519 16520 9eb65c 42 API calls 16518->16520 16521 a1dcda 16519->16521 16520->16521 16521->16510 16767 9e7a8c 16768 9e7abb 16767->16768 16775 9e74f0 16768->16775 16835 9e7014 16775->16835 16777 9e7527 16778 9e753d 16777->16778 16779 9e7549 16777->16779 16838 9e7484 16778->16838 16781 9e76fd 16779->16781 16782 9e768f 16779->16782 16783 9e76cf 16779->16783 16784 9e766a 16779->16784 16785 9e762b 16779->16785 16786 9e76a8 16779->16786 16787 9e75a9 16779->16787 16788 9e76e4 16779->16788 16789 9e75c3 16779->16789 16790 9e7680 16779->16790 16791 9e76c1 16779->16791 16955 9dc2bc 16781->16955 16872 9e8330 16782->16872 16908 9e3fb8 16783->16908 16863 9e40b4 16784->16863 16796 9e7650 16785->16796 16797 9e7631 16785->16797 16885 9e839c 16786->16885 16841 9e3e9c 16787->16841 16912 9e5c20 16788->16912 16793 9e75c9 16789->16793 16794 9e75e5 16789->16794 16866 9e411c 16790->16866 16903 9e887c 16791->16903 16845 9e7e30 16793->16845 16820 9e75f9 16794->16820 16821 9e7611 16794->16821 16817 9e3e9c 51 API calls 16796->16817 16859 9e7ea4 16797->16859 16801 9e7544 16965 9d4934 16801->16965 16805 9e769c 16814 9e40f0 51 API calls 16805->16814 16814->16801 16816 9e40f0 51 API calls 16816->16801 16817->16801 16819 9d424c 11 API calls 16822 9e7746 16819->16822 16855 9e408c 16820->16855 16823 9e3e9c 51 API calls 16821->16823 16825 9dfdbc 16822->16825 16823->16801 16826 9dfddb 16825->16826 16827 9dfdc6 16825->16827 16832 9dfaa8 16826->16832 16828 9dfdcd 16827->16828 16829 9dfdf3 16827->16829 16828->16826 16831 9dfa18 51 API calls 16828->16831 18541 9dfd10 16829->18541 16831->16826 16833 9dfa94 51 API calls 16832->16833 16834 9dfaae 16833->16834 16968 9df7fc 16835->16968 16839 9dc2bc 42 API calls 16838->16839 16840 9e74a7 16839->16840 16840->16801 16842 9e3eac 16841->16842 16843 9e3eb3 16841->16843 16844 9dfa18 51 API calls 16842->16844 16843->16801 16844->16843 16846 9e7e42 16845->16846 17098 9e7b30 16846->17098 16849 9e40f0 16850 9e40fd 16849->16850 16851 9e4104 16849->16851 16852 9dfa18 51 API calls 16850->16852 16853 9d427c 11 API calls 16851->16853 16852->16851 16854 9e4118 16853->16854 16854->16801 16856 9e4099 16855->16856 16857 9e40a0 16855->16857 16858 9dfa18 51 API calls 16856->16858 16857->16801 16858->16857 16860 9e7ebd 16859->16860 17118 9e7ed0 16860->17118 16864 9dfa94 51 API calls 16863->16864 16865 9e40ba 16864->16865 16865->16801 16867 9e413f 16866->16867 16868 9e40f0 51 API calls 16867->16868 16869 9e4149 16868->16869 16870 9d4228 11 API calls 16869->16870 16871 9e415e 16870->16871 16871->16801 16873 9e833e 16872->16873 16874 9e8349 16872->16874 16875 9e8352 16873->16875 16876 9e8343 16873->16876 16874->16805 17128 9e8200 16875->17128 16878 9e835b 16876->16878 16879 9e8347 16876->16879 17133 9e8280 16878->17133 16883 9d4228 11 API calls 16879->16883 16880 9e8359 16880->16805 16884 9e836b 16883->16884 16884->16805 16886 9e83c8 16885->16886 16887 9e83d5 16885->16887 16886->16887 16888 9e83cc 16886->16888 16889 9e8330 15 API calls 16887->16889 16890 9e83ee 16888->16890 16891 9e83d0 16888->16891 16894 9e83e1 16889->16894 16890->16894 17141 9d4970 16890->17141 16892 9d4934 SysFreeString 16891->16892 16892->16894 16895 9d4228 11 API calls 16894->16895 16896 9e76b5 16895->16896 16897 9e416c 16896->16897 16898 9e4179 16897->16898 16899 9e4180 16897->16899 16901 9dfa18 51 API calls 16898->16901 17151 9d4c60 16899->17151 16901->16899 16904 9e888b 16903->16904 16907 9e8896 16904->16907 17164 9e8868 16904->17164 16907->16801 16909 9e3fcc 16908->16909 16910 9e3fc5 16908->16910 16909->16801 16911 9dfa18 51 API calls 16910->16911 16911->16909 16913 9e5c29 16912->16913 16913->16913 17167 9d5924 16913->17167 16916 9d5924 13 API calls 16917 9e5c68 16916->16917 16918 9dfa94 51 API calls 16917->16918 16919 9e5c70 16918->16919 17173 9e5bd8 16919->17173 16921 9e5caf 17177 9e5b80 16921->17177 16923 9e5c79 16923->16921 16926 9e5f2e 16923->16926 16924 9e5cbb 17181 9e5ac0 16924->17181 17227 9d4f0c 16926->17227 16927 9e5cc7 17185 9d5810 16927->17185 16930 9e5f4e 16932 9d4f0c 13 API calls 16930->16932 16931 9e5cd8 17192 9e55a8 16931->17192 16933 9e5f61 16932->16933 16933->16801 16936 9dfdbc 59 API calls 16937 9e5cfd 16936->16937 17202 9e56e8 16937->17202 16939 9e5f11 17222 9e5708 16939->17222 16940 9e408c 51 API calls 16941 9e5d05 16940->16941 16941->16939 16941->16940 16943 9dfa94 51 API calls 16941->16943 16944 9e3fb8 51 API calls 16941->16944 16945 9e416c 55 API calls 16941->16945 16947 9e3e9c 51 API calls 16941->16947 16948 9dfdbc 59 API calls 16941->16948 16950 9e40b4 51 API calls 16941->16950 16952 9e40f0 51 API calls 16941->16952 17207 9e40dc 16941->17207 17210 9e41d0 16941->17210 17214 9e41a4 16941->17214 17218 9e59b4 16941->17218 16943->16941 16944->16941 16945->16941 16947->16941 16948->16941 16950->16941 16952->16941 16956 9dc2ca 16955->16956 16957 9d64b0 42 API calls 16956->16957 16958 9dc2f4 16957->16958 16959 9d9850 42 API calls 16958->16959 16960 9dc302 16959->16960 16961 9d427c 11 API calls 16960->16961 16962 9dc30d 16961->16962 16963 9d424c 11 API calls 16962->16963 16964 9dc327 16963->16964 16964->16801 16966 9d4948 16965->16966 16967 9d493a SysFreeString 16965->16967 16966->16819 16967->16966 16971 9dfa94 16968->16971 16970 9df806 16970->16777 16972 9dfa9b 16971->16972 16973 9dfaa1 16971->16973 16972->16970 16976 9dfa18 16973->16976 16977 9dfa26 VariantClear 16976->16977 16978 9dfa33 16976->16978 16991 9df6e4 16977->16991 16980 9dfa49 16978->16980 16981 9dfa3a 16978->16981 16983 9dfa6a 16980->16983 16984 9dfa61 16980->16984 16985 9dfa31 16980->16985 16982 9d4228 11 API calls 16981->16982 16982->16985 17010 9e6e74 16983->17010 16995 9df89c 16984->16995 16985->16970 16988 9dfa73 16988->16985 16989 9dfa83 VariantClear 16988->16989 16990 9df6e4 43 API calls 16989->16990 16990->16985 16992 9df6ed 16991->16992 16993 9df6e8 16991->16993 16992->16985 17016 9df490 16993->17016 16996 9df8ba 16995->16996 17000 9df8c4 16995->17000 16997 9df6e4 43 API calls 16996->16997 16997->17000 16998 9dfa00 VariantClear 16999 9df6e4 43 API calls 16998->16999 17001 9dfa11 16999->17001 17000->16998 17002 9df92e SafeArrayGetLBound 17000->17002 17008 9df990 17000->17008 17001->16985 17003 9df6e4 43 API calls 17002->17003 17004 9df955 SafeArrayGetUBound 17003->17004 17006 9df6e4 43 API calls 17004->17006 17005 9df9c9 SafeArrayPtrOfIndex 17007 9df6e4 43 API calls 17005->17007 17006->17000 17007->17008 17008->16998 17008->17005 17009 9dfa94 47 API calls 17008->17009 17009->17008 17011 9e6e88 17010->17011 17012 9e6ea5 RtlEnterCriticalSection 17011->17012 17013 9e6f23 17011->17013 17014 9e6ec7 17012->17014 17013->16988 17015 9e6f04 RtlLeaveCriticalSection 17014->17015 17015->16988 17017 9df498 17016->17017 17017->17017 17018 9df4b9 17017->17018 17019 9df4f2 17017->17019 17020 9df4bf 17018->17020 17021 9df559 17018->17021 17022 9df4fd 17019->17022 17023 9df57f 17019->17023 17024 9df4c6 17020->17024 17025 9df4e3 17020->17025 17029 9d64b0 42 API calls 17021->17029 17027 9df5a5 17022->17027 17028 9df506 17022->17028 17026 9d64b0 42 API calls 17023->17026 17030 9df51f 17024->17030 17031 9df4c8 17024->17031 17033 9df529 17025->17033 17034 9df4ea 17025->17034 17032 9df58c 17026->17032 17035 9d64b0 42 API calls 17027->17035 17036 9df5f1 17028->17036 17037 9df511 17028->17037 17038 9df566 17029->17038 17076 9df25c 17030->17076 17042 9df5cb 17031->17042 17043 9df4d3 17031->17043 17044 9dc1c4 11 API calls 17032->17044 17041 9d64b0 42 API calls 17033->17041 17045 9df54f 17034->17045 17052 9df4de 17034->17052 17047 9df5b2 17035->17047 17046 9d64b0 42 API calls 17036->17046 17048 9df617 17037->17048 17037->17052 17039 9dc1c4 11 API calls 17038->17039 17075 9df524 17039->17075 17051 9df536 17041->17051 17050 9d64b0 42 API calls 17042->17050 17043->17052 17053 9df63a 17043->17053 17044->17075 17087 9df34c 17045->17087 17055 9df5fe 17046->17055 17056 9dc1c4 11 API calls 17047->17056 17049 9d64b0 42 API calls 17048->17049 17057 9df624 17049->17057 17058 9df5d8 17050->17058 17083 9dc1c4 17051->17083 17094 9db9bc FormatMessageA 17052->17094 17060 9d64b0 42 API calls 17053->17060 17061 9dc1c4 11 API calls 17055->17061 17056->17075 17064 9dc1c4 11 API calls 17057->17064 17065 9dc1c4 11 API calls 17058->17065 17067 9df647 17060->17067 17061->17075 17064->17075 17065->17075 17066 9d424c 11 API calls 17069 9df6c7 17066->17069 17070 9dc1c4 11 API calls 17067->17070 17068 9d64b0 42 API calls 17071 9df699 17068->17071 17072 9d424c 11 API calls 17069->17072 17070->17075 17073 9dc200 42 API calls 17071->17073 17074 9df6d4 17072->17074 17073->17075 17074->16992 17075->17066 17077 9d64b0 42 API calls 17076->17077 17078 9df27c 17077->17078 17079 9dc1c4 11 API calls 17078->17079 17080 9df28b 17079->17080 17081 9d4228 11 API calls 17080->17081 17082 9df2a5 17081->17082 17082->17075 17084 9dc1cb 17083->17084 17085 9d427c 11 API calls 17084->17085 17086 9dc1e3 17085->17086 17086->17075 17088 9d64b0 42 API calls 17087->17088 17089 9df36c 17088->17089 17090 9dc1c4 11 API calls 17089->17090 17091 9df37b 17090->17091 17092 9d4228 11 API calls 17091->17092 17093 9df395 17092->17093 17093->17075 17095 9db9e2 17094->17095 17096 9d4318 11 API calls 17095->17096 17097 9db9ff 17096->17097 17097->17068 17099 9e7b5c 17098->17099 17100 9e7b51 17098->17100 17104 9d427c 11 API calls 17099->17104 17109 9e7b5a 17099->17109 17110 9d8af0 17100->17110 17102 9d4228 11 API calls 17103 9e75d6 17102->17103 17103->16849 17105 9e7b91 17104->17105 17105->17109 17114 9d87c0 17105->17114 17108 9d427c 11 API calls 17108->17109 17109->17102 17111 9d8b00 17110->17111 17112 9d4318 11 API calls 17111->17112 17113 9d8b08 17112->17113 17113->17109 17115 9d87ce 17114->17115 17116 9d4874 11 API calls 17115->17116 17117 9d87d9 17116->17117 17117->17108 17119 9d4228 11 API calls 17118->17119 17120 9e7efe 17119->17120 17121 9e7b30 11 API calls 17120->17121 17123 9e7f50 17120->17123 17126 9d44f0 11 API calls 17120->17126 17121->17120 17122 9e7f6e 17125 9d4228 11 API calls 17122->17125 17123->17122 17124 9d45a8 11 API calls 17123->17124 17124->17122 17127 9e7641 17125->17127 17126->17120 17127->16816 17129 9e820f 17128->17129 17132 9e821a 17129->17132 17138 9e81ec 17129->17138 17132->16880 17134 9e839c 15 API calls 17133->17134 17135 9e82a8 17134->17135 17136 9d4934 SysFreeString 17135->17136 17137 9e82c7 17136->17137 17137->16805 17139 9d427c 11 API calls 17138->17139 17140 9e81fb 17139->17140 17140->16880 17142 9d4978 17141->17142 17143 9d4934 17141->17143 17142->17143 17144 9d4983 SysReAllocStringLen 17142->17144 17145 9d4948 17143->17145 17146 9d493a SysFreeString 17143->17146 17147 9d4904 17144->17147 17148 9d4993 17144->17148 17145->16894 17146->17145 17149 9d4920 17147->17149 17150 9d4910 SysAllocStringLen 17147->17150 17148->16894 17149->16894 17150->17147 17150->17149 17152 9d4c73 17151->17152 17155 9d4a28 17152->17155 17154 9d4ca2 17154->16801 17156 9d4934 17155->17156 17157 9d4a30 SysAllocStringLen 17155->17157 17158 9d4948 17156->17158 17159 9d493a SysFreeString 17156->17159 17160 9d4a40 SysFreeString 17157->17160 17161 9d4904 17157->17161 17158->17154 17159->17158 17160->17154 17162 9d4920 17161->17162 17163 9d4910 SysAllocStringLen 17161->17163 17162->17154 17163->17161 17163->17162 17165 9dfdbc 59 API calls 17164->17165 17166 9e8877 17165->17166 17166->16801 17169 9d592a 17167->17169 17172 9d595c 17167->17172 17168 9d5954 17170 9d28ec 11 API calls 17168->17170 17169->17168 17171 9d4f0c 13 API calls 17169->17171 17169->17172 17170->17172 17171->17168 17172->16916 17175 9e5be2 17173->17175 17174 9df25c 42 API calls 17176 9e5c1c 17174->17176 17175->17174 17175->17176 17176->16923 17178 9e5b8f 17177->17178 17252 9d5804 17178->17252 17180 9e5ba8 17180->16924 17182 9e5ad4 17181->17182 17183 9d5804 16 API calls 17182->17183 17184 9e5ae9 17183->17184 17184->16927 17186 9d5815 17185->17186 17187 9d5827 17185->17187 17312 9d5830 17186->17312 17188 9d5924 13 API calls 17187->17188 17190 9d582e 17188->17190 17190->16931 17193 9e55c0 17192->17193 17196 9e55d7 17193->17196 17320 9df43c 17193->17320 17195 9e560c SafeArrayCreate 17197 9e562c 17195->17197 17198 9e5627 17195->17198 17196->17195 17196->17196 17200 9dfa94 51 API calls 17197->17200 17199 9df43c 42 API calls 17198->17199 17199->17197 17201 9e5634 17200->17201 17201->16936 17327 9e5650 17202->17327 17205 9df6e4 43 API calls 17206 9e56ff 17205->17206 17206->16941 17208 9dfa94 51 API calls 17207->17208 17209 9e40e2 17208->17209 17209->16941 17211 9e41dd 17210->17211 17213 9e41e4 17210->17213 17212 9dfa18 51 API calls 17211->17212 17212->17213 17213->16941 17215 9e41b8 17214->17215 17216 9e41b1 17214->17216 17215->16941 17217 9dfa18 51 API calls 17216->17217 17217->17215 17219 9e59bf 17218->17219 17219->17219 17331 9e586c 17219->17331 17223 9e5650 43 API calls 17222->17223 17224 9e5712 SafeArrayUnaccessData 17223->17224 17225 9df6e4 43 API calls 17224->17225 17226 9e571d 17225->17226 17226->16801 17228 9d4f15 17227->17228 17247 9d4f4a 17227->17247 17229 9d4f4f 17228->17229 17230 9d4f2a 17228->17230 17231 9d4f56 17229->17231 17232 9d4f60 17229->17232 17233 9d4f6c 17230->17233 17234 9d4f2e 17230->17234 17235 9d4228 11 API calls 17231->17235 17236 9d424c 11 API calls 17232->17236 17237 9d4f7a 17233->17237 17238 9d4f73 17233->17238 17239 9d4f83 17234->17239 17240 9d4f32 17234->17240 17235->17247 17236->17247 17241 9d494c SysFreeString 17237->17241 17245 9d4934 SysFreeString 17238->17245 17239->17247 18532 9d4ef4 17239->18532 17242 9d4f36 17240->17242 17243 9d4f92 17240->17243 17241->17247 17246 9d4fb0 17242->17246 17251 9d4f3a 17242->17251 17243->17247 17248 9d4f0c 13 API calls 17243->17248 17245->17247 17246->17247 18537 9d4ec0 17246->18537 17247->16930 17248->17243 17250 9d5924 13 API calls 17250->17251 17251->17247 17251->17250 17255 9d5678 17252->17255 17256 9d5697 17255->17256 17260 9d56b1 17255->17260 17257 9d56a2 17256->17257 17258 9d2a28 11 API calls 17256->17258 17269 9d5670 17257->17269 17258->17257 17261 9d56fb 17260->17261 17262 9d2a28 11 API calls 17260->17262 17263 9d28cc 11 API calls 17261->17263 17265 9d5708 17261->17265 17262->17261 17264 9d5747 17263->17264 17264->17265 17272 9d5658 17264->17272 17266 9d56ac 17265->17266 17268 9d5678 16 API calls 17265->17268 17266->17180 17268->17265 17270 9d5924 13 API calls 17269->17270 17271 9d5675 17270->17271 17271->17266 17275 9d5138 17272->17275 17274 9d5663 17274->17265 17276 9d514d 17275->17276 17277 9d5173 17275->17277 17278 9d5195 17276->17278 17279 9d5152 17276->17279 17280 9d427c 11 API calls 17277->17280 17292 9d5190 17277->17292 17283 9d4970 3 API calls 17278->17283 17278->17292 17281 9d51a9 17279->17281 17282 9d5157 17279->17282 17280->17277 17281->17292 17294 9d5004 17281->17294 17285 9d51bd 17282->17285 17286 9d515c 17282->17286 17283->17278 17288 9d5138 16 API calls 17285->17288 17285->17292 17287 9d5161 17286->17287 17290 9d51de 17286->17290 17287->17277 17287->17292 17293 9d520f 17287->17293 17288->17285 17290->17292 17299 9d501c 17290->17299 17292->17274 17293->17292 17308 9d5960 17293->17308 17295 9d500d 17294->17295 17296 9d5014 17294->17296 17295->17281 17297 9d2a28 11 API calls 17296->17297 17298 9d501b 17297->17298 17298->17281 17305 9d5036 17299->17305 17300 9d427c 11 API calls 17300->17305 17301 9d4970 3 API calls 17301->17305 17302 9d5004 11 API calls 17302->17305 17303 9d5122 17303->17290 17304 9d5138 16 API calls 17304->17305 17305->17300 17305->17301 17305->17302 17305->17303 17305->17304 17306 9d501c 16 API calls 17305->17306 17307 9d5960 13 API calls 17305->17307 17306->17305 17307->17305 17309 9d5967 17308->17309 17310 9d5981 17309->17310 17311 9d5924 13 API calls 17309->17311 17310->17293 17311->17310 17315 9d5850 17312->17315 17317 9d58f8 17312->17317 17313 9d5670 13 API calls 17314 9d5825 17313->17314 17314->16931 17316 9d28cc 11 API calls 17315->17316 17315->17317 17318 9d58ba 17316->17318 17317->17313 17318->17317 17319 9d5658 16 API calls 17318->17319 17319->17317 17321 9d64b0 42 API calls 17320->17321 17322 9df45c 17321->17322 17323 9dc1c4 11 API calls 17322->17323 17324 9df46b 17323->17324 17325 9d4228 11 API calls 17324->17325 17326 9df485 17325->17326 17326->17196 17328 9e5663 17327->17328 17329 9e5671 SafeArrayAccessData 17328->17329 17330 9df6e4 43 API calls 17328->17330 17329->17205 17330->17329 17332 9e5885 17331->17332 17333 9df6e4 43 API calls 17332->17333 17334 9e5893 17332->17334 17333->17334 17335 9e58c3 17334->17335 17359 9e5740 17334->17359 17336 9e58d8 17335->17336 17338 9df6e4 43 API calls 17335->17338 17339 9e5923 VariantInit 17336->17339 17341 9e58fe SafeArrayPtrOfIndex 17336->17341 17363 9e5444 17336->17363 17338->17336 17342 9e593f 17339->17342 17343 9e5951 17339->17343 17347 9df6e4 43 API calls 17341->17347 17351 9e5914 17347->17351 17348 9df6e4 43 API calls 17348->17335 17360 9e5754 17359->17360 17361 9e576b 17360->17361 17362 9e5444 2 API calls 17360->17362 17361->17335 17361->17348 17362->17361 17364 9e6e74 2 API calls 17363->17364 17365 9e544c 17364->17365 17365->17339 17365->17341 18533 9d4efd 18532->18533 18534 9d4f04 18532->18534 18533->17239 18535 9d2a28 11 API calls 18534->18535 18536 9d4f0b 18535->18536 18536->17239 18539 9d4ed2 18537->18539 18538 9d4f0c 13 API calls 18538->18539 18539->18538 18540 9d4eeb 18539->18540 18540->17246 18542 9dfd1f 18541->18542 18543 9dfd26 18541->18543 18546 9dfa18 51 API calls 18542->18546 18544 9dfd3d 18543->18544 18545 9dfd2f VariantCopy 18543->18545 18548 9dfd5b 18544->18548 18549 9dfd44 18544->18549 18547 9df6e4 43 API calls 18545->18547 18546->18543 18551 9dfd3b 18547->18551 18548->18551 18552 9dfd8c 18548->18552 18553 9dfd7c 18548->18553 18550 9d427c 11 API calls 18549->18550 18550->18551 18551->16826 18554 9e6e74 2 API calls 18552->18554 18559 9dfb3c 18553->18559 18556 9dfd95 18554->18556 18556->18551 18557 9dfdaa VariantCopy 18556->18557 18558 9df6e4 43 API calls 18557->18558 18558->18551 18560 9dfb5c 18559->18560 18561 9dfb66 18559->18561 18562 9df6e4 43 API calls 18560->18562 18563 9dfced VariantCopy 18561->18563 18564 9dfb7a 18561->18564 18562->18561 18565 9df6e4 43 API calls 18563->18565 18566 9dfc1a SafeArrayCreate 18564->18566 18567 9dfbb8 SafeArrayGetLBound 18564->18567 18580 9dfceb 18565->18580 18568 9dfc3a 18566->18568 18569 9dfc35 18566->18569 18570 9df6e4 43 API calls 18567->18570 18572 9dfa94 51 API calls 18568->18572 18571 9df43c 42 API calls 18569->18571 18573 9dfbdf SafeArrayGetUBound 18570->18573 18571->18568 18575 9dfc45 18572->18575 18574 9df6e4 43 API calls 18573->18574 18574->18564 18576 9dfc92 SafeArrayPtrOfIndex 18575->18576 18575->18580 18577 9df6e4 43 API calls 18576->18577 18578 9dfcb1 SafeArrayPtrOfIndex 18577->18578 18579 9df6e4 43 API calls 18578->18579 18579->18575 18580->18551 15708 a9b88c 15717 9d67f0 15708->15717 15714 a9b8ce LoadLibraryA 15749 a04f74 15714->15749 15716 a9b8e6 15718 9d67fb 15717->15718 15757 9d3ecc 15718->15757 15721 9d427c 15722 9d4280 15721->15722 15725 9d4290 15721->15725 15722->15725 15824 9d42ec 15722->15824 15723 9d42be 15727 9d4534 15723->15727 15725->15723 15829 9d28ec 15725->15829 15728 9d4538 15727->15728 15731 9d44f0 15727->15731 15729 9d4548 15728->15729 15730 9d4556 15728->15730 15728->15731 15732 9d427c 15728->15732 15734 9d427c 11 API calls 15729->15734 15737 9d42ec 11 API calls 15730->15737 15731->15732 15735 9d4533 15731->15735 15738 9d44fe 15731->15738 15736 9d42ec 11 API calls 15732->15736 15739 9d4290 15732->15739 15733 9d42be 15733->15714 15734->15731 15735->15714 15736->15739 15745 9d4569 15737->15745 15740 9d4528 15738->15740 15741 9d4511 15738->15741 15739->15733 15742 9d28ec 11 API calls 15739->15742 15744 9d4874 11 API calls 15740->15744 15871 9d4874 15741->15871 15742->15733 15746 9d4516 15744->15746 15747 9d427c 11 API calls 15745->15747 15746->15714 15748 9d4595 15747->15748 15748->15714 15750 a04f8a 15749->15750 15752 a05063 15750->15752 15881 9eb41c 15750->15881 15752->15716 15753 a0501a 15753->15752 15891 9d64b0 15753->15891 15755 a05051 15897 9dc200 15755->15897 15758 9d3f12 15757->15758 15759 9d4138 15758->15759 15760 9d3f8b 15758->15760 15763 9d4181 15759->15763 15764 9d4170 15759->15764 15771 9d3e6c 15760->15771 15767 9d41bc FreeLibrary 15763->15767 15768 9d41e0 15763->15768 15775 9d40ac 15764->15775 15766 9d417a 15766->15763 15767->15763 15769 9d41ef ExitProcess 15768->15769 15770 9d41e9 15768->15770 15770->15769 15772 9d3e7b 15771->15772 15773 9d3ea8 15771->15773 15772->15773 15781 9d59b8 15772->15781 15773->15721 15776 9d410d 15775->15776 15777 9d40b6 GetStdHandle WriteFile GetStdHandle WriteFile 15775->15777 15779 9d4129 15776->15779 15780 9d4116 MessageBoxA 15776->15780 15777->15766 15779->15766 15780->15779 15782 9d59c8 GetModuleFileNameA 15781->15782 15783 9d59e4 15781->15783 15785 9d5bf4 GetModuleFileNameA RegOpenKeyExA 15782->15785 15783->15772 15786 9d5c77 15785->15786 15787 9d5c37 RegOpenKeyExA 15785->15787 15803 9d5a3c GetModuleHandleA 15786->15803 15787->15786 15789 9d5c55 RegOpenKeyExA 15787->15789 15789->15786 15791 9d5d00 lstrcpyn GetThreadLocale GetLocaleInfoA 15789->15791 15794 9d5e1a 15791->15794 15796 9d5d37 15791->15796 15792 9d5cbc RegQueryValueExA 15793 9d5cde RegCloseKey 15792->15793 15795 9d5cda 15792->15795 15793->15783 15794->15783 15795->15793 15796->15794 15797 9d5d47 lstrlen 15796->15797 15798 9d5d5f 15797->15798 15798->15794 15799 9d5dac 15798->15799 15800 9d5d84 lstrcpyn LoadLibraryExA 15798->15800 15799->15794 15801 9d5db6 lstrcpyn LoadLibraryExA 15799->15801 15800->15799 15801->15794 15802 9d5de8 lstrcpyn LoadLibraryExA 15801->15802 15802->15794 15804 9d5aa4 15803->15804 15805 9d5a64 GetProcAddress 15803->15805 15808 9d5bc6 RegQueryValueExA 15804->15808 15817 9d5ad7 15804->15817 15820 9d5a28 15804->15820 15805->15804 15806 9d5a75 15805->15806 15806->15804 15810 9d5a8b lstrcpyn 15806->15810 15807 9d5aea lstrcpyn 15814 9d5b08 15807->15814 15808->15792 15808->15793 15810->15808 15811 9d5bb2 lstrcpyn 15811->15808 15813 9d5a28 CharNextA 15813->15814 15814->15808 15814->15811 15814->15813 15816 9d5b27 lstrcpyn FindFirstFileA 15814->15816 15815 9d5a28 CharNextA 15815->15817 15816->15808 15818 9d5b52 FindClose lstrlen 15816->15818 15817->15807 15817->15808 15818->15808 15819 9d5b71 lstrcpyn lstrlen 15818->15819 15819->15814 15821 9d5a30 15820->15821 15822 9d5a3b 15821->15822 15823 9d5a2a CharNextA 15821->15823 15822->15808 15822->15815 15823->15821 15825 9d4314 15824->15825 15826 9d42f0 15824->15826 15825->15725 15833 9d28cc 15826->15833 15830 9d2904 15829->15830 15831 9d28f1 15829->15831 15830->15723 15831->15830 15832 9d2a28 11 API calls 15831->15832 15832->15830 15834 9d28d1 15833->15834 15836 9d28e4 15833->15836 15834->15836 15837 9d2a28 15834->15837 15836->15725 15838 9d29dc 15837->15838 15839 9d2a01 15838->15839 15843 9d67a4 15838->15843 15851 9d29d0 15839->15851 15844 9d67d9 TlsGetValue 15843->15844 15845 9d67b3 15843->15845 15846 9d67be 15844->15846 15847 9d67e3 15844->15847 15845->15839 15854 9d66e8 15846->15854 15847->15839 15849 9d67c3 TlsGetValue 15850 9d67d2 15849->15850 15850->15839 15861 9d4210 15851->15861 15855 9d66ee 15854->15855 15859 9d6712 15855->15859 15860 9d66d4 LocalAlloc 15855->15860 15857 9d670e 15858 9d671e TlsSetValue 15857->15858 15857->15859 15858->15859 15859->15849 15860->15857 15864 9d4138 15861->15864 15865 9d4151 15864->15865 15866 9d40ac 5 API calls 15865->15866 15867 9d417a 15865->15867 15866->15867 15868 9d41bc FreeLibrary 15867->15868 15869 9d41e0 ExitProcess 15867->15869 15868->15867 15873 9d4881 15871->15873 15876 9d48b1 15871->15876 15874 9d488d 15873->15874 15875 9d42ec 11 API calls 15873->15875 15874->15746 15875->15876 15877 9d4228 15876->15877 15878 9d422e 15877->15878 15879 9d4249 15877->15879 15878->15879 15880 9d28ec 11 API calls 15878->15880 15879->15874 15880->15879 15882 9eb432 15881->15882 15884 9eb467 15882->15884 15917 9eb290 15882->15917 15905 9eb374 15884->15905 15887 9eb492 15889 9eb4aa 15887->15889 15931 9eb318 15887->15931 15889->15753 15892 9d64c0 15891->15892 15896 9d64f1 15891->15896 15893 9d5a00 30 API calls 15892->15893 15892->15896 15894 9d64e0 LoadStringA 15893->15894 15895 9d4318 11 API calls 15894->15895 15895->15896 15896->15755 15898 9dc20c 15897->15898 15899 9d9850 42 API calls 15898->15899 15900 9dc239 15899->15900 15901 9d427c 11 API calls 15900->15901 15902 9dc244 15901->15902 15903 9d4228 11 API calls 15902->15903 15904 9dc259 15903->15904 15904->15752 15908 9eb39e 15905->15908 15916 9eb3f2 15905->15916 15906 9d4228 11 API calls 15907 9eb409 15906->15907 15907->15887 15926 9eb2e8 15907->15926 15909 9eb374 67 API calls 15908->15909 15908->15916 15910 9eb3b6 15909->15910 15944 9d59b0 15910->15944 15914 9eb3e4 15952 9eb20c 15914->15952 15916->15906 15918 9d67a4 4 API calls 15917->15918 15920 9eb296 15918->15920 15919 9d67a4 4 API calls 15923 9eb2be 15919->15923 15921 9d67a4 4 API calls 15920->15921 15922 9eb2b3 15920->15922 15921->15922 15922->15919 15924 9d67a4 4 API calls 15923->15924 15925 9eb2de 15924->15925 15925->15884 15927 9d67a4 4 API calls 15926->15927 15930 9eb2f0 15927->15930 15928 9eb313 15928->15887 15929 9eb65c 42 API calls 15929->15930 15930->15928 15930->15929 15932 9d67a4 4 API calls 15931->15932 15933 9eb31f 15932->15933 15934 9d67a4 4 API calls 15933->15934 15935 9eb32f 15934->15935 16239 9eb744 15935->16239 15938 9d67a4 4 API calls 15939 9eb343 15938->15939 16242 9eb54c 15939->16242 15941 9eb354 15942 9eb35f 15941->15942 15943 9d67a4 4 API calls 15941->15943 15942->15889 15943->15942 15960 9d5988 VirtualQuery 15944->15960 15947 9d5a00 15948 9d5a0a 15947->15948 15949 9d5a27 15947->15949 15948->15949 15950 9d59b8 30 API calls 15948->15950 15949->15914 15951 9d5a20 15950->15951 15951->15914 15953 9eb21d 15952->15953 15954 9eb22c FindResourceA 15953->15954 15955 9eb23c 15954->15955 15959 9eb268 15954->15959 15962 9edcdc 15955->15962 15957 9eb24d 15966 9ed658 15957->15966 15959->15916 15961 9d59a2 15960->15961 15961->15947 15963 9edce6 15962->15963 15971 9edda4 FindResourceA 15963->15971 15965 9edd14 15965->15957 15988 9ede60 15966->15988 15968 9ed674 15992 9efe94 15968->15992 15972 9eddc9 15971->15972 15973 9eddd0 LoadResource 15971->15973 15981 9edd34 15972->15981 15975 9eddea SizeofResource LockResource 15973->15975 15976 9edde3 15973->15976 15979 9ede08 15975->15979 15978 9edd34 42 API calls 15976->15978 15980 9edde9 15978->15980 15979->15965 15980->15975 15982 9d64b0 42 API calls 15981->15982 15983 9edd6d 15982->15983 15984 9dc200 42 API calls 15983->15984 15985 9edd7c 15984->15985 15986 9d4228 11 API calls 15985->15986 15987 9edd96 15986->15987 15987->15973 15989 9ede6a 15988->15989 15990 9d28cc 11 API calls 15989->15990 15991 9ede83 15990->15991 15991->15968 16019 9f027c 15992->16019 15995 9eff0c 16045 9f02a0 15995->16045 15996 9eff41 15998 9f02a0 42 API calls 15996->15998 15999 9eff52 15998->15999 16001 9eff5b 15999->16001 16002 9eff68 15999->16002 16004 9f02a0 42 API calls 16001->16004 16005 9f02a0 42 API calls 16002->16005 16010 9eff34 16004->16010 16007 9eff83 16005->16007 16059 9efe34 16007->16059 16024 9eab0c 16010->16024 16013 9d67a4 4 API calls 16014 9effdc 16013->16014 16069 9eea40 16019->16069 16022 9efecd 16022->15995 16022->15996 16025 9eab19 16024->16025 16084 9ea9f8 RtlEnterCriticalSection 16025->16084 16027 9eabf3 16085 9eaab0 RtlLeaveCriticalSection 16027->16085 16028 9eb65c 42 API calls 16033 9eab50 16028->16033 16030 9eac0a 16030->16013 16032 9eb65c 42 API calls 16034 9eabb2 16032->16034 16033->16028 16033->16034 16086 9ea534 16033->16086 16034->16027 16034->16032 16046 9eea40 42 API calls 16045->16046 16047 9f02b5 16046->16047 16159 9d4318 16047->16159 16052 9eea40 42 API calls 16053 9eff17 16052->16053 16054 9eadbc 16053->16054 16170 9ead68 16054->16170 16060 9d427c 11 API calls 16059->16060 16061 9efe4c 16060->16061 16063 9efe7b 16061->16063 16195 9d9850 16061->16195 16198 9eb1e8 16061->16198 16063->16010 16072 9eea4b 16069->16072 16070 9eea85 16070->16022 16073 9ee500 16070->16073 16072->16070 16076 9eea8c 16072->16076 16074 9dc280 42 API calls 16073->16074 16075 9ee511 16074->16075 16075->16022 16077 9eea9e 16076->16077 16078 9eeab9 16077->16078 16080 9dc280 16077->16080 16078->16072 16081 9dc287 16080->16081 16082 9d64b0 42 API calls 16081->16082 16083 9dc29f 16082->16083 16083->16078 16084->16033 16085->16030 16087 9ea56a 16086->16087 16089 9ea54c 16086->16089 16087->16033 16088 9eb65c 42 API calls 16088->16089 16089->16087 16089->16088 16160 9d42ec 11 API calls 16159->16160 16161 9d4328 16160->16161 16162 9d4228 11 API calls 16161->16162 16163 9d4340 16162->16163 16164 9d4740 16163->16164 16165 9d46f4 16164->16165 16166 9d42ec 11 API calls 16165->16166 16167 9d472f 16165->16167 16168 9d470b 16166->16168 16167->16052 16168->16167 16169 9d28ec 11 API calls 16168->16169 16169->16167 16203 9d9864 16195->16203 16199 9eb1fe 16198->16199 16200 9eb1f4 16198->16200 16224 9eb1a8 16199->16224 16200->16061 16205 9d9888 16203->16205 16204 9d98b3 16207 9d990b 16204->16207 16214 9d98c8 16204->16214 16205->16204 16216 9d9458 16205->16216 16208 9d4318 11 API calls 16207->16208 16210 9d985f 16208->16210 16209 9d9901 16211 9d4874 11 API calls 16209->16211 16210->16061 16211->16210 16212 9d4228 11 API calls 16212->16214 16213 9d4874 11 API calls 16213->16214 16214->16209 16214->16212 16214->16213 16215 9d9458 42 API calls 16214->16215 16215->16214 16221 9d9481 16216->16221 16217 9d9492 16218 9d97af 11 API calls 16217->16218 16220 9d9582 42 API calls 16220->16221 16221->16217 16221->16220 16222 9d953a 11 API calls 16221->16222 16223 9d944c 11 API calls 16221->16223 16222->16221 16223->16221 16225 9eb1e3 16224->16225 16227 9eb1b8 16224->16227 16225->16061 16226 9eb65c 42 API calls 16226->16227 16227->16225 16227->16226 16240 9eb65c 42 API calls 16239->16240 16241 9eb33c 16240->16241 16241->15938 16243 9eb557 16242->16243 16244 9eb56b 16243->16244 16245 9eb5e8 42 API calls 16243->16245 16246 9eb65c 42 API calls 16244->16246 16245->16244 16247 9eb574 16246->16247 16247->15941 21811 9eaddc 21819 9ea9f8 RtlEnterCriticalSection 21811->21819 21814 9eae29 21829 9eaab0 RtlLeaveCriticalSection 21814->21829 21817 9eae40 21818 9eadec 21818->21814 21820 9eaa04 21818->21820 21825 9eaa1c 21818->21825 21819->21818 21821 9ea818 42 API calls 21820->21821 21822 9eaa0e 21821->21822 21823 9eaa19 21822->21823 21830 9ea578 21822->21830 21823->21818 21826 9eaa50 21825->21826 21828 9eaa34 21825->21828 21826->21818 21827 9eb65c 42 API calls 21827->21828 21828->21826 21828->21827 21829->21817 21831 9ea5a7 21830->21831 21832 9ea4d4 42 API calls 21831->21832 21833 9ea5bf 21832->21833 21834 9ea5ee 21833->21834 21835 9dc2bc 42 API calls 21833->21835 21836 9d4228 11 API calls 21834->21836 21835->21834 21837 9ea612 21836->21837 21837->21823 16522 a1ccec 16523 a1ccfd 16522->16523 16541 a19974 16523->16541 16525 a1cd21 16547 9f2294 16525->16547 16527 a1cd2c 16550 9f4864 16527->16550 16529 a1cd3e 16554 9f4a0c 16529->16554 16532 a1cd80 16558 a0a79c 16532->16558 16533 a1cd73 16534 9d4228 11 API calls 16533->16534 16536 a1cd7e 16534->16536 16539 9d4228 11 API calls 16536->16539 16538 9d427c 11 API calls 16538->16536 16540 a1cde3 16539->16540 16542 a1997e 16541->16542 16563 9f1204 16542->16563 16544 a19994 16567 9f406c 16544->16567 16546 a199b3 16546->16525 16548 9f22a4 VirtualAlloc 16547->16548 16549 9f22d2 16547->16549 16548->16549 16549->16527 16551 9f486a 16550->16551 16552 9f35b0 13 API calls 16551->16552 16553 9f4885 16552->16553 16553->16529 16555 9f4a1e 16554->16555 16596 9f4990 16555->16596 16618 a0a59c 16558->16618 16560 a0a7a9 16561 9d427c 11 API calls 16560->16561 16562 a0a7b3 16561->16562 16562->16538 16564 9f120b 16563->16564 16566 9f122e 16564->16566 16571 9f13bc 16564->16571 16566->16544 16568 9f4072 16567->16568 16586 9f35b0 16568->16586 16570 9f4094 16570->16546 16572 9f13d0 16571->16572 16573 9f1402 16572->16573 16575 9f188c 16572->16575 16573->16566 16577 9f189c 16575->16577 16576 9f18d5 16576->16573 16577->16576 16579 9f188c 42 API calls 16577->16579 16580 9f17fc 16577->16580 16579->16577 16581 9f181a 16580->16581 16582 9f1808 16580->16582 16584 9eb65c 42 API calls 16581->16584 16583 9eb5e8 42 API calls 16582->16583 16583->16581 16585 9f1824 16584->16585 16585->16577 16587 9f35cb 16586->16587 16594 9f3598 RtlEnterCriticalSection 16587->16594 16589 9f35d5 16590 9d28cc 11 API calls 16589->16590 16592 9f3632 16589->16592 16590->16592 16595 9f35a4 RtlLeaveCriticalSection 16592->16595 16593 9f3683 16593->16570 16594->16589 16595->16593 16603 9f3dc4 16596->16603 16604 9f3dcb RtlEnterCriticalSection 16603->16604 16605 9f3dd1 16603->16605 16604->16605 16606 9f3744 16605->16606 16616 9f3598 RtlEnterCriticalSection 16606->16616 16608 9f375d 16609 9f35b0 13 API calls 16608->16609 16610 9f3779 16609->16610 16617 9f35a4 RtlLeaveCriticalSection 16610->16617 16612 9f37ac 16613 9f3dd4 16612->16613 16614 9f3ddb RtlLeaveCriticalSection 16613->16614 16615 9f3de1 16613->16615 16614->16615 16615->16532 16615->16533 16616->16608 16617->16612 16619 a0a717 16618->16619 16620 a0a5cc 16618->16620 16621 9d4228 11 API calls 16619->16621 16623 9d4228 11 API calls 16620->16623 16622 a0a746 16621->16622 16622->16560 16624 a0a5e9 GetKeyboardLayoutList 16623->16624 16624->16619 16625 a0a600 16624->16625 16625->16619 16631 9d97d0 16625->16631 16628 a0a667 RegQueryValueExA 16629 a0a6ec RegCloseKey 16628->16629 16630 a0a69d 16628->16630 16629->16560 16630->16629 16632 9d97e0 16631->16632 16634 9d97ff RegOpenKeyExA 16631->16634 16633 9d9458 42 API calls 16632->16633 16632->16634 16633->16634 16634->16625 16634->16628 19408 9f48cc 19409 9f48e7 19408->19409 19410 9f48eb 19409->19410 19411 9f4963 19409->19411 19412 9f3dc4 RtlEnterCriticalSection 19410->19412 19427 9ebc2c 19411->19427 19414 9f48f3 19412->19414 19416 9f3dc4 RtlEnterCriticalSection 19414->19416 19415 9f496e 19417 9f490b 19416->19417 19422 9f37bc 19417->19422 19420 9f3dd4 RtlLeaveCriticalSection 19421 9f493e 19420->19421 19432 9f3598 RtlEnterCriticalSection 19422->19432 19425 9f3817 19425->19420 19426 9f37d2 19433 9f35a4 RtlLeaveCriticalSection 19426->19433 19428 9ebc36 19427->19428 19429 9ebc30 19427->19429 19434 9ebc40 19428->19434 19429->19415 19432->19426 19433->19425 19435 9ebc66 19434->19435 19436 9ebc83 19434->19436 19438 9dc2bc 42 API calls 19435->19438 19437 9d42c0 11 API calls 19436->19437 19437->19435 19439 9ebcdb 19438->19439 19440 9d4228 11 API calls 19439->19440 19441 9ebc3d 19440->19441 19441->19415 21948 9f59c4 21955 9d2ac8 21948->21955 21951 9f5a1e GetSystemPaletteEntries 21953 9f5a3e GetSystemPaletteEntries GetSystemPaletteEntries GetSystemPaletteEntries 21951->21953 21954 9f5a8a GetSystemPaletteEntries 21951->21954 21952 9f5aa8 ReleaseDC 21953->21952 21954->21952 21956 9d2ad4 GetDC GetDeviceCaps 21955->21956 21956->21951 21956->21952 19802 9eaee4 19809 9ea9f8 RtlEnterCriticalSection 19802->19809 19804 9eaef7 19810 9ea930 19804->19810 19808 9eaf2a 19809->19804 19820 9ea818 19810->19820 19814 9ea95c 19815 9ea9f0 19814->19815 19816 9eb65c 42 API calls 19814->19816 19817 9ea818 42 API calls 19814->19817 19818 9eb54c 42 API calls 19814->19818 19819 9eaab0 RtlLeaveCriticalSection 19815->19819 19816->19814 19817->19814 19818->19814 19819->19808 19821 9ea854 19820->19821 19823 9ea82f 19820->19823 19821->19814 19825 9ea8a0 19821->19825 19822 9eb65c 42 API calls 19822->19823 19823->19821 19823->19822 19833 9ea3a8 19823->19833 19826 9ea8d0 19825->19826 19827 9d64b0 42 API calls 19826->19827 19828 9ea8f3 19827->19828 19829 9dc200 42 API calls 19828->19829 19830 9ea905 19829->19830 19831 9d4228 11 API calls 19830->19831 19832 9ea922 19831->19832 19832->19814 19834 9ea3bb 19833->19834 19835 9ea3c4 19833->19835 19839 9ea348 19834->19839 19837 9ea348 42 API calls 19835->19837 19838 9ea3da 19835->19838 19837->19838 19838->19823 19840 9ea39e 19839->19840 19842 9ea366 19839->19842 19840->19835 19841 9eb65c 42 API calls 19841->19842 19842->19840 19842->19841 16248 9d2808 16249 9d281c 16248->16249 16250 9d282f 16248->16250 16286 9d1c0c RtlInitializeCriticalSection 16249->16286 16252 9d2846 RtlEnterCriticalSection 16250->16252 16253 9d2850 16250->16253 16252->16253 16264 9d262c 16253->16264 16256 9d2825 16258 9d28b8 16256->16258 16259 9d285d 16259->16258 16261 9d28ae RtlLeaveCriticalSection 16259->16261 16261->16258 16262 9d2869 16262->16259 16293 9d2488 16262->16293 16265 9d2640 16264->16265 16266 9d265d 16265->16266 16268 9d266c 16265->16268 16271 9d26ef 16265->16271 16266->16259 16274 9d22f8 16266->16274 16268->16266 16307 9d1e74 16268->16307 16271->16266 16272 9d278c 16271->16272 16310 9d20a0 16271->16310 16318 9d21a4 16271->16318 16272->16266 16314 9d2018 16272->16314 16275 9d230c 16274->16275 16276 9d2315 16274->16276 16277 9d1c0c 4 API calls 16275->16277 16279 9d233e RtlEnterCriticalSection 16276->16279 16280 9d2348 16276->16280 16285 9d231d 16276->16285 16278 9d2311 16277->16278 16278->16276 16278->16285 16279->16280 16280->16285 16400 9d2204 16280->16400 16283 9d2469 RtlLeaveCriticalSection 16284 9d2473 16283->16284 16284->16262 16285->16262 16287 9d1c3a 16286->16287 16288 9d1c30 RtlEnterCriticalSection 16286->16288 16289 9d1c58 LocalAlloc 16287->16289 16288->16287 16290 9d1c72 16289->16290 16291 9d1cb7 RtlLeaveCriticalSection 16290->16291 16292 9d1cc1 16290->16292 16291->16292 16292->16250 16292->16256 16294 9d24a1 16293->16294 16295 9d24a6 16293->16295 16298 9d1c0c 4 API calls 16294->16298 16296 9d24d7 RtlEnterCriticalSection 16295->16296 16297 9d24e1 16295->16297 16304 9d24aa 16295->16304 16296->16297 16299 9d24ed 16297->16299 16300 9d2570 16297->16300 16305 9d259c 16297->16305 16298->16295 16301 9d260f RtlLeaveCriticalSection 16299->16301 16302 9d2619 16299->16302 16303 9d20a0 7 API calls 16300->16303 16300->16304 16301->16302 16302->16259 16303->16304 16304->16259 16305->16299 16306 9d2018 7 API calls 16305->16306 16306->16299 16308 9d2488 9 API calls 16307->16308 16309 9d1e95 16308->16309 16309->16266 16311 9d20a9 16310->16311 16313 9d20b2 16310->16313 16312 9d1e74 9 API calls 16311->16312 16311->16313 16312->16313 16313->16271 16315 9d206d 16314->16315 16316 9d2036 16314->16316 16315->16316 16323 9d1f68 16315->16323 16316->16266 16378 9d1a5c 16318->16378 16320 9d21b9 16321 9d21c6 16320->16321 16389 9d20ec 16320->16389 16321->16271 16324 9d1f7e 16323->16324 16325 9d1fbd 16324->16325 16326 9d1fa9 16324->16326 16335 9d2006 16324->16335 16328 9d1b80 3 API calls 16325->16328 16336 9d1b80 16326->16336 16329 9d1fbb 16328->16329 16329->16335 16346 9d1e44 16329->16346 16331 9d1fe1 16332 9d1ffb 16331->16332 16351 9d1e98 16331->16351 16356 9d1690 16332->16356 16335->16316 16337 9d1ba6 16336->16337 16338 9d1bff 16336->16338 16360 9d194c 16337->16360 16338->16329 16343 9d1bda 16343->16338 16345 9d1690 LocalAlloc 16343->16345 16345->16338 16347 9d1e61 16346->16347 16348 9d1e52 16346->16348 16347->16331 16349 9d2018 9 API calls 16348->16349 16350 9d1e5f 16349->16350 16350->16331 16352 9d1e9d 16351->16352 16353 9d1eab 16351->16353 16354 9d1e74 9 API calls 16352->16354 16353->16332 16355 9d1eaa 16354->16355 16355->16332 16357 9d169b 16356->16357 16358 9d16b6 16357->16358 16359 9d15d8 LocalAlloc 16357->16359 16358->16335 16359->16358 16362 9d1983 16360->16362 16361 9d19c3 16364 9d1620 16361->16364 16362->16361 16363 9d199d VirtualFree 16362->16363 16363->16362 16365 9d163c 16364->16365 16372 9d15d8 16365->16372 16368 9d1800 16371 9d182f 16368->16371 16369 9d1888 16369->16343 16370 9d185c VirtualFree 16370->16371 16371->16369 16371->16370 16375 9d1580 16372->16375 16376 9d158c LocalAlloc 16375->16376 16377 9d159e 16375->16377 16376->16377 16377->16343 16377->16368 16380 9d1a7b 16378->16380 16379 9d1b2f 16385 9d1adb 16379->16385 16396 9d18b8 16379->16396 16380->16379 16381 9d1788 LocalAlloc VirtualAlloc VirtualAlloc VirtualFree 16380->16381 16382 9d1620 LocalAlloc 16380->16382 16384 9d1b15 16380->16384 16387 9d1aca 16380->16387 16381->16380 16382->16380 16386 9d1800 VirtualFree 16384->16386 16385->16320 16386->16385 16388 9d1800 VirtualFree 16387->16388 16388->16385 16390 9d20a0 9 API calls 16389->16390 16391 9d2100 16390->16391 16392 9d1620 LocalAlloc 16391->16392 16394 9d2110 16392->16394 16393 9d2118 16393->16321 16394->16393 16395 9d1e44 9 API calls 16394->16395 16395->16393 16397 9d18fe 16396->16397 16398 9d191a VirtualAlloc 16397->16398 16399 9d192e 16397->16399 16398->16397 16398->16399 16399->16385 16403 9d2214 16400->16403 16401 9d2240 16402 9d2018 9 API calls 16401->16402 16405 9d2264 16401->16405 16402->16405 16403->16401 16403->16405 16406 9d2178 16403->16406 16405->16283 16405->16284 16411 9d19cc 16406->16411 16408 9d2188 16409 9d2195 16408->16409 16410 9d20ec 9 API calls 16408->16410 16409->16403 16410->16409 16412 9d19e8 16411->16412 16413 9d19f2 16412->16413 16416 9d1620 LocalAlloc 16412->16416 16417 9d1a43 16412->16417 16418 9d19fe 16412->16418 16420 9d1724 16412->16420 16415 9d18b8 VirtualAlloc 16413->16415 16415->16418 16416->16412 16419 9d1800 VirtualFree 16417->16419 16418->16408 16419->16418 16421 9d1733 VirtualAlloc 16420->16421 16423 9d1760 16421->16423 16424 9d1783 16421->16424 16425 9d15d8 LocalAlloc 16423->16425 16424->16412 16426 9d176c 16425->16426 16426->16424 16427 9d1770 VirtualFree 16426->16427 16427->16424 16635 9d5d00 lstrcpyn GetThreadLocale GetLocaleInfoA 16636 9d5e1a 16635->16636 16637 9d5d37 16635->16637 16637->16636 16638 9d5d47 lstrlen 16637->16638 16639 9d5d5f 16638->16639 16639->16636 16640 9d5dac 16639->16640 16641 9d5d84 lstrcpyn LoadLibraryExA 16639->16641 16640->16636 16642 9d5db6 lstrcpyn LoadLibraryExA 16640->16642 16641->16640 16642->16636 16643 9d5de8 lstrcpyn LoadLibraryExA 16642->16643 16643->16636 22301 9eaf38 22308 9ea9f8 RtlEnterCriticalSection 22301->22308 22303 9eaf49 22309 9ea6fc 22303->22309 22307 9eaf85 22308->22303 22310 9ea73f 22309->22310 22312 9ea70e 22309->22312 22314 9eaab0 RtlLeaveCriticalSection 22310->22314 22311 9eb65c 42 API calls 22311->22312 22312->22310 22312->22311 22313 9ea534 42 API calls 22312->22313 22313->22312 22314->22307 16644 9d8930 16645 9d893d 16644->16645 16646 9d8955 CompareStringA 16645->16646 20344 9d7630 20348 9d2b24 20344->20348 20346 9d7643 CreateWindowExA 20347 9d767b 20346->20347 20348->20346 20360 9ef230 20361 9ef292 20360->20361 20362 9ef243 20360->20362 20363 9ef2a0 76 API calls 20361->20363 20371 9ef2a0 20362->20371 20364 9ef29c 20363->20364 20368 9ef275 20398 9ee934 20368->20398 20370 9ef28a 20372 9ef2b0 20371->20372 20374 9ef2c6 20372->20374 20402 9ef7a8 20372->20402 20416 9ee6d8 20372->20416 20419 9ef644 20374->20419 20377 9ee6d8 42 API calls 20378 9ef2ce 20377->20378 20378->20377 20379 9ef33a 20378->20379 20422 9eeff4 20378->20422 20381 9ef644 42 API calls 20379->20381 20382 9ef26d 20381->20382 20383 9ee7f0 20382->20383 20384 9ee8e9 20383->20384 20396 9ee81d 20383->20396 20385 9d4228 11 API calls 20384->20385 20388 9ee8fe 20385->20388 20386 9ee8cc 20387 9ee934 42 API calls 20386->20387 20389 9ee8e1 20387->20389 20388->20368 20389->20368 20390 9eb65c 42 API calls 20390->20396 20391 9d42c0 11 API calls 20391->20396 20392 9ee0e0 42 API calls 20392->20396 20395 9eb96c 44 API calls 20395->20396 20396->20386 20396->20390 20396->20391 20396->20392 20396->20395 20977 9ee774 20396->20977 20985 9ee004 20396->20985 20991 9eb750 20396->20991 20399 9ee95e 20398->20399 20401 9ee940 20398->20401 20399->20370 20400 9eb65c 42 API calls 20400->20401 20401->20399 20401->20400 20403 9f02a0 42 API calls 20402->20403 20406 9ef7e3 20403->20406 20404 9d4748 11 API calls 20404->20406 20405 9ef8a2 20407 9ef8bd 20405->20407 20411 9ef8cc 20405->20411 20406->20404 20406->20405 20442 9eea2c 20406->20442 20447 9ef78c 20406->20447 20452 9efb2c 20407->20452 20410 9ef8ca 20414 9d4228 11 API calls 20410->20414 20411->20410 20412 9eea2c 42 API calls 20411->20412 20412->20410 20415 9ef977 20414->20415 20415->20372 20417 9f047c 42 API calls 20416->20417 20418 9ee6e2 20417->20418 20418->20372 20420 9ee5a4 42 API calls 20419->20420 20421 9ef64b 20420->20421 20421->20378 20423 9ef02a 20422->20423 20424 9f02a0 42 API calls 20423->20424 20425 9ef035 20424->20425 20426 9f02a0 42 API calls 20425->20426 20427 9ef040 20426->20427 20428 9ef078 20427->20428 20429 9ef07b 20427->20429 20430 9ef072 20427->20430 20441 9ef0e0 20428->20441 20943 9eec40 20428->20943 20940 9eeda0 20429->20940 20937 9eef50 20430->20937 20434 9ef0a3 20436 9ef0c7 20434->20436 20948 9eeeb0 20434->20948 20437 9d424c 11 API calls 20436->20437 20436->20441 20438 9ef206 20437->20438 20439 9d5924 13 API calls 20438->20439 20440 9ef214 20439->20440 20440->20378 20441->20378 20517 9f058c 20442->20517 20446 9eea3b 20446->20406 20448 9f058c 42 API calls 20447->20448 20449 9ef79a 20448->20449 20450 9ee500 42 API calls 20449->20450 20451 9ef7a4 20450->20451 20451->20406 20468 9efb35 20452->20468 20453 9efba1 20456 9efcfe 20453->20456 20457 9efdd9 20453->20457 20458 9efdd0 20453->20458 20459 9efdf0 20453->20459 20460 9efd6c 20453->20460 20461 9efca6 20453->20461 20462 9efc87 20453->20462 20463 9efc44 20453->20463 20464 9efcc4 20453->20464 20465 9efce2 20453->20465 20466 9efc00 20453->20466 20467 9efc60 20453->20467 20482 9efc25 20453->20482 20454 9ee500 42 API calls 20454->20453 20455 9d424c 11 API calls 20478 9efe11 20455->20478 20470 9eea1c 42 API calls 20456->20470 20747 9ef5f8 20457->20747 20740 9efa10 20458->20740 20757 9efa6c 20459->20757 20480 9eea1c 42 API calls 20460->20480 20660 9f02dc 20461->20660 20652 9ef370 20462->20652 20645 9eeadc 20463->20645 20682 9f0398 20464->20682 20712 9f01c0 20465->20712 20479 9eea1c 42 API calls 20466->20479 20472 9ef48c 42 API calls 20467->20472 20468->20453 20468->20454 20483 9efd06 20470->20483 20484 9efc6b 20472->20484 20486 9d4934 SysFreeString 20478->20486 20487 9efc08 20479->20487 20488 9efd74 20480->20488 20482->20455 20490 9efd0a 20483->20490 20491 9efd10 20483->20491 20492 9e7c54 42 API calls 20484->20492 20494 9efe19 20486->20494 20495 9efc0c 20487->20495 20496 9efc2a 20487->20496 20497 9efd78 20488->20497 20498 9efd92 20488->20498 20502 9efd0e 20490->20502 20503 9efd2a 20490->20503 20504 9f047c 42 API calls 20491->20504 20492->20482 20493 9e8370 15 API calls 20493->20482 20505 9d424c 11 API calls 20494->20505 20604 9ef48c 20495->20604 20631 9ef58c 20496->20631 20507 9f047c 42 API calls 20497->20507 20501 9ef48c 42 API calls 20498->20501 20499 9e8484 15 API calls 20499->20482 20501->20482 20512 9ef48c 42 API calls 20502->20512 20508 9f047c 42 API calls 20503->20508 20504->20482 20509 9efe26 20505->20509 20507->20482 20511 9efd32 20508->20511 20509->20410 20722 9eeb34 20511->20722 20514 9efd58 20512->20514 20737 9ef9d0 20514->20737 20558 9f047c 20517->20558 20520 9f065e 20547 9f0984 42 API calls 20520->20547 20521 9f06be 20540 9f0984 42 API calls 20521->20540 20522 9f061c 20561 9f04d8 20522->20561 20523 9f06dc 20544 9f0500 42 API calls 20523->20544 20524 9f063a 20543 9f0984 42 API calls 20524->20543 20525 9f06f9 20548 9f0500 42 API calls 20525->20548 20526 9f0698 20553 9f0500 42 API calls 20526->20553 20527 9f0670 20549 9f02a0 42 API calls 20527->20549 20528 9f06af 20538 9f0984 42 API calls 20528->20538 20529 9f068e 20577 9f0490 20529->20577 20530 9f06cd 20542 9f0984 42 API calls 20530->20542 20531 9f064c 20545 9f0984 42 API calls 20531->20545 20532 9f06ea 20546 9f0984 42 API calls 20532->20546 20533 9f0628 20568 9f0984 20533->20568 20534 9f06a6 20583 9f0530 20534->20583 20535 9f0680 20572 9f0500 20535->20572 20536 9d4228 11 API calls 20550 9eea34 20536->20550 20554 9f0622 20538->20554 20540->20554 20542->20554 20543->20554 20544->20554 20545->20554 20546->20554 20547->20554 20548->20554 20549->20554 20555 9ee524 20550->20555 20553->20554 20554->20536 20556 9dc2bc 42 API calls 20555->20556 20557 9ee547 20556->20557 20557->20446 20559 9eea40 42 API calls 20558->20559 20560 9f0489 20559->20560 20560->20520 20560->20521 20560->20522 20560->20523 20560->20524 20560->20525 20560->20526 20560->20527 20560->20528 20560->20529 20560->20530 20560->20531 20560->20532 20560->20533 20560->20534 20560->20535 20560->20554 20562 9f04e4 20561->20562 20563 9ee6d8 42 API calls 20562->20563 20564 9f04f6 20562->20564 20565 9f058c 42 API calls 20562->20565 20563->20562 20566 9ef644 42 API calls 20564->20566 20565->20562 20567 9f04fd 20566->20567 20567->20554 20569 9f0994 20568->20569 20570 9f09c3 20568->20570 20569->20570 20571 9eea40 42 API calls 20569->20571 20570->20554 20571->20569 20573 9eea40 42 API calls 20572->20573 20574 9f051a 20573->20574 20575 9f0984 42 API calls 20574->20575 20576 9f052b 20575->20576 20576->20554 20578 9f04a6 20577->20578 20579 9f02a0 42 API calls 20578->20579 20580 9f04b6 20578->20580 20579->20578 20581 9d4228 11 API calls 20580->20581 20582 9f04cb 20581->20582 20582->20554 20584 9f053c 20583->20584 20585 9f0582 20584->20585 20589 9f058c 42 API calls 20584->20589 20590 9f0984 42 API calls 20584->20590 20591 9ee6d8 42 API calls 20584->20591 20593 9ef644 42 API calls 20584->20593 20594 9eea1c 20584->20594 20597 9f0728 20584->20597 20587 9ef644 42 API calls 20585->20587 20588 9f0589 20587->20588 20588->20554 20589->20584 20590->20584 20591->20584 20593->20584 20595 9f047c 42 API calls 20594->20595 20596 9eea26 20595->20596 20596->20584 20598 9f02a0 42 API calls 20597->20598 20599 9f0748 20598->20599 20600 9f058c 42 API calls 20599->20600 20601 9f074f 20600->20601 20602 9d4228 11 API calls 20601->20602 20603 9f0764 20602->20603 20603->20584 20605 9f047c 42 API calls 20604->20605 20606 9ef49a 20605->20606 20607 9ef544 20606->20607 20608 9ef50c 20606->20608 20609 9ef51a 20606->20609 20610 9ef528 20606->20610 20611 9ef4d9 20606->20611 20612 9ef536 20606->20612 20769 9ee518 20607->20769 20618 9d427c 11 API calls 20608->20618 20619 9d427c 11 API calls 20609->20619 20614 9d427c 11 API calls 20610->20614 20615 9eea40 42 API calls 20611->20615 20616 9d427c 11 API calls 20612->20616 20617 9ef50a 20614->20617 20620 9ef4e7 20615->20620 20616->20617 20626 9ef988 20617->20626 20618->20617 20619->20617 20621 9d4318 11 API calls 20620->20621 20622 9ef4f5 20621->20622 20623 9d4740 11 API calls 20622->20623 20624 9ef4fc 20623->20624 20625 9eea40 42 API calls 20624->20625 20625->20617 20772 9eb050 20626->20772 20628 9ee518 42 API calls 20630 9ef9b2 20628->20630 20629 9ef9a1 20629->20628 20629->20630 20630->20482 20632 9f047c 42 API calls 20631->20632 20633 9ef599 20632->20633 20634 9ef59d 20633->20634 20635 9ef5a7 20633->20635 20636 9ef5c1 20634->20636 20637 9ef5a1 20634->20637 20638 9eea40 42 API calls 20635->20638 20641 9eea40 42 API calls 20636->20641 20639 9ef5db 20637->20639 20640 9ef5a5 20637->20640 20642 9ef5b7 20638->20642 20643 9eea40 42 API calls 20639->20643 20644 9ee518 42 API calls 20640->20644 20641->20642 20642->20482 20643->20642 20644->20642 20646 9f02dc 48 API calls 20645->20646 20648 9eeafc 20646->20648 20647 9eeb0c 20650 9d4228 11 API calls 20647->20650 20648->20647 20649 9ee518 42 API calls 20648->20649 20649->20647 20651 9eeb26 20650->20651 20651->20482 20653 9f047c 42 API calls 20652->20653 20654 9ef37d 20653->20654 20655 9ef391 20654->20655 20656 9ef381 20654->20656 20658 9ef5f8 42 API calls 20655->20658 20657 9eea40 42 API calls 20656->20657 20659 9ef38f 20657->20659 20658->20659 20659->20482 20661 9eea1c 42 API calls 20660->20661 20662 9f0302 20661->20662 20663 9f030a 20662->20663 20664 9f0320 20662->20664 20665 9f0398 48 API calls 20663->20665 20666 9f047c 42 API calls 20664->20666 20670 9f0314 20665->20670 20667 9f032c 20666->20667 20668 9f0336 20667->20668 20669 9f0330 20667->20669 20673 9eea40 42 API calls 20668->20673 20671 9f0347 20669->20671 20672 9f0334 20669->20672 20674 9d4934 SysFreeString 20670->20674 20676 9eea40 42 API calls 20671->20676 20678 9ee518 42 API calls 20672->20678 20675 9f0345 20673->20675 20677 9efcb1 20674->20677 20679 9d4874 11 API calls 20675->20679 20676->20675 20677->20493 20678->20675 20680 9f0367 20679->20680 20681 9eea40 42 API calls 20680->20681 20681->20670 20683 9eea1c 42 API calls 20682->20683 20684 9f03bc 20683->20684 20685 9f03c4 20684->20685 20686 9f03da 20684->20686 20687 9f02dc 48 API calls 20685->20687 20689 9f047c 42 API calls 20686->20689 20688 9f03ce 20687->20688 20697 9d4228 11 API calls 20688->20697 20690 9f03e6 20689->20690 20691 9f03ea 20690->20691 20692 9f03f0 20690->20692 20693 9f0419 20691->20693 20695 9f03ee 20691->20695 20694 9eea40 42 API calls 20692->20694 20698 9eea40 42 API calls 20693->20698 20696 9f03ff 20694->20696 20699 9ee518 42 API calls 20695->20699 20700 9d4d8c 2 API calls 20696->20700 20701 9f0466 20697->20701 20702 9f0428 20698->20702 20699->20688 20703 9f0409 20700->20703 20704 9d4228 11 API calls 20701->20704 20705 9d4874 11 API calls 20702->20705 20706 9eea40 42 API calls 20703->20706 20707 9efccf 20704->20707 20708 9f0433 20705->20708 20706->20688 20707->20499 20709 9eea40 42 API calls 20708->20709 20710 9f0440 20709->20710 20782 9d63bc 20710->20782 20713 9f047c 42 API calls 20712->20713 20714 9f01f7 20713->20714 20715 9ee518 42 API calls 20714->20715 20717 9f0200 20714->20717 20715->20717 20716 9f02a0 42 API calls 20716->20717 20717->20716 20718 9f0233 20717->20718 20796 9ee550 20717->20796 20720 9d4228 11 API calls 20718->20720 20721 9f0269 20720->20721 20721->20482 20723 9eeb47 20722->20723 20724 9ee6d8 42 API calls 20723->20724 20725 9eeb5c 20724->20725 20734 9eeb68 20725->20734 20801 9ebea8 20725->20801 20727 9eebb7 20729 9ef644 42 API calls 20727->20729 20728 9eea1c 42 API calls 20728->20734 20730 9eebbe 20729->20730 20730->20482 20731 9ef58c 42 API calls 20731->20734 20733 9ee6d8 42 API calls 20733->20734 20734->20727 20734->20728 20734->20731 20734->20733 20735 9ef7a8 73 API calls 20734->20735 20736 9ef644 42 API calls 20734->20736 20806 9ef63c 20734->20806 20735->20734 20736->20734 20816 9edfac 20737->20816 20739 9ef9f8 20739->20482 20822 9f0b94 20740->20822 20743 9e88bc 59 API calls 20744 9efa49 20743->20744 20745 9dfaa8 51 API calls 20744->20745 20746 9efa5e 20745->20746 20746->20482 20748 9eea1c 42 API calls 20747->20748 20749 9ef605 20748->20749 20750 9ef609 20749->20750 20751 9ef620 20749->20751 20753 9f047c 42 API calls 20750->20753 20752 9ef58c 42 API calls 20751->20752 20754 9ef61e 20752->20754 20755 9ef610 20753->20755 20754->20482 20756 9eea40 42 API calls 20755->20756 20756->20754 20758 9eea1c 42 API calls 20757->20758 20759 9efa8c 20758->20759 20760 9efab9 20759->20760 20761 9efa90 20759->20761 20763 9ef48c 42 API calls 20760->20763 20762 9f047c 42 API calls 20761->20762 20766 9efa9b 20762->20766 20764 9efada 20763->20764 20765 9edfac 11 API calls 20764->20765 20765->20766 20767 9d4228 11 API calls 20766->20767 20768 9efb15 20767->20768 20768->20482 20770 9ee500 42 API calls 20769->20770 20771 9ee522 20770->20771 20771->20617 20780 9eb9f4 RtlEnterCriticalSection 20772->20780 20774 9eb0a2 20781 9eba58 RtlLeaveCriticalSection 20774->20781 20775 9eb65c 42 API calls 20777 9eb068 20775->20777 20777->20774 20777->20775 20779 9eb08f 20777->20779 20778 9eb0b9 20778->20629 20779->20629 20780->20777 20781->20778 20783 9d4934 SysFreeString 20782->20783 20785 9d63dc 20783->20785 20784 9d643d 20786 9d4934 SysFreeString 20784->20786 20785->20784 20788 9d4d8c 2 API calls 20785->20788 20787 9d6452 20786->20787 20787->20688 20789 9d63f1 20788->20789 20790 9d641e 20789->20790 20791 9d642b 20789->20791 20792 9d4d8c 2 API calls 20790->20792 20793 9d4934 SysFreeString 20791->20793 20794 9d6429 20792->20794 20793->20794 20795 9d4970 3 API calls 20794->20795 20795->20784 20797 9e7c54 42 API calls 20796->20797 20798 9ee556 20797->20798 20799 9ee562 20798->20799 20800 9ee518 42 API calls 20798->20800 20799->20717 20800->20799 20802 9ebf09 20801->20802 20804 9ebebc 20801->20804 20802->20734 20803 9ebeec 20803->20734 20804->20803 20805 9eb744 42 API calls 20804->20805 20805->20804 20809 9ee5a4 20806->20809 20810 9f047c 42 API calls 20809->20810 20811 9ee5b1 20810->20811 20812 9ee5c4 20811->20812 20813 9f058c 42 API calls 20811->20813 20812->20734 20814 9ee5bf 20813->20814 20815 9ee518 42 API calls 20814->20815 20815->20812 20817 9edfb5 20816->20817 20818 9d427c 11 API calls 20817->20818 20819 9edfdb 20818->20819 20820 9d427c 11 API calls 20819->20820 20821 9edfe6 20820->20821 20821->20739 20823 9dfa94 51 API calls 20822->20823 20824 9f0bbb 20823->20824 20825 9eea1c 42 API calls 20824->20825 20826 9f0bc3 20825->20826 20827 9f0d51 20826->20827 20828 9f0d3e 20826->20828 20829 9f0c7c 20826->20829 20830 9f0cbc 20826->20830 20831 9f0cfb 20826->20831 20832 9f0c94 20826->20832 20833 9f0d12 20826->20833 20834 9f0cd0 20826->20834 20835 9f0c2a 20826->20835 20836 9f0d28 20826->20836 20837 9f0ca8 20826->20837 20838 9f0c46 20826->20838 20839 9f0ce4 20826->20839 20840 9f0c61 20826->20840 20841 9dc280 42 API calls 20827->20841 20850 9ef5f8 42 API calls 20828->20850 20845 9ef58c 42 API calls 20829->20845 20896 9ef3f8 20830->20896 20844 9f0398 48 API calls 20831->20844 20847 9ef370 42 API calls 20832->20847 20846 9f047c 42 API calls 20833->20846 20904 9ef448 20834->20904 20852 9f047c 42 API calls 20835->20852 20915 9f09cc 20836->20915 20888 9ef3b4 20837->20888 20854 9ef58c 42 API calls 20838->20854 20842 9f02dc 48 API calls 20839->20842 20843 9ef58c 42 API calls 20840->20843 20867 9f0c41 20841->20867 20856 9f0cef 20842->20856 20857 9f0c69 20843->20857 20858 9f0d06 20844->20858 20859 9f0c84 20845->20859 20860 9f0d1a 20846->20860 20861 9f0c9c 20847->20861 20864 9f0d46 20850->20864 20866 9f0c32 20852->20866 20855 9f0c4e 20854->20855 20869 9e3e9c 51 API calls 20855->20869 20870 9e40f0 51 API calls 20856->20870 20871 9e3e9c 51 API calls 20857->20871 20872 9e416c 55 API calls 20858->20872 20873 9e3e9c 51 API calls 20859->20873 20874 9e408c 51 API calls 20860->20874 20875 9e40b4 51 API calls 20861->20875 20862 9f0d31 20876 9dfdbc 59 API calls 20862->20876 20878 9e3fb8 51 API calls 20864->20878 20866->20867 20881 9e7014 51 API calls 20866->20881 20882 9dfaa8 51 API calls 20867->20882 20869->20867 20870->20867 20871->20867 20872->20867 20873->20867 20874->20867 20875->20867 20876->20867 20877 9e40b4 51 API calls 20877->20867 20878->20867 20879 9e40dc 51 API calls 20879->20867 20881->20867 20883 9f0d7d 20882->20883 20884 9d4934 SysFreeString 20883->20884 20885 9f0d85 20884->20885 20886 9d4228 11 API calls 20885->20886 20887 9efa35 20886->20887 20887->20743 20889 9f047c 42 API calls 20888->20889 20890 9ef3c1 20889->20890 20891 9ef3d5 20890->20891 20892 9ef3c5 20890->20892 20894 9ef5f8 42 API calls 20891->20894 20893 9eea40 42 API calls 20892->20893 20895 9ef3d3 20893->20895 20894->20895 20895->20877 20897 9f047c 42 API calls 20896->20897 20898 9ef405 20897->20898 20899 9ef419 20898->20899 20900 9ef409 20898->20900 20902 9ef5f8 42 API calls 20899->20902 20901 9eea40 42 API calls 20900->20901 20903 9ef417 20901->20903 20902->20903 20903->20879 20905 9f047c 42 API calls 20904->20905 20906 9ef455 20905->20906 20907 9ef469 20906->20907 20908 9ef459 20906->20908 20910 9ef5f8 42 API calls 20907->20910 20909 9eea40 42 API calls 20908->20909 20911 9ef467 20909->20911 20910->20911 20912 9e40c8 20911->20912 20913 9dfa94 51 API calls 20912->20913 20914 9e40ce 20913->20914 20914->20867 20916 9ee5a4 42 API calls 20915->20916 20917 9f09f8 20916->20917 20918 9eea40 42 API calls 20917->20918 20919 9f0a3c 20918->20919 20920 9eea40 42 API calls 20919->20920 20921 9f0a5e 20920->20921 20922 9ede60 11 API calls 20921->20922 20923 9f0a72 20922->20923 20924 9f02dc 48 API calls 20923->20924 20925 9f0a8e 20924->20925 20926 9eea40 42 API calls 20925->20926 20927 9f0a9e 20926->20927 20928 9eea40 42 API calls 20927->20928 20929 9f0abd 20928->20929 20934 9e6f2c RtlEnterCriticalSection 20929->20934 20931 9dc280 42 API calls 20933 9f0af9 20931->20933 20932 9f0ac8 20932->20931 20932->20933 20933->20862 20936 9e6f77 20934->20936 20935 9e6fcd RtlLeaveCriticalSection 20935->20932 20936->20935 20952 9f0910 20937->20952 20939 9eef75 20939->20428 20941 9f0910 44 API calls 20940->20941 20942 9eedc5 20941->20942 20942->20428 20947 9eec4f 20943->20947 20944 9eecb2 20944->20434 20945 9f17fc 42 API calls 20945->20947 20946 9d5804 16 API calls 20946->20947 20947->20944 20947->20945 20947->20946 20950 9eeedc 20948->20950 20949 9eef0a 20949->20436 20950->20949 20951 9eb1a8 42 API calls 20950->20951 20951->20949 20959 9ee970 20952->20959 20954 9f0946 20957 9eacfc 42 API calls 20954->20957 20958 9f097a 20954->20958 20956 9ee970 44 API calls 20956->20954 20957->20958 20958->20939 20965 9ee985 20959->20965 20960 9ee9ef 20963 9ead68 44 API calls 20960->20963 20961 9ee9e2 20966 9eac68 20961->20966 20964 9ee9eb 20963->20964 20964->20954 20964->20956 20965->20960 20965->20961 20965->20964 20975 9ea9f8 RtlEnterCriticalSection 20966->20975 20968 9eacc7 20976 9eaab0 RtlLeaveCriticalSection 20968->20976 20970 9eacde 20970->20964 20971 9eb65c 42 API calls 20972 9eac85 20971->20972 20972->20968 20972->20971 20973 9ea4d4 42 API calls 20972->20973 20974 9eacbc 20972->20974 20973->20972 20974->20964 20975->20972 20976->20970 20995 9eb9f4 RtlEnterCriticalSection 20977->20995 20979 9ee7cc 20996 9eba58 RtlLeaveCriticalSection 20979->20996 20980 9eb65c 42 API calls 20983 9ee786 20980->20983 20982 9ee7e3 20982->20396 20983->20979 20983->20980 20984 9eb54c 42 API calls 20983->20984 20984->20983 20986 9ee013 20985->20986 20987 9ee044 20986->20987 20988 9d4318 11 API calls 20986->20988 20987->20396 20989 9ee034 20988->20989 20997 9d4788 20989->20997 20992 9eb75d 20991->20992 20993 9eb5e8 42 API calls 20992->20993 20994 9eb771 20992->20994 20993->20994 20994->20396 20995->20983 20996->20982 21002 9d4738 20997->21002 20999 9d47cc 20999->20987 21000 9d4796 21000->20999 21001 9d4874 11 API calls 21000->21001 21001->20999 21003 9d46f4 21002->21003 21004 9d472f 21003->21004 21005 9d42ec 11 API calls 21003->21005 21004->21000 21006 9d470b 21005->21006 21006->21004 21007 9d28ec 11 API calls 21006->21007 21007->21004 21037 9f242c 21038 9f2445 21037->21038 21050 9f24ae 21037->21050 21051 9eae4c 21038->21051 21044 9f2467 21045 9d67a4 4 API calls 21044->21045 21046 9f2476 21045->21046 21075 9d5e6c 21046->21075 21048 9f249f 21078 9f1024 RtlDeleteCriticalSection CloseHandle 21048->21078 21079 9ea9f8 RtlEnterCriticalSection 21051->21079 21053 9eae5c 21080 9eaabc 21053->21080 21057 9eae8d 21058 9f21f8 21057->21058 21103 9eb9f4 RtlEnterCriticalSection 21058->21103 21060 9f2208 21061 9f2235 21060->21061 21063 9eb65c 42 API calls 21060->21063 21104 9eba58 RtlLeaveCriticalSection 21061->21104 21063->21060 21064 9f224c 21065 9ee3d0 21064->21065 21066 9ee3ec 21065->21066 21067 9ee472 21065->21067 21105 9eb9f4 RtlEnterCriticalSection 21066->21105 21067->21044 21069 9ee3f6 21070 9ee453 21069->21070 21072 9eb65c 42 API calls 21069->21072 21074 9eb54c 42 API calls 21069->21074 21106 9eba58 RtlLeaveCriticalSection 21070->21106 21072->21069 21073 9ee46a 21073->21044 21074->21069 21107 9d5e94 21075->21107 21077 9d5e71 21077->21048 21078->21050 21079->21053 21081 9eab05 21080->21081 21083 9eaad0 21080->21083 21086 9eaab0 RtlLeaveCriticalSection 21081->21086 21082 9eb65c 42 API calls 21082->21083 21083->21081 21083->21082 21085 9eb54c 42 API calls 21083->21085 21087 9ea658 21083->21087 21085->21083 21086->21057 21093 9ea66b 21087->21093 21095 9ea690 21087->21095 21088 9eb65c 42 API calls 21088->21093 21089 9eb65c 42 API calls 21089->21095 21091 9ea6f6 21091->21083 21092 9ea638 VirtualQuery 21092->21095 21093->21088 21094 9eb54c 42 API calls 21093->21094 21093->21095 21099 9ea638 21093->21099 21094->21093 21095->21089 21095->21092 21096 9eb54c 42 API calls 21095->21096 21098 9ea6c1 21095->21098 21096->21095 21097 9ea638 VirtualQuery 21097->21098 21098->21091 21098->21097 21100 9ea649 21099->21100 21101 9ea642 21099->21101 21100->21093 21102 9d5988 VirtualQuery 21101->21102 21102->21100 21103->21060 21104->21064 21105->21069 21106->21073 21108 9d5ea0 21107->21108 21110 9d5ec2 21107->21110 21109 9d5ea7 21108->21109 21108->21110 21111 9d28ec 11 API calls 21109->21111 21113 9d28ec 11 API calls 21110->21113 21114 9d5ee7 21110->21114 21112 9d5ebf 21111->21112 21112->21077 21113->21114 21114->21077 16657 9f2350 GetClassInfoA 16658 9f2380 16657->16658 16659 9f23a9 16658->16659 16660 9f239f RegisterClassA 16658->16660 16661 9f238e UnregisterClassA 16658->16661 16667 9d75d8 16659->16667 16660->16659 16661->16660 16663 9f23d7 16664 9f23f4 16663->16664 16665 9f2294 VirtualAlloc 16663->16665 16666 9f23eb SetWindowLongA 16665->16666 16666->16664 16671 9d2b24 16667->16671 16669 9d75eb CreateWindowExA 16670 9d7625 16669->16670 16670->16663 16671->16669 21354 9fe278 21355 9fe281 21354->21355 21361 a1ccec 21355->21361 21360 9fe2b7 21362 a1ccfd 21361->21362 21363 a19974 44 API calls 21362->21363 21364 a1cd21 21363->21364 21365 9f2294 VirtualAlloc 21364->21365 21366 a1cd2c 21365->21366 21367 9f4864 13 API calls 21366->21367 21368 a1cd3e 21367->21368 21369 9f4a0c 15 API calls 21368->21369 21370 a1cd50 21369->21370 21371 a1cd80 21370->21371 21372 a1cd73 21370->21372 21374 a0a79c 46 API calls 21371->21374 21373 9d4228 11 API calls 21372->21373 21375 a1cd7e 21373->21375 21376 a1cd8f 21374->21376 21378 9d4228 11 API calls 21375->21378 21377 9d427c 11 API calls 21376->21377 21377->21375 21379 9fe297 GetSystemMetrics 21378->21379 21380 a1a030 21379->21380 21381 9fe2a7 GetSystemMetrics 21380->21381 21381->21360 16647 9d4970 16648 9d4978 16647->16648 16649 9d4934 16647->16649 16648->16649 16650 9d4983 SysReAllocStringLen 16648->16650 16651 9d4948 16649->16651 16652 9d493a SysFreeString 16649->16652 16653 9d4904 16650->16653 16654 9d4993 16650->16654 16652->16651 16655 9d4920 16653->16655 16656 9d4910 SysAllocStringLen 16653->16656 16656->16653 16656->16655

                                      Control-flow Graph

                                      C-Code - Quality: 66%
                                      			E009D5BF4(intOrPtr __eax) {
                                      				intOrPtr _v8;
                                      				void* _v12;
                                      				char _v15;
                                      				char _v17;
                                      				char _v18;
                                      				char _v22;
                                      				int _v28;
                                      				char _v289;
                                      				long _t44;
                                      				long _t61;
                                      				long _t63;
                                      				CHAR* _t70;
                                      				CHAR* _t72;
                                      				struct HINSTANCE__* _t78;
                                      				struct HINSTANCE__* _t84;
                                      				char* _t94;
                                      				void* _t95;
                                      				intOrPtr _t99;
                                      				struct HINSTANCE__* _t107;
                                      				void* _t110;
                                      				void* _t112;
                                      				intOrPtr _t113;
                                      
                                      				_t110 = _t112;
                                      				_t113 = _t112 + 0xfffffee0;
                                      				_v8 = __eax;
                                      				GetModuleFileNameA(0,  &_v289, 0x105);
                                      				_v22 = 0;
                                      				_t44 = RegOpenKeyExA(0x80000001, "Software\\Borland\\Locales", 0, 0xf0019,  &_v12); // executed
                                      				if(_t44 == 0) {
                                      					L3:
                                      					_push(_t110);
                                      					_push(0x9d5cf9);
                                      					_push( *[fs:eax]);
                                      					 *[fs:eax] = _t113;
                                      					_v28 = 5;
                                      					E009D5A3C( &_v289, 0x105);
                                      					if(RegQueryValueExA(_v12,  &_v289, 0, 0,  &_v22,  &_v28) != 0 && RegQueryValueExA(_v12, E009D5E60, 0, 0,  &_v22,  &_v28) != 0) {
                                      						_v22 = 0;
                                      					}
                                      					_v18 = 0;
                                      					_pop(_t99);
                                      					 *[fs:eax] = _t99;
                                      					_push(E009D5D00);
                                      					return RegCloseKey(_v12);
                                      				} else {
                                      					_t61 = RegOpenKeyExA(0x80000002, "Software\\Borland\\Locales", 0, 0xf0019,  &_v12); // executed
                                      					if(_t61 == 0) {
                                      						goto L3;
                                      					} else {
                                      						_t63 = RegOpenKeyExA(0x80000001, "Software\\Borland\\Delphi\\Locales", 0, 0xf0019,  &_v12); // executed
                                      						if(_t63 != 0) {
                                      							_push(0x105);
                                      							_push(_v8);
                                      							_push( &_v289);
                                      							L009D14A4();
                                      							GetLocaleInfoA(GetThreadLocale(), 3,  &_v17, 5); // executed
                                      							_t107 = 0;
                                      							if(_v289 != 0 && (_v17 != 0 || _v22 != 0)) {
                                      								_t70 =  &_v289;
                                      								_push(_t70);
                                      								L009D14AC();
                                      								_t94 = _t70 +  &_v289;
                                      								L12:
                                      								if( *_t94 != 0x2e && _t94 !=  &_v289) {
                                      									_t94 = _t94 - 1;
                                      									goto L12;
                                      								}
                                      								_t72 =  &_v289;
                                      								if(_t94 != _t72) {
                                      									_t95 = _t94 + 1;
                                      									if(_v22 != 0) {
                                      										_push(0x105 - _t95 - _t72);
                                      										_push( &_v22);
                                      										_push(_t95);
                                      										L009D14A4();
                                      										_t107 = LoadLibraryExA( &_v289, 0, 2);
                                      									}
                                      									if(_t107 == 0 && _v17 != 0) {
                                      										_push(0x105 - _t95 -  &_v289);
                                      										_push( &_v17);
                                      										_push(_t95);
                                      										L009D14A4();
                                      										_t78 = LoadLibraryExA( &_v289, 0, 2); // executed
                                      										_t107 = _t78;
                                      										if(_t107 == 0) {
                                      											_v15 = 0;
                                      											_push(0x105 - _t95 -  &_v289);
                                      											_push( &_v17);
                                      											_push(_t95);
                                      											L009D14A4();
                                      											_t84 = LoadLibraryExA( &_v289, 0, 2); // executed
                                      											_t107 = _t84;
                                      										}
                                      									}
                                      								}
                                      							}
                                      							return _t107;
                                      						} else {
                                      							goto L3;
                                      						}
                                      					}
                                      				}
                                      			}

























                                      0x009d5bf5
                                      0x009d5bf7
                                      0x009d5bff
                                      0x009d5c10
                                      0x009d5c15
                                      0x009d5c2e
                                      0x009d5c35
                                      0x009d5c77
                                      0x009d5c79
                                      0x009d5c7a
                                      0x009d5c7f
                                      0x009d5c82
                                      0x009d5c85
                                      0x009d5c97
                                      0x009d5cba
                                      0x009d5cda
                                      0x009d5cda
                                      0x009d5cde
                                      0x009d5ce4
                                      0x009d5ce7
                                      0x009d5cea
                                      0x009d5cf8
                                      0x009d5c37
                                      0x009d5c4c
                                      0x009d5c53
                                      0x00000000
                                      0x009d5c55
                                      0x009d5c6a
                                      0x009d5c71
                                      0x009d5d00
                                      0x009d5d08
                                      0x009d5d0f
                                      0x009d5d10
                                      0x009d5d23
                                      0x009d5d28
                                      0x009d5d31
                                      0x009d5d47
                                      0x009d5d4d
                                      0x009d5d4e
                                      0x009d5d5b
                                      0x009d5d60
                                      0x009d5d63
                                      0x009d5d5f
                                      0x00000000
                                      0x009d5d5f
                                      0x009d5d6f
                                      0x009d5d77
                                      0x009d5d7d
                                      0x009d5d82
                                      0x009d5d8f
                                      0x009d5d93
                                      0x009d5d94
                                      0x009d5d95
                                      0x009d5daa
                                      0x009d5daa
                                      0x009d5dae
                                      0x009d5dc7
                                      0x009d5dcb
                                      0x009d5dcc
                                      0x009d5dcd
                                      0x009d5ddd
                                      0x009d5de2
                                      0x009d5de6
                                      0x009d5de8
                                      0x009d5dfd
                                      0x009d5e01
                                      0x009d5e02
                                      0x009d5e03
                                      0x009d5e13
                                      0x009d5e18
                                      0x009d5e18
                                      0x009d5de6
                                      0x009d5dae
                                      0x009d5d77
                                      0x009d5e21
                                      0x00000000
                                      0x00000000
                                      0x00000000
                                      0x009d5c71
                                      0x009d5c53

                                      APIs
                                      • GetModuleFileNameA.KERNEL32(00000000,?,00000105,108B00A9,00A9C0A4), ref: 009D5C10
                                      • RegOpenKeyExA.ADVAPI32(80000001,Software\Borland\Locales,00000000,000F0019,?,00000000,?,00000105,108B00A9,00A9C0A4), ref: 009D5C2E
                                      • RegOpenKeyExA.ADVAPI32(80000002,Software\Borland\Locales,00000000,000F0019,?,80000001,Software\Borland\Locales,00000000,000F0019,?,00000000,?,00000105,108B00A9,00A9C0A4), ref: 009D5C4C
                                      • RegOpenKeyExA.ADVAPI32(80000001,Software\Borland\Delphi\Locales,00000000,000F0019,?,80000002,Software\Borland\Locales,00000000,000F0019,?,80000001,Software\Borland\Locales,00000000,000F0019,?,00000000), ref: 009D5C6A
                                      • RegQueryValueExA.ADVAPI32(?,?,00000000,00000000,?,?,00000000,009D5CF9,?,80000001,Software\Borland\Locales,00000000,000F0019,?,00000000,?), ref: 009D5CB3
                                      • RegQueryValueExA.ADVAPI32(?,009D5E60,00000000,00000000,?,?,?,?,00000000,00000000,?,?,00000000,009D5CF9,?,80000001), ref: 009D5CD1
                                      • RegCloseKey.ADVAPI32(?,009D5D00,00000000,?,?,00000000,009D5CF9,?,80000001,Software\Borland\Locales,00000000,000F0019,?,00000000,?,00000105), ref: 009D5CF3
                                      • lstrcpyn.KERNEL32(?,?,00000105,80000001,Software\Borland\Delphi\Locales,00000000,000F0019,?,80000002,Software\Borland\Locales,00000000,000F0019,?,80000001,Software\Borland\Locales,00000000), ref: 009D5D10
                                      • GetThreadLocale.KERNEL32(00000003,?,00000005,?,?,00000105,80000001,Software\Borland\Delphi\Locales,00000000,000F0019,?,80000002,Software\Borland\Locales,00000000,000F0019,?), ref: 009D5D1D
                                      • GetLocaleInfoA.KERNEL32(00000000,00000003,?,00000005,?,?,00000105,80000001,Software\Borland\Delphi\Locales,00000000,000F0019,?,80000002,Software\Borland\Locales,00000000,000F0019), ref: 009D5D23
                                      • lstrlen.KERNEL32(?,00000000,00000003,?,00000005,?,?,00000105,80000001,Software\Borland\Delphi\Locales,00000000,000F0019,?,80000002,Software\Borland\Locales,00000000), ref: 009D5D4E
                                      • lstrcpyn.KERNEL32(00000001,?,00000105,?,00000000,00000003,?,00000005,?,?,00000105,80000001,Software\Borland\Delphi\Locales,00000000,000F0019,?), ref: 009D5D95
                                      • LoadLibraryExA.KERNEL32(?,00000000,00000002,00000001,?,00000105,?,00000000,00000003,?,00000005,?,?,00000105,80000001,Software\Borland\Delphi\Locales), ref: 009D5DA5
                                      • lstrcpyn.KERNEL32(00000001,?,00000105,?,00000000,00000003,?,00000005,?,?,00000105,80000001,Software\Borland\Delphi\Locales,00000000,000F0019,?), ref: 009D5DCD
                                      • LoadLibraryExA.KERNEL32(?,00000000,00000002,00000001,?,00000105,?,00000000,00000003,?,00000005,?,?,00000105,80000001,Software\Borland\Delphi\Locales), ref: 009D5DDD
                                      • lstrcpyn.KERNEL32(00000001,?,00000105,?,00000000,00000002,00000001,?,00000105,?,00000000,00000003,?,00000005,?,?), ref: 009D5E03
                                      • LoadLibraryExA.KERNEL32(?,00000000,00000002,00000001,?,00000105,?,00000000,00000002,00000001,?,00000105,?,00000000,00000003,?), ref: 009D5E13
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000002.00000002.323140727.00000000009D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009D0000, based on PE: true
                                      • Associated: 00000002.00000002.323135167.00000000009D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000002.00000002.323238271.0000000000A9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000002.00000002.323247473.0000000000AA3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_2_2_9d0000_rundll32.jbxd
                                      Similarity
                                      • API ID: lstrcpyn$LibraryLoadOpen$LocaleQueryValue$CloseFileInfoModuleNameThreadlstrlen
                                      • String ID: Software\Borland\Delphi\Locales$Software\Borland\Locales
                                      • API String ID: 1759228003-2375825460
                                      • Opcode ID: 5ab4d691ea2e6ee053f73824f1e526e2a578e16e8d795b68d58cc4a0fdb4ae83
                                      • Instruction ID: 1537cbd4166ddf5d6e307a36aa6c99108b48435ec000bd1b8c7c4c31d900c85f
                                      • Opcode Fuzzy Hash: 5ab4d691ea2e6ee053f73824f1e526e2a578e16e8d795b68d58cc4a0fdb4ae83
                                      • Instruction Fuzzy Hash: 36518972A8061C7EEB21DAB4DC46FEF77AD9B44744F4580A3B604E62C2D6749E44CBA0
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      Control-flow Graph

                                      • Executed
                                      • Not Executed
                                      control_flow_graph 24 9d5d00-9d5d31 lstrcpyn GetThreadLocale GetLocaleInfoA 25 9d5e1a-9d5e21 24->25 26 9d5d37-9d5d3b 24->26 27 9d5d3d-9d5d41 26->27 28 9d5d47-9d5d5d lstrlen 26->28 27->25 27->28 29 9d5d60-9d5d63 28->29 30 9d5d6f-9d5d77 29->30 31 9d5d65-9d5d6d 29->31 30->25 33 9d5d7d-9d5d82 30->33 31->30 32 9d5d5f 31->32 32->29 34 9d5dac-9d5dae 33->34 35 9d5d84-9d5daa lstrcpyn LoadLibraryExA 33->35 34->25 36 9d5db0-9d5db4 34->36 35->34 36->25 37 9d5db6-9d5de6 lstrcpyn LoadLibraryExA 36->37 37->25 38 9d5de8-9d5e18 lstrcpyn LoadLibraryExA 37->38 38->25
                                      C-Code - Quality: 61%
                                      			E009D5D00() {
                                      				void* _t28;
                                      				void* _t30;
                                      				struct HINSTANCE__* _t36;
                                      				struct HINSTANCE__* _t42;
                                      				char* _t51;
                                      				void* _t52;
                                      				struct HINSTANCE__* _t59;
                                      				void* _t61;
                                      
                                      				_push(0x105);
                                      				_push( *((intOrPtr*)(_t61 - 4)));
                                      				_push(_t61 - 0x11d);
                                      				L009D14A4();
                                      				GetLocaleInfoA(GetThreadLocale(), 3, _t61 - 0xd, 5); // executed
                                      				_t59 = 0;
                                      				if( *(_t61 - 0x11d) == 0 ||  *(_t61 - 0xd) == 0 &&  *((char*)(_t61 - 0x12)) == 0) {
                                      					L14:
                                      					return _t59;
                                      				} else {
                                      					_t28 = _t61 - 0x11d;
                                      					_push(_t28);
                                      					L009D14AC();
                                      					_t51 = _t28 + _t61 - 0x11d;
                                      					L5:
                                      					if( *_t51 != 0x2e && _t51 != _t61 - 0x11d) {
                                      						_t51 = _t51 - 1;
                                      						goto L5;
                                      					}
                                      					_t30 = _t61 - 0x11d;
                                      					if(_t51 != _t30) {
                                      						_t52 = _t51 + 1;
                                      						if( *((char*)(_t61 - 0x12)) != 0) {
                                      							_push(0x105 - _t52 - _t30);
                                      							_push(_t61 - 0x12);
                                      							_push(_t52);
                                      							L009D14A4();
                                      							_t59 = LoadLibraryExA(_t61 - 0x11d, 0, 2);
                                      						}
                                      						if(_t59 == 0 &&  *(_t61 - 0xd) != 0) {
                                      							_push(0x105 - _t52 - _t61 - 0x11d);
                                      							_push(_t61 - 0xd);
                                      							_push(_t52);
                                      							L009D14A4();
                                      							_t36 = LoadLibraryExA(_t61 - 0x11d, 0, 2); // executed
                                      							_t59 = _t36;
                                      							if(_t59 == 0) {
                                      								 *((char*)(_t61 - 0xb)) = 0;
                                      								_push(0x105 - _t52 - _t61 - 0x11d);
                                      								_push(_t61 - 0xd);
                                      								_push(_t52);
                                      								L009D14A4();
                                      								_t42 = LoadLibraryExA(_t61 - 0x11d, 0, 2); // executed
                                      								_t59 = _t42;
                                      							}
                                      						}
                                      					}
                                      					goto L14;
                                      				}
                                      			}











                                      0x009d5d00
                                      0x009d5d08
                                      0x009d5d0f
                                      0x009d5d10
                                      0x009d5d23
                                      0x009d5d28
                                      0x009d5d31
                                      0x009d5e1a
                                      0x009d5e21
                                      0x009d5d47
                                      0x009d5d47
                                      0x009d5d4d
                                      0x009d5d4e
                                      0x009d5d5b
                                      0x009d5d60
                                      0x009d5d63
                                      0x009d5d5f
                                      0x00000000
                                      0x009d5d5f
                                      0x009d5d6f
                                      0x009d5d77
                                      0x009d5d7d
                                      0x009d5d82
                                      0x009d5d8f
                                      0x009d5d93
                                      0x009d5d94
                                      0x009d5d95
                                      0x009d5daa
                                      0x009d5daa
                                      0x009d5dae
                                      0x009d5dc7
                                      0x009d5dcb
                                      0x009d5dcc
                                      0x009d5dcd
                                      0x009d5ddd
                                      0x009d5de2
                                      0x009d5de6
                                      0x009d5de8
                                      0x009d5dfd
                                      0x009d5e01
                                      0x009d5e02
                                      0x009d5e03
                                      0x009d5e13
                                      0x009d5e18
                                      0x009d5e18
                                      0x009d5de6
                                      0x009d5dae
                                      0x00000000
                                      0x009d5d77

                                      APIs
                                      • lstrcpyn.KERNEL32(?,?,00000105,80000001,Software\Borland\Delphi\Locales,00000000,000F0019,?,80000002,Software\Borland\Locales,00000000,000F0019,?,80000001,Software\Borland\Locales,00000000), ref: 009D5D10
                                      • GetThreadLocale.KERNEL32(00000003,?,00000005,?,?,00000105,80000001,Software\Borland\Delphi\Locales,00000000,000F0019,?,80000002,Software\Borland\Locales,00000000,000F0019,?), ref: 009D5D1D
                                      • GetLocaleInfoA.KERNEL32(00000000,00000003,?,00000005,?,?,00000105,80000001,Software\Borland\Delphi\Locales,00000000,000F0019,?,80000002,Software\Borland\Locales,00000000,000F0019), ref: 009D5D23
                                      • lstrlen.KERNEL32(?,00000000,00000003,?,00000005,?,?,00000105,80000001,Software\Borland\Delphi\Locales,00000000,000F0019,?,80000002,Software\Borland\Locales,00000000), ref: 009D5D4E
                                      • lstrcpyn.KERNEL32(00000001,?,00000105,?,00000000,00000003,?,00000005,?,?,00000105,80000001,Software\Borland\Delphi\Locales,00000000,000F0019,?), ref: 009D5D95
                                      • LoadLibraryExA.KERNEL32(?,00000000,00000002,00000001,?,00000105,?,00000000,00000003,?,00000005,?,?,00000105,80000001,Software\Borland\Delphi\Locales), ref: 009D5DA5
                                      • lstrcpyn.KERNEL32(00000001,?,00000105,?,00000000,00000003,?,00000005,?,?,00000105,80000001,Software\Borland\Delphi\Locales,00000000,000F0019,?), ref: 009D5DCD
                                      • LoadLibraryExA.KERNEL32(?,00000000,00000002,00000001,?,00000105,?,00000000,00000003,?,00000005,?,?,00000105,80000001,Software\Borland\Delphi\Locales), ref: 009D5DDD
                                      • lstrcpyn.KERNEL32(00000001,?,00000105,?,00000000,00000002,00000001,?,00000105,?,00000000,00000003,?,00000005,?,?), ref: 009D5E03
                                      • LoadLibraryExA.KERNEL32(?,00000000,00000002,00000001,?,00000105,?,00000000,00000002,00000001,?,00000105,?,00000000,00000003,?), ref: 009D5E13
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000002.00000002.323140727.00000000009D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009D0000, based on PE: true
                                      • Associated: 00000002.00000002.323135167.00000000009D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000002.00000002.323238271.0000000000A9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000002.00000002.323247473.0000000000AA3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_2_2_9d0000_rundll32.jbxd
                                      Similarity
                                      • API ID: lstrcpyn$LibraryLoad$Locale$InfoThreadlstrlen
                                      • String ID: Software\Borland\Delphi\Locales$Software\Borland\Locales
                                      • API String ID: 1599918012-2375825460
                                      • Opcode ID: f3baee5bd0de15422c30ddad9afe84534a1bcc0a91144b9d07d6272a5e3d68ec
                                      • Instruction ID: 5fe26c2af37fbee4dfc609383c6021ffeaa3c98bba3a05b2ba59137f0f2789dd
                                      • Opcode Fuzzy Hash: f3baee5bd0de15422c30ddad9afe84534a1bcc0a91144b9d07d6272a5e3d68ec
                                      • Instruction Fuzzy Hash: D7317772E8065C7AEB25D9B4DC86FEE77AD4B44344F0981A3A604E6282E6748F448B60
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      Control-flow Graph

                                      C-Code - Quality: 82%
                                      			E009EDDA4(void* __eax, struct HINSTANCE__* __edx, CHAR* _a4) {
                                      				CHAR* _v8;
                                      				void* __ebx;
                                      				void* __ecx;
                                      				void* __edi;
                                      				void* __esi;
                                      				void* __ebp;
                                      				struct HRSRC__* _t12;
                                      				void* _t18;
                                      				void* _t23;
                                      				CHAR* _t24;
                                      				void* _t25;
                                      				struct HRSRC__* _t29;
                                      				void* _t30;
                                      				struct HINSTANCE__* _t31;
                                      				void* _t32;
                                      
                                      				_v8 = _t24;
                                      				_t31 = __edx;
                                      				_t23 = __eax;
                                      				_t12 = FindResourceA(__edx, _v8, _a4); // executed
                                      				_t29 = _t12;
                                      				 *(_t23 + 0x10) = _t29;
                                      				_t33 = _t29;
                                      				if(_t29 == 0) {
                                      					E009EDD34(_t23, _t24, _t29, _t31, _t33, _t32);
                                      					_pop(_t24);
                                      				}
                                      				_t5 = _t23 + 0x10; // 0x9ede48
                                      				_t30 = LoadResource(_t31,  *_t5);
                                      				 *(_t23 + 0x14) = _t30;
                                      				_t34 = _t30;
                                      				if(_t30 == 0) {
                                      					E009EDD34(_t23, _t24, _t30, _t31, _t34, _t32);
                                      				}
                                      				_t7 = _t23 + 0x10; // 0x9ede48
                                      				_push(SizeofResource(_t31,  *_t7));
                                      				_t8 = _t23 + 0x14; // 0x9ed988
                                      				_t18 = LockResource( *_t8);
                                      				_pop(_t25);
                                      				return E009ED948(_t23, _t25, _t18);
                                      			}


















                                      0x009eddab
                                      0x009eddae
                                      0x009eddb0
                                      0x009eddbb
                                      0x009eddc0
                                      0x009eddc2
                                      0x009eddc5
                                      0x009eddc7
                                      0x009eddca
                                      0x009eddcf
                                      0x009eddcf
                                      0x009eddd0
                                      0x009eddda
                                      0x009edddc
                                      0x009edddf
                                      0x009edde1
                                      0x009edde4
                                      0x009edde9
                                      0x009eddea
                                      0x009eddf4
                                      0x009eddf5
                                      0x009eddf9
                                      0x009ede02
                                      0x009ede0d

                                      APIs
                                      • FindResourceA.KERNEL32(00000000,?,?), ref: 009EDDBB
                                      • LoadResource.KERNEL32(00000000,009EDE48,00000000,?,?,009E9AC8,00000000,00000001,00000000,?,009EDD14,?,?,009EB4C6,00000000), ref: 009EDDD5
                                      • SizeofResource.KERNEL32(00000000,009EDE48,00000000,009EDE48,00000000,?,?,009E9AC8,00000000,00000001,00000000,?,009EDD14,?,?,009EB4C6), ref: 009EDDEF
                                      • LockResource.KERNEL32(009ED988,00000000,00000000,009EDE48,00000000,009EDE48,00000000,?,?,009E9AC8,00000000,00000001,00000000,?,009EDD14,?), ref: 009EDDF9
                                      Memory Dump Source
                                      • Source File: 00000002.00000002.323140727.00000000009D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009D0000, based on PE: true
                                      • Associated: 00000002.00000002.323135167.00000000009D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000002.00000002.323238271.0000000000A9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000002.00000002.323247473.0000000000AA3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_2_2_9d0000_rundll32.jbxd
                                      Similarity
                                      • API ID: Resource$FindLoadLockSizeof
                                      • String ID:
                                      • API String ID: 3473537107-0
                                      • Opcode ID: e0f9c00353409598e5e2768b8fa927d36c29e3d16e926a6810523d72146c99a3
                                      • Instruction ID: 7acffd7c1d02419b4e7a1fee3bc62ec6f1c8a8eaf1aa8a18268482890e5bf7aa
                                      • Opcode Fuzzy Hash: e0f9c00353409598e5e2768b8fa927d36c29e3d16e926a6810523d72146c99a3
                                      • Instruction Fuzzy Hash: B9F069B26062086F4B06EF6DEC81E6B77ECEEC8260310452AF908CB346DA35ED018774
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      Control-flow Graph

                                      C-Code - Quality: 55%
                                      			_entry_(void* __ebx, void* __ecx, void* __edi, void* __esi, void* __eflags) {
                                      				intOrPtr _t19;
                                      				intOrPtr _t21;
                                      				void* _t26;
                                      
                                      				E009D67F0(0xa9b444);
                                      				_push(_t26);
                                      				_push(0xa9b8f4);
                                      				_push( *[fs:eax]);
                                      				 *[fs:eax] = _t26 + 0xffffffc4;
                                      				E009D427C(0xa9ff60, 0xa9b908);
                                      				_t19 =  *0xa9ff60; // 0xf72014
                                      				E009D4534(0xa9ff64, 0xa9b914, _t19);
                                      				LoadLibraryA("ggr"); // executed
                                      				E00A04F74(__ebx, 0, 1, __edi, __esi); // executed
                                      				_pop(_t21);
                                      				 *[fs:eax] = _t21;
                                      				_push(0xa9b8fb);
                                      				return 0;
                                      			}






                                      0x00a9b897
                                      0x00a9b89e
                                      0x00a9b89f
                                      0x00a9b8a4
                                      0x00a9b8a7
                                      0x00a9b8b4
                                      0x00a9b8c3
                                      0x00a9b8c9
                                      0x00a9b8d3
                                      0x00a9b8e1
                                      0x00a9b8e8
                                      0x00a9b8eb
                                      0x00a9b8ee
                                      0x00a9b8f3

                                      APIs
                                      • LoadLibraryA.KERNEL32(ggr,00000000,00A9B8F4), ref: 00A9B8D3
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000002.00000002.323140727.00000000009D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009D0000, based on PE: true
                                      • Associated: 00000002.00000002.323135167.00000000009D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000002.00000002.323238271.0000000000A9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000002.00000002.323247473.0000000000AA3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_2_2_9d0000_rundll32.jbxd
                                      Similarity
                                      • API ID: LibraryLoad
                                      • String ID: ggr
                                      • API String ID: 1029625771-644803015
                                      • Opcode ID: 0d34d1db3aeb33766a337f2a00c8ff09ae182a56e21b51b2ae7e6aeb2d9b3648
                                      • Instruction ID: 8cf08c878ecc2454340d81be8fd5a622021b4b586da3222f7ea0b8e05a1b5370
                                      • Opcode Fuzzy Hash: 0d34d1db3aeb33766a337f2a00c8ff09ae182a56e21b51b2ae7e6aeb2d9b3648
                                      • Instruction Fuzzy Hash: AAF0A0303642085F8F04A7ADBE9351532C9E7CAB04751883AF500C67A1DF215810D5B1
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      Control-flow Graph

                                      • Executed
                                      • Not Executed
                                      control_flow_graph 59 9d4970-9d4972 60 9d4978-9d497d 59->60 61 9d4934-9d4938 59->61 60->61 62 9d4983-9d498d SysReAllocStringLen 60->62 63 9d4948 61->63 64 9d493a-9d4947 SysFreeString 61->64 65 9d4904-9d490e 62->65 66 9d4993 62->66 64->63 68 9d4920 65->68 69 9d4910-9d491a SysAllocStringLen 65->69 69->65 69->68
                                      C-Code - Quality: 60%
                                      			E009D4970(signed int __eax, void* __edx) {
                                      				signed int _t4;
                                      				void* _t5;
                                      				signed char _t16;
                                      				void* _t18;
                                      				void* _t19;
                                      				void* _t23;
                                      
                                      				_t18 = __edx;
                                      				_t4 = __eax;
                                      				if(__edx == 0) {
                                      					L10:
                                      					_t19 =  *_t4;
                                      					if(_t19 != 0) {
                                      						 *_t4 = 0;
                                      						_push(_t4);
                                      						L009D14F4();
                                      						_t5 = _t19;
                                      						return _t5;
                                      					}
                                      					return _t4;
                                      				} else {
                                      					__ecx =  *(__edx - 4);
                                      					__ecx =  *(__edx - 4) >> 1;
                                      					if(__ecx == 0) {
                                      						goto L10;
                                      					} else {
                                      						_push(__ecx);
                                      						_push(__edx);
                                      						_push(__eax); // executed
                                      						L009D14EC(); // executed
                                      						if(__eax == 0) {
                                      							__eax = __eax & 0x0000007f;
                                      							__edx =  *__esp;
                                      							_t23 = _t18;
                                      							_t16 = _t4 & 0x0000007f;
                                      							if( *0xa9f008 != 0) {
                                      								 *0xa9f008();
                                      							}
                                      							if(_t16 != 0) {
                                      								if(_t16 <= 0x18) {
                                      									_t2 = _t16 + 0xa9c048; // 0xd7c9c8cc
                                      									_t16 =  *_t2;
                                      								}
                                      							} else {
                                      								_t16 =  *(E009D67A4() + 4);
                                      							}
                                      							return E009D29D0(_t23);
                                      						} else {
                                      							return __eax;
                                      						}
                                      					}
                                      				}
                                      			}









                                      0x009d4970
                                      0x009d4970
                                      0x009d4972
                                      0x009d4934
                                      0x009d4934
                                      0x009d4938
                                      0x009d493a
                                      0x009d4940
                                      0x009d4942
                                      0x009d4947
                                      0x00000000
                                      0x009d4947
                                      0x009d4948
                                      0x009d4978
                                      0x009d4978
                                      0x009d497b
                                      0x009d497d
                                      0x00000000
                                      0x009d4983
                                      0x009d4983
                                      0x009d4984
                                      0x009d4985
                                      0x009d4986
                                      0x009d498d
                                      0x009d2a28
                                      0x009d2a2b
                                      0x009d29de
                                      0x009d29e2
                                      0x009d29ec
                                      0x009d29f2
                                      0x009d29f2
                                      0x009d29fa
                                      0x009d2a0c
                                      0x009d2a12
                                      0x009d2a12
                                      0x009d2a12
                                      0x009d29fc
                                      0x009d2a01
                                      0x009d2a01
                                      0x009d2a25
                                      0x009d4993
                                      0x009d4993
                                      0x009d4993
                                      0x009d498d
                                      0x009d497d

                                      APIs
                                      • SysFreeString.OLEAUT32 ref: 009D4942
                                      • SysReAllocStringLen.OLEAUT32(?,?,?), ref: 009D4986
                                      Memory Dump Source
                                      • Source File: 00000002.00000002.323140727.00000000009D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009D0000, based on PE: true
                                      • Associated: 00000002.00000002.323135167.00000000009D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000002.00000002.323238271.0000000000A9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000002.00000002.323247473.0000000000AA3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_2_2_9d0000_rundll32.jbxd
                                      Similarity
                                      • API ID: String$AllocFree
                                      • String ID:
                                      • API String ID: 344208780-0
                                      • Opcode ID: 30af372732d717d2b7e7ea3a8fde1a8ae9bbb0e328117705c45d18cc1208a5f5
                                      • Instruction ID: ac1d5818044f703ce36b331b4dea11e66c9a62951750f70ee6b96f041cbe22af
                                      • Opcode Fuzzy Hash: 30af372732d717d2b7e7ea3a8fde1a8ae9bbb0e328117705c45d18cc1208a5f5
                                      • Instruction Fuzzy Hash: DED05BB85811016FEA249A56C925B3B322D9FD2F00BADC54FB4416F355DE34DC00DB30
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      Control-flow Graph

                                      • Executed
                                      • Not Executed
                                      control_flow_graph 70 9d1724-9d1731 71 9d173a-9d1740 70->71 72 9d1733-9d1738 70->72 73 9d1746-9d175e VirtualAlloc 71->73 72->73 74 9d1760-9d1767 call 9d15d8 73->74 75 9d1783-9d1786 73->75 77 9d176c-9d176e 74->77 77->75 78 9d1770-9d1781 VirtualFree 77->78 78->75
                                      C-Code - Quality: 100%
                                      			E009D1724(void* __eax, void** __edx) {
                                      				void* _t3;
                                      				void** _t8;
                                      				void* _t11;
                                      				long _t14;
                                      
                                      				_t8 = __edx;
                                      				if(__eax >= 0x100000) {
                                      					_t14 = __eax + 0x0000ffff & 0xffff0000;
                                      				} else {
                                      					_t14 = 0x100000;
                                      				}
                                      				_t8[1] = _t14;
                                      				_t3 = VirtualAlloc(0, _t14, 0x2000, 1); // executed
                                      				_t11 = _t3;
                                      				 *_t8 = _t11;
                                      				if(_t11 != 0) {
                                      					_t3 = E009D15D8(0xa9f5ec, _t8);
                                      					if(_t3 == 0) {
                                      						VirtualFree( *_t8, 0, 0x8000);
                                      						 *_t8 = 0;
                                      						return 0;
                                      					}
                                      				}
                                      				return _t3;
                                      			}







                                      0x009d1727
                                      0x009d1731
                                      0x009d1740
                                      0x009d1733
                                      0x009d1733
                                      0x009d1733
                                      0x009d1746
                                      0x009d1753
                                      0x009d1758
                                      0x009d175a
                                      0x009d175e
                                      0x009d1767
                                      0x009d176e
                                      0x009d177a
                                      0x009d1781
                                      0x00000000
                                      0x009d1781
                                      0x009d176e
                                      0x009d1786

                                      APIs
                                      • VirtualAlloc.KERNEL32(00000000,?,00002000,00000001,?,?,?,009D1A2D), ref: 009D1753
                                      • VirtualFree.KERNEL32(00000000,00000000,00008000,00000000,?,00002000,00000001,?,?,?,009D1A2D), ref: 009D177A
                                      Memory Dump Source
                                      • Source File: 00000002.00000002.323140727.00000000009D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009D0000, based on PE: true
                                      • Associated: 00000002.00000002.323135167.00000000009D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000002.00000002.323238271.0000000000A9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000002.00000002.323247473.0000000000AA3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_2_2_9d0000_rundll32.jbxd
                                      Similarity
                                      • API ID: Virtual$AllocFree
                                      • String ID:
                                      • API String ID: 2087232378-0
                                      • Opcode ID: b32dd53dca2e3c0f4a17b5076684fb53ee79c76208513e5d44bda396108f66ed
                                      • Instruction ID: 068007331e83e9ab2b732d56018f3705251af0f8a6b04d45fca68f136d6e15f6
                                      • Opcode Fuzzy Hash: b32dd53dca2e3c0f4a17b5076684fb53ee79c76208513e5d44bda396108f66ed
                                      • Instruction Fuzzy Hash: A3F0A773F806203BEB20596D5C85B5266D99FD57A0F158173F90CEF3D9D6A18C0182A1
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      Control-flow Graph

                                      • Executed
                                      • Not Executed
                                      control_flow_graph 79 9eb20c-9eb21b 80 9eb21d 79->80 81 9eb223-9eb23a call 9d46e8 FindResourceA 79->81 80->81 84 9eb23c-9eb263 call 9edcdc call 9ed658 81->84 85 9eb289-9eb28e 81->85 89 9eb268-9eb27f call 9d3380 84->89 89->85
                                      C-Code - Quality: 65%
                                      			E009EB20C(void* __eax, struct HINSTANCE__* __edx) {
                                      				intOrPtr _v8;
                                      				void* __ebx;
                                      				void* __ecx;
                                      				void* __edi;
                                      				void* __esi;
                                      				void* __ebp;
                                      				signed int _t10;
                                      				intOrPtr _t15;
                                      				struct HINSTANCE__* _t20;
                                      				intOrPtr* _t22;
                                      				intOrPtr _t30;
                                      				void* _t32;
                                      				intOrPtr* _t35;
                                      				intOrPtr _t38;
                                      				intOrPtr _t40;
                                      
                                      				_t38 = _t40;
                                      				_push(_t22);
                                      				_t35 = _t22;
                                      				_t20 = __edx;
                                      				_t32 = __eax;
                                      				if(__edx == 0) {
                                      					_t20 =  *0xa9f668; // 0x9d0000
                                      				}
                                      				_t10 = FindResourceA(_t20, E009D46E8(_t32), 0xa) & 0xffffff00 | _t9 != 0x00000000;
                                      				_t43 = _t10;
                                      				if(_t10 == 0) {
                                      					return _t10;
                                      				} else {
                                      					_v8 = E009EDCDC(_t20, 1, 0xa, _t32);
                                      					_push(_t38);
                                      					_push(0x9eb280);
                                      					_push( *[fs:eax]);
                                      					 *[fs:eax] = _t40;
                                      					_t15 = E009ED658(_v8, _t20,  *_t35, _t32, _t35, _t43); // executed
                                      					 *_t35 = _t15;
                                      					_pop(_t30);
                                      					 *[fs:eax] = _t30;
                                      					_push(E009EB287);
                                      					return E009D3380(_v8);
                                      				}
                                      			}


















                                      0x009eb20d
                                      0x009eb20f
                                      0x009eb213
                                      0x009eb215
                                      0x009eb217
                                      0x009eb21b
                                      0x009eb21d
                                      0x009eb21d
                                      0x009eb235
                                      0x009eb238
                                      0x009eb23a
                                      0x009eb28e
                                      0x009eb23c
                                      0x009eb24d
                                      0x009eb252
                                      0x009eb253
                                      0x009eb258
                                      0x009eb25b
                                      0x009eb263
                                      0x009eb268
                                      0x009eb26c
                                      0x009eb26f
                                      0x009eb272
                                      0x009eb27f
                                      0x009eb27f

                                      APIs
                                      • FindResourceA.KERNEL32(00000000,00000000,0000000A), ref: 009EB22E
                                      Memory Dump Source
                                      • Source File: 00000002.00000002.323140727.00000000009D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009D0000, based on PE: true
                                      • Associated: 00000002.00000002.323135167.00000000009D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000002.00000002.323238271.0000000000A9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000002.00000002.323247473.0000000000AA3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_2_2_9d0000_rundll32.jbxd
                                      Similarity
                                      • API ID: FindResource
                                      • String ID:
                                      • API String ID: 1635176832-0
                                      • Opcode ID: c2c09955bb92014d0060ed20d2a4459090cd0f3b6a2f724898427e724057b52a
                                      • Instruction ID: e58357fcaa26dabb5706898d0dae69cfbd89a12d3296e95f345b55270156c47f
                                      • Opcode Fuzzy Hash: c2c09955bb92014d0060ed20d2a4459090cd0f3b6a2f724898427e724057b52a
                                      • Instruction Fuzzy Hash: DB01DF323043446FD712DB6AAC82A2AB3ADDFD9714751843AF644C7751DA729C019250
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      Control-flow Graph

                                      • Executed
                                      • Not Executed
                                      control_flow_graph 92 9d75d8-9d7620 call 9d2b24 CreateWindowExA call 9d2b14 96 9d7625-9d762c 92->96
                                      C-Code - Quality: 100%
                                      			E009D75D8(long __eax, CHAR* __edx, void* _a4, struct HINSTANCE__* _a8, struct HMENU__* _a12, struct HWND__* _a16, int _a20, int _a24, int _a28, int _a32, long _a36) {
                                      				CHAR* _v8;
                                      				void* _t13;
                                      				struct HWND__* _t24;
                                      				CHAR* _t29;
                                      				long _t32;
                                      
                                      				_v8 = _t29;
                                      				_t32 = __eax;
                                      				_t13 = E009D2B24();
                                      				_t24 = CreateWindowExA(_t32, __edx, _v8, _a36, _a32, _a28, _a24, _a20, _a16, _a12, _a8, _a4); // executed
                                      				E009D2B14(_t13);
                                      				return _t24;
                                      			}








                                      0x009d75df
                                      0x009d75e4
                                      0x009d75e6
                                      0x009d7617
                                      0x009d7620
                                      0x009d762c

                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000002.00000002.323140727.00000000009D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009D0000, based on PE: true
                                      • Associated: 00000002.00000002.323135167.00000000009D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000002.00000002.323238271.0000000000A9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000002.00000002.323247473.0000000000AA3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_2_2_9d0000_rundll32.jbxd
                                      Similarity
                                      • API ID: CreateWindow
                                      • String ID:
                                      • API String ID: 716092398-0
                                      • Opcode ID: a672b2eb1d9e3a805781367aad54b4842a78cc4b7917898f4b96461fb7ca0a24
                                      • Instruction ID: 1324ce74e09652c9038fff3c84b73829b5107ebcd172a6ff93ee4f17f7e25098
                                      • Opcode Fuzzy Hash: a672b2eb1d9e3a805781367aad54b4842a78cc4b7917898f4b96461fb7ca0a24
                                      • Instruction Fuzzy Hash: 13F07FB2604118AF8B84DE9DEC81E9B77ECEB9D2A0B054126BA0CD3301D674ED108BA0
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      Control-flow Graph

                                      • Executed
                                      • Not Executed
                                      control_flow_graph 97 9d59b8-9d59c6 98 9d59c8-9d59df GetModuleFileNameA call 9d5bf4 97->98 99 9d59f3-9d59fe 97->99 101 9d59e4-9d59eb 98->101 101->99 102 9d59ed-9d59f0 101->102 102->99
                                      C-Code - Quality: 100%
                                      			E009D59B8(void* __eax) {
                                      				char _v272;
                                      				intOrPtr _t14;
                                      				void* _t16;
                                      				intOrPtr _t18;
                                      				intOrPtr _t19;
                                      
                                      				_t16 = __eax;
                                      				if( *((intOrPtr*)(__eax + 0x10)) == 0) {
                                      					_t3 = _t16 + 4; // 0x9d0000
                                      					GetModuleFileNameA( *_t3,  &_v272, 0x105);
                                      					_t14 = E009D5BF4(_t19); // executed
                                      					_t18 = _t14;
                                      					 *((intOrPtr*)(_t16 + 0x10)) = _t18;
                                      					if(_t18 == 0) {
                                      						_t5 = _t16 + 4; // 0x9d0000
                                      						 *((intOrPtr*)(_t16 + 0x10)) =  *_t5;
                                      					}
                                      				}
                                      				_t7 = _t16 + 0x10; // 0x9d0000
                                      				return  *_t7;
                                      			}








                                      0x009d59c0
                                      0x009d59c6
                                      0x009d59d2
                                      0x009d59d6
                                      0x009d59df
                                      0x009d59e4
                                      0x009d59e6
                                      0x009d59eb
                                      0x009d59ed
                                      0x009d59f0
                                      0x009d59f0
                                      0x009d59eb
                                      0x009d59f3
                                      0x009d59fe

                                      APIs
                                      • GetModuleFileNameA.KERNEL32(009D0000,?,00000105,108B00A9,00000000,009D5A20,009EB3E4,?,00000000,009EB40A,?,?,00000000,?,009EB483), ref: 009D59D6
                                        • Part of subcall function 009D5BF4: GetModuleFileNameA.KERNEL32(00000000,?,00000105,108B00A9,00A9C0A4), ref: 009D5C10
                                        • Part of subcall function 009D5BF4: RegOpenKeyExA.ADVAPI32(80000001,Software\Borland\Locales,00000000,000F0019,?,00000000,?,00000105,108B00A9,00A9C0A4), ref: 009D5C2E
                                        • Part of subcall function 009D5BF4: RegOpenKeyExA.ADVAPI32(80000002,Software\Borland\Locales,00000000,000F0019,?,80000001,Software\Borland\Locales,00000000,000F0019,?,00000000,?,00000105,108B00A9,00A9C0A4), ref: 009D5C4C
                                        • Part of subcall function 009D5BF4: RegOpenKeyExA.ADVAPI32(80000001,Software\Borland\Delphi\Locales,00000000,000F0019,?,80000002,Software\Borland\Locales,00000000,000F0019,?,80000001,Software\Borland\Locales,00000000,000F0019,?,00000000), ref: 009D5C6A
                                        • Part of subcall function 009D5BF4: RegQueryValueExA.ADVAPI32(?,?,00000000,00000000,?,?,00000000,009D5CF9,?,80000001,Software\Borland\Locales,00000000,000F0019,?,00000000,?), ref: 009D5CB3
                                        • Part of subcall function 009D5BF4: RegQueryValueExA.ADVAPI32(?,009D5E60,00000000,00000000,?,?,?,?,00000000,00000000,?,?,00000000,009D5CF9,?,80000001), ref: 009D5CD1
                                        • Part of subcall function 009D5BF4: RegCloseKey.ADVAPI32(?,009D5D00,00000000,?,?,00000000,009D5CF9,?,80000001,Software\Borland\Locales,00000000,000F0019,?,00000000,?,00000105), ref: 009D5CF3
                                      Memory Dump Source
                                      • Source File: 00000002.00000002.323140727.00000000009D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009D0000, based on PE: true
                                      • Associated: 00000002.00000002.323135167.00000000009D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000002.00000002.323238271.0000000000A9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000002.00000002.323247473.0000000000AA3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_2_2_9d0000_rundll32.jbxd
                                      Similarity
                                      • API ID: Open$FileModuleNameQueryValue$Close
                                      • String ID:
                                      • API String ID: 2796650324-0
                                      • Opcode ID: c92e517641b2b4fd91be27f2a27198873e27df336b57998948ba745165383069
                                      • Instruction ID: 068b0794e3259d1c376d2982a372173626ba2677a6a3e92bb739537c287b564f
                                      • Opcode Fuzzy Hash: c92e517641b2b4fd91be27f2a27198873e27df336b57998948ba745165383069
                                      • Instruction Fuzzy Hash: 4EE06D72A40610DBCB10DE5CC8C1B8633D8AB087A4F018692EC54CF346D3B5DD5087D0
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      Control-flow Graph

                                      C-Code - Quality: 100%
                                      			E009D8930(void* __eax, void* __edx) {
                                      				int _t3;
                                      				char* _t5;
                                      				int _t7;
                                      				int _t10;
                                      				void* _t12;
                                      
                                      				_t12 = __eax;
                                      				_t3 = E009D44E8(__edx);
                                      				_t5 = E009D46E8(__edx);
                                      				_t7 = E009D44E8(_t12);
                                      				_t10 = CompareStringA(0x400, 1, E009D46E8(_t12), _t7, _t5, _t3); // executed
                                      				return _t10 - 2;
                                      			}








                                      0x009d8934
                                      0x009d8938
                                      0x009d8940
                                      0x009d8948
                                      0x009d895d
                                      0x009d8967

                                      APIs
                                      • CompareStringA.KERNEL32(00000400,00000001,00000000,00000000,00000000,00000000,?,?,009D8977,?,?,009D8D71), ref: 009D895D
                                      Memory Dump Source
                                      • Source File: 00000002.00000002.323140727.00000000009D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009D0000, based on PE: true
                                      • Associated: 00000002.00000002.323135167.00000000009D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000002.00000002.323238271.0000000000A9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000002.00000002.323247473.0000000000AA3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_2_2_9d0000_rundll32.jbxd
                                      Similarity
                                      • API ID: CompareString
                                      • String ID:
                                      • API String ID: 1825529933-0
                                      • Opcode ID: 7a97947de377c4f51268352574cf2924ac5472c08644cf5ede9ec7408a82dda4
                                      • Instruction ID: db3ecf294df48edc4b52584429208e68c3ed63438581314c1a5d49c5b3570359
                                      • Opcode Fuzzy Hash: 7a97947de377c4f51268352574cf2924ac5472c08644cf5ede9ec7408a82dda4
                                      • Instruction Fuzzy Hash: 81D0C9D53D16202BD6A0B67C0C83F5A00CC8B9D712F02C433B6A9E7353C9A5CD4102B9
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      Control-flow Graph

                                      • Executed
                                      • Not Executed
                                      control_flow_graph 112 9d18b8-9d18fc 113 9d193a-9d1940 112->113 114 9d18fe-9d1908 113->114 115 9d1942-9d1949 113->115 116 9d190c-9d1910 114->116 117 9d190a 114->117 118 9d1916-9d1918 116->118 119 9d1912 116->119 117->116 120 9d1938 118->120 121 9d191a-9d192c VirtualAlloc 118->121 119->118 120->113 121->120 122 9d192e-9d1936 121->122 122->115
                                      C-Code - Quality: 100%
                                      			E009D18B8(signed int __eax, void** __ecx, intOrPtr __edx) {
                                      				signed int _v20;
                                      				void** _v24;
                                      				void* _t15;
                                      				void** _t16;
                                      				void* _t17;
                                      				signed int _t27;
                                      				intOrPtr* _t29;
                                      				void* _t31;
                                      				intOrPtr* _t32;
                                      
                                      				_v24 = __ecx;
                                      				 *_t32 = __edx;
                                      				_t31 = __eax & 0xfffff000;
                                      				_v20 = __eax +  *_t32 + 0x00000fff & 0xfffff000;
                                      				 *_v24 = _t31;
                                      				_t15 = _v20 - _t31;
                                      				_v24[1] = _t15;
                                      				_t29 =  *0xa9f5ec; // 0x8f2554
                                      				while(_t29 != 0xa9f5ec) {
                                      					_t17 =  *(_t29 + 8);
                                      					_t27 =  *((intOrPtr*)(_t29 + 0xc)) + _t17;
                                      					if(_t31 > _t17) {
                                      						_t17 = _t31;
                                      					}
                                      					if(_t27 > _v20) {
                                      						_t27 = _v20;
                                      					}
                                      					if(_t27 > _t17) {
                                      						_t15 = VirtualAlloc(_t17, _t27 - _t17, 0x1000, 4); // executed
                                      						if(_t15 == 0) {
                                      							_t16 = _v24;
                                      							 *_t16 = 0;
                                      							return _t16;
                                      						}
                                      					}
                                      					_t29 =  *_t29;
                                      				}
                                      				return _t15;
                                      			}












                                      0x009d18bf
                                      0x009d18c3
                                      0x009d18ca
                                      0x009d18df
                                      0x009d18e7
                                      0x009d18ed
                                      0x009d18f3
                                      0x009d18f6
                                      0x009d193a
                                      0x009d18fe
                                      0x009d1904
                                      0x009d1908
                                      0x009d190a
                                      0x009d190a
                                      0x009d1910
                                      0x009d1912
                                      0x009d1912
                                      0x009d1918
                                      0x009d1925
                                      0x009d192c
                                      0x009d192e
                                      0x009d1934
                                      0x00000000
                                      0x009d1934
                                      0x009d192c
                                      0x009d1938
                                      0x009d1938
                                      0x009d1949

                                      APIs
                                      • VirtualAlloc.KERNEL32(?,?,00001000,00000004), ref: 009D1925
                                      Memory Dump Source
                                      • Source File: 00000002.00000002.323140727.00000000009D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009D0000, based on PE: true
                                      • Associated: 00000002.00000002.323135167.00000000009D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000002.00000002.323238271.0000000000A9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000002.00000002.323247473.0000000000AA3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_2_2_9d0000_rundll32.jbxd
                                      Similarity
                                      • API ID: AllocVirtual
                                      • String ID:
                                      • API String ID: 4275171209-0
                                      • Opcode ID: 66be63e4ac11a2cec79e0e8d17e2668f621c776424763818172725d588c9118e
                                      • Instruction ID: 253ea3b0920c9b8556024919b3f50adab91bfa2e3db2117dbe3d56191457def3
                                      • Opcode Fuzzy Hash: 66be63e4ac11a2cec79e0e8d17e2668f621c776424763818172725d588c9118e
                                      • Instruction Fuzzy Hash: B2118E72A45701AFC310DF69E890A2AB7E9EFD4760F16C63DE59897358E730AC408B45
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      Control-flow Graph

                                      • Executed
                                      • Not Executed
                                      control_flow_graph 123 9f2294-9f22a2 124 9f22a4-9f22cd VirtualAlloc call 9d2ac8 123->124 125 9f2310-9f2329 123->125 127 9f22d2-9f22e2 call 9f228c 124->127 130 9f22e5-9f2308 call 9f228c 127->130 133 9f230a 130->133 133->125
                                      C-Code - Quality: 100%
                                      			E009F2294(intOrPtr _a4, intOrPtr _a8) {
                                      				void* _t14;
                                      				void _t15;
                                      				intOrPtr _t25;
                                      				char* _t26;
                                      				void* _t35;
                                      
                                      				if( *0xa9f88c == 0) {
                                      					_t14 = VirtualAlloc(0, 0x1000, 0x1000, 0x40); // executed
                                      					_t35 = _t14;
                                      					_t15 =  *0xa9f888; // 0xaf0000
                                      					 *_t35 = _t15;
                                      					_t1 = _t35 + 4; // 0x4
                                      					E009D2AC8(0xa9c618, 2, _t1);
                                      					_t2 = _t35 + 5; // 0x5
                                      					 *((intOrPtr*)(_t35 + 6)) = E009F228C(_t2, E009F226C);
                                      					_t4 = _t35 + 0xa; // 0xa
                                      					_t26 = _t4;
                                      					do {
                                      						 *_t26 = 0xe8;
                                      						_t5 = _t35 + 4; // 0x4
                                      						 *((intOrPtr*)(_t26 + 1)) = E009F228C(_t26, _t5);
                                      						 *((intOrPtr*)(_t26 + 5)) =  *0xa9f88c;
                                      						 *0xa9f88c = _t26;
                                      						_t26 = _t26 + 0xd;
                                      					} while (_t26 - _t35 < 0xffc);
                                      					 *0xa9f888 = _t35;
                                      				}
                                      				_t25 =  *0xa9f88c;
                                      				 *0xa9f88c =  *((intOrPtr*)(_t25 + 5));
                                      				 *((intOrPtr*)(_t25 + 5)) = _a4;
                                      				 *((intOrPtr*)(_t25 + 9)) = _a8;
                                      				return  *0xa9f88c;
                                      			}








                                      0x009f22a2
                                      0x009f22b2
                                      0x009f22b7
                                      0x009f22b9
                                      0x009f22be
                                      0x009f22c0
                                      0x009f22cd
                                      0x009f22d7
                                      0x009f22df
                                      0x009f22e2
                                      0x009f22e2
                                      0x009f22e5
                                      0x009f22e5
                                      0x009f22e8
                                      0x009f22f2
                                      0x009f22f7
                                      0x009f22fa
                                      0x009f22fc
                                      0x009f2303
                                      0x009f230a
                                      0x009f230a
                                      0x009f2312
                                      0x009f2317
                                      0x009f231c
                                      0x009f2322
                                      0x009f2329

                                      APIs
                                      • VirtualAlloc.KERNEL32(00000000,00001000,00001000,00000040), ref: 009F22B2
                                      Memory Dump Source
                                      • Source File: 00000002.00000002.323140727.00000000009D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009D0000, based on PE: true
                                      • Associated: 00000002.00000002.323135167.00000000009D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000002.00000002.323238271.0000000000A9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000002.00000002.323247473.0000000000AA3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_2_2_9d0000_rundll32.jbxd
                                      Similarity
                                      • API ID: AllocVirtual
                                      • String ID:
                                      • API String ID: 4275171209-0
                                      • Opcode ID: ff06673e44e5c55af5d34f9e472f16585fbe5b523816af6fb0d75c64789d67cf
                                      • Instruction ID: 6377ba7ad4670c4b6f0e7b89cbfa7c1291846dbd4d932c7415dd5c3758767f6f
                                      • Opcode Fuzzy Hash: ff06673e44e5c55af5d34f9e472f16585fbe5b523816af6fb0d75c64789d67cf
                                      • Instruction Fuzzy Hash: 541118742417099FC714DF58C881B92B7E5EB88750B10C53AEA688F385D770E9158BA4
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      Control-flow Graph

                                      • Executed
                                      • Not Executed
                                      control_flow_graph 134 9d1580-9d158a 135 9d158c-9d159c LocalAlloc 134->135 136 9d15c6-9d15ce 134->136 137 9d159e-9d15a2 135->137 138 9d15a3-9d15b0 135->138 139 9d15b2-9d15c4 138->139 139->136 139->139
                                      C-Code - Quality: 100%
                                      			E009D1580() {
                                      				intOrPtr* _t4;
                                      				void* _t5;
                                      				void _t6;
                                      				intOrPtr* _t9;
                                      				void* _t12;
                                      				void* _t14;
                                      
                                      				if( *0xa9f5e8 != 0) {
                                      					L5:
                                      					_t4 =  *0xa9f5e8;
                                      					 *0xa9f5e8 =  *_t4;
                                      					return _t4;
                                      				} else {
                                      					_t5 = LocalAlloc(0, 0x644); // executed
                                      					_t12 = _t5;
                                      					if(_t12 != 0) {
                                      						_t6 =  *0xa9f5e4; // 0x8f1f20
                                      						 *_t12 = _t6;
                                      						 *0xa9f5e4 = _t12;
                                      						_t14 = 0;
                                      						do {
                                      							_t2 = (_t14 + _t14) * 8; // 0x4
                                      							_t9 = _t12 + _t2 + 4;
                                      							 *_t9 =  *0xa9f5e8;
                                      							 *0xa9f5e8 = _t9;
                                      							_t14 = _t14 + 1;
                                      						} while (_t14 != 0x64);
                                      						goto L5;
                                      					} else {
                                      						return 0;
                                      					}
                                      				}
                                      			}









                                      0x009d158a
                                      0x009d15c6
                                      0x009d15c6
                                      0x009d15ca
                                      0x009d15ce
                                      0x009d158c
                                      0x009d1593
                                      0x009d1598
                                      0x009d159c
                                      0x009d15a3
                                      0x009d15a8
                                      0x009d15aa
                                      0x009d15b0
                                      0x009d15b2
                                      0x009d15b6
                                      0x009d15b6
                                      0x009d15bc
                                      0x009d15be
                                      0x009d15c0
                                      0x009d15c1
                                      0x00000000
                                      0x009d159e
                                      0x009d15a2
                                      0x009d15a2
                                      0x009d159c

                                      APIs
                                      • LocalAlloc.KERNEL32(00000000,00000644,?,00A9F5FC,009D15E3,?,?,009D1682,?,0000000C,?,?,00003FFF,009D1BC3), ref: 009D1593
                                      Memory Dump Source
                                      • Source File: 00000002.00000002.323140727.00000000009D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009D0000, based on PE: true
                                      • Associated: 00000002.00000002.323135167.00000000009D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000002.00000002.323238271.0000000000A9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000002.00000002.323247473.0000000000AA3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_2_2_9d0000_rundll32.jbxd
                                      Similarity
                                      • API ID: AllocLocal
                                      • String ID:
                                      • API String ID: 3494564517-0
                                      • Opcode ID: 413cac5f6a308dba87683ed12363020fcaf5d5fac66182003a8251000197b330
                                      • Instruction ID: efe2559a3ddd7c4c170199f83966c897423a4eb83a714dcf96d5bf069b2f08d0
                                      • Opcode Fuzzy Hash: 413cac5f6a308dba87683ed12363020fcaf5d5fac66182003a8251000197b330
                                      • Instruction Fuzzy Hash: 40F08CB6781201AFDB24CF68E8807A573E5EBD9359F20807FE186C7310E6359C418B90
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      C-Code - Quality: 72%
                                      			E009F6EBC(struct HBITMAP__* __eax, struct HPALETTE__* __ecx, struct HPALETTE__* __edx, intOrPtr _a4, signed int _a8) {
                                      				struct HBITMAP__* _v8;
                                      				struct HPALETTE__* _v12;
                                      				struct HPALETTE__* _v16;
                                      				struct HPALETTE__* _v20;
                                      				void* _v24;
                                      				struct HDC__* _v28;
                                      				struct HDC__* _v32;
                                      				struct HDC__* _v36;
                                      				BITMAPINFO* _v40;
                                      				void* _v44;
                                      				intOrPtr _v48;
                                      				struct tagRGBQUAD _v52;
                                      				struct HPALETTE__* _v56;
                                      				intOrPtr _v116;
                                      				intOrPtr _v120;
                                      				intOrPtr _v132;
                                      				intOrPtr _v136;
                                      				void _v140;
                                      				struct tagRECT _v156;
                                      				void* __ebx;
                                      				void* __ebp;
                                      				signed short _t229;
                                      				int _t281;
                                      				signed int _t290;
                                      				signed short _t292;
                                      				struct HBRUSH__* _t366;
                                      				struct HPALETTE__* _t422;
                                      				signed int _t441;
                                      				intOrPtr _t442;
                                      				intOrPtr _t444;
                                      				intOrPtr _t445;
                                      				void* _t455;
                                      				void* _t457;
                                      				void* _t459;
                                      				intOrPtr _t460;
                                      
                                      				_t457 = _t459;
                                      				_t460 = _t459 + 0xffffff68;
                                      				_push(_t419);
                                      				_v16 = __ecx;
                                      				_v12 = __edx;
                                      				_v8 = __eax;
                                      				_v20 = 0;
                                      				if( *(_a8 + 0x18) == 0 ||  *(_a8 + 0x1c) != 0 &&  *(_a8 + 0x20) != 0) {
                                      					if( *(_a8 + 0x18) != 0 ||  *(_a8 + 4) != 0 &&  *(_a8 + 8) != 0) {
                                      						E009F6A78(_v8);
                                      						_v116 = 0;
                                      						if(_v8 != 0 && GetObjectA(_v8, 0x54,  &_v140) < 0x18) {
                                      							E009F5370();
                                      						}
                                      						_v28 = E009F5484(GetDC(0));
                                      						_v32 = E009F5484(CreateCompatibleDC(_v28));
                                      						_push(_t457);
                                      						_push(0x9f750a);
                                      						_push( *[fs:edx]);
                                      						 *[fs:edx] = _t460;
                                      						if( *(_a8 + 0x18) >= 0x28) {
                                      							_v40 = E009D28CC(0x42c);
                                      							_push(_t457);
                                      							_push(0x9f7214);
                                      							_push( *[fs:edx]);
                                      							 *[fs:edx] = _t460;
                                      							 *(_a8 + 0x18) = 0x28;
                                      							 *((short*)(_a8 + 0x24)) = 1;
                                      							if( *(_a8 + 0x26) == 0) {
                                      								_t290 = GetDeviceCaps(_v28, 0xc);
                                      								_t292 = GetDeviceCaps(_v28, 0xe);
                                      								_t419 = _t290 * _t292;
                                      								 *(_a8 + 0x26) = _t290 * _t292;
                                      							}
                                      							memcpy(_v40, _a8 + 0x18, 0xa << 2);
                                      							 *(_a8 + 4) =  *(_a8 + 0x1c);
                                      							_t441 = _a8;
                                      							 *(_t441 + 8) =  *(_a8 + 0x20);
                                      							if( *(_a8 + 0x26) > 8) {
                                      								_t229 =  *(_a8 + 0x26);
                                      								if(_t229 == 0x10) {
                                      									L30:
                                      									if(( *(_a8 + 0x28) & 0x00000003) != 0) {
                                      										E009F6E70(_a8);
                                      										_t104 =  &(_v40->bmiColors); // 0x29
                                      										_t441 = _t104;
                                      										E009D2AC8(_a8 + 0x40, 0xc, _t441);
                                      									}
                                      								} else {
                                      									_t441 = _a8;
                                      									if(_t229 == 0x20) {
                                      										goto L30;
                                      									}
                                      								}
                                      							} else {
                                      								if( *(_a8 + 0x26) != 1 || _v8 != 0 && _v120 != 0) {
                                      									if(_v16 == 0) {
                                      										if(_v8 != 0) {
                                      											_v24 = SelectObject(_v32, _v8);
                                      											if(_v116 <= 0 || _v120 == 0) {
                                      												asm("cdq");
                                      												GetDIBits(_v32, _v8, 0, ( *(_a8 + 0x20) ^ _t441) - _t441, 0, _v40, 0);
                                      											} else {
                                      												_t281 = GetDIBColorTable(_v32, 0, 0x100,  &(_v40->bmiColors));
                                      												_t441 = _a8;
                                      												 *(_t441 + 0x38) = _t281;
                                      											}
                                      											SelectObject(_v32, _v24);
                                      										}
                                      									} else {
                                      										_t76 =  &(_v40->bmiColors); // 0x29
                                      										_t441 = _t76;
                                      										E009F5C18(_v16, 0xff, _t441);
                                      									}
                                      								} else {
                                      									_t441 = 0;
                                      									_v40->bmiColors = 0;
                                      									 *((intOrPtr*)(_v40 + 0x2c)) = 0xffffff;
                                      								}
                                      							}
                                      							_v20 = E009F5484(CreateDIBSection(_v28, _v40, 0,  &_v44, 0, 0));
                                      							if(_v44 == 0) {
                                      								E009F53DC(_t419);
                                      							}
                                      							if(_v8 == 0 ||  *(_a8 + 0x1c) != _v136 ||  *(_a8 + 0x20) != _v132 ||  *(_a8 + 0x26) <= 8) {
                                      								_pop(_t442);
                                      								 *[fs:eax] = _t442;
                                      								_push(0x9f721b);
                                      								return E009D28EC(_v40);
                                      							} else {
                                      								asm("cdq");
                                      								GetDIBits(_v32, _v8, 0, ( *(_a8 + 0x20) ^ _t441) - _t441, _v44, _v40, 0);
                                      								E009D3C6C();
                                      								E009D3C6C();
                                      								goto L58;
                                      							}
                                      						} else {
                                      							if(( *(_a8 + 0x10) |  *(_a8 + 0x12)) != 1) {
                                      								_v20 = E009F5484(CreateCompatibleBitmap(_v28,  *(_a8 + 4),  *(_a8 + 8)));
                                      							} else {
                                      								_v20 = E009F5484(CreateBitmap( *(_a8 + 4),  *(_a8 + 8), 1, 1, 0));
                                      							}
                                      							E009F5484(_v20);
                                      							_v24 = E009F5484(SelectObject(_v32, _v20));
                                      							_push(_t457);
                                      							_push(0x9f74bb);
                                      							_push( *[fs:eax]);
                                      							 *[fs:eax] = _t460;
                                      							_push(_t457);
                                      							_push(0x9f74aa);
                                      							_push( *[fs:eax]);
                                      							 *[fs:eax] = _t460;
                                      							_v56 = 0;
                                      							_t422 = 0;
                                      							if(_v16 != 0) {
                                      								_v56 = SelectPalette(_v32, _v16, 0);
                                      								RealizePalette(_v32);
                                      							}
                                      							_push(_t457);
                                      							_push(0x9f7488);
                                      							_push( *[fs:eax]);
                                      							 *[fs:eax] = _t460;
                                      							if(_a4 == 0) {
                                      								PatBlt(_v32, 0, 0,  *(_a8 + 4),  *(_a8 + 8), 0xff0062);
                                      							} else {
                                      								_t366 = E009F4A40( *((intOrPtr*)(_a4 + 0x14)));
                                      								E009EA228(0,  *(_a8 + 4), 0,  &_v156,  *(_a8 + 8));
                                      								FillRect(_v32,  &_v156, _t366);
                                      								SetTextColor(_v32, E009F3D80( *((intOrPtr*)( *((intOrPtr*)(_a4 + 0xc)) + 0x18))));
                                      								SetBkColor(_v32, E009F3D80(E009F4A04( *((intOrPtr*)(_a4 + 0x14)))));
                                      								if( *(_a8 + 0x26) == 1 &&  *((intOrPtr*)(_a8 + 0x14)) != 0) {
                                      									_v52 = E009F3D80( *((intOrPtr*)( *((intOrPtr*)(_a4 + 0xc)) + 0x18)));
                                      									_v48 = E009F3D80(E009F4A04( *((intOrPtr*)(_a4 + 0x14))));
                                      									SetDIBColorTable(_v32, 0, 2,  &_v52);
                                      								}
                                      							}
                                      							if(_v8 == 0) {
                                      								_pop(_t444);
                                      								 *[fs:eax] = _t444;
                                      								_push(0x9f748f);
                                      								if(_v16 != 0) {
                                      									return SelectPalette(_v32, _v56, 0xffffffff);
                                      								}
                                      								return 0;
                                      							} else {
                                      								_v36 = E009F5484(CreateCompatibleDC(_v28));
                                      								_push(_t457);
                                      								_push(0x9f745e);
                                      								_push( *[fs:eax]);
                                      								 *[fs:eax] = _t460;
                                      								_t455 = E009F5484(SelectObject(_v36, _v8));
                                      								if(_v12 != 0) {
                                      									_t422 = SelectPalette(_v36, _v12, 0);
                                      									RealizePalette(_v36);
                                      								}
                                      								if(_a4 != 0) {
                                      									SetTextColor(_v36, E009F3D80( *((intOrPtr*)( *((intOrPtr*)(_a4 + 0xc)) + 0x18))));
                                      									SetBkColor(_v36, E009F3D80(E009F4A04( *((intOrPtr*)(_a4 + 0x14)))));
                                      								}
                                      								BitBlt(_v32, 0, 0,  *(_a8 + 4),  *(_a8 + 8), _v36, 0, 0, 0xcc0020);
                                      								if(_v12 != 0) {
                                      									SelectPalette(_v36, _t422, 0xffffffff);
                                      								}
                                      								E009F5484(SelectObject(_v36, _t455));
                                      								_pop(_t445);
                                      								 *[fs:eax] = _t445;
                                      								_push(0x9f7465);
                                      								return DeleteDC(_v36);
                                      							}
                                      						}
                                      					} else {
                                      						goto L58;
                                      					}
                                      				} else {
                                      					L58:
                                      					return _v20;
                                      				}
                                      			}






































                                      0x009f6ebd
                                      0x009f6ebf
                                      0x009f6ec5
                                      0x009f6ec8
                                      0x009f6ecb
                                      0x009f6ece
                                      0x009f6ed3
                                      0x009f6edd
                                      0x009f6f00
                                      0x009f6f1f
                                      0x009f6f26
                                      0x009f6f2d
                                      0x009f6f46
                                      0x009f6f46
                                      0x009f6f57
                                      0x009f6f68
                                      0x009f6f6d
                                      0x009f6f6e
                                      0x009f6f73
                                      0x009f6f76
                                      0x009f6f80
                                      0x009f6fea
                                      0x009f6fef
                                      0x009f6ff0
                                      0x009f6ff5
                                      0x009f6ff8
                                      0x009f6ffe
                                      0x009f7008
                                      0x009f7016
                                      0x009f701e
                                      0x009f702b
                                      0x009f7030
                                      0x009f7037
                                      0x009f7037
                                      0x009f704b
                                      0x009f7056
                                      0x009f705f
                                      0x009f7062
                                      0x009f706d
                                      0x009f713d
                                      0x009f7145
                                      0x009f7150
                                      0x009f7157
                                      0x009f715c
                                      0x009f7164
                                      0x009f7164
                                      0x009f7172
                                      0x009f7172
                                      0x009f7147
                                      0x009f7147
                                      0x009f714e
                                      0x00000000
                                      0x00000000
                                      0x009f714e
                                      0x009f7073
                                      0x009f707b
                                      0x009f70a9
                                      0x009f70c7
                                      0x009f70da
                                      0x009f70e1
                                      0x009f7116
                                      0x009f7126
                                      0x009f70e9
                                      0x009f70fb
                                      0x009f7100
                                      0x009f7103
                                      0x009f7103
                                      0x009f7133
                                      0x009f7133
                                      0x009f70ab
                                      0x009f70ae
                                      0x009f70ae
                                      0x009f70b9
                                      0x009f70b9
                                      0x009f7089
                                      0x009f708c
                                      0x009f708e
                                      0x009f709a
                                      0x009f709a
                                      0x009f707b
                                      0x009f7193
                                      0x009f719a
                                      0x009f719c
                                      0x009f719c
                                      0x009f71a5
                                      0x009f7200
                                      0x009f7203
                                      0x009f7206
                                      0x009f7213
                                      0x009f71ca
                                      0x009f71da
                                      0x009f71ea
                                      0x009f71ef
                                      0x009f71f4
                                      0x00000000
                                      0x009f71f4
                                      0x009f6f82
                                      0x009f6f94
                                      0x009f6fd8
                                      0x009f6f96
                                      0x009f6fb4
                                      0x009f6fb4
                                      0x009f721e
                                      0x009f7235
                                      0x009f723a
                                      0x009f723b
                                      0x009f7240
                                      0x009f7243
                                      0x009f7248
                                      0x009f7249
                                      0x009f724e
                                      0x009f7251
                                      0x009f7256
                                      0x009f7259
                                      0x009f725f
                                      0x009f7270
                                      0x009f7277
                                      0x009f7277
                                      0x009f727e
                                      0x009f727f
                                      0x009f7284
                                      0x009f7287
                                      0x009f728e
                                      0x009f7364
                                      0x009f7294
                                      0x009f729a
                                      0x009f72b8
                                      0x009f72c8
                                      0x009f72e0
                                      0x009f72fa
                                      0x009f7307
                                      0x009f7320
                                      0x009f7333
                                      0x009f7342
                                      0x009f7342
                                      0x009f7307
                                      0x009f736d
                                      0x009f7467
                                      0x009f746a
                                      0x009f746d
                                      0x009f7476
                                      0x00000000
                                      0x009f7482
                                      0x009f7487
                                      0x009f7373
                                      0x009f7381
                                      0x009f7386
                                      0x009f7387
                                      0x009f738c
                                      0x009f738f
                                      0x009f73a4
                                      0x009f73aa
                                      0x009f73bb
                                      0x009f73c1
                                      0x009f73c1
                                      0x009f73ca
                                      0x009f73df
                                      0x009f73f9
                                      0x009f73f9
                                      0x009f7421
                                      0x009f742a
                                      0x009f7433
                                      0x009f7433
                                      0x009f7442
                                      0x009f7449
                                      0x009f744c
                                      0x009f744f
                                      0x009f745d
                                      0x009f745d
                                      0x009f736d
                                      0x00000000
                                      0x00000000
                                      0x00000000
                                      0x009f7511
                                      0x009f7511
                                      0x009f751a
                                      0x009f751a

                                      APIs
                                      • GetObjectA.GDI32(00000000,00000054,?), ref: 009F6F3C
                                      • GetDC.USER32(00000000), ref: 009F6F4D
                                      • CreateCompatibleDC.GDI32(00000000), ref: 009F6F5E
                                      • CreateBitmap.GDI32(00000000,?,00000001,00000001,00000000), ref: 009F6FAA
                                      • CreateCompatibleBitmap.GDI32(00000028,00000000,?), ref: 009F6FCE
                                      • SelectObject.GDI32(?,?), ref: 009F722B
                                      • SelectPalette.GDI32(?,00000000,00000000), ref: 009F726B
                                      • RealizePalette.GDI32(?), ref: 009F7277
                                      • SetTextColor.GDI32(?,00000000), ref: 009F72E0
                                      • SetBkColor.GDI32(?,00000000), ref: 009F72FA
                                      • SetDIBColorTable.GDI32(?,00000000,00000002,?,?,00000000,?,00000000,?,?,00000000,00000000,009F7488,?,00000000,009F74AA), ref: 009F7342
                                      • FillRect.USER32 ref: 009F72C8
                                        • Part of subcall function 009F3D80: GetSysColor.USER32(?), ref: 009F3D8A
                                      • PatBlt.GDI32(?,00000000,00000000,?,?,00FF0062), ref: 009F7364
                                      • CreateCompatibleDC.GDI32(00000028), ref: 009F7377
                                      • SelectObject.GDI32(?,00000000), ref: 009F739A
                                      • SelectPalette.GDI32(?,00000000,00000000), ref: 009F73B6
                                      • RealizePalette.GDI32(?), ref: 009F73C1
                                      • SetTextColor.GDI32(?,00000000), ref: 009F73DF
                                      • SetBkColor.GDI32(?,00000000), ref: 009F73F9
                                      • BitBlt.GDI32(?,00000000,00000000,?,?,?,00000000,00000000,00CC0020), ref: 009F7421
                                      • SelectPalette.GDI32(?,00000000,000000FF), ref: 009F7433
                                      • SelectObject.GDI32(?,00000000), ref: 009F743D
                                      • DeleteDC.GDI32(?), ref: 009F7458
                                        • Part of subcall function 009F4A40: CreateBrushIndirect.GDI32(?), ref: 009F4AEA
                                      Memory Dump Source
                                      • Source File: 00000002.00000002.323140727.00000000009D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009D0000, based on PE: true
                                      • Associated: 00000002.00000002.323135167.00000000009D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000002.00000002.323238271.0000000000A9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000002.00000002.323247473.0000000000AA3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_2_2_9d0000_rundll32.jbxd
                                      Similarity
                                      • API ID: ColorSelect$CreatePalette$Object$Compatible$BitmapRealizeText$BrushDeleteFillIndirectRectTable
                                      • String ID:
                                      • API String ID: 1299887459-0
                                      • Opcode ID: d7358d481b0a75f54f397ea1835a9e1712a0b2a7690a22198831fe60c29c8ccd
                                      • Instruction ID: 5dbb805c6e560b7ed670a1d75db86c15c30362e1eae5004ffbf95f19ff472dc5
                                      • Opcode Fuzzy Hash: d7358d481b0a75f54f397ea1835a9e1712a0b2a7690a22198831fe60c29c8ccd
                                      • Instruction Fuzzy Hash: 0A12E875A44208AFDB10EFA8C885FAEB7F9EB48314F118555FA14EB2A1C774ED44CB60
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      C-Code - Quality: 53%
                                      			E009D5A3C(char* __eax, intOrPtr __edx) {
                                      				char* _v8;
                                      				intOrPtr _v12;
                                      				intOrPtr _v16;
                                      				struct _WIN32_FIND_DATAA _v334;
                                      				char _v595;
                                      				void* _t45;
                                      				char* _t54;
                                      				char* _t64;
                                      				void* _t83;
                                      				intOrPtr* _t84;
                                      				char* _t90;
                                      				struct HINSTANCE__* _t91;
                                      				char* _t93;
                                      				void* _t94;
                                      				char* _t95;
                                      				void* _t96;
                                      
                                      				_v12 = __edx;
                                      				_v8 = __eax;
                                      				_v16 = _v8;
                                      				_t91 = GetModuleHandleA("kernel32.dll");
                                      				if(_t91 == 0) {
                                      					L4:
                                      					if( *_v8 != 0x5c) {
                                      						_t93 = _v8 + 2;
                                      						goto L10;
                                      					} else {
                                      						if( *((char*)(_v8 + 1)) == 0x5c) {
                                      							_t95 = E009D5A28(_v8 + 2);
                                      							if( *_t95 != 0) {
                                      								_t14 = _t95 + 1; // 0x1
                                      								_t93 = E009D5A28(_t14);
                                      								if( *_t93 != 0) {
                                      									L10:
                                      									_t83 = _t93 - _v8;
                                      									_push(_t83 + 1);
                                      									_push(_v8);
                                      									_push( &_v595);
                                      									L009D14A4();
                                      									while( *_t93 != 0) {
                                      										_t90 = E009D5A28(_t93 + 1);
                                      										_t45 = _t90 - _t93;
                                      										if(_t45 + _t83 + 1 <= 0x105) {
                                      											_push(_t45 + 1);
                                      											_push(_t93);
                                      											_push( &(( &_v595)[_t83]));
                                      											L009D14A4();
                                      											_t94 = FindFirstFileA( &_v595,  &_v334);
                                      											if(_t94 != 0xffffffff) {
                                      												FindClose(_t94);
                                      												_t54 =  &(_v334.cFileName);
                                      												_push(_t54);
                                      												L009D14AC();
                                      												if(_t54 + _t83 + 1 + 1 <= 0x105) {
                                      													 *((char*)(_t96 + _t83 - 0x24f)) = 0x5c;
                                      													_push(0x105 - _t83 - 1);
                                      													_push( &(_v334.cFileName));
                                      													_push( &(( &(( &_v595)[_t83]))[1]));
                                      													L009D14A4();
                                      													_t64 =  &(_v334.cFileName);
                                      													_push(_t64);
                                      													L009D14AC();
                                      													_t83 = _t83 + _t64 + 1;
                                      													_t93 = _t90;
                                      													continue;
                                      												}
                                      											}
                                      										}
                                      										goto L17;
                                      									}
                                      									_push(_v12);
                                      									_push( &_v595);
                                      									_push(_v8);
                                      									L009D14A4();
                                      								}
                                      							}
                                      						}
                                      					}
                                      				} else {
                                      					_t84 = GetProcAddress(_t91, "GetLongPathNameA");
                                      					if(_t84 == 0) {
                                      						goto L4;
                                      					} else {
                                      						_push(0x105);
                                      						_push( &_v595);
                                      						_push(_v8);
                                      						if( *_t84() == 0) {
                                      							goto L4;
                                      						} else {
                                      							_push(_v12);
                                      							_push( &_v595);
                                      							_push(_v8);
                                      							L009D14A4();
                                      						}
                                      					}
                                      				}
                                      				L17:
                                      				return _v16;
                                      			}



















                                      0x009d5a48
                                      0x009d5a4b
                                      0x009d5a51
                                      0x009d5a5e
                                      0x009d5a62
                                      0x009d5aa4
                                      0x009d5aaa
                                      0x009d5ae7
                                      0x00000000
                                      0x009d5aac
                                      0x009d5ab3
                                      0x009d5ac4
                                      0x009d5ac9
                                      0x009d5acf
                                      0x009d5ad7
                                      0x009d5adc
                                      0x009d5aea
                                      0x009d5aec
                                      0x009d5af2
                                      0x009d5af6
                                      0x009d5afd
                                      0x009d5afe
                                      0x009d5ba9
                                      0x009d5b10
                                      0x009d5b14
                                      0x009d5b21
                                      0x009d5b28
                                      0x009d5b29
                                      0x009d5b32
                                      0x009d5b33
                                      0x009d5b4b
                                      0x009d5b50
                                      0x009d5b53
                                      0x009d5b58
                                      0x009d5b5e
                                      0x009d5b5f
                                      0x009d5b6f
                                      0x009d5b71
                                      0x009d5b81
                                      0x009d5b88
                                      0x009d5b92
                                      0x009d5b93
                                      0x009d5b98
                                      0x009d5b9e
                                      0x009d5b9f
                                      0x009d5ba5
                                      0x009d5ba7
                                      0x00000000
                                      0x009d5ba7
                                      0x009d5b6f
                                      0x009d5b50
                                      0x00000000
                                      0x009d5b21
                                      0x009d5bb5
                                      0x009d5bbc
                                      0x009d5bc0
                                      0x009d5bc1
                                      0x009d5bc1
                                      0x009d5adc
                                      0x009d5ac9
                                      0x009d5ab3
                                      0x009d5a64
                                      0x009d5a6f
                                      0x009d5a73
                                      0x00000000
                                      0x009d5a75
                                      0x009d5a75
                                      0x009d5a80
                                      0x009d5a84
                                      0x009d5a89
                                      0x00000000
                                      0x009d5a8b
                                      0x009d5a8e
                                      0x009d5a95
                                      0x009d5a99
                                      0x009d5a9a
                                      0x009d5a9a
                                      0x009d5a89
                                      0x009d5a73
                                      0x009d5bc6
                                      0x009d5bcf

                                      APIs
                                      • GetModuleHandleA.KERNEL32(kernel32.dll,?,108B00A9,00A9C0A4,?,009D5C9C,00000000,009D5CF9,?,80000001,Software\Borland\Locales,00000000,000F0019,?,00000000,?), ref: 009D5A59
                                      • GetProcAddress.KERNEL32(00000000,GetLongPathNameA), ref: 009D5A6A
                                      • lstrcpyn.KERNEL32(?,?,?,?,108B00A9,00A9C0A4,?,009D5C9C,00000000,009D5CF9,?,80000001,Software\Borland\Locales,00000000,000F0019,?), ref: 009D5A9A
                                      • lstrcpyn.KERNEL32(?,?,?,kernel32.dll,?,108B00A9,00A9C0A4,?,009D5C9C,00000000,009D5CF9,?,80000001,Software\Borland\Locales,00000000,000F0019), ref: 009D5AFE
                                      • lstrcpyn.KERNEL32(?,?,00000001,?,?,?,kernel32.dll,?,108B00A9,00A9C0A4,?,009D5C9C,00000000,009D5CF9,?,80000001), ref: 009D5B33
                                      • FindFirstFileA.KERNEL32(?,?,?,?,00000001,?,?,?,kernel32.dll,?,108B00A9,00A9C0A4,?,009D5C9C,00000000,009D5CF9), ref: 009D5B46
                                      • FindClose.KERNEL32(00000000,?,?,?,?,00000001,?,?,?,kernel32.dll,?,108B00A9,00A9C0A4,?,009D5C9C,00000000), ref: 009D5B53
                                      • lstrlen.KERNEL32(?,00000000,?,?,?,?,00000001,?,?,?,kernel32.dll,?,108B00A9,00A9C0A4,?,009D5C9C), ref: 009D5B5F
                                      • lstrcpyn.KERNEL32(0000005D,?,00000104), ref: 009D5B93
                                      • lstrlen.KERNEL32(?,0000005D,?,00000104), ref: 009D5B9F
                                      • lstrcpyn.KERNEL32(?,0000005C,?,?,0000005D,?,00000104), ref: 009D5BC1
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000002.00000002.323140727.00000000009D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009D0000, based on PE: true
                                      • Associated: 00000002.00000002.323135167.00000000009D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000002.00000002.323238271.0000000000A9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000002.00000002.323247473.0000000000AA3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_2_2_9d0000_rundll32.jbxd
                                      Similarity
                                      • API ID: lstrcpyn$Findlstrlen$AddressCloseFileFirstHandleModuleProc
                                      • String ID: GetLongPathNameA$\$kernel32.dll
                                      • API String ID: 3245196872-1565342463
                                      • Opcode ID: f0fba946f68021a84738f54470dcf9587e11fe50b08e8592a49b656fdd9f319a
                                      • Instruction ID: e1a6bbc31736a7d748734733fdc1058d8e8c608c9d52e110c75c1039ddd6af19
                                      • Opcode Fuzzy Hash: f0fba946f68021a84738f54470dcf9587e11fe50b08e8592a49b656fdd9f319a
                                      • Instruction Fuzzy Hash: D241B272E40619AFDB10DEA8CDC5FDEB3EC9F84314F1985A3A548E7342D6749E448B50
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      C-Code - Quality: 75%
                                      			E00A212A4(void* __eax) {
                                      				void* _v28;
                                      				struct _WINDOWPLACEMENT _v56;
                                      				struct tagPOINT _v64;
                                      				intOrPtr _v68;
                                      				void* _t43;
                                      				struct HWND__* _t45;
                                      				struct tagPOINT* _t47;
                                      
                                      				_t47 =  &(_v64.y);
                                      				_t43 = __eax;
                                      				if(IsIconic( *(__eax + 0x180)) == 0) {
                                      					GetWindowRect( *(_t43 + 0x180), _t47);
                                      				} else {
                                      					_v56.length = 0x2c;
                                      					GetWindowPlacement( *(_t43 + 0x180),  &_v56);
                                      					asm("movsd");
                                      					asm("movsd");
                                      					asm("movsd");
                                      					asm("movsd");
                                      				}
                                      				if((GetWindowLongA( *(_t43 + 0x180), 0xfffffff0) & 0x40000000) != 0) {
                                      					_t45 = GetWindowLongA( *(_t43 + 0x180), 0xfffffff8);
                                      					if(_t45 != 0) {
                                      						ScreenToClient(_t45, _t47);
                                      						ScreenToClient(_t45,  &_v64);
                                      					}
                                      				}
                                      				 *(_t43 + 0x40) = _t47->x;
                                      				 *((intOrPtr*)(_t43 + 0x44)) = _v68;
                                      				 *((intOrPtr*)(_t43 + 0x48)) = _v64.x - _t47->x;
                                      				 *((intOrPtr*)(_t43 + 0x4c)) = _v64.y.x - _v68;
                                      				return E00A19EC8(_t43);
                                      			}










                                      0x00a212a7
                                      0x00a212aa
                                      0x00a212ba
                                      0x00a212e9
                                      0x00a212bc
                                      0x00a212bc
                                      0x00a212d0
                                      0x00a212db
                                      0x00a212dc
                                      0x00a212dd
                                      0x00a212de
                                      0x00a212de
                                      0x00a21301
                                      0x00a21311
                                      0x00a21315
                                      0x00a21319
                                      0x00a21324
                                      0x00a21324
                                      0x00a21315
                                      0x00a2132c
                                      0x00a21333
                                      0x00a2133d
                                      0x00a21348
                                      0x00a21358

                                      APIs
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000002.00000002.323140727.00000000009D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009D0000, based on PE: true
                                      • Associated: 00000002.00000002.323135167.00000000009D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000002.00000002.323238271.0000000000A9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000002.00000002.323247473.0000000000AA3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_2_2_9d0000_rundll32.jbxd
                                      Similarity
                                      • API ID: Window$ClientLongScreen$IconicPlacementRect
                                      • String ID: ,
                                      • API String ID: 2266315723-3772416878
                                      • Opcode ID: 3060b129f77656993c980b683b3ce269a337311b18e64e05ed864e304957aba0
                                      • Instruction ID: 7d1f15306e8f86fcbc7d4ba7c48822456196e9da76981cd648472c6b27f5f1ca
                                      • Opcode Fuzzy Hash: 3060b129f77656993c980b683b3ce269a337311b18e64e05ed864e304957aba0
                                      • Instruction Fuzzy Hash: AF118E71504250AFCB41EFACD881A8BB7E8AF88310F148979FE58DB346E730D9048B61
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      C-Code - Quality: 79%
                                      			E009F9C84(void* __edi, struct HWND__* _a4, signed int _a8) {
                                      				struct _WINDOWPLACEMENT _v48;
                                      				void* __ebx;
                                      				void* __esi;
                                      				void* __ebp;
                                      				signed int _t19;
                                      				intOrPtr _t21;
                                      				struct HWND__* _t23;
                                      
                                      				_t19 = _a8;
                                      				_t23 = _a4;
                                      				if( *0xa9f91d != 0) {
                                      					if((_t19 & 0x00000003) == 0) {
                                      						if(IsIconic(_t23) == 0) {
                                      							GetWindowRect(_t23,  &(_v48.rcNormalPosition));
                                      						} else {
                                      							GetWindowPlacement(_t23,  &_v48);
                                      						}
                                      						return E009F9BF4( &(_v48.rcNormalPosition), _t19);
                                      					}
                                      					return 0x12340042;
                                      				}
                                      				_t21 =  *0xa9f8f8; // 0x9f9c84
                                      				 *0xa9f8f8 = E009F9A84(1, _t19, _t21, __edi, _t23);
                                      				return  *0xa9f8f8(_t23, _t19);
                                      			}










                                      0x009f9c8c
                                      0x009f9c8f
                                      0x009f9c99
                                      0x009f9cc3
                                      0x009f9cd4
                                      0x009f9ce7
                                      0x009f9cd6
                                      0x009f9cdb
                                      0x009f9cdb
                                      0x00000000
                                      0x009f9cf1
                                      0x00000000
                                      0x009f9cc5
                                      0x009f9ca0
                                      0x009f9cad
                                      0x00000000

                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000002.00000002.323140727.00000000009D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009D0000, based on PE: true
                                      • Associated: 00000002.00000002.323135167.00000000009D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000002.00000002.323238271.0000000000A9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000002.00000002.323247473.0000000000AA3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_2_2_9d0000_rundll32.jbxd
                                      Similarity
                                      • API ID: AddressProc
                                      • String ID: MonitorFromWindow
                                      • API String ID: 190572456-2842599566
                                      • Opcode ID: 744710a2a6aea99db1f899d48c666d8fabf43416c5e77c92389232660f0071a5
                                      • Instruction ID: 6ddad10e36a48905cbd214ffc0601bb8f129b638100aa78a9092f9f9cd006ee9
                                      • Opcode Fuzzy Hash: 744710a2a6aea99db1f899d48c666d8fabf43416c5e77c92389232660f0071a5
                                      • Instruction Fuzzy Hash: D4016D71A0421C6E8B10EB94AD81BFEB39CEB45314B548423FFA597241EB249A0287F5
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      C-Code - Quality: 58%
                                      			E00A0047C(void* __eax, void* __ebx, void* __edi, void* __esi) {
                                      				char _v8;
                                      				CHAR* _t20;
                                      				long _t25;
                                      				intOrPtr _t30;
                                      				void* _t34;
                                      				intOrPtr _t37;
                                      
                                      				_push(0);
                                      				_t34 = __eax;
                                      				_push(_t37);
                                      				_push(0xa004f9);
                                      				_push( *[fs:eax]);
                                      				 *[fs:eax] = _t37;
                                      				E009FFEDC(__eax);
                                      				_t25 = GetTickCount();
                                      				do {
                                      					Sleep(0);
                                      				} while (GetTickCount() - _t25 <= 0x3e8);
                                      				E009FFADC(_t34, _t25,  &_v8, 0, __edi, _t34);
                                      				if(_v8 != 0) {
                                      					_t20 = E009D46E8(_v8);
                                      					WinHelpA( *((intOrPtr*)( *((intOrPtr*)( *((intOrPtr*)(_t34 + 0x1c)))) + 0xc))(), _t20, 9, 0);
                                      				}
                                      				_pop(_t30);
                                      				 *[fs:eax] = _t30;
                                      				_push(0xa00500);
                                      				return E009D4228( &_v8);
                                      			}









                                      0x00a0047f
                                      0x00a00483
                                      0x00a00487
                                      0x00a00488
                                      0x00a0048d
                                      0x00a00490
                                      0x00a00495
                                      0x00a0049f
                                      0x00a004a1
                                      0x00a004a3
                                      0x00a004af
                                      0x00a004bd
                                      0x00a004c6
                                      0x00a004cf
                                      0x00a004de
                                      0x00a004de
                                      0x00a004e5
                                      0x00a004e8
                                      0x00a004eb
                                      0x00a004f8

                                      APIs
                                        • Part of subcall function 009FFEDC: WinHelpA.USER32 ref: 009FFEEB
                                      • GetTickCount.KERNEL32 ref: 00A0049A
                                      • Sleep.KERNEL32(00000000,00000000,00A004F9,?,?,00000000,00000000,?,00A00472), ref: 00A004A3
                                      • GetTickCount.KERNEL32 ref: 00A004A8
                                      • WinHelpA.USER32 ref: 00A004DE
                                      Memory Dump Source
                                      • Source File: 00000002.00000002.323140727.00000000009D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009D0000, based on PE: true
                                      • Associated: 00000002.00000002.323135167.00000000009D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000002.00000002.323238271.0000000000A9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000002.00000002.323247473.0000000000AA3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_2_2_9d0000_rundll32.jbxd
                                      Similarity
                                      • API ID: CountHelpTick$Sleep
                                      • String ID:
                                      • API String ID: 2438605093-0
                                      • Opcode ID: 2f91a7dd4e02749c8deaf2f02734662abc9a1e66dc4576aa1937dadc32456f84
                                      • Instruction ID: 9a7225179d56b48966ee250d24ae9bfa1617d26eb7cc25071b288766e4765570
                                      • Opcode Fuzzy Hash: 2f91a7dd4e02749c8deaf2f02734662abc9a1e66dc4576aa1937dadc32456f84
                                      • Instruction Fuzzy Hash: 23016235780208AFE311EB74DC52F6DB3A8EF89700F518572F500D76D2DB75AE018665
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      C-Code - Quality: 100%
                                      			E009D8F90(void* __eax) {
                                      				short _v6;
                                      				short _v8;
                                      				struct _FILETIME _v16;
                                      				struct _WIN32_FIND_DATAA _v336;
                                      				void* _t16;
                                      
                                      				_t16 = FindFirstFileA(E009D46E8(__eax),  &_v336);
                                      				if(_t16 == 0xffffffff) {
                                      					L3:
                                      					_v8 = 0xffffffff;
                                      				} else {
                                      					FindClose(_t16);
                                      					if((_v336.dwFileAttributes & 0x00000010) != 0) {
                                      						goto L3;
                                      					} else {
                                      						FileTimeToLocalFileTime( &(_v336.ftLastWriteTime),  &_v16);
                                      						if(FileTimeToDosDateTime( &_v16,  &_v6,  &_v8) == 0) {
                                      							goto L3;
                                      						}
                                      					}
                                      				}
                                      				return _v8;
                                      			}








                                      0x009d8fab
                                      0x009d8fb3
                                      0x009d8fe9
                                      0x009d8fe9
                                      0x009d8fb5
                                      0x009d8fb6
                                      0x009d8fc2
                                      0x00000000
                                      0x009d8fc4
                                      0x009d8fcf
                                      0x009d8fe7
                                      0x00000000
                                      0x00000000
                                      0x009d8fe7
                                      0x009d8fc2
                                      0x009d8ff7

                                      APIs
                                      • FindFirstFileA.KERNEL32(00000000,?), ref: 009D8FAB
                                      • FindClose.KERNEL32(00000000,00000000,?), ref: 009D8FB6
                                      • FileTimeToLocalFileTime.KERNEL32(?,?), ref: 009D8FCF
                                      • FileTimeToDosDateTime.KERNEL32 ref: 009D8FE0
                                      Memory Dump Source
                                      • Source File: 00000002.00000002.323140727.00000000009D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009D0000, based on PE: true
                                      • Associated: 00000002.00000002.323135167.00000000009D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000002.00000002.323238271.0000000000A9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000002.00000002.323247473.0000000000AA3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_2_2_9d0000_rundll32.jbxd
                                      Similarity
                                      • API ID: FileTime$Find$CloseDateFirstLocal
                                      • String ID:
                                      • API String ID: 2659516521-0
                                      • Opcode ID: 9f61c25bb551bc6150c669710fa06ffe61ab05e2590045b11eab567f278e58f4
                                      • Instruction ID: c305faf9bcfc6abcc2b447b04145cfbc30a9c76f640806d1eb06a66634860772
                                      • Opcode Fuzzy Hash: 9f61c25bb551bc6150c669710fa06ffe61ab05e2590045b11eab567f278e58f4
                                      • Instruction Fuzzy Hash: 82F0F47594020C66CB21EBF88C85ADFB3AC9B49314F5086A3B555D2292EB34DB044B90
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      C-Code - Quality: 90%
                                      			E009FBDCC(void* __ebx, void* __ecx) {
                                      				char _v5;
                                      				intOrPtr _t2;
                                      				intOrPtr _t6;
                                      				intOrPtr _t108;
                                      				intOrPtr _t111;
                                      
                                      				_t2 =  *0xa9fa50; // 0xf70dc8
                                      				E009FBBC4(_t2);
                                      				_push(_t111);
                                      				_push(0x9fc17f);
                                      				_push( *[fs:eax]);
                                      				 *[fs:eax] = _t111;
                                      				 *0xa9fa4c =  *0xa9fa4c + 1;
                                      				if( *0xa9fa48 == 0) {
                                      					 *0xa9fa48 = LoadLibraryA("uxtheme.dll");
                                      					if( *0xa9fa48 > 0) {
                                      						 *0xa9f988 = GetProcAddress( *0xa9fa48, "OpenThemeData");
                                      						 *0xa9f98c = GetProcAddress( *0xa9fa48, "CloseThemeData");
                                      						 *0xa9f990 = GetProcAddress( *0xa9fa48, "DrawThemeBackground");
                                      						 *0xa9f994 = GetProcAddress( *0xa9fa48, "DrawThemeText");
                                      						 *0xa9f998 = GetProcAddress( *0xa9fa48, "GetThemeBackgroundContentRect");
                                      						 *0xa9f99c = GetProcAddress( *0xa9fa48, "GetThemeBackgroundContentRect");
                                      						 *0xa9f9a0 = GetProcAddress( *0xa9fa48, "GetThemePartSize");
                                      						 *0xa9f9a4 = GetProcAddress( *0xa9fa48, "GetThemeTextExtent");
                                      						 *0xa9f9a8 = GetProcAddress( *0xa9fa48, "GetThemeTextMetrics");
                                      						 *0xa9f9ac = GetProcAddress( *0xa9fa48, "GetThemeBackgroundRegion");
                                      						 *0xa9f9b0 = GetProcAddress( *0xa9fa48, "HitTestThemeBackground");
                                      						 *0xa9f9b4 = GetProcAddress( *0xa9fa48, "DrawThemeEdge");
                                      						 *0xa9f9b8 = GetProcAddress( *0xa9fa48, "DrawThemeIcon");
                                      						 *0xa9f9bc = GetProcAddress( *0xa9fa48, "IsThemePartDefined");
                                      						 *0xa9f9c0 = GetProcAddress( *0xa9fa48, "IsThemeBackgroundPartiallyTransparent");
                                      						 *0xa9f9c4 = GetProcAddress( *0xa9fa48, "GetThemeColor");
                                      						 *0xa9f9c8 = GetProcAddress( *0xa9fa48, "GetThemeMetric");
                                      						 *0xa9f9cc = GetProcAddress( *0xa9fa48, "GetThemeString");
                                      						 *0xa9f9d0 = GetProcAddress( *0xa9fa48, "GetThemeBool");
                                      						 *0xa9f9d4 = GetProcAddress( *0xa9fa48, "GetThemeInt");
                                      						 *0xa9f9d8 = GetProcAddress( *0xa9fa48, "GetThemeEnumValue");
                                      						 *0xa9f9dc = GetProcAddress( *0xa9fa48, "GetThemePosition");
                                      						 *0xa9f9e0 = GetProcAddress( *0xa9fa48, "GetThemeFont");
                                      						 *0xa9f9e4 = GetProcAddress( *0xa9fa48, "GetThemeRect");
                                      						 *0xa9f9e8 = GetProcAddress( *0xa9fa48, "GetThemeMargins");
                                      						 *0xa9f9ec = GetProcAddress( *0xa9fa48, "GetThemeIntList");
                                      						 *0xa9f9f0 = GetProcAddress( *0xa9fa48, "GetThemePropertyOrigin");
                                      						 *0xa9f9f4 = GetProcAddress( *0xa9fa48, "SetWindowTheme");
                                      						 *0xa9f9f8 = GetProcAddress( *0xa9fa48, "GetThemeFilename");
                                      						 *0xa9f9fc = GetProcAddress( *0xa9fa48, "GetThemeSysColor");
                                      						 *0xa9fa00 = GetProcAddress( *0xa9fa48, "GetThemeSysColorBrush");
                                      						 *0xa9fa04 = GetProcAddress( *0xa9fa48, "GetThemeSysBool");
                                      						 *0xa9fa08 = GetProcAddress( *0xa9fa48, "GetThemeSysSize");
                                      						 *0xa9fa0c = GetProcAddress( *0xa9fa48, "GetThemeSysFont");
                                      						 *0xa9fa10 = GetProcAddress( *0xa9fa48, "GetThemeSysString");
                                      						 *0xa9fa14 = GetProcAddress( *0xa9fa48, "GetThemeSysInt");
                                      						 *0xa9fa18 = GetProcAddress( *0xa9fa48, "IsThemeActive");
                                      						 *0xa9fa1c = GetProcAddress( *0xa9fa48, "IsAppThemed");
                                      						 *0xa9fa20 = GetProcAddress( *0xa9fa48, "GetWindowTheme");
                                      						 *0xa9fa24 = GetProcAddress( *0xa9fa48, "EnableThemeDialogTexture");
                                      						 *0xa9fa28 = GetProcAddress( *0xa9fa48, "IsThemeDialogTextureEnabled");
                                      						 *0xa9fa2c = GetProcAddress( *0xa9fa48, "GetThemeAppProperties");
                                      						 *0xa9fa30 = GetProcAddress( *0xa9fa48, "SetThemeAppProperties");
                                      						 *0xa9fa34 = GetProcAddress( *0xa9fa48, "GetCurrentThemeName");
                                      						 *0xa9fa38 = GetProcAddress( *0xa9fa48, "GetThemeDocumentationProperty");
                                      						 *0xa9fa3c = GetProcAddress( *0xa9fa48, "DrawThemeParentBackground");
                                      						 *0xa9fa40 = GetProcAddress( *0xa9fa48, "EnableTheming");
                                      					}
                                      				}
                                      				_v5 =  *0xa9fa48 > 0;
                                      				_pop(_t108);
                                      				 *[fs:eax] = _t108;
                                      				_push(0x9fc186);
                                      				_t6 =  *0xa9fa50; // 0xf70dc8
                                      				return E009FBBCC(_t6);
                                      			}








                                      0x009fbdd6
                                      0x009fbddb
                                      0x009fbde2
                                      0x009fbde3
                                      0x009fbde8
                                      0x009fbdeb
                                      0x009fbdee
                                      0x009fbdf7
                                      0x009fbe07
                                      0x009fbe0c
                                      0x009fbe1f
                                      0x009fbe31
                                      0x009fbe43
                                      0x009fbe55
                                      0x009fbe67
                                      0x009fbe79
                                      0x009fbe8b
                                      0x009fbe9d
                                      0x009fbeaf
                                      0x009fbec1
                                      0x009fbed3
                                      0x009fbee5
                                      0x009fbef7
                                      0x009fbf09
                                      0x009fbf1b
                                      0x009fbf2d
                                      0x009fbf3f
                                      0x009fbf51
                                      0x009fbf63
                                      0x009fbf75
                                      0x009fbf87
                                      0x009fbf99
                                      0x009fbfab
                                      0x009fbfbd
                                      0x009fbfcf
                                      0x009fbfe1
                                      0x009fbff3
                                      0x009fc005
                                      0x009fc017
                                      0x009fc029
                                      0x009fc03b
                                      0x009fc04d
                                      0x009fc05f
                                      0x009fc071
                                      0x009fc083
                                      0x009fc095
                                      0x009fc0a7
                                      0x009fc0b9
                                      0x009fc0cb
                                      0x009fc0dd
                                      0x009fc0ef
                                      0x009fc101
                                      0x009fc113
                                      0x009fc125
                                      0x009fc137
                                      0x009fc149
                                      0x009fc15b
                                      0x009fc15b
                                      0x009fbe0c
                                      0x009fc163
                                      0x009fc169
                                      0x009fc16c
                                      0x009fc16f
                                      0x009fc174
                                      0x009fc17e

                                      APIs
                                      • LoadLibraryA.KERNEL32(uxtheme.dll,00000000,009FC17F), ref: 009FBE02
                                      • GetProcAddress.KERNEL32(00000000,OpenThemeData), ref: 009FBE1A
                                      • GetProcAddress.KERNEL32(00000000,CloseThemeData), ref: 009FBE2C
                                      • GetProcAddress.KERNEL32(00000000,DrawThemeBackground), ref: 009FBE3E
                                      • GetProcAddress.KERNEL32(00000000,DrawThemeText), ref: 009FBE50
                                      • GetProcAddress.KERNEL32(00000000,GetThemeBackgroundContentRect), ref: 009FBE62
                                      • GetProcAddress.KERNEL32(00000000,GetThemeBackgroundContentRect), ref: 009FBE74
                                      • GetProcAddress.KERNEL32(00000000,GetThemePartSize), ref: 009FBE86
                                      • GetProcAddress.KERNEL32(00000000,GetThemeTextExtent), ref: 009FBE98
                                      • GetProcAddress.KERNEL32(00000000,GetThemeTextMetrics), ref: 009FBEAA
                                      • GetProcAddress.KERNEL32(00000000,GetThemeBackgroundRegion), ref: 009FBEBC
                                      • GetProcAddress.KERNEL32(00000000,HitTestThemeBackground), ref: 009FBECE
                                      • GetProcAddress.KERNEL32(00000000,DrawThemeEdge), ref: 009FBEE0
                                      • GetProcAddress.KERNEL32(00000000,DrawThemeIcon), ref: 009FBEF2
                                      • GetProcAddress.KERNEL32(00000000,IsThemePartDefined), ref: 009FBF04
                                      • GetProcAddress.KERNEL32(00000000,IsThemeBackgroundPartiallyTransparent), ref: 009FBF16
                                      • GetProcAddress.KERNEL32(00000000,GetThemeColor), ref: 009FBF28
                                      • GetProcAddress.KERNEL32(00000000,GetThemeMetric), ref: 009FBF3A
                                      • GetProcAddress.KERNEL32(00000000,GetThemeString), ref: 009FBF4C
                                      • GetProcAddress.KERNEL32(00000000,GetThemeBool), ref: 009FBF5E
                                      • GetProcAddress.KERNEL32(00000000,GetThemeInt), ref: 009FBF70
                                      • GetProcAddress.KERNEL32(00000000,GetThemeEnumValue), ref: 009FBF82
                                      • GetProcAddress.KERNEL32(00000000,GetThemePosition), ref: 009FBF94
                                      • GetProcAddress.KERNEL32(00000000,GetThemeFont), ref: 009FBFA6
                                      • GetProcAddress.KERNEL32(00000000,GetThemeRect), ref: 009FBFB8
                                      • GetProcAddress.KERNEL32(00000000,GetThemeMargins), ref: 009FBFCA
                                      • GetProcAddress.KERNEL32(00000000,GetThemeIntList), ref: 009FBFDC
                                      • GetProcAddress.KERNEL32(00000000,GetThemePropertyOrigin), ref: 009FBFEE
                                      • GetProcAddress.KERNEL32(00000000,SetWindowTheme), ref: 009FC000
                                      • GetProcAddress.KERNEL32(00000000,GetThemeFilename), ref: 009FC012
                                      • GetProcAddress.KERNEL32(00000000,GetThemeSysColor), ref: 009FC024
                                      • GetProcAddress.KERNEL32(00000000,GetThemeSysColorBrush), ref: 009FC036
                                      • GetProcAddress.KERNEL32(00000000,GetThemeSysBool), ref: 009FC048
                                      • GetProcAddress.KERNEL32(00000000,GetThemeSysSize), ref: 009FC05A
                                      • GetProcAddress.KERNEL32(00000000,GetThemeSysFont), ref: 009FC06C
                                      • GetProcAddress.KERNEL32(00000000,GetThemeSysString), ref: 009FC07E
                                      • GetProcAddress.KERNEL32(00000000,GetThemeSysInt), ref: 009FC090
                                      • GetProcAddress.KERNEL32(00000000,IsThemeActive), ref: 009FC0A2
                                      • GetProcAddress.KERNEL32(00000000,IsAppThemed), ref: 009FC0B4
                                      • GetProcAddress.KERNEL32(00000000,GetWindowTheme), ref: 009FC0C6
                                      • GetProcAddress.KERNEL32(00000000,EnableThemeDialogTexture), ref: 009FC0D8
                                      • GetProcAddress.KERNEL32(00000000,IsThemeDialogTextureEnabled), ref: 009FC0EA
                                      • GetProcAddress.KERNEL32(00000000,GetThemeAppProperties), ref: 009FC0FC
                                      • GetProcAddress.KERNEL32(00000000,SetThemeAppProperties), ref: 009FC10E
                                      • GetProcAddress.KERNEL32(00000000,GetCurrentThemeName), ref: 009FC120
                                      • GetProcAddress.KERNEL32(00000000,GetThemeDocumentationProperty), ref: 009FC132
                                      • GetProcAddress.KERNEL32(00000000,DrawThemeParentBackground), ref: 009FC144
                                      • GetProcAddress.KERNEL32(00000000,EnableTheming), ref: 009FC156
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000002.00000002.323140727.00000000009D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009D0000, based on PE: true
                                      • Associated: 00000002.00000002.323135167.00000000009D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000002.00000002.323238271.0000000000A9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000002.00000002.323247473.0000000000AA3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_2_2_9d0000_rundll32.jbxd
                                      Similarity
                                      • API ID: AddressProc$LibraryLoad
                                      • String ID: CloseThemeData$DrawThemeBackground$DrawThemeEdge$DrawThemeIcon$DrawThemeParentBackground$DrawThemeText$EnableThemeDialogTexture$EnableTheming$GetCurrentThemeName$GetThemeAppProperties$GetThemeBackgroundContentRect$GetThemeBackgroundRegion$GetThemeBool$GetThemeColor$GetThemeDocumentationProperty$GetThemeEnumValue$GetThemeFilename$GetThemeFont$GetThemeInt$GetThemeIntList$GetThemeMargins$GetThemeMetric$GetThemePartSize$GetThemePosition$GetThemePropertyOrigin$GetThemeRect$GetThemeString$GetThemeSysBool$GetThemeSysColor$GetThemeSysColorBrush$GetThemeSysFont$GetThemeSysInt$GetThemeSysSize$GetThemeSysString$GetThemeTextExtent$GetThemeTextMetrics$GetWindowTheme$HitTestThemeBackground$IsAppThemed$IsThemeActive$IsThemeBackgroundPartiallyTransparent$IsThemeDialogTextureEnabled$IsThemePartDefined$OpenThemeData$SetThemeAppProperties$SetWindowTheme$uxtheme.dll
                                      • API String ID: 2238633743-2910565190
                                      • Opcode ID: e731e6946666fc4beb02e40d007a02517b4b220bbd28e9737f6a5fbc8c2daacd
                                      • Instruction ID: 5c1ed095f872f99d59cde57708d5559f4e2030a944fc53f09d3e3d3774ce128b
                                      • Opcode Fuzzy Hash: e731e6946666fc4beb02e40d007a02517b4b220bbd28e9737f6a5fbc8c2daacd
                                      • Instruction Fuzzy Hash: B7A1F6F0B81658AFDB00EBF4ED86A3937A8EB867043148577B508CF695DBB9D8018B15
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      C-Code - Quality: 100%
                                      			E009DE7C4() {
                                      				struct HINSTANCE__* _v8;
                                      				intOrPtr _t46;
                                      				void* _t91;
                                      
                                      				_v8 = GetModuleHandleA("oleaut32.dll");
                                      				 *0xa9f7a8 = E009DE798("VariantChangeTypeEx", E009DE314, _t91);
                                      				 *0xa9f7ac = E009DE798("VarNeg", E009DE344, _t91);
                                      				 *0xa9f7b0 = E009DE798("VarNot", E009DE344, _t91);
                                      				 *0xa9f7b4 = E009DE798("VarAdd", E009DE350, _t91);
                                      				 *0xa9f7b8 = E009DE798("VarSub", E009DE350, _t91);
                                      				 *0xa9f7bc = E009DE798("VarMul", E009DE350, _t91);
                                      				 *0xa9f7c0 = E009DE798("VarDiv", E009DE350, _t91);
                                      				 *0xa9f7c4 = E009DE798("VarIdiv", E009DE350, _t91);
                                      				 *0xa9f7c8 = E009DE798("VarMod", E009DE350, _t91);
                                      				 *0xa9f7cc = E009DE798("VarAnd", E009DE350, _t91);
                                      				 *0xa9f7d0 = E009DE798("VarOr", E009DE350, _t91);
                                      				 *0xa9f7d4 = E009DE798("VarXor", E009DE350, _t91);
                                      				 *0xa9f7d8 = E009DE798("VarCmp", E009DE35C, _t91);
                                      				 *0xa9f7dc = E009DE798("VarI4FromStr", E009DE368, _t91);
                                      				 *0xa9f7e0 = E009DE798("VarR4FromStr", E009DE3D4, _t91);
                                      				 *0xa9f7e4 = E009DE798("VarR8FromStr", E009DE440, _t91);
                                      				 *0xa9f7e8 = E009DE798("VarDateFromStr", E009DE4AC, _t91);
                                      				 *0xa9f7ec = E009DE798("VarCyFromStr", E009DE518, _t91);
                                      				 *0xa9f7f0 = E009DE798("VarBoolFromStr", E009DE584, _t91);
                                      				 *0xa9f7f4 = E009DE798("VarBstrFromCy", E009DE604, _t91);
                                      				 *0xa9f7f8 = E009DE798("VarBstrFromDate", E009DE674, _t91);
                                      				_t46 = E009DE798("VarBstrFromBool", E009DE6E4, _t91);
                                      				 *0xa9f7fc = _t46;
                                      				return _t46;
                                      			}






                                      0x009de7d2
                                      0x009de7e6
                                      0x009de7fc
                                      0x009de812
                                      0x009de828
                                      0x009de83e
                                      0x009de854
                                      0x009de86a
                                      0x009de880
                                      0x009de896
                                      0x009de8ac
                                      0x009de8c2
                                      0x009de8d8
                                      0x009de8ee
                                      0x009de904
                                      0x009de91a
                                      0x009de930
                                      0x009de946
                                      0x009de95c
                                      0x009de972
                                      0x009de988
                                      0x009de99e
                                      0x009de9ae
                                      0x009de9b4
                                      0x009de9bb

                                      APIs
                                      • GetModuleHandleA.KERNEL32(oleaut32.dll), ref: 009DE7CD
                                        • Part of subcall function 009DE798: GetProcAddress.KERNEL32(00000000), ref: 009DE7B1
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000002.00000002.323140727.00000000009D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009D0000, based on PE: true
                                      • Associated: 00000002.00000002.323135167.00000000009D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000002.00000002.323238271.0000000000A9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000002.00000002.323247473.0000000000AA3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_2_2_9d0000_rundll32.jbxd
                                      Similarity
                                      • API ID: AddressHandleModuleProc
                                      • String ID: VarAdd$VarAnd$VarBoolFromStr$VarBstrFromBool$VarBstrFromCy$VarBstrFromDate$VarCmp$VarCyFromStr$VarDateFromStr$VarDiv$VarI4FromStr$VarIdiv$VarMod$VarMul$VarNeg$VarNot$VarOr$VarR4FromStr$VarR8FromStr$VarSub$VarXor$VariantChangeTypeEx$oleaut32.dll
                                      • API String ID: 1646373207-1918263038
                                      • Opcode ID: 2a758199a2a352882bf225bc6c833709c1513a990e764d79297f2f1763742f1b
                                      • Instruction ID: 61a36236e0ba2a7c55605a7d73dc3e2cb818d8804df25699f668ff59b668fc11
                                      • Opcode Fuzzy Hash: 2a758199a2a352882bf225bc6c833709c1513a990e764d79297f2f1763742f1b
                                      • Instruction Fuzzy Hash: B8418F716C43195BB7A4BFED688156ABBDDEB847103A0C43BF409CF759DD20A8428A29
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      C-Code - Quality: 77%
                                      			E009F5628(struct HDC__* __eax, void* __ebx, int __ecx, int __edx, void* __edi, void* __esi, int _a4, int _a8, struct HDC__* _a12, int _a16, int _a20, int _a24, int _a28, struct HDC__* _a32, int _a36, int _a40) {
                                      				int _v8;
                                      				int _v12;
                                      				char _v13;
                                      				struct HDC__* _v20;
                                      				void* _v24;
                                      				void* _v28;
                                      				long _v32;
                                      				long _v36;
                                      				struct HPALETTE__* _v40;
                                      				intOrPtr* _t78;
                                      				struct HPALETTE__* _t89;
                                      				struct HPALETTE__* _t95;
                                      				int _t171;
                                      				intOrPtr _t178;
                                      				intOrPtr _t180;
                                      				struct HDC__* _t182;
                                      				int _t184;
                                      				void* _t186;
                                      				void* _t187;
                                      				intOrPtr _t188;
                                      
                                      				_t186 = _t187;
                                      				_t188 = _t187 + 0xffffffdc;
                                      				_v12 = __ecx;
                                      				_v8 = __edx;
                                      				_t182 = __eax;
                                      				_t184 = _a16;
                                      				_t171 = _a20;
                                      				_v13 = 1;
                                      				_t78 =  *0xa9e62c; // 0xa9c0d4
                                      				if( *_t78 != 2 || _t171 != _a40 || _t184 != _a36) {
                                      					_v40 = 0;
                                      					_v20 = E009F5484(CreateCompatibleDC(0));
                                      					_push(_t186);
                                      					_push(0x9f58a8);
                                      					_push( *[fs:eax]);
                                      					 *[fs:eax] = _t188;
                                      					_v24 = E009F5484(CreateCompatibleBitmap(_a32, _t171, _t184));
                                      					_v28 = SelectObject(_v20, _v24);
                                      					_t89 =  *0xa9f894; // 0x840808f0
                                      					_v40 = SelectPalette(_a32, _t89, 0);
                                      					SelectPalette(_a32, _v40, 0);
                                      					if(_v40 == 0) {
                                      						_t95 =  *0xa9f894; // 0x840808f0
                                      						_v40 = SelectPalette(_v20, _t95, 0xffffffff);
                                      					} else {
                                      						_v40 = SelectPalette(_v20, _v40, 0xffffffff);
                                      					}
                                      					RealizePalette(_v20);
                                      					StretchBlt(_v20, 0, 0, _t171, _t184, _a12, _a8, _a4, _t171, _t184, 0xcc0020);
                                      					StretchBlt(_v20, 0, 0, _t171, _t184, _a32, _a28, _a24, _t171, _t184, 0x440328);
                                      					_v32 = SetTextColor(_t182, 0);
                                      					_v36 = SetBkColor(_t182, 0xffffff);
                                      					StretchBlt(_t182, _v8, _v12, _a40, _a36, _a12, _a8, _a4, _t171, _t184, 0x8800c6);
                                      					StretchBlt(_t182, _v8, _v12, _a40, _a36, _v20, 0, 0, _t171, _t184, 0x660046);
                                      					SetTextColor(_t182, _v32);
                                      					SetBkColor(_t182, _v36);
                                      					if(_v28 != 0) {
                                      						SelectObject(_v20, _v28);
                                      					}
                                      					DeleteObject(_v24);
                                      					_pop(_t178);
                                      					 *[fs:eax] = _t178;
                                      					_push(0x9f58af);
                                      					if(_v40 != 0) {
                                      						SelectPalette(_v20, _v40, 0);
                                      					}
                                      					return DeleteDC(_v20);
                                      				} else {
                                      					_v24 = E009F5484(CreateCompatibleBitmap(_a32, 1, 1));
                                      					_v24 = SelectObject(_a12, _v24);
                                      					_push(_t186);
                                      					_push(0x9f56fb);
                                      					_push( *[fs:eax]);
                                      					 *[fs:eax] = _t188;
                                      					MaskBlt(_t182, _v8, _v12, _a40, _a36, _a32, _a28, _a24, _v24, _a8, _a4, E009D7590(0xaa0029, 0xcc0020));
                                      					_pop(_t180);
                                      					 *[fs:eax] = _t180;
                                      					_push(0x9f58af);
                                      					_v24 = SelectObject(_a12, _v24);
                                      					return DeleteObject(_v24);
                                      				}
                                      			}























                                      0x009f5629
                                      0x009f562b
                                      0x009f5631
                                      0x009f5634
                                      0x009f5637
                                      0x009f5639
                                      0x009f563c
                                      0x009f563f
                                      0x009f5643
                                      0x009f564b
                                      0x009f5704
                                      0x009f5713
                                      0x009f5718
                                      0x009f5719
                                      0x009f571e
                                      0x009f5721
                                      0x009f5734
                                      0x009f5744
                                      0x009f5749
                                      0x009f5758
                                      0x009f5765
                                      0x009f576e
                                      0x009f5786
                                      0x009f5795
                                      0x009f5770
                                      0x009f577f
                                      0x009f577f
                                      0x009f579c
                                      0x009f57be
                                      0x009f57e0
                                      0x009f57ed
                                      0x009f57fb
                                      0x009f5822
                                      0x009f5847
                                      0x009f5851
                                      0x009f585b
                                      0x009f5864
                                      0x009f586e
                                      0x009f586e
                                      0x009f5877
                                      0x009f587e
                                      0x009f5881
                                      0x009f5884
                                      0x009f588d
                                      0x009f5899
                                      0x009f5899
                                      0x009f58a7
                                      0x009f5663
                                      0x009f5675
                                      0x009f5685
                                      0x009f568a
                                      0x009f568b
                                      0x009f5690
                                      0x009f5693
                                      0x009f56cf
                                      0x009f56d6
                                      0x009f56d9
                                      0x009f56dc
                                      0x009f56ee
                                      0x009f56fa
                                      0x009f56fa

                                      APIs
                                      • CreateCompatibleBitmap.GDI32(?,00000001,00000001), ref: 009F566B
                                      • SelectObject.GDI32(?,?), ref: 009F5680
                                      • MaskBlt.GDI32(?,?,?,?,?,?,?,?,?,?,?,00000000,00000000,009F56FB,?,?), ref: 009F56CF
                                      • SelectObject.GDI32(?,?), ref: 009F56E9
                                      • DeleteObject.GDI32(?), ref: 009F56F5
                                      • CreateCompatibleDC.GDI32(00000000), ref: 009F5709
                                      • CreateCompatibleBitmap.GDI32(?,?,?), ref: 009F572A
                                      • SelectObject.GDI32(?,?), ref: 009F573F
                                      • SelectPalette.GDI32(?,840808F0,00000000), ref: 009F5753
                                      • SelectPalette.GDI32(?,?,00000000), ref: 009F5765
                                      • SelectPalette.GDI32(?,00000000,000000FF), ref: 009F577A
                                      • SelectPalette.GDI32(?,840808F0,000000FF), ref: 009F5790
                                      • RealizePalette.GDI32(?), ref: 009F579C
                                      • StretchBlt.GDI32(?,00000000,00000000,?,?,?,?,?,?,?,00CC0020), ref: 009F57BE
                                      • StretchBlt.GDI32(?,00000000,00000000,?,?,00000000,?,?,?,?,00440328), ref: 009F57E0
                                      • SetTextColor.GDI32(?,00000000), ref: 009F57E8
                                      • SetBkColor.GDI32(?,00FFFFFF), ref: 009F57F6
                                      • StretchBlt.GDI32(?,?,?,?,?,?,?,?,?,?,008800C6), ref: 009F5822
                                      • StretchBlt.GDI32(?,?,?,?,?,?,00000000,00000000,?,?,00660046), ref: 009F5847
                                      • SetTextColor.GDI32(?,?), ref: 009F5851
                                      • SetBkColor.GDI32(?,?), ref: 009F585B
                                      • SelectObject.GDI32(?,00000000), ref: 009F586E
                                      • DeleteObject.GDI32(?), ref: 009F5877
                                      • SelectPalette.GDI32(?,00000000,00000000), ref: 009F5899
                                      • DeleteDC.GDI32(?), ref: 009F58A2
                                      Memory Dump Source
                                      • Source File: 00000002.00000002.323140727.00000000009D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009D0000, based on PE: true
                                      • Associated: 00000002.00000002.323135167.00000000009D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000002.00000002.323238271.0000000000A9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000002.00000002.323247473.0000000000AA3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_2_2_9d0000_rundll32.jbxd
                                      Similarity
                                      • API ID: Select$ObjectPalette$ColorStretch$CompatibleCreateDelete$BitmapText$MaskRealize
                                      • String ID:
                                      • API String ID: 3976802218-0
                                      • Opcode ID: f06e7c6577b1be01d7d5f32e8824381bed5bc7b3bdedcee1457f379b93232957
                                      • Instruction ID: 1775d1c06419d87aa0b6447ebbf8f64ce87ec89d4963f1097bee76e00fd2d152
                                      • Opcode Fuzzy Hash: f06e7c6577b1be01d7d5f32e8824381bed5bc7b3bdedcee1457f379b93232957
                                      • Instruction Fuzzy Hash: 0C81BEB2A40609AFDB50EFA8CD81FAFBBFCAB4D714F114455F618E7281C635AD008B60
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      C-Code - Quality: 79%
                                      			E009F7584(void* __eax, long __ecx, struct HPALETTE__* __edx) {
                                      				struct HBITMAP__* _v8;
                                      				struct HDC__* _v12;
                                      				struct HDC__* _v16;
                                      				struct HDC__* _v20;
                                      				char _v21;
                                      				void* _v28;
                                      				void* _v32;
                                      				intOrPtr _v92;
                                      				intOrPtr _v96;
                                      				int _v108;
                                      				int _v112;
                                      				void _v116;
                                      				int _t68;
                                      				long _t82;
                                      				void* _t117;
                                      				intOrPtr _t126;
                                      				intOrPtr _t127;
                                      				long _t130;
                                      				struct HPALETTE__* _t133;
                                      				void* _t137;
                                      				void* _t139;
                                      				intOrPtr _t140;
                                      
                                      				_t137 = _t139;
                                      				_t140 = _t139 + 0xffffff90;
                                      				_t130 = __ecx;
                                      				_t133 = __edx;
                                      				_t117 = __eax;
                                      				_v8 = 0;
                                      				if(__eax == 0 || GetObjectA(__eax, 0x54,  &_v116) == 0) {
                                      					return _v8;
                                      				} else {
                                      					E009F6A78(_t117);
                                      					_v12 = 0;
                                      					_v20 = 0;
                                      					_push(_t137);
                                      					_push(0x9f777f);
                                      					_push( *[fs:eax]);
                                      					 *[fs:eax] = _t140;
                                      					_v12 = E009F5484(GetDC(0));
                                      					_v20 = E009F5484(CreateCompatibleDC(_v12));
                                      					_v8 = CreateBitmap(_v112, _v108, 1, 1, 0);
                                      					if(_v8 == 0) {
                                      						L17:
                                      						_t68 = 0;
                                      						_pop(_t126);
                                      						 *[fs:eax] = _t126;
                                      						_push(0x9f7786);
                                      						if(_v20 != 0) {
                                      							_t68 = DeleteDC(_v20);
                                      						}
                                      						if(_v12 != 0) {
                                      							return ReleaseDC(0, _v12);
                                      						}
                                      						return _t68;
                                      					} else {
                                      						_v32 = SelectObject(_v20, _v8);
                                      						if(_t130 != 0x1fffffff) {
                                      							_v16 = E009F5484(CreateCompatibleDC(_v12));
                                      							_push(_t137);
                                      							_push(0x9f7737);
                                      							_push( *[fs:eax]);
                                      							 *[fs:eax] = _t140;
                                      							if(_v96 == 0) {
                                      								_v21 = 0;
                                      							} else {
                                      								_v21 = 1;
                                      								_v92 = 0;
                                      								_t117 = E009F6EBC(_t117, _t133, _t133, 0,  &_v116);
                                      							}
                                      							_v28 = SelectObject(_v16, _t117);
                                      							if(_t133 != 0) {
                                      								SelectPalette(_v16, _t133, 0);
                                      								RealizePalette(_v16);
                                      								SelectPalette(_v20, _t133, 0);
                                      								RealizePalette(_v20);
                                      							}
                                      							_t82 = SetBkColor(_v16, _t130);
                                      							BitBlt(_v20, 0, 0, _v112, _v108, _v16, 0, 0, 0xcc0020);
                                      							SetBkColor(_v16, _t82);
                                      							if(_v28 != 0) {
                                      								SelectObject(_v16, _v28);
                                      							}
                                      							if(_v21 != 0) {
                                      								DeleteObject(_t117);
                                      							}
                                      							_pop(_t127);
                                      							 *[fs:eax] = _t127;
                                      							_push(0x9f773e);
                                      							return DeleteDC(_v16);
                                      						} else {
                                      							PatBlt(_v20, 0, 0, _v112, _v108, 0x42);
                                      							if(_v32 != 0) {
                                      								SelectObject(_v20, _v32);
                                      							}
                                      							goto L17;
                                      						}
                                      					}
                                      				}
                                      			}

























                                      0x009f7585
                                      0x009f7587
                                      0x009f758d
                                      0x009f758f
                                      0x009f7591
                                      0x009f7595
                                      0x009f759a
                                      0x009f778f
                                      0x009f75b4
                                      0x009f75b6
                                      0x009f75bd
                                      0x009f75c2
                                      0x009f75c7
                                      0x009f75c8
                                      0x009f75cd
                                      0x009f75d0
                                      0x009f75df
                                      0x009f75f0
                                      0x009f7606
                                      0x009f760d
                                      0x009f7751
                                      0x009f7751
                                      0x009f7753
                                      0x009f7756
                                      0x009f7759
                                      0x009f7762
                                      0x009f7768
                                      0x009f7768
                                      0x009f7771
                                      0x00000000
                                      0x009f7779
                                      0x009f777e
                                      0x009f7613
                                      0x009f7620
                                      0x009f7629
                                      0x009f7655
                                      0x009f765a
                                      0x009f765b
                                      0x009f7660
                                      0x009f7663
                                      0x009f766a
                                      0x009f768a
                                      0x009f766c
                                      0x009f766c
                                      0x009f7672
                                      0x009f7686
                                      0x009f7686
                                      0x009f7698
                                      0x009f769d
                                      0x009f76a6
                                      0x009f76af
                                      0x009f76bb
                                      0x009f76c4
                                      0x009f76c4
                                      0x009f76ce
                                      0x009f76f2
                                      0x009f76fc
                                      0x009f7705
                                      0x009f770f
                                      0x009f770f
                                      0x009f7718
                                      0x009f771b
                                      0x009f771b
                                      0x009f7722
                                      0x009f7725
                                      0x009f7728
                                      0x009f7736
                                      0x009f762b
                                      0x009f763d
                                      0x009f7742
                                      0x009f774c
                                      0x009f774c
                                      0x00000000
                                      0x009f7742
                                      0x009f7629
                                      0x009f760d

                                      APIs
                                      • GetObjectA.GDI32(?,00000054,?), ref: 009F75A7
                                      • GetDC.USER32(00000000), ref: 009F75D5
                                      • CreateCompatibleDC.GDI32(?), ref: 009F75E6
                                      • CreateBitmap.GDI32(?,?,00000001,00000001,00000000), ref: 009F7601
                                      • SelectObject.GDI32(?,00000000), ref: 009F761B
                                      • PatBlt.GDI32(?,00000000,00000000,?,?,00000042), ref: 009F763D
                                      • CreateCompatibleDC.GDI32(?), ref: 009F764B
                                      • SelectObject.GDI32(?), ref: 009F7693
                                      • SelectPalette.GDI32(?,?,00000000), ref: 009F76A6
                                      • RealizePalette.GDI32(?), ref: 009F76AF
                                      • SelectPalette.GDI32(?,?,00000000), ref: 009F76BB
                                      • RealizePalette.GDI32(?), ref: 009F76C4
                                      • SetBkColor.GDI32(?), ref: 009F76CE
                                      • BitBlt.GDI32(?,00000000,00000000,?,?,?,00000000,00000000,00CC0020), ref: 009F76F2
                                      • SetBkColor.GDI32(?,00000000), ref: 009F76FC
                                      • SelectObject.GDI32(?,00000000), ref: 009F770F
                                      • DeleteObject.GDI32 ref: 009F771B
                                      • DeleteDC.GDI32(?), ref: 009F7731
                                      • SelectObject.GDI32(?,00000000), ref: 009F774C
                                      • DeleteDC.GDI32(00000000), ref: 009F7768
                                      • ReleaseDC.USER32 ref: 009F7779
                                      Memory Dump Source
                                      • Source File: 00000002.00000002.323140727.00000000009D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009D0000, based on PE: true
                                      • Associated: 00000002.00000002.323135167.00000000009D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000002.00000002.323238271.0000000000A9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000002.00000002.323247473.0000000000AA3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_2_2_9d0000_rundll32.jbxd
                                      Similarity
                                      • API ID: ObjectSelect$Palette$CreateDelete$ColorCompatibleRealize$BitmapRelease
                                      • String ID:
                                      • API String ID: 332224125-0
                                      • Opcode ID: a79c4d677d625d9c00fe2e03b57b9b9ffd1d8c1ab8589582cbe9903173ebbf72
                                      • Instruction ID: 097cfad0d8522b2f0bba38e275284b589f10882bfe6b29291312e0ebd2648a09
                                      • Opcode Fuzzy Hash: a79c4d677d625d9c00fe2e03b57b9b9ffd1d8c1ab8589582cbe9903173ebbf72
                                      • Instruction Fuzzy Hash: 05510B75E44709AFDB10EBE8CC85FAEB7FCAB48700F104466B614E7281D775A940CB60
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      C-Code - Quality: 79%
                                      			E009F82A0(intOrPtr __eax, void* __ebx, void* __ecx, intOrPtr* __edx, void* __edi, void* __esi, char* _a4) {
                                      				intOrPtr _v8;
                                      				intOrPtr* _v12;
                                      				struct HDC__* _v16;
                                      				struct HDC__* _v20;
                                      				void* _v24;
                                      				BITMAPINFOHEADER* _v28;
                                      				intOrPtr _v32;
                                      				intOrPtr _v36;
                                      				signed int _v37;
                                      				struct HBITMAP__* _v44;
                                      				void* _v48;
                                      				struct HPALETTE__* _v52;
                                      				struct HPALETTE__* _v56;
                                      				intOrPtr* _v60;
                                      				intOrPtr* _v64;
                                      				short _v66;
                                      				short _v68;
                                      				signed short _v70;
                                      				signed short _v72;
                                      				void* _v76;
                                      				intOrPtr _v172;
                                      				char _v174;
                                      				intOrPtr _t150;
                                      				signed int _t160;
                                      				intOrPtr _t164;
                                      				signed int _t193;
                                      				signed int _t218;
                                      				signed short _t224;
                                      				intOrPtr _t251;
                                      				intOrPtr* _t255;
                                      				intOrPtr _t261;
                                      				intOrPtr _t299;
                                      				intOrPtr _t300;
                                      				intOrPtr _t305;
                                      				signed int _t307;
                                      				signed int _t327;
                                      				void* _t329;
                                      				void* _t330;
                                      				signed int _t331;
                                      				void* _t332;
                                      				void* _t333;
                                      				void* _t334;
                                      				intOrPtr _t335;
                                      
                                      				_t326 = __edi;
                                      				_t333 = _t334;
                                      				_t335 = _t334 + 0xffffff54;
                                      				_t329 = __ecx;
                                      				_v12 = __edx;
                                      				_v8 = __eax;
                                      				_v52 = 0;
                                      				_v44 = 0;
                                      				_v60 = 0;
                                      				 *((intOrPtr*)( *_v12 + 0xc))(__edi, __esi, __ebx, _t332);
                                      				_v37 = _v36 == 0xc;
                                      				if(_v37 != 0) {
                                      					_v36 = 0x28;
                                      				}
                                      				_v28 = E009D28CC(_v36 + 0x40c);
                                      				_v64 = _v28;
                                      				_push(_t333);
                                      				_push(0x9f87bd);
                                      				_push( *[fs:edx]);
                                      				 *[fs:edx] = _t335;
                                      				_push(_t333);
                                      				_push(0x9f8790);
                                      				_push( *[fs:edx]);
                                      				 *[fs:edx] = _t335;
                                      				if(_v37 == 0) {
                                      					 *((intOrPtr*)( *_v12 + 0xc))();
                                      					_t330 = _t329 - _v36;
                                      					_t150 =  *((intOrPtr*)(_v64 + 0x10));
                                      					if(_t150 != 3 && _t150 != 0) {
                                      						_v60 = E009D3350(1);
                                      						if(_a4 == 0) {
                                      							E009D2D70( &_v174, 0xe);
                                      							_v174 = 0x4d42;
                                      							_v172 = _v36 + _t330;
                                      							_a4 =  &_v174;
                                      						}
                                      						 *((intOrPtr*)( *_v60 + 0x10))();
                                      						 *((intOrPtr*)( *_v60 + 0x10))();
                                      						 *((intOrPtr*)( *_v60 + 0x10))();
                                      						E009ED564(_v60,  *_v60, _v12, _t326, _t330, _t330, 0);
                                      						 *((intOrPtr*)( *_v60 + 0x14))();
                                      						_v12 = _v60;
                                      					}
                                      				} else {
                                      					 *((intOrPtr*)( *_v12 + 0xc))();
                                      					_t261 = _v64;
                                      					E009D2D70(_t261, 0x28);
                                      					_t251 = _t261;
                                      					 *(_t251 + 4) = _v72 & 0x0000ffff;
                                      					 *(_t251 + 8) = _v70 & 0x0000ffff;
                                      					 *((short*)(_t251 + 0xc)) = _v68;
                                      					 *((short*)(_t251 + 0xe)) = _v66;
                                      					_t330 = _t329 - 0xc;
                                      				}
                                      				_t255 = _v64;
                                      				 *_t255 = _v36;
                                      				_v32 = _v28 + _v36;
                                      				if( *((short*)(_t255 + 0xc)) != 1) {
                                      					E009F5370();
                                      				}
                                      				if(_v36 == 0x28) {
                                      					_t224 =  *(_t255 + 0xe);
                                      					if(_t224 == 0x10 || _t224 == 0x20) {
                                      						if( *((intOrPtr*)(_t255 + 0x10)) == 3) {
                                      							E009ED4F4(_v12, 0xc, _v32);
                                      							_v32 = _v32 + 0xc;
                                      							_t330 = _t330 - 0xc;
                                      						}
                                      					}
                                      				}
                                      				if( *(_t255 + 0x20) == 0) {
                                      					 *(_t255 + 0x20) = E009F55F4( *(_t255 + 0xe));
                                      				}
                                      				_t327 = _v37 & 0x000000ff;
                                      				_t267 =  *(_t255 + 0x20) * 0;
                                      				E009ED4F4(_v12,  *(_t255 + 0x20) * 0, _v32);
                                      				_t331 = _t330 -  *(_t255 + 0x20) * 0;
                                      				if( *(_t255 + 0x14) == 0) {
                                      					_t307 =  *(_t255 + 0xe) & 0x0000ffff;
                                      					_t218 = E009F5614( *((intOrPtr*)(_t255 + 4)), 0x20, _t307);
                                      					asm("cdq");
                                      					_t267 = _t218 * (( *(_t255 + 8) ^ _t307) - _t307);
                                      					 *(_t255 + 0x14) = _t218 * (( *(_t255 + 8) ^ _t307) - _t307);
                                      				}
                                      				_t160 =  *(_t255 + 0x14);
                                      				if(_t331 > _t160) {
                                      					_t331 = _t160;
                                      				}
                                      				if(_v37 != 0) {
                                      					E009F58BC(_v32);
                                      				}
                                      				_v16 = E009F5484(GetDC(0));
                                      				_push(_t333);
                                      				_push(0x9f870b);
                                      				_push( *[fs:edx]);
                                      				 *[fs:edx] = _t335;
                                      				_t164 =  *((intOrPtr*)(_v64 + 0x10));
                                      				if(_t164 == 0 || _t164 == 3) {
                                      					if( *0xa9c670 == 0) {
                                      						_v44 = CreateDIBSection(_v16, _v28, 0,  &_v24, 0, 0);
                                      						if(_v44 == 0 || _v24 == 0) {
                                      							if(GetLastError() != 0) {
                                      								E009DD738(_t255, _t267, _t327, _t331);
                                      							} else {
                                      								E009F5370();
                                      							}
                                      						}
                                      						_push(_t333);
                                      						_push( *[fs:eax]);
                                      						 *[fs:eax] = _t335;
                                      						E009ED4F4(_v12, _t331, _v24);
                                      						_pop(_t299);
                                      						 *[fs:eax] = _t299;
                                      						_t300 = 0x9f86da;
                                      						 *[fs:eax] = _t300;
                                      						_push(0x9f8712);
                                      						return ReleaseDC(0, _v16);
                                      					} else {
                                      						goto L27;
                                      					}
                                      				} else {
                                      					L27:
                                      					_v20 = 0;
                                      					_v24 = E009D28CC(_t331);
                                      					_push(_t333);
                                      					_push(0x9f8673);
                                      					_push( *[fs:edx]);
                                      					 *[fs:edx] = _t335;
                                      					_t273 = _t331;
                                      					E009ED4F4(_v12, _t331, _v24);
                                      					_v20 = E009F5484(CreateCompatibleDC(_v16));
                                      					_v48 = SelectObject(_v20, CreateCompatibleBitmap(_v16, 1, 1));
                                      					_v56 = 0;
                                      					_t193 =  *(_v64 + 0x20);
                                      					if(_t193 > 0) {
                                      						_t273 = _t193;
                                      						_v52 = E009F5B74(0, _t193);
                                      						_v56 = SelectPalette(_v20, _v52, 0);
                                      						RealizePalette(_v20);
                                      					}
                                      					_push(_t333);
                                      					_push(0x9f8647);
                                      					_push( *[fs:edx]);
                                      					 *[fs:edx] = _t335;
                                      					_v44 = CreateDIBitmap(_v20, _v28, 4, _v24, _v28, 0);
                                      					if(_v44 == 0) {
                                      						if(GetLastError() != 0) {
                                      							E009DD738(_t255, _t273, _t327, _t331);
                                      						} else {
                                      							E009F5370();
                                      						}
                                      					}
                                      					_pop(_t305);
                                      					 *[fs:eax] = _t305;
                                      					_push(0x9f864e);
                                      					if(_v56 != 0) {
                                      						SelectPalette(_v20, _v56, 0xffffffff);
                                      					}
                                      					return DeleteObject(SelectObject(_v20, _v48));
                                      				}
                                      			}














































                                      0x009f82a0
                                      0x009f82a1
                                      0x009f82a3
                                      0x009f82ac
                                      0x009f82ae
                                      0x009f82b1
                                      0x009f82b6
                                      0x009f82bb
                                      0x009f82c0
                                      0x009f82d0
                                      0x009f82d7
                                      0x009f82df
                                      0x009f82e1
                                      0x009f82e1
                                      0x009f82f8
                                      0x009f82fe
                                      0x009f8303
                                      0x009f8304
                                      0x009f8309
                                      0x009f830c
                                      0x009f8311
                                      0x009f8312
                                      0x009f8317
                                      0x009f831a
                                      0x009f8321
                                      0x009f8380
                                      0x009f8383
                                      0x009f8389
                                      0x009f838f
                                      0x009f83a9
                                      0x009f83b0
                                      0x009f83bf
                                      0x009f83c4
                                      0x009f83d2
                                      0x009f83de
                                      0x009f83de
                                      0x009f83ee
                                      0x009f83fe
                                      0x009f8412
                                      0x009f8421
                                      0x009f8433
                                      0x009f8439
                                      0x009f8439
                                      0x009f8323
                                      0x009f8333
                                      0x009f8336
                                      0x009f8342
                                      0x009f8347
                                      0x009f834d
                                      0x009f8354
                                      0x009f835b
                                      0x009f8363
                                      0x009f8367
                                      0x009f8367
                                      0x009f843c
                                      0x009f8442
                                      0x009f844a
                                      0x009f8452
                                      0x009f8454
                                      0x009f8454
                                      0x009f845d
                                      0x009f845f
                                      0x009f8467
                                      0x009f8473
                                      0x009f8480
                                      0x009f8485
                                      0x009f8489
                                      0x009f8489
                                      0x009f8473
                                      0x009f8467
                                      0x009f8490
                                      0x009f849b
                                      0x009f849b
                                      0x009f84a1
                                      0x009f84ad
                                      0x009f84b6
                                      0x009f84c8
                                      0x009f84ce
                                      0x009f84d0
                                      0x009f84dc
                                      0x009f84e6
                                      0x009f84eb
                                      0x009f84ee
                                      0x009f84ee
                                      0x009f84f1
                                      0x009f84f6
                                      0x009f84f8
                                      0x009f84f8
                                      0x009f84fe
                                      0x009f8503
                                      0x009f8503
                                      0x009f8514
                                      0x009f8519
                                      0x009f851a
                                      0x009f851f
                                      0x009f8522
                                      0x009f8528
                                      0x009f852d
                                      0x009f853b
                                      0x009f8691
                                      0x009f8698
                                      0x009f86a7
                                      0x009f86b0
                                      0x009f86a9
                                      0x009f86a9
                                      0x009f86a9
                                      0x009f86a7
                                      0x009f86b7
                                      0x009f86bd
                                      0x009f86c0
                                      0x009f86cb
                                      0x009f86d2
                                      0x009f86d5
                                      0x009f86f4
                                      0x009f86f7
                                      0x009f86fa
                                      0x009f870a
                                      0x00000000
                                      0x00000000
                                      0x00000000
                                      0x009f8541
                                      0x009f8541
                                      0x009f8543
                                      0x009f854d
                                      0x009f8552
                                      0x009f8553
                                      0x009f8558
                                      0x009f855b
                                      0x009f8561
                                      0x009f8566
                                      0x009f8579
                                      0x009f8593
                                      0x009f8598
                                      0x009f859e
                                      0x009f85a3
                                      0x009f85a5
                                      0x009f85b1
                                      0x009f85c3
                                      0x009f85ca
                                      0x009f85ca
                                      0x009f85d1
                                      0x009f85d2
                                      0x009f85d7
                                      0x009f85da
                                      0x009f85f3
                                      0x009f85fa
                                      0x009f8603
                                      0x009f860c
                                      0x009f8605
                                      0x009f8605
                                      0x009f8605
                                      0x009f8603
                                      0x009f8613
                                      0x009f8616
                                      0x009f8619
                                      0x009f8622
                                      0x009f862e
                                      0x009f862e
                                      0x009f8646
                                      0x009f8646

                                      APIs
                                      • GetDC.USER32(00000000), ref: 009F850A
                                      • CreateCompatibleDC.GDI32(00000001), ref: 009F856F
                                      • CreateCompatibleBitmap.GDI32(00000001,00000001,00000001), ref: 009F8584
                                      • SelectObject.GDI32(?,00000000), ref: 009F858E
                                      • SelectPalette.GDI32(?,?,00000000), ref: 009F85BE
                                      • RealizePalette.GDI32(?), ref: 009F85CA
                                      • CreateDIBitmap.GDI32(?,?,00000004,00000000,?,00000000), ref: 009F85EE
                                      • GetLastError.KERNEL32(?,?,00000004,00000000,?,00000000,00000000,009F8647,?,?,00000000,00000001,00000001,00000001,00000001,00000000), ref: 009F85FC
                                      • SelectPalette.GDI32(?,00000000,000000FF), ref: 009F862E
                                      • SelectObject.GDI32(?,?), ref: 009F863B
                                      • DeleteObject.GDI32(00000000), ref: 009F8641
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000002.00000002.323140727.00000000009D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009D0000, based on PE: true
                                      • Associated: 00000002.00000002.323135167.00000000009D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000002.00000002.323238271.0000000000A9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000002.00000002.323247473.0000000000AA3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_2_2_9d0000_rundll32.jbxd
                                      Similarity
                                      • API ID: Select$CreateObjectPalette$BitmapCompatible$DeleteErrorLastRealize
                                      • String ID: ($BM
                                      • API String ID: 2831685396-2980357723
                                      • Opcode ID: 8b5b722a8467ece2c4597f1c068d36dde44757fddb419247f363739ac1373386
                                      • Instruction ID: 7e9b5bacbb3587f087f8a63a07dd902fc31a101d55048aacffae05f6089a6b92
                                      • Opcode Fuzzy Hash: 8b5b722a8467ece2c4597f1c068d36dde44757fddb419247f363739ac1373386
                                      • Instruction Fuzzy Hash: 3AD12974A002589FDF54EFA8C885BAEBBB5FF88304F148465FA14EB395DB349840CB65
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      C-Code - Quality: 78%
                                      			E009F7A88(intOrPtr* __eax, void* __ebx, signed int __ecx, intOrPtr __edx, void* __edi, void* __esi, void* __eflags) {
                                      				intOrPtr _v8;
                                      				struct HPALETTE__* _v12;
                                      				char _v13;
                                      				struct tagPOINT _v21;
                                      				struct HDC__* _v28;
                                      				void* _v32;
                                      				struct HPALETTE__* _t78;
                                      				signed int _t84;
                                      				signed int _t85;
                                      				signed int _t86;
                                      				char _t87;
                                      				void* _t94;
                                      				void* _t140;
                                      				intOrPtr* _t170;
                                      				intOrPtr _t178;
                                      				intOrPtr _t182;
                                      				intOrPtr _t184;
                                      				intOrPtr _t186;
                                      				int* _t190;
                                      				intOrPtr _t192;
                                      				void* _t194;
                                      				void* _t195;
                                      				intOrPtr _t196;
                                      
                                      				_t171 = __ecx;
                                      				_t194 = _t195;
                                      				_t196 = _t195 + 0xffffffe4;
                                      				_t190 = __ecx;
                                      				_v8 = __edx;
                                      				_t170 = __eax;
                                      				_t192 =  *((intOrPtr*)(__eax + 0x28));
                                      				_t178 =  *0x9f7cd4; // 0xf
                                      				E009F516C(_v8, __ecx, _t178);
                                      				E009F8018(_t170);
                                      				_v12 = 0;
                                      				_v13 = 0;
                                      				_t78 =  *(_t192 + 0x10);
                                      				if(_t78 != 0) {
                                      					_v12 = SelectPalette( *(_v8 + 4), _t78, 0xffffffff);
                                      					RealizePalette( *(_v8 + 4));
                                      					_v13 = 1;
                                      				}
                                      				_push(GetDeviceCaps( *(_v8 + 4), 0xc));
                                      				_t84 = GetDeviceCaps( *(_v8 + 4), 0xe);
                                      				_pop(_t85);
                                      				_t86 = _t85 * _t84;
                                      				if(_t86 > 8) {
                                      					L4:
                                      					_t87 = 0;
                                      				} else {
                                      					_t171 =  *(_t192 + 0x28) & 0x0000ffff;
                                      					if(_t86 < ( *(_t192 + 0x2a) & 0x0000ffff) * ( *(_t192 + 0x28) & 0x0000ffff)) {
                                      						_t87 = 1;
                                      					} else {
                                      						goto L4;
                                      					}
                                      				}
                                      				if(_t87 == 0) {
                                      					if(E009F7E14(_t170) == 0) {
                                      						SetStretchBltMode(E009F5098(_v8), 3);
                                      					}
                                      				} else {
                                      					GetBrushOrgEx( *(_v8 + 4),  &_v21);
                                      					SetStretchBltMode( *(_v8 + 4), 4);
                                      					SetBrushOrgEx( *(_v8 + 4), _v21, _v21.y,  &_v21);
                                      				}
                                      				_push(_t194);
                                      				_push(0x9f7cc4);
                                      				_push( *[fs:eax]);
                                      				 *[fs:eax] = _t196;
                                      				if( *((intOrPtr*)( *_t170 + 0x28))() != 0) {
                                      					E009F7FB8(_t170, _t171);
                                      				}
                                      				_t94 = E009F7D58(_t170);
                                      				_t182 =  *0x9f7cd4; // 0xf
                                      				E009F516C(_t94, _t171, _t182);
                                      				if( *((intOrPtr*)( *_t170 + 0x28))() == 0) {
                                      					StretchBlt( *(_v8 + 4),  *_t190, _t190[1], _t190[2] -  *_t190, _t190[3] - _t190[1],  *(E009F7D58(_t170) + 4), 0, 0,  *(_t192 + 0x1c),  *(_t192 + 0x20),  *(_v8 + 0x20));
                                      					_pop(_t184);
                                      					 *[fs:eax] = _t184;
                                      					_push(0x9f7ccb);
                                      					if(_v13 != 0) {
                                      						return SelectPalette( *(_v8 + 4), _v12, 0xffffffff);
                                      					}
                                      					return 0;
                                      				} else {
                                      					_v32 = 0;
                                      					_v28 = 0;
                                      					_push(_t194);
                                      					_push(0x9f7c59);
                                      					_push( *[fs:eax]);
                                      					 *[fs:eax] = _t196;
                                      					_v28 = E009F5484(CreateCompatibleDC(0));
                                      					_v32 = SelectObject(_v28,  *(_t192 + 0xc));
                                      					E009F5628( *(_v8 + 4), _t170, _t190[1],  *_t190, _t190, _t192, 0, 0, _v28,  *(_t192 + 0x20),  *(_t192 + 0x1c), 0, 0,  *(E009F7D58(_t170) + 4), _t190[3] - _t190[1], _t190[2] -  *_t190);
                                      					_t140 = 0;
                                      					_pop(_t186);
                                      					 *[fs:eax] = _t186;
                                      					_push(0x9f7c9e);
                                      					if(_v32 != 0) {
                                      						_t140 = SelectObject(_v28, _v32);
                                      					}
                                      					if(_v28 != 0) {
                                      						return DeleteDC(_v28);
                                      					}
                                      					return _t140;
                                      				}
                                      			}


























                                      0x009f7a88
                                      0x009f7a89
                                      0x009f7a8b
                                      0x009f7a91
                                      0x009f7a93
                                      0x009f7a96
                                      0x009f7a98
                                      0x009f7a9b
                                      0x009f7aa4
                                      0x009f7aab
                                      0x009f7ab2
                                      0x009f7ab5
                                      0x009f7ab9
                                      0x009f7abe
                                      0x009f7acf
                                      0x009f7ad9
                                      0x009f7ade
                                      0x009f7ade
                                      0x009f7af0
                                      0x009f7afa
                                      0x009f7b01
                                      0x009f7b02
                                      0x009f7b07
                                      0x009f7b18
                                      0x009f7b18
                                      0x009f7b09
                                      0x009f7b0d
                                      0x009f7b16
                                      0x009f7b1c
                                      0x00000000
                                      0x00000000
                                      0x00000000
                                      0x009f7b16
                                      0x009f7b20
                                      0x009f7b63
                                      0x009f7b70
                                      0x009f7b70
                                      0x009f7b22
                                      0x009f7b2d
                                      0x009f7b3b
                                      0x009f7b53
                                      0x009f7b53
                                      0x009f7b77
                                      0x009f7b78
                                      0x009f7b7d
                                      0x009f7b80
                                      0x009f7b8c
                                      0x009f7b90
                                      0x009f7b90
                                      0x009f7b97
                                      0x009f7b9c
                                      0x009f7ba2
                                      0x009f7bb0
                                      0x009f7c99
                                      0x009f7ca0
                                      0x009f7ca3
                                      0x009f7ca6
                                      0x009f7caf
                                      0x00000000
                                      0x009f7cbe
                                      0x009f7cc3
                                      0x009f7bb6
                                      0x009f7bb8
                                      0x009f7bbd
                                      0x009f7bc2
                                      0x009f7bc3
                                      0x009f7bc8
                                      0x009f7bcb
                                      0x009f7bda
                                      0x009f7bea
                                      0x009f7c24
                                      0x009f7c29
                                      0x009f7c2b
                                      0x009f7c2e
                                      0x009f7c31
                                      0x009f7c3a
                                      0x009f7c44
                                      0x009f7c44
                                      0x009f7c4d
                                      0x00000000
                                      0x009f7c53
                                      0x009f7c58
                                      0x009f7c58

                                      APIs
                                        • Part of subcall function 009F8018: GetDC.USER32(00000000), ref: 009F806E
                                        • Part of subcall function 009F8018: GetDeviceCaps.GDI32(00000000,0000000C), ref: 009F8083
                                        • Part of subcall function 009F8018: GetDeviceCaps.GDI32(00000000,0000000E), ref: 009F808D
                                        • Part of subcall function 009F8018: CreateHalftonePalette.GDI32(00000000,00000000,?,?,?,?,009F6C4F,00000000,009F6CDB), ref: 009F80B1
                                        • Part of subcall function 009F8018: ReleaseDC.USER32 ref: 009F80BC
                                      • SelectPalette.GDI32(?,?,000000FF), ref: 009F7ACA
                                      • RealizePalette.GDI32(?), ref: 009F7AD9
                                      • GetDeviceCaps.GDI32(?,0000000C), ref: 009F7AEB
                                      • GetDeviceCaps.GDI32(?,0000000E), ref: 009F7AFA
                                      • GetBrushOrgEx.GDI32(?,?,0000000E,00000000,?,0000000C), ref: 009F7B2D
                                      • SetStretchBltMode.GDI32(?,00000004), ref: 009F7B3B
                                      • SetBrushOrgEx.GDI32(?,?,?,?,?,00000004,?,?,0000000E,00000000,?,0000000C), ref: 009F7B53
                                      • SetStretchBltMode.GDI32(00000000,00000003), ref: 009F7B70
                                      • CreateCompatibleDC.GDI32(00000000), ref: 009F7BD0
                                      • SelectObject.GDI32(?,?), ref: 009F7BE5
                                      • SelectObject.GDI32(?,00000000), ref: 009F7C44
                                      • DeleteDC.GDI32(00000000), ref: 009F7C53
                                      Memory Dump Source
                                      • Source File: 00000002.00000002.323140727.00000000009D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009D0000, based on PE: true
                                      • Associated: 00000002.00000002.323135167.00000000009D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000002.00000002.323238271.0000000000A9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000002.00000002.323247473.0000000000AA3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_2_2_9d0000_rundll32.jbxd
                                      Similarity
                                      • API ID: CapsDevice$PaletteSelect$BrushCreateModeObjectStretch$CompatibleDeleteHalftoneRealizeRelease
                                      • String ID:
                                      • API String ID: 2414602066-0
                                      • Opcode ID: 0d71060e326615f657cefd7a6f4a2cc3051860f59d1103b7c65a743732d46fda
                                      • Instruction ID: 06afa23b3886e8dccb5bc3e9c49574125adf0d027f796fe568d633979518d8bc
                                      • Opcode Fuzzy Hash: 0d71060e326615f657cefd7a6f4a2cc3051860f59d1103b7c65a743732d46fda
                                      • Instruction Fuzzy Hash: B971F375A04609AFCB50DFACC985F6ABBE8AF49300F158595B608E7391D734ED048B60
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      C-Code - Quality: 64%
                                      			E009F5494(void* __eax, void* __ebx, void* __ecx, void* __edx, void* __edi, void* __esi) {
                                      				void* _v8;
                                      				int _v12;
                                      				int _v16;
                                      				struct HBITMAP__* _v20;
                                      				struct HDC__* _v24;
                                      				struct HDC__* _v28;
                                      				struct HDC__* _v32;
                                      				int _v48;
                                      				int _v52;
                                      				void _v56;
                                      				void* _t78;
                                      				intOrPtr _t85;
                                      				intOrPtr _t86;
                                      				void* _t91;
                                      				void* _t93;
                                      				void* _t94;
                                      				intOrPtr _t95;
                                      
                                      				_t93 = _t94;
                                      				_t95 = _t94 + 0xffffffcc;
                                      				asm("movsd");
                                      				asm("movsd");
                                      				_t77 = __ecx;
                                      				_v8 = __eax;
                                      				_v28 = CreateCompatibleDC(0);
                                      				_v32 = CreateCompatibleDC(0);
                                      				_push(_t93);
                                      				_push(0x9f55e2);
                                      				_push( *[fs:eax]);
                                      				 *[fs:eax] = _t95;
                                      				GetObjectA(_v8, 0x18,  &_v56);
                                      				if(__ecx == 0) {
                                      					_v24 = GetDC(0);
                                      					if(_v24 == 0) {
                                      						E009F53DC(_t77);
                                      					}
                                      					_push(_t93);
                                      					_push(0x9f5551);
                                      					_push( *[fs:eax]);
                                      					 *[fs:eax] = _t95;
                                      					_v20 = CreateCompatibleBitmap(_v24, _v16, _v12);
                                      					if(_v20 == 0) {
                                      						E009F53DC(_t77);
                                      					}
                                      					_pop(_t85);
                                      					 *[fs:eax] = _t85;
                                      					_push(0x9f5558);
                                      					return ReleaseDC(0, _v24);
                                      				} else {
                                      					_v20 = CreateBitmap(_v16, _v12, 1, 1, 0);
                                      					if(_v20 != 0) {
                                      						_t78 = SelectObject(_v28, _v8);
                                      						_t91 = SelectObject(_v32, _v20);
                                      						StretchBlt(_v32, 0, 0, _v16, _v12, _v28, 0, 0, _v52, _v48, 0xcc0020);
                                      						if(_t78 != 0) {
                                      							SelectObject(_v28, _t78);
                                      						}
                                      						if(_t91 != 0) {
                                      							SelectObject(_v32, _t91);
                                      						}
                                      					}
                                      					_pop(_t86);
                                      					 *[fs:eax] = _t86;
                                      					_push(0x9f55e9);
                                      					DeleteDC(_v28);
                                      					return DeleteDC(_v32);
                                      				}
                                      			}




















                                      0x009f5495
                                      0x009f5497
                                      0x009f54a2
                                      0x009f54a3
                                      0x009f54a4
                                      0x009f54a6
                                      0x009f54b0
                                      0x009f54ba
                                      0x009f54bf
                                      0x009f54c0
                                      0x009f54c5
                                      0x009f54c8
                                      0x009f54d5
                                      0x009f54dc
                                      0x009f54fd
                                      0x009f5504
                                      0x009f5506
                                      0x009f5506
                                      0x009f550d
                                      0x009f550e
                                      0x009f5513
                                      0x009f5516
                                      0x009f552a
                                      0x009f5531
                                      0x009f5533
                                      0x009f5533
                                      0x009f553a
                                      0x009f553d
                                      0x009f5540
                                      0x009f5550
                                      0x009f54de
                                      0x009f54f1
                                      0x009f555c
                                      0x009f556b
                                      0x009f557a
                                      0x009f55a1
                                      0x009f55a8
                                      0x009f55af
                                      0x009f55af
                                      0x009f55b6
                                      0x009f55bd
                                      0x009f55bd
                                      0x009f55b6
                                      0x009f55c4
                                      0x009f55c7
                                      0x009f55ca
                                      0x009f55d3
                                      0x009f55e1
                                      0x009f55e1

                                      APIs
                                      • CreateCompatibleDC.GDI32(00000000), ref: 009F54AB
                                      • CreateCompatibleDC.GDI32(00000000), ref: 009F54B5
                                      • GetObjectA.GDI32(?,00000018,?), ref: 009F54D5
                                      • CreateBitmap.GDI32(?,?,00000001,00000001,00000000), ref: 009F54EC
                                      • GetDC.USER32(00000000), ref: 009F54F8
                                      • CreateCompatibleBitmap.GDI32(00000000,?,?), ref: 009F5525
                                      • ReleaseDC.USER32 ref: 009F554B
                                      • SelectObject.GDI32(?,?), ref: 009F5566
                                      • SelectObject.GDI32(?,00000000), ref: 009F5575
                                      • StretchBlt.GDI32(?,00000000,00000000,?,?,?,00000000,00000000,?,?,00CC0020), ref: 009F55A1
                                      • SelectObject.GDI32(?,00000000), ref: 009F55AF
                                      • SelectObject.GDI32(?,00000000), ref: 009F55BD
                                      • DeleteDC.GDI32(?), ref: 009F55D3
                                      • DeleteDC.GDI32(?), ref: 009F55DC
                                      Memory Dump Source
                                      • Source File: 00000002.00000002.323140727.00000000009D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009D0000, based on PE: true
                                      • Associated: 00000002.00000002.323135167.00000000009D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000002.00000002.323238271.0000000000A9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000002.00000002.323247473.0000000000AA3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_2_2_9d0000_rundll32.jbxd
                                      Similarity
                                      • API ID: Object$CreateSelect$Compatible$BitmapDelete$ReleaseStretch
                                      • String ID:
                                      • API String ID: 644427674-0
                                      • Opcode ID: 8a208e4a72652f217da40183536372a34de70a9803469c113a6f13e52600ec97
                                      • Instruction ID: 39dfd54a86db05bcb9cc841ab1eef19acc9a198241cbed5c79116a32a1a4abfe
                                      • Opcode Fuzzy Hash: 8a208e4a72652f217da40183536372a34de70a9803469c113a6f13e52600ec97
                                      • Instruction Fuzzy Hash: FE41FA75A44609AFDB10EBE8DC46FAFB7BDAB89700F114415B704E7281D6B5AD008B60
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      C-Code - Quality: 100%
                                      			E009D7688(intOrPtr* __eax, int* __edx, intOrPtr* _a4, intOrPtr* _a8) {
                                      				intOrPtr* _v8;
                                      				struct HWND__* _t19;
                                      				int* _t20;
                                      				int* _t26;
                                      				int* _t27;
                                      
                                      				_t26 = _t20;
                                      				_t27 = __edx;
                                      				_v8 = __eax;
                                      				_t19 = FindWindowA("MouseZ", "Magellan MSWHEEL");
                                      				 *_v8 = RegisterClipboardFormatA("MSWHEEL_ROLLMSG");
                                      				 *_t27 = RegisterClipboardFormatA("MSH_WHEELSUPPORT_MSG");
                                      				 *_t26 = RegisterClipboardFormatA("MSH_SCROLL_LINES_MSG");
                                      				if( *_t27 == 0 || _t19 == 0) {
                                      					 *_a8 = 0;
                                      				} else {
                                      					 *_a8 = SendMessageA(_t19,  *_t27, 0, 0);
                                      				}
                                      				if( *_t26 == 0 || _t19 == 0) {
                                      					 *_a4 = 3;
                                      				} else {
                                      					 *_a4 = SendMessageA(_t19,  *_t26, 0, 0);
                                      				}
                                      				return _t19;
                                      			}








                                      0x009d768f
                                      0x009d7691
                                      0x009d7693
                                      0x009d76a5
                                      0x009d76b4
                                      0x009d76c0
                                      0x009d76cc
                                      0x009d76d1
                                      0x009d76f0
                                      0x009d76d7
                                      0x009d76e7
                                      0x009d76e7
                                      0x009d76f5
                                      0x009d7712
                                      0x009d76fb
                                      0x009d770b
                                      0x009d770b
                                      0x009d771f

                                      APIs
                                      • FindWindowA.USER32 ref: 009D76A0
                                      • RegisterClipboardFormatA.USER32(MSWHEEL_ROLLMSG), ref: 009D76AC
                                      • RegisterClipboardFormatA.USER32(MSH_WHEELSUPPORT_MSG), ref: 009D76BB
                                      • RegisterClipboardFormatA.USER32(MSH_SCROLL_LINES_MSG), ref: 009D76C7
                                      • SendMessageA.USER32 ref: 009D76DF
                                      • SendMessageA.USER32 ref: 009D7703
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000002.00000002.323140727.00000000009D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009D0000, based on PE: true
                                      • Associated: 00000002.00000002.323135167.00000000009D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000002.00000002.323238271.0000000000A9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000002.00000002.323247473.0000000000AA3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_2_2_9d0000_rundll32.jbxd
                                      Similarity
                                      • API ID: ClipboardFormatRegister$MessageSend$FindWindow
                                      • String ID: MSH_SCROLL_LINES_MSG$MSH_WHEELSUPPORT_MSG$MSWHEEL_ROLLMSG$Magellan MSWHEEL$MouseZ
                                      • API String ID: 1416857345-3736581797
                                      • Opcode ID: 434bfcf8bf44bba298e23069d6b3f6e7ca76364a3b85def67f2c07d904298d85
                                      • Instruction ID: 3616d9f5828be6d80add0cb624ebcbbdb6d65d51d947f83807d57a0142f3b1a8
                                      • Opcode Fuzzy Hash: 434bfcf8bf44bba298e23069d6b3f6e7ca76364a3b85def67f2c07d904298d85
                                      • Instruction Fuzzy Hash: 11110A70288201AFE7119FE8CD82B6AF7E8EF85710F10D867F8448B381F6B09C408B60
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      C-Code - Quality: 59%
                                      			E009FF5BC(void* __eax, void* __ecx, intOrPtr __edx) {
                                      				intOrPtr _v8;
                                      				struct HDC__* _v12;
                                      				struct tagRECT _v28;
                                      				struct tagRECT _v44;
                                      				char _v56;
                                      				char _v72;
                                      				signed char _t43;
                                      				signed int _t79;
                                      				int _t80;
                                      				int _t81;
                                      				void* _t94;
                                      				intOrPtr _t107;
                                      				void* _t116;
                                      				void* _t119;
                                      				void* _t122;
                                      				void* _t124;
                                      				intOrPtr _t125;
                                      
                                      				_t122 = _t124;
                                      				_t125 = _t124 + 0xffffffbc;
                                      				_t94 = __ecx;
                                      				_v8 = __edx;
                                      				_t116 = __eax;
                                      				_t43 = GetWindowLongA(E00A20FC0(_v8), 0xffffffec);
                                      				if((_t43 & 0x00000002) == 0) {
                                      					return _t43;
                                      				} else {
                                      					GetWindowRect(E00A20FC0(_v8),  &_v44);
                                      					OffsetRect( &_v44,  ~(_v44.left),  ~(_v44.top));
                                      					_v12 = GetWindowDC(E00A20FC0(_v8));
                                      					_push(_t122);
                                      					_push(0x9ff717);
                                      					_push( *[fs:edx]);
                                      					 *[fs:edx] = _t125;
                                      					asm("movsd");
                                      					asm("movsd");
                                      					asm("movsd");
                                      					asm("movsd");
                                      					_t119 = _t116;
                                      					if(_t94 != 0) {
                                      						_t79 = GetWindowLongA(E00A20FC0(_v8), 0xfffffff0);
                                      						if((_t79 & 0x00100000) != 0 && (_t79 & 0x00200000) != 0) {
                                      							_t80 = GetSystemMetrics(2);
                                      							_t81 = GetSystemMetrics(3);
                                      							InflateRect( &_v28, 0xfffffffe, 0xfffffffe);
                                      							E009EA228(_v28.right - _t80, _v28.right, _v28.bottom - _t81,  &_v72, _v28.bottom);
                                      							asm("movsd");
                                      							asm("movsd");
                                      							asm("movsd");
                                      							asm("movsd");
                                      							_t119 = _t119;
                                      							FillRect(_v12,  &_v28, GetSysColorBrush(0xf));
                                      						}
                                      					}
                                      					ExcludeClipRect(_v12, _v44.left + 2, _v44.top + 2, _v44.right - 2, _v44.bottom - 2);
                                      					E009FF1F4( &_v56, 2);
                                      					E009FF148(_t119,  &_v56, _v12, 0,  &_v44);
                                      					_pop(_t107);
                                      					 *[fs:eax] = _t107;
                                      					_push(0x9ff71e);
                                      					return ReleaseDC(E00A20FC0(_v8), _v12);
                                      				}
                                      			}




















                                      0x009ff5bd
                                      0x009ff5bf
                                      0x009ff5c5
                                      0x009ff5c7
                                      0x009ff5ca
                                      0x009ff5d7
                                      0x009ff5df
                                      0x009ff724
                                      0x009ff5e5
                                      0x009ff5f2
                                      0x009ff607
                                      0x009ff61a
                                      0x009ff61f
                                      0x009ff620
                                      0x009ff625
                                      0x009ff628
                                      0x009ff632
                                      0x009ff633
                                      0x009ff634
                                      0x009ff635
                                      0x009ff636
                                      0x009ff639
                                      0x009ff646
                                      0x009ff650
                                      0x009ff65b
                                      0x009ff664
                                      0x009ff673
                                      0x009ff68d
                                      0x009ff699
                                      0x009ff69a
                                      0x009ff69b
                                      0x009ff69c
                                      0x009ff69d
                                      0x009ff6ae
                                      0x009ff6ae
                                      0x009ff650
                                      0x009ff6d3
                                      0x009ff6df
                                      0x009ff6f2
                                      0x009ff6f9
                                      0x009ff6fc
                                      0x009ff6ff
                                      0x009ff716
                                      0x009ff716

                                      APIs
                                      • GetWindowLongA.USER32 ref: 009FF5D7
                                      • GetWindowRect.USER32 ref: 009FF5F2
                                      • OffsetRect.USER32(?,?,?), ref: 009FF607
                                      • GetWindowDC.USER32(00000000,?,?,?,00000000,?,00000000,000000EC), ref: 009FF615
                                      • GetWindowLongA.USER32 ref: 009FF646
                                      • GetSystemMetrics.USER32 ref: 009FF65B
                                      • GetSystemMetrics.USER32 ref: 009FF664
                                      • InflateRect.USER32(?,000000FE,000000FE), ref: 009FF673
                                      • GetSysColorBrush.USER32(0000000F), ref: 009FF6A0
                                      • FillRect.USER32 ref: 009FF6AE
                                      • ExcludeClipRect.GDI32(?,?,?,?,?,00000000,009FF717,?,00000000,?,?,?,00000000,?,00000000,000000EC), ref: 009FF6D3
                                      • ReleaseDC.USER32 ref: 009FF711
                                      Memory Dump Source
                                      • Source File: 00000002.00000002.323140727.00000000009D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009D0000, based on PE: true
                                      • Associated: 00000002.00000002.323135167.00000000009D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000002.00000002.323238271.0000000000A9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000002.00000002.323247473.0000000000AA3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_2_2_9d0000_rundll32.jbxd
                                      Similarity
                                      • API ID: Rect$Window$LongMetricsSystem$BrushClipColorExcludeFillInflateOffsetRelease
                                      • String ID:
                                      • API String ID: 19621357-0
                                      • Opcode ID: fb0f3feb3c1e13e373703dd76bbfe4f091bcd5bb0b992b146ba6923864142fa6
                                      • Instruction ID: 7e54c6f45c62aad227972d6ae55ecb82deacca8880a95cdf11bb8a2a686553a0
                                      • Opcode Fuzzy Hash: fb0f3feb3c1e13e373703dd76bbfe4f091bcd5bb0b992b146ba6923864142fa6
                                      • Instruction Fuzzy Hash: 43412E71A44158ABDB11EAECDD42EEEF7BDEF89310F104161FA14F7292DA30AE058760
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      C-Code - Quality: 88%
                                      			E009FA030(struct HDC__* _a4, RECT* _a8, _Unknown_base(*)()* _a12, long _a16) {
                                      				struct tagPOINT _v12;
                                      				int _v16;
                                      				struct tagRECT _v32;
                                      				struct tagRECT _v48;
                                      				void* __ebx;
                                      				void* __edi;
                                      				void* __esi;
                                      				void* __ebp;
                                      				void* _t60;
                                      				int _t61;
                                      				RECT* _t64;
                                      				struct HDC__* _t65;
                                      
                                      				_t64 = _a8;
                                      				_t65 = _a4;
                                      				if( *0xa9f923 != 0) {
                                      					_t61 = 0;
                                      					if(_a12 == 0) {
                                      						L14:
                                      						return _t61;
                                      					}
                                      					_v32.left = 0;
                                      					_v32.top = 0;
                                      					_v32.right = GetSystemMetrics(0);
                                      					_v32.bottom = GetSystemMetrics(1);
                                      					if(_t65 == 0) {
                                      						if(_t64 == 0 || IntersectRect( &_v32,  &_v32, _t64) != 0) {
                                      							L13:
                                      							_t61 = _a12(0x12340042, _t65,  &_v32, _a16);
                                      						} else {
                                      							_t61 = 1;
                                      						}
                                      						goto L14;
                                      					}
                                      					_v16 = GetClipBox(_t65,  &_v48);
                                      					if(GetDCOrgEx(_t65,  &_v12) == 0) {
                                      						goto L14;
                                      					}
                                      					OffsetRect( &_v32,  ~(_v12.x),  ~(_v12.y));
                                      					if(IntersectRect( &_v32,  &_v32,  &_v48) == 0 || _t64 != 0) {
                                      						if(IntersectRect( &_v32,  &_v32, _t64) != 0) {
                                      							goto L13;
                                      						}
                                      						if(_v16 == 1) {
                                      							_t61 = 1;
                                      						}
                                      						goto L14;
                                      					} else {
                                      						goto L13;
                                      					}
                                      				}
                                      				 *0xa9f910 = E009F9A84(7, _t60,  *0xa9f910, _t64, _t65);
                                      				_t61 = EnumDisplayMonitors(_t65, _t64, _a12, _a16);
                                      				goto L14;
                                      			}















                                      0x009fa039
                                      0x009fa03c
                                      0x009fa046
                                      0x009fa076
                                      0x009fa07c
                                      0x009fa138
                                      0x009fa140
                                      0x009fa140
                                      0x009fa084
                                      0x009fa089
                                      0x009fa094
                                      0x009fa09f
                                      0x009fa0a4
                                      0x009fa10d
                                      0x009fa125
                                      0x009fa136
                                      0x009fa121
                                      0x009fa121
                                      0x009fa121
                                      0x00000000
                                      0x009fa10d
                                      0x009fa0b0
                                      0x009fa0bf
                                      0x00000000
                                      0x00000000
                                      0x009fa0d1
                                      0x009fa0e9
                                      0x009fa0ff
                                      0x00000000
                                      0x00000000
                                      0x009fa105
                                      0x009fa107
                                      0x009fa107
                                      0x00000000
                                      0x00000000
                                      0x00000000
                                      0x00000000
                                      0x009fa0e9
                                      0x009fa05a
                                      0x009fa06f
                                      0x00000000

                                      APIs
                                      • EnumDisplayMonitors.USER32(?,?,?,?), ref: 009FA069
                                      • GetSystemMetrics.USER32 ref: 009FA08E
                                      • GetSystemMetrics.USER32 ref: 009FA099
                                      • GetClipBox.GDI32(?,?), ref: 009FA0AB
                                      • GetDCOrgEx.GDI32(?,?), ref: 009FA0B8
                                      • OffsetRect.USER32(?,?,?), ref: 009FA0D1
                                      • IntersectRect.USER32 ref: 009FA0E2
                                      • IntersectRect.USER32 ref: 009FA0F8
                                        • Part of subcall function 009F9A84: GetProcAddress.KERNEL32(75BA0000,00000000), ref: 009F9B04
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000002.00000002.323140727.00000000009D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009D0000, based on PE: true
                                      • Associated: 00000002.00000002.323135167.00000000009D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000002.00000002.323238271.0000000000A9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000002.00000002.323247473.0000000000AA3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_2_2_9d0000_rundll32.jbxd
                                      Similarity
                                      • API ID: Rect$IntersectMetricsSystem$AddressClipDisplayEnumMonitorsOffsetProc
                                      • String ID: EnumDisplayMonitors
                                      • API String ID: 362875416-2491903729
                                      • Opcode ID: f703a38f16ad2bc9e8b0f2fbc2833bb54e4c96d0b36c0324f0231a346dcd6c61
                                      • Instruction ID: 1116a5fff17c4904c956a71856d2a5622545069c218953a91afdb4a3282e3445
                                      • Opcode Fuzzy Hash: f703a38f16ad2bc9e8b0f2fbc2833bb54e4c96d0b36c0324f0231a346dcd6c61
                                      • Instruction Fuzzy Hash: 1231CDB1A0420DAEDB10DFE4DC84AFFB7BCAB49310F158526FA15D2241EB35D9058BA1
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      C-Code - Quality: 72%
                                      			E009DD284(void* __ebx, void* __edx, void* __edi, void* __esi) {
                                      				char _v8;
                                      				char _v12;
                                      				char _v16;
                                      				char _v20;
                                      				char _v24;
                                      				char _v28;
                                      				char _v32;
                                      				char _v36;
                                      				char _v40;
                                      				char _v44;
                                      				char _v48;
                                      				char _v52;
                                      				char _v56;
                                      				char _v60;
                                      				char _v64;
                                      				char _v68;
                                      				void* _t104;
                                      				void* _t111;
                                      				void* _t133;
                                      				intOrPtr _t183;
                                      				intOrPtr _t193;
                                      				intOrPtr _t194;
                                      
                                      				_t191 = __esi;
                                      				_t190 = __edi;
                                      				_t193 = _t194;
                                      				_t133 = 8;
                                      				do {
                                      					_push(0);
                                      					_push(0);
                                      					_t133 = _t133 - 1;
                                      				} while (_t133 != 0);
                                      				_push(__ebx);
                                      				_push(_t193);
                                      				_push(0x9dd54f);
                                      				_push( *[fs:eax]);
                                      				 *[fs:eax] = _t194;
                                      				E009DD110();
                                      				E009DBAB8(__ebx, __edi, __esi);
                                      				_t196 =  *0xa9f750;
                                      				if( *0xa9f750 != 0) {
                                      					E009DBC90(__esi, _t196);
                                      				}
                                      				_t132 = GetThreadLocale();
                                      				E009DBA08(_t43, 0, 0x14,  &_v20);
                                      				E009D427C(0xa9f684, _v20);
                                      				E009DBA08(_t43, 0x9dd564, 0x1b,  &_v24);
                                      				 *0xa9f688 = E009D8C68(0x9dd564, 0, _t196);
                                      				E009DBA08(_t132, 0x9dd564, 0x1c,  &_v28);
                                      				 *0xa9f689 = E009D8C68(0x9dd564, 0, _t196);
                                      				 *0xa9f68a = E009DBA54(_t132, 0x2c, 0xf);
                                      				 *0xa9f68b = E009DBA54(_t132, 0x2e, 0xe);
                                      				E009DBA08(_t132, 0x9dd564, 0x19,  &_v32);
                                      				 *0xa9f68c = E009D8C68(0x9dd564, 0, _t196);
                                      				 *0xa9f68d = E009DBA54(_t132, 0x2f, 0x1d);
                                      				E009DBA08(_t132, "m/d/yy", 0x1f,  &_v40);
                                      				E009DBD40(_v40, _t132,  &_v36, _t190, _t191, _t196);
                                      				E009D427C(0xa9f690, _v36);
                                      				E009DBA08(_t132, "mmmm d, yyyy", 0x20,  &_v48);
                                      				E009DBD40(_v48, _t132,  &_v44, _t190, _t191, _t196);
                                      				E009D427C(0xa9f694, _v44);
                                      				 *0xa9f698 = E009DBA54(_t132, 0x3a, 0x1e);
                                      				E009DBA08(_t132, 0x9dd598, 0x28,  &_v52);
                                      				E009D427C(0xa9f69c, _v52);
                                      				E009DBA08(_t132, 0x9dd5a4, 0x29,  &_v56);
                                      				E009D427C(0xa9f6a0, _v56);
                                      				E009D4228( &_v12);
                                      				E009D4228( &_v16);
                                      				E009DBA08(_t132, 0x9dd564, 0x25,  &_v60);
                                      				_t104 = E009D8C68(0x9dd564, 0, _t196);
                                      				_t197 = _t104;
                                      				if(_t104 != 0) {
                                      					E009D42C0( &_v8, 0x9dd5bc);
                                      				} else {
                                      					E009D42C0( &_v8, 0x9dd5b0);
                                      				}
                                      				E009DBA08(_t132, 0x9dd564, 0x23,  &_v64);
                                      				_t111 = E009D8C68(0x9dd564, 0, _t197);
                                      				_t198 = _t111;
                                      				if(_t111 == 0) {
                                      					E009DBA08(_t132, 0x9dd564, 0x1005,  &_v68);
                                      					if(E009D8C68(0x9dd564, 0, _t198) != 0) {
                                      						E009D42C0( &_v12, 0x9dd5d8);
                                      					} else {
                                      						E009D42C0( &_v16, 0x9dd5c8);
                                      					}
                                      				}
                                      				_push(_v12);
                                      				_push(_v8);
                                      				_push(":mm");
                                      				_push(_v16);
                                      				E009D45A8();
                                      				_push(_v12);
                                      				_push(_v8);
                                      				_push(":mm:ss");
                                      				_push(_v16);
                                      				E009D45A8();
                                      				 *0xa9f752 = E009DBA54(_t132, 0x2c, 0xc);
                                      				_pop(_t183);
                                      				 *[fs:eax] = _t183;
                                      				_push(0x9dd556);
                                      				return E009D424C( &_v68, 0x10);
                                      			}

























                                      0x009dd284
                                      0x009dd284
                                      0x009dd285
                                      0x009dd287
                                      0x009dd28c
                                      0x009dd28c
                                      0x009dd28e
                                      0x009dd290
                                      0x009dd290
                                      0x009dd293
                                      0x009dd296
                                      0x009dd297
                                      0x009dd29c
                                      0x009dd29f
                                      0x009dd2a2
                                      0x009dd2a7
                                      0x009dd2ac
                                      0x009dd2b3
                                      0x009dd2b5
                                      0x009dd2b5
                                      0x009dd2bf
                                      0x009dd2ce
                                      0x009dd2db
                                      0x009dd2f0
                                      0x009dd2ff
                                      0x009dd314
                                      0x009dd323
                                      0x009dd336
                                      0x009dd349
                                      0x009dd35e
                                      0x009dd36d
                                      0x009dd380
                                      0x009dd395
                                      0x009dd3a0
                                      0x009dd3ad
                                      0x009dd3c2
                                      0x009dd3cd
                                      0x009dd3da
                                      0x009dd3ed
                                      0x009dd402
                                      0x009dd40f
                                      0x009dd424
                                      0x009dd431
                                      0x009dd439
                                      0x009dd441
                                      0x009dd456
                                      0x009dd460
                                      0x009dd465
                                      0x009dd467
                                      0x009dd480
                                      0x009dd469
                                      0x009dd471
                                      0x009dd471
                                      0x009dd495
                                      0x009dd49f
                                      0x009dd4a4
                                      0x009dd4a6
                                      0x009dd4b8
                                      0x009dd4c9
                                      0x009dd4e2
                                      0x009dd4cb
                                      0x009dd4d3
                                      0x009dd4d3
                                      0x009dd4c9
                                      0x009dd4e7
                                      0x009dd4ea
                                      0x009dd4ed
                                      0x009dd4f2
                                      0x009dd4ff
                                      0x009dd504
                                      0x009dd507
                                      0x009dd50a
                                      0x009dd50f
                                      0x009dd51c
                                      0x009dd52f
                                      0x009dd536
                                      0x009dd539
                                      0x009dd53c
                                      0x009dd54e

                                      APIs
                                      • GetThreadLocale.KERNEL32(00000000,009DD54F,?,?,00000000,00000000), ref: 009DD2BA
                                        • Part of subcall function 009DBA08: GetLocaleInfoA.KERNEL32(?,?,?,00000100), ref: 009DBA26
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000002.00000002.323140727.00000000009D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009D0000, based on PE: true
                                      • Associated: 00000002.00000002.323135167.00000000009D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000002.00000002.323238271.0000000000A9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000002.00000002.323247473.0000000000AA3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_2_2_9d0000_rundll32.jbxd
                                      Similarity
                                      • API ID: Locale$InfoThread
                                      • String ID: AMPM$:mm$:mm:ss$AMPM $m/d/yy$mmmm d, yyyy
                                      • API String ID: 4232894706-2493093252
                                      • Opcode ID: e8119fbef2f2584a13887a0910f5a6e13d1974f38e4e070020298d4c1afacb66
                                      • Instruction ID: 9c63e3f547a5e8ff92f6ceb715320b453945cdf9d31974904985d289c525ff50
                                      • Opcode Fuzzy Hash: e8119fbef2f2584a13887a0910f5a6e13d1974f38e4e070020298d4c1afacb66
                                      • Instruction Fuzzy Hash: 18612E747812889BDB10EBF8D881B9E76EADBD9340F51D437F204EB35ACA34D9059B50
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      C-Code - Quality: 77%
                                      			E009DFB3C(short* __eax, intOrPtr __ecx, intOrPtr* __edx) {
                                      				char _v260;
                                      				char _v768;
                                      				char _v772;
                                      				short* _v776;
                                      				intOrPtr _v780;
                                      				char _v784;
                                      				signed int _v788;
                                      				signed short* _v792;
                                      				char _v796;
                                      				char _v800;
                                      				intOrPtr* _v804;
                                      				void* __ebp;
                                      				signed char _t47;
                                      				signed int _t54;
                                      				void* _t62;
                                      				intOrPtr* _t73;
                                      				intOrPtr* _t91;
                                      				void* _t93;
                                      				void* _t95;
                                      				void* _t98;
                                      				void* _t99;
                                      				intOrPtr* _t108;
                                      				void* _t112;
                                      				intOrPtr _t113;
                                      				char* _t114;
                                      				void* _t115;
                                      
                                      				_t100 = __ecx;
                                      				_v780 = __ecx;
                                      				_t91 = __edx;
                                      				_v776 = __eax;
                                      				if(( *(__edx + 1) & 0x00000020) == 0) {
                                      					E009DF6E4(0x80070057);
                                      				}
                                      				_t47 =  *_t91;
                                      				if((_t47 & 0x00000fff) != 0xc) {
                                      					_push(_t91);
                                      					_push(_v776);
                                      					L009DE2FC();
                                      					return E009DF6E4(_v776);
                                      				} else {
                                      					if((_t47 & 0x00000040) == 0) {
                                      						_v792 =  *((intOrPtr*)(_t91 + 8));
                                      					} else {
                                      						_v792 =  *((intOrPtr*)( *((intOrPtr*)(_t91 + 8))));
                                      					}
                                      					_v788 =  *_v792 & 0x0000ffff;
                                      					_t93 = _v788 - 1;
                                      					if(_t93 < 0) {
                                      						L9:
                                      						_push( &_v772);
                                      						_t54 = _v788;
                                      						_push(_t54);
                                      						_push(0xc);
                                      						L009DE758();
                                      						_t113 = _t54;
                                      						if(_t113 == 0) {
                                      							E009DF43C(_t100);
                                      						}
                                      						E009DFA94(_v776);
                                      						 *_v776 = 0x200c;
                                      						 *((intOrPtr*)(_v776 + 8)) = _t113;
                                      						_t95 = _v788 - 1;
                                      						if(_t95 < 0) {
                                      							L14:
                                      							_t97 = _v788 - 1;
                                      							if(E009DFAB0(_v788 - 1, _t115) != 0) {
                                      								L009DE790();
                                      								E009DF6E4(_v792);
                                      								L009DE790();
                                      								E009DF6E4( &_v260);
                                      								_v780(_t113,  &_v260,  &_v800, _v792,  &_v260,  &_v796);
                                      							}
                                      							_t62 = E009DFAE0(_t97, _t115);
                                      						} else {
                                      							_t98 = _t95 + 1;
                                      							_t73 =  &_v768;
                                      							_t108 =  &_v260;
                                      							do {
                                      								 *_t108 =  *_t73;
                                      								_t108 = _t108 + 4;
                                      								_t73 = _t73 + 8;
                                      								_t98 = _t98 - 1;
                                      							} while (_t98 != 0);
                                      							do {
                                      								goto L14;
                                      							} while (_t62 != 0);
                                      							return _t62;
                                      						}
                                      					} else {
                                      						_t99 = _t93 + 1;
                                      						_t112 = 0;
                                      						_t114 =  &_v772;
                                      						do {
                                      							_v804 = _t114;
                                      							_push(_v804 + 4);
                                      							_t18 = _t112 + 1; // 0x1
                                      							_push(_v792);
                                      							L009DE760();
                                      							E009DF6E4(_v792);
                                      							_push( &_v784);
                                      							_t21 = _t112 + 1; // 0x1
                                      							_push(_v792);
                                      							L009DE768();
                                      							E009DF6E4(_v792);
                                      							 *_v804 = _v784 -  *((intOrPtr*)(_v804 + 4)) + 1;
                                      							_t112 = _t112 + 1;
                                      							_t114 = _t114 + 8;
                                      							_t99 = _t99 - 1;
                                      						} while (_t99 != 0);
                                      						goto L9;
                                      					}
                                      				}
                                      			}





























                                      0x009dfb3c
                                      0x009dfb48
                                      0x009dfb4e
                                      0x009dfb50
                                      0x009dfb5a
                                      0x009dfb61
                                      0x009dfb61
                                      0x009dfb66
                                      0x009dfb74
                                      0x009dfced
                                      0x009dfcf4
                                      0x009dfcf5
                                      0x00000000
                                      0x009dfb7a
                                      0x009dfb7d
                                      0x009dfb8f
                                      0x009dfb7f
                                      0x009dfb84
                                      0x009dfb84
                                      0x009dfb9e
                                      0x009dfbaa
                                      0x009dfbad
                                      0x009dfc1a
                                      0x009dfc20
                                      0x009dfc21
                                      0x009dfc27
                                      0x009dfc28
                                      0x009dfc2a
                                      0x009dfc2f
                                      0x009dfc33
                                      0x009dfc35
                                      0x009dfc35
                                      0x009dfc40
                                      0x009dfc4b
                                      0x009dfc56
                                      0x009dfc5f
                                      0x009dfc62
                                      0x009dfc7e
                                      0x009dfc85
                                      0x009dfc90
                                      0x009dfca7
                                      0x009dfcac
                                      0x009dfcc0
                                      0x009dfcc5
                                      0x009dfcd8
                                      0x009dfcd8
                                      0x009dfce1
                                      0x009dfc64
                                      0x009dfc64
                                      0x009dfc65
                                      0x009dfc6b
                                      0x009dfc71
                                      0x009dfc73
                                      0x009dfc75
                                      0x009dfc78
                                      0x009dfc7b
                                      0x009dfc7b
                                      0x009dfc7e
                                      0x00000000
                                      0x00000000
                                      0x00000000
                                      0x009dfc7e
                                      0x009dfbaf
                                      0x009dfbaf
                                      0x009dfbb0
                                      0x009dfbb2
                                      0x009dfbb8
                                      0x009dfbba
                                      0x009dfbc9
                                      0x009dfbca
                                      0x009dfbd4
                                      0x009dfbd5
                                      0x009dfbda
                                      0x009dfbe5
                                      0x009dfbe6
                                      0x009dfbf0
                                      0x009dfbf1
                                      0x009dfbf6
                                      0x009dfc11
                                      0x009dfc13
                                      0x009dfc14
                                      0x009dfc17
                                      0x009dfc17
                                      0x00000000
                                      0x009dfbb8
                                      0x009dfbad

                                      APIs
                                      • SafeArrayGetLBound.OLEAUT32(?,00000001,?), ref: 009DFBD5
                                      • SafeArrayGetUBound.OLEAUT32(?,00000001,?), ref: 009DFBF1
                                      • SafeArrayCreate.OLEAUT32(0000000C,?,?), ref: 009DFC2A
                                      • SafeArrayPtrOfIndex.OLEAUT32(?,?,?), ref: 009DFCA7
                                      • SafeArrayPtrOfIndex.OLEAUT32(00000000,?,?), ref: 009DFCC0
                                      • VariantCopy.OLEAUT32(?), ref: 009DFCF5
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000002.00000002.323140727.00000000009D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009D0000, based on PE: true
                                      • Associated: 00000002.00000002.323135167.00000000009D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000002.00000002.323238271.0000000000A9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000002.00000002.323247473.0000000000AA3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_2_2_9d0000_rundll32.jbxd
                                      Similarity
                                      • API ID: ArraySafe$BoundIndex$CopyCreateVariant
                                      • String ID:
                                      • API String ID: 351091851-3916222277
                                      • Opcode ID: 1637a73e56f6c814b651d0282bdc9763110833d29606e8994f0fda8ef278c806
                                      • Instruction ID: 418c25d341125c403cd44df2ddf3aba86ef420bae14465ef59bc9772b17e31fe
                                      • Opcode Fuzzy Hash: 1637a73e56f6c814b651d0282bdc9763110833d29606e8994f0fda8ef278c806
                                      • Instruction Fuzzy Hash: 2851FD7594062D9BCB62EF68CC92BD9B3BCAF58300F4081E6E549E7312D6349F858F64
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      C-Code - Quality: 67%
                                      			E009F9DB4(struct HMONITOR__* _a4, struct tagMONITORINFO* _a8) {
                                      				void _v20;
                                      				void* __ebx;
                                      				void* __edi;
                                      				void* __esi;
                                      				void* __ebp;
                                      				void* _t23;
                                      				int _t24;
                                      				struct HMONITOR__* _t27;
                                      				struct tagMONITORINFO* _t29;
                                      				intOrPtr* _t31;
                                      
                                      				_t29 = _a8;
                                      				_t27 = _a4;
                                      				if( *0xa9f920 != 0) {
                                      					_t24 = 0;
                                      					if(_t27 == 0x12340042 && _t29 != 0 && _t29->cbSize >= 0x28 && SystemParametersInfoA(0x30, 0,  &_v20, 0) != 0) {
                                      						_t29->rcMonitor.left = 0;
                                      						_t29->rcMonitor.top = 0;
                                      						_t29->rcMonitor.right = GetSystemMetrics(0);
                                      						_t29->rcMonitor.bottom = GetSystemMetrics(1);
                                      						asm("movsd");
                                      						asm("movsd");
                                      						asm("movsd");
                                      						asm("movsd");
                                      						_t31 = _t29;
                                      						 *(_t31 + 0x24) = 1;
                                      						if( *_t31 >= 0x4c) {
                                      							_push("DISPLAY");
                                      							_push(_t31 + 0x28);
                                      							L009D6E54();
                                      						}
                                      						_t24 = 1;
                                      					}
                                      				} else {
                                      					 *0xa9f904 = E009F9A84(4, _t23,  *0xa9f904, _t27, _t29);
                                      					_t24 = GetMonitorInfoA(_t27, _t29);
                                      				}
                                      				return _t24;
                                      			}













                                      0x009f9dbd
                                      0x009f9dc0
                                      0x009f9dca
                                      0x009f9def
                                      0x009f9df7
                                      0x009f9e17
                                      0x009f9e1c
                                      0x009f9e27
                                      0x009f9e32
                                      0x009f9e3c
                                      0x009f9e3d
                                      0x009f9e3e
                                      0x009f9e3f
                                      0x009f9e40
                                      0x009f9e41
                                      0x009f9e4b
                                      0x009f9e4d
                                      0x009f9e55
                                      0x009f9e56
                                      0x009f9e56
                                      0x009f9e5b
                                      0x009f9e5b
                                      0x009f9dcc
                                      0x009f9dde
                                      0x009f9deb
                                      0x009f9deb
                                      0x009f9e65

                                      APIs
                                      • GetMonitorInfoA.USER32(?,?), ref: 009F9DE5
                                      • SystemParametersInfoA.USER32(00000030,00000000,?,00000000), ref: 009F9E0C
                                      • GetSystemMetrics.USER32 ref: 009F9E21
                                      • GetSystemMetrics.USER32 ref: 009F9E2C
                                      • lstrcpy.KERNEL32(?,DISPLAY), ref: 009F9E56
                                        • Part of subcall function 009F9A84: GetProcAddress.KERNEL32(75BA0000,00000000), ref: 009F9B04
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000002.00000002.323140727.00000000009D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009D0000, based on PE: true
                                      • Associated: 00000002.00000002.323135167.00000000009D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000002.00000002.323238271.0000000000A9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000002.00000002.323247473.0000000000AA3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_2_2_9d0000_rundll32.jbxd
                                      Similarity
                                      • API ID: System$InfoMetrics$AddressMonitorParametersProclstrcpy
                                      • String ID: DISPLAY$GetMonitorInfo
                                      • API String ID: 1539801207-1633989206
                                      • Opcode ID: 9b7c26d5da53aa4f38ce1880be39cb8e195b05febdf206456be1cad6aba561ef
                                      • Instruction ID: 17dda07681fbce51ae4cfc8ad5802af4384d27bb7311dec3fc1cc359048c0f34
                                      • Opcode Fuzzy Hash: 9b7c26d5da53aa4f38ce1880be39cb8e195b05febdf206456be1cad6aba561ef
                                      • Instruction Fuzzy Hash: 3611E231701309AFD720DFA5DC44BB7B7E9EB85B10F10492AEE59CB290D770A844CBA0
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      C-Code - Quality: 79%
                                      			E009D40AC(void* __ecx) {
                                      				long _v4;
                                      				int _t3;
                                      
                                      				if( *0xa9f04c == 0) {
                                      					if( *0xa9c030 == 0) {
                                      						_t3 = MessageBoxA(0, "Runtime error     at 00000000", "Error", 0);
                                      					}
                                      					return _t3;
                                      				} else {
                                      					if( *0xa9f220 == 0xd7b2 &&  *0xa9f228 > 0) {
                                      						 *0xa9f238();
                                      					}
                                      					WriteFile(GetStdHandle(0xfffffff5), "Runtime error     at 00000000", 0x1e,  &_v4, 0);
                                      					return WriteFile(GetStdHandle(0xfffffff5), E009D4134, 2,  &_v4, 0);
                                      				}
                                      			}





                                      0x009d40b4
                                      0x009d4114
                                      0x009d4124
                                      0x009d4124
                                      0x009d412a
                                      0x009d40b6
                                      0x009d40bf
                                      0x009d40cf
                                      0x009d40cf
                                      0x009d40eb
                                      0x009d410c
                                      0x009d410c

                                      APIs
                                      • GetStdHandle.KERNEL32(000000F5,Runtime error at 00000000,0000001E,00A9B89C,00000000,?,009D417A,?,?,00A9F638,?,?,00A9C0BC,009D6835,00A9B89C), ref: 009D40E5
                                      • WriteFile.KERNEL32(00000000,000000F5,Runtime error at 00000000,0000001E,00A9B89C,00000000,?,009D417A,?,?,00A9F638,?,?,00A9C0BC,009D6835,00A9B89C), ref: 009D40EB
                                      • GetStdHandle.KERNEL32(000000F5,009D4134,00000002,00A9B89C,00000000,00000000,000000F5,Runtime error at 00000000,0000001E,00A9B89C,00000000,?,009D417A,?,?,00A9F638), ref: 009D4100
                                      • WriteFile.KERNEL32(00000000,000000F5,009D4134,00000002,00A9B89C,00000000,00000000,000000F5,Runtime error at 00000000,0000001E,00A9B89C,00000000,?,009D417A,?,?), ref: 009D4106
                                      • MessageBoxA.USER32 ref: 009D4124
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000002.00000002.323140727.00000000009D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009D0000, based on PE: true
                                      • Associated: 00000002.00000002.323135167.00000000009D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000002.00000002.323238271.0000000000A9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000002.00000002.323247473.0000000000AA3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_2_2_9d0000_rundll32.jbxd
                                      Similarity
                                      • API ID: FileHandleWrite$Message
                                      • String ID: Error$Runtime error at 00000000
                                      • API String ID: 1570097196-2970929446
                                      • Opcode ID: 02b03ea8c3c96e91cf228b79f72af6289c45ab83adc7a06b9dc968909460a8ff
                                      • Instruction ID: 4a7fd607284ec95a39a72de3ccfeda4013a61604edd3ba14ae2ed3065d7be2f7
                                      • Opcode Fuzzy Hash: 02b03ea8c3c96e91cf228b79f72af6289c45ab83adc7a06b9dc968909460a8ff
                                      • Instruction Fuzzy Hash: C5F090567C4340BAEE20E7949E06FD9229C9794F39F14C627B210E42F39BF444C58621
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      C-Code - Quality: 70%
                                      			E009F59C4(void* __ebx) {
                                      				struct HDC__* _v8;
                                      				struct tagPALETTEENTRY _v1000;
                                      				struct tagPALETTEENTRY _v1004;
                                      				struct tagPALETTEENTRY _v1032;
                                      				signed int _v1034;
                                      				short _v1036;
                                      				void* _t24;
                                      				int _t53;
                                      				intOrPtr _t60;
                                      				void* _t62;
                                      				void* _t63;
                                      
                                      				_t62 = _t63;
                                      				_v1036 = 0x300;
                                      				_v1034 = 0x10;
                                      				E009D2AC8(_t24, 0x40,  &_v1032);
                                      				_v8 = GetDC(0);
                                      				_push(_t62);
                                      				_push(0x9f5ac1);
                                      				_push( *[fs:eax]);
                                      				 *[fs:eax] = _t63 + 0xfffffbf8;
                                      				_t53 = GetDeviceCaps(_v8, 0x68);
                                      				if(_t53 >= 0x10) {
                                      					GetSystemPaletteEntries(_v8, 0, 8,  &_v1032);
                                      					if(_v1004 != 0xc0c0c0) {
                                      						GetSystemPaletteEntries(_v8, _t53 - 8, 8, _t62 + (_v1034 & 0x0000ffff) * 4 - 0x424);
                                      					} else {
                                      						GetSystemPaletteEntries(_v8, _t53 - 8, 1,  &_v1004);
                                      						GetSystemPaletteEntries(_v8, _t53 - 7, 7, _t62 + (_v1034 & 0x0000ffff) * 4 - 0x420);
                                      						GetSystemPaletteEntries(_v8, 7, 1,  &_v1000);
                                      					}
                                      				}
                                      				_pop(_t60);
                                      				 *[fs:eax] = _t60;
                                      				_push(0x9f5ac8);
                                      				return ReleaseDC(0, _v8);
                                      			}














                                      0x009f59c5
                                      0x009f59ce
                                      0x009f59d7
                                      0x009f59eb
                                      0x009f59f7
                                      0x009f59fc
                                      0x009f59fd
                                      0x009f5a02
                                      0x009f5a05
                                      0x009f5a13
                                      0x009f5a18
                                      0x009f5a2d
                                      0x009f5a3c
                                      0x009f5aa3
                                      0x009f5a3e
                                      0x009f5a51
                                      0x009f5a6f
                                      0x009f5a83
                                      0x009f5a83
                                      0x009f5a3c
                                      0x009f5aaa
                                      0x009f5aad
                                      0x009f5ab0
                                      0x009f5ac0

                                      APIs
                                      • GetDC.USER32(00000000), ref: 009F59F2
                                      • GetDeviceCaps.GDI32(?,00000068), ref: 009F5A0E
                                      • GetSystemPaletteEntries.GDI32(?,00000000,00000008,?), ref: 009F5A2D
                                      • GetSystemPaletteEntries.GDI32(?,-00000008,00000001,00C0C0C0), ref: 009F5A51
                                      • GetSystemPaletteEntries.GDI32(?,00000000,00000007,?), ref: 009F5A6F
                                      • GetSystemPaletteEntries.GDI32(?,00000007,00000001,?), ref: 009F5A83
                                      • GetSystemPaletteEntries.GDI32(?,00000000,00000008,?), ref: 009F5AA3
                                      • ReleaseDC.USER32 ref: 009F5ABB
                                      Memory Dump Source
                                      • Source File: 00000002.00000002.323140727.00000000009D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009D0000, based on PE: true
                                      • Associated: 00000002.00000002.323135167.00000000009D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000002.00000002.323238271.0000000000A9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000002.00000002.323247473.0000000000AA3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_2_2_9d0000_rundll32.jbxd
                                      Similarity
                                      • API ID: EntriesPaletteSystem$CapsDeviceRelease
                                      • String ID:
                                      • API String ID: 1781840570-0
                                      • Opcode ID: 2e57972663019466335b193b2c5c3779c8132199cc57538c84c92bfd907a371f
                                      • Instruction ID: 7eeb82a6c15d3078c049acc000c74cd6106880a582c449854cc3ddcef90a7f23
                                      • Opcode Fuzzy Hash: 2e57972663019466335b193b2c5c3779c8132199cc57538c84c92bfd907a371f
                                      • Instruction Fuzzy Hash: DA2183B1A40608BADB10DBA8DD85FAEB3ACEB88704F5145D1F704E72C1D775AE509B24
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      C-Code - Quality: 76%
                                      			E00A0A59C(intOrPtr __eax, void* __ebx, void* __fp0) {
                                      				intOrPtr _v8;
                                      				int _v12;
                                      				void* _v16;
                                      				char _v20;
                                      				void* _v24;
                                      				struct HKL__* _v280;
                                      				char _v536;
                                      				char _v600;
                                      				char _v604;
                                      				char _v608;
                                      				char _v612;
                                      				void* _t60;
                                      				intOrPtr _t106;
                                      				intOrPtr _t111;
                                      				void* _t117;
                                      				void* _t118;
                                      				intOrPtr _t119;
                                      				void* _t129;
                                      
                                      				_t129 = __fp0;
                                      				_t117 = _t118;
                                      				_t119 = _t118 + 0xfffffda0;
                                      				_v612 = 0;
                                      				_v8 = __eax;
                                      				_push(_t117);
                                      				_push(0xa0a747);
                                      				_push( *[fs:eax]);
                                      				 *[fs:eax] = _t119;
                                      				if( *((intOrPtr*)(_v8 + 0x34)) != 0) {
                                      					L11:
                                      					_pop(_t106);
                                      					 *[fs:eax] = _t106;
                                      					_push(0xa0a74e);
                                      					return E009D4228( &_v612);
                                      				} else {
                                      					 *((intOrPtr*)(_v8 + 0x34)) = E009D3350(1);
                                      					E009D4228(_v8 + 0x38);
                                      					_t60 = GetKeyboardLayoutList(0x40,  &_v280) - 1;
                                      					if(_t60 < 0) {
                                      						L10:
                                      						 *((char*)( *((intOrPtr*)(_v8 + 0x34)) + 0x1d)) = 0;
                                      						E009ED218( *((intOrPtr*)(_v8 + 0x34)), 1);
                                      						goto L11;
                                      					} else {
                                      						_v20 = _t60 + 1;
                                      						_v24 =  &_v280;
                                      						do {
                                      							if(E00A25A90( *_v24) == 0) {
                                      								goto L9;
                                      							} else {
                                      								_v608 =  *_v24;
                                      								_v604 = 0;
                                      								if(RegOpenKeyExA(0x80000002, E009D97D0( &_v600,  &_v608, "System\\CurrentControlSet\\Control\\Keyboard Layouts\\%.8x", _t129, 0), 0, 0x20019,  &_v16) != 0) {
                                      									goto L9;
                                      								} else {
                                      									_push(_t117);
                                      									_push(0xa0a703);
                                      									_push( *[fs:eax]);
                                      									 *[fs:eax] = _t119;
                                      									_v12 = 0x100;
                                      									if(RegQueryValueExA(_v16, "layout text", 0, 0,  &_v536,  &_v12) == 0) {
                                      										E009D4498( &_v612, 0x100,  &_v536);
                                      										 *((intOrPtr*)( *((intOrPtr*)( *((intOrPtr*)(_v8 + 0x34)))) + 0x3c))();
                                      										if( *_v24 ==  *((intOrPtr*)(_v8 + 0x3c))) {
                                      											E009D4498(_v8 + 0x38, 0x100,  &_v536);
                                      										}
                                      									}
                                      									_pop(_t111);
                                      									 *[fs:eax] = _t111;
                                      									_push(0xa0a70a);
                                      									return RegCloseKey(_v16);
                                      								}
                                      							}
                                      							goto L12;
                                      							L9:
                                      							_v24 = _v24 + 4;
                                      							_t38 =  &_v20;
                                      							 *_t38 = _v20 - 1;
                                      						} while ( *_t38 != 0);
                                      						goto L10;
                                      					}
                                      				}
                                      				L12:
                                      			}





















                                      0x00a0a59c
                                      0x00a0a59d
                                      0x00a0a59f
                                      0x00a0a5a8
                                      0x00a0a5ae
                                      0x00a0a5b3
                                      0x00a0a5b4
                                      0x00a0a5b9
                                      0x00a0a5bc
                                      0x00a0a5c6
                                      0x00a0a728
                                      0x00a0a730
                                      0x00a0a733
                                      0x00a0a736
                                      0x00a0a746
                                      0x00a0a5cc
                                      0x00a0a5db
                                      0x00a0a5e4
                                      0x00a0a5f7
                                      0x00a0a5fa
                                      0x00a0a717
                                      0x00a0a71d
                                      0x00a0a723
                                      0x00000000
                                      0x00a0a600
                                      0x00a0a601
                                      0x00a0a60a
                                      0x00a0a60d
                                      0x00a0a619
                                      0x00000000
                                      0x00a0a61f
                                      0x00a0a631
                                      0x00a0a637
                                      0x00a0a661
                                      0x00000000
                                      0x00a0a667
                                      0x00a0a669
                                      0x00a0a66a
                                      0x00a0a66f
                                      0x00a0a672
                                      0x00a0a675
                                      0x00a0a69b
                                      0x00a0a6ae
                                      0x00a0a6c6
                                      0x00a0a6d4
                                      0x00a0a6e7
                                      0x00a0a6e7
                                      0x00a0a6d4
                                      0x00a0a6ee
                                      0x00a0a6f1
                                      0x00a0a6f4
                                      0x00a0a702
                                      0x00a0a702
                                      0x00a0a661
                                      0x00000000
                                      0x00a0a70a
                                      0x00a0a70a
                                      0x00a0a70e
                                      0x00a0a70e
                                      0x00a0a70e
                                      0x00000000
                                      0x00a0a60d
                                      0x00a0a5fa
                                      0x00000000

                                      APIs
                                      • GetKeyboardLayoutList.USER32(00000040,?,00000000,00A0A747,?,00F71458,?,00A0A7A9,00000000,?,00A1CD8F), ref: 00A0A5F2
                                      • RegOpenKeyExA.ADVAPI32(80000002,00000000), ref: 00A0A65A
                                      • RegQueryValueExA.ADVAPI32(?,layout text,00000000,00000000,?,00000100,00000000,00A0A703,?,80000002,00000000), ref: 00A0A694
                                      • RegCloseKey.ADVAPI32(?,00A0A70A,00000000,?,00000100,00000000,00A0A703,?,80000002,00000000), ref: 00A0A6FD
                                      Strings
                                      • layout text, xrefs: 00A0A68B
                                      • System\CurrentControlSet\Control\Keyboard Layouts\%.8x, xrefs: 00A0A644
                                      Memory Dump Source
                                      • Source File: 00000002.00000002.323140727.00000000009D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009D0000, based on PE: true
                                      • Associated: 00000002.00000002.323135167.00000000009D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000002.00000002.323238271.0000000000A9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000002.00000002.323247473.0000000000AA3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_2_2_9d0000_rundll32.jbxd
                                      Similarity
                                      • API ID: CloseKeyboardLayoutListOpenQueryValue
                                      • String ID: System\CurrentControlSet\Control\Keyboard Layouts\%.8x$layout text
                                      • API String ID: 1703357764-2652665750
                                      • Opcode ID: 4881d37705745ca5518d79ccf41b350e90fdca6449ca175f4b418b58caca4368
                                      • Instruction ID: ab7505ce9d3b535b6bbc9e9fba841c7a875bba9467399ab0508a156f4b814c2d
                                      • Opcode Fuzzy Hash: 4881d37705745ca5518d79ccf41b350e90fdca6449ca175f4b418b58caca4368
                                      • Instruction Fuzzy Hash: 24411774A4020DAFDB11DFA4D985B9EB7F8FB58300F5184A1E904E7391D771AE40DB62
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      C-Code - Quality: 47%
                                      			E009F9E88(intOrPtr _a4, intOrPtr* _a8) {
                                      				void _v20;
                                      				void* __ebx;
                                      				void* __edi;
                                      				void* __esi;
                                      				void* __ebp;
                                      				void* _t23;
                                      				int _t24;
                                      				intOrPtr _t26;
                                      				intOrPtr _t27;
                                      				intOrPtr* _t29;
                                      				intOrPtr* _t31;
                                      
                                      				_t29 = _a8;
                                      				_t27 = _a4;
                                      				if( *0xa9f921 != 0) {
                                      					_t24 = 0;
                                      					if(_t27 == 0x12340042 && _t29 != 0 &&  *_t29 >= 0x28 && SystemParametersInfoA(0x30, 0,  &_v20, 0) != 0) {
                                      						 *((intOrPtr*)(_t29 + 4)) = 0;
                                      						 *((intOrPtr*)(_t29 + 8)) = 0;
                                      						 *((intOrPtr*)(_t29 + 0xc)) = GetSystemMetrics(0);
                                      						 *((intOrPtr*)(_t29 + 0x10)) = GetSystemMetrics(1);
                                      						asm("movsd");
                                      						asm("movsd");
                                      						asm("movsd");
                                      						asm("movsd");
                                      						_t31 = _t29;
                                      						 *(_t31 + 0x24) = 1;
                                      						if( *_t31 >= 0x4c) {
                                      							_push("DISPLAY");
                                      							_push(_t31 + 0x28);
                                      							L009D6E54();
                                      						}
                                      						_t24 = 1;
                                      					}
                                      				} else {
                                      					_t26 =  *0xa9f908; // 0x9f9e88
                                      					 *0xa9f908 = E009F9A84(5, _t23, _t26, _t27, _t29);
                                      					_t24 =  *0xa9f908(_t27, _t29);
                                      				}
                                      				return _t24;
                                      			}














                                      0x009f9e91
                                      0x009f9e94
                                      0x009f9e9e
                                      0x009f9ec3
                                      0x009f9ecb
                                      0x009f9eeb
                                      0x009f9ef0
                                      0x009f9efb
                                      0x009f9f06
                                      0x009f9f10
                                      0x009f9f11
                                      0x009f9f12
                                      0x009f9f13
                                      0x009f9f14
                                      0x009f9f15
                                      0x009f9f1f
                                      0x009f9f21
                                      0x009f9f29
                                      0x009f9f2a
                                      0x009f9f2a
                                      0x009f9f2f
                                      0x009f9f2f
                                      0x009f9ea0
                                      0x009f9ea5
                                      0x009f9eb2
                                      0x009f9ebf
                                      0x009f9ebf
                                      0x009f9f39

                                      APIs
                                      • SystemParametersInfoA.USER32(00000030,00000000,?,00000000), ref: 009F9EE0
                                      • GetSystemMetrics.USER32 ref: 009F9EF5
                                      • GetSystemMetrics.USER32 ref: 009F9F00
                                      • lstrcpy.KERNEL32(?,DISPLAY), ref: 009F9F2A
                                        • Part of subcall function 009F9A84: GetProcAddress.KERNEL32(75BA0000,00000000), ref: 009F9B04
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000002.00000002.323140727.00000000009D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009D0000, based on PE: true
                                      • Associated: 00000002.00000002.323135167.00000000009D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000002.00000002.323238271.0000000000A9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000002.00000002.323247473.0000000000AA3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_2_2_9d0000_rundll32.jbxd
                                      Similarity
                                      • API ID: System$Metrics$AddressInfoParametersProclstrcpy
                                      • String ID: DISPLAY$GetMonitorInfoA
                                      • API String ID: 2545840971-1370492664
                                      • Opcode ID: cdbac588b62e440f631bdcf7693f0e2ab75af711efd2a9f69471367668e453b9
                                      • Instruction ID: e944ba306aa3dae197810a8f3fca113951fcae05267c86592b93a46334a4ddbb
                                      • Opcode Fuzzy Hash: cdbac588b62e440f631bdcf7693f0e2ab75af711efd2a9f69471367668e453b9
                                      • Instruction Fuzzy Hash: 19119031B12319AFD720CFA59C44BBBB7E8EB45710F10452AEA59D7250D7B0AC45CBA0
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      C-Code - Quality: 47%
                                      			E009F9F5C(intOrPtr _a4, intOrPtr* _a8) {
                                      				void _v20;
                                      				void* __ebx;
                                      				void* __edi;
                                      				void* __esi;
                                      				void* __ebp;
                                      				void* _t23;
                                      				int _t24;
                                      				intOrPtr _t26;
                                      				intOrPtr _t27;
                                      				intOrPtr* _t29;
                                      				intOrPtr* _t31;
                                      
                                      				_t29 = _a8;
                                      				_t27 = _a4;
                                      				if( *0xa9f922 != 0) {
                                      					_t24 = 0;
                                      					if(_t27 == 0x12340042 && _t29 != 0 &&  *_t29 >= 0x28 && SystemParametersInfoA(0x30, 0,  &_v20, 0) != 0) {
                                      						 *((intOrPtr*)(_t29 + 4)) = 0;
                                      						 *((intOrPtr*)(_t29 + 8)) = 0;
                                      						 *((intOrPtr*)(_t29 + 0xc)) = GetSystemMetrics(0);
                                      						 *((intOrPtr*)(_t29 + 0x10)) = GetSystemMetrics(1);
                                      						asm("movsd");
                                      						asm("movsd");
                                      						asm("movsd");
                                      						asm("movsd");
                                      						_t31 = _t29;
                                      						 *(_t31 + 0x24) = 1;
                                      						if( *_t31 >= 0x4c) {
                                      							_push("DISPLAY");
                                      							_push(_t31 + 0x28);
                                      							L009D6E54();
                                      						}
                                      						_t24 = 1;
                                      					}
                                      				} else {
                                      					_t26 =  *0xa9f90c; // 0x9f9f5c
                                      					 *0xa9f90c = E009F9A84(6, _t23, _t26, _t27, _t29);
                                      					_t24 =  *0xa9f90c(_t27, _t29);
                                      				}
                                      				return _t24;
                                      			}














                                      0x009f9f65
                                      0x009f9f68
                                      0x009f9f72
                                      0x009f9f97
                                      0x009f9f9f
                                      0x009f9fbf
                                      0x009f9fc4
                                      0x009f9fcf
                                      0x009f9fda
                                      0x009f9fe4
                                      0x009f9fe5
                                      0x009f9fe6
                                      0x009f9fe7
                                      0x009f9fe8
                                      0x009f9fe9
                                      0x009f9ff3
                                      0x009f9ff5
                                      0x009f9ffd
                                      0x009f9ffe
                                      0x009f9ffe
                                      0x009fa003
                                      0x009fa003
                                      0x009f9f74
                                      0x009f9f79
                                      0x009f9f86
                                      0x009f9f93
                                      0x009f9f93
                                      0x009fa00d

                                      APIs
                                      • SystemParametersInfoA.USER32(00000030,00000000,?,00000000), ref: 009F9FB4
                                      • GetSystemMetrics.USER32 ref: 009F9FC9
                                      • GetSystemMetrics.USER32 ref: 009F9FD4
                                      • lstrcpy.KERNEL32(?,DISPLAY), ref: 009F9FFE
                                        • Part of subcall function 009F9A84: GetProcAddress.KERNEL32(75BA0000,00000000), ref: 009F9B04
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000002.00000002.323140727.00000000009D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009D0000, based on PE: true
                                      • Associated: 00000002.00000002.323135167.00000000009D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000002.00000002.323238271.0000000000A9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000002.00000002.323247473.0000000000AA3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_2_2_9d0000_rundll32.jbxd
                                      Similarity
                                      • API ID: System$Metrics$AddressInfoParametersProclstrcpy
                                      • String ID: DISPLAY$GetMonitorInfoW
                                      • API String ID: 2545840971-2774842281
                                      • Opcode ID: 042400e85afb9dd985aa29c9a7ef1a0ebb6054637a2fdaa07b43a904cf6accb9
                                      • Instruction ID: 5550cf1e22ae2a5926b337b80904a64a7addfde4f3f9444a474c092ce361000c
                                      • Opcode Fuzzy Hash: 042400e85afb9dd985aa29c9a7ef1a0ebb6054637a2fdaa07b43a904cf6accb9
                                      • Instruction Fuzzy Hash: 4211B171601309AFD720CFA5AC44BB7B7E8EB46710F14C52AEE49D7240DB70B805CBA6
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      C-Code - Quality: 75%
                                      			E009F6DB4(int __eax, void* __ecx, intOrPtr __edx) {
                                      				intOrPtr _v8;
                                      				struct HDC__* _v12;
                                      				struct HDC__* _v16;
                                      				void* _v20;
                                      				struct tagRGBQUAD _v1044;
                                      				int _t16;
                                      				int _t37;
                                      				intOrPtr _t44;
                                      				void* _t46;
                                      				void* _t49;
                                      				void* _t51;
                                      				intOrPtr _t52;
                                      
                                      				_t16 = __eax;
                                      				_t49 = _t51;
                                      				_t52 = _t51 + 0xfffffbf0;
                                      				_v8 = __edx;
                                      				_t46 = __eax;
                                      				if(__eax == 0 ||  *((short*)(__ecx + 0x26)) > 8) {
                                      					L4:
                                      					return _t16;
                                      				} else {
                                      					_t16 = E009F5C18(_v8, 0xff,  &_v1044);
                                      					_t37 = _t16;
                                      					if(_t37 == 0) {
                                      						goto L4;
                                      					} else {
                                      						_v12 = GetDC(0);
                                      						_v16 = CreateCompatibleDC(_v12);
                                      						_v20 = SelectObject(_v16, _t46);
                                      						_push(_t49);
                                      						_push(0x9f6e63);
                                      						_push( *[fs:eax]);
                                      						 *[fs:eax] = _t52;
                                      						SetDIBColorTable(_v16, 0, _t37,  &_v1044);
                                      						_pop(_t44);
                                      						 *[fs:eax] = _t44;
                                      						_push(0x9f6e6a);
                                      						SelectObject(_v16, _v20);
                                      						DeleteDC(_v16);
                                      						return ReleaseDC(0, _v12);
                                      					}
                                      				}
                                      			}















                                      0x009f6db4
                                      0x009f6db5
                                      0x009f6db7
                                      0x009f6dbf
                                      0x009f6dc2
                                      0x009f6dc6
                                      0x009f6e6a
                                      0x009f6e6f
                                      0x009f6dd7
                                      0x009f6de5
                                      0x009f6dea
                                      0x009f6dee
                                      0x00000000
                                      0x009f6df0
                                      0x009f6df7
                                      0x009f6e03
                                      0x009f6e10
                                      0x009f6e15
                                      0x009f6e16
                                      0x009f6e1b
                                      0x009f6e1e
                                      0x009f6e2f
                                      0x009f6e36
                                      0x009f6e39
                                      0x009f6e3c
                                      0x009f6e49
                                      0x009f6e52
                                      0x009f6e62
                                      0x009f6e62
                                      0x009f6dee

                                      APIs
                                        • Part of subcall function 009F5C18: GetObjectA.GDI32(?,00000004), ref: 009F5C2F
                                        • Part of subcall function 009F5C18: GetPaletteEntries.GDI32(?,00000000,?,?), ref: 009F5C52
                                      • GetDC.USER32(00000000), ref: 009F6DF2
                                      • CreateCompatibleDC.GDI32(?), ref: 009F6DFE
                                      • SelectObject.GDI32(?), ref: 009F6E0B
                                      • SetDIBColorTable.GDI32(?,00000000,00000000,?,00000000,009F6E63,?,?,?,?,00000000), ref: 009F6E2F
                                      • SelectObject.GDI32(?,?), ref: 009F6E49
                                      • DeleteDC.GDI32(?), ref: 009F6E52
                                      • ReleaseDC.USER32 ref: 009F6E5D
                                      Memory Dump Source
                                      • Source File: 00000002.00000002.323140727.00000000009D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009D0000, based on PE: true
                                      • Associated: 00000002.00000002.323135167.00000000009D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000002.00000002.323238271.0000000000A9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000002.00000002.323247473.0000000000AA3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_2_2_9d0000_rundll32.jbxd
                                      Similarity
                                      • API ID: Object$Select$ColorCompatibleCreateDeleteEntriesPaletteReleaseTable
                                      • String ID:
                                      • API String ID: 4046155103-0
                                      • Opcode ID: 6cc6f42dc31a9ce6b8e537b584e66dd41cad54c3c324acf39be97352a9a4ba7b
                                      • Instruction ID: 3680824f8e58f369b35121208a1c978cb3ed776bd7cf048e80a463ce21f692e9
                                      • Opcode Fuzzy Hash: 6cc6f42dc31a9ce6b8e537b584e66dd41cad54c3c324acf39be97352a9a4ba7b
                                      • Instruction Fuzzy Hash: 01115E76E54718ABDB10EBE8DC51BAEB7BCEB88704F0084A6BA04E7341D7719D508B60
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      C-Code - Quality: 67%
                                      			E009F1064(void* __eax, void* __ebx, void* __edi, void* __esi) {
                                      				char _v5;
                                      				intOrPtr* _v12;
                                      				long _v16;
                                      				char _v20;
                                      				char _v24;
                                      				long _t22;
                                      				char _t29;
                                      				void* _t53;
                                      				intOrPtr _t61;
                                      				intOrPtr* _t62;
                                      				intOrPtr _t63;
                                      				intOrPtr _t66;
                                      				intOrPtr _t67;
                                      				void* _t72;
                                      				void* _t73;
                                      				intOrPtr _t74;
                                      
                                      				_t72 = _t73;
                                      				_t74 = _t73 + 0xffffffec;
                                      				_push(__esi);
                                      				_push(__edi);
                                      				_t53 = __eax;
                                      				_t22 = GetCurrentThreadId();
                                      				_t62 =  *0xa9e638; // 0xa9f034
                                      				if(_t22 !=  *_t62) {
                                      					_v24 = GetCurrentThreadId();
                                      					_v20 = 0;
                                      					_t61 =  *0xa9e3fc; // 0x9e716c
                                      					E009DC2BC(_t53, _t61, 1, __edi, __esi, 0,  &_v24);
                                      					E009D3BC0();
                                      				}
                                      				if(_t53 <= 0) {
                                      					E009F103C();
                                      				} else {
                                      					E009F1048(_t53);
                                      				}
                                      				_v16 = 0;
                                      				_push(0xa9f870);
                                      				L009D6C5C();
                                      				_push(_t72);
                                      				_push(0x9f11f2);
                                      				_push( *[fs:eax]);
                                      				 *[fs:eax] = _t74;
                                      				_v16 = InterlockedExchange(0xa9c614, _v16);
                                      				_push(_t72);
                                      				_push(0x9f11d3);
                                      				_push( *[fs:eax]);
                                      				 *[fs:eax] = _t74;
                                      				if(_v16 == 0 ||  *((intOrPtr*)(_v16 + 8)) <= 0) {
                                      					_t29 = 0;
                                      				} else {
                                      					_t29 = 1;
                                      				}
                                      				_v5 = _t29;
                                      				if(_v5 == 0) {
                                      					L14:
                                      					_pop(_t63);
                                      					 *[fs:eax] = _t63;
                                      					_push(0x9f11da);
                                      					return E009D3380(_v16);
                                      				} else {
                                      					if( *((intOrPtr*)(_v16 + 8)) > 0) {
                                      						_v12 = E009EB65C(_v16, 0);
                                      						E009EB54C(_v16, 0);
                                      						L009D6DB4();
                                      						 *[fs:eax] = _t74;
                                      						 *[fs:eax] = _t74;
                                      						 *((intOrPtr*)( *_v12 + 8))( *[fs:eax], _t72,  *[fs:eax], 0x9f119d, _t72, 0xa9f870);
                                      						_pop(_t66);
                                      						 *[fs:eax] = _t66;
                                      						_t67 = 0x9f116e;
                                      						 *[fs:eax] = _t67;
                                      						_push(0x9f11a4);
                                      						_push(0xa9f870);
                                      						L009D6C5C();
                                      						return 0;
                                      					} else {
                                      						goto L14;
                                      					}
                                      				}
                                      			}



















                                      0x009f1065
                                      0x009f1067
                                      0x009f106b
                                      0x009f106c
                                      0x009f106d
                                      0x009f106f
                                      0x009f1074
                                      0x009f107c
                                      0x009f1083
                                      0x009f1086
                                      0x009f1090
                                      0x009f109d
                                      0x009f10a2
                                      0x009f10a2
                                      0x009f10a9
                                      0x009f10b4
                                      0x009f10ab
                                      0x009f10ad
                                      0x009f10ad
                                      0x009f10bb
                                      0x009f10be
                                      0x009f10c3
                                      0x009f10ca
                                      0x009f10cb
                                      0x009f10d0
                                      0x009f10d3
                                      0x009f10e4
                                      0x009f10e9
                                      0x009f10ea
                                      0x009f10ef
                                      0x009f10f2
                                      0x009f10f9
                                      0x009f1104
                                      0x009f1108
                                      0x009f1108
                                      0x009f1108
                                      0x009f110a
                                      0x009f1111
                                      0x009f11bd
                                      0x009f11bf
                                      0x009f11c2
                                      0x009f11c5
                                      0x009f11d2
                                      0x009f1117
                                      0x009f11b7
                                      0x009f1126
                                      0x009f112e
                                      0x009f1138
                                      0x009f1148
                                      0x009f1156
                                      0x009f1161
                                      0x009f1166
                                      0x009f1169
                                      0x009f1187
                                      0x009f118a
                                      0x009f118d
                                      0x009f1192
                                      0x009f1197
                                      0x009f119c
                                      0x00000000
                                      0x00000000
                                      0x00000000
                                      0x009f11b7

                                      APIs
                                      • GetCurrentThreadId.KERNEL32 ref: 009F106F
                                      • GetCurrentThreadId.KERNEL32 ref: 009F107E
                                        • Part of subcall function 009F103C: ResetEvent.KERNEL32(000000BC,009F10B9), ref: 009F1042
                                      • RtlEnterCriticalSection.KERNEL32(00A9F870), ref: 009F10C3
                                      • InterlockedExchange.KERNEL32(00A9C614,?), ref: 009F10DF
                                      • RtlLeaveCriticalSection.KERNEL32(00A9F870,00000000,009F11D3,?,00000000,009F11F2,?,00A9F870), ref: 009F1138
                                      • RtlEnterCriticalSection.KERNEL32(00A9F870,009F11A4,009F11D3,?,00000000,009F11F2,?,00A9F870), ref: 009F1197
                                      Memory Dump Source
                                      • Source File: 00000002.00000002.323140727.00000000009D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009D0000, based on PE: true
                                      • Associated: 00000002.00000002.323135167.00000000009D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000002.00000002.323238271.0000000000A9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000002.00000002.323247473.0000000000AA3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_2_2_9d0000_rundll32.jbxd
                                      Similarity
                                      • API ID: CriticalSection$CurrentEnterThread$EventExchangeInterlockedLeaveReset
                                      • String ID:
                                      • API String ID: 2189153385-0
                                      • Opcode ID: 25eb5fa24cb3a3ed58335686ce9733c97bb37589bd924d24c81ab66705e3aaa7
                                      • Instruction ID: 44515251c503346ed84a05ea4e722dd04fd0576b84cd03b2cfacfab95c836d10
                                      • Opcode Fuzzy Hash: 25eb5fa24cb3a3ed58335686ce9733c97bb37589bd924d24c81ab66705e3aaa7
                                      • Instruction Fuzzy Hash: C631BF30B58648EFDB01DFB4CC52A7AB7F8EB89700F55C866F600D6651DB359940CB61
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      C-Code - Quality: 81%
                                      			E009F5EC4(intOrPtr* __eax, void* __ebx, signed int __ecx, intOrPtr __edx, void* __edi, void* __esi, void* __eflags, signed int* _a4, signed int* _a8) {
                                      				intOrPtr* _v8;
                                      				intOrPtr _v12;
                                      				signed int _v16;
                                      				intOrPtr _v20;
                                      				signed int _v24;
                                      				signed int _v32;
                                      				struct HDC__* _v44;
                                      				signed int* _t36;
                                      				signed int _t39;
                                      				signed int _t42;
                                      				signed int* _t52;
                                      				signed int _t56;
                                      				intOrPtr _t66;
                                      				void* _t72;
                                      				void* _t73;
                                      				void* _t74;
                                      				intOrPtr _t75;
                                      
                                      				_t73 = _t74;
                                      				_t75 = _t74 + 0xffffff90;
                                      				_v16 = __ecx;
                                      				_v12 = __edx;
                                      				_v8 = __eax;
                                      				_t52 = _a8;
                                      				_v24 = _v16 << 4;
                                      				_v20 = E009D8764(_v24, __eflags);
                                      				 *[fs:edx] = _t75;
                                      				_t56 = _v24;
                                      				 *((intOrPtr*)( *_v8 + 0xc))( *[fs:edx], 0x9f61bb, _t73, __edi, __esi, __ebx, _t72);
                                      				if(( *_t52 | _t52[1]) != 0) {
                                      					_t36 = _a4;
                                      					 *_t36 =  *_t52;
                                      					_t36[1] = _t52[1];
                                      				} else {
                                      					 *_a4 = GetSystemMetrics(0xb);
                                      					_a4[1] = GetSystemMetrics(0xc);
                                      				}
                                      				_v44 = GetDC(0);
                                      				if(_v44 == 0) {
                                      					E009F5388(_t56);
                                      				}
                                      				_push(_t73);
                                      				_push(0x9f5fad);
                                      				_push( *[fs:edx]);
                                      				 *[fs:edx] = _t75;
                                      				_t39 = GetDeviceCaps(_v44, 0xe);
                                      				_t42 = _t39 * GetDeviceCaps(_v44, 0xc);
                                      				if(_t42 <= 8) {
                                      					__eflags = 1;
                                      					_v32 = 1 << _t42;
                                      				} else {
                                      					_v32 = 0x7fffffff;
                                      				}
                                      				_pop(_t66);
                                      				 *[fs:eax] = _t66;
                                      				_push(0x9f5fb4);
                                      				return ReleaseDC(0, _v44);
                                      			}




















                                      0x009f5ec5
                                      0x009f5ec7
                                      0x009f5ecd
                                      0x009f5ed0
                                      0x009f5ed3
                                      0x009f5ed6
                                      0x009f5edf
                                      0x009f5eea
                                      0x009f5ef8
                                      0x009f5efe
                                      0x009f5f06
                                      0x009f5f0e
                                      0x009f5f2b
                                      0x009f5f30
                                      0x009f5f35
                                      0x009f5f10
                                      0x009f5f1a
                                      0x009f5f26
                                      0x009f5f26
                                      0x009f5f3f
                                      0x009f5f46
                                      0x009f5f48
                                      0x009f5f48
                                      0x009f5f4f
                                      0x009f5f50
                                      0x009f5f55
                                      0x009f5f58
                                      0x009f5f61
                                      0x009f5f77
                                      0x009f5f7d
                                      0x009f5f8f
                                      0x009f5f91
                                      0x009f5f7f
                                      0x009f5f7f
                                      0x009f5f7f
                                      0x009f5f96
                                      0x009f5f99
                                      0x009f5f9c
                                      0x009f5fac

                                      APIs
                                      • GetSystemMetrics.USER32 ref: 009F5F12
                                      • GetSystemMetrics.USER32 ref: 009F5F1E
                                      • GetDC.USER32(00000000), ref: 009F5F3A
                                      • GetDeviceCaps.GDI32(00000000,0000000E), ref: 009F5F61
                                      • GetDeviceCaps.GDI32(00000000,0000000C), ref: 009F5F6E
                                      • ReleaseDC.USER32 ref: 009F5FA7
                                      Memory Dump Source
                                      • Source File: 00000002.00000002.323140727.00000000009D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009D0000, based on PE: true
                                      • Associated: 00000002.00000002.323135167.00000000009D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000002.00000002.323238271.0000000000A9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000002.00000002.323247473.0000000000AA3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_2_2_9d0000_rundll32.jbxd
                                      Similarity
                                      • API ID: CapsDeviceMetricsSystem$Release
                                      • String ID:
                                      • API String ID: 447804332-0
                                      • Opcode ID: 432ee5f91a8378fe5b03a845c0f0a13692f62fe8703f5df8a1ff97568ad16fcd
                                      • Instruction ID: 65781fd8a3c171aa9616be497a23360c574543f0da2ef1ab2b42fe449e9514e7
                                      • Opcode Fuzzy Hash: 432ee5f91a8378fe5b03a845c0f0a13692f62fe8703f5df8a1ff97568ad16fcd
                                      • Instruction Fuzzy Hash: 99314F74A04648EFEB00DFA8C941BADBBB5FB89710F11C5A5FA14AB381D6709D41CB61
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      C-Code - Quality: 67%
                                      			E009F631C(struct HBITMAP__* __eax, void* __ebx, struct tagBITMAPINFO* __ecx, struct HPALETTE__* __edx, void* __edi, void* __esi, void* __eflags, intOrPtr _a4, void* _a8) {
                                      				char _v5;
                                      				struct HPALETTE__* _v12;
                                      				struct HDC__* _v16;
                                      				struct tagBITMAPINFO* _t36;
                                      				intOrPtr _t43;
                                      				struct HBITMAP__* _t47;
                                      				void* _t50;
                                      
                                      				_t36 = __ecx;
                                      				_t47 = __eax;
                                      				E009F61CC(__eax, _a4, __ecx);
                                      				_v12 = 0;
                                      				_v16 = CreateCompatibleDC(0);
                                      				_push(_t50);
                                      				_push(0x9f63b9);
                                      				_push( *[fs:eax]);
                                      				 *[fs:eax] = _t50 + 0xfffffff4;
                                      				if(__edx != 0) {
                                      					_v12 = SelectPalette(_v16, __edx, 0);
                                      					RealizePalette(_v16);
                                      				}
                                      				_v5 = GetDIBits(_v16, _t47, 0, _t36->bmiHeader.biHeight, _a8, _t36, 0) != 0;
                                      				_pop(_t43);
                                      				 *[fs:eax] = _t43;
                                      				_push(0x9f63c0);
                                      				if(_v12 != 0) {
                                      					SelectPalette(_v16, _v12, 0);
                                      				}
                                      				return DeleteDC(_v16);
                                      			}










                                      0x009f6325
                                      0x009f6329
                                      0x009f6332
                                      0x009f6339
                                      0x009f6343
                                      0x009f6348
                                      0x009f6349
                                      0x009f634e
                                      0x009f6351
                                      0x009f6356
                                      0x009f6364
                                      0x009f636b
                                      0x009f636b
                                      0x009f6389
                                      0x009f638f
                                      0x009f6392
                                      0x009f6395
                                      0x009f639e
                                      0x009f63aa
                                      0x009f63aa
                                      0x009f63b8

                                      APIs
                                        • Part of subcall function 009F61CC: GetObjectA.GDI32(?,00000054), ref: 009F61E0
                                      • CreateCompatibleDC.GDI32(00000000), ref: 009F633E
                                      • SelectPalette.GDI32(?,?,00000000), ref: 009F635F
                                      • RealizePalette.GDI32(?), ref: 009F636B
                                      • GetDIBits.GDI32(?,?,00000000,?,?,?,00000000), ref: 009F6382
                                      • SelectPalette.GDI32(?,00000000,00000000), ref: 009F63AA
                                      • DeleteDC.GDI32(?), ref: 009F63B3
                                      Memory Dump Source
                                      • Source File: 00000002.00000002.323140727.00000000009D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009D0000, based on PE: true
                                      • Associated: 00000002.00000002.323135167.00000000009D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000002.00000002.323238271.0000000000A9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000002.00000002.323247473.0000000000AA3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_2_2_9d0000_rundll32.jbxd
                                      Similarity
                                      • API ID: Palette$Select$BitsCompatibleCreateDeleteObjectRealize
                                      • String ID:
                                      • API String ID: 1221726059-0
                                      • Opcode ID: 5f1dd3a2fe065bc163b07c48a7043290622a84fc49cf87f295e0270a9e5d4673
                                      • Instruction ID: 6c77c874f2f5120211db4940e4951d090bfc2a01b232cab9f520821f8aacf1f8
                                      • Opcode Fuzzy Hash: 5f1dd3a2fe065bc163b07c48a7043290622a84fc49cf87f295e0270a9e5d4673
                                      • Instruction Fuzzy Hash: 1E114C75A44708BFDB10DBA8CC81F9EB7FCAB89710F118465B618E7381D775AD008B60
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      C-Code - Quality: 71%
                                      			E009D1CD0() {
                                      				void* _t2;
                                      				void* _t3;
                                      				void* _t14;
                                      				intOrPtr* _t19;
                                      				intOrPtr _t23;
                                      				intOrPtr _t26;
                                      				intOrPtr _t28;
                                      
                                      				_t26 = _t28;
                                      				if( *0xa9f5c4 == 0) {
                                      					return _t2;
                                      				} else {
                                      					_push(_t26);
                                      					_push(0x9d1da6);
                                      					_push( *[fs:edx]);
                                      					 *[fs:edx] = _t28;
                                      					if( *0xa9f04d != 0) {
                                      						_push(0xa9f5cc);
                                      						L009D1568();
                                      					}
                                      					 *0xa9f5c4 = 0;
                                      					_t3 =  *0xa9f624; // 0x8f0f20
                                      					LocalFree(_t3);
                                      					 *0xa9f624 = 0;
                                      					_t19 =  *0xa9f5ec; // 0x8f2554
                                      					while(_t19 != 0xa9f5ec) {
                                      						VirtualFree( *(_t19 + 8), 0, 0x8000);
                                      						_t19 =  *_t19;
                                      					}
                                      					E009D15D0(0xa9f5ec);
                                      					E009D15D0(0xa9f5fc);
                                      					E009D15D0(0xa9f628);
                                      					_t14 =  *0xa9f5e4; // 0x8f1f20
                                      					while(_t14 != 0) {
                                      						 *0xa9f5e4 =  *_t14;
                                      						LocalFree(_t14);
                                      						_t14 =  *0xa9f5e4; // 0x8f1f20
                                      					}
                                      					_pop(_t23);
                                      					 *[fs:eax] = _t23;
                                      					_push(0x9d1dad);
                                      					if( *0xa9f04d != 0) {
                                      						_push(0xa9f5cc);
                                      						L009D1570();
                                      					}
                                      					_push(0xa9f5cc);
                                      					L009D1578();
                                      					return 0;
                                      				}
                                      			}










                                      0x009d1cd1
                                      0x009d1cdb
                                      0x009d1daf
                                      0x009d1ce1
                                      0x009d1ce3
                                      0x009d1ce4
                                      0x009d1ce9
                                      0x009d1cec
                                      0x009d1cf6
                                      0x009d1cf8
                                      0x009d1cfd
                                      0x009d1cfd
                                      0x009d1d02
                                      0x009d1d09
                                      0x009d1d0f
                                      0x009d1d16
                                      0x009d1d1b
                                      0x009d1d35
                                      0x009d1d2e
                                      0x009d1d33
                                      0x009d1d33
                                      0x009d1d42
                                      0x009d1d4c
                                      0x009d1d56
                                      0x009d1d5b
                                      0x009d1d62
                                      0x009d1d66
                                      0x009d1d6d
                                      0x009d1d72
                                      0x009d1d77
                                      0x009d1d7d
                                      0x009d1d80
                                      0x009d1d83
                                      0x009d1d8f
                                      0x009d1d91
                                      0x009d1d96
                                      0x009d1d96
                                      0x009d1d9b
                                      0x009d1da0
                                      0x009d1da5
                                      0x009d1da5

                                      APIs
                                      • RtlEnterCriticalSection.KERNEL32(00A9F5CC,00000000,009D1DA6), ref: 009D1CFD
                                      • LocalFree.KERNEL32(008F0F20,00000000,009D1DA6), ref: 009D1D0F
                                      • VirtualFree.KERNEL32(?,00000000,00008000,008F0F20,00000000,009D1DA6), ref: 009D1D2E
                                      • LocalFree.KERNEL32(008F1F20,?,00000000,00008000,008F0F20,00000000,009D1DA6), ref: 009D1D6D
                                      • RtlLeaveCriticalSection.KERNEL32(00A9F5CC,009D1DAD,008F0F20,00000000,009D1DA6), ref: 009D1D96
                                      • RtlDeleteCriticalSection.KERNEL32(00A9F5CC,009D1DAD,008F0F20,00000000,009D1DA6), ref: 009D1DA0
                                      Memory Dump Source
                                      • Source File: 00000002.00000002.323140727.00000000009D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009D0000, based on PE: true
                                      • Associated: 00000002.00000002.323135167.00000000009D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000002.00000002.323238271.0000000000A9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000002.00000002.323247473.0000000000AA3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_2_2_9d0000_rundll32.jbxd
                                      Similarity
                                      • API ID: CriticalFreeSection$Local$DeleteEnterLeaveVirtual
                                      • String ID:
                                      • API String ID: 3782394904-0
                                      • Opcode ID: 3ee3cfd9d0fbefa1e6ca1b9e4a416f6a988e9f1b91faa4d46047aa0df5c77a34
                                      • Instruction ID: 1251b1c340ba0fc0d666d6890809a197727e1c6ae7b67281f40244df02724265
                                      • Opcode Fuzzy Hash: 3ee3cfd9d0fbefa1e6ca1b9e4a416f6a988e9f1b91faa4d46047aa0df5c77a34
                                      • Instruction Fuzzy Hash: 67118872B847807EEB11EFA8AC46B1536DDA7D5700F51C4B7F006C63E6DA689801CB20
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      C-Code - Quality: 100%
                                      			E009F5B74(void* __eax, signed int __ecx) {
                                      				char _v1036;
                                      				signed int _v1038;
                                      				struct tagRGBQUAD _v1048;
                                      				short _v1066;
                                      				void* _t20;
                                      				struct HDC__* _t25;
                                      				void* _t28;
                                      				void* _t31;
                                      				struct HPALETTE__* _t33;
                                      				LOGPALETTE* _t34;
                                      
                                      				_t31 = __eax;
                                      				_t33 = 0;
                                      				_t34->palVersion = 0x300;
                                      				if(__eax == 0) {
                                      					_v1038 = __ecx;
                                      					E009D2AC8(_t28, __ecx << 2,  &_v1036);
                                      				} else {
                                      					_t25 = CreateCompatibleDC(0);
                                      					_t20 = SelectObject(_t25, _t31);
                                      					_v1066 = GetDIBColorTable(_t25, 0, 0x100,  &_v1048);
                                      					SelectObject(_t25, _t20);
                                      					DeleteDC(_t25);
                                      				}
                                      				if(_v1038 != 0) {
                                      					if(_v1038 != 0x10 || E009F5ADC(_t34) == 0) {
                                      						E009F596C( &_v1036, _v1038 & 0x0000ffff);
                                      					}
                                      					_t33 = CreatePalette(_t34);
                                      				}
                                      				return _t33;
                                      			}













                                      0x009f5b7d
                                      0x009f5b7f
                                      0x009f5b81
                                      0x009f5b89
                                      0x009f5bc3
                                      0x009f5bd1
                                      0x009f5b8b
                                      0x009f5b92
                                      0x009f5b96
                                      0x009f5baf
                                      0x009f5bb6
                                      0x009f5bbc
                                      0x009f5bbc
                                      0x009f5bdc
                                      0x009f5be4
                                      0x009f5bfa
                                      0x009f5bfa
                                      0x009f5c07
                                      0x009f5c07
                                      0x009f5c14

                                      APIs
                                      • CreateCompatibleDC.GDI32(00000000), ref: 009F5B8D
                                      • SelectObject.GDI32(00000000,00000000), ref: 009F5B96
                                      • GetDIBColorTable.GDI32(00000000,00000000,00000100,?,00000000,00000000,00000000,00000000,?,?,009F8063,?,?,?,?,009F6C4F), ref: 009F5BAA
                                      • SelectObject.GDI32(00000000,00000000), ref: 009F5BB6
                                      • DeleteDC.GDI32(00000000), ref: 009F5BBC
                                      • CreatePalette.GDI32 ref: 009F5C02
                                      Memory Dump Source
                                      • Source File: 00000002.00000002.323140727.00000000009D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009D0000, based on PE: true
                                      • Associated: 00000002.00000002.323135167.00000000009D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000002.00000002.323238271.0000000000A9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000002.00000002.323247473.0000000000AA3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_2_2_9d0000_rundll32.jbxd
                                      Similarity
                                      • API ID: CreateObjectSelect$ColorCompatibleDeletePaletteTable
                                      • String ID:
                                      • API String ID: 2515223848-0
                                      • Opcode ID: 51e7dc9b8e2b7936394e1b89e8001dead6ba83b8a03920836762a65d0fd4e157
                                      • Instruction ID: 2bd1073c04c9d48caab9156f189db34792875c64598ee8e0f6287f8f3b3c5d70
                                      • Opcode Fuzzy Hash: 51e7dc9b8e2b7936394e1b89e8001dead6ba83b8a03920836762a65d0fd4e157
                                      • Instruction Fuzzy Hash: 8F01B16160471466E620B76D9C43F7BB2EC9FC0750F16C91EB7898B382E7798C44C3A6
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      C-Code - Quality: 100%
                                      			E009F5264(void* __eax) {
                                      				void* _t36;
                                      
                                      				_t36 = __eax;
                                      				UnrealizeObject(E009F4A40( *((intOrPtr*)(__eax + 0x14))));
                                      				SelectObject( *(_t36 + 4), E009F4A40( *((intOrPtr*)(_t36 + 0x14))));
                                      				if(E009F4B20( *((intOrPtr*)(_t36 + 0x14))) != 0) {
                                      					SetBkColor( *(_t36 + 4),  !(E009F3D80(E009F4A04( *((intOrPtr*)(_t36 + 0x14))))));
                                      					return SetBkMode( *(_t36 + 4), 1);
                                      				} else {
                                      					SetBkColor( *(_t36 + 4), E009F3D80(E009F4A04( *((intOrPtr*)(_t36 + 0x14)))));
                                      					return SetBkMode( *(_t36 + 4), 2);
                                      				}
                                      			}




                                      0x009f5265
                                      0x009f5270
                                      0x009f5282
                                      0x009f5291
                                      0x009f52cb
                                      0x009f52dc
                                      0x009f5293
                                      0x009f52a5
                                      0x009f52b6
                                      0x009f52b6

                                      APIs
                                        • Part of subcall function 009F4A40: CreateBrushIndirect.GDI32(?), ref: 009F4AEA
                                      • UnrealizeObject.GDI32(00000000), ref: 009F5270
                                      • SelectObject.GDI32(?,00000000), ref: 009F5282
                                      • SetBkColor.GDI32(?,00000000), ref: 009F52A5
                                      • SetBkMode.GDI32(?,00000002), ref: 009F52B0
                                      • SetBkColor.GDI32(?,00000000), ref: 009F52CB
                                      • SetBkMode.GDI32(?,00000001), ref: 009F52D6
                                        • Part of subcall function 009F3D80: GetSysColor.USER32(?), ref: 009F3D8A
                                      Memory Dump Source
                                      • Source File: 00000002.00000002.323140727.00000000009D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009D0000, based on PE: true
                                      • Associated: 00000002.00000002.323135167.00000000009D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000002.00000002.323238271.0000000000A9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000002.00000002.323247473.0000000000AA3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_2_2_9d0000_rundll32.jbxd
                                      Similarity
                                      • API ID: Color$ModeObject$BrushCreateIndirectSelectUnrealize
                                      • String ID:
                                      • API String ID: 3527656728-0
                                      • Opcode ID: 14f6aa9631b8364fae043b54f33af7ef634752645c4b6b2fabfca5e3adb34395
                                      • Instruction ID: bf3a42e94e9df7c9c004c7144f0d2180a131587f007da9286d1e1d60c9df0fee
                                      • Opcode Fuzzy Hash: 14f6aa9631b8364fae043b54f33af7ef634752645c4b6b2fabfca5e3adb34395
                                      • Instruction Fuzzy Hash: C2F079B5644504ABCE04FFACE9C6F1B6B986F843017058491BA08DF297CA65E8108B35
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      C-Code - Quality: 65%
                                      			E009D31F0() {
                                      				void* _v8;
                                      				char _v12;
                                      				int _v16;
                                      				signed short _t12;
                                      				signed short _t14;
                                      				intOrPtr _t27;
                                      				void* _t29;
                                      				void* _t31;
                                      				intOrPtr _t32;
                                      
                                      				_t29 = _t31;
                                      				_t32 = _t31 + 0xfffffff4;
                                      				_v12 =  *0xa9c020 & 0x0000ffff;
                                      				if(RegOpenKeyExA(0x80000002, "SOFTWARE\\Borland\\Delphi\\RTL", 0, 1,  &_v8) != 0) {
                                      					_t12 =  *0xa9c020; // 0x27f
                                      					_t14 = _t12 & 0x0000ffc0 | _v12 & 0x0000003f;
                                      					 *0xa9c020 = _t14;
                                      					return _t14;
                                      				} else {
                                      					_push(_t29);
                                      					_push(0x9d3261);
                                      					_push( *[fs:eax]);
                                      					 *[fs:eax] = _t32;
                                      					_v16 = 4;
                                      					RegQueryValueExA(_v8, "FPUMaskValue", 0, 0,  &_v12,  &_v16);
                                      					_pop(_t27);
                                      					 *[fs:eax] = _t27;
                                      					_push(0x9d3268);
                                      					return RegCloseKey(_v8);
                                      				}
                                      			}












                                      0x009d31f1
                                      0x009d31f3
                                      0x009d31fd
                                      0x009d3219
                                      0x009d3268
                                      0x009d327a
                                      0x009d327d
                                      0x009d3286
                                      0x009d321b
                                      0x009d321d
                                      0x009d321e
                                      0x009d3223
                                      0x009d3226
                                      0x009d3229
                                      0x009d3245
                                      0x009d324c
                                      0x009d324f
                                      0x009d3252
                                      0x009d3260
                                      0x009d3260

                                      APIs
                                      • RegOpenKeyExA.ADVAPI32(80000002,SOFTWARE\Borland\Delphi\RTL,00000000,00000001,?), ref: 009D3212
                                      • RegQueryValueExA.ADVAPI32(?,FPUMaskValue,00000000,00000000,?,00000004,00000000,009D3261,?,80000002,SOFTWARE\Borland\Delphi\RTL,00000000,00000001,?), ref: 009D3245
                                      • RegCloseKey.ADVAPI32(?,009D3268,00000000,?,00000004,00000000,009D3261,?,80000002,SOFTWARE\Borland\Delphi\RTL,00000000,00000001,?), ref: 009D325B
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000002.00000002.323140727.00000000009D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009D0000, based on PE: true
                                      • Associated: 00000002.00000002.323135167.00000000009D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000002.00000002.323238271.0000000000A9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000002.00000002.323247473.0000000000AA3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_2_2_9d0000_rundll32.jbxd
                                      Similarity
                                      • API ID: CloseOpenQueryValue
                                      • String ID: FPUMaskValue$SOFTWARE\Borland\Delphi\RTL
                                      • API String ID: 3677997916-4173385793
                                      • Opcode ID: 42f106e6eda843f6ef56f85b6a656472252769804a411830309663d84149e5d1
                                      • Instruction ID: 5373301aea25a2ca56fbc315e580f401f03325dd08b96711b63d12fe945278cb
                                      • Opcode Fuzzy Hash: 42f106e6eda843f6ef56f85b6a656472252769804a411830309663d84149e5d1
                                      • Instruction Fuzzy Hash: FB01D47AE80308BAEB11DBE0DD42BB977BCEB48B15F508163FA14E2790E6749A10C755
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      C-Code - Quality: 64%
                                      			E009E4350(signed short* __eax, intOrPtr __ecx, signed short* __edx, void* __edi, void* __fp0) {
                                      				signed short* _v8;
                                      				signed short* _v12;
                                      				intOrPtr _v16;
                                      				signed int _v18;
                                      				signed int _v20;
                                      				void* _v24;
                                      				void* _v28;
                                      				char _v44;
                                      				void* __ebp;
                                      				void* _t119;
                                      				signed int _t207;
                                      				intOrPtr _t216;
                                      				intOrPtr _t217;
                                      				intOrPtr _t250;
                                      				intOrPtr _t255;
                                      				intOrPtr _t259;
                                      				intOrPtr _t264;
                                      				intOrPtr _t268;
                                      				void* _t271;
                                      				void* _t273;
                                      				intOrPtr _t274;
                                      
                                      				_t278 = __fp0;
                                      				_t269 = __edi;
                                      				_t271 = _t273;
                                      				_t274 = _t273 + 0xffffffd8;
                                      				_v16 = __ecx;
                                      				_v12 = __edx;
                                      				_v8 = __eax;
                                      				_t204 =  *_v8;
                                      				if(( *_v8 & 0x00000fff) >= 0x10f) {
                                      					if(E009E6E74(_t204,  &_v24) == 0) {
                                      						E009DF34C(__ecx);
                                      					}
                                      					_push( &_v20);
                                      					_t216 = _v16;
                                      					if( *((intOrPtr*)( *_v24 + 8))() == 0) {
                                      						_t207 =  *_v12;
                                      						if((_t207 & 0x00000fff) >= 0x10f) {
                                      							if(E009E6E74(_t207,  &_v28) != 0) {
                                      								_push( &_v18);
                                      								_t217 = _v16;
                                      								if( *((intOrPtr*)( *_v28 + 4))() == 0) {
                                      									_t119 = E009DF34C(_t217);
                                      									goto L35;
                                      								} else {
                                      									if( *_v8 == _v18) {
                                      										_t119 =  *((intOrPtr*)( *_v28 + 0x2c))(_v16);
                                      										goto L35;
                                      									} else {
                                      										_push( &_v44);
                                      										L009DE2EC();
                                      										_push(_t271);
                                      										_push(0x9e4675);
                                      										_push( *[fs:eax]);
                                      										 *[fs:eax] = _t274;
                                      										_t219 = _v18 & 0x0000ffff;
                                      										E009E0300( &_v44, _v18 & 0x0000ffff, _v8, _t269, _t278);
                                      										E009DFDBC(_v8,  &_v44);
                                      										if( *_v8 != _v18) {
                                      											E009DF25C(_t219);
                                      										}
                                      										_pop(_t250);
                                      										 *[fs:eax] = _t250;
                                      										_push(0x9e467c);
                                      										return E009DFA94( &_v44);
                                      									}
                                      								}
                                      							} else {
                                      								_t119 = E009DF34C(_t216);
                                      								goto L35;
                                      							}
                                      						} else {
                                      							if(_t207 ==  *_v8) {
                                      								_t119 = E009E50AC(_v8, _v16, _v12, _t278);
                                      								goto L35;
                                      							} else {
                                      								_push( &_v44);
                                      								L009DE2EC();
                                      								_push(_t271);
                                      								_push(0x9e45c6);
                                      								_push( *[fs:eax]);
                                      								 *[fs:eax] = _t274;
                                      								_t224 =  *_v12 & 0x0000ffff;
                                      								E009E0300( &_v44,  *_v12 & 0x0000ffff, _v8, _t269, _t278);
                                      								E009DFDBC(_v8,  &_v44);
                                      								if( *_v8 !=  *_v12) {
                                      									E009DF25C(_t224);
                                      								}
                                      								_pop(_t255);
                                      								 *[fs:eax] = _t255;
                                      								_push(0x9e45cd);
                                      								return E009DFA94( &_v44);
                                      							}
                                      						}
                                      					} else {
                                      						if( *_v12 == _v20) {
                                      							_t119 =  *((intOrPtr*)( *_v24 + 0x2c))(_v16);
                                      							goto L35;
                                      						} else {
                                      							_push( &_v44);
                                      							L009DE2EC();
                                      							_push(_t271);
                                      							_push(0x9e452b);
                                      							_push( *[fs:eax]);
                                      							 *[fs:eax] = _t274;
                                      							_t228 = _v20 & 0x0000ffff;
                                      							E009E0300( &_v44, _v20 & 0x0000ffff, _v12, _t269, _t278);
                                      							if(_v44 != _v20) {
                                      								E009DF25C(_t228);
                                      							}
                                      							 *((intOrPtr*)( *_v24 + 0x2c))(_v16);
                                      							_pop(_t259);
                                      							 *[fs:eax] = _t259;
                                      							_push(0x9e4695);
                                      							return E009DFA94( &_v44);
                                      						}
                                      					}
                                      				} else {
                                      					if(E009E6E74( *_v12,  &_v28) != 0) {
                                      						_push( &_v18);
                                      						if( *((intOrPtr*)( *_v28 + 4))() == 0) {
                                      							_push( &_v44);
                                      							L009DE2EC();
                                      							_push(_t271);
                                      							_push(0x9e448b);
                                      							_push( *[fs:eax]);
                                      							 *[fs:eax] = _t274;
                                      							_t234 =  *_v8 & 0x0000ffff;
                                      							E009E0300( &_v44,  *_v8 & 0x0000ffff, _v12, __edi, __fp0);
                                      							if( *_v8 != _v44) {
                                      								E009DF25C(_t234);
                                      							}
                                      							E009E50AC(_v8, _v16,  &_v44, _t278);
                                      							_pop(_t264);
                                      							 *[fs:eax] = _t264;
                                      							_push(0x9e4695);
                                      							return E009DFA94( &_v44);
                                      						} else {
                                      							if( *_v8 == _v18) {
                                      								_t119 =  *((intOrPtr*)( *_v28 + 0x2c))(_v16);
                                      								goto L35;
                                      							} else {
                                      								_push( &_v44);
                                      								L009DE2EC();
                                      								_push(_t271);
                                      								_push(0x9e4410);
                                      								_push( *[fs:eax]);
                                      								 *[fs:eax] = _t274;
                                      								_t239 = _v18 & 0x0000ffff;
                                      								E009E0300( &_v44, _v18 & 0x0000ffff, _v8, __edi, __fp0);
                                      								E009DFDBC(_v8,  &_v44);
                                      								if( *_v8 != _v18) {
                                      									E009DF25C(_t239);
                                      								}
                                      								_pop(_t268);
                                      								 *[fs:eax] = _t268;
                                      								_push(0x9e4417);
                                      								return E009DFA94( &_v44);
                                      							}
                                      						}
                                      					} else {
                                      						_t119 = E009DF34C(__ecx);
                                      						L35:
                                      						return _t119;
                                      					}
                                      				}
                                      			}
























                                      0x009e4350
                                      0x009e4350
                                      0x009e4351
                                      0x009e4353
                                      0x009e4357
                                      0x009e435a
                                      0x009e435d
                                      0x009e4363
                                      0x009e4370
                                      0x009e44a1
                                      0x009e44a3
                                      0x009e44a3
                                      0x009e44ab
                                      0x009e44af
                                      0x009e44bc
                                      0x009e454c
                                      0x009e4559
                                      0x009e45ef
                                      0x009e45fe
                                      0x009e4602
                                      0x009e460f
                                      0x009e4690
                                      0x00000000
                                      0x009e4611
                                      0x009e461b
                                      0x009e468b
                                      0x00000000
                                      0x009e461d
                                      0x009e4620
                                      0x009e4621
                                      0x009e4628
                                      0x009e4629
                                      0x009e462e
                                      0x009e4631
                                      0x009e4634
                                      0x009e463e
                                      0x009e4649
                                      0x009e4658
                                      0x009e465a
                                      0x009e465a
                                      0x009e4661
                                      0x009e4664
                                      0x009e4667
                                      0x009e4674
                                      0x009e4674
                                      0x009e461b
                                      0x009e45f1
                                      0x009e45f1
                                      0x00000000
                                      0x009e45f1
                                      0x009e455f
                                      0x009e4568
                                      0x009e45d6
                                      0x00000000
                                      0x009e456a
                                      0x009e456d
                                      0x009e456e
                                      0x009e4575
                                      0x009e4576
                                      0x009e457b
                                      0x009e457e
                                      0x009e4584
                                      0x009e458d
                                      0x009e4598
                                      0x009e45a9
                                      0x009e45ab
                                      0x009e45ab
                                      0x009e45b2
                                      0x009e45b5
                                      0x009e45b8
                                      0x009e45c5
                                      0x009e45c5
                                      0x009e4568
                                      0x009e44c2
                                      0x009e44cc
                                      0x009e4541
                                      0x00000000
                                      0x009e44ce
                                      0x009e44d1
                                      0x009e44d2
                                      0x009e44d9
                                      0x009e44da
                                      0x009e44df
                                      0x009e44e2
                                      0x009e44e5
                                      0x009e44ef
                                      0x009e44fc
                                      0x009e44fe
                                      0x009e44fe
                                      0x009e4512
                                      0x009e4517
                                      0x009e451a
                                      0x009e451d
                                      0x009e452a
                                      0x009e452a
                                      0x009e44cc
                                      0x009e4376
                                      0x009e4386
                                      0x009e4395
                                      0x009e43a6
                                      0x009e4431
                                      0x009e4432
                                      0x009e4439
                                      0x009e443a
                                      0x009e443f
                                      0x009e4442
                                      0x009e4448
                                      0x009e4451
                                      0x009e4460
                                      0x009e4462
                                      0x009e4462
                                      0x009e4470
                                      0x009e4477
                                      0x009e447a
                                      0x009e447d
                                      0x009e448a
                                      0x009e43ac
                                      0x009e43b6
                                      0x009e4426
                                      0x00000000
                                      0x009e43b8
                                      0x009e43bb
                                      0x009e43bc
                                      0x009e43c3
                                      0x009e43c4
                                      0x009e43c9
                                      0x009e43cc
                                      0x009e43cf
                                      0x009e43d9
                                      0x009e43e4
                                      0x009e43f3
                                      0x009e43f5
                                      0x009e43f5
                                      0x009e43fc
                                      0x009e43ff
                                      0x009e4402
                                      0x009e440f
                                      0x009e440f
                                      0x009e43b6
                                      0x009e4388
                                      0x009e4388
                                      0x009e4695
                                      0x009e4699
                                      0x009e4699
                                      0x009e4386

                                      APIs
                                      • VariantInit.OLEAUT32(?), ref: 009E43BC
                                      • VariantInit.OLEAUT32(?), ref: 009E44D2
                                        • Part of subcall function 009E6E74: RtlEnterCriticalSection.KERNEL32(00A9F82C,?,?,?,00000000,?,009E5340,00000000,009E53E6,?,?,?,?,?,009DF2DF,00000000), ref: 009E6EAA
                                        • Part of subcall function 009E6E74: RtlLeaveCriticalSection.KERNEL32(00A9F82C,009E6F23,?,00A9F82C,?,?,?,00000000,?,009E5340,00000000,009E53E6), ref: 009E6F16
                                      Memory Dump Source
                                      • Source File: 00000002.00000002.323140727.00000000009D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009D0000, based on PE: true
                                      • Associated: 00000002.00000002.323135167.00000000009D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000002.00000002.323238271.0000000000A9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000002.00000002.323247473.0000000000AA3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_2_2_9d0000_rundll32.jbxd
                                      Similarity
                                      • API ID: CriticalInitSectionVariant$EnterLeave
                                      • String ID:
                                      • API String ID: 2777075435-0
                                      • Opcode ID: 23ae1eb5965da809551165626478e05902e2f2a8fc66f40f50c0d34b24efb062
                                      • Instruction ID: b19043c504f382e5216ff19b7cb88f5e507c298966656453d4ae64a84a55cfe3
                                      • Opcode Fuzzy Hash: 23ae1eb5965da809551165626478e05902e2f2a8fc66f40f50c0d34b24efb062
                                      • Instruction Fuzzy Hash: FFB14939A00249EFCF11EF95C4929EDB7B9EF89714F9084A1F901A7751E730AE81DB60
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      C-Code - Quality: 100%
                                      			E009F8018(int __eax) {
                                      				int _t21;
                                      				signed int _t29;
                                      				char _t34;
                                      				int _t42;
                                      				int _t43;
                                      				struct HDC__* _t44;
                                      				intOrPtr _t45;
                                      
                                      				_t21 = __eax;
                                      				_t42 = __eax;
                                      				_t45 =  *((intOrPtr*)(__eax + 0x28));
                                      				if( *((char*)(__eax + 0x30)) == 0 &&  *(_t45 + 0x10) == 0 &&  *((intOrPtr*)(_t45 + 0x14)) != 0) {
                                      					_t22 =  *((intOrPtr*)(_t45 + 0x14));
                                      					if( *((intOrPtr*)(_t45 + 0x14)) ==  *((intOrPtr*)(_t45 + 8))) {
                                      						E009F6A78(_t22);
                                      					}
                                      					_t21 = E009F5B74( *((intOrPtr*)(_t45 + 0x14)), 1 <<  *(_t45 + 0x3e));
                                      					_t43 = _t21;
                                      					 *(_t45 + 0x10) = _t43;
                                      					if(_t43 == 0) {
                                      						_t44 = E009F5484(GetDC(0));
                                      						if( *((char*)(_t45 + 0x71)) != 0) {
                                      							L9:
                                      							_t34 = 1;
                                      						} else {
                                      							_t29 = GetDeviceCaps(_t44, 0xc);
                                      							if(_t29 * GetDeviceCaps(_t44, 0xe) < ( *(_t45 + 0x2a) & 0x0000ffff) * ( *(_t45 + 0x28) & 0x0000ffff)) {
                                      								goto L9;
                                      							} else {
                                      								_t34 = 0;
                                      							}
                                      						}
                                      						 *((char*)(_t45 + 0x71)) = _t34;
                                      						if(_t34 != 0) {
                                      							 *(_t45 + 0x10) = CreateHalftonePalette(_t44);
                                      						}
                                      						_t21 = ReleaseDC(0, _t44);
                                      						if( *(_t45 + 0x10) == 0) {
                                      							 *((char*)(_t42 + 0x30)) = 1;
                                      							return _t21;
                                      						}
                                      					}
                                      				}
                                      				return _t21;
                                      			}










                                      0x009f8018
                                      0x009f801c
                                      0x009f801e
                                      0x009f8025
                                      0x009f803f
                                      0x009f8045
                                      0x009f8047
                                      0x009f8047
                                      0x009f805e
                                      0x009f8063
                                      0x009f8065
                                      0x009f806a
                                      0x009f8078
                                      0x009f807e
                                      0x009f80a7
                                      0x009f80a7
                                      0x009f8080
                                      0x009f8083
                                      0x009f80a1
                                      0x00000000
                                      0x009f80a3
                                      0x009f80a3
                                      0x009f80a3
                                      0x009f80a1
                                      0x009f80a9
                                      0x009f80ae
                                      0x009f80b6
                                      0x009f80b6
                                      0x009f80bc
                                      0x009f80c5
                                      0x009f80c7
                                      0x00000000
                                      0x009f80c7
                                      0x009f80c5
                                      0x009f806a
                                      0x009f80cf

                                      APIs
                                      • GetDC.USER32(00000000), ref: 009F806E
                                      • GetDeviceCaps.GDI32(00000000,0000000C), ref: 009F8083
                                      • GetDeviceCaps.GDI32(00000000,0000000E), ref: 009F808D
                                      • CreateHalftonePalette.GDI32(00000000,00000000,?,?,?,?,009F6C4F,00000000,009F6CDB), ref: 009F80B1
                                      • ReleaseDC.USER32 ref: 009F80BC
                                      Memory Dump Source
                                      • Source File: 00000002.00000002.323140727.00000000009D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009D0000, based on PE: true
                                      • Associated: 00000002.00000002.323135167.00000000009D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000002.00000002.323238271.0000000000A9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000002.00000002.323247473.0000000000AA3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_2_2_9d0000_rundll32.jbxd
                                      Similarity
                                      • API ID: CapsDevice$CreateHalftonePaletteRelease
                                      • String ID:
                                      • API String ID: 2404249990-0
                                      • Opcode ID: 0fba0536c1c151285a3fdbdbd370115afa4dc770d1e103635745386161a291d9
                                      • Instruction ID: 702e7549d8d46878d60d1d409137f99ddc5d2934a8672f6dcce20e1b719dbf3d
                                      • Opcode Fuzzy Hash: 0fba0536c1c151285a3fdbdbd370115afa4dc770d1e103635745386161a291d9
                                      • Instruction Fuzzy Hash: 1711B6216456ADAEDB60EF64D8457FF3BD4AF92351F484121FE009B281DFB48C98C7A1
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      C-Code - Quality: 70%
                                      			E009F5ADC(void* __eax) {
                                      				char _v5;
                                      				struct HDC__* _v12;
                                      				struct HPALETTE__* _t21;
                                      				struct HPALETTE__* _t25;
                                      				void* _t28;
                                      				intOrPtr _t35;
                                      				void* _t37;
                                      				void* _t39;
                                      				intOrPtr _t40;
                                      
                                      				_t37 = _t39;
                                      				_t40 = _t39 + 0xfffffff8;
                                      				_t28 = __eax;
                                      				_v5 = 0;
                                      				if( *0xa9f894 == 0) {
                                      					return _v5;
                                      				} else {
                                      					_v12 = GetDC(0);
                                      					_push(_t37);
                                      					_push(0x9f5b62);
                                      					_push( *[fs:edx]);
                                      					 *[fs:edx] = _t40;
                                      					if(GetDeviceCaps(_v12, 0x68) >= 0x10) {
                                      						_t21 =  *0xa9f894; // 0x840808f0
                                      						GetPaletteEntries(_t21, 0, 8, _t28 + 4);
                                      						_t25 =  *0xa9f894; // 0x840808f0
                                      						GetPaletteEntries(_t25, 8, 8, _t28 + ( *(_t28 + 2) & 0x0000ffff) * 4 - 0x1c);
                                      						_v5 = 1;
                                      					}
                                      					_pop(_t35);
                                      					 *[fs:eax] = _t35;
                                      					_push(0x9f5b69);
                                      					return ReleaseDC(0, _v12);
                                      				}
                                      			}












                                      0x009f5add
                                      0x009f5adf
                                      0x009f5ae3
                                      0x009f5ae5
                                      0x009f5af0
                                      0x009f5b70
                                      0x009f5af2
                                      0x009f5af9
                                      0x009f5afe
                                      0x009f5aff
                                      0x009f5b04
                                      0x009f5b07
                                      0x009f5b18
                                      0x009f5b22
                                      0x009f5b28
                                      0x009f5b3a
                                      0x009f5b40
                                      0x009f5b45
                                      0x009f5b45
                                      0x009f5b4b
                                      0x009f5b4e
                                      0x009f5b51
                                      0x009f5b61
                                      0x009f5b61

                                      APIs
                                      • GetDC.USER32(00000000), ref: 009F5AF4
                                      • GetDeviceCaps.GDI32(?,00000068), ref: 009F5B10
                                      • GetPaletteEntries.GDI32(840808F0,00000000,00000008,?), ref: 009F5B28
                                      • GetPaletteEntries.GDI32(840808F0,00000008,00000008,?), ref: 009F5B40
                                      • ReleaseDC.USER32 ref: 009F5B5C
                                      Memory Dump Source
                                      • Source File: 00000002.00000002.323140727.00000000009D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009D0000, based on PE: true
                                      • Associated: 00000002.00000002.323135167.00000000009D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000002.00000002.323238271.0000000000A9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000002.00000002.323247473.0000000000AA3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_2_2_9d0000_rundll32.jbxd
                                      Similarity
                                      • API ID: EntriesPalette$CapsDeviceRelease
                                      • String ID:
                                      • API String ID: 3128150645-0
                                      • Opcode ID: b7f7a36efba2308fceecfdf526c35b4daf70940b308e5cc06d5680f887ca8076
                                      • Instruction ID: 4d4f78b4b1a2e63249092d244e5d70757b345ad3006be95732a5f676ac2760b1
                                      • Opcode Fuzzy Hash: b7f7a36efba2308fceecfdf526c35b4daf70940b308e5cc06d5680f887ca8076
                                      • Instruction Fuzzy Hash: 3B11C431688744AEFB40DBE89C42F79BBE8E78A704F54C096F604DA2C1DA769445C720
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      C-Code - Quality: 64%
                                      			E009DBC90(void* __esi, void* __eflags) {
                                      				char _v8;
                                      				intOrPtr* _t18;
                                      				intOrPtr _t26;
                                      				void* _t27;
                                      				long _t29;
                                      				intOrPtr _t32;
                                      				void* _t33;
                                      
                                      				_t33 = __eflags;
                                      				_push(0);
                                      				_push(_t32);
                                      				_push(0x9dbd27);
                                      				_push( *[fs:eax]);
                                      				 *[fs:eax] = _t32;
                                      				E009DBA08(GetThreadLocale(), 0x9dbd3c, 0x100b,  &_v8);
                                      				_t29 = E009D8C68(0x9dbd3c, 1, _t33);
                                      				if(_t29 + 0xfffffffd - 3 < 0) {
                                      					EnumCalendarInfoA(E009DBBDC, GetThreadLocale(), _t29, 4);
                                      					_t27 = 7;
                                      					_t18 = 0xa9f770;
                                      					do {
                                      						 *_t18 = 0xffffffff;
                                      						_t18 = _t18 + 4;
                                      						_t27 = _t27 - 1;
                                      					} while (_t27 != 0);
                                      					EnumCalendarInfoA(E009DBC18, GetThreadLocale(), _t29, 3);
                                      				}
                                      				_pop(_t26);
                                      				 *[fs:eax] = _t26;
                                      				_push(0x9dbd2e);
                                      				return E009D4228( &_v8);
                                      			}










                                      0x009dbc90
                                      0x009dbc93
                                      0x009dbc98
                                      0x009dbc99
                                      0x009dbc9e
                                      0x009dbca1
                                      0x009dbcb7
                                      0x009dbcc9
                                      0x009dbcd3
                                      0x009dbce3
                                      0x009dbce8
                                      0x009dbced
                                      0x009dbcf2
                                      0x009dbcf2
                                      0x009dbcf8
                                      0x009dbcfb
                                      0x009dbcfb
                                      0x009dbd0c
                                      0x009dbd0c
                                      0x009dbd13
                                      0x009dbd16
                                      0x009dbd19
                                      0x009dbd26

                                      APIs
                                      • GetThreadLocale.KERNEL32(?,00000000,009DBD27,?,?,00000000), ref: 009DBCA8
                                        • Part of subcall function 009DBA08: GetLocaleInfoA.KERNEL32(?,?,?,00000100), ref: 009DBA26
                                      • GetThreadLocale.KERNEL32(00000000,00000004,00000000,009DBD27,?,?,00000000), ref: 009DBCD8
                                      • EnumCalendarInfoA.KERNEL32(Function_0000BBDC,00000000,00000000,00000004), ref: 009DBCE3
                                      • GetThreadLocale.KERNEL32(00000000,00000003,00000000,009DBD27,?,?,00000000), ref: 009DBD01
                                      • EnumCalendarInfoA.KERNEL32(Function_0000BC18,00000000,00000000,00000003), ref: 009DBD0C
                                      Memory Dump Source
                                      • Source File: 00000002.00000002.323140727.00000000009D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009D0000, based on PE: true
                                      • Associated: 00000002.00000002.323135167.00000000009D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000002.00000002.323238271.0000000000A9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000002.00000002.323247473.0000000000AA3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_2_2_9d0000_rundll32.jbxd
                                      Similarity
                                      • API ID: Locale$InfoThread$CalendarEnum
                                      • String ID:
                                      • API String ID: 4102113445-0
                                      • Opcode ID: 0cbcc1f5b2723c77bcb0d0f46a4ab8ae7ad1cdb6675507a01eee3e3f6620d820
                                      • Instruction ID: d1c678fdff167ea063c64a0dad1cbb0c0a9ce7ac76b323cfb814dcb1e5f28206
                                      • Opcode Fuzzy Hash: 0cbcc1f5b2723c77bcb0d0f46a4ab8ae7ad1cdb6675507a01eee3e3f6620d820
                                      • Instruction Fuzzy Hash: B301F2713D0208AFE711A7B4CC03B6E729DDBC5B14F92C162F540AA7D1DB349E008264
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      C-Code - Quality: 83%
                                      			E009DBD40(void* __eax, void* __ebx, void* __edx, void* __edi, void* __esi, void* __eflags) {
                                      				intOrPtr _v8;
                                      				char _v12;
                                      				intOrPtr _v16;
                                      				char _v20;
                                      				char _v24;
                                      				void* _t41;
                                      				signed int _t45;
                                      				signed int _t47;
                                      				signed int _t49;
                                      				signed int _t51;
                                      				intOrPtr _t75;
                                      				void* _t76;
                                      				signed int _t77;
                                      				signed int _t83;
                                      				signed int _t92;
                                      				intOrPtr _t111;
                                      				void* _t122;
                                      				void* _t124;
                                      				intOrPtr _t127;
                                      				void* _t128;
                                      
                                      				_t128 = __eflags;
                                      				_push(0);
                                      				_push(0);
                                      				_push(0);
                                      				_push(0);
                                      				_push(0);
                                      				_t122 = __edx;
                                      				_t124 = __eax;
                                      				_push(_t127);
                                      				_push(0x9dbf0a);
                                      				_push( *[fs:eax]);
                                      				 *[fs:eax] = _t127;
                                      				_t92 = 1;
                                      				E009D4228(__edx);
                                      				E009DBA08(GetThreadLocale(), 0x9dbf20, 0x1009,  &_v12);
                                      				if(E009D8C68(0x9dbf20, 1, _t128) + 0xfffffffd - 3 < 0) {
                                      					while(1) {
                                      						_t41 = E009D44E8(_t124);
                                      						__eflags = _t92 - _t41;
                                      						if(_t92 > _t41) {
                                      							break;
                                      						}
                                      						__eflags =  *(_t124 + _t92 - 1) & 0x000000ff;
                                      						asm("bt [0xa9c11c], eax");
                                      						if(( *(_t124 + _t92 - 1) & 0x000000ff) >= 0) {
                                      							_t45 = E009D92C8(_t124 + _t92 - 1, 2, 0x9dbf24);
                                      							__eflags = _t45;
                                      							if(_t45 != 0) {
                                      								_t47 = E009D92C8(_t124 + _t92 - 1, 4, 0x9dbf34);
                                      								__eflags = _t47;
                                      								if(_t47 != 0) {
                                      									_t49 = E009D92C8(_t124 + _t92 - 1, 2, 0x9dbf4c);
                                      									__eflags = _t49;
                                      									if(_t49 != 0) {
                                      										_t51 =  *(_t124 + _t92 - 1) - 0x59;
                                      										__eflags = _t51;
                                      										if(_t51 == 0) {
                                      											L24:
                                      											E009D44F0(_t122, 0x9dbf64);
                                      											L26:
                                      											_t92 = _t92 + 1;
                                      											__eflags = _t92;
                                      											continue;
                                      										}
                                      										__eflags = _t51 != 0x20;
                                      										if(_t51 != 0x20) {
                                      											E009D4410();
                                      											E009D44F0(_t122, _v24);
                                      											goto L26;
                                      										}
                                      										goto L24;
                                      									}
                                      									E009D44F0(_t122, 0x9dbf58);
                                      									_t92 = _t92 + 1;
                                      									goto L26;
                                      								}
                                      								E009D44F0(_t122, 0x9dbf44);
                                      								_t92 = _t92 + 3;
                                      								goto L26;
                                      							}
                                      							E009D44F0(_t122, 0x9dbf30);
                                      							_t92 = _t92 + 1;
                                      							goto L26;
                                      						}
                                      						_v8 = E009DCDF8(_t124, _t92);
                                      						E009D4748(_t124, _v8, _t92,  &_v20);
                                      						E009D44F0(_t122, _v20);
                                      						_t92 = _t92 + _v8;
                                      					}
                                      					L28:
                                      					_pop(_t111);
                                      					 *[fs:eax] = _t111;
                                      					_push(0x9dbf11);
                                      					return E009D424C( &_v24, 4);
                                      				}
                                      				_t75 =  *0xa9f748; // 0x9
                                      				_t76 = _t75 - 4;
                                      				if(_t76 == 0 || _t76 + 0xfffffff3 - 2 < 0) {
                                      					_t77 = 1;
                                      				} else {
                                      					_t77 = 0;
                                      				}
                                      				if(_t77 == 0) {
                                      					E009D427C(_t122, _t124);
                                      				} else {
                                      					while(_t92 <= E009D44E8(_t124)) {
                                      						_t83 =  *(_t124 + _t92 - 1) - 0x47;
                                      						__eflags = _t83;
                                      						if(_t83 != 0) {
                                      							__eflags = _t83 != 0x20;
                                      							if(_t83 != 0x20) {
                                      								E009D4410();
                                      								E009D44F0(_t122, _v16);
                                      							}
                                      						}
                                      						_t92 = _t92 + 1;
                                      						__eflags = _t92;
                                      					}
                                      				}
                                      			}























                                      0x009dbd40
                                      0x009dbd45
                                      0x009dbd46
                                      0x009dbd47
                                      0x009dbd48
                                      0x009dbd49
                                      0x009dbd4d
                                      0x009dbd4f
                                      0x009dbd53
                                      0x009dbd54
                                      0x009dbd59
                                      0x009dbd5c
                                      0x009dbd5f
                                      0x009dbd66
                                      0x009dbd7e
                                      0x009dbd96
                                      0x009dbee0
                                      0x009dbee2
                                      0x009dbee7
                                      0x009dbee9
                                      0x00000000
                                      0x00000000
                                      0x009dbdff
                                      0x009dbe04
                                      0x009dbe0b
                                      0x009dbe49
                                      0x009dbe4e
                                      0x009dbe50
                                      0x009dbe6f
                                      0x009dbe74
                                      0x009dbe76
                                      0x009dbe97
                                      0x009dbe9c
                                      0x009dbe9e
                                      0x009dbeb3
                                      0x009dbeb3
                                      0x009dbeb5
                                      0x009dbebb
                                      0x009dbec2
                                      0x009dbedf
                                      0x009dbedf
                                      0x009dbedf
                                      0x00000000
                                      0x009dbedf
                                      0x009dbeb7
                                      0x009dbeb9
                                      0x009dbed0
                                      0x009dbeda
                                      0x00000000
                                      0x009dbeda
                                      0x00000000
                                      0x009dbeb9
                                      0x009dbea7
                                      0x009dbeac
                                      0x00000000
                                      0x009dbeac
                                      0x009dbe7f
                                      0x009dbe84
                                      0x00000000
                                      0x009dbe84
                                      0x009dbe59
                                      0x009dbe5e
                                      0x00000000
                                      0x009dbe5e
                                      0x009dbe16
                                      0x009dbe24
                                      0x009dbe2e
                                      0x009dbe33
                                      0x009dbe33
                                      0x009dbeef
                                      0x009dbef1
                                      0x009dbef4
                                      0x009dbef7
                                      0x009dbf09
                                      0x009dbf09
                                      0x009dbd9c
                                      0x009dbda1
                                      0x009dbda4
                                      0x009dbdb2
                                      0x009dbdae
                                      0x009dbdae
                                      0x009dbdae
                                      0x009dbdb6
                                      0x009dbdf1
                                      0x009dbdb8
                                      0x009dbddd
                                      0x009dbdbe
                                      0x009dbdbe
                                      0x009dbdc0
                                      0x009dbdc2
                                      0x009dbdc4
                                      0x009dbdcd
                                      0x009dbdd7
                                      0x009dbdd7
                                      0x009dbdc4
                                      0x009dbddc
                                      0x009dbddc
                                      0x009dbddc
                                      0x009dbde8

                                      APIs
                                      • GetThreadLocale.KERNEL32(?,00000000,009DBF0A,?,?,?,?,00000000,00000000,00000000,00000000,00000000), ref: 009DBD6F
                                        • Part of subcall function 009DBA08: GetLocaleInfoA.KERNEL32(?,?,?,00000100), ref: 009DBA26
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000002.00000002.323140727.00000000009D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009D0000, based on PE: true
                                      • Associated: 00000002.00000002.323135167.00000000009D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000002.00000002.323238271.0000000000A9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000002.00000002.323247473.0000000000AA3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_2_2_9d0000_rundll32.jbxd
                                      Similarity
                                      • API ID: Locale$InfoThread
                                      • String ID: eeee$ggg$yyyy
                                      • API String ID: 4232894706-1253427255
                                      • Opcode ID: 5b5aa05721c767764081b5e2e9d89242d95b6ddfb3adf6bcba2b2489e392d3fb
                                      • Instruction ID: d53328bcc187577951425b36aac633065fc31975b40763547f72f6b0007f4a9a
                                      • Opcode Fuzzy Hash: 5b5aa05721c767764081b5e2e9d89242d95b6ddfb3adf6bcba2b2489e392d3fb
                                      • Instruction Fuzzy Hash: 1D41C065784205CBC721FBB8D8923FEB3EADBC4304B66C527E591C7356DB349D028AA1
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      C-Code - Quality: 88%
                                      			E009FE6F0(void* __eax, void* __ebx, intOrPtr __edx, void* __edi, void* __esi) {
                                      				char _v8;
                                      				char _v12;
                                      				intOrPtr _v16;
                                      				char _v20;
                                      				char _v24;
                                      				char _v28;
                                      				void* _t46;
                                      				int _t56;
                                      				void* _t68;
                                      				void* _t71;
                                      				void* _t85;
                                      				intOrPtr _t89;
                                      				intOrPtr _t91;
                                      				intOrPtr _t92;
                                      				intOrPtr _t93;
                                      				intOrPtr _t94;
                                      				intOrPtr _t97;
                                      				intOrPtr _t102;
                                      				void* _t108;
                                      				intOrPtr _t110;
                                      				void* _t113;
                                      
                                      				_v28 = 0;
                                      				_t110 = __edx;
                                      				_t85 = __eax;
                                      				_push(_t113);
                                      				_push(0x9fe8ce);
                                      				_push( *[fs:eax]);
                                      				 *[fs:eax] = _t113 + 0xffffffe8;
                                      				if(__edx == 0) {
                                      					L8:
                                      					if( *((intOrPtr*)(_t85 + 0x20c)) == 0) {
                                      						L12:
                                      						if(_t110 != 0 &&  *((intOrPtr*)(_t110 + 0x30)) ==  *((intOrPtr*)(_t85 + 0x30))) {
                                      							_t92 =  *0x9fdb18; // 0x9fdb64
                                      							if(E009D3514(_t110, _t92) == 0) {
                                      								_t93 =  *0xa9c0a0; // 0x0
                                      								if(E009D3514(_t110, _t93) == 0) {
                                      									_t94 =  *0xa9c0a0; // 0x0
                                      									if(E009D3514(_t110, _t94) == 0 && E009FE6C0(E009D32C8(_t110), "TDBEdit") == 0 && E009FE6C0(E009D32C8(_t110), "TDBMemo") == 0) {
                                      										_t46 = E00A21298(_t85);
                                      										_t132 = _t46;
                                      										if(_t46 != 0) {
                                      											E009FE8FC(_t85, _t110, _t132);
                                      											_t56 = E00A20FC0(_t110);
                                      											SendMessageA(E00A20FC0(_t85), 0x469, _t56, 0);
                                      										}
                                      										 *((intOrPtr*)(_t85 + 0x20c)) = _t110;
                                      										_t97 =  *0xa9c0a0; // 0x0
                                      										if(E009D3514(_t110, _t97) != 0) {
                                      											E009D8AF0( &_v28);
                                      											E00A1A894(_t110, _t85, _v28, _t110);
                                      										}
                                      									}
                                      								}
                                      							}
                                      						}
                                      						_pop(_t91);
                                      						 *[fs:eax] = _t91;
                                      						_push(0x9fe8d5);
                                      						return E009D4228( &_v28);
                                      					}
                                      					if(E00A21298(_t85) != 0) {
                                      						SendMessageA(E00A20FC0(_t85), 0x469, 0, 0);
                                      					}
                                      					 *((intOrPtr*)(_t85 + 0x20c)) = 0;
                                      					goto L12;
                                      				}
                                      				_t68 = E00A1DCF0( *((intOrPtr*)(__eax + 0x30))) - 1;
                                      				if(_t68 >= 0) {
                                      					_v8 = _t68 + 1;
                                      					_t108 = 0;
                                      					do {
                                      						_t71 = E00A1DCB4( *((intOrPtr*)(_t85 + 0x30)), _t108);
                                      						_t102 =  *0x9fdb18; // 0x9fdb64
                                      						if(E009D3514(_t71, _t102) != 0 && _t85 != E00A1DCB4( *((intOrPtr*)(_t85 + 0x30)), _t108) && _t110 ==  *((intOrPtr*)(E00A1DCB4( *((intOrPtr*)(_t85 + 0x30)), _t108) + 0x20c))) {
                                      							_v24 =  *((intOrPtr*)(_t110 + 8));
                                      							_v20 = 0xb;
                                      							_v16 =  *((intOrPtr*)(E00A1DCB4( *((intOrPtr*)(_t85 + 0x30)), _t108) + 8));
                                      							_v12 = 0xb;
                                      							_t89 =  *0xa9e5d4; // 0x9fd484
                                      							E009DC2BC(_t85, _t89, 1, _t108, _t110, 1,  &_v24);
                                      							E009D3BC0();
                                      						}
                                      						_t108 = _t108 + 1;
                                      						_t16 =  &_v8;
                                      						 *_t16 = _v8 - 1;
                                      					} while ( *_t16 != 0);
                                      				}
                                      			}
























                                      0x009fe6fb
                                      0x009fe6fe
                                      0x009fe700
                                      0x009fe704
                                      0x009fe705
                                      0x009fe70a
                                      0x009fe70d
                                      0x009fe712
                                      0x009fe7a9
                                      0x009fe7b0
                                      0x009fe7db
                                      0x009fe7dd
                                      0x009fe7f1
                                      0x009fe7fe
                                      0x009fe806
                                      0x009fe813
                                      0x009fe81b
                                      0x009fe828
                                      0x009fe85a
                                      0x009fe85f
                                      0x009fe861
                                      0x009fe867
                                      0x009fe870
                                      0x009fe883
                                      0x009fe883
                                      0x009fe888
                                      0x009fe890
                                      0x009fe89d
                                      0x009fe8a9
                                      0x009fe8b3
                                      0x009fe8b3
                                      0x009fe89d
                                      0x009fe828
                                      0x009fe813
                                      0x009fe7fe
                                      0x009fe8ba
                                      0x009fe8bd
                                      0x009fe8c0
                                      0x009fe8cd
                                      0x009fe8cd
                                      0x009fe7bb
                                      0x009fe7ce
                                      0x009fe7ce
                                      0x009fe7d5
                                      0x00000000
                                      0x009fe7d5
                                      0x009fe720
                                      0x009fe723
                                      0x009fe72a
                                      0x009fe72d
                                      0x009fe72f
                                      0x009fe734
                                      0x009fe739
                                      0x009fe746
                                      0x009fe76b
                                      0x009fe76e
                                      0x009fe77f
                                      0x009fe782
                                      0x009fe78c
                                      0x009fe799
                                      0x009fe79e
                                      0x009fe79e
                                      0x009fe7a3
                                      0x009fe7a4
                                      0x009fe7a4
                                      0x009fe7a4
                                      0x009fe72f

                                      APIs
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000002.00000002.323140727.00000000009D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009D0000, based on PE: true
                                      • Associated: 00000002.00000002.323135167.00000000009D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000002.00000002.323238271.0000000000A9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000002.00000002.323247473.0000000000AA3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_2_2_9d0000_rundll32.jbxd
                                      Similarity
                                      • API ID: MessageSend
                                      • String ID: TDBEdit$TDBMemo
                                      • API String ID: 3850602802-2833401046
                                      • Opcode ID: 77520429467dc0580cbd62f646cd4889df75a3dca5a5b0dd90dc0d706ed9ecda
                                      • Instruction ID: 1b186e4f3f0050607ade067f43446e87aed9a3fc6430ed2e8cb4312d1b394cba
                                      • Opcode Fuzzy Hash: 77520429467dc0580cbd62f646cd4889df75a3dca5a5b0dd90dc0d706ed9ecda
                                      • Instruction Fuzzy Hash: 1E415E70B142189BDB10FF68D982B7E73A9AF81B50F508472F900EB367DA70DD428791
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      C-Code - Quality: 100%
                                      			E009DD820() {
                                      				_Unknown_base(*)()* _t1;
                                      				struct HINSTANCE__* _t3;
                                      
                                      				_t1 = GetModuleHandleA("kernel32.dll");
                                      				_t3 = _t1;
                                      				if(_t3 != 0) {
                                      					_t1 = GetProcAddress(_t3, "GetDiskFreeSpaceExA");
                                      					 *0xa9c140 = _t1;
                                      				}
                                      				if( *0xa9c140 == 0) {
                                      					 *0xa9c140 = E009D9114;
                                      					return E009D9114;
                                      				}
                                      				return _t1;
                                      			}





                                      0x009dd826
                                      0x009dd82b
                                      0x009dd82f
                                      0x009dd837
                                      0x009dd83c
                                      0x009dd83c
                                      0x009dd848
                                      0x009dd84f
                                      0x00000000
                                      0x009dd84f
                                      0x009dd855

                                      APIs
                                      • GetModuleHandleA.KERNEL32(kernel32.dll,?,009DE289,00000000,009DE29C), ref: 009DD826
                                      • GetProcAddress.KERNEL32(00000000,GetDiskFreeSpaceExA), ref: 009DD837
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000002.00000002.323140727.00000000009D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009D0000, based on PE: true
                                      • Associated: 00000002.00000002.323135167.00000000009D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000002.00000002.323238271.0000000000A9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000002.00000002.323247473.0000000000AA3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_2_2_9d0000_rundll32.jbxd
                                      Similarity
                                      • API ID: AddressHandleModuleProc
                                      • String ID: GetDiskFreeSpaceExA$kernel32.dll
                                      • API String ID: 1646373207-3712701948
                                      • Opcode ID: ce76d12f041ecd98be29259587e8e7c7f408f274b8be0831d9d28c362efed6db
                                      • Instruction ID: 4fe8bc9994e24eb241a9dc1bae3468c048d4869517267cf618d7f2250fc76ea3
                                      • Opcode Fuzzy Hash: ce76d12f041ecd98be29259587e8e7c7f408f274b8be0831d9d28c362efed6db
                                      • Instruction Fuzzy Hash: 1CD0C7707C17855BDF21EBEDACC572121BDE790725B60823BE005573A3DBB44805E614
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      C-Code - Quality: 82%
                                      			E009DF89C(intOrPtr* __eax) {
                                      				char _v260;
                                      				char _v768;
                                      				char _v772;
                                      				intOrPtr* _v776;
                                      				signed short* _v780;
                                      				char _v784;
                                      				signed int _v788;
                                      				char _v792;
                                      				intOrPtr* _v796;
                                      				signed char _t43;
                                      				intOrPtr* _t60;
                                      				void* _t79;
                                      				void* _t81;
                                      				void* _t84;
                                      				void* _t85;
                                      				intOrPtr* _t92;
                                      				void* _t96;
                                      				char* _t97;
                                      				void* _t98;
                                      
                                      				_v776 = __eax;
                                      				if(( *(_v776 + 1) & 0x00000020) == 0) {
                                      					E009DF6E4(0x80070057);
                                      				}
                                      				_t43 =  *_v776;
                                      				if((_t43 & 0x00000fff) == 0xc) {
                                      					if((_t43 & 0x00000040) == 0) {
                                      						_v780 =  *((intOrPtr*)(_v776 + 8));
                                      					} else {
                                      						_v780 =  *((intOrPtr*)( *((intOrPtr*)(_v776 + 8))));
                                      					}
                                      					_v788 =  *_v780 & 0x0000ffff;
                                      					_t79 = _v788 - 1;
                                      					if(_t79 >= 0) {
                                      						_t85 = _t79 + 1;
                                      						_t96 = 0;
                                      						_t97 =  &_v772;
                                      						do {
                                      							_v796 = _t97;
                                      							_push(_v796 + 4);
                                      							_t22 = _t96 + 1; // 0x1
                                      							_push(_v780);
                                      							L009DE760();
                                      							E009DF6E4(_v780);
                                      							_push( &_v784);
                                      							_t25 = _t96 + 1; // 0x1
                                      							_push(_v780);
                                      							L009DE768();
                                      							E009DF6E4(_v780);
                                      							 *_v796 = _v784 -  *((intOrPtr*)(_v796 + 4)) + 1;
                                      							_t96 = _t96 + 1;
                                      							_t97 = _t97 + 8;
                                      							_t85 = _t85 - 1;
                                      						} while (_t85 != 0);
                                      					}
                                      					_t81 = _v788 - 1;
                                      					if(_t81 >= 0) {
                                      						_t84 = _t81 + 1;
                                      						_t60 =  &_v768;
                                      						_t92 =  &_v260;
                                      						do {
                                      							 *_t92 =  *_t60;
                                      							_t92 = _t92 + 4;
                                      							_t60 = _t60 + 8;
                                      							_t84 = _t84 - 1;
                                      						} while (_t84 != 0);
                                      						do {
                                      							goto L12;
                                      						} while (E009DF840(_t83, _t98) != 0);
                                      						goto L15;
                                      					}
                                      					L12:
                                      					_t83 = _v788 - 1;
                                      					if(E009DF810(_v788 - 1, _t98) != 0) {
                                      						_push( &_v792);
                                      						_push( &_v260);
                                      						_push(_v780);
                                      						L009DE790();
                                      						E009DF6E4(_v780);
                                      						E009DFA94(_v792);
                                      					}
                                      				}
                                      				L15:
                                      				_push(_v776);
                                      				L009DE2F4();
                                      				return E009DF6E4(_v776);
                                      			}






















                                      0x009df8a8
                                      0x009df8b8
                                      0x009df8bf
                                      0x009df8bf
                                      0x009df8ca
                                      0x009df8d8
                                      0x009df8e7
                                      0x009df905
                                      0x009df8e9
                                      0x009df8f4
                                      0x009df8f4
                                      0x009df914
                                      0x009df920
                                      0x009df923
                                      0x009df925
                                      0x009df926
                                      0x009df928
                                      0x009df92e
                                      0x009df930
                                      0x009df93f
                                      0x009df940
                                      0x009df94a
                                      0x009df94b
                                      0x009df950
                                      0x009df95b
                                      0x009df95c
                                      0x009df966
                                      0x009df967
                                      0x009df96c
                                      0x009df987
                                      0x009df989
                                      0x009df98a
                                      0x009df98d
                                      0x009df98d
                                      0x009df92e
                                      0x009df996
                                      0x009df999
                                      0x009df99b
                                      0x009df99c
                                      0x009df9a2
                                      0x009df9a8
                                      0x009df9aa
                                      0x009df9ac
                                      0x009df9af
                                      0x009df9b2
                                      0x009df9b2
                                      0x009df9b5
                                      0x00000000
                                      0x00000000
                                      0x00000000
                                      0x009df9b5
                                      0x009df9b5
                                      0x009df9bc
                                      0x009df9c7
                                      0x009df9cf
                                      0x009df9d6
                                      0x009df9dd
                                      0x009df9de
                                      0x009df9e3
                                      0x009df9ee
                                      0x009df9ee
                                      0x009df9fc
                                      0x009dfa00
                                      0x009dfa06
                                      0x009dfa07
                                      0x009dfa17

                                      APIs
                                      • SafeArrayGetLBound.OLEAUT32(?,00000001,?), ref: 009DF94B
                                      • SafeArrayGetUBound.OLEAUT32(?,00000001,?), ref: 009DF967
                                      • SafeArrayPtrOfIndex.OLEAUT32(?,?,?), ref: 009DF9DE
                                      • VariantClear.OLEAUT32(?), ref: 009DFA07
                                      Memory Dump Source
                                      • Source File: 00000002.00000002.323140727.00000000009D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009D0000, based on PE: true
                                      • Associated: 00000002.00000002.323135167.00000000009D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000002.00000002.323238271.0000000000A9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000002.00000002.323247473.0000000000AA3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_2_2_9d0000_rundll32.jbxd
                                      Similarity
                                      • API ID: ArraySafe$Bound$ClearIndexVariant
                                      • String ID:
                                      • API String ID: 920484758-0
                                      • Opcode ID: 606e87adaf89f2c46ebcbd9362d1b5640fbca68e444a53fe52eb81bedf211c8f
                                      • Instruction ID: 7e43f1418ec12dc06c169db2f90c80ffcde79b8c199d8a26542bd70b99d8fe8a
                                      • Opcode Fuzzy Hash: 606e87adaf89f2c46ebcbd9362d1b5640fbca68e444a53fe52eb81bedf211c8f
                                      • Instruction Fuzzy Hash: B741FB79A4061D9FCB61DF58C8A1BC9B3BCAF59310F0081E6E54AE7312DA34AF808F54
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      C-Code - Quality: 100%
                                      			E009DBF74(intOrPtr* __eax, intOrPtr __ecx, void* __edx, void* __fp0, intOrPtr _a4) {
                                      				intOrPtr _v8;
                                      				intOrPtr _v12;
                                      				char _v273;
                                      				char _v534;
                                      				char _v790;
                                      				struct _MEMORY_BASIC_INFORMATION _v820;
                                      				char _v824;
                                      				intOrPtr _v828;
                                      				char _v832;
                                      				intOrPtr _v836;
                                      				char _v840;
                                      				intOrPtr _v844;
                                      				char _v848;
                                      				char* _v852;
                                      				char _v856;
                                      				char _v860;
                                      				char _v1116;
                                      				void* __edi;
                                      				struct HINSTANCE__* _t40;
                                      				intOrPtr _t51;
                                      				struct HINSTANCE__* _t53;
                                      				void* _t69;
                                      				void* _t73;
                                      				intOrPtr _t74;
                                      				intOrPtr _t83;
                                      				intOrPtr _t86;
                                      				intOrPtr* _t87;
                                      				void* _t93;
                                      
                                      				_t93 = __fp0;
                                      				_v8 = __ecx;
                                      				_t73 = __edx;
                                      				_t87 = __eax;
                                      				VirtualQuery(__edx,  &_v820, 0x1c);
                                      				if(_v820.State != 0x1000 || GetModuleFileNameA(_v820.AllocationBase,  &_v534, 0x105) == 0) {
                                      					_t40 =  *0xa9f668; // 0x9d0000
                                      					GetModuleFileNameA(_t40,  &_v534, 0x105);
                                      					_v12 = E009DBF68(_t73);
                                      				} else {
                                      					_v12 = _t73 - _v820.AllocationBase;
                                      				}
                                      				E009D91EC( &_v273, 0x104, E009DCFBC(0x5c) + 1);
                                      				_t74 = 0x9dc0f4;
                                      				_t86 = 0x9dc0f4;
                                      				_t83 =  *0x9d7b08; // 0x9d7b54
                                      				if(E009D3514(_t87, _t83) != 0) {
                                      					_t74 = E009D46E8( *((intOrPtr*)(_t87 + 4)));
                                      					_t69 = E009D9188(_t74, 0x9dc0f4);
                                      					if(_t69 != 0 &&  *((char*)(_t74 + _t69 - 1)) != 0x2e) {
                                      						_t86 = 0x9dc0f8;
                                      					}
                                      				}
                                      				_t51 =  *0xa9e5f4; // 0x9d7898
                                      				_t16 = _t51 + 4; // 0xffec
                                      				_t53 =  *0xa9f668; // 0x9d0000
                                      				LoadStringA(E009D5A00(_t53),  *_t16,  &_v790, 0x100);
                                      				E009D32D0( *_t87,  &_v1116);
                                      				_v860 =  &_v1116;
                                      				_v856 = 4;
                                      				_v852 =  &_v273;
                                      				_v848 = 6;
                                      				_v844 = _v12;
                                      				_v840 = 5;
                                      				_v836 = _t74;
                                      				_v832 = 6;
                                      				_v828 = _t86;
                                      				_v824 = 6;
                                      				E009D9810(_v8,  &_v790, _a4, _t93, 4,  &_v860);
                                      				return E009D9188(_v8, _t86);
                                      			}































                                      0x009dbf74
                                      0x009dbf80
                                      0x009dbf83
                                      0x009dbf85
                                      0x009dbf91
                                      0x009dbfa0
                                      0x009dbfca
                                      0x009dbfd0
                                      0x009dbfdc
                                      0x009dbfe1
                                      0x009dbfe7
                                      0x009dbfe7
                                      0x009dc005
                                      0x009dc00a
                                      0x009dc00f
                                      0x009dc016
                                      0x009dc023
                                      0x009dc02d
                                      0x009dc031
                                      0x009dc038
                                      0x009dc041
                                      0x009dc041
                                      0x009dc038
                                      0x009dc052
                                      0x009dc057
                                      0x009dc05b
                                      0x009dc066
                                      0x009dc073
                                      0x009dc07e
                                      0x009dc084
                                      0x009dc091
                                      0x009dc097
                                      0x009dc0a1
                                      0x009dc0a7
                                      0x009dc0ae
                                      0x009dc0b4
                                      0x009dc0bb
                                      0x009dc0c1
                                      0x009dc0dd
                                      0x009dc0f0

                                      APIs
                                      • VirtualQuery.KERNEL32(?,?,0000001C), ref: 009DBF91
                                      • GetModuleFileNameA.KERNEL32(?,?,00000105), ref: 009DBFB5
                                      • GetModuleFileNameA.KERNEL32(009D0000,?,00000105), ref: 009DBFD0
                                      • LoadStringA.USER32 ref: 009DC066
                                      Memory Dump Source
                                      • Source File: 00000002.00000002.323140727.00000000009D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009D0000, based on PE: true
                                      • Associated: 00000002.00000002.323135167.00000000009D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000002.00000002.323238271.0000000000A9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000002.00000002.323247473.0000000000AA3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_2_2_9d0000_rundll32.jbxd
                                      Similarity
                                      • API ID: FileModuleName$LoadQueryStringVirtual
                                      • String ID:
                                      • API String ID: 3990497365-0
                                      • Opcode ID: a32b46292dd4532cd06f1a91c0b9152ff273e0ed0f7818c5f4a84fa7953c0270
                                      • Instruction ID: 949929ea74234e5487955f31b1d87a233510ff9598aad1520ed447faad6b5d06
                                      • Opcode Fuzzy Hash: a32b46292dd4532cd06f1a91c0b9152ff273e0ed0f7818c5f4a84fa7953c0270
                                      • Instruction Fuzzy Hash: 5B413B70A842589BCB21EBA8CD85BDAB7FDAB48300F4080E7A548E7352D7759F84CF50
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      C-Code - Quality: 100%
                                      			E009DD110() {
                                      				char _v152;
                                      				short _v410;
                                      				signed short _t14;
                                      				signed int _t16;
                                      				int _t18;
                                      				void* _t20;
                                      				void* _t23;
                                      				int _t24;
                                      				int _t26;
                                      				signed int _t30;
                                      				signed int _t31;
                                      				signed int _t32;
                                      				signed int _t37;
                                      				int* _t39;
                                      				short* _t41;
                                      				void* _t49;
                                      
                                      				 *0xa9f744 = 0x409;
                                      				 *0xa9f748 = 9;
                                      				 *0xa9f74c = 1;
                                      				_t14 = GetThreadLocale();
                                      				if(_t14 != 0) {
                                      					 *0xa9f744 = _t14;
                                      				}
                                      				if(_t14 != 0) {
                                      					 *0xa9f748 = _t14 & 0x3ff;
                                      					 *0xa9f74c = (_t14 & 0x0000ffff) >> 0xa;
                                      				}
                                      				memcpy(0xa9c11c, 0x9dd264, 8 << 2);
                                      				if( *0xa9c0d4 != 2) {
                                      					_t16 = GetSystemMetrics(0x4a);
                                      					__eflags = _t16;
                                      					 *0xa9f751 = _t16 & 0xffffff00 | _t16 != 0x00000000;
                                      					_t18 = GetSystemMetrics(0x2a);
                                      					__eflags = _t18;
                                      					_t31 = _t30 & 0xffffff00 | _t18 != 0x00000000;
                                      					 *0xa9f750 = _t31;
                                      					__eflags = _t31;
                                      					if(__eflags != 0) {
                                      						return E009DD098(__eflags, _t49);
                                      					}
                                      				} else {
                                      					_t20 = E009DD0F8();
                                      					if(_t20 != 0) {
                                      						 *0xa9f751 = 0;
                                      						 *0xa9f750 = 0;
                                      						return _t20;
                                      					}
                                      					E009DD098(__eflags, _t49);
                                      					_t37 = 0x20;
                                      					_t23 = E009D2EB8(0xa9c11c, 0x20, 0x9dd264);
                                      					_t32 = _t30 & 0xffffff00 | __eflags != 0x00000000;
                                      					 *0xa9f750 = _t32;
                                      					__eflags = _t32;
                                      					if(_t32 != 0) {
                                      						 *0xa9f751 = 0;
                                      						return _t23;
                                      					}
                                      					_t24 = 0x80;
                                      					_t39 =  &_v152;
                                      					do {
                                      						 *_t39 = _t24;
                                      						_t24 = _t24 + 1;
                                      						_t39 =  &(_t39[0]);
                                      						__eflags = _t24 - 0x100;
                                      					} while (_t24 != 0x100);
                                      					_t26 =  *0xa9f744; // 0x409
                                      					GetStringTypeA(_t26, 2,  &_v152, 0x80,  &_v410);
                                      					_t18 = 0x80;
                                      					_t41 =  &_v410;
                                      					while(1) {
                                      						__eflags =  *_t41 - 2;
                                      						_t37 = _t37 & 0xffffff00 |  *_t41 == 0x00000002;
                                      						 *0xa9f751 = _t37;
                                      						__eflags = _t37;
                                      						if(_t37 != 0) {
                                      							goto L17;
                                      						}
                                      						_t41 = _t41 + 2;
                                      						_t18 = _t18 - 1;
                                      						__eflags = _t18;
                                      						if(_t18 != 0) {
                                      							continue;
                                      						} else {
                                      							return _t18;
                                      						}
                                      						L18:
                                      					}
                                      				}
                                      				L17:
                                      				return _t18;
                                      				goto L18;
                                      			}



















                                      0x009dd11c
                                      0x009dd126
                                      0x009dd130
                                      0x009dd13a
                                      0x009dd141
                                      0x009dd143
                                      0x009dd143
                                      0x009dd14b
                                      0x009dd157
                                      0x009dd163
                                      0x009dd163
                                      0x009dd177
                                      0x009dd180
                                      0x009dd22f
                                      0x009dd234
                                      0x009dd239
                                      0x009dd240
                                      0x009dd245
                                      0x009dd247
                                      0x009dd24a
                                      0x009dd250
                                      0x009dd252
                                      0x00000000
                                      0x009dd25a
                                      0x009dd186
                                      0x009dd186
                                      0x009dd18d
                                      0x009dd18f
                                      0x009dd196
                                      0x00000000
                                      0x009dd196
                                      0x009dd1a3
                                      0x009dd1b3
                                      0x009dd1b5
                                      0x009dd1ba
                                      0x009dd1bd
                                      0x009dd1c3
                                      0x009dd1c5
                                      0x009dd1c7
                                      0x00000000
                                      0x009dd1c7
                                      0x009dd1d3
                                      0x009dd1d8
                                      0x009dd1de
                                      0x009dd1de
                                      0x009dd1e0
                                      0x009dd1e1
                                      0x009dd1e2
                                      0x009dd1e2
                                      0x009dd1fe
                                      0x009dd204
                                      0x009dd209
                                      0x009dd20e
                                      0x009dd214
                                      0x009dd214
                                      0x009dd218
                                      0x009dd21b
                                      0x009dd221
                                      0x009dd223
                                      0x00000000
                                      0x00000000
                                      0x009dd225
                                      0x009dd228
                                      0x009dd228
                                      0x009dd229
                                      0x00000000
                                      0x00000000
                                      0x00000000
                                      0x00000000
                                      0x00000000
                                      0x009dd229
                                      0x009dd214
                                      0x009dd261
                                      0x009dd261
                                      0x00000000

                                      APIs
                                      • GetStringTypeA.KERNEL32(00000409,00000002,?,00000080,?), ref: 009DD204
                                      • GetThreadLocale.KERNEL32 ref: 009DD13A
                                        • Part of subcall function 009DD098: GetCPInfo.KERNEL32(00000000,?), ref: 009DD0B1
                                      Memory Dump Source
                                      • Source File: 00000002.00000002.323140727.00000000009D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009D0000, based on PE: true
                                      • Associated: 00000002.00000002.323135167.00000000009D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000002.00000002.323238271.0000000000A9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000002.00000002.323247473.0000000000AA3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_2_2_9d0000_rundll32.jbxd
                                      Similarity
                                      • API ID: InfoLocaleStringThreadType
                                      • String ID:
                                      • API String ID: 1505017576-0
                                      • Opcode ID: 8009059e9c7fcced38bd92fa336f2b38f0efa59d3f0347259b2e2afe22ec1919
                                      • Instruction ID: f1c5fd758cba20bc2ade451b3d2f4f1afd3e638306133e24acb2d4f2d17e4587
                                      • Opcode Fuzzy Hash: 8009059e9c7fcced38bd92fa336f2b38f0efa59d3f0347259b2e2afe22ec1919
                                      • Instruction Fuzzy Hash: 1931D8617CA3858EE720DBE8AC01795379DEB92341F58C067EA84CB392DF748947C721
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      C-Code - Quality: 75%
                                      			E009F6BFC(intOrPtr __eax, void* __edx) {
                                      				intOrPtr _v8;
                                      				void* __ebx;
                                      				void* __ecx;
                                      				void* __esi;
                                      				void* __ebp;
                                      				intOrPtr _t33;
                                      				intOrPtr _t59;
                                      				struct HDC__* _t69;
                                      				void* _t70;
                                      				intOrPtr _t79;
                                      				void* _t84;
                                      				struct HPALETTE__* _t85;
                                      				intOrPtr _t87;
                                      				intOrPtr _t89;
                                      
                                      				_t87 = _t89;
                                      				_push(_t70);
                                      				_v8 = __eax;
                                      				_t33 = _v8;
                                      				if( *((intOrPtr*)(_t33 + 0x58)) == 0) {
                                      					return _t33;
                                      				} else {
                                      					E009F4E24(_v8);
                                      					_push(_t87);
                                      					_push(0x9f6cdb);
                                      					_push( *[fs:eax]);
                                      					 *[fs:eax] = _t89;
                                      					E009F7F18( *((intOrPtr*)(_v8 + 0x58)));
                                      					E009F6A78( *( *((intOrPtr*)( *((intOrPtr*)(_v8 + 0x58)) + 0x28)) + 8));
                                      					E009F8018( *((intOrPtr*)(_v8 + 0x58)));
                                      					_t69 = CreateCompatibleDC(0);
                                      					_t84 =  *( *((intOrPtr*)( *((intOrPtr*)(_v8 + 0x58)) + 0x28)) + 8);
                                      					if(_t84 == 0) {
                                      						 *((intOrPtr*)(_v8 + 0x5c)) = 0;
                                      					} else {
                                      						 *((intOrPtr*)(_v8 + 0x5c)) = SelectObject(_t69, _t84);
                                      					}
                                      					_t85 =  *( *((intOrPtr*)( *((intOrPtr*)(_v8 + 0x58)) + 0x28)) + 0x10);
                                      					if(_t85 == 0) {
                                      						 *((intOrPtr*)(_v8 + 0x60)) = 0;
                                      					} else {
                                      						 *((intOrPtr*)(_v8 + 0x60)) = SelectPalette(_t69, _t85, 0xffffffff);
                                      						RealizePalette(_t69);
                                      					}
                                      					E009F5118(_v8, _t69);
                                      					_t59 =  *0xa9c8fc; // 0xf70acc
                                      					E009EB96C(_t59, _t69, _t70, _v8, _t85);
                                      					_pop(_t79);
                                      					 *[fs:eax] = _t79;
                                      					_push(0x9f6ce2);
                                      					return E009F4F90(_v8);
                                      				}
                                      			}

















                                      0x009f6bfd
                                      0x009f6bff
                                      0x009f6c02
                                      0x009f6c05
                                      0x009f6c0c
                                      0x009f6ce6
                                      0x009f6c12
                                      0x009f6c15
                                      0x009f6c1c
                                      0x009f6c1d
                                      0x009f6c22
                                      0x009f6c25
                                      0x009f6c2e
                                      0x009f6c3f
                                      0x009f6c4a
                                      0x009f6c56
                                      0x009f6c61
                                      0x009f6c66
                                      0x009f6c7c
                                      0x009f6c68
                                      0x009f6c72
                                      0x009f6c72
                                      0x009f6c88
                                      0x009f6c8d
                                      0x009f6cab
                                      0x009f6c8f
                                      0x009f6c9b
                                      0x009f6c9f
                                      0x009f6c9f
                                      0x009f6cb3
                                      0x009f6cbb
                                      0x009f6cc0
                                      0x009f6cc7
                                      0x009f6cca
                                      0x009f6ccd
                                      0x009f6cda
                                      0x009f6cda

                                      APIs
                                        • Part of subcall function 009F4E24: RtlEnterCriticalSection.KERNEL32(00A9F8C8,00000000,009F38D2,00000000,009F3931), ref: 009F4E2C
                                        • Part of subcall function 009F4E24: RtlLeaveCriticalSection.KERNEL32(00A9F8C8,00A9F8C8,00000000,009F38D2,00000000,009F3931), ref: 009F4E39
                                        • Part of subcall function 009F4E24: RtlEnterCriticalSection.KERNEL32(00000038,00A9F8C8,00A9F8C8,00000000,009F38D2,00000000,009F3931), ref: 009F4E42
                                        • Part of subcall function 009F8018: GetDC.USER32(00000000), ref: 009F806E
                                        • Part of subcall function 009F8018: GetDeviceCaps.GDI32(00000000,0000000C), ref: 009F8083
                                        • Part of subcall function 009F8018: GetDeviceCaps.GDI32(00000000,0000000E), ref: 009F808D
                                        • Part of subcall function 009F8018: CreateHalftonePalette.GDI32(00000000,00000000,?,?,?,?,009F6C4F,00000000,009F6CDB), ref: 009F80B1
                                        • Part of subcall function 009F8018: ReleaseDC.USER32 ref: 009F80BC
                                      • CreateCompatibleDC.GDI32(00000000), ref: 009F6C51
                                      • SelectObject.GDI32(00000000,?), ref: 009F6C6A
                                      • SelectPalette.GDI32(00000000,?,000000FF), ref: 009F6C93
                                      • RealizePalette.GDI32(00000000), ref: 009F6C9F
                                      Memory Dump Source
                                      • Source File: 00000002.00000002.323140727.00000000009D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009D0000, based on PE: true
                                      • Associated: 00000002.00000002.323135167.00000000009D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000002.00000002.323238271.0000000000A9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000002.00000002.323247473.0000000000AA3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_2_2_9d0000_rundll32.jbxd
                                      Similarity
                                      • API ID: CriticalPaletteSection$CapsCreateDeviceEnterSelect$CompatibleHalftoneLeaveObjectRealizeRelease
                                      • String ID:
                                      • API String ID: 979337279-0
                                      • Opcode ID: a74d74993d831f6682974a59273ebfecc746b95e2acf89616faf8b62f712fc74
                                      • Instruction ID: 34e762b88cddb04a046ae214381d6b784db8e77c136de7d4a286ae823e86996c
                                      • Opcode Fuzzy Hash: a74d74993d831f6682974a59273ebfecc746b95e2acf89616faf8b62f712fc74
                                      • Instruction Fuzzy Hash: 4E31E774A04618EFC714EF59C981E6DB7F5FF89720B6245A1B944AB362C730EE40DB50
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      C-Code - Quality: 93%
                                      			E009F2350(intOrPtr _a4, short _a6, intOrPtr _a8) {
                                      				struct _WNDCLASSA _v44;
                                      				struct HINSTANCE__* _t6;
                                      				CHAR* _t8;
                                      				struct HINSTANCE__* _t9;
                                      				int _t10;
                                      				void* _t11;
                                      				struct HINSTANCE__* _t13;
                                      				struct HINSTANCE__* _t19;
                                      				CHAR* _t20;
                                      				struct HWND__* _t22;
                                      				CHAR* _t24;
                                      
                                      				_t6 =  *0xa9f668; // 0x9d0000
                                      				 *0xa9c62c = _t6;
                                      				_t8 =  *0xa9c640; // 0x9f2340
                                      				_t9 =  *0xa9f668; // 0x9d0000
                                      				_t10 = GetClassInfoA(_t9, _t8,  &_v44);
                                      				asm("sbb eax, eax");
                                      				_t11 = _t10 + 1;
                                      				if(_t11 == 0 || L009D70B4 != _v44.lpfnWndProc) {
                                      					if(_t11 != 0) {
                                      						_t19 =  *0xa9f668; // 0x9d0000
                                      						_t20 =  *0xa9c640; // 0x9f2340
                                      						UnregisterClassA(_t20, _t19);
                                      					}
                                      					RegisterClassA(0xa9c61c);
                                      				}
                                      				_t13 =  *0xa9f668; // 0x9d0000
                                      				_t24 =  *0xa9c640; // 0x9f2340
                                      				_t22 = E009D75D8(0x80, _t24, 0, _t13, 0, 0, 0, 0, 0, 0, 0x80000000);
                                      				if(_a6 != 0) {
                                      					SetWindowLongA(_t22, 0xfffffffc, E009F2294(_a4, _a8));
                                      				}
                                      				return _t22;
                                      			}














                                      0x009f2357
                                      0x009f235c
                                      0x009f2365
                                      0x009f236b
                                      0x009f2371
                                      0x009f2379
                                      0x009f237b
                                      0x009f237e
                                      0x009f238c
                                      0x009f238e
                                      0x009f2394
                                      0x009f239a
                                      0x009f239a
                                      0x009f23a4
                                      0x009f23a4
                                      0x009f23ba
                                      0x009f23c7
                                      0x009f23d7
                                      0x009f23de
                                      0x009f23ef
                                      0x009f23ef
                                      0x009f23fa

                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000002.00000002.323140727.00000000009D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009D0000, based on PE: true
                                      • Associated: 00000002.00000002.323135167.00000000009D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000002.00000002.323238271.0000000000A9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000002.00000002.323247473.0000000000AA3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_2_2_9d0000_rundll32.jbxd
                                      Similarity
                                      • API ID: Class$InfoLongRegisterUnregisterWindow
                                      • String ID:
                                      • API String ID: 4025006896-0
                                      • Opcode ID: 320ebbeac1d0a37a8f03885234a5b7448aaef93cb9ef6019724b1e072596c982
                                      • Instruction ID: d49ad2dbf1511015ce92bfd07b9c9e086de51b7749922c03b9182bfe67ef2e55
                                      • Opcode Fuzzy Hash: 320ebbeac1d0a37a8f03885234a5b7448aaef93cb9ef6019724b1e072596c982
                                      • Instruction Fuzzy Hash: 5A0121713442086BCB10EFECDC81FAA77ADEB49314F109122FB04D73A1EA659951CB60
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      C-Code - Quality: 67%
                                      			E009D1C0C() {
                                      				signed int _t13;
                                      				intOrPtr _t19;
                                      				intOrPtr _t20;
                                      				intOrPtr _t23;
                                      
                                      				_push(_t23);
                                      				_push(E009D1CC2);
                                      				_push( *[fs:edx]);
                                      				 *[fs:edx] = _t23;
                                      				_push(0xa9f5cc);
                                      				L009D1560();
                                      				if( *0xa9f04d != 0) {
                                      					_push(0xa9f5cc);
                                      					L009D1568();
                                      				}
                                      				E009D15D0(0xa9f5ec);
                                      				E009D15D0(0xa9f5fc);
                                      				E009D15D0(0xa9f628);
                                      				 *0xa9f624 = LocalAlloc(0, 0xff8);
                                      				if( *0xa9f624 != 0) {
                                      					_t13 = 3;
                                      					do {
                                      						_t20 =  *0xa9f624; // 0x8f0f20
                                      						 *((intOrPtr*)(_t20 + _t13 * 4 - 0xc)) = 0;
                                      						_t13 = _t13 + 1;
                                      					} while (_t13 != 0x401);
                                      					 *((intOrPtr*)(0xa9f610)) = 0xa9f60c;
                                      					 *0xa9f60c = 0xa9f60c;
                                      					 *0xa9f618 = 0xa9f60c;
                                      					 *0xa9f5c4 = 1;
                                      				}
                                      				_pop(_t19);
                                      				 *[fs:eax] = _t19;
                                      				_push(E009D1CC9);
                                      				if( *0xa9f04d != 0) {
                                      					_push(0xa9f5cc);
                                      					L009D1570();
                                      					return 0;
                                      				}
                                      				return 0;
                                      			}







                                      0x009d1c11
                                      0x009d1c12
                                      0x009d1c17
                                      0x009d1c1a
                                      0x009d1c1d
                                      0x009d1c22
                                      0x009d1c2e
                                      0x009d1c30
                                      0x009d1c35
                                      0x009d1c35
                                      0x009d1c3f
                                      0x009d1c49
                                      0x009d1c53
                                      0x009d1c64
                                      0x009d1c70
                                      0x009d1c72
                                      0x009d1c77
                                      0x009d1c77
                                      0x009d1c7f
                                      0x009d1c83
                                      0x009d1c84
                                      0x009d1c90
                                      0x009d1c93
                                      0x009d1c95
                                      0x009d1c9a
                                      0x009d1c9a
                                      0x009d1ca3
                                      0x009d1ca6
                                      0x009d1ca9
                                      0x009d1cb5
                                      0x009d1cb7
                                      0x009d1cbc
                                      0x00000000
                                      0x009d1cbc
                                      0x009d1cc1

                                      APIs
                                      • RtlInitializeCriticalSection.KERNEL32(00A9F5CC,00000000,009D1CC2,?,?,009D24A6), ref: 009D1C22
                                      • RtlEnterCriticalSection.KERNEL32(00A9F5CC,00A9F5CC,00000000,009D1CC2,?,?,009D24A6), ref: 009D1C35
                                      • LocalAlloc.KERNEL32(00000000,00000FF8,00A9F5CC,00000000,009D1CC2,?,?,009D24A6), ref: 009D1C5F
                                      • RtlLeaveCriticalSection.KERNEL32(00A9F5CC,009D1CC9,00000000,009D1CC2,?,?,009D24A6), ref: 009D1CBC
                                      Memory Dump Source
                                      • Source File: 00000002.00000002.323140727.00000000009D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009D0000, based on PE: true
                                      • Associated: 00000002.00000002.323135167.00000000009D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000002.00000002.323238271.0000000000A9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000002.00000002.323247473.0000000000AA3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_2_2_9d0000_rundll32.jbxd
                                      Similarity
                                      • API ID: CriticalSection$AllocEnterInitializeLeaveLocal
                                      • String ID:
                                      • API String ID: 730355536-0
                                      • Opcode ID: 2fbacea879306211dcecf0b9b6863f2b0ce09d2272b3d72647206262d00230a6
                                      • Instruction ID: e9d9c08308179869fa5aef2e6eb9a14bb1340eee9bc12d8926bccbba0284b23b
                                      • Opcode Fuzzy Hash: 2fbacea879306211dcecf0b9b6863f2b0ce09d2272b3d72647206262d00230a6
                                      • Instruction Fuzzy Hash: F401A9B27D43807EEB11AFB9A90A7143AC8E7D9740F11C47BF102C63E2E9B88841CB51
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      C-Code - Quality: 80%
                                      			E009F4254(void* __eax, void* __ebx, void* __ecx) {
                                      				signed int _v8;
                                      				struct tagLOGFONTA _v68;
                                      				char _v72;
                                      				char _v76;
                                      				char _v80;
                                      				intOrPtr _t76;
                                      				intOrPtr _t81;
                                      				void* _t100;
                                      				void* _t107;
                                      				void* _t116;
                                      				intOrPtr _t126;
                                      				void* _t137;
                                      				void* _t138;
                                      				intOrPtr _t139;
                                      
                                      				_t137 = _t138;
                                      				_t139 = _t138 + 0xffffffb4;
                                      				_v80 = 0;
                                      				_v76 = 0;
                                      				_v72 = 0;
                                      				_t116 = __eax;
                                      				_push(_t137);
                                      				_push(0x9f43dd);
                                      				_push( *[fs:eax]);
                                      				 *[fs:eax] = _t139;
                                      				_v8 =  *((intOrPtr*)(__eax + 0x10));
                                      				if( *((intOrPtr*)(_v8 + 8)) != 0) {
                                      					__eflags = 0;
                                      					 *[fs:eax] = 0;
                                      					_push(0x9f43e4);
                                      					return E009D424C( &_v80, 3);
                                      				} else {
                                      					_t76 =  *0xa9f8e0; // 0xf70a30
                                      					E009F3598(_t76);
                                      					_push(_t137);
                                      					_push(0x9f43b5);
                                      					_push( *[fs:eax]);
                                      					 *[fs:eax] = _t139;
                                      					if( *((intOrPtr*)(_v8 + 8)) == 0) {
                                      						_v68.lfHeight =  *(_v8 + 0x14);
                                      						_v68.lfWidth = 0;
                                      						_v68.lfEscapement = 0;
                                      						_v68.lfOrientation = 0;
                                      						if(( *(_v8 + 0x19) & 0x00000001) == 0) {
                                      							_v68.lfWeight = 0x190;
                                      						} else {
                                      							_v68.lfWeight = 0x2bc;
                                      						}
                                      						_v68.lfItalic = _v8 & 0xffffff00 | ( *(_v8 + 0x19) & 0x00000002) != 0x00000000;
                                      						_v68.lfUnderline = _v8 & 0xffffff00 | ( *(_v8 + 0x19) & 0x00000004) != 0x00000000;
                                      						_v68.lfStrikeOut = _v8 & 0xffffff00 | ( *(_v8 + 0x19) & 0x00000008) != 0x00000000;
                                      						_v68.lfCharSet =  *((intOrPtr*)(_v8 + 0x1a));
                                      						E009D448C( &_v72, _v8 + 0x1b,  *(_v8 + 0x19) & 0x00000008);
                                      						_t100 = E009D8930(_v72, "Default");
                                      						_t146 = _t100;
                                      						if(_t100 != 0) {
                                      							__eflags = _v8 + 0x1b;
                                      							E009D448C( &_v80, _v8 + 0x1b, _v8 + 0x1b);
                                      							E009D9220( &(_v68.lfFaceName), _v80);
                                      						} else {
                                      							E009D448C( &_v76, "\rMS Sans Serif", _t146);
                                      							E009D9220( &(_v68.lfFaceName), _v76);
                                      						}
                                      						_v68.lfQuality = 0;
                                      						_v68.lfOutPrecision = 0;
                                      						_v68.lfClipPrecision = 0;
                                      						_t107 = E009F4538(_t116) - 1;
                                      						if(_t107 == 0) {
                                      							_v68.lfPitchAndFamily = 2;
                                      						} else {
                                      							if(_t107 == 1) {
                                      								_v68.lfPitchAndFamily = 1;
                                      							} else {
                                      								_v68.lfPitchAndFamily = 0;
                                      							}
                                      						}
                                      						 *((intOrPtr*)(_v8 + 8)) = CreateFontIndirectA( &_v68);
                                      					}
                                      					_pop(_t126);
                                      					 *[fs:eax] = _t126;
                                      					_push(0x9f43bc);
                                      					_t81 =  *0xa9f8e0; // 0xf70a30
                                      					return E009F35A4(_t81);
                                      				}
                                      			}

















                                      0x009f4255
                                      0x009f4257
                                      0x009f425d
                                      0x009f4260
                                      0x009f4263
                                      0x009f4266
                                      0x009f426a
                                      0x009f426b
                                      0x009f4270
                                      0x009f4273
                                      0x009f4279
                                      0x009f4283
                                      0x009f43c2
                                      0x009f43c7
                                      0x009f43ca
                                      0x009f43dc
                                      0x009f4289
                                      0x009f4289
                                      0x009f428e
                                      0x009f4295
                                      0x009f4296
                                      0x009f429b
                                      0x009f429e
                                      0x009f42a8
                                      0x009f42b4
                                      0x009f42b9
                                      0x009f42be
                                      0x009f42c3
                                      0x009f42cd
                                      0x009f42d8
                                      0x009f42cf
                                      0x009f42cf
                                      0x009f42cf
                                      0x009f42e9
                                      0x009f42f6
                                      0x009f4303
                                      0x009f430c
                                      0x009f4318
                                      0x009f4325
                                      0x009f432a
                                      0x009f432c
                                      0x009f434e
                                      0x009f4351
                                      0x009f435c
                                      0x009f432e
                                      0x009f4336
                                      0x009f4341
                                      0x009f4341
                                      0x009f4361
                                      0x009f4365
                                      0x009f4369
                                      0x009f4374
                                      0x009f4376
                                      0x009f437e
                                      0x009f4378
                                      0x009f437a
                                      0x009f4384
                                      0x009f437c
                                      0x009f438a
                                      0x009f438a
                                      0x009f437a
                                      0x009f439a
                                      0x009f439a
                                      0x009f439f
                                      0x009f43a2
                                      0x009f43a5
                                      0x009f43aa
                                      0x009f43b4
                                      0x009f43b4

                                      APIs
                                        • Part of subcall function 009F3598: RtlEnterCriticalSection.KERNEL32(?,009F35D5), ref: 009F359C
                                      • CreateFontIndirectA.GDI32(?), ref: 009F4392
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000002.00000002.323140727.00000000009D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009D0000, based on PE: true
                                      • Associated: 00000002.00000002.323135167.00000000009D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000002.00000002.323238271.0000000000A9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000002.00000002.323247473.0000000000AA3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_2_2_9d0000_rundll32.jbxd
                                      Similarity
                                      • API ID: CreateCriticalEnterFontIndirectSection
                                      • String ID: MS Sans Serif$Default
                                      • API String ID: 2931345757-2137701257
                                      • Opcode ID: d11fd5dae637b6e45878caab91fd16b67a562d134b9bf8b40f245d97f93645dc
                                      • Instruction ID: ee4d8a1aa071d3c5567fc090bedef0fe56739299c52fabf5a58dd024cc198abb
                                      • Opcode Fuzzy Hash: d11fd5dae637b6e45878caab91fd16b67a562d134b9bf8b40f245d97f93645dc
                                      • Instruction Fuzzy Hash: D8514B31A0424CDFDB11DFA8C581BEEBBF6AF48304F2580AAE900A7352D3749E55DB65
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      C-Code - Quality: 72%
                                      			E009DA790(void* __eax, void* __ebx, intOrPtr* __edx, void* __esi, intOrPtr _a4) {
                                      				char _v8;
                                      				short _v18;
                                      				short _v22;
                                      				struct _SYSTEMTIME _v24;
                                      				char _v280;
                                      				char* _t32;
                                      				intOrPtr* _t49;
                                      				intOrPtr _t58;
                                      				void* _t63;
                                      				void* _t67;
                                      
                                      				_v8 = 0;
                                      				_t49 = __edx;
                                      				_t63 = __eax;
                                      				_push(_t67);
                                      				_push(0x9da86e);
                                      				_push( *[fs:eax]);
                                      				 *[fs:eax] = _t67 + 0xfffffeec;
                                      				E009D4228(__edx);
                                      				_v24 =  *((intOrPtr*)(_a4 - 0xe));
                                      				_v22 =  *((intOrPtr*)(_a4 - 0x10));
                                      				_v18 =  *((intOrPtr*)(_a4 - 0x12));
                                      				if(_t63 > 2) {
                                      					E009D42C0( &_v8, 0x9da890);
                                      				} else {
                                      					E009D42C0( &_v8, 0x9da884);
                                      				}
                                      				_t32 = E009D46E8(_v8);
                                      				if(GetDateFormatA(GetThreadLocale(), 4,  &_v24, _t32,  &_v280, 0x100) != 0) {
                                      					E009D4498(_t49, 0x100,  &_v280);
                                      					if(_t63 == 1 &&  *((char*)( *_t49)) == 0x30) {
                                      						E009D4748( *_t49, E009D44E8( *_t49) - 1, 2, _t49);
                                      					}
                                      				}
                                      				_pop(_t58);
                                      				 *[fs:eax] = _t58;
                                      				_push(0x9da875);
                                      				return E009D4228( &_v8);
                                      			}













                                      0x009da79d
                                      0x009da7a0
                                      0x009da7a2
                                      0x009da7a6
                                      0x009da7a7
                                      0x009da7ac
                                      0x009da7af
                                      0x009da7b4
                                      0x009da7c0
                                      0x009da7cb
                                      0x009da7d6
                                      0x009da7dd
                                      0x009da7f6
                                      0x009da7df
                                      0x009da7e7
                                      0x009da7e7
                                      0x009da80a
                                      0x009da823
                                      0x009da832
                                      0x009da838
                                      0x009da853
                                      0x009da853
                                      0x009da838
                                      0x009da85a
                                      0x009da85d
                                      0x009da860
                                      0x009da86d

                                      APIs
                                      • GetThreadLocale.KERNEL32(00000004,?,00000000,?,00000100,00000000,009DA86E), ref: 009DA816
                                      • GetDateFormatA.KERNEL32(00000000,00000004,?,00000000,?,00000100,00000000,009DA86E), ref: 009DA81C
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000002.00000002.323140727.00000000009D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009D0000, based on PE: true
                                      • Associated: 00000002.00000002.323135167.00000000009D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000002.00000002.323238271.0000000000A9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000002.00000002.323247473.0000000000AA3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_2_2_9d0000_rundll32.jbxd
                                      Similarity
                                      • API ID: DateFormatLocaleThread
                                      • String ID: yyyy
                                      • API String ID: 3303714858-3145165042
                                      • Opcode ID: 0a19510f193dcd51ff6cd6f5597754b1f0fec84b0b0dcf223ef29407cc9be7b9
                                      • Instruction ID: 3e07ea106ac57525fc1c5aa4d339873a881c78babfb43e5a654413e799fc3a76
                                      • Opcode Fuzzy Hash: 0a19510f193dcd51ff6cd6f5597754b1f0fec84b0b0dcf223ef29407cc9be7b9
                                      • Instruction Fuzzy Hash: B2214138680208AFDB11EBA8D842BAE73F8EF89300F918067FD54D7351D6309E51D766
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      C-Code - Quality: 44%
                                      			E009FE278(char __edx, void* __edi, void* __esi, void* __fp0) {
                                      				char _v5;
                                      				void* __ebx;
                                      				void* __ecx;
                                      				void* __ebp;
                                      				void* _t15;
                                      				signed int _t24;
                                      				signed int _t25;
                                      				signed int _t28;
                                      				void* _t31;
                                      				void* _t34;
                                      				void* _t35;
                                      				char _t36;
                                      				signed int _t40;
                                      				void* _t42;
                                      				void* _t43;
                                      				void* _t44;
                                      				void* _t45;
                                      				void* _t50;
                                      
                                      				_t50 = __fp0;
                                      				_t43 = __esi;
                                      				_t42 = __edi;
                                      				_t36 = __edx;
                                      				if(__edx != 0) {
                                      					_t45 = _t45 + 0xfffffff0;
                                      					_t15 = E009D3694(_t15, _t44);
                                      				}
                                      				_v5 = _t36;
                                      				_t34 = _t15;
                                      				E00A1CCEC(_t34, _t35, 0, _t42, _t43, _t50);
                                      				E00A1A030(_t34, GetSystemMetrics(2));
                                      				E00A1A054(_t34, GetSystemMetrics(0x14));
                                      				_t24 =  *(_t34 + 0x4c);
                                      				_t40 = _t24;
                                      				_t25 = _t24 >> 1;
                                      				if(0 < 0) {
                                      					asm("adc eax, 0x0");
                                      				}
                                      				E00A1A054(_t34, _t40 + _t25);
                                      				 *((char*)(_t34 + 0x208)) = 1;
                                      				 *((char*)(_t34 + 0x21f)) = 0;
                                      				 *((short*)(_t34 + 0x21c)) = 0;
                                      				 *((short*)(_t34 + 0x210)) = 0;
                                      				 *((short*)(_t34 + 0x212)) = 0x64;
                                      				 *((intOrPtr*)(_t34 + 0x214)) = 1;
                                      				 *((char*)(_t34 + 0x228)) = 1;
                                      				 *((char*)(_t34 + 0x229)) = 1;
                                      				 *((char*)(_t34 + 0x21e)) = 1;
                                      				_t28 =  *0x9fe340; // 0x80
                                      				 *(_t34 + 0x50) =  !_t28 &  *(_t34 + 0x50);
                                      				_t31 = _t34;
                                      				if(_v5 != 0) {
                                      					E009D36EC(_t31);
                                      					_pop( *[fs:0x0]);
                                      				}
                                      				return _t34;
                                      			}





















                                      0x009fe278
                                      0x009fe278
                                      0x009fe278
                                      0x009fe278
                                      0x009fe27f
                                      0x009fe281
                                      0x009fe284
                                      0x009fe284
                                      0x009fe289
                                      0x009fe28c
                                      0x009fe292
                                      0x009fe2a2
                                      0x009fe2b2
                                      0x009fe2b7
                                      0x009fe2ba
                                      0x009fe2bc
                                      0x009fe2be
                                      0x009fe2c0
                                      0x009fe2c0
                                      0x009fe2c7
                                      0x009fe2cc
                                      0x009fe2d3
                                      0x009fe2da
                                      0x009fe2e3
                                      0x009fe2ec
                                      0x009fe2f5
                                      0x009fe2ff
                                      0x009fe306
                                      0x009fe30d
                                      0x009fe314
                                      0x009fe31e
                                      0x009fe321
                                      0x009fe327
                                      0x009fe329
                                      0x009fe32e
                                      0x009fe335
                                      0x009fe33d

                                      APIs
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000002.00000002.323140727.00000000009D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009D0000, based on PE: true
                                      • Associated: 00000002.00000002.323135167.00000000009D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000002.00000002.323238271.0000000000A9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000002.00000002.323247473.0000000000AA3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_2_2_9d0000_rundll32.jbxd
                                      Similarity
                                      • API ID: MetricsSystem
                                      • String ID: d
                                      • API String ID: 4116985748-2564639436
                                      • Opcode ID: b6bbb0d6d652c3b8cac81b2ffd71e037f0e3cb945a38bfb854af3a4d7afc70bf
                                      • Instruction ID: 3770f3f787959b976f7c412e9e036da491047147e5442566f4ee5af1443f9d32
                                      • Opcode Fuzzy Hash: b6bbb0d6d652c3b8cac81b2ffd71e037f0e3cb945a38bfb854af3a4d7afc70bf
                                      • Instruction Fuzzy Hash: CB1191317843848BEB00DF7888CA3C53B955F64308F0880B8ED588F397EABB95488366
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      C-Code - Quality: 68%
                                      			E009F9D1C(intOrPtr _a4, intOrPtr _a8, signed int _a12) {
                                      				void* __ebx;
                                      				void* __edi;
                                      				void* __esi;
                                      				void* __ebp;
                                      				void* _t15;
                                      				void* _t16;
                                      				intOrPtr _t18;
                                      				signed int _t19;
                                      				void* _t20;
                                      				intOrPtr _t21;
                                      
                                      				_t19 = _a12;
                                      				if( *0xa9f91f != 0) {
                                      					_t16 = 0;
                                      					if((_t19 & 0x00000003) != 0) {
                                      						L7:
                                      						_t16 = 0x12340042;
                                      					} else {
                                      						_t21 = _a4;
                                      						if(_t21 >= 0 && _t21 < GetSystemMetrics(0) && _a8 >= 0 && GetSystemMetrics(1) > _a8) {
                                      							goto L7;
                                      						}
                                      					}
                                      				} else {
                                      					_t18 =  *0xa9f900; // 0x9f9d1c
                                      					 *0xa9f900 = E009F9A84(3, _t15, _t18, _t19, _t20);
                                      					_t16 =  *0xa9f900(_a4, _a8, _t19);
                                      				}
                                      				return _t16;
                                      			}













                                      0x009f9d22
                                      0x009f9d2c
                                      0x009f9d56
                                      0x009f9d5f
                                      0x009f9d87
                                      0x009f9d87
                                      0x009f9d61
                                      0x009f9d61
                                      0x009f9d66
                                      0x00000000
                                      0x00000000
                                      0x009f9d66
                                      0x009f9d2e
                                      0x009f9d33
                                      0x009f9d40
                                      0x009f9d52
                                      0x009f9d52
                                      0x009f9d92

                                      APIs
                                      • GetSystemMetrics.USER32 ref: 009F9D6A
                                      • GetSystemMetrics.USER32 ref: 009F9D7C
                                        • Part of subcall function 009F9A84: GetProcAddress.KERNEL32(75BA0000,00000000), ref: 009F9B04
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000002.00000002.323140727.00000000009D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009D0000, based on PE: true
                                      • Associated: 00000002.00000002.323135167.00000000009D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000002.00000002.323238271.0000000000A9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000002.00000002.323247473.0000000000AA3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_2_2_9d0000_rundll32.jbxd
                                      Similarity
                                      • API ID: MetricsSystem$AddressProc
                                      • String ID: MonitorFromPoint
                                      • API String ID: 1792783759-1072306578
                                      • Opcode ID: 66977863c9cfea88d07285425bc3354a6d852a62f9719355fb93be14d742c6f0
                                      • Instruction ID: dfce48d4a9fb3920978a3715035130f6a75f283b7d034939be1e5e55814097c4
                                      • Opcode Fuzzy Hash: 66977863c9cfea88d07285425bc3354a6d852a62f9719355fb93be14d742c6f0
                                      • Instruction Fuzzy Hash: 0301863130124CEFDF109FA5DC44B6A7BA5EBC1394F644136FA14CB1A2C7719C518BA0
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      C-Code - Quality: 68%
                                      			E009F9BF4(intOrPtr* _a4, signed int _a8) {
                                      				void* __ebx;
                                      				void* __edi;
                                      				void* __esi;
                                      				void* __ebp;
                                      				intOrPtr* _t14;
                                      				intOrPtr _t16;
                                      				signed int _t17;
                                      				void* _t18;
                                      				void* _t19;
                                      
                                      				_t17 = _a8;
                                      				_t14 = _a4;
                                      				if( *0xa9f91e != 0) {
                                      					_t19 = 0;
                                      					if((_t17 & 0x00000003) != 0 ||  *((intOrPtr*)(_t14 + 8)) > 0 &&  *((intOrPtr*)(_t14 + 0xc)) > 0 && GetSystemMetrics(0) >  *_t14 && GetSystemMetrics(1) >  *((intOrPtr*)(_t14 + 4))) {
                                      						_t19 = 0x12340042;
                                      					}
                                      				} else {
                                      					_t16 =  *0xa9f8fc; // 0x9f9bf4
                                      					 *0xa9f8fc = E009F9A84(2, _t14, _t16, _t17, _t18);
                                      					_t19 =  *0xa9f8fc(_t14, _t17);
                                      				}
                                      				return _t19;
                                      			}












                                      0x009f9bfa
                                      0x009f9bfd
                                      0x009f9c07
                                      0x009f9c2c
                                      0x009f9c35
                                      0x009f9c5c
                                      0x009f9c5c
                                      0x009f9c09
                                      0x009f9c0e
                                      0x009f9c1b
                                      0x009f9c28
                                      0x009f9c28
                                      0x009f9c67

                                      APIs
                                      • GetSystemMetrics.USER32 ref: 009F9C45
                                      • GetSystemMetrics.USER32 ref: 009F9C51
                                        • Part of subcall function 009F9A84: GetProcAddress.KERNEL32(75BA0000,00000000), ref: 009F9B04
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000002.00000002.323140727.00000000009D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009D0000, based on PE: true
                                      • Associated: 00000002.00000002.323135167.00000000009D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000002.00000002.323238271.0000000000A9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000002.00000002.323247473.0000000000AA3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_2_2_9d0000_rundll32.jbxd
                                      Similarity
                                      • API ID: MetricsSystem$AddressProc
                                      • String ID: MonitorFromRect
                                      • API String ID: 1792783759-4033241945
                                      • Opcode ID: feb403e85ccec91ecb89cafe426eede1099633b73585daa3ac2ea98d1f14996a
                                      • Instruction ID: 9847a3d9888485ffe5a7dd31da3ae0ad764e61349b42b5adde60168a57cbeca9
                                      • Opcode Fuzzy Hash: feb403e85ccec91ecb89cafe426eede1099633b73585daa3ac2ea98d1f14996a
                                      • Instruction Fuzzy Hash: 270162313002189FDB60DB55D9C9B65B7DDD751755F248062EA8CCB202C670DD41DBE0
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      C-Code - Quality: 100%
                                      			E009F9B6C(int _a4) {
                                      				void* __ebx;
                                      				void* __ebp;
                                      				signed int _t2;
                                      				signed int _t3;
                                      				int _t8;
                                      				void* _t12;
                                      				void* _t13;
                                      				void* _t17;
                                      				void* _t18;
                                      
                                      				_t8 = _a4;
                                      				if( *0xa9f91c == 0) {
                                      					 *0xa9f8f4 = E009F9A84(0, _t8,  *0xa9f8f4, _t17, _t18);
                                      					return GetSystemMetrics(_t8);
                                      				}
                                      				_t3 = _t2 | 0xffffffff;
                                      				_t12 = _t8 + 0xffffffb4 - 2;
                                      				__eflags = _t12;
                                      				if(__eflags < 0) {
                                      					_t3 = 0;
                                      				} else {
                                      					if(__eflags == 0) {
                                      						_t8 = 0;
                                      					} else {
                                      						_t13 = _t12 - 1;
                                      						__eflags = _t13;
                                      						if(_t13 == 0) {
                                      							_t8 = 1;
                                      						} else {
                                      							__eflags = _t13 - 0xffffffffffffffff;
                                      							if(_t13 - 0xffffffffffffffff < 0) {
                                      								_t3 = 1;
                                      							}
                                      						}
                                      					}
                                      				}
                                      				__eflags = _t3 - 0xffffffff;
                                      				if(_t3 != 0xffffffff) {
                                      					return _t3;
                                      				} else {
                                      					return GetSystemMetrics(_t8);
                                      				}
                                      			}












                                      0x009f9b70
                                      0x009f9b7a
                                      0x009f9b8e
                                      0x00000000
                                      0x009f9b94
                                      0x009f9b9c
                                      0x009f9ba4
                                      0x009f9ba4
                                      0x009f9ba7
                                      0x009f9bbb
                                      0x009f9ba9
                                      0x009f9ba9
                                      0x009f9bbf
                                      0x009f9bab
                                      0x009f9bab
                                      0x009f9bab
                                      0x009f9bac
                                      0x009f9bc3
                                      0x009f9bae
                                      0x009f9baf
                                      0x009f9bb2
                                      0x009f9bb4
                                      0x009f9bb4
                                      0x009f9bb2
                                      0x009f9bac
                                      0x009f9ba9
                                      0x009f9bc8
                                      0x009f9bcb
                                      0x009f9bd5
                                      0x009f9bcd
                                      0x00000000
                                      0x009f9bce

                                      APIs
                                      • GetSystemMetrics.USER32 ref: 009F9BCE
                                        • Part of subcall function 009F9A84: GetProcAddress.KERNEL32(75BA0000,00000000), ref: 009F9B04
                                      • GetSystemMetrics.USER32 ref: 009F9B94
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000002.00000002.323140727.00000000009D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009D0000, based on PE: true
                                      • Associated: 00000002.00000002.323135167.00000000009D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000002.00000002.323238271.0000000000A9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000002.00000002.323247473.0000000000AA3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_2_2_9d0000_rundll32.jbxd
                                      Similarity
                                      • API ID: MetricsSystem$AddressProc
                                      • String ID: GetSystemMetrics
                                      • API String ID: 1792783759-96882338
                                      • Opcode ID: 726958d04bf0eced72399b9656cd41c961bac5cf29a09a59e617ffd74bb9d8f1
                                      • Instruction ID: 4165b4829d3d29762ef4e832b51741015ffd3d28c53d2203d7f0b1f5a46664bf
                                      • Opcode Fuzzy Hash: 726958d04bf0eced72399b9656cd41c961bac5cf29a09a59e617ffd74bb9d8f1
                                      • Instruction Fuzzy Hash: 72F0B43021420D5EDB549A79FCC4772778A9785332FB48F32E722861D5C57889419750
                                      Uniqueness

                                      Uniqueness Score: -1.00%