Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
Ordene 501527,pdf.exe

Overview

General Information

Sample Name:Ordene 501527,pdf.exe
Analysis ID:680367
MD5:5162b6782f86f1f24e8610544d159ae9
SHA1:0d1ead84c74ee462976928783c1f733aa859bc94
SHA256:6730e52c8075c7e044c2bbaf9f7ad8c0f7f8d03fb23adbd2331adc8b591caec7
Tags:exe
Infos:

Detection

GuLoader
Score:52
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Yara detected GuLoader
Tries to detect virtualization through RDTSC time measurements
Uses 32bit PE files
Sample file is different than original file name gathered from version info
PE file contains strange resources
Drops PE files
Contains functionality to shutdown / reboot the system
Uses code obfuscation techniques (call, push, ret)
PE file contains sections with non-standard names
Detected potential crypto function
Stores files to the Windows start menu directory
PE / OLE file has an invalid certificate
Contains functionality to dynamically determine API calls
Found dropped PE file which has not been started or loaded
Contains functionality for read data from the clipboard

Classification

  • System is w10x64
  • Ordene 501527,pdf.exe (PID: 5396 cmdline: "C:\Users\user\Desktop\Ordene 501527,pdf.exe" MD5: 5162B6782F86F1F24E8610544D159AE9)
  • cleanup
No configs have been found
SourceRuleDescriptionAuthorStrings
00000000.00000002.669759237.0000000002E00000.00000040.00001000.00020000.00000000.sdmpJoeSecurity_GuLoader_2Yara detected GuLoaderJoe Security
    No Sigma rule has matched
    No Snort rule has matched

    Click to jump to signature section

    Show All Signature Results
    Source: Ordene 501527,pdf.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE
    Source: Ordene 501527,pdf.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
    Source: Binary string: D:\SourceCode\GC3.Overclocking\production_V4.2\Service\ServiceSDK\Release\ThrottlePlugin\FanControlWrapper.pdb source: FanControlWrapper.dll.0.dr
    Source: Binary string: D:\SourceCode\GC3.Overclocking\production_V4.2\Service\ServiceSDK\Release\ThrottlePlugin\FanControlWrapper.pdb source: FanControlWrapper.dll.0.dr
    Source: Binary string: Microsoft.Office.Tools.Common.v9.0.pdb source: Microsoft.Office.Tools.Common.v9.0.dll.0.dr
    Source: C:\Users\user\Desktop\Ordene 501527,pdf.exeCode function: 0_2_0040596D GetTempPathW,DeleteFileW,lstrcatW,lstrcatW,lstrlenW,FindFirstFileW,FindNextFileW,FindClose,0_2_0040596D
    Source: C:\Users\user\Desktop\Ordene 501527,pdf.exeCode function: 0_2_004065A2 FindFirstFileW,FindClose,0_2_004065A2
    Source: C:\Users\user\Desktop\Ordene 501527,pdf.exeCode function: 0_2_00402862 FindFirstFileW,0_2_00402862
    Source: FanControlWrapper.dll.0.drString found in binary or memory: http://cacerts.digicert.com/DigiCertAssuredIDRootCA.crt0
    Source: FanControlWrapper.dll.0.drString found in binary or memory: http://cacerts.digicert.com/DigiCertSHA2AssuredIDTimestampingCA.crt0
    Source: FanControlWrapper.dll.0.drString found in binary or memory: http://crl.globalsign.com/gsextendcodesignsha2g3.crl0
    Source: FanControlWrapper.dll.0.drString found in binary or memory: http://crl.globalsign.com/root-r3.crl0b
    Source: FanControlWrapper.dll.0.drString found in binary or memory: http://crl.globalsign.com/root.crl0G
    Source: FanControlWrapper.dll.0.drString found in binary or memory: http://crl3.digicert.com/DigiCertAssuredIDRootCA.crl0P
    Source: FanControlWrapper.dll.0.drString found in binary or memory: http://crl3.digicert.com/sha2-assured-ts.crl02
    Source: FanControlWrapper.dll.0.drString found in binary or memory: http://crl4.digicert.com/DigiCertAssuredIDRootCA.crl0:
    Source: FanControlWrapper.dll.0.drString found in binary or memory: http://crl4.digicert.com/sha2-assured-ts.crl0
    Source: Ordene 501527,pdf.exeString found in binary or memory: http://nsis.sf.net/NSIS_ErrorError
    Source: FanControlWrapper.dll.0.drString found in binary or memory: http://ocsp.digicert.com0C
    Source: FanControlWrapper.dll.0.drString found in binary or memory: http://ocsp.digicert.com0O
    Source: FanControlWrapper.dll.0.drString found in binary or memory: http://ocsp.globalsign.com/rootr103
    Source: FanControlWrapper.dll.0.drString found in binary or memory: http://ocsp2.globalsign.com/gsextendcodesignsha2g30U
    Source: FanControlWrapper.dll.0.drString found in binary or memory: http://ocsp2.globalsign.com/rootr306
    Source: Ordene 501527,pdf.exeString found in binary or memory: http://s.symcb.com/universal-root.crl0
    Source: Ordene 501527,pdf.exeString found in binary or memory: http://s.symcd.com06
    Source: FanControlWrapper.dll.0.drString found in binary or memory: http://secure.globalsign.com/cacert/gsextendcodesignsha2g3ocsp.crt0
    Source: Ordene 501527,pdf.exeString found in binary or memory: http://ts-aia.ws.symantec.com/sha256-tss-ca.cer0(
    Source: Ordene 501527,pdf.exeString found in binary or memory: http://ts-crl.ws.symantec.com/sha256-tss-ca.crl0
    Source: Ordene 501527,pdf.exeString found in binary or memory: http://ts-ocsp.ws.symantec.com0;
    Source: FanControlWrapper.dll.0.drString found in binary or memory: http://www.digicert.com/CPS0
    Source: Ordene 501527,pdf.exeString found in binary or memory: https://d.symcb.com/cps0%
    Source: Ordene 501527,pdf.exeString found in binary or memory: https://d.symcb.com/rpa0
    Source: Ordene 501527,pdf.exeString found in binary or memory: https://d.symcb.com/rpa0.
    Source: FanControlWrapper.dll.0.drString found in binary or memory: https://www.digicert.com/CPS0
    Source: FanControlWrapper.dll.0.drString found in binary or memory: https://www.globalsign.com/repository/0
    Source: C:\Users\user\Desktop\Ordene 501527,pdf.exeCode function: 0_2_00405402 GetDlgItem,GetDlgItem,GetDlgItem,GetDlgItem,GetClientRect,GetSystemMetrics,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,ShowWindow,ShowWindow,GetDlgItem,SendMessageW,SendMessageW,SendMessageW,GetDlgItem,CreateThread,FindCloseChangeNotification,ShowWindow,ShowWindow,ShowWindow,ShowWindow,SendMessageW,CreatePopupMenu,AppendMenuW,GetWindowRect,TrackPopupMenu,SendMessageW,OpenClipboard,EmptyClipboard,GlobalAlloc,GlobalLock,SendMessageW,GlobalUnlock,SetClipboardData,CloseClipboard,0_2_00405402
    Source: Ordene 501527,pdf.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE
    Source: Ordene 501527,pdf.exe, 00000000.00000002.669383228.0000000000789000.00000004.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenameMicrosoft.Office.Tools.Common.v9.0.dlll% vs Ordene 501527,pdf.exe
    Source: Ordene 501527,pdf.exeStatic PE information: Resource name: RT_ICON type: GLS_BINARY_LSB_FIRST
    Source: C:\Users\user\Desktop\Ordene 501527,pdf.exeCode function: 0_2_00403350 EntryPoint,SetErrorMode,GetVersion,lstrlenA,#17,OleInitialize,SHGetFileInfoW,GetCommandLineW,GetModuleHandleW,CharNextW,GetTempPathW,GetTempPathW,GetWindowsDirectoryW,lstrcatW,GetTempPathW,lstrcatW,SetEnvironmentVariableW,SetEnvironmentVariableW,SetEnvironmentVariableW,DeleteFileW,OleUninitialize,ExitProcess,lstrcatW,lstrcatW,lstrcatW,lstrcmpiW,SetCurrentDirectoryW,DeleteFileW,CopyFileW,CloseHandle,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,ExitWindowsEx,ExitProcess,0_2_00403350
    Source: C:\Users\user\Desktop\Ordene 501527,pdf.exeCode function: 0_2_00404C3F0_2_00404C3F
    Source: Ordene 501527,pdf.exeStatic PE information: invalid certificate
    Source: C:\Users\user\Desktop\Ordene 501527,pdf.exeFile read: C:\Users\user\Desktop\Ordene 501527,pdf.exeJump to behavior
    Source: Ordene 501527,pdf.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
    Source: C:\Users\user\Desktop\Ordene 501527,pdf.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
    Source: C:\Users\user\Desktop\Ordene 501527,pdf.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f486a52-3cb1-48fd-8f50-b8dc300d9f9d}\InProcServer32Jump to behavior
    Source: C:\Users\user\Desktop\Ordene 501527,pdf.exeCode function: 0_2_00403350 EntryPoint,SetErrorMode,GetVersion,lstrlenA,#17,OleInitialize,SHGetFileInfoW,GetCommandLineW,GetModuleHandleW,CharNextW,GetTempPathW,GetTempPathW,GetWindowsDirectoryW,lstrcatW,GetTempPathW,lstrcatW,SetEnvironmentVariableW,SetEnvironmentVariableW,SetEnvironmentVariableW,DeleteFileW,OleUninitialize,ExitProcess,lstrcatW,lstrcatW,lstrcatW,lstrcmpiW,SetCurrentDirectoryW,DeleteFileW,CopyFileW,CloseHandle,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,ExitWindowsEx,ExitProcess,0_2_00403350
    Source: C:\Users\user\Desktop\Ordene 501527,pdf.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\MisundesJump to behavior
    Source: C:\Users\user\Desktop\Ordene 501527,pdf.exeFile created: C:\Users\user\AppData\Local\Temp\nsfE849.tmpJump to behavior
    Source: classification engineClassification label: mal52.troj.evad.winEXE@1/5@0/0
    Source: C:\Users\user\Desktop\Ordene 501527,pdf.exeCode function: 0_2_004020FE CoCreateInstance,0_2_004020FE
    Source: C:\Users\user\Desktop\Ordene 501527,pdf.exeFile read: C:\Users\desktop.iniJump to behavior
    Source: C:\Users\user\Desktop\Ordene 501527,pdf.exeCode function: 0_2_004046C3 GetDlgItem,SetWindowTextW,SHBrowseForFolderW,CoTaskMemFree,lstrcmpiW,lstrcatW,SetDlgItemTextW,GetDiskFreeSpaceW,MulDiv,SetDlgItemTextW,0_2_004046C3
    Source: Ordene 501527,pdf.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
    Source: Binary string: D:\SourceCode\GC3.Overclocking\production_V4.2\Service\ServiceSDK\Release\ThrottlePlugin\FanControlWrapper.pdb source: FanControlWrapper.dll.0.dr
    Source: Binary string: D:\SourceCode\GC3.Overclocking\production_V4.2\Service\ServiceSDK\Release\ThrottlePlugin\FanControlWrapper.pdb source: FanControlWrapper.dll.0.dr
    Source: Binary string: Microsoft.Office.Tools.Common.v9.0.pdb source: Microsoft.Office.Tools.Common.v9.0.dll.0.dr

    Data Obfuscation

    barindex
    Source: Yara matchFile source: 00000000.00000002.669759237.0000000002E00000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
    Source: C:\Users\user\Desktop\Ordene 501527,pdf.exeCode function: 0_2_10002DE0 push eax; ret 0_2_10002E0E
    Source: FanControlWrapper.dll.0.drStatic PE information: section name: .nep
    Source: C:\Users\user\Desktop\Ordene 501527,pdf.exeCode function: 0_2_10001B18 GlobalAlloc,lstrcpyW,lstrcpyW,GlobalFree,GlobalFree,GlobalFree,GlobalFree,GlobalFree,GlobalFree,lstrcpyW,GetModuleHandleW,LoadLibraryW,GetProcAddress,lstrlenW,0_2_10001B18
    Source: C:\Users\user\Desktop\Ordene 501527,pdf.exeFile created: C:\Users\user\AppData\Local\Temp\nshB62A.tmp\System.dllJump to dropped file
    Source: C:\Users\user\Desktop\Ordene 501527,pdf.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Misundes\Caesural4\Kvalitative209\Microsoft.Office.Tools.Common.v9.0.dllJump to dropped file
    Source: C:\Users\user\Desktop\Ordene 501527,pdf.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Misundes\Caesural4\Kvalitative209\FanControlWrapper.dllJump to dropped file
    Source: C:\Users\user\Desktop\Ordene 501527,pdf.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\MisundesJump to behavior
    Source: C:\Users\user\Desktop\Ordene 501527,pdf.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Misundes\Caesural4Jump to behavior
    Source: C:\Users\user\Desktop\Ordene 501527,pdf.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Misundes\Caesural4\PerciformJump to behavior
    Source: C:\Users\user\Desktop\Ordene 501527,pdf.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Misundes\Caesural4\Perciform\SelskabeligJump to behavior
    Source: C:\Users\user\Desktop\Ordene 501527,pdf.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Misundes\Caesural4\Perciform\Selskabelig\HjemmeopgavenJump to behavior
    Source: C:\Users\user\Desktop\Ordene 501527,pdf.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Misundes\Caesural4\Perciform\Selskabelig\Hjemmeopgaven\vrkstedsbygningerJump to behavior
    Source: C:\Users\user\Desktop\Ordene 501527,pdf.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Misundes\Caesural4\Perciform\Selskabelig\Hjemmeopgaven\vrkstedsbygninger\Ricciaceae185.IncJump to behavior
    Source: C:\Users\user\Desktop\Ordene 501527,pdf.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Misundes\Caesural4\Kvalitative209Jump to behavior
    Source: C:\Users\user\Desktop\Ordene 501527,pdf.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Misundes\Caesural4\Kvalitative209\FanControlWrapper.dllJump to behavior
    Source: C:\Users\user\Desktop\Ordene 501527,pdf.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Misundes\Caesural4\Kvalitative209\Microsoft.Office.Tools.Common.v9.0.dllJump to behavior
    Source: C:\Users\user\Desktop\Ordene 501527,pdf.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Misundes\Caesural4\Kvalitative209\edit-cut-symbolic.svgJump to behavior
    Source: C:\Users\user\Desktop\Ordene 501527,pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

    Malware Analysis System Evasion

    barindex
    Source: C:\Users\user\Desktop\Ordene 501527,pdf.exeRDTSC instruction interceptor: First address: 0000000002E0057D second address: 0000000002E0057D instructions: 0x00000000 rdtsc 0x00000002 test ah, dh 0x00000004 cmp ebx, ecx 0x00000006 jc 00007F971C9F8BF8h 0x00000008 inc ebp 0x00000009 inc ebx 0x0000000a rdtsc
    Source: C:\Users\user\Desktop\Ordene 501527,pdf.exeDropped PE file which has not been started: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Misundes\Caesural4\Kvalitative209\Microsoft.Office.Tools.Common.v9.0.dllJump to dropped file
    Source: C:\Users\user\Desktop\Ordene 501527,pdf.exeDropped PE file which has not been started: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Misundes\Caesural4\Kvalitative209\FanControlWrapper.dllJump to dropped file
    Source: C:\Users\user\Desktop\Ordene 501527,pdf.exeCode function: 0_2_0040596D GetTempPathW,DeleteFileW,lstrcatW,lstrcatW,lstrlenW,FindFirstFileW,FindNextFileW,FindClose,0_2_0040596D
    Source: C:\Users\user\Desktop\Ordene 501527,pdf.exeCode function: 0_2_004065A2 FindFirstFileW,FindClose,0_2_004065A2
    Source: C:\Users\user\Desktop\Ordene 501527,pdf.exeCode function: 0_2_00402862 FindFirstFileW,0_2_00402862
    Source: C:\Users\user\Desktop\Ordene 501527,pdf.exeAPI call chain: ExitProcess graph end nodegraph_0-3976
    Source: C:\Users\user\Desktop\Ordene 501527,pdf.exeAPI call chain: ExitProcess graph end nodegraph_0-4155
    Source: C:\Users\user\Desktop\Ordene 501527,pdf.exeCode function: 0_2_10001B18 GlobalAlloc,lstrcpyW,lstrcpyW,GlobalFree,GlobalFree,GlobalFree,GlobalFree,GlobalFree,GlobalFree,lstrcpyW,GetModuleHandleW,LoadLibraryW,GetProcAddress,lstrlenW,0_2_10001B18
    Source: C:\Users\user\Desktop\Ordene 501527,pdf.exeCode function: 0_2_00403350 EntryPoint,SetErrorMode,GetVersion,lstrlenA,#17,OleInitialize,SHGetFileInfoW,GetCommandLineW,GetModuleHandleW,CharNextW,GetTempPathW,GetTempPathW,GetWindowsDirectoryW,lstrcatW,GetTempPathW,lstrcatW,SetEnvironmentVariableW,SetEnvironmentVariableW,SetEnvironmentVariableW,DeleteFileW,OleUninitialize,ExitProcess,lstrcatW,lstrcatW,lstrcatW,lstrcmpiW,SetCurrentDirectoryW,DeleteFileW,CopyFileW,CloseHandle,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,ExitWindowsEx,ExitProcess,0_2_00403350
    Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
    Valid Accounts1
    Native API
    1
    Registry Run Keys / Startup Folder
    1
    Access Token Manipulation
    1
    Masquerading
    OS Credential Dumping1
    Security Software Discovery
    Remote Services1
    Archive Collected Data
    Exfiltration Over Other Network Medium1
    Encrypted Channel
    Eavesdrop on Insecure Network CommunicationRemotely Track Device Without Authorization1
    System Shutdown/Reboot
    Default AccountsScheduled Task/JobBoot or Logon Initialization Scripts1
    Registry Run Keys / Startup Folder
    1
    Access Token Manipulation
    LSASS Memory2
    File and Directory Discovery
    Remote Desktop Protocol1
    Clipboard Data
    Exfiltration Over BluetoothJunk DataExploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
    Domain AccountsAt (Linux)Logon Script (Windows)Logon Script (Windows)1
    Obfuscated Files or Information
    Security Account Manager13
    System Information Discovery
    SMB/Windows Admin SharesData from Network Shared DriveAutomated ExfiltrationSteganographyExploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
    Hide Legend

    Legend:

    • Process
    • Signature
    • Created File
    • DNS/IP Info
    • Is Dropped
    • Is Windows Process
    • Number of created Registry Values
    • Number of created Files
    • Visual Basic
    • Delphi
    • Java
    • .Net C# or VB.NET
    • C, C++ or other language
    • Is malicious
    • Internet

    This section contains all screenshots as thumbnails, including those not shown in the slideshow.


    windows-stand
    SourceDetectionScannerLabelLink
    Ordene 501527,pdf.exe7%ReversingLabsWin32.Malware.Tedy
    SourceDetectionScannerLabelLink
    C:\Users\user\AppData\Local\Temp\nshB62A.tmp\System.dll3%MetadefenderBrowse
    C:\Users\user\AppData\Local\Temp\nshB62A.tmp\System.dll0%ReversingLabs
    C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Misundes\Caesural4\Kvalitative209\FanControlWrapper.dll0%MetadefenderBrowse
    C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Misundes\Caesural4\Kvalitative209\FanControlWrapper.dll0%ReversingLabs
    C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Misundes\Caesural4\Kvalitative209\Microsoft.Office.Tools.Common.v9.0.dll0%MetadefenderBrowse
    C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Misundes\Caesural4\Kvalitative209\Microsoft.Office.Tools.Common.v9.0.dll0%ReversingLabs
    No Antivirus matches
    No Antivirus matches
    No Antivirus matches
    No contacted domains info
    NameSourceMaliciousAntivirus DetectionReputation
    http://nsis.sf.net/NSIS_ErrorErrorOrdene 501527,pdf.exefalse
      high
      No contacted IP infos
      Joe Sandbox Version:35.0.0 Citrine
      Analysis ID:680367
      Start date and time: 08/08/202213:21:192022-08-08 13:21:19 +02:00
      Joe Sandbox Product:CloudBasic
      Overall analysis duration:0h 5m 21s
      Hypervisor based Inspection enabled:false
      Report type:full
      Sample file name:Ordene 501527,pdf.exe
      Cookbook file name:default.jbs
      Analysis system description:Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 85, IE 11, Adobe Reader DC 19, Java 8 Update 211
      Number of analysed new started processes analysed:15
      Number of new started drivers analysed:0
      Number of existing processes analysed:0
      Number of existing drivers analysed:0
      Number of injected processes analysed:0
      Technologies:
      • HCA enabled
      • EGA enabled
      • HDC enabled
      • AMSI enabled
      Analysis Mode:default
      Analysis stop reason:Timeout
      Detection:MAL
      Classification:mal52.troj.evad.winEXE@1/5@0/0
      EGA Information:
      • Successful, ratio: 100%
      HDC Information:
      • Successful, ratio: 62.8% (good quality ratio 61.5%)
      • Quality average: 87.8%
      • Quality standard deviation: 22.4%
      HCA Information:
      • Successful, ratio: 100%
      • Number of executed functions: 34
      • Number of non-executed functions: 35
      Cookbook Comments:
      • Found application associated with file extension: .exe
      • Adjust boot time
      • Enable AMSI
      • Exclude process from analysis (whitelisted): MpCmdRun.exe, audiodg.exe, BackgroundTransferHost.exe, HxTsr.exe, WMIADAP.exe, conhost.exe, backgroundTaskHost.exe, svchost.exe
      • Excluded domains from analysis (whitelisted): www.bing.com, licensing.mp.microsoft.com, client.wns.windows.com, fs.microsoft.com, store-images.s-microsoft.com, login.live.com, ctldl.windowsupdate.com, img-prod-cms-rt-microsoft-com.akamaized.net, arc.msn.com
      • Not all processes where analyzed, report is missing behavior information
      No simulations
      No context
      No context
      No context
      No context
      MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
      C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Misundes\Caesural4\Kvalitative209\FanControlWrapper.dllDHL_119050 de recibo,PDF.exeGet hashmaliciousBrowse
        DHL_119050 de recibo,PDF.exeGet hashmaliciousBrowse
          C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Misundes\Caesural4\Kvalitative209\Microsoft.Office.Tools.Common.v9.0.dllDHL_119050 de recibo,PDF.exeGet hashmaliciousBrowse
            DHL_119050 de recibo,PDF.exeGet hashmaliciousBrowse
              C:\Users\user\AppData\Local\Temp\nshB62A.tmp\System.dllDHL_119050 de recibo,PDF.exeGet hashmaliciousBrowse
                DHL_119050 de recibo,PDF.exeGet hashmaliciousBrowse
                  Process:C:\Users\user\Desktop\Ordene 501527,pdf.exe
                  File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                  Category:dropped
                  Size (bytes):11776
                  Entropy (8bit):5.659384359264642
                  Encrypted:false
                  SSDEEP:192:ex24sihno00Wfl97nH6BenXwWobpWBTtvShJ5omi7dJWjOlESlS:h8QIl972eXqlWBFSt273YOlEz
                  MD5:8B3830B9DBF87F84DDD3B26645FED3A0
                  SHA1:223BEF1F19E644A610A0877D01EADC9E28299509
                  SHA-256:F004C568D305CD95EDBD704166FCD2849D395B595DFF814BCC2012693527AC37
                  SHA-512:D13CFD98DB5CA8DC9C15723EEE0E7454975078A776BCE26247228BE4603A0217E166058EBADC68090AFE988862B7514CB8CB84DE13B3DE35737412A6F0A8AC03
                  Malicious:false
                  Antivirus:
                  • Antivirus: Metadefender, Detection: 3%, Browse
                  • Antivirus: ReversingLabs, Detection: 0%
                  Joe Sandbox View:
                  • Filename: DHL_119050 de recibo,PDF.exe, Detection: malicious, Browse
                  • Filename: DHL_119050 de recibo,PDF.exe, Detection: malicious, Browse
                  Reputation:low
                  Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......1...u.u.u...s.u.a....r.!..q....t....t.Richu.........................PE..L.....uY...........!..... ...........'.......0...............................`.......................................2.......0..P............................P.......................................................0..X............................text............ .................. ..`.rdata..S....0.......$..............@..@.data...x....@.......(..............@....reloc..`....P.......*..............@..B................................................................................................................................................................................................................................................................................................................................................................................
                  Process:C:\Users\user\Desktop\Ordene 501527,pdf.exe
                  File Type:PE32+ executable (DLL) (GUI) x86-64 Mono/.Net assembly, for MS Windows
                  Category:dropped
                  Size (bytes):53480
                  Entropy (8bit):6.013119476725682
                  Encrypted:false
                  SSDEEP:768:Sd5iVw6ve4HsIrMTW5q6Aq2g1AEpwhaPvWFzg4KClyQ2c94PkhEeaA2X9qKh:s4wmnMT6Jp2g1a4s+7
                  MD5:8D512C6FFE33E6B77981497ED40D9092
                  SHA1:A31DE10B01C626D528FEF987CE5D7DB68D228849
                  SHA-256:25673566002F8EEF81872E2913DA0E44D0B7480EF824EDD1C12D725A122CAE1C
                  SHA-512:479DDADE0F58CFDEB43EEACD38D0CE8A361275A2BD4257CDF4FA3DD5A5FEEF231E6E41D0F2BF3F17AF8DF38B0DB72114677C42B69865F90F81329041CDFBB4A5
                  Malicious:false
                  Antivirus:
                  • Antivirus: Metadefender, Detection: 0%, Browse
                  • Antivirus: ReversingLabs, Detection: 0%
                  Joe Sandbox View:
                  • Filename: DHL_119050 de recibo,PDF.exe, Detection: malicious, Browse
                  • Filename: DHL_119050 de recibo,PDF.exe, Detection: malicious, Browse
                  Reputation:low
                  Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......3..-w..~w..~w..~~..~q..~%..t..~...s..~i..~u..~%..d..~%.....~%..u..~...u..~w..~Y..~...r..~...v..~..x~v..~w..~v..~...v..~Richw..~................PE..d...h6;a.........." .....2...........>..............................................$(....`......................................... ...........................................@....S..p............................T...............P..............XS..H............text............0.................. ..`.nep....p....@.......4.............. ..`.rdata..$m...P...n...6..............@..@.data...............................@....pdata..............................@..@.rsrc...............................@..@.reloc..@...........................@..B................................................................................................................................................................................
                  Process:C:\Users\user\Desktop\Ordene 501527,pdf.exe
                  File Type:PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
                  Category:dropped
                  Size (bytes):356352
                  Entropy (8bit):5.597789776248351
                  Encrypted:false
                  SSDEEP:6144:gAENg6Ta1Hjxcv/IUIuoeT/xK6ur6EaPC:gdgbFK/IU7T/xK6ur6EaP
                  MD5:E047210B4CE2BBF0F6A9819031C5874A
                  SHA1:FBE964CABCD15468EFF6848ACE2F49E194C2B1B4
                  SHA-256:F0C45C94B8B1B38718FD373E9E98BF76A5552D8405DE3A98A6CADBE9610F7E74
                  SHA-512:57754F490FAD208076EA717470E431493396556E5DC4BE53ED2ACFBBC00857B9F6A5AEDA66FFE82F4E4CF405ABEF16E72F77535932E9D166CC4F3DE262AC09D8
                  Malicious:false
                  Antivirus:
                  • Antivirus: Metadefender, Detection: 0%, Browse
                  • Antivirus: ReversingLabs, Detection: 0%
                  Joe Sandbox View:
                  • Filename: DHL_119050 de recibo,PDF.exe, Detection: malicious, Browse
                  • Filename: DHL_119050 de recibo,PDF.exe, Detection: malicious, Browse
                  Reputation:low
                  Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...H..H...........!.........P.......-... ...@....UA. ....................................@..................................-..W....@..`7...........................,............................................... ............... ..H............text........ ...................... ..`.rsrc...`7...@...@... ..............@..@.reloc...............`..............@..B........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                  Process:C:\Users\user\Desktop\Ordene 501527,pdf.exe
                  File Type:SVG Scalable Vector Graphics image
                  Category:dropped
                  Size (bytes):1327
                  Entropy (8bit):4.272364610533777
                  Encrypted:false
                  SSDEEP:24:2dPnnxu3tlKpRe+9abXi2QP+60wWgP7IC233P+60cXW7GTNWgPN:cfnHFabXij+zgP7ICK+r7GTUgPN
                  MD5:36C1AE9391F50D4AD3A1E61CA30CBFCB
                  SHA1:DF3D58AB8DBFD1CE9F0456C4F8C84440A1005507
                  SHA-256:9FDDABAAF63AE19BA00A965BBDAACAC3703AB2F055661040A4ACFF2882D0087B
                  SHA-512:180D77E3FA447CED1276C2E2070E110667530C864C71961E97E80B51C214C7BEBF604104F6A0DF87A4779E6E3AD08C5A574278F70C6D36C083FE727B1DD66476
                  Malicious:false
                  Reputation:low
                  Preview:<?xml version="1.0" encoding="UTF-8"?>.<svg height="16px" viewBox="0 0 16 16" width="16px" xmlns="http://www.w3.org/2000/svg">. <g fill="#2e3436">. <path d="m 14 1 l -5.203125 4.972656 l 1.5625 1.527344 l 5.640625 -5.5 v -1 z m -6.804688 6.5 l -2.976562 2.84375 l 1.6875 1.5 l 2.890625 -2.816406 z m 0 0"/>. <path d="m 4.21875 5.65625 l 9.78125 9.34375 h 2 v -1 l -10.09375 -9.84375 z m 0 0"/>. <path d="m 5.972656 1.019531 c -1.359375 -1.359375 -3.59375 -1.359375 -4.953125 0 c -1.359375 1.359375 -1.359375 3.59375 0 4.953125 s 3.59375 1.363282 4.953125 0 c 1.359375 -1.359375 1.359375 -3.59375 0 -4.953125 z m -1.414062 1.414063 c 0.597656 0.59375 0.597656 1.53125 0 2.125 c -0.59375 0.597656 -1.527344 0.597656 -2.125 0 c -0.59375 -0.59375 -0.59375 -1.527344 0 -2.125 c 0.597656 -0.59375 1.53125 -0.59375 2.125 0 z m 0 0"/>. <path d="m 5.972656 10.019531 c -1.359375 -1.359375 -3.59375 -1.359375 -4.953125 0 c -1.359375 1.359375 -1.359375 3.597657 0 4.957031 c 1.359
                  Process:C:\Users\user\Desktop\Ordene 501527,pdf.exe
                  File Type:data
                  Category:dropped
                  Size (bytes):76679
                  Entropy (8bit):6.814432315698124
                  Encrypted:false
                  SSDEEP:1536:XJV/wgXTw40tzGcM8E7nhHaxpqeGhJrfBxdKTi:XJWgXTyvE7nqMhJvL
                  MD5:FFDF86E18706923E73DE9A5D67A8C9EB
                  SHA1:F01102765BEEB1330F29E2427C9559EDBEEA8D4E
                  SHA-256:63D2CBFFAB97859707640C94C9810AF953093F01FF0E7FDB2DBFF3827935EDC0
                  SHA-512:1D3E7DD9A687580682CB827CAB4C3D50F9EEC145411EEE24261DB0F89B8A087B5B6DE57B33E2D6B6E807D9AA79005050E5E09A4D58FC60F4E48F31BD32C7BF72
                  Malicious:false
                  Reputation:low
                  Preview:8..f9.8.f9..r..._.b.f9.....X.......?.u/8..nf._....u ..,..8..,9.....u...f.^.f.^.9...;..........X......f._...............$.........f9.......5h...f.^..b..9.5..q...X.f9.f._.8...#m.f.^........n........r..E5..........f._.f._.f.^.8.-.....^.f._......f9.P.............wZ.............8..@......1.......=....f9.f._.=.....4.! .W..f9....9...D9...b.........9.u..u......W..o..X..$...f9..........W!#.zg.9.8.Z.a.%.}+:.!_........^.@.hW0.>LQ{.N.."%eA.U5..v./.....G.n.j`K..7.((....rL\.g..5.......w.a.QY.*...puv.0......~.)....l..(.((.((.((.((.((.((.((.((.((.((.((.((.((..Q.9.8.Z.a.%.}+:.!_........^.@.hW0.>LQ{.N.."%eA.U5..v./.....G.n.j`K..7.((....rL\.g..5.......w.a.QY.*...puv.0......~.)....l...((.((.((.((.((.((.((.((.((.((.((.((.((.((.((.((.((.....((.((.((.((.((.((.((.((.((.((.((.((.((.((.((..x.Q....((.((.((.((.((.((.((.((.((.((.((.((.((.((.(....s{(.((.((.((.((.((.((.((.((.((.((.((.((.((.((....... ..P...3....5z......m.......((.((.((.((.((.((.((.((.((.((.((.((.((.((.((.((.((.(...(.((.
                  File type:PE32 executable (GUI) Intel 80386, for MS Windows, Nullsoft Installer self-extracting archive
                  Entropy (8bit):6.549201429075207
                  TrID:
                  • Win32 Executable (generic) a (10002005/4) 99.96%
                  • Generic Win/DOS Executable (2004/3) 0.02%
                  • DOS Executable Generic (2002/1) 0.02%
                  • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                  File name:Ordene 501527,pdf.exe
                  File size:596608
                  MD5:5162b6782f86f1f24e8610544d159ae9
                  SHA1:0d1ead84c74ee462976928783c1f733aa859bc94
                  SHA256:6730e52c8075c7e044c2bbaf9f7ad8c0f7f8d03fb23adbd2331adc8b591caec7
                  SHA512:ccbea38e4c47edf9172e47f8ea884bae222365500d17bc5d95bef911d64feb6857ac7c2d99bd9b6a0a6112a042ea0e74cd958b656883912827451f21c5113f83
                  SSDEEP:6144:B6bAcJOv+qlAcxp8XNbu0lTCzYQhb3VG+rmAYJDB5aRELlQBjokpKE+c0AzugkGd:a+NniSb3VtrHSaklQBjo0KE+72jCMii
                  TLSH:96C4AE4179B86ED3F57E03716CA7869212A8EC141672E71B3192FE17B4B23532B0F29D
                  File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........!`G.@...@...@../OQ..@...@..I@../OS..@...c>..@..+F...@..Rich.@..........................PE..L.....uY.................d....:....
                  Icon Hash:71c884a498dc7890
                  Entrypoint:0x403350
                  Entrypoint Section:.text
                  Digitally signed:true
                  Imagebase:0x400000
                  Subsystem:windows gui
                  Image File Characteristics:RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE
                  DLL Characteristics:DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                  Time Stamp:0x59759518 [Mon Jul 24 06:35:04 2017 UTC]
                  TLS Callbacks:
                  CLR (.Net) Version:
                  OS Version Major:4
                  OS Version Minor:0
                  File Version Major:4
                  File Version Minor:0
                  Subsystem Version Major:4
                  Subsystem Version Minor:0
                  Import Hash:b34f154ec913d2d2c435cbd644e91687
                  Signature Valid:false
                  Signature Issuer:CN="Murdock Hjernespinds Orddannelserne ", OU="Beauti Pilede ", E=Sheeting@Beredelse213.Syn, O=Stregens, L=La Haie-Traversaine, S=Pays de la Loire, C=FR
                  Signature Validation Error:A certificate chain processed, but terminated in a root certificate which is not trusted by the trust provider
                  Error Number:-2146762487
                  Not Before, Not After
                  • 8/7/2022 8:49:24 PM 8/6/2025 8:49:24 PM
                  Subject Chain
                  • CN="Murdock Hjernespinds Orddannelserne ", OU="Beauti Pilede ", E=Sheeting@Beredelse213.Syn, O=Stregens, L=La Haie-Traversaine, S=Pays de la Loire, C=FR
                  Version:3
                  Thumbprint MD5:D9460ED9973B95EA8561C6C26E032EC9
                  Thumbprint SHA-1:64BCC2EC4F74B5FAADE9D48BAC0D710AFF171E4F
                  Thumbprint SHA-256:599928258A412563BC2620CAD41D51A4EDCF5C8E724A9DF73E6996094DA70D1E
                  Serial:F03396B055CCF99F
                  Instruction
                  sub esp, 000002D4h
                  push ebx
                  push esi
                  push edi
                  push 00000020h
                  pop edi
                  xor ebx, ebx
                  push 00008001h
                  mov dword ptr [esp+14h], ebx
                  mov dword ptr [esp+10h], 0040A2E0h
                  mov dword ptr [esp+1Ch], ebx
                  call dword ptr [004080A8h]
                  call dword ptr [004080A4h]
                  and eax, BFFFFFFFh
                  cmp ax, 00000006h
                  mov dword ptr [007A8A2Ch], eax
                  je 00007F971C9E3083h
                  push ebx
                  call 00007F971C9E6319h
                  cmp eax, ebx
                  je 00007F971C9E3079h
                  push 00000C00h
                  call eax
                  mov esi, 004082B0h
                  push esi
                  call 00007F971C9E6293h
                  push esi
                  call dword ptr [00408150h]
                  lea esi, dword ptr [esi+eax+01h]
                  cmp byte ptr [esi], 00000000h
                  jne 00007F971C9E305Ch
                  push 0000000Ah
                  call 00007F971C9E62ECh
                  push 00000008h
                  call 00007F971C9E62E5h
                  push 00000006h
                  mov dword ptr [007A8A24h], eax
                  call 00007F971C9E62D9h
                  cmp eax, ebx
                  je 00007F971C9E3081h
                  push 0000001Eh
                  call eax
                  test eax, eax
                  je 00007F971C9E3079h
                  or byte ptr [007A8A2Fh], 00000040h
                  push ebp
                  call dword ptr [00408044h]
                  push ebx
                  call dword ptr [004082A0h]
                  mov dword ptr [007A8AF8h], eax
                  push ebx
                  lea eax, dword ptr [esp+34h]
                  push 000002B4h
                  push eax
                  push ebx
                  push 0079FEE0h
                  call dword ptr [00408188h]
                  push 0040A2C8h
                  Programming Language:
                  • [EXP] VC++ 6.0 SP5 build 8804
                  NameVirtual AddressVirtual Size Is in Section
                  IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                  IMAGE_DIRECTORY_ENTRY_IMPORT0x84fc0xa0.rdata
                  IMAGE_DIRECTORY_ENTRY_RESOURCE0x3c40000x59b58.rsrc
                  IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                  IMAGE_DIRECTORY_ENTRY_SECURITY0x8fd600x1d20.data
                  IMAGE_DIRECTORY_ENTRY_BASERELOC0x00x0
                  IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                  IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                  IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                  IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                  IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                  IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                  IMAGE_DIRECTORY_ENTRY_IAT0x80000x2b0.rdata
                  IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                  IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                  IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                  NameVirtual AddressVirtual SizeRaw SizeXored PEZLIB ComplexityFile TypeEntropyCharacteristics
                  .text0x10000x63c80x6400False0.6766015625data6.504099201068482IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                  .rdata0x80000x138e0x1400False0.4509765625data5.146454805063938IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                  .data0xa0000x39eb380x600unknownunknownunknownunknownIMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                  .ndata0x3a90000x1b0000x0False0empty0.0IMAGE_SCN_CNT_UNINITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                  .rsrc0x3c40000x59b580x59c00False0.4010598015320334data5.323726974368565IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                  NameRVASizeTypeLanguageCountry
                  RT_ICON0x3c43280x42028dBase IV DBT, blocks size 0, block length 8192, next free block index 40, next free block 0, next used block 0EnglishUnited States
                  RT_ICON0x4063500xe8bePNG image data, 256 x 256, 8-bit/color RGBA, non-interlacedEnglishUnited States
                  RT_ICON0x414c100x4228dBase IV DBT of \200.DBF, blocks size 0, block length 16896, next free block index 40, next free block 4294967295, next used block 4294967295EnglishUnited States
                  RT_ICON0x418e380x25a8dataEnglishUnited States
                  RT_ICON0x41b3e00x10a8dataEnglishUnited States
                  RT_ICON0x41c4880x988dataEnglishUnited States
                  RT_ICON0x41ce100x468GLS_BINARY_LSB_FIRSTEnglishUnited States
                  RT_DIALOG0x41d2780x100dataEnglishUnited States
                  RT_DIALOG0x41d3780x11cdataEnglishUnited States
                  RT_DIALOG0x41d4980xc4dataEnglishUnited States
                  RT_DIALOG0x41d5600x60dataEnglishUnited States
                  RT_GROUP_ICON0x41d5c00x68dataEnglishUnited States
                  RT_VERSION0x41d6280x1ecdataEnglishUnited States
                  RT_MANIFEST0x41d8180x33eXML 1.0 document, ASCII text, with very long lines, with no line terminatorsEnglishUnited States
                  DLLImport
                  KERNEL32.dllSetEnvironmentVariableW, SetFileAttributesW, Sleep, GetTickCount, GetFileSize, GetModuleFileNameW, GetCurrentProcess, CopyFileW, SetCurrentDirectoryW, GetFileAttributesW, GetWindowsDirectoryW, GetTempPathW, GetCommandLineW, GetVersion, SetErrorMode, lstrlenW, lstrcpynW, GetDiskFreeSpaceW, ExitProcess, GetShortPathNameW, CreateThread, GetLastError, CreateDirectoryW, CreateProcessW, RemoveDirectoryW, lstrcmpiA, CreateFileW, GetTempFileNameW, WriteFile, lstrcpyA, MoveFileExW, lstrcatW, GetSystemDirectoryW, GetProcAddress, GetModuleHandleA, GetExitCodeProcess, WaitForSingleObject, lstrcmpiW, MoveFileW, GetFullPathNameW, SetFileTime, SearchPathW, CompareFileTime, lstrcmpW, CloseHandle, ExpandEnvironmentStringsW, GlobalFree, GlobalLock, GlobalUnlock, GlobalAlloc, FindFirstFileW, FindNextFileW, DeleteFileW, SetFilePointer, ReadFile, FindClose, lstrlenA, MulDiv, MultiByteToWideChar, WideCharToMultiByte, GetPrivateProfileStringW, WritePrivateProfileStringW, FreeLibrary, LoadLibraryExW, GetModuleHandleW
                  USER32.dllGetSystemMenu, SetClassLongW, EnableMenuItem, IsWindowEnabled, SetWindowPos, GetSysColor, GetWindowLongW, SetCursor, LoadCursorW, CheckDlgButton, GetMessagePos, LoadBitmapW, CallWindowProcW, IsWindowVisible, CloseClipboard, SetClipboardData, EmptyClipboard, OpenClipboard, ScreenToClient, GetWindowRect, GetDlgItem, GetSystemMetrics, SetDlgItemTextW, GetDlgItemTextW, MessageBoxIndirectW, CharPrevW, CharNextA, wsprintfA, DispatchMessageW, PeekMessageW, ReleaseDC, EnableWindow, InvalidateRect, SendMessageW, DefWindowProcW, BeginPaint, GetClientRect, FillRect, DrawTextW, EndDialog, RegisterClassW, SystemParametersInfoW, CreateWindowExW, GetClassInfoW, DialogBoxParamW, CharNextW, ExitWindowsEx, DestroyWindow, GetDC, SetTimer, SetWindowTextW, LoadImageW, SetForegroundWindow, ShowWindow, IsWindow, SetWindowLongW, FindWindowExW, TrackPopupMenu, AppendMenuW, CreatePopupMenu, EndPaint, CreateDialogParamW, SendMessageTimeoutW, wsprintfW, PostQuitMessage
                  GDI32.dllSelectObject, SetBkMode, CreateFontIndirectW, SetTextColor, DeleteObject, GetDeviceCaps, CreateBrushIndirect, SetBkColor
                  SHELL32.dllSHGetSpecialFolderLocation, ShellExecuteExW, SHGetPathFromIDListW, SHBrowseForFolderW, SHGetFileInfoW, SHFileOperationW
                  ADVAPI32.dllAdjustTokenPrivileges, RegCreateKeyExW, RegOpenKeyExW, SetFileSecurityW, OpenProcessToken, LookupPrivilegeValueW, RegEnumValueW, RegDeleteKeyW, RegDeleteValueW, RegCloseKey, RegSetValueExW, RegQueryValueExW, RegEnumKeyW
                  COMCTL32.dllImageList_Create, ImageList_AddMasked, ImageList_Destroy
                  ole32.dllOleUninitialize, OleInitialize, CoTaskMemFree, CoCreateInstance
                  Language of compilation systemCountry where language is spokenMap
                  EnglishUnited States
                  No network behavior found

                  Click to jump to process

                  Click to jump to process

                  Target ID:0
                  Start time:13:22:19
                  Start date:08/08/2022
                  Path:C:\Users\user\Desktop\Ordene 501527,pdf.exe
                  Wow64 process (32bit):true
                  Commandline:"C:\Users\user\Desktop\Ordene 501527,pdf.exe"
                  Imagebase:0x400000
                  File size:596608 bytes
                  MD5 hash:5162B6782F86F1F24E8610544D159AE9
                  Has elevated privileges:true
                  Has administrator privileges:true
                  Programmed in:C, C++ or other language
                  Yara matches:
                  • Rule: JoeSecurity_GuLoader_2, Description: Yara detected GuLoader, Source: 00000000.00000002.669759237.0000000002E00000.00000040.00001000.00020000.00000000.sdmp, Author: Joe Security
                  Reputation:low

                  Reset < >

                    Execution Graph

                    Execution Coverage:18.1%
                    Dynamic/Decrypted Code Coverage:0%
                    Signature Coverage:18.8%
                    Total number of Nodes:1544
                    Total number of Limit Nodes:37
                    execution_graph 4842 10001000 4845 1000101b 4842->4845 4852 10001516 4845->4852 4847 10001020 4848 10001024 4847->4848 4849 10001027 GlobalAlloc 4847->4849 4850 1000153d 3 API calls 4848->4850 4849->4848 4851 10001019 4850->4851 4853 1000151c 4852->4853 4854 10001522 4853->4854 4855 1000152e GlobalFree 4853->4855 4854->4847 4855->4847 4416 401941 4417 401943 4416->4417 4422 402c37 4417->4422 4420 40596d 67 API calls 4421 401951 4420->4421 4423 402c43 4422->4423 4424 406281 17 API calls 4423->4424 4425 402c64 4424->4425 4426 401948 4425->4426 4427 4064f3 5 API calls 4425->4427 4426->4420 4427->4426 4428 4015c1 4429 402c37 17 API calls 4428->4429 4430 4015c8 4429->4430 4431 405bdb 4 API calls 4430->4431 4441 4015d1 4431->4441 4432 401631 4434 401663 4432->4434 4435 401636 4432->4435 4433 405b5d CharNextW 4433->4441 4438 401423 24 API calls 4434->4438 4447 401423 4435->4447 4444 40165b 4438->4444 4440 40580f 2 API calls 4440->4441 4441->4432 4441->4433 4441->4440 4442 40582c 5 API calls 4441->4442 4445 401617 GetFileAttributesW 4441->4445 4446 405792 4 API calls 4441->4446 4442->4441 4443 40164a SetCurrentDirectoryW 4443->4444 4445->4441 4446->4441 4448 4052c3 24 API calls 4447->4448 4449 401431 4448->4449 4450 40625f lstrcpynW 4449->4450 4450->4443 4856 404342 lstrlenW 4857 404361 4856->4857 4858 404363 WideCharToMultiByte 4856->4858 4857->4858 4524 401e43 4532 402c15 4524->4532 4526 401e49 4527 402c15 17 API calls 4526->4527 4528 401e55 4527->4528 4529 401e61 ShowWindow 4528->4529 4530 401e6c EnableWindow 4528->4530 4531 402abf 4529->4531 4530->4531 4533 406281 17 API calls 4532->4533 4534 402c2a 4533->4534 4534->4526 4859 4046c3 4860 404700 4859->4860 4861 4046ef 4859->4861 4862 40470c GetDlgItem 4860->4862 4869 40476b 4860->4869 4920 4058a5 GetDlgItemTextW 4861->4920 4864 404720 4862->4864 4868 404734 SetWindowTextW 4864->4868 4872 405bdb 4 API calls 4864->4872 4865 40484f 4918 4049fe 4865->4918 4922 4058a5 GetDlgItemTextW 4865->4922 4866 4046fa 4867 4064f3 5 API calls 4866->4867 4867->4860 4873 4041f4 18 API calls 4868->4873 4869->4865 4874 406281 17 API calls 4869->4874 4869->4918 4871 40425b 8 API calls 4876 404a12 4871->4876 4877 40472a 4872->4877 4878 404750 4873->4878 4879 4047df SHBrowseForFolderW 4874->4879 4875 40487f 4880 405c38 18 API calls 4875->4880 4877->4868 4884 405b30 3 API calls 4877->4884 4881 4041f4 18 API calls 4878->4881 4879->4865 4882 4047f7 CoTaskMemFree 4879->4882 4883 404885 4880->4883 4885 40475e 4881->4885 4886 405b30 3 API calls 4882->4886 4923 40625f lstrcpynW 4883->4923 4884->4868 4921 404229 SendMessageW 4885->4921 4888 404804 4886->4888 4891 40483b SetDlgItemTextW 4888->4891 4895 406281 17 API calls 4888->4895 4890 404764 4894 406639 5 API calls 4890->4894 4891->4865 4892 40489c 4893 406639 5 API calls 4892->4893 4901 4048a3 4893->4901 4894->4869 4896 404823 lstrcmpiW 4895->4896 4896->4891 4898 404834 lstrcatW 4896->4898 4897 4048e4 4924 40625f lstrcpynW 4897->4924 4898->4891 4900 4048eb 4902 405bdb 4 API calls 4900->4902 4901->4897 4906 405b7c 2 API calls 4901->4906 4907 40493c 4901->4907 4903 4048f1 GetDiskFreeSpaceW 4902->4903 4905 404915 MulDiv 4903->4905 4903->4907 4905->4907 4906->4901 4908 4049ad 4907->4908 4925 404b48 4907->4925 4909 4049d0 4908->4909 4911 40140b 2 API calls 4908->4911 4936 404216 KiUserCallbackDispatcher 4909->4936 4911->4909 4913 4049af SetDlgItemTextW 4913->4908 4914 40499f 4928 404a7f 4914->4928 4917 4049ec 4917->4918 4937 40461c 4917->4937 4918->4871 4920->4866 4921->4890 4922->4875 4923->4892 4924->4900 4926 404a7f 20 API calls 4925->4926 4927 40499a 4926->4927 4927->4913 4927->4914 4929 404a98 4928->4929 4930 406281 17 API calls 4929->4930 4931 404afc 4930->4931 4932 406281 17 API calls 4931->4932 4933 404b07 4932->4933 4934 406281 17 API calls 4933->4934 4935 404b1d lstrlenW wsprintfW SetDlgItemTextW 4934->4935 4935->4908 4936->4917 4938 40462a 4937->4938 4939 40462f SendMessageW 4937->4939 4938->4939 4939->4918 4940 402644 4941 402c15 17 API calls 4940->4941 4942 402653 4941->4942 4943 40269d ReadFile 4942->4943 4944 405dd4 ReadFile 4942->4944 4946 402792 4942->4946 4947 4026dd MultiByteToWideChar 4942->4947 4949 402703 SetFilePointer MultiByteToWideChar 4942->4949 4950 4027a3 4942->4950 4952 402790 4942->4952 4953 405e32 SetFilePointer 4942->4953 4943->4942 4943->4952 4944->4942 4962 4061a6 wsprintfW 4946->4962 4947->4942 4949->4942 4951 4027c4 SetFilePointer 4950->4951 4950->4952 4951->4952 4954 405e4e 4953->4954 4959 405e6a 4953->4959 4955 405dd4 ReadFile 4954->4955 4956 405e5a 4955->4956 4957 405e73 SetFilePointer 4956->4957 4958 405e9b SetFilePointer 4956->4958 4956->4959 4957->4958 4960 405e7e 4957->4960 4958->4959 4959->4942 4961 405e03 WriteFile 4960->4961 4961->4959 4962->4952 4963 402348 4964 402c37 17 API calls 4963->4964 4965 402357 4964->4965 4966 402c37 17 API calls 4965->4966 4967 402360 4966->4967 4968 402c37 17 API calls 4967->4968 4969 40236a GetPrivateProfileStringW 4968->4969 4973 4016cc 4974 402c37 17 API calls 4973->4974 4975 4016d2 GetFullPathNameW 4974->4975 4976 40170e 4975->4976 4977 4016ec 4975->4977 4978 401723 GetShortPathNameW 4976->4978 4979 402abf 4976->4979 4977->4976 4980 4065a2 2 API calls 4977->4980 4978->4979 4981 4016fe 4980->4981 4981->4976 4983 40625f lstrcpynW 4981->4983 4983->4976 4984 401b4d 4985 402c37 17 API calls 4984->4985 4986 401b54 4985->4986 4987 402c15 17 API calls 4986->4987 4988 401b5d wsprintfW 4987->4988 4989 402abf 4988->4989 3929 403350 SetErrorMode GetVersion 3930 403395 3929->3930 3931 40338f 3929->3931 4020 4065c9 GetSystemDirectoryW 3930->4020 3932 406639 5 API calls 3931->3932 3932->3930 3934 4033ab lstrlenA 3934->3930 3935 4033bb 3934->3935 4023 406639 GetModuleHandleA 3935->4023 3938 406639 5 API calls 3939 4033c9 3938->3939 3940 406639 5 API calls 3939->3940 3943 4033d5 #17 OleInitialize SHGetFileInfoW 3940->3943 4029 40625f lstrcpynW 3943->4029 3944 403421 GetCommandLineW 4030 40625f lstrcpynW 3944->4030 3946 403433 GetModuleHandleW 3947 40344b 3946->3947 4031 405b5d 3947->4031 3950 403584 GetTempPathW 4035 40331f 3950->4035 3952 40359c 3953 4035a0 GetWindowsDirectoryW lstrcatW 3952->3953 3954 4035f6 DeleteFileW 3952->3954 3956 40331f 12 API calls 3953->3956 4045 402ec1 GetTickCount GetModuleFileNameW 3954->4045 3955 403473 3957 405b5d CharNextW 3955->3957 3963 40356d 3955->3963 3966 40356f 3955->3966 3960 4035bc 3956->3960 3957->3955 3959 40360a 3961 4036bd 3959->3961 3964 4036ad 3959->3964 3968 405b5d CharNextW 3959->3968 3960->3954 3962 4035c0 GetTempPathW lstrcatW SetEnvironmentVariableW SetEnvironmentVariableW 3960->3962 4146 403893 3961->4146 3967 40331f 12 API calls 3962->3967 3963->3950 4073 40396d 3964->4073 4129 40625f lstrcpynW 3966->4129 3972 4035ee 3967->3972 3985 403629 3968->3985 3972->3954 3972->3961 3973 4037f7 3976 40387b ExitProcess 3973->3976 3977 4037ff GetCurrentProcess OpenProcessToken 3973->3977 3974 4036d7 4153 4058c1 3974->4153 3982 403817 LookupPrivilegeValueW AdjustTokenPrivileges 3977->3982 3983 40384b 3977->3983 3979 403687 4130 405c38 3979->4130 3980 4036ed 4157 40582c 3980->4157 3982->3983 3984 406639 5 API calls 3983->3984 3988 403852 3984->3988 3985->3979 3985->3980 3991 403867 ExitWindowsEx 3988->3991 3995 403874 3988->3995 3991->3976 3991->3995 3992 403703 lstrcatW 3993 40370e lstrcatW lstrcmpiW 3992->3993 3993->3961 3994 40372a 3993->3994 3998 403736 3994->3998 3999 40372f 3994->3999 4194 40140b 3995->4194 3997 4036a2 4145 40625f lstrcpynW 3997->4145 4165 40580f CreateDirectoryW 3998->4165 4160 405792 CreateDirectoryW 3999->4160 4005 40373b SetCurrentDirectoryW 4006 403756 4005->4006 4007 40374b 4005->4007 4169 40625f lstrcpynW 4006->4169 4168 40625f lstrcpynW 4007->4168 4012 4037a2 CopyFileW 4017 403764 4012->4017 4013 4037eb 4015 406025 36 API calls 4013->4015 4015->3961 4016 406281 17 API calls 4016->4017 4017->4013 4017->4016 4019 4037d6 CloseHandle 4017->4019 4170 406281 4017->4170 4187 406025 MoveFileExW 4017->4187 4191 405844 CreateProcessW 4017->4191 4019->4017 4021 4065eb wsprintfW LoadLibraryExW 4020->4021 4021->3934 4024 406655 4023->4024 4025 40665f GetProcAddress 4023->4025 4026 4065c9 3 API calls 4024->4026 4027 4033c2 4025->4027 4028 40665b 4026->4028 4027->3938 4028->4025 4028->4027 4029->3944 4030->3946 4032 405b63 4031->4032 4033 40345a CharNextW 4032->4033 4034 405b6a CharNextW 4032->4034 4033->3950 4033->3955 4034->4032 4197 4064f3 4035->4197 4037 403335 4037->3952 4038 40332b 4038->4037 4206 405b30 lstrlenW CharPrevW 4038->4206 4041 40580f 2 API calls 4042 403343 4041->4042 4209 405d80 4042->4209 4213 405d51 GetFileAttributesW CreateFileW 4045->4213 4047 402f01 4071 402f11 4047->4071 4214 40625f lstrcpynW 4047->4214 4049 402f27 4215 405b7c lstrlenW 4049->4215 4053 402f38 GetFileSize 4054 403034 4053->4054 4072 402f4f 4053->4072 4220 402e5d 4054->4220 4056 40303d 4058 40306d GlobalAlloc 4056->4058 4056->4071 4255 403308 SetFilePointer 4056->4255 4231 403308 SetFilePointer 4058->4231 4060 4030a0 4064 402e5d 6 API calls 4060->4064 4062 403056 4065 4032f2 ReadFile 4062->4065 4063 403088 4232 4030fa 4063->4232 4064->4071 4067 403061 4065->4067 4067->4058 4067->4071 4068 402e5d 6 API calls 4068->4072 4069 403094 4069->4069 4070 4030d1 SetFilePointer 4069->4070 4069->4071 4070->4071 4071->3959 4072->4054 4072->4060 4072->4068 4072->4071 4252 4032f2 4072->4252 4074 406639 5 API calls 4073->4074 4075 403981 4074->4075 4076 403987 4075->4076 4077 403999 4075->4077 4291 4061a6 wsprintfW 4076->4291 4292 40612d 4077->4292 4081 4039e8 lstrcatW 4082 403997 4081->4082 4276 403c43 4082->4276 4083 40612d 3 API calls 4083->4081 4086 405c38 18 API calls 4087 403a1a 4086->4087 4088 403aae 4087->4088 4090 40612d 3 API calls 4087->4090 4089 405c38 18 API calls 4088->4089 4091 403ab4 4089->4091 4092 403a4c 4090->4092 4093 403ac4 LoadImageW 4091->4093 4094 406281 17 API calls 4091->4094 4092->4088 4097 403a6d lstrlenW 4092->4097 4101 405b5d CharNextW 4092->4101 4095 403b6a 4093->4095 4096 403aeb RegisterClassW 4093->4096 4094->4093 4100 40140b 2 API calls 4095->4100 4098 403b21 SystemParametersInfoW CreateWindowExW 4096->4098 4099 403b74 4096->4099 4102 403aa1 4097->4102 4103 403a7b lstrcmpiW 4097->4103 4098->4095 4099->3961 4104 403b70 4100->4104 4105 403a6a 4101->4105 4107 405b30 3 API calls 4102->4107 4103->4102 4106 403a8b GetFileAttributesW 4103->4106 4104->4099 4109 403c43 18 API calls 4104->4109 4105->4097 4108 403a97 4106->4108 4110 403aa7 4107->4110 4108->4102 4111 405b7c 2 API calls 4108->4111 4112 403b81 4109->4112 4297 40625f lstrcpynW 4110->4297 4111->4102 4114 403c10 4112->4114 4115 403b8d ShowWindow 4112->4115 4284 405396 OleInitialize 4114->4284 4116 4065c9 3 API calls 4115->4116 4118 403ba5 4116->4118 4120 403bb3 GetClassInfoW 4118->4120 4123 4065c9 3 API calls 4118->4123 4119 403c16 4121 403c32 4119->4121 4122 403c1a 4119->4122 4125 403bc7 GetClassInfoW RegisterClassW 4120->4125 4126 403bdd DialogBoxParamW 4120->4126 4124 40140b 2 API calls 4121->4124 4122->4099 4127 40140b 2 API calls 4122->4127 4123->4120 4124->4099 4125->4126 4128 40140b 2 API calls 4126->4128 4127->4099 4128->4099 4129->3963 4313 40625f lstrcpynW 4130->4313 4132 405c49 4314 405bdb CharNextW CharNextW 4132->4314 4134 403693 4134->3961 4144 40625f lstrcpynW 4134->4144 4136 4064f3 5 API calls 4142 405c5f 4136->4142 4137 405c90 lstrlenW 4138 405c9b 4137->4138 4137->4142 4140 405b30 3 API calls 4138->4140 4141 405ca0 GetFileAttributesW 4140->4141 4141->4134 4142->4134 4142->4137 4143 405b7c 2 API calls 4142->4143 4320 4065a2 FindFirstFileW 4142->4320 4143->4137 4144->3997 4145->3964 4147 4038ab 4146->4147 4148 40389d CloseHandle 4146->4148 4323 4038d8 4147->4323 4148->4147 4154 4058d6 4153->4154 4155 4036e5 ExitProcess 4154->4155 4156 4058ea MessageBoxIndirectW 4154->4156 4156->4155 4158 406639 5 API calls 4157->4158 4159 4036f2 lstrcatW 4158->4159 4159->3992 4159->3993 4161 4057e3 GetLastError 4160->4161 4162 403734 4160->4162 4161->4162 4163 4057f2 SetFileSecurityW 4161->4163 4162->4005 4163->4162 4164 405808 GetLastError 4163->4164 4164->4162 4166 405823 GetLastError 4165->4166 4167 40581f 4165->4167 4166->4167 4167->4005 4168->4006 4169->4017 4185 40628e 4170->4185 4171 4064d9 4172 403795 DeleteFileW 4171->4172 4381 40625f lstrcpynW 4171->4381 4172->4012 4172->4017 4174 4064a7 lstrlenW 4174->4185 4177 406281 10 API calls 4177->4174 4178 40612d 3 API calls 4178->4185 4179 4063bc GetSystemDirectoryW 4179->4185 4180 4063cf GetWindowsDirectoryW 4180->4185 4181 4064f3 5 API calls 4181->4185 4182 406281 10 API calls 4182->4185 4183 40644a lstrcatW 4183->4185 4184 406403 SHGetSpecialFolderLocation 4184->4185 4186 40641b SHGetPathFromIDListW CoTaskMemFree 4184->4186 4185->4171 4185->4174 4185->4177 4185->4178 4185->4179 4185->4180 4185->4181 4185->4182 4185->4183 4185->4184 4379 4061a6 wsprintfW 4185->4379 4380 40625f lstrcpynW 4185->4380 4186->4185 4188 406039 4187->4188 4190 406046 4187->4190 4382 405eab 4188->4382 4190->4017 4192 405883 4191->4192 4193 405877 CloseHandle 4191->4193 4192->4017 4193->4192 4195 401389 2 API calls 4194->4195 4196 401420 4195->4196 4196->3976 4199 406500 4197->4199 4198 406576 4200 40657b CharPrevW 4198->4200 4203 40659c 4198->4203 4199->4198 4201 406569 CharNextW 4199->4201 4202 405b5d CharNextW 4199->4202 4204 406555 CharNextW 4199->4204 4205 406564 CharNextW 4199->4205 4200->4198 4201->4198 4201->4199 4202->4199 4203->4038 4204->4199 4205->4201 4207 40333d 4206->4207 4208 405b4c lstrcatW 4206->4208 4207->4041 4208->4207 4210 405d8d GetTickCount GetTempFileNameW 4209->4210 4211 40334e 4210->4211 4212 405dc3 4210->4212 4211->3952 4212->4210 4212->4211 4213->4047 4214->4049 4216 405b8a 4215->4216 4217 405b90 CharPrevW 4216->4217 4218 402f2d 4216->4218 4217->4216 4217->4218 4219 40625f lstrcpynW 4218->4219 4219->4053 4221 402e66 4220->4221 4222 402e7e 4220->4222 4225 402e76 4221->4225 4226 402e6f DestroyWindow 4221->4226 4223 402e86 4222->4223 4224 402e8e GetTickCount 4222->4224 4256 406675 4223->4256 4228 402e9c CreateDialogParamW ShowWindow 4224->4228 4229 402ebf 4224->4229 4225->4056 4226->4225 4228->4229 4229->4056 4231->4063 4234 403113 4232->4234 4233 403141 4236 4032f2 ReadFile 4233->4236 4234->4233 4273 403308 SetFilePointer 4234->4273 4237 40314c 4236->4237 4238 403275 4237->4238 4239 40328b 4237->4239 4240 40315e GetTickCount 4237->4240 4238->4069 4241 4032cd 4239->4241 4244 40328f 4239->4244 4240->4238 4246 40318a 4240->4246 4243 4032f2 ReadFile 4241->4243 4242 4032f2 ReadFile 4242->4246 4243->4238 4244->4238 4245 4032f2 ReadFile 4244->4245 4247 405e03 WriteFile 4244->4247 4245->4244 4246->4238 4246->4242 4248 4031e0 GetTickCount 4246->4248 4249 403205 MulDiv wsprintfW 4246->4249 4271 405e03 WriteFile 4246->4271 4247->4244 4248->4246 4260 4052c3 4249->4260 4274 405dd4 ReadFile 4252->4274 4255->4062 4257 406692 PeekMessageW 4256->4257 4258 402e8c 4257->4258 4259 406688 DispatchMessageW 4257->4259 4258->4056 4259->4257 4261 4052de 4260->4261 4269 405380 4260->4269 4262 4052fa lstrlenW 4261->4262 4265 406281 17 API calls 4261->4265 4263 405323 4262->4263 4264 405308 lstrlenW 4262->4264 4267 405336 4263->4267 4268 405329 SetWindowTextW 4263->4268 4266 40531a lstrcatW 4264->4266 4264->4269 4265->4262 4266->4263 4267->4269 4270 40533c SendMessageW SendMessageW SendMessageW 4267->4270 4268->4267 4269->4246 4270->4269 4272 405e21 4271->4272 4272->4246 4273->4233 4275 403305 4274->4275 4275->4072 4277 403c57 4276->4277 4298 4061a6 wsprintfW 4277->4298 4279 403cc8 4299 403cfc 4279->4299 4281 4039f8 4281->4086 4282 403ccd 4282->4281 4283 406281 17 API calls 4282->4283 4283->4282 4302 404240 4284->4302 4286 4053e0 4287 404240 SendMessageW 4286->4287 4289 4053f2 OleUninitialize 4287->4289 4288 4053b9 4288->4286 4305 401389 4288->4305 4289->4119 4291->4082 4309 4060cc 4292->4309 4295 406161 RegQueryValueExW RegCloseKey 4296 4039c9 4295->4296 4296->4081 4296->4083 4297->4088 4298->4279 4300 406281 17 API calls 4299->4300 4301 403d0a SetWindowTextW 4300->4301 4301->4282 4303 404258 4302->4303 4304 404249 SendMessageW 4302->4304 4303->4288 4304->4303 4307 401390 4305->4307 4306 4013fe 4306->4288 4307->4306 4308 4013cb MulDiv SendMessageW 4307->4308 4308->4307 4310 4060db 4309->4310 4311 4060e4 RegOpenKeyExW 4310->4311 4312 4060df 4310->4312 4311->4312 4312->4295 4312->4296 4313->4132 4315 405bf8 4314->4315 4319 405c0a 4314->4319 4317 405c05 CharNextW 4315->4317 4315->4319 4316 405c2e 4316->4134 4316->4136 4317->4316 4318 405b5d CharNextW 4318->4319 4319->4316 4319->4318 4321 4065c3 4320->4321 4322 4065b8 FindClose 4320->4322 4321->4142 4322->4321 4324 4038e6 4323->4324 4325 4038b0 4324->4325 4326 4038eb FreeLibrary GlobalFree 4324->4326 4327 40596d 4325->4327 4326->4325 4326->4326 4328 405c38 18 API calls 4327->4328 4329 40598d 4328->4329 4330 405995 DeleteFileW 4329->4330 4331 4059ac 4329->4331 4332 4036c6 OleUninitialize 4330->4332 4333 405ad7 4331->4333 4366 40625f lstrcpynW 4331->4366 4332->3973 4332->3974 4333->4332 4340 4065a2 2 API calls 4333->4340 4335 4059d2 4336 4059e5 4335->4336 4337 4059d8 lstrcatW 4335->4337 4339 405b7c 2 API calls 4336->4339 4338 4059eb 4337->4338 4341 4059fb lstrcatW 4338->4341 4343 405a06 lstrlenW FindFirstFileW 4338->4343 4339->4338 4342 405af1 4340->4342 4341->4343 4342->4332 4344 405af5 4342->4344 4345 405acc 4343->4345 4355 405a28 4343->4355 4346 405b30 3 API calls 4344->4346 4345->4333 4347 405afb 4346->4347 4348 405925 5 API calls 4347->4348 4351 405b07 4348->4351 4350 405aaf FindNextFileW 4352 405ac5 FindClose 4350->4352 4350->4355 4353 405b21 4351->4353 4354 405b0b 4351->4354 4352->4345 4357 4052c3 24 API calls 4353->4357 4354->4332 4358 4052c3 24 API calls 4354->4358 4355->4350 4359 40596d 60 API calls 4355->4359 4361 4052c3 24 API calls 4355->4361 4364 4052c3 24 API calls 4355->4364 4365 406025 36 API calls 4355->4365 4367 40625f lstrcpynW 4355->4367 4368 405925 4355->4368 4357->4332 4360 405b18 4358->4360 4359->4355 4362 406025 36 API calls 4360->4362 4361->4350 4363 405b1f 4362->4363 4363->4332 4364->4355 4365->4355 4366->4335 4367->4355 4376 405d2c GetFileAttributesW 4368->4376 4371 405940 RemoveDirectoryW 4374 40594e 4371->4374 4372 405948 DeleteFileW 4372->4374 4373 405952 4373->4355 4374->4373 4375 40595e SetFileAttributesW 4374->4375 4375->4373 4377 405931 4376->4377 4378 405d3e SetFileAttributesW 4376->4378 4377->4371 4377->4372 4377->4373 4378->4377 4379->4185 4380->4185 4381->4172 4383 405f01 GetShortPathNameW 4382->4383 4384 405edb 4382->4384 4385 406020 4383->4385 4386 405f16 4383->4386 4409 405d51 GetFileAttributesW CreateFileW 4384->4409 4385->4190 4386->4385 4389 405f1e wsprintfA 4386->4389 4388 405ee5 CloseHandle GetShortPathNameW 4388->4385 4390 405ef9 4388->4390 4391 406281 17 API calls 4389->4391 4390->4383 4390->4385 4392 405f46 4391->4392 4410 405d51 GetFileAttributesW CreateFileW 4392->4410 4394 405f53 4394->4385 4395 405f62 GetFileSize GlobalAlloc 4394->4395 4396 405f84 4395->4396 4397 406019 CloseHandle 4395->4397 4398 405dd4 ReadFile 4396->4398 4397->4385 4399 405f8c 4398->4399 4399->4397 4411 405cb6 lstrlenA 4399->4411 4402 405fa3 lstrcpyA 4405 405fc5 4402->4405 4403 405fb7 4404 405cb6 4 API calls 4403->4404 4404->4405 4406 405ffc SetFilePointer 4405->4406 4407 405e03 WriteFile 4406->4407 4408 406012 GlobalFree 4407->4408 4408->4397 4409->4388 4410->4394 4412 405cf7 lstrlenA 4411->4412 4413 405cd0 lstrcmpiA 4412->4413 4415 405cff 4412->4415 4414 405cee CharNextA 4413->4414 4413->4415 4414->4412 4415->4402 4415->4403 4990 401f52 4991 402c37 17 API calls 4990->4991 4992 401f59 4991->4992 4993 4065a2 2 API calls 4992->4993 4994 401f5f 4993->4994 4995 401f70 4994->4995 4997 4061a6 wsprintfW 4994->4997 4997->4995 4998 402253 4999 402c37 17 API calls 4998->4999 5000 402259 4999->5000 5001 402c37 17 API calls 5000->5001 5002 402262 5001->5002 5003 402c37 17 API calls 5002->5003 5004 40226b 5003->5004 5005 4065a2 2 API calls 5004->5005 5006 402274 5005->5006 5007 402285 lstrlenW lstrlenW 5006->5007 5011 402278 5006->5011 5009 4052c3 24 API calls 5007->5009 5008 4052c3 24 API calls 5012 402280 5008->5012 5010 4022c3 SHFileOperationW 5009->5010 5010->5011 5010->5012 5011->5008 5013 401956 5014 402c37 17 API calls 5013->5014 5015 40195d lstrlenW 5014->5015 5016 40258c 5015->5016 4535 4014d7 4536 402c15 17 API calls 4535->4536 4537 4014dd Sleep 4536->4537 4539 402abf 4537->4539 5017 4022d7 5018 4022f1 5017->5018 5019 4022de 5017->5019 5020 406281 17 API calls 5019->5020 5021 4022eb 5020->5021 5022 4058c1 MessageBoxIndirectW 5021->5022 5022->5018 5023 401d57 GetDlgItem GetClientRect 5024 402c37 17 API calls 5023->5024 5025 401d89 LoadImageW SendMessageW 5024->5025 5026 401da7 DeleteObject 5025->5026 5027 402abf 5025->5027 5026->5027 5028 402dd7 5029 402e02 5028->5029 5030 402de9 SetTimer 5028->5030 5031 402e57 5029->5031 5032 402e1c MulDiv wsprintfW SetWindowTextW SetDlgItemTextW 5029->5032 5030->5029 5032->5031 4614 40175c 4615 402c37 17 API calls 4614->4615 4616 401763 4615->4616 4617 405d80 2 API calls 4616->4617 4618 40176a 4617->4618 4619 405d80 2 API calls 4618->4619 4619->4618 5033 4023de 5034 402c37 17 API calls 5033->5034 5035 4023f0 5034->5035 5036 402c37 17 API calls 5035->5036 5037 4023fa 5036->5037 5050 402cc7 5037->5050 5040 402885 5041 402432 5043 40243e 5041->5043 5045 402c15 17 API calls 5041->5045 5042 402c37 17 API calls 5044 402428 lstrlenW 5042->5044 5046 40245d RegSetValueExW 5043->5046 5047 4030fa 31 API calls 5043->5047 5044->5041 5045->5043 5048 402473 RegCloseKey 5046->5048 5047->5046 5048->5040 5051 402ce2 5050->5051 5054 4060fa 5051->5054 5055 406109 5054->5055 5056 406114 RegCreateKeyExW 5055->5056 5057 40240a 5055->5057 5056->5057 5057->5040 5057->5041 5057->5042 5058 402862 5059 402c37 17 API calls 5058->5059 5060 402869 FindFirstFileW 5059->5060 5061 402891 5060->5061 5064 40287c 5060->5064 5066 4061a6 wsprintfW 5061->5066 5063 40289a 5067 40625f lstrcpynW 5063->5067 5066->5063 5067->5064 5068 401563 5069 402a65 5068->5069 5072 4061a6 wsprintfW 5069->5072 5071 402a6a 5072->5071 5073 401968 5074 402c15 17 API calls 5073->5074 5075 40196f 5074->5075 5076 402c15 17 API calls 5075->5076 5077 40197c 5076->5077 5078 402c37 17 API calls 5077->5078 5079 401993 lstrlenW 5078->5079 5080 4019a4 5079->5080 5081 4019e5 5080->5081 5085 40625f lstrcpynW 5080->5085 5083 4019d5 5083->5081 5084 4019da lstrlenW 5083->5084 5084->5081 5085->5083 5086 100018a9 5087 100018cc 5086->5087 5088 100018ff GlobalFree 5087->5088 5089 10001911 __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z __allrem 5087->5089 5088->5089 5090 10001272 2 API calls 5089->5090 5091 10001a87 GlobalFree GlobalFree 5090->5091 5092 4027e9 5093 4027f0 5092->5093 5096 402a6a 5092->5096 5094 402c15 17 API calls 5093->5094 5095 4027f7 5094->5095 5097 402806 SetFilePointer 5095->5097 5097->5096 5098 402816 5097->5098 5100 4061a6 wsprintfW 5098->5100 5100->5096 5101 40166a 5102 402c37 17 API calls 5101->5102 5103 401670 5102->5103 5104 4065a2 2 API calls 5103->5104 5105 401676 5104->5105 5106 401ced 5107 402c15 17 API calls 5106->5107 5108 401cf3 IsWindow 5107->5108 5109 401a20 5108->5109 4801 40176f 4802 402c37 17 API calls 4801->4802 4803 401776 4802->4803 4804 401796 4803->4804 4805 40179e 4803->4805 4840 40625f lstrcpynW 4804->4840 4841 40625f lstrcpynW 4805->4841 4808 40179c 4812 4064f3 5 API calls 4808->4812 4809 4017a9 4810 405b30 3 API calls 4809->4810 4811 4017af lstrcatW 4810->4811 4811->4808 4822 4017bb 4812->4822 4813 4065a2 2 API calls 4813->4822 4814 405d2c 2 API calls 4814->4822 4816 4017cd CompareFileTime 4816->4822 4817 40188d 4818 4052c3 24 API calls 4817->4818 4821 401897 4818->4821 4819 4052c3 24 API calls 4827 401879 4819->4827 4820 40625f lstrcpynW 4820->4822 4823 4030fa 31 API calls 4821->4823 4822->4813 4822->4814 4822->4816 4822->4817 4822->4820 4828 406281 17 API calls 4822->4828 4836 4058c1 MessageBoxIndirectW 4822->4836 4837 401864 4822->4837 4839 405d51 GetFileAttributesW CreateFileW 4822->4839 4824 4018aa 4823->4824 4825 4018be SetFileTime 4824->4825 4826 4018d0 FindCloseChangeNotification 4824->4826 4825->4826 4826->4827 4829 4018e1 4826->4829 4828->4822 4830 4018e6 4829->4830 4831 4018f9 4829->4831 4832 406281 17 API calls 4830->4832 4833 406281 17 API calls 4831->4833 4834 4018ee lstrcatW 4832->4834 4835 401901 4833->4835 4834->4835 4838 4058c1 MessageBoxIndirectW 4835->4838 4836->4822 4837->4819 4837->4827 4838->4827 4839->4822 4840->4808 4841->4809 5110 402570 5111 402c37 17 API calls 5110->5111 5112 402577 5111->5112 5115 405d51 GetFileAttributesW CreateFileW 5112->5115 5114 402583 5115->5114 5116 401b71 5117 401bc2 5116->5117 5118 401b7e 5116->5118 5120 401bc7 5117->5120 5121 401bec GlobalAlloc 5117->5121 5119 401c07 5118->5119 5125 401b95 5118->5125 5122 406281 17 API calls 5119->5122 5129 4022f1 5119->5129 5120->5129 5137 40625f lstrcpynW 5120->5137 5123 406281 17 API calls 5121->5123 5124 4022eb 5122->5124 5123->5119 5130 4058c1 MessageBoxIndirectW 5124->5130 5135 40625f lstrcpynW 5125->5135 5128 401bd9 GlobalFree 5128->5129 5130->5129 5131 401ba4 5136 40625f lstrcpynW 5131->5136 5133 401bb3 5138 40625f lstrcpynW 5133->5138 5135->5131 5136->5133 5137->5128 5138->5129 5139 401a72 5140 402c15 17 API calls 5139->5140 5141 401a78 5140->5141 5142 402c15 17 API calls 5141->5142 5143 401a20 5142->5143 5144 4024f2 5154 402c77 5144->5154 5147 402c15 17 API calls 5148 402505 5147->5148 5149 402521 RegEnumKeyW 5148->5149 5150 40252d RegEnumValueW 5148->5150 5151 402885 5148->5151 5152 402542 RegCloseKey 5149->5152 5150->5152 5152->5151 5155 402c37 17 API calls 5154->5155 5156 402c8e 5155->5156 5157 4060cc RegOpenKeyExW 5156->5157 5158 4024fc 5157->5158 5158->5147 5159 401573 5160 401583 ShowWindow 5159->5160 5161 40158c 5159->5161 5160->5161 5162 40159a ShowWindow 5161->5162 5163 402abf 5161->5163 5162->5163 5164 4014f5 SetForegroundWindow 5165 402abf 5164->5165 5166 100016b6 5167 100016e5 5166->5167 5168 10001b18 22 API calls 5167->5168 5169 100016ec 5168->5169 5170 100016f3 5169->5170 5171 100016ff 5169->5171 5172 10001272 2 API calls 5170->5172 5173 10001726 5171->5173 5174 10001709 5171->5174 5181 100016fd 5172->5181 5176 10001750 5173->5176 5177 1000172c 5173->5177 5175 1000153d 3 API calls 5174->5175 5179 1000170e 5175->5179 5178 1000153d 3 API calls 5176->5178 5180 100015b4 3 API calls 5177->5180 5178->5181 5182 100015b4 3 API calls 5179->5182 5183 10001731 5180->5183 5184 10001714 5182->5184 5185 10001272 2 API calls 5183->5185 5187 10001272 2 API calls 5184->5187 5186 10001737 GlobalFree 5185->5186 5186->5181 5188 1000174b GlobalFree 5186->5188 5189 1000171a GlobalFree 5187->5189 5188->5181 5189->5181 5190 401e77 5191 402c37 17 API calls 5190->5191 5192 401e7d 5191->5192 5193 402c37 17 API calls 5192->5193 5194 401e86 5193->5194 5195 402c37 17 API calls 5194->5195 5196 401e8f 5195->5196 5197 402c37 17 API calls 5196->5197 5198 401e98 5197->5198 5199 401423 24 API calls 5198->5199 5200 401e9f 5199->5200 5207 405887 ShellExecuteExW 5200->5207 5202 401ee1 5204 402885 5202->5204 5208 4066ea WaitForSingleObject 5202->5208 5205 401efb CloseHandle 5205->5204 5207->5202 5209 406704 5208->5209 5210 406716 GetExitCodeProcess 5209->5210 5211 406675 2 API calls 5209->5211 5210->5205 5212 40670b WaitForSingleObject 5211->5212 5212->5209 5213 10002238 5214 10002296 5213->5214 5215 100022cc 5213->5215 5214->5215 5216 100022a8 GlobalAlloc 5214->5216 5216->5214 5217 40167b 5218 402c37 17 API calls 5217->5218 5219 401682 5218->5219 5220 402c37 17 API calls 5219->5220 5221 40168b 5220->5221 5222 402c37 17 API calls 5221->5222 5223 401694 MoveFileW 5222->5223 5224 4016a0 5223->5224 5225 4016a7 5223->5225 5227 401423 24 API calls 5224->5227 5226 4065a2 2 API calls 5225->5226 5229 40224a 5225->5229 5228 4016b6 5226->5228 5227->5229 5228->5229 5230 406025 36 API calls 5228->5230 5230->5224 5231 40467c 5232 4046b2 5231->5232 5233 40468c 5231->5233 5235 40425b 8 API calls 5232->5235 5234 4041f4 18 API calls 5233->5234 5236 404699 SetDlgItemTextW 5234->5236 5237 4046be 5235->5237 5236->5232 5238 1000103d 5239 1000101b 5 API calls 5238->5239 5240 10001056 5239->5240 5241 40247e 5242 402c77 17 API calls 5241->5242 5243 402488 5242->5243 5244 402c37 17 API calls 5243->5244 5245 402491 5244->5245 5246 40249c RegQueryValueExW 5245->5246 5249 402885 5245->5249 5247 4024c2 RegCloseKey 5246->5247 5248 4024bc 5246->5248 5247->5249 5248->5247 5252 4061a6 wsprintfW 5248->5252 5252->5247 5253 4020fe 5254 402c37 17 API calls 5253->5254 5255 402105 5254->5255 5256 402c37 17 API calls 5255->5256 5257 40210f 5256->5257 5258 402c37 17 API calls 5257->5258 5259 402119 5258->5259 5260 402c37 17 API calls 5259->5260 5261 402123 5260->5261 5262 402c37 17 API calls 5261->5262 5263 40212d 5262->5263 5264 40216c CoCreateInstance 5263->5264 5265 402c37 17 API calls 5263->5265 5268 40218b 5264->5268 5265->5264 5266 401423 24 API calls 5267 40224a 5266->5267 5268->5266 5268->5267 5269 4019ff 5270 402c37 17 API calls 5269->5270 5271 401a06 5270->5271 5272 402c37 17 API calls 5271->5272 5273 401a0f 5272->5273 5274 401a16 lstrcmpiW 5273->5274 5275 401a28 lstrcmpW 5273->5275 5276 401a1c 5274->5276 5275->5276 5277 401000 5278 401037 BeginPaint GetClientRect 5277->5278 5279 40100c DefWindowProcW 5277->5279 5281 4010f3 5278->5281 5284 401179 5279->5284 5282 401073 CreateBrushIndirect FillRect DeleteObject 5281->5282 5283 4010fc 5281->5283 5282->5281 5285 401102 CreateFontIndirectW 5283->5285 5286 401167 EndPaint 5283->5286 5285->5286 5287 401112 6 API calls 5285->5287 5286->5284 5287->5286 5288 401f00 5289 402c37 17 API calls 5288->5289 5290 401f06 5289->5290 5291 4052c3 24 API calls 5290->5291 5292 401f10 5291->5292 5293 405844 2 API calls 5292->5293 5294 401f16 5293->5294 5295 401f39 CloseHandle 5294->5295 5296 4066ea 5 API calls 5294->5296 5298 402885 5294->5298 5295->5298 5299 401f2b 5296->5299 5299->5295 5301 4061a6 wsprintfW 5299->5301 5301->5295 4451 405402 4452 405423 GetDlgItem GetDlgItem GetDlgItem 4451->4452 4453 4055ac 4451->4453 4497 404229 SendMessageW 4452->4497 4455 4055b5 GetDlgItem CreateThread FindCloseChangeNotification 4453->4455 4456 4055dd 4453->4456 4455->4456 4520 405396 5 API calls 4455->4520 4458 405608 4456->4458 4459 4055f4 ShowWindow ShowWindow 4456->4459 4460 40562d 4456->4460 4457 405493 4463 40549a GetClientRect GetSystemMetrics SendMessageW SendMessageW 4457->4463 4461 405614 4458->4461 4462 405668 4458->4462 4502 404229 SendMessageW 4459->4502 4506 40425b 4460->4506 4465 405642 ShowWindow 4461->4465 4466 40561c 4461->4466 4462->4460 4470 405676 SendMessageW 4462->4470 4468 405508 4463->4468 4469 4054ec SendMessageW SendMessageW 4463->4469 4472 405662 4465->4472 4473 405654 4465->4473 4503 4041cd 4466->4503 4476 40551b 4468->4476 4477 40550d SendMessageW 4468->4477 4469->4468 4478 40563b 4470->4478 4479 40568f CreatePopupMenu 4470->4479 4475 4041cd SendMessageW 4472->4475 4474 4052c3 24 API calls 4473->4474 4474->4472 4475->4462 4498 4041f4 4476->4498 4477->4476 4480 406281 17 API calls 4479->4480 4482 40569f AppendMenuW 4480->4482 4484 4056bc GetWindowRect 4482->4484 4485 4056cf TrackPopupMenu 4482->4485 4483 40552b 4486 405534 ShowWindow 4483->4486 4487 405568 GetDlgItem SendMessageW 4483->4487 4484->4485 4485->4478 4489 4056ea 4485->4489 4490 405557 4486->4490 4491 40554a ShowWindow 4486->4491 4487->4478 4488 40558f SendMessageW SendMessageW 4487->4488 4488->4478 4492 405706 SendMessageW 4489->4492 4501 404229 SendMessageW 4490->4501 4491->4490 4492->4492 4493 405723 OpenClipboard EmptyClipboard GlobalAlloc GlobalLock 4492->4493 4495 405748 SendMessageW 4493->4495 4495->4495 4496 405771 GlobalUnlock SetClipboardData CloseClipboard 4495->4496 4496->4478 4497->4457 4499 406281 17 API calls 4498->4499 4500 4041ff SetDlgItemTextW 4499->4500 4500->4483 4501->4487 4502->4458 4504 4041d4 4503->4504 4505 4041da SendMessageW 4503->4505 4504->4505 4505->4460 4507 404273 GetWindowLongW 4506->4507 4517 4042fc 4506->4517 4508 404284 4507->4508 4507->4517 4509 404293 GetSysColor 4508->4509 4510 404296 4508->4510 4509->4510 4511 4042a6 SetBkMode 4510->4511 4512 40429c SetTextColor 4510->4512 4513 4042c4 4511->4513 4514 4042be GetSysColor 4511->4514 4512->4511 4515 4042d5 4513->4515 4516 4042cb SetBkColor 4513->4516 4514->4513 4515->4517 4518 4042e8 DeleteObject 4515->4518 4519 4042ef CreateBrushIndirect 4515->4519 4516->4515 4517->4478 4518->4519 4519->4517 4521 100027c2 4522 10002812 4521->4522 4523 100027d2 VirtualProtect 4521->4523 4523->4522 5302 401503 5303 40150b 5302->5303 5305 40151e 5302->5305 5304 402c15 17 API calls 5303->5304 5304->5305 5306 402306 5307 40230e 5306->5307 5309 402314 5306->5309 5308 402c37 17 API calls 5307->5308 5308->5309 5310 402c37 17 API calls 5309->5310 5312 402322 5309->5312 5310->5312 5311 402330 5314 402c37 17 API calls 5311->5314 5312->5311 5313 402c37 17 API calls 5312->5313 5313->5311 5315 402339 WritePrivateProfileStringW 5314->5315 5316 401f86 5317 402c37 17 API calls 5316->5317 5318 401f8d 5317->5318 5319 406639 5 API calls 5318->5319 5320 401f9c 5319->5320 5321 401fb8 GlobalAlloc 5320->5321 5323 402020 5320->5323 5322 401fcc 5321->5322 5321->5323 5324 406639 5 API calls 5322->5324 5325 401fd3 5324->5325 5326 406639 5 API calls 5325->5326 5327 401fdd 5326->5327 5327->5323 5331 4061a6 wsprintfW 5327->5331 5329 402012 5332 4061a6 wsprintfW 5329->5332 5331->5329 5332->5323 5333 404308 lstrcpynW lstrlenW 5334 402388 5335 402390 5334->5335 5336 4023bb 5334->5336 5338 402c77 17 API calls 5335->5338 5337 402c37 17 API calls 5336->5337 5339 4023c2 5337->5339 5340 402397 5338->5340 5345 402cf5 5339->5345 5342 402c37 17 API calls 5340->5342 5343 4023cf 5340->5343 5344 4023a8 RegDeleteValueW RegCloseKey 5342->5344 5344->5343 5346 402d0b 5345->5346 5347 402d21 5346->5347 5349 402d2a 5346->5349 5347->5343 5350 4060cc RegOpenKeyExW 5349->5350 5354 402d58 5350->5354 5351 402d7e RegEnumKeyW 5352 402d95 RegCloseKey 5351->5352 5351->5354 5355 406639 5 API calls 5352->5355 5353 402db6 RegCloseKey 5359 402da9 5353->5359 5354->5351 5354->5352 5354->5353 5356 402d2a 6 API calls 5354->5356 5354->5359 5357 402da5 5355->5357 5356->5354 5358 402dc4 RegDeleteKeyW 5357->5358 5357->5359 5358->5359 5359->5347 5360 40190c 5361 401943 5360->5361 5362 402c37 17 API calls 5361->5362 5363 401948 5362->5363 5364 40596d 67 API calls 5363->5364 5365 401951 5364->5365 5366 401d0e 5367 402c15 17 API calls 5366->5367 5368 401d15 5367->5368 5369 402c15 17 API calls 5368->5369 5370 401d21 GetDlgItem 5369->5370 5371 40258c 5370->5371 5372 1000164f 5373 10001516 GlobalFree 5372->5373 5376 10001667 5373->5376 5374 100016ad GlobalFree 5375 10001682 5375->5374 5376->5374 5376->5375 5377 10001699 VirtualFree 5376->5377 5377->5374 5378 40190f 5379 402c37 17 API calls 5378->5379 5380 401916 5379->5380 5381 4058c1 MessageBoxIndirectW 5380->5381 5382 40191f 5381->5382 5383 401491 5384 4052c3 24 API calls 5383->5384 5385 401498 5384->5385 5386 404391 5387 4043a9 5386->5387 5390 4044c3 5386->5390 5391 4041f4 18 API calls 5387->5391 5388 40452d 5389 404537 GetDlgItem 5388->5389 5392 4045f7 5388->5392 5393 404551 5389->5393 5394 4045b8 5389->5394 5390->5388 5390->5392 5395 4044fe GetDlgItem SendMessageW 5390->5395 5396 404410 5391->5396 5397 40425b 8 API calls 5392->5397 5393->5394 5402 404577 SendMessageW LoadCursorW SetCursor 5393->5402 5394->5392 5398 4045ca 5394->5398 5419 404216 KiUserCallbackDispatcher 5395->5419 5400 4041f4 18 API calls 5396->5400 5401 4045f2 5397->5401 5403 4045e0 5398->5403 5404 4045d0 SendMessageW 5398->5404 5406 40441d CheckDlgButton 5400->5406 5420 404640 5402->5420 5403->5401 5408 4045e6 SendMessageW 5403->5408 5404->5403 5405 404528 5409 40461c SendMessageW 5405->5409 5417 404216 KiUserCallbackDispatcher 5406->5417 5408->5401 5409->5388 5412 40443b GetDlgItem 5418 404229 SendMessageW 5412->5418 5414 404451 SendMessageW 5415 404477 SendMessageW SendMessageW lstrlenW SendMessageW SendMessageW 5414->5415 5416 40446e GetSysColor 5414->5416 5415->5401 5416->5415 5417->5412 5418->5414 5419->5405 5423 405887 ShellExecuteExW 5420->5423 5422 4045a6 LoadCursorW SetCursor 5422->5394 5423->5422 5424 402592 5425 4025c1 5424->5425 5426 4025a6 5424->5426 5428 4025f5 5425->5428 5429 4025c6 5425->5429 5427 402c15 17 API calls 5426->5427 5436 4025ad 5427->5436 5431 402c37 17 API calls 5428->5431 5430 402c37 17 API calls 5429->5430 5432 4025cd WideCharToMultiByte lstrlenA 5430->5432 5433 4025fc lstrlenW 5431->5433 5432->5436 5433->5436 5434 402629 5435 40263f 5434->5435 5437 405e03 WriteFile 5434->5437 5436->5434 5436->5435 5438 405e32 5 API calls 5436->5438 5437->5435 5438->5434 5439 10001058 5441 10001074 5439->5441 5440 100010dd 5441->5440 5442 10001092 5441->5442 5443 10001516 GlobalFree 5441->5443 5444 10001516 GlobalFree 5442->5444 5443->5442 5445 100010a2 5444->5445 5446 100010b2 5445->5446 5447 100010a9 GlobalSize 5445->5447 5448 100010b6 GlobalAlloc 5446->5448 5450 100010c7 5446->5450 5447->5446 5449 1000153d 3 API calls 5448->5449 5449->5450 5451 100010d2 GlobalFree 5450->5451 5451->5440 5452 404a19 5453 404a45 5452->5453 5454 404a29 5452->5454 5456 404a78 5453->5456 5457 404a4b SHGetPathFromIDListW 5453->5457 5463 4058a5 GetDlgItemTextW 5454->5463 5459 404a5b 5457->5459 5462 404a62 SendMessageW 5457->5462 5458 404a36 SendMessageW 5458->5453 5460 40140b 2 API calls 5459->5460 5460->5462 5462->5456 5463->5458 5464 401c19 5465 402c15 17 API calls 5464->5465 5466 401c20 5465->5466 5467 402c15 17 API calls 5466->5467 5468 401c2d 5467->5468 5469 401c42 5468->5469 5470 402c37 17 API calls 5468->5470 5471 402c37 17 API calls 5469->5471 5475 401c52 5469->5475 5470->5469 5471->5475 5472 401ca9 5474 402c37 17 API calls 5472->5474 5473 401c5d 5476 402c15 17 API calls 5473->5476 5477 401cae 5474->5477 5475->5472 5475->5473 5478 401c62 5476->5478 5479 402c37 17 API calls 5477->5479 5480 402c15 17 API calls 5478->5480 5481 401cb7 FindWindowExW 5479->5481 5482 401c6e 5480->5482 5485 401cd9 5481->5485 5483 401c99 SendMessageW 5482->5483 5484 401c7b SendMessageTimeoutW 5482->5484 5483->5485 5484->5485 5486 402a9a SendMessageW 5487 402ab4 InvalidateRect 5486->5487 5488 402abf 5486->5488 5487->5488 4540 403d1b 4541 403d33 4540->4541 4542 403e6e 4540->4542 4541->4542 4543 403d3f 4541->4543 4544 403ebf 4542->4544 4545 403e7f GetDlgItem GetDlgItem 4542->4545 4547 403d4a SetWindowPos 4543->4547 4548 403d5d 4543->4548 4546 403f19 4544->4546 4554 401389 2 API calls 4544->4554 4549 4041f4 18 API calls 4545->4549 4550 404240 SendMessageW 4546->4550 4555 403e69 4546->4555 4547->4548 4551 403d62 ShowWindow 4548->4551 4552 403d7a 4548->4552 4553 403ea9 KiUserCallbackDispatcher 4549->4553 4579 403f2b 4550->4579 4551->4552 4556 403d82 DestroyWindow 4552->4556 4557 403d9c 4552->4557 4558 40140b 2 API calls 4553->4558 4561 403ef1 4554->4561 4562 40417d 4556->4562 4559 403da1 SetWindowLongW 4557->4559 4560 403db2 4557->4560 4558->4544 4559->4555 4563 403e5b 4560->4563 4564 403dbe GetDlgItem 4560->4564 4561->4546 4565 403ef5 SendMessageW 4561->4565 4562->4555 4571 4041ae ShowWindow 4562->4571 4570 40425b 8 API calls 4563->4570 4568 403dd1 SendMessageW IsWindowEnabled 4564->4568 4569 403dee 4564->4569 4565->4555 4566 40140b 2 API calls 4566->4579 4567 40417f DestroyWindow EndDialog 4567->4562 4568->4555 4568->4569 4573 403dfb 4569->4573 4576 403e42 SendMessageW 4569->4576 4577 403e0e 4569->4577 4585 403df3 4569->4585 4570->4555 4571->4555 4572 406281 17 API calls 4572->4579 4573->4576 4573->4585 4574 4041cd SendMessageW 4578 403e29 4574->4578 4575 4041f4 18 API calls 4575->4579 4576->4563 4580 403e16 4577->4580 4581 403e2b 4577->4581 4578->4563 4579->4555 4579->4566 4579->4567 4579->4572 4579->4575 4586 4041f4 18 API calls 4579->4586 4602 4040bf DestroyWindow 4579->4602 4583 40140b 2 API calls 4580->4583 4582 40140b 2 API calls 4581->4582 4584 403e32 4582->4584 4583->4585 4584->4563 4584->4585 4585->4574 4587 403fa6 GetDlgItem 4586->4587 4588 403fc3 ShowWindow KiUserCallbackDispatcher 4587->4588 4589 403fbb 4587->4589 4611 404216 KiUserCallbackDispatcher 4588->4611 4589->4588 4591 403fed EnableWindow 4596 404001 4591->4596 4592 404006 GetSystemMenu EnableMenuItem SendMessageW 4593 404036 SendMessageW 4592->4593 4592->4596 4593->4596 4595 403cfc 18 API calls 4595->4596 4596->4592 4596->4595 4612 404229 SendMessageW 4596->4612 4613 40625f lstrcpynW 4596->4613 4598 404065 lstrlenW 4599 406281 17 API calls 4598->4599 4600 40407b SetWindowTextW 4599->4600 4601 401389 2 API calls 4600->4601 4601->4579 4602->4562 4603 4040d9 CreateDialogParamW 4602->4603 4603->4562 4604 40410c 4603->4604 4605 4041f4 18 API calls 4604->4605 4606 404117 GetDlgItem GetWindowRect ScreenToClient SetWindowPos 4605->4606 4607 401389 2 API calls 4606->4607 4608 40415d 4607->4608 4608->4555 4609 404165 ShowWindow 4608->4609 4610 404240 SendMessageW 4609->4610 4610->4562 4611->4591 4612->4596 4613->4598 5489 40281b 5490 402821 5489->5490 5491 402829 FindClose 5490->5491 5492 402abf 5490->5492 5491->5492 5493 40149e 5494 4022f1 5493->5494 5495 4014ac PostQuitMessage 5493->5495 5495->5494 5496 100010e1 5499 10001111 5496->5499 5497 100011d8 GlobalFree 5498 100012ba 2 API calls 5498->5499 5499->5497 5499->5498 5500 100011d3 5499->5500 5501 10001272 2 API calls 5499->5501 5502 10001164 GlobalAlloc 5499->5502 5503 100011f8 GlobalFree 5499->5503 5504 100011c4 GlobalFree 5499->5504 5505 100012e1 lstrcpyW 5499->5505 5500->5497 5501->5504 5502->5499 5503->5499 5504->5499 5505->5499 5506 4029a2 5507 402c15 17 API calls 5506->5507 5508 4029a8 5507->5508 5509 4029e8 5508->5509 5510 4029cf 5508->5510 5515 402885 5508->5515 5513 402a02 5509->5513 5514 4029f2 5509->5514 5511 4029d4 5510->5511 5512 4029e5 5510->5512 5520 40625f lstrcpynW 5511->5520 5512->5515 5521 4061a6 wsprintfW 5512->5521 5516 406281 17 API calls 5513->5516 5517 402c15 17 API calls 5514->5517 5516->5512 5517->5512 5520->5515 5521->5515 5522 4015a3 5523 402c37 17 API calls 5522->5523 5524 4015aa SetFileAttributesW 5523->5524 5525 4015bc 5524->5525 5526 4028a7 5527 402c37 17 API calls 5526->5527 5528 4028b5 5527->5528 5529 4028cb 5528->5529 5530 402c37 17 API calls 5528->5530 5531 405d2c 2 API calls 5529->5531 5530->5529 5532 4028d1 5531->5532 5554 405d51 GetFileAttributesW CreateFileW 5532->5554 5534 4028de 5535 402981 5534->5535 5536 4028ea GlobalAlloc 5534->5536 5539 402989 DeleteFileW 5535->5539 5540 40299c 5535->5540 5537 402903 5536->5537 5538 402978 CloseHandle 5536->5538 5555 403308 SetFilePointer 5537->5555 5538->5535 5539->5540 5542 402909 5543 4032f2 ReadFile 5542->5543 5544 402912 GlobalAlloc 5543->5544 5545 402922 5544->5545 5546 402956 5544->5546 5548 4030fa 31 API calls 5545->5548 5547 405e03 WriteFile 5546->5547 5549 402962 GlobalFree 5547->5549 5553 40292f 5548->5553 5550 4030fa 31 API calls 5549->5550 5551 402975 5550->5551 5551->5538 5552 40294d GlobalFree 5552->5546 5553->5552 5554->5534 5555->5542 5556 40392b 5557 403936 5556->5557 5558 40393a 5557->5558 5559 40393d GlobalAlloc 5557->5559 5559->5558 4620 40202c 4621 4020f0 4620->4621 4622 40203e 4620->4622 4625 401423 24 API calls 4621->4625 4623 402c37 17 API calls 4622->4623 4624 402045 4623->4624 4626 402c37 17 API calls 4624->4626 4630 40224a 4625->4630 4627 40204e 4626->4627 4628 402064 LoadLibraryExW 4627->4628 4629 402056 GetModuleHandleW 4627->4629 4628->4621 4631 402075 4628->4631 4629->4628 4629->4631 4643 4066a8 WideCharToMultiByte 4631->4643 4634 402086 4636 4020a5 4634->4636 4637 40208e 4634->4637 4635 4020bf 4638 4052c3 24 API calls 4635->4638 4646 10001759 4636->4646 4639 401423 24 API calls 4637->4639 4640 402096 4638->4640 4639->4640 4640->4630 4641 4020e2 FreeLibrary 4640->4641 4641->4630 4644 4066d2 GetProcAddress 4643->4644 4645 402080 4643->4645 4644->4645 4645->4634 4645->4635 4647 10001789 4646->4647 4688 10001b18 4647->4688 4649 10001790 4650 100018a6 4649->4650 4651 100017a1 4649->4651 4652 100017a8 4649->4652 4650->4640 4736 10002286 4651->4736 4720 100022d0 4652->4720 4657 1000180c 4661 10001812 4657->4661 4662 1000184e 4657->4662 4658 100017ee 4749 100024a4 4658->4749 4659 100017d7 4675 100017cd 4659->4675 4746 10002b57 4659->4746 4660 100017be 4664 100017c4 4660->4664 4669 100017cf 4660->4669 4665 100015b4 3 API calls 4661->4665 4667 100024a4 9 API calls 4662->4667 4664->4675 4730 1000289c 4664->4730 4672 10001828 4665->4672 4673 10001840 4667->4673 4668 100017f4 4759 100015b4 4668->4759 4740 10002640 4669->4740 4677 100024a4 9 API calls 4672->4677 4679 10001895 4673->4679 4770 10002467 4673->4770 4675->4657 4675->4658 4676 100017d5 4676->4675 4677->4673 4679->4650 4681 1000189f GlobalFree 4679->4681 4681->4650 4685 10001881 4685->4679 4774 1000153d wsprintfW 4685->4774 4687 1000187a FreeLibrary 4687->4685 4777 1000121b GlobalAlloc 4688->4777 4690 10001b3c 4778 1000121b GlobalAlloc 4690->4778 4692 10001d7a GlobalFree GlobalFree GlobalFree 4693 10001d97 4692->4693 4708 10001de1 4692->4708 4694 100020ee 4693->4694 4702 10001dac 4693->4702 4693->4708 4697 10002110 GetModuleHandleW 4694->4697 4694->4708 4695 10001c1d GlobalAlloc 4696 10001b47 4695->4696 4696->4692 4696->4695 4698 10001c68 lstrcpyW 4696->4698 4699 10001c86 GlobalFree 4696->4699 4703 10001c72 lstrcpyW 4696->4703 4696->4708 4711 10002048 4696->4711 4713 10001f37 GlobalFree 4696->4713 4716 1000122c 2 API calls 4696->4716 4718 10001cc4 4696->4718 4784 1000121b GlobalAlloc 4696->4784 4700 10002121 LoadLibraryW 4697->4700 4701 10002136 4697->4701 4698->4703 4699->4696 4700->4701 4700->4708 4785 100015ff WideCharToMultiByte GlobalAlloc WideCharToMultiByte GetProcAddress GlobalFree 4701->4785 4702->4708 4781 1000122c 4702->4781 4703->4696 4705 10002188 4706 10002195 lstrlenW 4705->4706 4705->4708 4786 100015ff WideCharToMultiByte GlobalAlloc WideCharToMultiByte GetProcAddress GlobalFree 4706->4786 4708->4649 4709 10002148 4709->4705 4719 10002172 GetProcAddress 4709->4719 4711->4708 4714 10002090 lstrcpyW 4711->4714 4713->4696 4714->4708 4716->4696 4717 100021af 4717->4708 4718->4696 4779 1000158f GlobalSize GlobalAlloc 4718->4779 4719->4705 4722 100022e8 4720->4722 4721 1000122c GlobalAlloc lstrcpynW 4721->4722 4722->4721 4724 10002410 GlobalFree 4722->4724 4725 100023ba GlobalAlloc 4722->4725 4726 1000238f GlobalAlloc WideCharToMultiByte 4722->4726 4728 100023d1 4722->4728 4788 100012ba 4722->4788 4724->4722 4727 100017ae 4724->4727 4725->4728 4726->4724 4727->4659 4727->4660 4727->4675 4728->4724 4792 100025d4 4728->4792 4732 100028ae 4730->4732 4731 10002953 ReadFile 4733 10002971 4731->4733 4732->4731 4734 10002a62 GetLastError 4733->4734 4735 10002a6d 4733->4735 4734->4735 4735->4675 4737 10002296 4736->4737 4738 100017a7 4736->4738 4737->4738 4739 100022a8 GlobalAlloc 4737->4739 4738->4652 4739->4737 4744 1000265c 4740->4744 4741 100026c0 4743 100026c5 GlobalSize 4741->4743 4745 100026cf 4741->4745 4742 100026ad GlobalAlloc 4742->4745 4743->4745 4744->4741 4744->4742 4745->4676 4747 10002b62 4746->4747 4748 10002ba2 GlobalFree 4747->4748 4795 1000121b GlobalAlloc 4749->4795 4751 10002506 MultiByteToWideChar 4754 100024ae 4751->4754 4752 1000253c lstrcpynW 4752->4754 4753 1000254f wsprintfW 4753->4754 4754->4751 4754->4752 4754->4753 4755 1000256c GlobalFree 4754->4755 4756 100025a7 GlobalFree 4754->4756 4757 10001272 2 API calls 4754->4757 4796 100012e1 4754->4796 4755->4754 4756->4668 4757->4754 4800 1000121b GlobalAlloc 4759->4800 4761 100015ba 4762 100015c7 lstrcpyW 4761->4762 4764 100015e1 4761->4764 4765 100015fb 4762->4765 4764->4765 4766 100015e6 wsprintfW 4764->4766 4767 10001272 4765->4767 4766->4765 4768 100012b5 GlobalFree 4767->4768 4769 1000127b GlobalAlloc lstrcpynW 4767->4769 4768->4673 4769->4768 4771 10001861 4770->4771 4772 10002475 4770->4772 4771->4685 4771->4687 4772->4771 4773 10002491 GlobalFree 4772->4773 4773->4772 4775 10001272 2 API calls 4774->4775 4776 1000155e 4775->4776 4776->4679 4777->4690 4778->4696 4780 100015ad 4779->4780 4780->4718 4787 1000121b GlobalAlloc 4781->4787 4783 1000123b lstrcpynW 4783->4708 4784->4696 4785->4709 4786->4717 4787->4783 4789 100012c1 4788->4789 4790 1000122c 2 API calls 4789->4790 4791 100012df 4790->4791 4791->4722 4793 100025e2 VirtualAlloc 4792->4793 4794 10002638 4792->4794 4793->4794 4794->4728 4795->4754 4797 100012ea 4796->4797 4798 1000130c 4796->4798 4797->4798 4799 100012f0 lstrcpyW 4797->4799 4798->4754 4799->4798 4800->4761 5560 402a2f 5561 402c15 17 API calls 5560->5561 5562 402a35 5561->5562 5563 402a6c 5562->5563 5564 402885 5562->5564 5566 402a47 5562->5566 5563->5564 5565 406281 17 API calls 5563->5565 5565->5564 5566->5564 5568 4061a6 wsprintfW 5566->5568 5568->5564 5569 401a30 5570 402c37 17 API calls 5569->5570 5571 401a39 ExpandEnvironmentStringsW 5570->5571 5572 401a4d 5571->5572 5574 401a60 5571->5574 5573 401a52 lstrcmpW 5572->5573 5572->5574 5573->5574 5580 401db3 GetDC 5581 402c15 17 API calls 5580->5581 5582 401dc5 GetDeviceCaps MulDiv ReleaseDC 5581->5582 5583 402c15 17 API calls 5582->5583 5584 401df6 5583->5584 5585 406281 17 API calls 5584->5585 5586 401e33 CreateFontIndirectW 5585->5586 5587 40258c 5586->5587 5588 402835 5589 40283d 5588->5589 5590 402841 FindNextFileW 5589->5590 5591 402853 5589->5591 5590->5591 5592 4029e0 5591->5592 5594 40625f lstrcpynW 5591->5594 5594->5592 5595 401735 5596 402c37 17 API calls 5595->5596 5597 40173c SearchPathW 5596->5597 5598 4029e0 5597->5598 5599 401757 5597->5599 5599->5598 5601 40625f lstrcpynW 5599->5601 5601->5598 5602 405237 5603 405247 5602->5603 5604 40525b 5602->5604 5605 4052a4 5603->5605 5606 40524d 5603->5606 5607 405263 IsWindowVisible 5604->5607 5613 40527a 5604->5613 5608 4052a9 CallWindowProcW 5605->5608 5609 404240 SendMessageW 5606->5609 5607->5605 5610 405270 5607->5610 5611 405257 5608->5611 5609->5611 5615 404b8d SendMessageW 5610->5615 5613->5608 5620 404c0d 5613->5620 5616 404bb0 GetMessagePos ScreenToClient SendMessageW 5615->5616 5617 404bec SendMessageW 5615->5617 5618 404be9 5616->5618 5619 404be4 5616->5619 5617->5619 5618->5617 5619->5613 5629 40625f lstrcpynW 5620->5629 5622 404c20 5630 4061a6 wsprintfW 5622->5630 5624 404c2a 5625 40140b 2 API calls 5624->5625 5626 404c33 5625->5626 5631 40625f lstrcpynW 5626->5631 5628 404c3a 5628->5605 5629->5622 5630->5624 5631->5628 5632 10002a77 5633 10002a8f 5632->5633 5634 1000158f 2 API calls 5633->5634 5635 10002aaa 5634->5635 5636 4014b8 5637 4014be 5636->5637 5638 401389 2 API calls 5637->5638 5639 4014c6 5638->5639 5640 404c3f GetDlgItem GetDlgItem 5641 404c91 7 API calls 5640->5641 5645 404eaa 5640->5645 5642 404d34 DeleteObject 5641->5642 5643 404d27 SendMessageW 5641->5643 5644 404d3d 5642->5644 5643->5642 5646 404d74 5644->5646 5648 406281 17 API calls 5644->5648 5647 404f8e 5645->5647 5658 404b8d 5 API calls 5645->5658 5674 404f1b 5645->5674 5649 4041f4 18 API calls 5646->5649 5650 40503a 5647->5650 5655 404e9d 5647->5655 5660 404fe7 SendMessageW 5647->5660 5651 404d56 SendMessageW SendMessageW 5648->5651 5654 404d88 5649->5654 5652 405044 SendMessageW 5650->5652 5653 40504c 5650->5653 5651->5644 5652->5653 5662 405065 5653->5662 5663 40505e ImageList_Destroy 5653->5663 5670 405075 5653->5670 5659 4041f4 18 API calls 5654->5659 5656 40425b 8 API calls 5655->5656 5661 405230 5656->5661 5657 404f80 SendMessageW 5657->5647 5658->5674 5675 404d96 5659->5675 5660->5655 5665 404ffc SendMessageW 5660->5665 5666 40506e GlobalFree 5662->5666 5662->5670 5663->5662 5664 4051e4 5664->5655 5671 4051f6 ShowWindow GetDlgItem ShowWindow 5664->5671 5668 40500f 5665->5668 5666->5670 5667 404e6b GetWindowLongW SetWindowLongW 5669 404e84 5667->5669 5676 405020 SendMessageW 5668->5676 5672 404ea2 5669->5672 5673 404e8a ShowWindow 5669->5673 5670->5664 5683 404c0d 4 API calls 5670->5683 5686 4050b0 5670->5686 5671->5655 5692 404229 SendMessageW 5672->5692 5691 404229 SendMessageW 5673->5691 5674->5647 5674->5657 5675->5667 5677 404e65 5675->5677 5680 404de6 SendMessageW 5675->5680 5681 404e22 SendMessageW 5675->5681 5682 404e33 SendMessageW 5675->5682 5676->5650 5677->5667 5677->5669 5680->5675 5681->5675 5682->5675 5683->5686 5684 4051ba InvalidateRect 5684->5664 5685 4051d0 5684->5685 5689 404b48 20 API calls 5685->5689 5687 4050de SendMessageW 5686->5687 5688 4050f4 5686->5688 5687->5688 5688->5684 5690 405168 SendMessageW SendMessageW 5688->5690 5689->5664 5690->5688 5691->5655 5692->5645

                    Control-flow Graph

                    • Executed
                    • Not Executed
                    control_flow_graph 0 403350-40338d SetErrorMode GetVersion 1 4033a0 0->1 2 40338f-403397 call 406639 0->2 4 4033a5-4033b9 call 4065c9 lstrlenA 1->4 2->1 7 403399 2->7 9 4033bb-4033d7 call 406639 * 3 4->9 7->1 16 4033e8-403449 #17 OleInitialize SHGetFileInfoW call 40625f GetCommandLineW call 40625f GetModuleHandleW 9->16 17 4033d9-4033df 9->17 24 403453-40346d call 405b5d CharNextW 16->24 25 40344b-403452 16->25 17->16 21 4033e1 17->21 21->16 28 403473-403479 24->28 29 403584-40359e GetTempPathW call 40331f 24->29 25->24 31 403482-403486 28->31 32 40347b-403480 28->32 38 4035a0-4035be GetWindowsDirectoryW lstrcatW call 40331f 29->38 39 4035f6-403610 DeleteFileW call 402ec1 29->39 34 403488-40348c 31->34 35 40348d-403491 31->35 32->31 32->32 34->35 36 403550-40355d call 405b5d 35->36 37 403497-40349d 35->37 57 403561-403567 36->57 58 40355f-403560 36->58 40 4034b8-4034f1 37->40 41 40349f-4034a7 37->41 38->39 56 4035c0-4035f0 GetTempPathW lstrcatW SetEnvironmentVariableW * 2 call 40331f 38->56 52 4036c1-4036d1 call 403893 OleUninitialize 39->52 53 403616-40361c 39->53 48 4034f3-4034f8 40->48 49 40350e-403548 40->49 46 4034a9-4034ac 41->46 47 4034ae 41->47 46->40 46->47 47->40 48->49 54 4034fa-403502 48->54 49->36 55 40354a-40354e 49->55 75 4037f7-4037fd 52->75 76 4036d7-4036e7 call 4058c1 ExitProcess 52->76 60 4036b1-4036b8 call 40396d 53->60 61 403622-40362d call 405b5d 53->61 63 403504-403507 54->63 64 403509 54->64 55->36 65 40356f-40357d call 40625f 55->65 56->39 56->52 57->28 59 40356d 57->59 58->57 67 403582 59->67 74 4036bd 60->74 77 40367b-403685 61->77 78 40362f-403664 61->78 63->49 63->64 64->49 65->67 67->29 74->52 80 40387b-403883 75->80 81 4037ff-403815 GetCurrentProcess OpenProcessToken 75->81 85 403687-403695 call 405c38 77->85 86 4036ed-403701 call 40582c lstrcatW 77->86 82 403666-40366a 78->82 83 403885 80->83 84 403889-40388d ExitProcess 80->84 88 403817-403845 LookupPrivilegeValueW AdjustTokenPrivileges 81->88 89 40384b-403859 call 406639 81->89 91 403673-403677 82->91 92 40366c-403671 82->92 83->84 85->52 101 403697-4036ad call 40625f * 2 85->101 102 403703-403709 lstrcatW 86->102 103 40370e-403728 lstrcatW lstrcmpiW 86->103 88->89 99 403867-403872 ExitWindowsEx 89->99 100 40385b-403865 89->100 91->82 96 403679 91->96 92->91 92->96 96->77 99->80 105 403874-403876 call 40140b 99->105 100->99 100->105 101->60 102->103 103->52 104 40372a-40372d 103->104 108 403736 call 40580f 104->108 109 40372f-403734 call 405792 104->109 105->80 117 40373b-403749 SetCurrentDirectoryW 108->117 109->117 118 403756-40377f call 40625f 117->118 119 40374b-403751 call 40625f 117->119 123 403784-4037a0 call 406281 DeleteFileW 118->123 119->118 126 4037e1-4037e9 123->126 127 4037a2-4037b2 CopyFileW 123->127 126->123 129 4037eb-4037f2 call 406025 126->129 127->126 128 4037b4-4037d4 call 406025 call 406281 call 405844 127->128 128->126 138 4037d6-4037dd CloseHandle 128->138 129->52 138->126
                    C-Code - Quality: 81%
                    			_entry_() {
                    				signed int _t51;
                    				intOrPtr* _t56;
                    				WCHAR* _t60;
                    				char* _t63;
                    				void* _t66;
                    				void* _t68;
                    				int _t70;
                    				int _t72;
                    				int _t75;
                    				intOrPtr* _t76;
                    				int _t77;
                    				int _t79;
                    				void* _t103;
                    				signed int _t120;
                    				void* _t123;
                    				void* _t128;
                    				intOrPtr _t147;
                    				intOrPtr _t148;
                    				intOrPtr* _t149;
                    				int _t151;
                    				void* _t154;
                    				int _t155;
                    				signed int _t159;
                    				signed int _t164;
                    				signed int _t169;
                    				void* _t171;
                    				WCHAR* _t172;
                    				signed int _t175;
                    				signed int _t178;
                    				CHAR* _t179;
                    				void* _t182;
                    				int* _t184;
                    				void* _t192;
                    				char* _t193;
                    				void* _t196;
                    				void* _t197;
                    				void* _t243;
                    
                    				_t171 = 0x20;
                    				_t151 = 0;
                    				 *(_t197 + 0x14) = 0;
                    				 *(_t197 + 0x10) = L"Error writing temporary file. Make sure your temp folder is valid.";
                    				 *(_t197 + 0x1c) = 0;
                    				SetErrorMode(0x8001); // executed
                    				_t51 = GetVersion() & 0xbfffffff;
                    				 *0x7a8a2c = _t51;
                    				if(_t51 != 6) {
                    					_t149 = E00406639(0);
                    					if(_t149 != 0) {
                    						 *_t149(0xc00);
                    					}
                    				}
                    				_t179 = "UXTHEME";
                    				goto L4;
                    				L8:
                    				__imp__#17(_t192);
                    				__imp__OleInitialize(_t151); // executed
                    				 *0x7a8af8 = _t56;
                    				SHGetFileInfoW(0x79fee0, _t151, _t197 + 0x34, 0x2b4, _t151); // executed
                    				E0040625F(0x7a7a20, L"NSIS Error");
                    				_t60 = GetCommandLineW();
                    				_t193 = L"\"C:\\Users\\alfons\\Desktop\\Ordene 501527,pdf.exe\" ";
                    				E0040625F(_t193, _t60);
                    				 *0x7a8a20 = GetModuleHandleW(_t151);
                    				_t63 = _t193;
                    				if(L"\"C:\\Users\\alfons\\Desktop\\Ordene 501527,pdf.exe\" " == 0x22) {
                    					_t63 =  &M007B3002;
                    					_t171 = 0x22;
                    				}
                    				_t155 = CharNextW(E00405B5D(_t63, _t171));
                    				 *(_t197 + 0x18) = _t155;
                    				_t66 =  *_t155;
                    				if(_t66 == _t151) {
                    					L33:
                    					_t172 = L"C:\\Users\\alfons\\AppData\\Local\\Temp\\";
                    					GetTempPathW(0x400, _t172);
                    					_t68 = E0040331F(_t155, 0);
                    					_t225 = _t68;
                    					if(_t68 != 0) {
                    						L36:
                    						DeleteFileW(L"1033"); // executed
                    						_t70 = E00402EC1(_t227,  *(_t197 + 0x1c)); // executed
                    						 *(_t197 + 0x10) = _t70;
                    						if(_t70 != _t151) {
                    							L48:
                    							E00403893();
                    							__imp__OleUninitialize();
                    							_t239 =  *(_t197 + 0x10) - _t151;
                    							if( *(_t197 + 0x10) == _t151) {
                    								__eflags =  *0x7a8ad4 - _t151;
                    								if( *0x7a8ad4 == _t151) {
                    									L72:
                    									_t72 =  *0x7a8aec;
                    									__eflags = _t72 - 0xffffffff;
                    									if(_t72 != 0xffffffff) {
                    										 *(_t197 + 0x10) = _t72;
                    									}
                    									ExitProcess( *(_t197 + 0x10));
                    								}
                    								_t75 = OpenProcessToken(GetCurrentProcess(), 0x28, _t197 + 0x14);
                    								__eflags = _t75;
                    								if(_t75 != 0) {
                    									LookupPrivilegeValueW(_t151, L"SeShutdownPrivilege", _t197 + 0x20);
                    									 *(_t197 + 0x34) = 1;
                    									 *(_t197 + 0x40) = 2;
                    									AdjustTokenPrivileges( *(_t197 + 0x28), _t151, _t197 + 0x24, _t151, _t151, _t151);
                    								}
                    								_t76 = E00406639(4);
                    								__eflags = _t76 - _t151;
                    								if(_t76 == _t151) {
                    									L70:
                    									_t77 = ExitWindowsEx(2, 0x80040002);
                    									__eflags = _t77;
                    									if(_t77 != 0) {
                    										goto L72;
                    									}
                    									goto L71;
                    								} else {
                    									_t79 =  *_t76(_t151, _t151, _t151, 0x25, 0x80040002);
                    									__eflags = _t79;
                    									if(_t79 == 0) {
                    										L71:
                    										E0040140B(9);
                    										goto L72;
                    									}
                    									goto L70;
                    								}
                    							}
                    							E004058C1( *(_t197 + 0x10), 0x200010);
                    							ExitProcess(2);
                    						}
                    						if( *0x7a8a40 == _t151) {
                    							L47:
                    							 *0x7a8aec =  *0x7a8aec | 0xffffffff;
                    							 *(_t197 + 0x14) = E0040396D( *0x7a8aec);
                    							goto L48;
                    						}
                    						_t184 = E00405B5D(_t193, _t151);
                    						if(_t184 < _t193) {
                    							L44:
                    							_t236 = _t184 - _t193;
                    							 *(_t197 + 0x10) = L"Error launching installer";
                    							if(_t184 < _t193) {
                    								_t182 = E0040582C(_t239);
                    								lstrcatW(_t172, L"~nsu");
                    								if(_t182 != _t151) {
                    									lstrcatW(_t172, "A");
                    								}
                    								lstrcatW(_t172, L".tmp");
                    								_t195 = L"C:\\Users\\alfons\\Desktop";
                    								if(lstrcmpiW(_t172, L"C:\\Users\\alfons\\Desktop") != 0) {
                    									_push(_t172);
                    									if(_t182 == _t151) {
                    										E0040580F();
                    									} else {
                    										E00405792();
                    									}
                    									SetCurrentDirectoryW(_t172);
                    									_t243 = L"C:\\Users\\alfons\\AppData\\Roaming\\Microsoft\\Windows\\Start Menu\\Misundes\\Caesural4" - _t151; // 0x43
                    									if(_t243 == 0) {
                    										E0040625F(L"C:\\Users\\alfons\\AppData\\Roaming\\Microsoft\\Windows\\Start Menu\\Misundes\\Caesural4", _t195);
                    									}
                    									E0040625F(0x7a9000,  *(_t197 + 0x18));
                    									_t156 = "A" & 0x0000ffff;
                    									 *0x7a9800 = ( *0x40a25a & 0x0000ffff) << 0x00000010 | "A" & 0x0000ffff;
                    									_t196 = 0x1a;
                    									do {
                    										E00406281(_t151, _t172, 0x79f6e0, 0x79f6e0,  *((intOrPtr*)( *0x7a8a34 + 0x120)));
                    										DeleteFileW(0x79f6e0);
                    										if( *(_t197 + 0x10) != _t151 && CopyFileW(L"C:\\Users\\alfons\\Desktop\\Ordene 501527,pdf.exe", 0x79f6e0, 1) != 0) {
                    											E00406025(_t156, 0x79f6e0, _t151);
                    											E00406281(_t151, _t172, 0x79f6e0, 0x79f6e0,  *((intOrPtr*)( *0x7a8a34 + 0x124)));
                    											_t103 = E00405844(0x79f6e0);
                    											if(_t103 != _t151) {
                    												CloseHandle(_t103);
                    												 *(_t197 + 0x10) = _t151;
                    											}
                    										}
                    										 *0x7a9800 =  *0x7a9800 + 1;
                    										_t196 = _t196 - 1;
                    									} while (_t196 != 0);
                    									E00406025(_t156, _t172, _t151);
                    								}
                    								goto L48;
                    							}
                    							 *_t184 = _t151;
                    							_t185 =  &(_t184[2]);
                    							if(E00405C38(_t236,  &(_t184[2])) == 0) {
                    								goto L48;
                    							}
                    							E0040625F(L"C:\\Users\\alfons\\AppData\\Roaming\\Microsoft\\Windows\\Start Menu\\Misundes\\Caesural4", _t185);
                    							E0040625F(L"C:\\Users\\alfons\\AppData\\Roaming\\Microsoft\\Windows\\Start Menu\\Misundes\\Caesural4\\Kvalitative209", _t185);
                    							 *(_t197 + 0x10) = _t151;
                    							goto L47;
                    						}
                    						asm("cdq");
                    						asm("cdq");
                    						asm("cdq");
                    						_t159 = ( *0x40a27e & 0x0000ffff) << 0x00000010 | L" _?=" & 0x0000ffff;
                    						_t120 = ( *0x40a282 & 0x0000ffff) << 0x00000010 |  *0x40a280 & 0x0000ffff | (_t164 << 0x00000020 |  *0x40a282 & 0x0000ffff) << 0x10;
                    						while( *_t184 != _t159 || _t184[1] != _t120) {
                    							_t184 = _t184;
                    							if(_t184 >= _t193) {
                    								continue;
                    							}
                    							break;
                    						}
                    						_t151 = 0;
                    						goto L44;
                    					}
                    					GetWindowsDirectoryW(_t172, 0x3fb);
                    					lstrcatW(_t172, L"\\Temp");
                    					_t123 = E0040331F(_t155, _t225);
                    					_t226 = _t123;
                    					if(_t123 != 0) {
                    						goto L36;
                    					}
                    					GetTempPathW(0x3fc, _t172);
                    					lstrcatW(_t172, L"Low");
                    					SetEnvironmentVariableW(L"TEMP", _t172);
                    					SetEnvironmentVariableW(L"TMP", _t172);
                    					_t128 = E0040331F(_t155, _t226);
                    					_t227 = _t128;
                    					if(_t128 == 0) {
                    						goto L48;
                    					}
                    					goto L36;
                    				} else {
                    					do {
                    						_t154 = 0x20;
                    						if(_t66 != _t154) {
                    							L13:
                    							if( *_t155 == 0x22) {
                    								_t155 = _t155 + 2;
                    								_t154 = 0x22;
                    							}
                    							if( *_t155 != 0x2f) {
                    								goto L27;
                    							} else {
                    								_t155 = _t155 + 2;
                    								if( *_t155 == 0x53) {
                    									_t148 =  *((intOrPtr*)(_t155 + 2));
                    									if(_t148 == 0x20 || _t148 == 0) {
                    										 *0x7a8ae0 = 1;
                    									}
                    								}
                    								asm("cdq");
                    								asm("cdq");
                    								_t169 = L"NCRC" & 0x0000ffff;
                    								asm("cdq");
                    								_t175 = ( *0x40a2c2 & 0x0000ffff) << 0x00000010 |  *0x40a2c0 & 0x0000ffff | _t169;
                    								if( *_t155 == (( *0x40a2be & 0x0000ffff) << 0x00000010 | _t169) &&  *((intOrPtr*)(_t155 + 4)) == _t175) {
                    									_t147 =  *((intOrPtr*)(_t155 + 8));
                    									if(_t147 == 0x20 || _t147 == 0) {
                    										 *(_t197 + 0x1c) =  *(_t197 + 0x1c) | 0x00000004;
                    									}
                    								}
                    								asm("cdq");
                    								asm("cdq");
                    								_t164 = L" /D=" & 0x0000ffff;
                    								asm("cdq");
                    								_t178 = ( *0x40a2b6 & 0x0000ffff) << 0x00000010 |  *0x40a2b4 & 0x0000ffff | _t164;
                    								if( *(_t155 - 4) != (( *0x40a2b2 & 0x0000ffff) << 0x00000010 | _t164) ||  *_t155 != _t178) {
                    									goto L27;
                    								} else {
                    									 *(_t155 - 4) =  *(_t155 - 4) & 0x00000000;
                    									__eflags = _t155;
                    									E0040625F(L"C:\\Users\\alfons\\AppData\\Roaming\\Microsoft\\Windows\\Start Menu\\Misundes\\Caesural4", _t155);
                    									L32:
                    									_t151 = 0;
                    									goto L33;
                    								}
                    							}
                    						} else {
                    							goto L12;
                    						}
                    						do {
                    							L12:
                    							_t155 = _t155 + 2;
                    						} while ( *_t155 == _t154);
                    						goto L13;
                    						L27:
                    						_t155 = E00405B5D(_t155, _t154);
                    						if( *_t155 == 0x22) {
                    							_t155 = _t155 + 2;
                    						}
                    						_t66 =  *_t155;
                    					} while (_t66 != 0);
                    					goto L32;
                    				}
                    				L4:
                    				E004065C9(_t179); // executed
                    				_t179 =  &(_t179[lstrlenA(_t179) + 1]);
                    				if( *_t179 != 0) {
                    					goto L4;
                    				} else {
                    					E00406639(0xa);
                    					 *0x7a8a24 = E00406639(8);
                    					_t56 = E00406639(6);
                    					if(_t56 != _t151) {
                    						_t56 =  *_t56(0x1e);
                    						if(_t56 != 0) {
                    							 *0x7a8a2f =  *0x7a8a2f | 0x00000040;
                    						}
                    					}
                    					goto L8;
                    				}
                    			}








































                    0x0040335b
                    0x0040335c
                    0x00403363
                    0x00403367
                    0x0040336f
                    0x00403373
                    0x0040337f
                    0x00403388
                    0x0040338d
                    0x00403390
                    0x00403397
                    0x0040339e
                    0x0040339e
                    0x00403397
                    0x004033a0
                    0x004033a0
                    0x004033e8
                    0x004033e9
                    0x004033f0
                    0x004033f6
                    0x0040340c
                    0x0040341c
                    0x00403421
                    0x00403427
                    0x0040342e
                    0x00403442
                    0x00403447
                    0x00403449
                    0x0040344d
                    0x00403452
                    0x00403452
                    0x00403461
                    0x00403463
                    0x00403467
                    0x0040346d
                    0x00403584
                    0x0040358a
                    0x00403595
                    0x00403597
                    0x0040359c
                    0x0040359e
                    0x004035f6
                    0x004035fb
                    0x00403605
                    0x0040360c
                    0x00403610
                    0x004036c1
                    0x004036c1
                    0x004036c6
                    0x004036cc
                    0x004036d1
                    0x004037f7
                    0x004037fd
                    0x0040387b
                    0x0040387b
                    0x00403880
                    0x00403883
                    0x00403885
                    0x00403885
                    0x0040388d
                    0x0040388d
                    0x0040380d
                    0x00403813
                    0x00403815
                    0x00403822
                    0x00403835
                    0x0040383d
                    0x00403845
                    0x00403845
                    0x0040384d
                    0x00403852
                    0x00403859
                    0x00403867
                    0x0040386a
                    0x00403870
                    0x00403872
                    0x00000000
                    0x00000000
                    0x00000000
                    0x0040385b
                    0x00403861
                    0x00403863
                    0x00403865
                    0x00403874
                    0x00403876
                    0x00000000
                    0x00403876
                    0x00000000
                    0x00403865
                    0x00403859
                    0x004036e0
                    0x004036e7
                    0x004036e7
                    0x0040361c
                    0x004036b1
                    0x004036b1
                    0x004036bd
                    0x00000000
                    0x004036bd
                    0x00403629
                    0x0040362d
                    0x0040367b
                    0x0040367b
                    0x0040367d
                    0x00403685
                    0x004036f8
                    0x004036fa
                    0x00403701
                    0x00403709
                    0x00403709
                    0x00403714
                    0x00403719
                    0x00403728
                    0x0040372c
                    0x0040372d
                    0x00403736
                    0x0040372f
                    0x0040372f
                    0x0040372f
                    0x0040373c
                    0x00403742
                    0x00403749
                    0x00403751
                    0x00403751
                    0x0040375f
                    0x0040376b
                    0x00403779
                    0x0040377e
                    0x00403784
                    0x00403790
                    0x00403796
                    0x004037a0
                    0x004037b6
                    0x004037c7
                    0x004037cd
                    0x004037d4
                    0x004037d7
                    0x004037dd
                    0x004037dd
                    0x004037d4
                    0x004037e1
                    0x004037e8
                    0x004037e8
                    0x004037ed
                    0x004037ed
                    0x00000000
                    0x00403728
                    0x00403687
                    0x0040368a
                    0x00403695
                    0x00000000
                    0x00000000
                    0x0040369d
                    0x004036a8
                    0x004036ad
                    0x00000000
                    0x004036ad
                    0x00403636
                    0x0040364e
                    0x0040365f
                    0x00403660
                    0x00403664
                    0x00403666
                    0x00403674
                    0x00403677
                    0x00000000
                    0x00000000
                    0x00000000
                    0x00403677
                    0x00403679
                    0x00000000
                    0x00403679
                    0x004035a6
                    0x004035b2
                    0x004035b7
                    0x004035bc
                    0x004035be
                    0x00000000
                    0x00000000
                    0x004035c6
                    0x004035ce
                    0x004035df
                    0x004035e7
                    0x004035e9
                    0x004035ee
                    0x004035f0
                    0x00000000
                    0x00000000
                    0x00000000
                    0x00403473
                    0x00403473
                    0x00403475
                    0x00403479
                    0x00403482
                    0x00403486
                    0x0040348b
                    0x0040348c
                    0x0040348c
                    0x00403491
                    0x00000000
                    0x00403497
                    0x00403498
                    0x0040349d
                    0x0040349f
                    0x004034a7
                    0x004034ae
                    0x004034ae
                    0x004034a7
                    0x004034bf
                    0x004034d2
                    0x004034d3
                    0x004034e8
                    0x004034ed
                    0x004034f1
                    0x004034fa
                    0x00403502
                    0x00403509
                    0x00403509
                    0x00403502
                    0x00403515
                    0x00403528
                    0x00403529
                    0x0040353e
                    0x00403544
                    0x00403548
                    0x00000000
                    0x0040356f
                    0x0040356f
                    0x00403574
                    0x0040357d
                    0x00403582
                    0x00403582
                    0x00000000
                    0x00403582
                    0x00403548
                    0x00000000
                    0x00000000
                    0x00000000
                    0x0040347b
                    0x0040347b
                    0x0040347c
                    0x0040347d
                    0x00000000
                    0x00403550
                    0x00403557
                    0x0040355d
                    0x00403560
                    0x00403560
                    0x00403561
                    0x00403564
                    0x00000000
                    0x0040356d
                    0x004033a5
                    0x004033a6
                    0x004033b2
                    0x004033b9
                    0x00000000
                    0x004033bb
                    0x004033bd
                    0x004033cb
                    0x004033d0
                    0x004033d7
                    0x004033db
                    0x004033df
                    0x004033e1
                    0x004033e1
                    0x004033df
                    0x00000000
                    0x004033d7

                    APIs
                    • SetErrorMode.KERNELBASE ref: 00403373
                    • GetVersion.KERNEL32 ref: 00403379
                    • lstrlenA.KERNEL32(UXTHEME,UXTHEME), ref: 004033AC
                    • #17.COMCTL32(?,00000006,00000008,0000000A), ref: 004033E9
                    • OleInitialize.OLE32(00000000), ref: 004033F0
                    • SHGetFileInfoW.SHELL32(0079FEE0,00000000,?,000002B4,00000000), ref: 0040340C
                    • GetCommandLineW.KERNEL32(007A7A20,NSIS Error,?,00000006,00000008,0000000A), ref: 00403421
                    • GetModuleHandleW.KERNEL32(00000000,"C:\Users\user\Desktop\Ordene 501527,pdf.exe" ,00000000,?,00000006,00000008,0000000A), ref: 00403434
                    • CharNextW.USER32(00000000,"C:\Users\user\Desktop\Ordene 501527,pdf.exe" ,00000020,?,00000006,00000008,0000000A), ref: 0040345B
                      • Part of subcall function 00406639: GetModuleHandleA.KERNEL32(?,00000020,?,004033C2,0000000A), ref: 0040664B
                      • Part of subcall function 00406639: GetProcAddress.KERNEL32(00000000,?), ref: 00406666
                    • GetTempPathW.KERNEL32(00000400,C:\Users\user\AppData\Local\Temp\,?,00000006,00000008,0000000A), ref: 00403595
                    • GetWindowsDirectoryW.KERNEL32(C:\Users\user\AppData\Local\Temp\,000003FB,?,00000006,00000008,0000000A), ref: 004035A6
                    • lstrcatW.KERNEL32(C:\Users\user\AppData\Local\Temp\,\Temp), ref: 004035B2
                    • GetTempPathW.KERNEL32(000003FC,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,\Temp,?,00000006,00000008,0000000A), ref: 004035C6
                    • lstrcatW.KERNEL32(C:\Users\user\AppData\Local\Temp\,Low), ref: 004035CE
                    • SetEnvironmentVariableW.KERNEL32(TEMP,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,Low,?,00000006,00000008,0000000A), ref: 004035DF
                    • SetEnvironmentVariableW.KERNEL32(TMP,C:\Users\user\AppData\Local\Temp\,?,00000006,00000008,0000000A), ref: 004035E7
                    • DeleteFileW.KERNELBASE(1033,?,00000006,00000008,0000000A), ref: 004035FB
                      • Part of subcall function 0040625F: lstrcpynW.KERNEL32(?,?,00000400,00403421,007A7A20,NSIS Error,?,00000006,00000008,0000000A), ref: 0040626C
                    • OleUninitialize.OLE32(00000006,?,00000006,00000008,0000000A), ref: 004036C6
                    • ExitProcess.KERNEL32 ref: 004036E7
                    • lstrcatW.KERNEL32(C:\Users\user\AppData\Local\Temp\,~nsu), ref: 004036FA
                    • lstrcatW.KERNEL32(C:\Users\user\AppData\Local\Temp\,0040A26C), ref: 00403709
                    • lstrcatW.KERNEL32(C:\Users\user\AppData\Local\Temp\,.tmp), ref: 00403714
                    • lstrcmpiW.KERNEL32(C:\Users\user\AppData\Local\Temp\,C:\Users\user\Desktop,C:\Users\user\AppData\Local\Temp\,.tmp,C:\Users\user\AppData\Local\Temp\,~nsu,"C:\Users\user\Desktop\Ordene 501527,pdf.exe" ,00000000,00000006,?,00000006,00000008,0000000A), ref: 00403720
                    • SetCurrentDirectoryW.KERNEL32(C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,?,00000006,00000008,0000000A), ref: 0040373C
                    • DeleteFileW.KERNEL32(0079F6E0,0079F6E0,?,007A9000,00000008,?,00000006,00000008,0000000A), ref: 00403796
                    • CopyFileW.KERNEL32(C:\Users\user\Desktop\Ordene 501527,pdf.exe,0079F6E0,00000001,?,00000006,00000008,0000000A), ref: 004037AA
                    • CloseHandle.KERNEL32(00000000,0079F6E0,0079F6E0,?,0079F6E0,00000000,?,00000006,00000008,0000000A), ref: 004037D7
                    • GetCurrentProcess.KERNEL32(00000028,0000000A,00000006,00000008,0000000A), ref: 00403806
                    • OpenProcessToken.ADVAPI32(00000000), ref: 0040380D
                    • LookupPrivilegeValueW.ADVAPI32(00000000,SeShutdownPrivilege,?), ref: 00403822
                    • AdjustTokenPrivileges.ADVAPI32 ref: 00403845
                    • ExitWindowsEx.USER32(00000002,80040002), ref: 0040386A
                    • ExitProcess.KERNEL32 ref: 0040388D
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.668679627.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000000.00000002.668672686.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.668695651.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.668709908.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.669360772.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.669367484.0000000000782000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.669373527.0000000000786000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.669383228.0000000000789000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.669410918.00000000007A4000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.669416138.00000000007A6000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.669434006.00000000007B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.669445400.00000000007C4000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.669547952.0000000000804000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_400000_Ordene 501527,pdf.jbxd
                    Similarity
                    • API ID: lstrcat$FileProcess$ExitHandle$CurrentDeleteDirectoryEnvironmentModulePathTempTokenVariableWindows$AddressAdjustCharCloseCommandCopyErrorInfoInitializeLineLookupModeNextOpenPrivilegePrivilegesProcUninitializeValueVersionlstrcmpilstrcpynlstrlen
                    • String ID: "C:\Users\user\Desktop\Ordene 501527,pdf.exe" $.tmp$1033$C:\Users\user\AppData\Local\Temp\$C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Misundes\Caesural4$C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Misundes\Caesural4\Kvalitative209$C:\Users\user\Desktop$C:\Users\user\Desktop\Ordene 501527,pdf.exe$Error launching installer$Low$NSIS Error$SeShutdownPrivilege$TEMP$TMP$UXTHEME$\Temp$~nsu
                    • API String ID: 2488574733-1870963604
                    • Opcode ID: 9d094df354a64ac00225b874e1f21de582985ea5e934b42c4bdb5f03e135a873
                    • Instruction ID: f8b53dcf82f20274bbdd851e6e7f34b77cfd1224ece1df9e86175f3a8edd883a
                    • Opcode Fuzzy Hash: 9d094df354a64ac00225b874e1f21de582985ea5e934b42c4bdb5f03e135a873
                    • Instruction Fuzzy Hash: CED11371500310AAD7207F759D85B3B3AACEB41746F00493FF981B62E2DB7D8A458B6E
                    Uniqueness

                    Uniqueness Score: -1.00%

                    Control-flow Graph

                    • Executed
                    • Not Executed
                    control_flow_graph 139 405402-40541d 140 405423-4054ea GetDlgItem * 3 call 404229 call 404b60 GetClientRect GetSystemMetrics SendMessageW * 2 139->140 141 4055ac-4055b3 139->141 159 405508-40550b 140->159 160 4054ec-405506 SendMessageW * 2 140->160 143 4055b5-4055d7 GetDlgItem CreateThread FindCloseChangeNotification 141->143 144 4055dd-4055ea 141->144 143->144 146 405608-405612 144->146 147 4055ec-4055f2 144->147 151 405614-40561a 146->151 152 405668-40566c 146->152 149 4055f4-405603 ShowWindow * 2 call 404229 147->149 150 40562d-405636 call 40425b 147->150 149->146 163 40563b-40563f 150->163 156 405642-405652 ShowWindow 151->156 157 40561c-405628 call 4041cd 151->157 152->150 154 40566e-405674 152->154 154->150 161 405676-405689 SendMessageW 154->161 164 405662-405663 call 4041cd 156->164 165 405654-40565d call 4052c3 156->165 157->150 168 40551b-405532 call 4041f4 159->168 169 40550d-405519 SendMessageW 159->169 160->159 170 40578b-40578d 161->170 171 40568f-4056ba CreatePopupMenu call 406281 AppendMenuW 161->171 164->152 165->164 178 405534-405548 ShowWindow 168->178 179 405568-405589 GetDlgItem SendMessageW 168->179 169->168 170->163 176 4056bc-4056cc GetWindowRect 171->176 177 4056cf-4056e4 TrackPopupMenu 171->177 176->177 177->170 181 4056ea-405701 177->181 182 405557 178->182 183 40554a-405555 ShowWindow 178->183 179->170 180 40558f-4055a7 SendMessageW * 2 179->180 180->170 184 405706-405721 SendMessageW 181->184 185 40555d-405563 call 404229 182->185 183->185 184->184 186 405723-405746 OpenClipboard EmptyClipboard GlobalAlloc GlobalLock 184->186 185->179 188 405748-40576f SendMessageW 186->188 188->188 189 405771-405785 GlobalUnlock SetClipboardData CloseClipboard 188->189 189->170
                    C-Code - Quality: 95%
                    			E00405402(struct HWND__* _a4, long _a8, long _a12, unsigned int _a16) {
                    				struct HWND__* _v8;
                    				long _v12;
                    				struct tagRECT _v28;
                    				void* _v36;
                    				signed int _v40;
                    				int _v44;
                    				int _v48;
                    				signed int _v52;
                    				int _v56;
                    				void* _v60;
                    				void* _v68;
                    				void* __ebx;
                    				void* __edi;
                    				void* __esi;
                    				struct HWND__* _t94;
                    				long _t95;
                    				int _t100;
                    				void* _t108;
                    				intOrPtr _t119;
                    				void* _t127;
                    				intOrPtr _t130;
                    				struct HWND__* _t134;
                    				int _t156;
                    				int _t159;
                    				struct HMENU__* _t164;
                    				struct HWND__* _t168;
                    				struct HWND__* _t169;
                    				int _t171;
                    				void* _t172;
                    				short* _t173;
                    				short* _t175;
                    				int _t177;
                    
                    				_t169 =  *0x7a7a04;
                    				_t156 = 0;
                    				_v8 = _t169;
                    				if(_a8 != 0x110) {
                    					if(_a8 == 0x405) {
                    						_t127 = CreateThread(0, 0, E00405396, GetDlgItem(_a4, 0x3ec), 0,  &_v12); // executed
                    						FindCloseChangeNotification(_t127); // executed
                    					}
                    					if(_a8 != 0x111) {
                    						L17:
                    						_t171 = 1;
                    						if(_a8 != 0x404) {
                    							L25:
                    							if(_a8 != 0x7b) {
                    								goto L20;
                    							}
                    							_t94 = _v8;
                    							if(_a12 != _t94) {
                    								goto L20;
                    							}
                    							_t95 = SendMessageW(_t94, 0x1004, _t156, _t156);
                    							_a8 = _t95;
                    							if(_t95 <= _t156) {
                    								L36:
                    								return 0;
                    							}
                    							_t164 = CreatePopupMenu();
                    							AppendMenuW(_t164, _t156, _t171, E00406281(_t156, _t164, _t171, _t156, 0xffffffe1));
                    							_t100 = _a16;
                    							_t159 = _a16 >> 0x10;
                    							if(_a16 == 0xffffffff) {
                    								GetWindowRect(_v8,  &_v28);
                    								_t100 = _v28.left;
                    								_t159 = _v28.top;
                    							}
                    							if(TrackPopupMenu(_t164, 0x180, _t100, _t159, _t156, _a4, _t156) == _t171) {
                    								_v60 = _t156;
                    								_v48 = 0x7a1f20;
                    								_v44 = 0x1000;
                    								_a4 = _a8;
                    								do {
                    									_a4 = _a4 - 1;
                    									_t171 = _t171 + SendMessageW(_v8, 0x1073, _a4,  &_v68) + 2;
                    								} while (_a4 != _t156);
                    								OpenClipboard(_t156);
                    								EmptyClipboard();
                    								_t108 = GlobalAlloc(0x42, _t171 + _t171);
                    								_a4 = _t108;
                    								_t172 = GlobalLock(_t108);
                    								do {
                    									_v48 = _t172;
                    									_t173 = _t172 + SendMessageW(_v8, 0x1073, _t156,  &_v68) * 2;
                    									 *_t173 = 0xd;
                    									_t175 = _t173 + 2;
                    									 *_t175 = 0xa;
                    									_t172 = _t175 + 2;
                    									_t156 = _t156 + 1;
                    								} while (_t156 < _a8);
                    								GlobalUnlock(_a4);
                    								SetClipboardData(0xd, _a4);
                    								CloseClipboard();
                    							}
                    							goto L36;
                    						}
                    						if( *0x7a79ec == _t156) {
                    							ShowWindow( *0x7a8a28, 8);
                    							if( *0x7a8acc == _t156) {
                    								_t119 =  *0x7a0ef8; // 0xb899cc
                    								E004052C3( *((intOrPtr*)(_t119 + 0x34)), _t156);
                    							}
                    							E004041CD(_t171);
                    							goto L25;
                    						}
                    						 *0x7a06f0 = 2;
                    						E004041CD(0x78);
                    						goto L20;
                    					} else {
                    						if(_a12 != 0x403) {
                    							L20:
                    							return E0040425B(_a8, _a12, _a16);
                    						}
                    						ShowWindow( *0x7a79f0, _t156);
                    						ShowWindow(_t169, 8);
                    						E00404229(_t169);
                    						goto L17;
                    					}
                    				}
                    				_v52 = _v52 | 0xffffffff;
                    				_v40 = _v40 | 0xffffffff;
                    				_t177 = 2;
                    				_v60 = _t177;
                    				_v56 = 0;
                    				_v48 = 0;
                    				_v44 = 0;
                    				asm("stosd");
                    				asm("stosd");
                    				_t130 =  *0x7a8a34;
                    				_a8 =  *((intOrPtr*)(_t130 + 0x5c));
                    				_a12 =  *((intOrPtr*)(_t130 + 0x60));
                    				 *0x7a79f0 = GetDlgItem(_a4, 0x403);
                    				 *0x7a79e8 = GetDlgItem(_a4, 0x3ee);
                    				_t134 = GetDlgItem(_a4, 0x3f8);
                    				 *0x7a7a04 = _t134;
                    				_v8 = _t134;
                    				E00404229( *0x7a79f0);
                    				 *0x7a79f4 = E00404B60(4);
                    				 *0x7a7a0c = 0;
                    				GetClientRect(_v8,  &_v28);
                    				_v52 = _v28.right - GetSystemMetrics(_t177);
                    				SendMessageW(_v8, 0x1061, 0,  &_v60); // executed
                    				SendMessageW(_v8, 0x1036, 0x4000, 0x4000); // executed
                    				if(_a8 >= 0) {
                    					SendMessageW(_v8, 0x1001, 0, _a8);
                    					SendMessageW(_v8, 0x1026, 0, _a8);
                    				}
                    				if(_a12 >= _t156) {
                    					SendMessageW(_v8, 0x1024, _t156, _a12);
                    				}
                    				_push( *((intOrPtr*)(_a16 + 0x30)));
                    				_push(0x1b);
                    				E004041F4(_a4);
                    				if(( *0x7a8a3c & 0x00000003) != 0) {
                    					ShowWindow( *0x7a79f0, _t156); // executed
                    					if(( *0x7a8a3c & 0x00000002) != 0) {
                    						 *0x7a79f0 = _t156;
                    					} else {
                    						ShowWindow(_v8, 8); // executed
                    					}
                    					E00404229( *0x7a79e8);
                    				}
                    				_t168 = GetDlgItem(_a4, 0x3ec);
                    				SendMessageW(_t168, 0x401, _t156, 0x75300000);
                    				if(( *0x7a8a3c & 0x00000004) != 0) {
                    					SendMessageW(_t168, 0x409, _t156, _a12);
                    					SendMessageW(_t168, 0x2001, _t156, _a8);
                    				}
                    				goto L36;
                    			}



































                    0x0040540a
                    0x00405410
                    0x0040541a
                    0x0040541d
                    0x004055b3
                    0x004055d0
                    0x004055d7
                    0x004055d7
                    0x004055ea
                    0x00405608
                    0x0040560a
                    0x00405612
                    0x00405668
                    0x0040566c
                    0x00000000
                    0x00000000
                    0x0040566e
                    0x00405674
                    0x00000000
                    0x00000000
                    0x0040567e
                    0x00405686
                    0x00405689
                    0x0040578b
                    0x00000000
                    0x0040578b
                    0x00405698
                    0x004056a3
                    0x004056ac
                    0x004056b7
                    0x004056ba
                    0x004056c3
                    0x004056c9
                    0x004056cc
                    0x004056cc
                    0x004056e4
                    0x004056ed
                    0x004056f0
                    0x004056f7
                    0x004056fe
                    0x00405706
                    0x00405706
                    0x0040571d
                    0x0040571d
                    0x00405724
                    0x0040572a
                    0x00405736
                    0x0040573d
                    0x00405746
                    0x00405748
                    0x0040574b
                    0x0040575a
                    0x0040575d
                    0x00405763
                    0x00405764
                    0x0040576a
                    0x0040576b
                    0x0040576c
                    0x00405774
                    0x0040577f
                    0x00405785
                    0x00405785
                    0x00000000
                    0x004056e4
                    0x0040561a
                    0x0040564a
                    0x00405652
                    0x00405654
                    0x0040565d
                    0x0040565d
                    0x00405663
                    0x00000000
                    0x00405663
                    0x0040561e
                    0x00405628
                    0x00000000
                    0x004055ec
                    0x004055f2
                    0x0040562d
                    0x00000000
                    0x00405636
                    0x004055fb
                    0x00405600
                    0x00405603
                    0x00000000
                    0x00405603
                    0x004055ea
                    0x00405423
                    0x00405427
                    0x0040542f
                    0x00405433
                    0x00405436
                    0x00405439
                    0x0040543c
                    0x0040543f
                    0x00405440
                    0x00405441
                    0x0040545a
                    0x0040545d
                    0x00405467
                    0x00405476
                    0x0040547e
                    0x00405486
                    0x0040548b
                    0x0040548e
                    0x0040549a
                    0x004054a3
                    0x004054ac
                    0x004054ce
                    0x004054d4
                    0x004054e5
                    0x004054ea
                    0x004054f8
                    0x00405506
                    0x00405506
                    0x0040550b
                    0x00405519
                    0x00405519
                    0x0040551e
                    0x00405521
                    0x00405526
                    0x00405532
                    0x0040553b
                    0x00405548
                    0x00405557
                    0x0040554a
                    0x0040554f
                    0x0040554f
                    0x00405563
                    0x00405563
                    0x00405577
                    0x00405580
                    0x00405589
                    0x00405599
                    0x004055a5
                    0x004055a5
                    0x00000000

                    APIs
                    • GetDlgItem.USER32 ref: 00405460
                    • GetDlgItem.USER32 ref: 0040546F
                    • GetClientRect.USER32 ref: 004054AC
                    • GetSystemMetrics.USER32 ref: 004054B3
                    • SendMessageW.USER32(?,00001061,00000000,?), ref: 004054D4
                    • SendMessageW.USER32(?,00001036,00004000,00004000), ref: 004054E5
                    • SendMessageW.USER32(?,00001001,00000000,00000110), ref: 004054F8
                    • SendMessageW.USER32(?,00001026,00000000,00000110), ref: 00405506
                    • SendMessageW.USER32(?,00001024,00000000,?), ref: 00405519
                    • ShowWindow.USER32(00000000,?,0000001B,000000FF), ref: 0040553B
                    • ShowWindow.USER32(?,00000008), ref: 0040554F
                    • GetDlgItem.USER32 ref: 00405570
                    • SendMessageW.USER32(00000000,00000401,00000000,75300000), ref: 00405580
                    • SendMessageW.USER32(00000000,00000409,00000000,?), ref: 00405599
                    • SendMessageW.USER32(00000000,00002001,00000000,00000110), ref: 004055A5
                    • GetDlgItem.USER32 ref: 0040547E
                      • Part of subcall function 00404229: SendMessageW.USER32(00000028,?,00000001,00404054), ref: 00404237
                    • GetDlgItem.USER32 ref: 004055C2
                    • CreateThread.KERNELBASE ref: 004055D0
                    • FindCloseChangeNotification.KERNELBASE(00000000), ref: 004055D7
                    • ShowWindow.USER32(00000000), ref: 004055FB
                    • ShowWindow.USER32(?,00000008), ref: 00405600
                    • ShowWindow.USER32(00000008), ref: 0040564A
                    • SendMessageW.USER32(?,00001004,00000000,00000000), ref: 0040567E
                    • CreatePopupMenu.USER32 ref: 0040568F
                    • AppendMenuW.USER32 ref: 004056A3
                    • GetWindowRect.USER32 ref: 004056C3
                    • TrackPopupMenu.USER32(00000000,00000180,?,?,00000000,?,00000000), ref: 004056DC
                    • SendMessageW.USER32(?,00001073,00000000,?), ref: 00405714
                    • OpenClipboard.USER32(00000000), ref: 00405724
                    • EmptyClipboard.USER32 ref: 0040572A
                    • GlobalAlloc.KERNEL32(00000042,00000000), ref: 00405736
                    • GlobalLock.KERNEL32 ref: 00405740
                    • SendMessageW.USER32(?,00001073,00000000,?), ref: 00405754
                    • GlobalUnlock.KERNEL32(00000000), ref: 00405774
                    • SetClipboardData.USER32(0000000D,00000000), ref: 0040577F
                    • CloseClipboard.USER32 ref: 00405785
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.668679627.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000000.00000002.668672686.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.668695651.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.668709908.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.669360772.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.669367484.0000000000782000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.669373527.0000000000786000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.669383228.0000000000789000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.669410918.00000000007A4000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.669416138.00000000007A6000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.669434006.00000000007B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.669445400.00000000007C4000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.669547952.0000000000804000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_400000_Ordene 501527,pdf.jbxd
                    Similarity
                    • API ID: MessageSend$Window$ItemShow$Clipboard$GlobalMenu$CloseCreatePopupRect$AllocAppendChangeClientDataEmptyFindLockMetricsNotificationOpenSystemThreadTrackUnlock
                    • String ID: {
                    • API String ID: 4154960007-366298937
                    • Opcode ID: 9d284ae0f5fa411ce8b3b3c4ed0d933085fe76abcea35dc230fd4f31131c6069
                    • Instruction ID: afdd0f92e7f9204a51c28d187295685e71ab7a2983d4d38ccc6b07981ce020cc
                    • Opcode Fuzzy Hash: 9d284ae0f5fa411ce8b3b3c4ed0d933085fe76abcea35dc230fd4f31131c6069
                    • Instruction Fuzzy Hash: 6CB16AB1800608FFDB119FA0DD89DAE7B79FB48354F00812AFA45BA1A0CB795E51DF58
                    Uniqueness

                    Uniqueness Score: -1.00%

                    C-Code - Quality: 95%
                    			E10001B18() {
                    				signed int _v8;
                    				signed int _v12;
                    				signed int _v16;
                    				signed int _v20;
                    				WCHAR* _v24;
                    				WCHAR* _v28;
                    				signed int _v32;
                    				signed int _v36;
                    				signed int _v40;
                    				WCHAR* _v44;
                    				signed int _v48;
                    				void* _v52;
                    				intOrPtr _v56;
                    				WCHAR* _t199;
                    				signed int _t202;
                    				void* _t204;
                    				void* _t206;
                    				WCHAR* _t208;
                    				void* _t216;
                    				struct HINSTANCE__* _t217;
                    				struct HINSTANCE__* _t218;
                    				struct HINSTANCE__* _t220;
                    				signed short _t222;
                    				struct HINSTANCE__* _t225;
                    				struct HINSTANCE__* _t227;
                    				void* _t228;
                    				intOrPtr* _t229;
                    				void* _t240;
                    				signed char _t241;
                    				signed int _t242;
                    				void* _t246;
                    				struct HINSTANCE__* _t248;
                    				void* _t249;
                    				signed int _t251;
                    				short* _t253;
                    				signed int _t259;
                    				void* _t260;
                    				signed int _t263;
                    				signed int _t266;
                    				signed int _t267;
                    				signed int _t272;
                    				signed int _t273;
                    				signed int _t274;
                    				signed int _t275;
                    				void* _t278;
                    				void* _t282;
                    				struct HINSTANCE__* _t284;
                    				signed int _t287;
                    				void _t288;
                    				signed int _t289;
                    				signed int _t301;
                    				signed int _t302;
                    				signed short _t308;
                    				signed int _t309;
                    				WCHAR* _t310;
                    				WCHAR* _t312;
                    				WCHAR* _t313;
                    				struct HINSTANCE__* _t314;
                    				void* _t316;
                    				signed int _t318;
                    				void* _t319;
                    
                    				_t284 = 0;
                    				_v32 = 0;
                    				_v36 = 0;
                    				_v16 = 0;
                    				_v8 = 0;
                    				_v40 = 0;
                    				_t319 = 0;
                    				_v48 = 0;
                    				_t199 = E1000121B();
                    				_v24 = _t199;
                    				_v28 = _t199;
                    				_v44 = E1000121B();
                    				_t309 = E10001243();
                    				_v52 = _t309;
                    				_v12 = _t309;
                    				while(1) {
                    					_t202 = _v32;
                    					_v56 = _t202;
                    					if(_t202 != _t284 && _t319 == _t284) {
                    						break;
                    					}
                    					_t308 =  *_t309;
                    					_t287 = _t308 & 0x0000ffff;
                    					_t204 = _t287 - _t284;
                    					if(_t204 == 0) {
                    						_t33 =  &_v32;
                    						 *_t33 = _v32 | 0xffffffff;
                    						__eflags =  *_t33;
                    						L17:
                    						_t206 = _v56 - _t284;
                    						if(_t206 == 0) {
                    							__eflags = _t319 - _t284;
                    							 *_v28 = _t284;
                    							if(_t319 == _t284) {
                    								_t246 = GlobalAlloc(0x40, 0x1ca4); // executed
                    								_t319 = _t246;
                    								 *(_t319 + 0x1010) = _t284;
                    								 *(_t319 + 0x1014) = _t284;
                    							}
                    							_t288 = _v36;
                    							_t43 = _t319 + 8; // 0x8
                    							_t208 = _t43;
                    							_t44 = _t319 + 0x808; // 0x808
                    							_t310 = _t44;
                    							 *_t319 = _t288;
                    							_t289 = _t288 - _t284;
                    							__eflags = _t289;
                    							 *_t208 = _t284;
                    							 *_t310 = _t284;
                    							 *(_t319 + 0x1008) = _t284;
                    							 *(_t319 + 0x100c) = _t284;
                    							 *(_t319 + 4) = _t284;
                    							if(_t289 == 0) {
                    								__eflags = _v28 - _v24;
                    								if(_v28 == _v24) {
                    									goto L39;
                    								}
                    								_t316 = 0;
                    								GlobalFree(_t319);
                    								_t319 = E10001311(_v24);
                    								__eflags = _t319 - _t284;
                    								if(_t319 == _t284) {
                    									goto L39;
                    								} else {
                    									goto L32;
                    								}
                    								while(1) {
                    									L32:
                    									_t240 =  *(_t319 + 0x1ca0);
                    									__eflags = _t240 - _t284;
                    									if(_t240 == _t284) {
                    										break;
                    									}
                    									_t316 = _t319;
                    									_t319 = _t240;
                    									__eflags = _t319 - _t284;
                    									if(_t319 != _t284) {
                    										continue;
                    									}
                    									break;
                    								}
                    								__eflags = _t316 - _t284;
                    								if(_t316 != _t284) {
                    									 *(_t316 + 0x1ca0) = _t284;
                    								}
                    								_t241 =  *(_t319 + 0x1010);
                    								__eflags = _t241 & 0x00000008;
                    								if((_t241 & 0x00000008) == 0) {
                    									_t242 = _t241 | 0x00000002;
                    									__eflags = _t242;
                    									 *(_t319 + 0x1010) = _t242;
                    								} else {
                    									_t319 = E1000158F(_t319);
                    									 *(_t319 + 0x1010) =  *(_t319 + 0x1010) & 0xfffffff5;
                    								}
                    								goto L39;
                    							} else {
                    								_t301 = _t289 - 1;
                    								__eflags = _t301;
                    								if(_t301 == 0) {
                    									L28:
                    									lstrcpyW(_t208, _v44);
                    									L29:
                    									lstrcpyW(_t310, _v24);
                    									L39:
                    									_v12 = _v12 + 2;
                    									_v28 = _v24;
                    									L63:
                    									if(_v32 != 0xffffffff) {
                    										_t309 = _v12;
                    										continue;
                    									}
                    									break;
                    								}
                    								_t302 = _t301 - 1;
                    								__eflags = _t302;
                    								if(_t302 == 0) {
                    									goto L29;
                    								}
                    								__eflags = _t302 != 1;
                    								if(_t302 != 1) {
                    									goto L39;
                    								}
                    								goto L28;
                    							}
                    						}
                    						if(_t206 != 1) {
                    							goto L39;
                    						}
                    						_t248 = _v16;
                    						if(_v40 == _t284) {
                    							_t248 = _t248 - 1;
                    						}
                    						 *(_t319 + 0x1014) = _t248;
                    						goto L39;
                    					}
                    					_t249 = _t204 - 0x23;
                    					if(_t249 == 0) {
                    						__eflags = _t309 - _v52;
                    						if(_t309 <= _v52) {
                    							L15:
                    							_v32 = _t284;
                    							_v36 = _t284;
                    							goto L17;
                    						}
                    						__eflags =  *((short*)(_t309 - 2)) - 0x3a;
                    						if( *((short*)(_t309 - 2)) != 0x3a) {
                    							goto L15;
                    						}
                    						__eflags = _v32 - _t284;
                    						if(_v32 == _t284) {
                    							L40:
                    							_t251 = _v32 - _t284;
                    							__eflags = _t251;
                    							if(_t251 == 0) {
                    								__eflags = _t287 - 0x2a;
                    								if(_t287 == 0x2a) {
                    									_v36 = 2;
                    									L61:
                    									_t309 = _v12;
                    									_v28 = _v24;
                    									_t284 = 0;
                    									__eflags = 0;
                    									L62:
                    									_t318 = _t309 + 2;
                    									__eflags = _t318;
                    									_v12 = _t318;
                    									goto L63;
                    								}
                    								__eflags = _t287 - 0x2d;
                    								if(_t287 == 0x2d) {
                    									L131:
                    									__eflags = _t308 - 0x2d;
                    									if(_t308 != 0x2d) {
                    										L134:
                    										_t253 = _t309 + 2;
                    										__eflags =  *_t253 - 0x3a;
                    										if( *_t253 != 0x3a) {
                    											L141:
                    											_v28 =  &(_v28[0]);
                    											 *_v28 = _t308;
                    											goto L62;
                    										}
                    										__eflags = _t308 - 0x2d;
                    										if(_t308 == 0x2d) {
                    											goto L141;
                    										}
                    										_v36 = 1;
                    										L137:
                    										_v12 = _t253;
                    										__eflags = _v28 - _v24;
                    										if(_v28 <= _v24) {
                    											 *_v44 = _t284;
                    										} else {
                    											 *_v28 = _t284;
                    											lstrcpyW(_v44, _v24);
                    										}
                    										goto L61;
                    									}
                    									_t253 = _t309 + 2;
                    									__eflags =  *_t253 - 0x3e;
                    									if( *_t253 != 0x3e) {
                    										goto L134;
                    									}
                    									_v36 = 3;
                    									goto L137;
                    								}
                    								__eflags = _t287 - 0x3a;
                    								if(_t287 != 0x3a) {
                    									goto L141;
                    								}
                    								goto L131;
                    							}
                    							_t259 = _t251 - 1;
                    							__eflags = _t259;
                    							if(_t259 == 0) {
                    								L74:
                    								_t260 = _t287 - 0x22;
                    								__eflags = _t260 - 0x55;
                    								if(_t260 > 0x55) {
                    									goto L61;
                    								}
                    								switch( *((intOrPtr*)(( *(_t260 + 0x10002230) & 0x000000ff) * 4 +  &M100021CC))) {
                    									case 0:
                    										__ecx = _v24;
                    										__edi = _v12;
                    										while(1) {
                    											__edi = __edi + 1;
                    											__edi = __edi + 1;
                    											_v12 = __edi;
                    											__ax =  *__edi;
                    											__eflags = __ax - __dx;
                    											if(__ax != __dx) {
                    												goto L116;
                    											}
                    											L115:
                    											__eflags =  *((intOrPtr*)(__edi + 2)) - __dx;
                    											if( *((intOrPtr*)(__edi + 2)) != __dx) {
                    												L120:
                    												 *__ecx =  *__ecx & 0x00000000;
                    												__ebx = E1000122C(_v24);
                    												goto L91;
                    											}
                    											L116:
                    											__eflags = __ax;
                    											if(__ax == 0) {
                    												goto L120;
                    											}
                    											__eflags = __ax - __dx;
                    											if(__ax == __dx) {
                    												__edi = __edi + 1;
                    												__edi = __edi + 1;
                    												__eflags = __edi;
                    											}
                    											__ax =  *__edi;
                    											 *__ecx =  *__edi;
                    											__ecx = __ecx + 1;
                    											__ecx = __ecx + 1;
                    											__edi = __edi + 1;
                    											__edi = __edi + 1;
                    											_v12 = __edi;
                    											__ax =  *__edi;
                    											__eflags = __ax - __dx;
                    											if(__ax != __dx) {
                    												goto L116;
                    											}
                    											goto L115;
                    										}
                    									case 1:
                    										_v8 = 1;
                    										goto L61;
                    									case 2:
                    										_v8 = _v8 | 0xffffffff;
                    										goto L61;
                    									case 3:
                    										_v8 = _v8 & 0x00000000;
                    										_v20 = _v20 & 0x00000000;
                    										_v16 = _v16 + 1;
                    										goto L79;
                    									case 4:
                    										__eflags = _v20;
                    										if(_v20 != 0) {
                    											goto L61;
                    										}
                    										_v12 = _v12 - 2;
                    										__ebx = E1000121B();
                    										 &_v12 = E10001A9F( &_v12);
                    										__eax = E10001470(__edx, __eax, __edx, __ebx);
                    										goto L91;
                    									case 5:
                    										L99:
                    										_v20 = _v20 + 1;
                    										goto L61;
                    									case 6:
                    										_push(7);
                    										goto L107;
                    									case 7:
                    										_push(0x19);
                    										goto L127;
                    									case 8:
                    										_push(0x15);
                    										goto L127;
                    									case 9:
                    										_push(0x16);
                    										goto L127;
                    									case 0xa:
                    										_push(0x18);
                    										goto L127;
                    									case 0xb:
                    										_push(5);
                    										goto L107;
                    									case 0xc:
                    										__eax = 0;
                    										__eax = 1;
                    										goto L85;
                    									case 0xd:
                    										_push(6);
                    										goto L107;
                    									case 0xe:
                    										_push(2);
                    										goto L107;
                    									case 0xf:
                    										_push(3);
                    										goto L107;
                    									case 0x10:
                    										_push(0x17);
                    										L127:
                    										_pop(__ebx);
                    										goto L92;
                    									case 0x11:
                    										__eax =  &_v12;
                    										__eax = E10001A9F( &_v12);
                    										__ebx = __eax;
                    										__ebx = __eax + 1;
                    										__eflags = __ebx - 0xb;
                    										if(__ebx < 0xb) {
                    											__ebx = __ebx + 0xa;
                    										}
                    										goto L91;
                    									case 0x12:
                    										__ebx = 0xffffffff;
                    										goto L92;
                    									case 0x13:
                    										_v48 = _v48 + 1;
                    										_push(4);
                    										_pop(__eax);
                    										goto L85;
                    									case 0x14:
                    										__eax = 0;
                    										__eflags = 0;
                    										goto L85;
                    									case 0x15:
                    										_push(4);
                    										L107:
                    										_pop(__eax);
                    										L85:
                    										__edi = _v16;
                    										__ecx =  *(0x1000305c + __eax * 4);
                    										__edi = _v16 << 5;
                    										__edx = 0;
                    										__edi = (_v16 << 5) + __esi;
                    										__edx = 1;
                    										__eflags = _v8 - 0xffffffff;
                    										_v40 = 1;
                    										 *(__edi + 0x1018) = __eax;
                    										if(_v8 == 0xffffffff) {
                    											L87:
                    											__ecx = __edx;
                    											L88:
                    											__eflags = _v8 - __edx;
                    											 *(__edi + 0x1028) = __ecx;
                    											if(_v8 == __edx) {
                    												__eax =  &_v12;
                    												__eax = E10001A9F( &_v12);
                    												__eax = __eax + 1;
                    												__eflags = __eax;
                    												_v8 = __eax;
                    											}
                    											__eax = _v8;
                    											 *((intOrPtr*)(__edi + 0x101c)) = _v8;
                    											_t133 = _v16 + 0x81; // 0x81
                    											_t133 = _t133 << 5;
                    											__eax = 0;
                    											__eflags = 0;
                    											 *((intOrPtr*)((_t133 << 5) + __esi)) = 0;
                    											 *((intOrPtr*)(__edi + 0x1030)) = 0;
                    											 *((intOrPtr*)(__edi + 0x102c)) = 0;
                    											goto L91;
                    										}
                    										__eflags = __ecx;
                    										if(__ecx > 0) {
                    											goto L88;
                    										}
                    										goto L87;
                    									case 0x16:
                    										_t262 =  *(_t319 + 0x1014);
                    										__eflags = _t262 - _v16;
                    										if(_t262 > _v16) {
                    											_v16 = _t262;
                    										}
                    										_v8 = _v8 & 0x00000000;
                    										_v20 = _v20 & 0x00000000;
                    										_v36 - 3 = _t262 - (_v36 == 3);
                    										if(_t262 != _v36 == 3) {
                    											L79:
                    											_v40 = 1;
                    										}
                    										goto L61;
                    									case 0x17:
                    										__eax =  &_v12;
                    										__eax = E10001A9F( &_v12);
                    										__ebx = __eax;
                    										__ebx = __eax + 1;
                    										L91:
                    										__eflags = __ebx;
                    										if(__ebx == 0) {
                    											goto L61;
                    										}
                    										L92:
                    										__eflags = _v20;
                    										_v40 = 1;
                    										if(_v20 != 0) {
                    											L97:
                    											__eflags = _v20 - 1;
                    											if(_v20 == 1) {
                    												__eax = _v16;
                    												__eax = _v16 << 5;
                    												__eflags = __eax;
                    												 *(__eax + __esi + 0x102c) = __ebx;
                    											}
                    											goto L99;
                    										}
                    										_v16 = _v16 << 5;
                    										_t141 = __esi + 0x1030; // 0x1030
                    										__edi = (_v16 << 5) + _t141;
                    										__eax =  *__edi;
                    										__eflags = __eax - 0xffffffff;
                    										if(__eax <= 0xffffffff) {
                    											L95:
                    											__eax = GlobalFree(__eax);
                    											L96:
                    											 *__edi = __ebx;
                    											goto L97;
                    										}
                    										__eflags = __eax - 0x19;
                    										if(__eax <= 0x19) {
                    											goto L96;
                    										}
                    										goto L95;
                    									case 0x18:
                    										goto L61;
                    								}
                    							}
                    							_t263 = _t259 - 1;
                    							__eflags = _t263;
                    							if(_t263 == 0) {
                    								_v16 = _t284;
                    								goto L74;
                    							}
                    							__eflags = _t263 != 1;
                    							if(_t263 != 1) {
                    								goto L141;
                    							}
                    							_t266 = _t287 - 0x21;
                    							__eflags = _t266;
                    							if(_t266 == 0) {
                    								_v8 =  ~_v8;
                    								goto L61;
                    							}
                    							_t267 = _t266 - 0x42;
                    							__eflags = _t267;
                    							if(_t267 == 0) {
                    								L57:
                    								__eflags = _v8 - 1;
                    								if(_v8 != 1) {
                    									_t92 = _t319 + 0x1010;
                    									 *_t92 =  *(_t319 + 0x1010) &  !0x00000001;
                    									__eflags =  *_t92;
                    								} else {
                    									 *(_t319 + 0x1010) =  *(_t319 + 0x1010) | 1;
                    								}
                    								_v8 = 1;
                    								goto L61;
                    							}
                    							_t272 = _t267;
                    							__eflags = _t272;
                    							if(_t272 == 0) {
                    								_push(0x20);
                    								L56:
                    								_pop(1);
                    								goto L57;
                    							}
                    							_t273 = _t272 - 9;
                    							__eflags = _t273;
                    							if(_t273 == 0) {
                    								_push(8);
                    								goto L56;
                    							}
                    							_t274 = _t273 - 4;
                    							__eflags = _t274;
                    							if(_t274 == 0) {
                    								_push(4);
                    								goto L56;
                    							}
                    							_t275 = _t274 - 1;
                    							__eflags = _t275;
                    							if(_t275 == 0) {
                    								_push(0x10);
                    								goto L56;
                    							}
                    							__eflags = _t275 != 0;
                    							if(_t275 != 0) {
                    								goto L61;
                    							}
                    							_push(0x40);
                    							goto L56;
                    						}
                    						goto L15;
                    					}
                    					_t278 = _t249 - 5;
                    					if(_t278 == 0) {
                    						__eflags = _v36 - 3;
                    						_v32 = 1;
                    						_v8 = _t284;
                    						_v20 = _t284;
                    						_v16 = (0 | _v36 == 0x00000003) + 1;
                    						_v40 = _t284;
                    						goto L17;
                    					}
                    					_t282 = _t278 - 1;
                    					if(_t282 == 0) {
                    						_v32 = 2;
                    						_v8 = _t284;
                    						_v20 = _t284;
                    						goto L17;
                    					}
                    					if(_t282 != 0x16) {
                    						goto L40;
                    					} else {
                    						_v32 = 3;
                    						_v8 = 1;
                    						goto L17;
                    					}
                    				}
                    				GlobalFree(_v52);
                    				GlobalFree(_v24);
                    				GlobalFree(_v44);
                    				if(_t319 == _t284 ||  *(_t319 + 0x100c) != _t284) {
                    					L161:
                    					return _t319;
                    				} else {
                    					_t216 =  *_t319 - 1;
                    					if(_t216 == 0) {
                    						_t178 = _t319 + 8; // 0x8
                    						_t312 = _t178;
                    						__eflags =  *_t312 - _t284;
                    						if( *_t312 != _t284) {
                    							_t217 = GetModuleHandleW(_t312);
                    							__eflags = _t217 - _t284;
                    							 *(_t319 + 0x1008) = _t217;
                    							if(_t217 != _t284) {
                    								L150:
                    								_t183 = _t319 + 0x808; // 0x808
                    								_t313 = _t183;
                    								_t218 = E100015FF( *(_t319 + 0x1008), _t313);
                    								__eflags = _t218 - _t284;
                    								 *(_t319 + 0x100c) = _t218;
                    								if(_t218 == _t284) {
                    									__eflags =  *_t313 - 0x23;
                    									if( *_t313 == 0x23) {
                    										_t186 = _t319 + 0x80a; // 0x80a
                    										_t222 = E10001311(_t186);
                    										__eflags = _t222 - _t284;
                    										if(_t222 != _t284) {
                    											__eflags = _t222 & 0xffff0000;
                    											if((_t222 & 0xffff0000) == 0) {
                    												 *(_t319 + 0x100c) = GetProcAddress( *(_t319 + 0x1008), _t222 & 0x0000ffff);
                    											}
                    										}
                    									}
                    								}
                    								__eflags = _v48 - _t284;
                    								if(_v48 != _t284) {
                    									L157:
                    									_t313[lstrlenW(_t313)] = 0x57;
                    									_t220 = E100015FF( *(_t319 + 0x1008), _t313);
                    									__eflags = _t220 - _t284;
                    									if(_t220 != _t284) {
                    										L145:
                    										 *(_t319 + 0x100c) = _t220;
                    										goto L161;
                    									}
                    									__eflags =  *(_t319 + 0x100c) - _t284;
                    									L159:
                    									if(__eflags != 0) {
                    										goto L161;
                    									}
                    									L160:
                    									_t197 = _t319 + 4;
                    									 *_t197 =  *(_t319 + 4) | 0xffffffff;
                    									__eflags =  *_t197;
                    									goto L161;
                    								} else {
                    									__eflags =  *(_t319 + 0x100c) - _t284;
                    									if( *(_t319 + 0x100c) != _t284) {
                    										goto L161;
                    									}
                    									goto L157;
                    								}
                    							}
                    							_t225 = LoadLibraryW(_t312);
                    							__eflags = _t225 - _t284;
                    							 *(_t319 + 0x1008) = _t225;
                    							if(_t225 == _t284) {
                    								goto L160;
                    							}
                    							goto L150;
                    						}
                    						_t179 = _t319 + 0x808; // 0x808
                    						_t227 = E10001311(_t179);
                    						 *(_t319 + 0x100c) = _t227;
                    						__eflags = _t227 - _t284;
                    						goto L159;
                    					}
                    					_t228 = _t216 - 1;
                    					if(_t228 == 0) {
                    						_t176 = _t319 + 0x808; // 0x808
                    						_t229 = _t176;
                    						__eflags =  *_t229 - _t284;
                    						if( *_t229 == _t284) {
                    							goto L161;
                    						}
                    						_t220 = E10001311(_t229);
                    						L144:
                    						goto L145;
                    					}
                    					if(_t228 != 1) {
                    						goto L161;
                    					}
                    					_t80 = _t319 + 8; // 0x8
                    					_t285 = _t80;
                    					_t314 = E10001311(_t80);
                    					 *(_t319 + 0x1008) = _t314;
                    					if(_t314 == 0) {
                    						goto L160;
                    					}
                    					 *(_t319 + 0x104c) =  *(_t319 + 0x104c) & 0x00000000;
                    					 *((intOrPtr*)(_t319 + 0x1050)) = E1000122C(_t285);
                    					 *(_t319 + 0x103c) =  *(_t319 + 0x103c) & 0x00000000;
                    					 *((intOrPtr*)(_t319 + 0x1048)) = 1;
                    					 *((intOrPtr*)(_t319 + 0x1038)) = 1;
                    					_t89 = _t319 + 0x808; // 0x808
                    					_t220 =  *(_t314->i + E10001311(_t89) * 4);
                    					goto L144;
                    				}
                    			}
































































                    0x10001b20
                    0x10001b23
                    0x10001b26
                    0x10001b29
                    0x10001b2c
                    0x10001b2f
                    0x10001b32
                    0x10001b34
                    0x10001b37
                    0x10001b3c
                    0x10001b3f
                    0x10001b47
                    0x10001b4f
                    0x10001b51
                    0x10001b54
                    0x10001b5c
                    0x10001b5c
                    0x10001b61
                    0x10001b64
                    0x00000000
                    0x00000000
                    0x10001b6e
                    0x10001b71
                    0x10001b76
                    0x10001b78
                    0x10001beb
                    0x10001beb
                    0x10001beb
                    0x10001bef
                    0x10001bf2
                    0x10001bf4
                    0x10001c16
                    0x10001c18
                    0x10001c1b
                    0x10001c24
                    0x10001c2a
                    0x10001c2c
                    0x10001c32
                    0x10001c32
                    0x10001c38
                    0x10001c3b
                    0x10001c3b
                    0x10001c3e
                    0x10001c3e
                    0x10001c44
                    0x10001c46
                    0x10001c46
                    0x10001c48
                    0x10001c4b
                    0x10001c4e
                    0x10001c54
                    0x10001c5a
                    0x10001c5d
                    0x10001c81
                    0x10001c84
                    0x00000000
                    0x00000000
                    0x10001c87
                    0x10001c89
                    0x10001c97
                    0x10001c9a
                    0x10001c9c
                    0x00000000
                    0x00000000
                    0x00000000
                    0x00000000
                    0x10001c9e
                    0x10001c9e
                    0x10001c9e
                    0x10001ca4
                    0x10001ca6
                    0x00000000
                    0x00000000
                    0x10001ca8
                    0x10001caa
                    0x10001cac
                    0x10001cae
                    0x00000000
                    0x00000000
                    0x00000000
                    0x10001cae
                    0x10001cb0
                    0x10001cb2
                    0x10001cb4
                    0x10001cb4
                    0x10001cba
                    0x10001cc0
                    0x10001cc2
                    0x10001cd6
                    0x10001cd6
                    0x10001cd8
                    0x10001cc4
                    0x10001cca
                    0x10001ccd
                    0x10001ccd
                    0x00000000
                    0x10001c5f
                    0x10001c5f
                    0x10001c5f
                    0x10001c60
                    0x10001c68
                    0x10001c6c
                    0x10001c72
                    0x10001c76
                    0x10001cde
                    0x10001ce1
                    0x10001ce5
                    0x10001d70
                    0x10001d74
                    0x10001b59
                    0x00000000
                    0x10001b59
                    0x00000000
                    0x10001d74
                    0x10001c62
                    0x10001c62
                    0x10001c63
                    0x00000000
                    0x00000000
                    0x10001c65
                    0x10001c66
                    0x00000000
                    0x00000000
                    0x00000000
                    0x10001c66
                    0x10001c5d
                    0x10001bf7
                    0x00000000
                    0x00000000
                    0x10001c00
                    0x10001c03
                    0x10001c10
                    0x10001c10
                    0x10001c05
                    0x00000000
                    0x10001c05
                    0x10001b7a
                    0x10001b7d
                    0x10001bce
                    0x10001bd1
                    0x10001be3
                    0x10001be3
                    0x10001be6
                    0x00000000
                    0x10001be6
                    0x10001bd3
                    0x10001bd8
                    0x00000000
                    0x00000000
                    0x10001bda
                    0x10001bdd
                    0x10001ced
                    0x10001cf0
                    0x10001cf0
                    0x10001cf2
                    0x10002048
                    0x1000204b
                    0x100020b2
                    0x10001d60
                    0x10001d63
                    0x10001d66
                    0x10001d69
                    0x10001d69
                    0x10001d6b
                    0x10001d6c
                    0x10001d6c
                    0x10001d6d
                    0x00000000
                    0x10001d6d
                    0x1000204d
                    0x10002050
                    0x10002057
                    0x10002057
                    0x1000205b
                    0x1000206f
                    0x1000206f
                    0x10002072
                    0x10002076
                    0x100020be
                    0x100020c1
                    0x100020c5
                    0x00000000
                    0x100020c5
                    0x10002078
                    0x1000207c
                    0x00000000
                    0x00000000
                    0x1000207e
                    0x10002085
                    0x10002085
                    0x1000208b
                    0x1000208e
                    0x100020aa
                    0x10002090
                    0x10002099
                    0x1000209c
                    0x1000209c
                    0x00000000
                    0x1000208e
                    0x1000205d
                    0x10002060
                    0x10002064
                    0x00000000
                    0x00000000
                    0x10002066
                    0x00000000
                    0x10002066
                    0x10002052
                    0x10002055
                    0x00000000
                    0x00000000
                    0x00000000
                    0x10002055
                    0x10001cf8
                    0x10001cf8
                    0x10001cf9
                    0x10001e29
                    0x10001e29
                    0x10001e2e
                    0x10001e31
                    0x00000000
                    0x00000000
                    0x10001e3e
                    0x00000000
                    0x10001fe5
                    0x10001fe8
                    0x10001feb
                    0x10001feb
                    0x10001fec
                    0x10001fed
                    0x10001ff0
                    0x10001ff3
                    0x10001ff6
                    0x00000000
                    0x00000000
                    0x10001ff8
                    0x10001ff8
                    0x10001ffc
                    0x10002014
                    0x10002017
                    0x10002021
                    0x00000000
                    0x10002021
                    0x10001ffe
                    0x10001ffe
                    0x10002001
                    0x00000000
                    0x00000000
                    0x10002003
                    0x10002006
                    0x10002008
                    0x10002009
                    0x10002009
                    0x10002009
                    0x1000200a
                    0x1000200d
                    0x10002010
                    0x10002011
                    0x10001feb
                    0x10001fec
                    0x10001fed
                    0x10001ff0
                    0x10001ff3
                    0x10001ff6
                    0x00000000
                    0x00000000
                    0x00000000
                    0x10001ff6
                    0x00000000
                    0x10001e85
                    0x00000000
                    0x00000000
                    0x10001e91
                    0x00000000
                    0x00000000
                    0x10001e78
                    0x10001e7c
                    0x10001e80
                    0x00000000
                    0x00000000
                    0x10001fb6
                    0x10001fba
                    0x00000000
                    0x00000000
                    0x10001fc0
                    0x10001fc9
                    0x10001fd0
                    0x10001fd8
                    0x00000000
                    0x00000000
                    0x10001f53
                    0x10001f53
                    0x00000000
                    0x00000000
                    0x10001e9a
                    0x00000000
                    0x00000000
                    0x10002040
                    0x00000000
                    0x00000000
                    0x10002030
                    0x00000000
                    0x00000000
                    0x10002034
                    0x00000000
                    0x00000000
                    0x1000203c
                    0x00000000
                    0x00000000
                    0x10001f76
                    0x00000000
                    0x00000000
                    0x10001f5b
                    0x10001f5d
                    0x00000000
                    0x00000000
                    0x10001f7e
                    0x00000000
                    0x00000000
                    0x10001f63
                    0x00000000
                    0x00000000
                    0x10001f67
                    0x00000000
                    0x00000000
                    0x10002038
                    0x10002042
                    0x10002042
                    0x00000000
                    0x00000000
                    0x10001f86
                    0x10001f8a
                    0x10001f8f
                    0x10001f92
                    0x10001f93
                    0x10001f96
                    0x10001f9c
                    0x10001f9c
                    0x00000000
                    0x00000000
                    0x10002028
                    0x00000000
                    0x00000000
                    0x10001f6b
                    0x10001f6e
                    0x10001f70
                    0x00000000
                    0x00000000
                    0x10001ea1
                    0x10001ea1
                    0x00000000
                    0x00000000
                    0x10001f7a
                    0x10001f80
                    0x10001f80
                    0x10001ea3
                    0x10001ea3
                    0x10001ea6
                    0x10001ead
                    0x10001eb0
                    0x10001eb2
                    0x10001eb4
                    0x10001eb5
                    0x10001eb9
                    0x10001ebc
                    0x10001ec2
                    0x10001ec8
                    0x10001ec8
                    0x10001eca
                    0x10001eca
                    0x10001ecd
                    0x10001ed3
                    0x10001ed5
                    0x10001ed9
                    0x10001ede
                    0x10001ede
                    0x10001ee0
                    0x10001ee0
                    0x10001ee3
                    0x10001ee6
                    0x10001eef
                    0x10001ef5
                    0x10001ef8
                    0x10001ef8
                    0x10001efa
                    0x10001efd
                    0x10001f03
                    0x00000000
                    0x10001f03
                    0x10001ec4
                    0x10001ec6
                    0x00000000
                    0x00000000
                    0x00000000
                    0x00000000
                    0x10001e45
                    0x10001e4b
                    0x10001e4e
                    0x10001e50
                    0x10001e50
                    0x10001e53
                    0x10001e57
                    0x10001e64
                    0x10001e66
                    0x10001e6c
                    0x10001e6c
                    0x10001e6c
                    0x00000000
                    0x00000000
                    0x10001fa4
                    0x10001fa8
                    0x10001fad
                    0x10001fb0
                    0x10001f09
                    0x10001f09
                    0x10001f0b
                    0x00000000
                    0x00000000
                    0x10001f11
                    0x10001f11
                    0x10001f15
                    0x10001f1c
                    0x10001f40
                    0x10001f40
                    0x10001f44
                    0x10001f46
                    0x10001f49
                    0x10001f49
                    0x10001f4c
                    0x10001f4c
                    0x00000000
                    0x10001f44
                    0x10001f21
                    0x10001f24
                    0x10001f24
                    0x10001f2b
                    0x10001f2d
                    0x10001f30
                    0x10001f37
                    0x10001f38
                    0x10001f3e
                    0x10001f3e
                    0x00000000
                    0x10001f3e
                    0x10001f32
                    0x10001f35
                    0x00000000
                    0x00000000
                    0x00000000
                    0x00000000
                    0x00000000
                    0x00000000
                    0x10001e3e
                    0x10001cff
                    0x10001cff
                    0x10001d00
                    0x10001e26
                    0x00000000
                    0x10001e26
                    0x10001d06
                    0x10001d07
                    0x00000000
                    0x00000000
                    0x10001d0f
                    0x10001d0f
                    0x10001d12
                    0x10001d5d
                    0x00000000
                    0x10001d5d
                    0x10001d14
                    0x10001d14
                    0x10001d17
                    0x10001d41
                    0x10001d44
                    0x10001d47
                    0x10001e18
                    0x10001e18
                    0x10001e18
                    0x10001d4d
                    0x10001d4d
                    0x10001d4d
                    0x10001e1e
                    0x00000000
                    0x10001e1e
                    0x10001d1a
                    0x10001d1a
                    0x10001d1b
                    0x10001d3e
                    0x10001d40
                    0x10001d40
                    0x00000000
                    0x10001d40
                    0x10001d1d
                    0x10001d1d
                    0x10001d20
                    0x10001d3a
                    0x00000000
                    0x10001d3a
                    0x10001d22
                    0x10001d22
                    0x10001d25
                    0x10001d36
                    0x00000000
                    0x10001d36
                    0x10001d27
                    0x10001d27
                    0x10001d28
                    0x10001d32
                    0x00000000
                    0x10001d32
                    0x10001d2b
                    0x10001d2c
                    0x00000000
                    0x00000000
                    0x10001d2e
                    0x00000000
                    0x10001d2e
                    0x00000000
                    0x10001bdd
                    0x10001b7f
                    0x10001b82
                    0x10001bb1
                    0x10001bb5
                    0x10001bbc
                    0x10001bc3
                    0x10001bc6
                    0x10001bc9
                    0x00000000
                    0x10001bc9
                    0x10001b84
                    0x10001b85
                    0x10001ba0
                    0x10001ba7
                    0x10001baa
                    0x00000000
                    0x10001baa
                    0x10001b8a
                    0x00000000
                    0x10001b90
                    0x10001b90
                    0x10001b97
                    0x00000000
                    0x10001b97
                    0x10001b8a
                    0x10001d83
                    0x10001d88
                    0x10001d8d
                    0x10001d91
                    0x100021c5
                    0x100021cb
                    0x10001da3
                    0x10001da5
                    0x10001da6
                    0x100020ee
                    0x100020ee
                    0x100020f1
                    0x100020f4
                    0x10002111
                    0x10002117
                    0x10002119
                    0x1000211f
                    0x10002136
                    0x10002136
                    0x10002136
                    0x10002143
                    0x10002149
                    0x1000214c
                    0x10002152
                    0x10002154
                    0x10002158
                    0x1000215a
                    0x10002161
                    0x10002166
                    0x10002169
                    0x1000216b
                    0x10002170
                    0x10002182
                    0x10002182
                    0x10002170
                    0x10002169
                    0x10002158
                    0x10002188
                    0x1000218b
                    0x10002195
                    0x1000219d
                    0x100021aa
                    0x100021b0
                    0x100021b3
                    0x100020e3
                    0x100020e3
                    0x00000000
                    0x100020e3
                    0x100021b9
                    0x100021bf
                    0x100021bf
                    0x00000000
                    0x00000000
                    0x100021c1
                    0x100021c1
                    0x100021c1
                    0x100021c1
                    0x00000000
                    0x1000218d
                    0x1000218d
                    0x10002193
                    0x00000000
                    0x00000000
                    0x00000000
                    0x10002193
                    0x1000218b
                    0x10002122
                    0x10002128
                    0x1000212a
                    0x10002130
                    0x00000000
                    0x00000000
                    0x00000000
                    0x10002130
                    0x100020f6
                    0x100020fd
                    0x10002103
                    0x10002109
                    0x00000000
                    0x10002109
                    0x10001dac
                    0x10001dad
                    0x100020cd
                    0x100020cd
                    0x100020d3
                    0x100020d6
                    0x00000000
                    0x00000000
                    0x100020dd
                    0x100020e2
                    0x00000000
                    0x100020e2
                    0x10001db4
                    0x00000000
                    0x00000000
                    0x10001dba
                    0x10001dba
                    0x10001dc3
                    0x10001dc8
                    0x10001dce
                    0x00000000
                    0x00000000
                    0x10001dd4
                    0x10001de1
                    0x10001de7
                    0x10001df1
                    0x10001df7
                    0x10001dff
                    0x10001e0f
                    0x00000000
                    0x10001e0f

                    APIs
                      • Part of subcall function 1000121B: GlobalAlloc.KERNEL32(00000040,?,1000123B,?,100012DF,00000019,100011BE,-000000A0), ref: 10001225
                    • GlobalAlloc.KERNELBASE(00000040,00001CA4), ref: 10001C24
                    • lstrcpyW.KERNEL32 ref: 10001C6C
                    • lstrcpyW.KERNEL32 ref: 10001C76
                    • GlobalFree.KERNEL32 ref: 10001C89
                    • GlobalFree.KERNEL32 ref: 10001D83
                    • GlobalFree.KERNEL32 ref: 10001D88
                    • GlobalFree.KERNEL32 ref: 10001D8D
                    • GlobalFree.KERNEL32 ref: 10001F38
                    • lstrcpyW.KERNEL32 ref: 1000209C
                    Memory Dump Source
                    • Source File: 00000000.00000002.669799652.0000000010001000.00000020.00000001.01000000.00000007.sdmp, Offset: 10000000, based on PE: true
                    • Associated: 00000000.00000002.669792729.0000000010000000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000000.00000002.669803934.0000000010003000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000000.00000002.669815812.0000000010005000.00000002.00000001.01000000.00000007.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_10000000_Ordene 501527,pdf.jbxd
                    Similarity
                    • API ID: Global$Free$lstrcpy$Alloc
                    • String ID:
                    • API String ID: 4227406936-0
                    • Opcode ID: 5a24c136153c29b9d98a91a4f463aeb2504b823c6cdae7135cdbbdb8769d9cc1
                    • Instruction ID: 952ca616c20dc2fa21031af5d26a5f3ec91fa4f9dea92b18a1e2b318678e368b
                    • Opcode Fuzzy Hash: 5a24c136153c29b9d98a91a4f463aeb2504b823c6cdae7135cdbbdb8769d9cc1
                    • Instruction Fuzzy Hash: 10129C75D0064AEFEB20CFA4C8806EEB7F4FB083D4F61452AE565E7198D774AA80DB50
                    Uniqueness

                    Uniqueness Score: -1.00%

                    Control-flow Graph

                    • Executed
                    • Not Executed
                    control_flow_graph 636 40596d-405993 call 405c38 639 405995-4059a7 DeleteFileW 636->639 640 4059ac-4059b3 636->640 643 405b29-405b2d 639->643 641 4059b5-4059b7 640->641 642 4059c6-4059d6 call 40625f 640->642 644 405ad7-405adc 641->644 645 4059bd-4059c0 641->645 649 4059e5-4059e6 call 405b7c 642->649 650 4059d8-4059e3 lstrcatW 642->650 644->643 648 405ade-405ae1 644->648 645->642 645->644 651 405ae3-405ae9 648->651 652 405aeb-405af3 call 4065a2 648->652 653 4059eb-4059ef 649->653 650->653 651->643 652->643 660 405af5-405b09 call 405b30 call 405925 652->660 656 4059f1-4059f9 653->656 657 4059fb-405a01 lstrcatW 653->657 656->657 659 405a06-405a22 lstrlenW FindFirstFileW 656->659 657->659 661 405a28-405a30 659->661 662 405acc-405ad0 659->662 676 405b21-405b24 call 4052c3 660->676 677 405b0b-405b0e 660->677 665 405a50-405a64 call 40625f 661->665 666 405a32-405a3a 661->666 662->644 664 405ad2 662->664 664->644 678 405a66-405a6e 665->678 679 405a7b-405a86 call 405925 665->679 670 405a3c-405a44 666->670 671 405aaf-405abf FindNextFileW 666->671 670->665 675 405a46-405a4e 670->675 671->661 674 405ac5-405ac6 FindClose 671->674 674->662 675->665 675->671 676->643 677->651 680 405b10-405b1f call 4052c3 call 406025 677->680 678->671 681 405a70-405a79 call 40596d 678->681 689 405aa7-405aaa call 4052c3 679->689 690 405a88-405a8b 679->690 680->643 681->671 689->671 693 405a8d-405a9d call 4052c3 call 406025 690->693 694 405a9f-405aa5 690->694 693->671 694->671
                    C-Code - Quality: 98%
                    			E0040596D(void* __eflags, signed int _a4, signed int _a8) {
                    				signed int _v8;
                    				signed int _v12;
                    				short _v556;
                    				short _v558;
                    				struct _WIN32_FIND_DATAW _v604;
                    				signed int _t38;
                    				signed int _t52;
                    				signed int _t55;
                    				signed int _t62;
                    				void* _t64;
                    				signed char _t65;
                    				WCHAR* _t66;
                    				void* _t67;
                    				WCHAR* _t68;
                    				void* _t70;
                    
                    				_t65 = _a8;
                    				_t68 = _a4;
                    				_v8 = _t65 & 0x00000004;
                    				_t38 = E00405C38(__eflags, _t68);
                    				_v12 = _t38;
                    				if((_t65 & 0x00000008) != 0) {
                    					_t62 = DeleteFileW(_t68); // executed
                    					asm("sbb eax, eax");
                    					_t64 =  ~_t62 + 1;
                    					 *0x7a8ac8 =  *0x7a8ac8 + _t64;
                    					return _t64;
                    				}
                    				_a4 = _t65;
                    				_t8 =  &_a4;
                    				 *_t8 = _a4 & 0x00000001;
                    				__eflags =  *_t8;
                    				if( *_t8 == 0) {
                    					L5:
                    					E0040625F(0x7a3f28, _t68);
                    					__eflags = _a4;
                    					if(_a4 == 0) {
                    						E00405B7C(_t68);
                    					} else {
                    						lstrcatW(0x7a3f28, L"\\*.*");
                    					}
                    					__eflags =  *_t68;
                    					if( *_t68 != 0) {
                    						L10:
                    						lstrcatW(_t68, 0x40a014);
                    						L11:
                    						_t66 =  &(_t68[lstrlenW(_t68)]);
                    						_t38 = FindFirstFileW(0x7a3f28,  &_v604);
                    						_t70 = _t38;
                    						__eflags = _t70 - 0xffffffff;
                    						if(_t70 == 0xffffffff) {
                    							L26:
                    							__eflags = _a4;
                    							if(_a4 != 0) {
                    								_t30 = _t66 - 2;
                    								 *_t30 =  *(_t66 - 2) & 0x00000000;
                    								__eflags =  *_t30;
                    							}
                    							goto L28;
                    						} else {
                    							goto L12;
                    						}
                    						do {
                    							L12:
                    							__eflags = _v604.cFileName - 0x2e;
                    							if(_v604.cFileName != 0x2e) {
                    								L16:
                    								E0040625F(_t66,  &(_v604.cFileName));
                    								__eflags = _v604.dwFileAttributes & 0x00000010;
                    								if(__eflags == 0) {
                    									_t52 = E00405925(__eflags, _t68, _v8);
                    									__eflags = _t52;
                    									if(_t52 != 0) {
                    										E004052C3(0xfffffff2, _t68);
                    									} else {
                    										__eflags = _v8 - _t52;
                    										if(_v8 == _t52) {
                    											 *0x7a8ac8 =  *0x7a8ac8 + 1;
                    										} else {
                    											E004052C3(0xfffffff1, _t68);
                    											E00406025(_t67, _t68, 0);
                    										}
                    									}
                    								} else {
                    									__eflags = (_a8 & 0x00000003) - 3;
                    									if(__eflags == 0) {
                    										E0040596D(__eflags, _t68, _a8);
                    									}
                    								}
                    								goto L24;
                    							}
                    							__eflags = _v558;
                    							if(_v558 == 0) {
                    								goto L24;
                    							}
                    							__eflags = _v558 - 0x2e;
                    							if(_v558 != 0x2e) {
                    								goto L16;
                    							}
                    							__eflags = _v556;
                    							if(_v556 == 0) {
                    								goto L24;
                    							}
                    							goto L16;
                    							L24:
                    							_t55 = FindNextFileW(_t70,  &_v604);
                    							__eflags = _t55;
                    						} while (_t55 != 0);
                    						_t38 = FindClose(_t70);
                    						goto L26;
                    					}
                    					__eflags =  *0x7a3f28 - 0x5c;
                    					if( *0x7a3f28 != 0x5c) {
                    						goto L11;
                    					}
                    					goto L10;
                    				} else {
                    					__eflags = _t38;
                    					if(_t38 == 0) {
                    						L28:
                    						__eflags = _a4;
                    						if(_a4 == 0) {
                    							L36:
                    							return _t38;
                    						}
                    						__eflags = _v12;
                    						if(_v12 != 0) {
                    							_t38 = E004065A2(_t68);
                    							__eflags = _t38;
                    							if(_t38 == 0) {
                    								goto L36;
                    							}
                    							E00405B30(_t68);
                    							_t38 = E00405925(__eflags, _t68, _v8 | 0x00000001);
                    							__eflags = _t38;
                    							if(_t38 != 0) {
                    								return E004052C3(0xffffffe5, _t68);
                    							}
                    							__eflags = _v8;
                    							if(_v8 == 0) {
                    								goto L30;
                    							}
                    							E004052C3(0xfffffff1, _t68);
                    							return E00406025(_t67, _t68, 0);
                    						}
                    						L30:
                    						 *0x7a8ac8 =  *0x7a8ac8 + 1;
                    						return _t38;
                    					}
                    					__eflags = _t65 & 0x00000002;
                    					if((_t65 & 0x00000002) == 0) {
                    						goto L28;
                    					}
                    					goto L5;
                    				}
                    			}


















                    0x00405977
                    0x0040597c
                    0x00405985
                    0x00405988
                    0x00405990
                    0x00405993
                    0x00405996
                    0x0040599e
                    0x004059a0
                    0x004059a1
                    0x00000000
                    0x004059a1
                    0x004059ac
                    0x004059af
                    0x004059af
                    0x004059af
                    0x004059b3
                    0x004059c6
                    0x004059cd
                    0x004059d2
                    0x004059d6
                    0x004059e6
                    0x004059d8
                    0x004059de
                    0x004059de
                    0x004059eb
                    0x004059ef
                    0x004059fb
                    0x00405a01
                    0x00405a06
                    0x00405a0c
                    0x00405a17
                    0x00405a1d
                    0x00405a1f
                    0x00405a22
                    0x00405acc
                    0x00405acc
                    0x00405ad0
                    0x00405ad2
                    0x00405ad2
                    0x00405ad2
                    0x00405ad2
                    0x00000000
                    0x00000000
                    0x00000000
                    0x00000000
                    0x00405a28
                    0x00405a28
                    0x00405a28
                    0x00405a30
                    0x00405a50
                    0x00405a58
                    0x00405a5d
                    0x00405a64
                    0x00405a7f
                    0x00405a84
                    0x00405a86
                    0x00405aaa
                    0x00405a88
                    0x00405a88
                    0x00405a8b
                    0x00405a9f
                    0x00405a8d
                    0x00405a90
                    0x00405a98
                    0x00405a98
                    0x00405a8b
                    0x00405a66
                    0x00405a6c
                    0x00405a6e
                    0x00405a74
                    0x00405a74
                    0x00405a6e
                    0x00000000
                    0x00405a64
                    0x00405a32
                    0x00405a3a
                    0x00000000
                    0x00000000
                    0x00405a3c
                    0x00405a44
                    0x00000000
                    0x00000000
                    0x00405a46
                    0x00405a4e
                    0x00000000
                    0x00000000
                    0x00000000
                    0x00405aaf
                    0x00405ab7
                    0x00405abd
                    0x00405abd
                    0x00405ac6
                    0x00000000
                    0x00405ac6
                    0x004059f1
                    0x004059f9
                    0x00000000
                    0x00000000
                    0x00000000
                    0x004059b5
                    0x004059b5
                    0x004059b7
                    0x00405ad7
                    0x00405ad9
                    0x00405adc
                    0x00405b2d
                    0x00405b2d
                    0x00405b2d
                    0x00405ade
                    0x00405ae1
                    0x00405aec
                    0x00405af1
                    0x00405af3
                    0x00000000
                    0x00000000
                    0x00405af6
                    0x00405b02
                    0x00405b07
                    0x00405b09
                    0x00000000
                    0x00405b24
                    0x00405b0b
                    0x00405b0e
                    0x00000000
                    0x00000000
                    0x00405b13
                    0x00000000
                    0x00405b1a
                    0x00405ae3
                    0x00405ae3
                    0x00000000
                    0x00405ae3
                    0x004059bd
                    0x004059c0
                    0x00000000
                    0x00000000
                    0x00000000
                    0x004059c0

                    APIs
                    • DeleteFileW.KERNELBASE(?,?,C:\Users\user\AppData\Local\Temp\,76DDFAA0,00000000), ref: 00405996
                    • lstrcatW.KERNEL32(007A3F28,\*.*), ref: 004059DE
                    • lstrcatW.KERNEL32(?,0040A014), ref: 00405A01
                    • lstrlenW.KERNEL32(?,?,0040A014,?,007A3F28,?,?,C:\Users\user\AppData\Local\Temp\,76DDFAA0,00000000), ref: 00405A07
                    • FindFirstFileW.KERNEL32(007A3F28,?,?,?,0040A014,?,007A3F28,?,?,C:\Users\user\AppData\Local\Temp\,76DDFAA0,00000000), ref: 00405A17
                    • FindNextFileW.KERNEL32(00000000,00000010,000000F2,?,?,?,?,0000002E), ref: 00405AB7
                    • FindClose.KERNEL32(00000000), ref: 00405AC6
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.668679627.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000000.00000002.668672686.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.668695651.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.668709908.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.669360772.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.669367484.0000000000782000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.669373527.0000000000786000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.669383228.0000000000789000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.669410918.00000000007A4000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.669416138.00000000007A6000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.669434006.00000000007B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.669445400.00000000007C4000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.669547952.0000000000804000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_400000_Ordene 501527,pdf.jbxd
                    Similarity
                    • API ID: FileFind$lstrcat$CloseDeleteFirstNextlstrlen
                    • String ID: "C:\Users\user\Desktop\Ordene 501527,pdf.exe" $(?z$C:\Users\user\AppData\Local\Temp\$\*.*
                    • API String ID: 2035342205-565700208
                    • Opcode ID: d19359472b600334dec94491de2483d8e144fed62e712032587100ce902314ed
                    • Instruction ID: bed3c70eefbd60b288d0e49403b05a90b1a02306e0e83ed8d7b57435798b36db
                    • Opcode Fuzzy Hash: d19359472b600334dec94491de2483d8e144fed62e712032587100ce902314ed
                    • Instruction Fuzzy Hash: 4341A430900A14AACF21AB65DC89EAF7678EF46724F10827FF406B11D1D77C5981DE6E
                    Uniqueness

                    Uniqueness Score: -1.00%

                    Control-flow Graph

                    • Executed
                    • Not Executed
                    control_flow_graph 982 4065a2-4065b6 FindFirstFileW 983 4065c3 982->983 984 4065b8-4065c1 FindClose 982->984 985 4065c5-4065c6 983->985 984->985
                    C-Code - Quality: 100%
                    			E004065A2(WCHAR* _a4) {
                    				void* _t2;
                    
                    				_t2 = FindFirstFileW(_a4, 0x7a4f70); // executed
                    				if(_t2 == 0xffffffff) {
                    					return 0;
                    				}
                    				FindClose(_t2);
                    				return 0x7a4f70;
                    			}




                    0x004065ad
                    0x004065b6
                    0x00000000
                    0x004065c3
                    0x004065b9
                    0x00000000

                    APIs
                    • FindFirstFileW.KERNELBASE(?,007A4F70,C:\Users\user\AppData\Local\Temp\nshB62A.tmp,00405C81,C:\Users\user\AppData\Local\Temp\nshB62A.tmp,C:\Users\user\AppData\Local\Temp\nshB62A.tmp,00000000,C:\Users\user\AppData\Local\Temp\nshB62A.tmp,C:\Users\user\AppData\Local\Temp\nshB62A.tmp,?,?,76DDFAA0,0040598D,?,C:\Users\user\AppData\Local\Temp\,76DDFAA0), ref: 004065AD
                    • FindClose.KERNEL32(00000000), ref: 004065B9
                    Strings
                    • pOz, xrefs: 004065A3
                    • C:\Users\user\AppData\Local\Temp\nshB62A.tmp, xrefs: 004065A2
                    Memory Dump Source
                    • Source File: 00000000.00000002.668679627.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000000.00000002.668672686.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.668695651.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.668709908.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.669360772.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.669367484.0000000000782000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.669373527.0000000000786000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.669383228.0000000000789000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.669410918.00000000007A4000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.669416138.00000000007A6000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.669434006.00000000007B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.669445400.00000000007C4000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.669547952.0000000000804000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_400000_Ordene 501527,pdf.jbxd
                    Similarity
                    • API ID: Find$CloseFileFirst
                    • String ID: C:\Users\user\AppData\Local\Temp\nshB62A.tmp$pOz
                    • API String ID: 2295610775-4048275231
                    • Opcode ID: e01e7619722b9f30efb83f7659fa0d40dd2a6717423703156fa95c420c1e82c9
                    • Instruction ID: ff58ffc18adcfb1e82f863fe631525536c8ca60503d441656b10eafe22cb2dbc
                    • Opcode Fuzzy Hash: e01e7619722b9f30efb83f7659fa0d40dd2a6717423703156fa95c420c1e82c9
                    • Instruction Fuzzy Hash: 40D012315190206FC6005778BD0C84B7A989F463307158B36B466F11E4D7789C668AA8
                    Uniqueness

                    Uniqueness Score: -1.00%

                    Control-flow Graph

                    • Executed
                    • Not Executed
                    control_flow_graph 190 403d1b-403d2d 191 403d33-403d39 190->191 192 403e6e-403e7d 190->192 191->192 193 403d3f-403d48 191->193 194 403ecc-403ee1 192->194 195 403e7f-403eba GetDlgItem * 2 call 4041f4 KiUserCallbackDispatcher call 40140b 192->195 198 403d4a-403d57 SetWindowPos 193->198 199 403d5d-403d60 193->199 196 403f21-403f26 call 404240 194->196 197 403ee3-403ee6 194->197 220 403ebf-403ec7 195->220 209 403f2b-403f46 196->209 201 403ee8-403ef3 call 401389 197->201 202 403f19-403f1b 197->202 198->199 204 403d62-403d74 ShowWindow 199->204 205 403d7a-403d80 199->205 201->202 223 403ef5-403f14 SendMessageW 201->223 202->196 208 4041c1 202->208 204->205 210 403d82-403d97 DestroyWindow 205->210 211 403d9c-403d9f 205->211 218 4041c3-4041ca 208->218 216 403f48-403f4a call 40140b 209->216 217 403f4f-403f55 209->217 219 40419e-4041a4 210->219 213 403da1-403dad SetWindowLongW 211->213 214 403db2-403db8 211->214 213->218 221 403e5b-403e69 call 40425b 214->221 222 403dbe-403dcf GetDlgItem 214->222 216->217 226 403f5b-403f66 217->226 227 40417f-404198 DestroyWindow EndDialog 217->227 219->208 225 4041a6-4041ac 219->225 220->194 221->218 228 403dd1-403de8 SendMessageW IsWindowEnabled 222->228 229 403dee-403df1 222->229 223->218 225->208 231 4041ae-4041b7 ShowWindow 225->231 226->227 232 403f6c-403fb9 call 406281 call 4041f4 * 3 GetDlgItem 226->232 227->219 228->208 228->229 233 403df3-403df4 229->233 234 403df6-403df9 229->234 231->208 260 403fc3-403fff ShowWindow KiUserCallbackDispatcher call 404216 EnableWindow 232->260 261 403fbb-403fc0 232->261 238 403e24-403e29 call 4041cd 233->238 239 403e07-403e0c 234->239 240 403dfb-403e01 234->240 238->221 243 403e42-403e55 SendMessageW 239->243 245 403e0e-403e14 239->245 240->243 244 403e03-403e05 240->244 243->221 244->238 248 403e16-403e1c call 40140b 245->248 249 403e2b-403e34 call 40140b 245->249 258 403e22 248->258 249->221 257 403e36-403e40 249->257 257->258 258->238 264 404001-404002 260->264 265 404004 260->265 261->260 266 404006-404034 GetSystemMenu EnableMenuItem SendMessageW 264->266 265->266 267 404036-404047 SendMessageW 266->267 268 404049 266->268 269 40404f-40408e call 404229 call 403cfc call 40625f lstrlenW call 406281 SetWindowTextW call 401389 267->269 268->269 269->209 280 404094-404096 269->280 280->209 281 40409c-4040a0 280->281 282 4040a2-4040a8 281->282 283 4040bf-4040d3 DestroyWindow 281->283 282->208 285 4040ae-4040b4 282->285 283->219 284 4040d9-404106 CreateDialogParamW 283->284 284->219 286 40410c-404163 call 4041f4 GetDlgItem GetWindowRect ScreenToClient SetWindowPos call 401389 284->286 285->209 287 4040ba 285->287 286->208 292 404165-404178 ShowWindow call 404240 286->292 287->208 294 40417d 292->294 294->219
                    C-Code - Quality: 83%
                    			E00403D1B(struct HWND__* _a4, signed int _a8, int _a12, long _a16) {
                    				struct HWND__* _v32;
                    				void* _v84;
                    				void* _v88;
                    				void* __ebx;
                    				void* __edi;
                    				void* __esi;
                    				signed int _t37;
                    				signed int _t39;
                    				signed int _t41;
                    				struct HWND__* _t51;
                    				signed int _t70;
                    				struct HWND__* _t76;
                    				signed int _t89;
                    				struct HWND__* _t94;
                    				signed int _t102;
                    				int _t106;
                    				signed int _t118;
                    				signed int _t119;
                    				int _t120;
                    				signed int _t125;
                    				struct HWND__* _t128;
                    				struct HWND__* _t129;
                    				int _t130;
                    				long _t133;
                    				int _t135;
                    				int _t136;
                    				void* _t137;
                    
                    				_t118 = _a8;
                    				if(_t118 == 0x110 || _t118 == 0x408) {
                    					_t37 = _a12;
                    					_t128 = _a4;
                    					__eflags = _t118 - 0x110;
                    					 *0x7a1f08 = _t37;
                    					if(_t118 == 0x110) {
                    						 *0x7a8a28 = _t128;
                    						 *0x7a1f1c = GetDlgItem(_t128, 1);
                    						_t94 = GetDlgItem(_t128, 2);
                    						_push(0xffffffff);
                    						_push(0x1c);
                    						 *0x79fee8 = _t94;
                    						E004041F4(_t128);
                    						SetClassLongW(_t128, 0xfffffff2,  *0x7a7a08); // executed
                    						 *0x7a79ec = E0040140B(4);
                    						_t37 = 1;
                    						__eflags = 1;
                    						 *0x7a1f08 = 1;
                    					}
                    					_t125 =  *0x40a368; // 0x0
                    					_t136 = 0;
                    					_t133 = (_t125 << 6) +  *0x7a8a60;
                    					__eflags = _t125;
                    					if(_t125 < 0) {
                    						L34:
                    						E00404240(0x40b);
                    						while(1) {
                    							_t39 =  *0x7a1f08;
                    							 *0x40a368 =  *0x40a368 + _t39;
                    							_t133 = _t133 + (_t39 << 6);
                    							_t41 =  *0x40a368; // 0x0
                    							__eflags = _t41 -  *0x7a8a64;
                    							if(_t41 ==  *0x7a8a64) {
                    								E0040140B(1);
                    							}
                    							__eflags =  *0x7a79ec - _t136;
                    							if( *0x7a79ec != _t136) {
                    								break;
                    							}
                    							__eflags =  *0x40a368 -  *0x7a8a64; // 0x0
                    							if(__eflags >= 0) {
                    								break;
                    							}
                    							_t119 =  *(_t133 + 0x14);
                    							E00406281(_t119, _t128, _t133, 0x7b8000,  *((intOrPtr*)(_t133 + 0x24)));
                    							_push( *((intOrPtr*)(_t133 + 0x20)));
                    							_push(0xfffffc19);
                    							E004041F4(_t128);
                    							_push( *((intOrPtr*)(_t133 + 0x1c)));
                    							_push(0xfffffc1b);
                    							E004041F4(_t128);
                    							_push( *((intOrPtr*)(_t133 + 0x28)));
                    							_push(0xfffffc1a);
                    							E004041F4(_t128);
                    							_t51 = GetDlgItem(_t128, 3);
                    							__eflags =  *0x7a8acc - _t136;
                    							_v32 = _t51;
                    							if( *0x7a8acc != _t136) {
                    								_t119 = _t119 & 0x0000fefd | 0x00000004;
                    								__eflags = _t119;
                    							}
                    							ShowWindow(_t51, _t119 & 0x00000008); // executed
                    							EnableWindow( *(_t137 + 0x30), _t119 & 0x00000100); // executed
                    							E00404216(_t119 & 0x00000002);
                    							_t120 = _t119 & 0x00000004;
                    							EnableWindow( *0x79fee8, _t120);
                    							__eflags = _t120 - _t136;
                    							if(_t120 == _t136) {
                    								_push(1);
                    							} else {
                    								_push(_t136);
                    							}
                    							EnableMenuItem(GetSystemMenu(_t128, _t136), 0xf060, ??);
                    							SendMessageW( *(_t137 + 0x38), 0xf4, _t136, 1);
                    							__eflags =  *0x7a8acc - _t136;
                    							if( *0x7a8acc == _t136) {
                    								_push( *0x7a1f1c);
                    							} else {
                    								SendMessageW(_t128, 0x401, 2, _t136);
                    								_push( *0x79fee8);
                    							}
                    							E00404229();
                    							E0040625F(0x7a1f20, E00403CFC());
                    							E00406281(0x7a1f20, _t128, _t133,  &(0x7a1f20[lstrlenW(0x7a1f20)]),  *((intOrPtr*)(_t133 + 0x18)));
                    							SetWindowTextW(_t128, 0x7a1f20); // executed
                    							_push(_t136);
                    							_t70 = E00401389( *((intOrPtr*)(_t133 + 8)));
                    							__eflags = _t70;
                    							if(_t70 != 0) {
                    								continue;
                    							} else {
                    								__eflags =  *_t133 - _t136;
                    								if( *_t133 == _t136) {
                    									continue;
                    								}
                    								__eflags =  *(_t133 + 4) - 5;
                    								if( *(_t133 + 4) != 5) {
                    									DestroyWindow( *0x7a79f8); // executed
                    									 *0x7a0ef8 = _t133;
                    									__eflags =  *_t133 - _t136;
                    									if( *_t133 <= _t136) {
                    										goto L58;
                    									}
                    									_t76 = CreateDialogParamW( *0x7a8a20,  *_t133 +  *0x7a7a00 & 0x0000ffff, _t128,  *(0x40a36c +  *(_t133 + 4) * 4), _t133); // executed
                    									__eflags = _t76 - _t136;
                    									 *0x7a79f8 = _t76;
                    									if(_t76 == _t136) {
                    										goto L58;
                    									}
                    									_push( *((intOrPtr*)(_t133 + 0x2c)));
                    									_push(6);
                    									E004041F4(_t76);
                    									GetWindowRect(GetDlgItem(_t128, 0x3fa), _t137 + 0x10);
                    									ScreenToClient(_t128, _t137 + 0x10);
                    									SetWindowPos( *0x7a79f8, _t136,  *(_t137 + 0x20),  *(_t137 + 0x20), _t136, _t136, 0x15);
                    									_push(_t136);
                    									E00401389( *((intOrPtr*)(_t133 + 0xc)));
                    									__eflags =  *0x7a79ec - _t136;
                    									if( *0x7a79ec != _t136) {
                    										goto L61;
                    									}
                    									ShowWindow( *0x7a79f8, 8); // executed
                    									E00404240(0x405);
                    									goto L58;
                    								}
                    								__eflags =  *0x7a8acc - _t136;
                    								if( *0x7a8acc != _t136) {
                    									goto L61;
                    								}
                    								__eflags =  *0x7a8ac0 - _t136;
                    								if( *0x7a8ac0 != _t136) {
                    									continue;
                    								}
                    								goto L61;
                    							}
                    						}
                    						DestroyWindow( *0x7a79f8);
                    						 *0x7a8a28 = _t136;
                    						EndDialog(_t128,  *0x7a06f0);
                    						goto L58;
                    					} else {
                    						__eflags = _t37 - 1;
                    						if(_t37 != 1) {
                    							L33:
                    							__eflags =  *_t133 - _t136;
                    							if( *_t133 == _t136) {
                    								goto L61;
                    							}
                    							goto L34;
                    						}
                    						_push(0);
                    						_t89 = E00401389( *((intOrPtr*)(_t133 + 0x10)));
                    						__eflags = _t89;
                    						if(_t89 == 0) {
                    							goto L33;
                    						}
                    						SendMessageW( *0x7a79f8, 0x40f, 0, 1);
                    						__eflags =  *0x7a79ec;
                    						return 0 |  *0x7a79ec == 0x00000000;
                    					}
                    				} else {
                    					_t128 = _a4;
                    					_t136 = 0;
                    					if(_t118 == 0x47) {
                    						SetWindowPos( *0x7a1f00, _t128, 0, 0, 0, 0, 0x13);
                    					}
                    					if(_t118 == 5) {
                    						asm("sbb eax, eax");
                    						ShowWindow( *0x7a1f00,  ~(_a12 - 1) & _t118);
                    					}
                    					if(_t118 != 0x40d) {
                    						__eflags = _t118 - 0x11;
                    						if(_t118 != 0x11) {
                    							__eflags = _t118 - 0x111;
                    							if(_t118 != 0x111) {
                    								L26:
                    								return E0040425B(_t118, _a12, _a16);
                    							}
                    							_t135 = _a12 & 0x0000ffff;
                    							_t129 = GetDlgItem(_t128, _t135);
                    							__eflags = _t129 - _t136;
                    							if(_t129 == _t136) {
                    								L13:
                    								__eflags = _t135 - 1;
                    								if(_t135 != 1) {
                    									__eflags = _t135 - 3;
                    									if(_t135 != 3) {
                    										_t130 = 2;
                    										__eflags = _t135 - _t130;
                    										if(_t135 != _t130) {
                    											L25:
                    											SendMessageW( *0x7a79f8, 0x111, _a12, _a16);
                    											goto L26;
                    										}
                    										__eflags =  *0x7a8acc - _t136;
                    										if( *0x7a8acc == _t136) {
                    											_t102 = E0040140B(3);
                    											__eflags = _t102;
                    											if(_t102 != 0) {
                    												goto L26;
                    											}
                    											 *0x7a06f0 = 1;
                    											L21:
                    											_push(0x78);
                    											L22:
                    											E004041CD();
                    											goto L26;
                    										}
                    										E0040140B(_t130);
                    										 *0x7a06f0 = _t130;
                    										goto L21;
                    									}
                    									__eflags =  *0x40a368 - _t136; // 0x0
                    									if(__eflags <= 0) {
                    										goto L25;
                    									}
                    									_push(0xffffffff);
                    									goto L22;
                    								}
                    								_push(_t135);
                    								goto L22;
                    							}
                    							SendMessageW(_t129, 0xf3, _t136, _t136);
                    							_t106 = IsWindowEnabled(_t129);
                    							__eflags = _t106;
                    							if(_t106 == 0) {
                    								goto L61;
                    							}
                    							goto L13;
                    						}
                    						SetWindowLongW(_t128, _t136, _t136);
                    						return 1;
                    					} else {
                    						DestroyWindow( *0x7a79f8);
                    						 *0x7a79f8 = _a12;
                    						L58:
                    						if( *0x7a3f20 == _t136 &&  *0x7a79f8 != _t136) {
                    							ShowWindow(_t128, 0xa); // executed
                    							 *0x7a3f20 = 1;
                    						}
                    						L61:
                    						return 0;
                    					}
                    				}
                    			}






























                    0x00403d24
                    0x00403d2d
                    0x00403e6e
                    0x00403e72
                    0x00403e76
                    0x00403e78
                    0x00403e7d
                    0x00403e88
                    0x00403e93
                    0x00403e98
                    0x00403e9a
                    0x00403e9c
                    0x00403e9f
                    0x00403ea4
                    0x00403eb2
                    0x00403ebf
                    0x00403ec6
                    0x00403ec6
                    0x00403ec7
                    0x00403ec7
                    0x00403ecc
                    0x00403ed2
                    0x00403ed9
                    0x00403edf
                    0x00403ee1
                    0x00403f21
                    0x00403f26
                    0x00403f2b
                    0x00403f2b
                    0x00403f30
                    0x00403f39
                    0x00403f3b
                    0x00403f40
                    0x00403f46
                    0x00403f4a
                    0x00403f4a
                    0x00403f4f
                    0x00403f55
                    0x00000000
                    0x00000000
                    0x00403f60
                    0x00403f66
                    0x00000000
                    0x00000000
                    0x00403f6f
                    0x00403f77
                    0x00403f7c
                    0x00403f7f
                    0x00403f85
                    0x00403f8a
                    0x00403f8d
                    0x00403f93
                    0x00403f98
                    0x00403f9b
                    0x00403fa1
                    0x00403fa9
                    0x00403faf
                    0x00403fb5
                    0x00403fb9
                    0x00403fc0
                    0x00403fc0
                    0x00403fc0
                    0x00403fca
                    0x00403fdc
                    0x00403fe8
                    0x00403fed
                    0x00403ff7
                    0x00403ffd
                    0x00403fff
                    0x00404004
                    0x00404001
                    0x00404001
                    0x00404001
                    0x00404014
                    0x0040402c
                    0x0040402e
                    0x00404034
                    0x00404049
                    0x00404036
                    0x0040403f
                    0x00404041
                    0x00404041
                    0x0040404f
                    0x00404060
                    0x00404076
                    0x0040407d
                    0x00404083
                    0x00404087
                    0x0040408c
                    0x0040408e
                    0x00000000
                    0x00404094
                    0x00404094
                    0x00404096
                    0x00000000
                    0x00000000
                    0x0040409c
                    0x004040a0
                    0x004040c5
                    0x004040cb
                    0x004040d1
                    0x004040d3
                    0x00000000
                    0x00000000
                    0x004040f9
                    0x004040ff
                    0x00404101
                    0x00404106
                    0x00000000
                    0x00000000
                    0x0040410c
                    0x0040410f
                    0x00404112
                    0x00404129
                    0x00404135
                    0x0040414e
                    0x00404154
                    0x00404158
                    0x0040415d
                    0x00404163
                    0x00000000
                    0x00000000
                    0x0040416d
                    0x00404178
                    0x00000000
                    0x00404178
                    0x004040a2
                    0x004040a8
                    0x00000000
                    0x00000000
                    0x004040ae
                    0x004040b4
                    0x00000000
                    0x00000000
                    0x00000000
                    0x004040ba
                    0x0040408e
                    0x00404185
                    0x00404191
                    0x00404198
                    0x00000000
                    0x00403ee3
                    0x00403ee3
                    0x00403ee6
                    0x00403f19
                    0x00403f19
                    0x00403f1b
                    0x00000000
                    0x00000000
                    0x00000000
                    0x00403f1b
                    0x00403ee8
                    0x00403eec
                    0x00403ef1
                    0x00403ef3
                    0x00000000
                    0x00000000
                    0x00403f03
                    0x00403f0b
                    0x00000000
                    0x00403f11
                    0x00403d3f
                    0x00403d3f
                    0x00403d43
                    0x00403d48
                    0x00403d57
                    0x00403d57
                    0x00403d60
                    0x00403d69
                    0x00403d74
                    0x00403d74
                    0x00403d80
                    0x00403d9c
                    0x00403d9f
                    0x00403db2
                    0x00403db8
                    0x00403e5b
                    0x00000000
                    0x00403e64
                    0x00403dbe
                    0x00403dcb
                    0x00403dcd
                    0x00403dcf
                    0x00403dee
                    0x00403dee
                    0x00403df1
                    0x00403df6
                    0x00403df9
                    0x00403e09
                    0x00403e0a
                    0x00403e0c
                    0x00403e42
                    0x00403e55
                    0x00000000
                    0x00403e55
                    0x00403e0e
                    0x00403e14
                    0x00403e2d
                    0x00403e32
                    0x00403e34
                    0x00000000
                    0x00000000
                    0x00403e36
                    0x00403e22
                    0x00403e22
                    0x00403e24
                    0x00403e24
                    0x00000000
                    0x00403e24
                    0x00403e17
                    0x00403e1c
                    0x00000000
                    0x00403e1c
                    0x00403dfb
                    0x00403e01
                    0x00000000
                    0x00000000
                    0x00403e03
                    0x00000000
                    0x00403e03
                    0x00403df3
                    0x00000000
                    0x00403df3
                    0x00403dd9
                    0x00403de0
                    0x00403de6
                    0x00403de8
                    0x00000000
                    0x00000000
                    0x00000000
                    0x00403de8
                    0x00403da4
                    0x00000000
                    0x00403d82
                    0x00403d88
                    0x00403d92
                    0x0040419e
                    0x004041a4
                    0x004041b1
                    0x004041b7
                    0x004041b7
                    0x004041c1
                    0x00000000
                    0x004041c1
                    0x00403d80

                    APIs
                    • SetWindowPos.USER32(?,00000000,00000000,00000000,00000000,00000013), ref: 00403D57
                    • ShowWindow.USER32(?), ref: 00403D74
                    • DestroyWindow.USER32 ref: 00403D88
                    • SetWindowLongW.USER32(?,00000000,00000000), ref: 00403DA4
                    • GetDlgItem.USER32 ref: 00403DC5
                    • SendMessageW.USER32(00000000,000000F3,00000000,00000000), ref: 00403DD9
                    • IsWindowEnabled.USER32(00000000), ref: 00403DE0
                    • GetDlgItem.USER32 ref: 00403E8E
                    • GetDlgItem.USER32 ref: 00403E98
                    • KiUserCallbackDispatcher.NTDLL(?,000000F2,?), ref: 00403EB2
                    • SendMessageW.USER32(0000040F,00000000,00000001,?), ref: 00403F03
                    • GetDlgItem.USER32 ref: 00403FA9
                    • ShowWindow.USER32(00000000,?), ref: 00403FCA
                    • KiUserCallbackDispatcher.NTDLL(?,?), ref: 00403FDC
                    • EnableWindow.USER32(?,?), ref: 00403FF7
                    • GetSystemMenu.USER32(?,00000000,0000F060,00000001), ref: 0040400D
                    • EnableMenuItem.USER32 ref: 00404014
                    • SendMessageW.USER32(?,000000F4,00000000,00000001), ref: 0040402C
                    • SendMessageW.USER32(?,00000401,00000002,00000000), ref: 0040403F
                    • lstrlenW.KERNEL32(007A1F20,?,007A1F20,00000000), ref: 00404069
                    • SetWindowTextW.USER32(?,007A1F20), ref: 0040407D
                    • ShowWindow.USER32(?,0000000A), ref: 004041B1
                    Memory Dump Source
                    • Source File: 00000000.00000002.668679627.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000000.00000002.668672686.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.668695651.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.668709908.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.669360772.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.669367484.0000000000782000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.669373527.0000000000786000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.669383228.0000000000789000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.669410918.00000000007A4000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.669416138.00000000007A6000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.669434006.00000000007B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.669445400.00000000007C4000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.669547952.0000000000804000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_400000_Ordene 501527,pdf.jbxd
                    Similarity
                    • API ID: Window$Item$MessageSend$Show$CallbackDispatcherEnableMenuUser$DestroyEnabledLongSystemTextlstrlen
                    • String ID:
                    • API String ID: 3906175533-0
                    • Opcode ID: fc3c2fd52c5859f2fd2362f058ebeec97e14ddaa85c60b8da330eda8cc3c5bb0
                    • Instruction ID: e7c2d8670a20ab778e0eeae1551072eac63d4844406393878d1a707f383ade6f
                    • Opcode Fuzzy Hash: fc3c2fd52c5859f2fd2362f058ebeec97e14ddaa85c60b8da330eda8cc3c5bb0
                    • Instruction Fuzzy Hash: B6C1CDB1504205AFDB206F61ED88E2B3A68EB96705F00853EF651B51F0CB399982DB1E
                    Uniqueness

                    Uniqueness Score: -1.00%

                    Control-flow Graph

                    • Executed
                    • Not Executed
                    control_flow_graph 295 40396d-403985 call 406639 298 403987-403997 call 4061a6 295->298 299 403999-4039d0 call 40612d 295->299 308 4039f3-403a1c call 403c43 call 405c38 298->308 304 4039d2-4039e3 call 40612d 299->304 305 4039e8-4039ee lstrcatW 299->305 304->305 305->308 313 403a22-403a27 308->313 314 403aae-403ab6 call 405c38 308->314 313->314 316 403a2d-403a55 call 40612d 313->316 320 403ac4-403ae9 LoadImageW 314->320 321 403ab8-403abf call 406281 314->321 316->314 322 403a57-403a5b 316->322 324 403b6a-403b72 call 40140b 320->324 325 403aeb-403b1b RegisterClassW 320->325 321->320 326 403a6d-403a79 lstrlenW 322->326 327 403a5d-403a6a call 405b5d 322->327 338 403b74-403b77 324->338 339 403b7c-403b87 call 403c43 324->339 328 403b21-403b65 SystemParametersInfoW CreateWindowExW 325->328 329 403c39 325->329 333 403aa1-403aa9 call 405b30 call 40625f 326->333 334 403a7b-403a89 lstrcmpiW 326->334 327->326 328->324 332 403c3b-403c42 329->332 333->314 334->333 337 403a8b-403a95 GetFileAttributesW 334->337 341 403a97-403a99 337->341 342 403a9b-403a9c call 405b7c 337->342 338->332 348 403c10-403c11 call 405396 339->348 349 403b8d-403ba7 ShowWindow call 4065c9 339->349 341->333 341->342 342->333 353 403c16-403c18 348->353 354 403bb3-403bc5 GetClassInfoW 349->354 355 403ba9-403bae call 4065c9 349->355 356 403c32-403c34 call 40140b 353->356 357 403c1a-403c20 353->357 360 403bc7-403bd7 GetClassInfoW RegisterClassW 354->360 361 403bdd-403c00 DialogBoxParamW call 40140b 354->361 355->354 356->329 357->338 362 403c26-403c2d call 40140b 357->362 360->361 366 403c05-403c0e call 4038bd 361->366 362->338 366->332
                    C-Code - Quality: 96%
                    			E0040396D(void* __eflags) {
                    				intOrPtr _v4;
                    				intOrPtr _v8;
                    				int _v12;
                    				void _v16;
                    				void* __ebx;
                    				void* __edi;
                    				void* __esi;
                    				intOrPtr* _t22;
                    				void* _t30;
                    				void* _t32;
                    				int _t33;
                    				void* _t36;
                    				int _t39;
                    				int _t40;
                    				int _t44;
                    				short _t63;
                    				WCHAR* _t65;
                    				signed char _t69;
                    				WCHAR* _t76;
                    				intOrPtr _t82;
                    				WCHAR* _t87;
                    
                    				_t82 =  *0x7a8a34;
                    				_t22 = E00406639(2);
                    				_t90 = _t22;
                    				if(_t22 == 0) {
                    					_t76 = 0x7a1f20;
                    					L"1033" = 0x30;
                    					 *0x7b5002 = 0x78;
                    					 *0x7b5004 = 0;
                    					E0040612D(_t78, __eflags, 0x80000001, L"Control Panel\\Desktop\\ResourceLocale", 0, 0x7a1f20, 0);
                    					__eflags =  *0x7a1f20;
                    					if(__eflags == 0) {
                    						E0040612D(_t78, __eflags, 0x80000003, L".DEFAULT\\Control Panel\\International",  &M004083CC, 0x7a1f20, 0);
                    					}
                    					lstrcatW(L"1033", _t76);
                    				} else {
                    					E004061A6(L"1033",  *_t22() & 0x0000ffff);
                    				}
                    				E00403C43(_t78, _t90);
                    				_t86 = L"C:\\Users\\alfons\\AppData\\Roaming\\Microsoft\\Windows\\Start Menu\\Misundes\\Caesural4";
                    				 *0x7a8ac0 =  *0x7a8a3c & 0x00000020;
                    				 *0x7a8adc = 0x10000;
                    				if(E00405C38(_t90, L"C:\\Users\\alfons\\AppData\\Roaming\\Microsoft\\Windows\\Start Menu\\Misundes\\Caesural4") != 0) {
                    					L16:
                    					if(E00405C38(_t98, _t86) == 0) {
                    						E00406281(_t76, 0, _t82, _t86,  *((intOrPtr*)(_t82 + 0x118))); // executed
                    					}
                    					_t30 = LoadImageW( *0x7a8a20, 0x67, 1, 0, 0, 0x8040); // executed
                    					 *0x7a7a08 = _t30;
                    					if( *((intOrPtr*)(_t82 + 0x50)) == 0xffffffff) {
                    						L21:
                    						if(E0040140B(0) == 0) {
                    							_t32 = E00403C43(_t78, __eflags);
                    							__eflags =  *0x7a8ae0;
                    							if( *0x7a8ae0 != 0) {
                    								_t33 = E00405396(_t32, 0);
                    								__eflags = _t33;
                    								if(_t33 == 0) {
                    									E0040140B(1);
                    									goto L33;
                    								}
                    								__eflags =  *0x7a79ec;
                    								if( *0x7a79ec == 0) {
                    									E0040140B(2);
                    								}
                    								goto L22;
                    							}
                    							ShowWindow( *0x7a1f00, 5); // executed
                    							_t39 = E004065C9("RichEd20"); // executed
                    							__eflags = _t39;
                    							if(_t39 == 0) {
                    								E004065C9("RichEd32");
                    							}
                    							_t87 = L"RichEdit20W";
                    							_t40 = GetClassInfoW(0, _t87, 0x7a79c0);
                    							__eflags = _t40;
                    							if(_t40 == 0) {
                    								GetClassInfoW(0, L"RichEdit", 0x7a79c0);
                    								 *0x7a79e4 = _t87;
                    								RegisterClassW(0x7a79c0);
                    							}
                    							_t44 = DialogBoxParamW( *0x7a8a20,  *0x7a7a00 + 0x00000069 & 0x0000ffff, 0, E00403D1B, 0); // executed
                    							E004038BD(E0040140B(5), 1);
                    							return _t44;
                    						}
                    						L22:
                    						_t36 = 2;
                    						return _t36;
                    					} else {
                    						_t78 =  *0x7a8a20;
                    						 *0x7a79c4 = E00401000;
                    						 *0x7a79d0 =  *0x7a8a20;
                    						 *0x7a79d4 = _t30;
                    						 *0x7a79e4 = 0x40a380;
                    						if(RegisterClassW(0x7a79c0) == 0) {
                    							L33:
                    							__eflags = 0;
                    							return 0;
                    						}
                    						SystemParametersInfoW(0x30, 0,  &_v16, 0);
                    						 *0x7a1f00 = CreateWindowExW(0x80, 0x40a380, 0, 0x80000000, _v16, _v12, _v8 - _v16, _v4 - _v12, 0, 0,  *0x7a8a20, 0);
                    						goto L21;
                    					}
                    				} else {
                    					_t78 =  *(_t82 + 0x48);
                    					_t92 = _t78;
                    					if(_t78 == 0) {
                    						goto L16;
                    					}
                    					_t76 = 0x7a69c0;
                    					E0040612D(_t78, _t92,  *((intOrPtr*)(_t82 + 0x44)),  *0x7a8a78 + _t78 * 2,  *0x7a8a78 +  *(_t82 + 0x4c) * 2, 0x7a69c0, 0);
                    					_t63 =  *0x7a69c0; // 0x43
                    					if(_t63 == 0) {
                    						goto L16;
                    					}
                    					if(_t63 == 0x22) {
                    						_t76 = 0x7a69c2;
                    						 *((short*)(E00405B5D(0x7a69c2, 0x22))) = 0;
                    					}
                    					_t65 = _t76 + lstrlenW(_t76) * 2 - 8;
                    					if(_t65 <= _t76 || lstrcmpiW(_t65, L".exe") != 0) {
                    						L15:
                    						E0040625F(_t86, E00405B30(_t76));
                    						goto L16;
                    					} else {
                    						_t69 = GetFileAttributesW(_t76);
                    						if(_t69 == 0xffffffff) {
                    							L14:
                    							E00405B7C(_t76);
                    							goto L15;
                    						}
                    						_t98 = _t69 & 0x00000010;
                    						if((_t69 & 0x00000010) != 0) {
                    							goto L15;
                    						}
                    						goto L14;
                    					}
                    				}
                    			}
























                    0x00403973
                    0x0040397c
                    0x00403983
                    0x00403985
                    0x00403999
                    0x004039ab
                    0x004039b4
                    0x004039bd
                    0x004039c4
                    0x004039c9
                    0x004039d0
                    0x004039e3
                    0x004039e3
                    0x004039ee
                    0x00403987
                    0x00403992
                    0x00403992
                    0x004039f3
                    0x004039fd
                    0x00403a06
                    0x00403a0b
                    0x00403a1c
                    0x00403aae
                    0x00403ab6
                    0x00403abf
                    0x00403abf
                    0x00403ad5
                    0x00403adb
                    0x00403ae9
                    0x00403b6a
                    0x00403b72
                    0x00403b7c
                    0x00403b81
                    0x00403b87
                    0x00403c11
                    0x00403c16
                    0x00403c18
                    0x00403c34
                    0x00000000
                    0x00403c34
                    0x00403c1a
                    0x00403c20
                    0x00403c28
                    0x00403c28
                    0x00000000
                    0x00403c20
                    0x00403b95
                    0x00403ba0
                    0x00403ba5
                    0x00403ba7
                    0x00403bae
                    0x00403bae
                    0x00403bb9
                    0x00403bc1
                    0x00403bc3
                    0x00403bc5
                    0x00403bce
                    0x00403bd1
                    0x00403bd7
                    0x00403bd7
                    0x00403bf6
                    0x00403c07
                    0x00000000
                    0x00403c0c
                    0x00403b74
                    0x00403b76
                    0x00000000
                    0x00403aeb
                    0x00403aeb
                    0x00403af7
                    0x00403b01
                    0x00403b07
                    0x00403b0c
                    0x00403b1b
                    0x00403c39
                    0x00403c39
                    0x00000000
                    0x00403c39
                    0x00403b2a
                    0x00403b65
                    0x00000000
                    0x00403b65
                    0x00403a22
                    0x00403a22
                    0x00403a25
                    0x00403a27
                    0x00000000
                    0x00000000
                    0x00403a35
                    0x00403a47
                    0x00403a4c
                    0x00403a55
                    0x00000000
                    0x00000000
                    0x00403a5b
                    0x00403a5d
                    0x00403a6a
                    0x00403a6a
                    0x00403a73
                    0x00403a79
                    0x00403aa1
                    0x00403aa9
                    0x00000000
                    0x00403a8b
                    0x00403a8c
                    0x00403a95
                    0x00403a9b
                    0x00403a9c
                    0x00000000
                    0x00403a9c
                    0x00403a97
                    0x00403a99
                    0x00000000
                    0x00000000
                    0x00000000
                    0x00403a99
                    0x00403a79

                    APIs
                      • Part of subcall function 00406639: GetModuleHandleA.KERNEL32(?,00000020,?,004033C2,0000000A), ref: 0040664B
                      • Part of subcall function 00406639: GetProcAddress.KERNEL32(00000000,?), ref: 00406666
                    • lstrcatW.KERNEL32(1033,007A1F20), ref: 004039EE
                    • lstrlenW.KERNEL32(Call,?,?,?,Call,00000000,C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Misundes\Caesural4,1033,007A1F20,80000001,Control Panel\Desktop\ResourceLocale,00000000,007A1F20,00000000,00000002,C:\Users\user\AppData\Local\Temp\), ref: 00403A6E
                    • lstrcmpiW.KERNEL32(?,.exe,Call,?,?,?,Call,00000000,C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Misundes\Caesural4,1033,007A1F20,80000001,Control Panel\Desktop\ResourceLocale,00000000,007A1F20,00000000), ref: 00403A81
                    • GetFileAttributesW.KERNEL32(Call), ref: 00403A8C
                    • LoadImageW.USER32 ref: 00403AD5
                      • Part of subcall function 004061A6: wsprintfW.USER32 ref: 004061B3
                    • RegisterClassW.USER32 ref: 00403B12
                    • SystemParametersInfoW.USER32 ref: 00403B2A
                    • CreateWindowExW.USER32 ref: 00403B5F
                    • ShowWindow.USER32(00000005,00000000), ref: 00403B95
                    • GetClassInfoW.USER32 ref: 00403BC1
                    • GetClassInfoW.USER32 ref: 00403BCE
                    • RegisterClassW.USER32 ref: 00403BD7
                    • DialogBoxParamW.USER32 ref: 00403BF6
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.668679627.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000000.00000002.668672686.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.668695651.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.668709908.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.669360772.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.669367484.0000000000782000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.669373527.0000000000786000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.669383228.0000000000789000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.669410918.00000000007A4000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.669416138.00000000007A6000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.669434006.00000000007B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.669445400.00000000007C4000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.669547952.0000000000804000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_400000_Ordene 501527,pdf.jbxd
                    Similarity
                    • API ID: Class$Info$RegisterWindow$AddressAttributesCreateDialogFileHandleImageLoadModuleParamParametersProcShowSystemlstrcatlstrcmpilstrlenwsprintf
                    • String ID: "C:\Users\user\Desktop\Ordene 501527,pdf.exe" $.DEFAULT\Control Panel\International$.exe$1033$C:\Users\user\AppData\Local\Temp\$C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Misundes\Caesural4$Call$Control Panel\Desktop\ResourceLocale$RichEd20$RichEd32$RichEdit$RichEdit20W$_Nb
                    • API String ID: 1975747703-465553537
                    • Opcode ID: 90026218f8455635aced1ea3c9adb74d2a6e6c4d32214fa6dc51bb2c99e1baf3
                    • Instruction ID: 0f1e86156467dc572bfe90fa2eb59b903a3bd9170c228be251d5c9c569d222eb
                    • Opcode Fuzzy Hash: 90026218f8455635aced1ea3c9adb74d2a6e6c4d32214fa6dc51bb2c99e1baf3
                    • Instruction Fuzzy Hash: 9861C371200604AED720AF669D45F2B3A6CEBC5B49F00853FF941B62E2DB7C69118A2D
                    Uniqueness

                    Uniqueness Score: -1.00%

                    Control-flow Graph

                    • Executed
                    • Not Executed
                    control_flow_graph 369 402ec1-402f0f GetTickCount GetModuleFileNameW call 405d51 372 402f11-402f16 369->372 373 402f1b-402f49 call 40625f call 405b7c call 40625f GetFileSize 369->373 374 4030f3-4030f7 372->374 381 403036-403044 call 402e5d 373->381 382 402f4f 373->382 389 403046-403049 381->389 390 403099-40309e 381->390 384 402f54-402f6b 382->384 385 402f6d 384->385 386 402f6f-402f78 call 4032f2 384->386 385->386 395 4030a0-4030a8 call 402e5d 386->395 396 402f7e-402f85 386->396 392 40304b-403063 call 403308 call 4032f2 389->392 393 40306d-403097 GlobalAlloc call 403308 call 4030fa 389->393 390->374 392->390 415 403065-40306b 392->415 393->390 420 4030aa-4030bb 393->420 395->390 399 403001-403005 396->399 400 402f87-402f9b call 405d0c 396->400 404 403007-40300e call 402e5d 399->404 405 40300f-403015 399->405 400->405 418 402f9d-402fa4 400->418 404->405 411 403024-40302e 405->411 412 403017-403021 call 40672c 405->412 411->384 419 403034 411->419 412->411 415->390 415->393 418->405 422 402fa6-402fad 418->422 419->381 423 4030c3-4030c8 420->423 424 4030bd 420->424 422->405 426 402faf-402fb6 422->426 425 4030c9-4030cf 423->425 424->423 425->425 427 4030d1-4030ec SetFilePointer call 405d0c 425->427 426->405 428 402fb8-402fbf 426->428 431 4030f1 427->431 428->405 430 402fc1-402fe1 428->430 430->390 432 402fe7-402feb 430->432 431->374 433 402ff3-402ffb 432->433 434 402fed-402ff1 432->434 433->405 435 402ffd-402fff 433->435 434->419 434->433 435->405
                    C-Code - Quality: 80%
                    			E00402EC1(void* __eflags, signed int _a4) {
                    				DWORD* _v8;
                    				DWORD* _v12;
                    				void* _v16;
                    				intOrPtr _v20;
                    				long _v24;
                    				intOrPtr _v28;
                    				intOrPtr _v32;
                    				intOrPtr _v36;
                    				intOrPtr _v40;
                    				signed int _v44;
                    				long _t43;
                    				signed int _t50;
                    				void* _t53;
                    				void* _t57;
                    				intOrPtr* _t59;
                    				long _t60;
                    				signed int _t65;
                    				signed int _t70;
                    				signed int _t71;
                    				signed int _t77;
                    				intOrPtr _t80;
                    				long _t82;
                    				signed int _t85;
                    				signed int _t87;
                    				void* _t89;
                    				signed int _t90;
                    				signed int _t93;
                    				void* _t94;
                    
                    				_t82 = 0;
                    				_v12 = 0;
                    				_v8 = 0;
                    				_t43 = GetTickCount();
                    				_t91 = L"C:\\Users\\alfons\\Desktop\\Ordene 501527,pdf.exe";
                    				 *0x7a8a30 = _t43 + 0x3e8;
                    				GetModuleFileNameW(0, L"C:\\Users\\alfons\\Desktop\\Ordene 501527,pdf.exe", 0x400);
                    				_t89 = E00405D51(_t91, 0x80000000, 3);
                    				_v16 = _t89;
                    				 *0x40a018 = _t89;
                    				if(_t89 == 0xffffffff) {
                    					return L"Error launching installer";
                    				}
                    				_t92 = L"C:\\Users\\alfons\\Desktop";
                    				E0040625F(L"C:\\Users\\alfons\\Desktop", _t91);
                    				E0040625F(0x7b7000, E00405B7C(_t92));
                    				_t50 = GetFileSize(_t89, 0);
                    				__eflags = _t50;
                    				 *0x7976dc = _t50;
                    				_t93 = _t50;
                    				if(_t50 <= 0) {
                    					L24:
                    					E00402E5D(1);
                    					__eflags =  *0x7a8a38 - _t82;
                    					if( *0x7a8a38 == _t82) {
                    						goto L29;
                    					}
                    					__eflags = _v8 - _t82;
                    					if(_v8 == _t82) {
                    						L28:
                    						_t53 = GlobalAlloc(0x40, _v24); // executed
                    						_t94 = _t53;
                    						E00403308( *0x7a8a38 + 0x1c);
                    						_push(_v24);
                    						_push(_t94);
                    						_push(_t82);
                    						_push(0xffffffff); // executed
                    						_t57 = E004030FA(); // executed
                    						__eflags = _t57 - _v24;
                    						if(_t57 == _v24) {
                    							__eflags = _v44 & 0x00000001;
                    							 *0x7a8a34 = _t94;
                    							 *0x7a8a3c =  *_t94;
                    							if((_v44 & 0x00000001) != 0) {
                    								 *0x7a8a40 =  *0x7a8a40 + 1;
                    								__eflags =  *0x7a8a40;
                    							}
                    							_t40 = _t94 + 0x44; // 0x44
                    							_t59 = _t40;
                    							_t85 = 8;
                    							do {
                    								_t59 = _t59 - 8;
                    								 *_t59 =  *_t59 + _t94;
                    								_t85 = _t85 - 1;
                    								__eflags = _t85;
                    							} while (_t85 != 0);
                    							_t60 = SetFilePointer(_v16, _t82, _t82, 1); // executed
                    							 *(_t94 + 0x3c) = _t60;
                    							E00405D0C(0x7a8a60, _t94 + 4, 0x40);
                    							__eflags = 0;
                    							return 0;
                    						}
                    						goto L29;
                    					}
                    					E00403308( *0x78b6d4);
                    					_t65 = E004032F2( &_a4, 4);
                    					__eflags = _t65;
                    					if(_t65 == 0) {
                    						goto L29;
                    					}
                    					__eflags = _v12 - _a4;
                    					if(_v12 != _a4) {
                    						goto L29;
                    					}
                    					goto L28;
                    				} else {
                    					do {
                    						_t90 = _t93;
                    						asm("sbb eax, eax");
                    						_t70 = ( ~( *0x7a8a38) & 0x00007e00) + 0x200;
                    						__eflags = _t93 - _t70;
                    						if(_t93 >= _t70) {
                    							_t90 = _t70;
                    						}
                    						_t71 = E004032F2(0x7976e0, _t90);
                    						__eflags = _t71;
                    						if(_t71 == 0) {
                    							E00402E5D(1);
                    							L29:
                    							return L"Installer integrity check has failed. Common causes include\nincomplete download and damaged media. Contact the\ninstaller\'s author to obtain a new copy.\n\nMore information at:\nhttp://nsis.sf.net/NSIS_Error";
                    						}
                    						__eflags =  *0x7a8a38;
                    						if( *0x7a8a38 != 0) {
                    							__eflags = _a4 & 0x00000002;
                    							if((_a4 & 0x00000002) == 0) {
                    								E00402E5D(0);
                    							}
                    							goto L20;
                    						}
                    						E00405D0C( &_v44, 0x7976e0, 0x1c);
                    						_t77 = _v44;
                    						__eflags = _t77 & 0xfffffff0;
                    						if((_t77 & 0xfffffff0) != 0) {
                    							goto L20;
                    						}
                    						__eflags = _v40 - 0xdeadbeef;
                    						if(_v40 != 0xdeadbeef) {
                    							goto L20;
                    						}
                    						__eflags = _v28 - 0x74736e49;
                    						if(_v28 != 0x74736e49) {
                    							goto L20;
                    						}
                    						__eflags = _v32 - 0x74666f73;
                    						if(_v32 != 0x74666f73) {
                    							goto L20;
                    						}
                    						__eflags = _v36 - 0x6c6c754e;
                    						if(_v36 != 0x6c6c754e) {
                    							goto L20;
                    						}
                    						_a4 = _a4 | _t77;
                    						_t87 =  *0x78b6d4; // 0x8fd55
                    						 *0x7a8ae0 =  *0x7a8ae0 | _a4 & 0x00000002;
                    						_t80 = _v20;
                    						__eflags = _t80 - _t93;
                    						 *0x7a8a38 = _t87;
                    						if(_t80 > _t93) {
                    							goto L29;
                    						}
                    						__eflags = _a4 & 0x00000008;
                    						if((_a4 & 0x00000008) != 0) {
                    							L16:
                    							_v8 = _v8 + 1;
                    							_t24 = _t80 - 4; // 0x40a2dc
                    							_t93 = _t24;
                    							__eflags = _t90 - _t93;
                    							if(_t90 > _t93) {
                    								_t90 = _t93;
                    							}
                    							goto L20;
                    						}
                    						__eflags = _a4 & 0x00000004;
                    						if((_a4 & 0x00000004) != 0) {
                    							break;
                    						}
                    						goto L16;
                    						L20:
                    						__eflags = _t93 -  *0x7976dc; // 0x91a80
                    						if(__eflags < 0) {
                    							_v12 = E0040672C(_v12, 0x7976e0, _t90);
                    						}
                    						 *0x78b6d4 =  *0x78b6d4 + _t90;
                    						_t93 = _t93 - _t90;
                    						__eflags = _t93;
                    					} while (_t93 > 0);
                    					_t82 = 0;
                    					__eflags = 0;
                    					goto L24;
                    				}
                    			}































                    0x00402ec9
                    0x00402ecc
                    0x00402ecf
                    0x00402ed2
                    0x00402ed8
                    0x00402ee9
                    0x00402eee
                    0x00402f01
                    0x00402f06
                    0x00402f09
                    0x00402f0f
                    0x00000000
                    0x00402f11
                    0x00402f1c
                    0x00402f22
                    0x00402f33
                    0x00402f3a
                    0x00402f40
                    0x00402f42
                    0x00402f47
                    0x00402f49
                    0x00403036
                    0x00403038
                    0x0040303d
                    0x00403044
                    0x00000000
                    0x00000000
                    0x00403046
                    0x00403049
                    0x0040306d
                    0x00403072
                    0x00403078
                    0x00403083
                    0x00403088
                    0x0040308b
                    0x0040308c
                    0x0040308d
                    0x0040308f
                    0x00403094
                    0x00403097
                    0x004030aa
                    0x004030ae
                    0x004030b6
                    0x004030bb
                    0x004030bd
                    0x004030bd
                    0x004030bd
                    0x004030c5
                    0x004030c5
                    0x004030c8
                    0x004030c9
                    0x004030c9
                    0x004030cc
                    0x004030ce
                    0x004030ce
                    0x004030ce
                    0x004030d8
                    0x004030de
                    0x004030ec
                    0x004030f1
                    0x00000000
                    0x004030f1
                    0x00000000
                    0x00403097
                    0x00403051
                    0x0040305c
                    0x00403061
                    0x00403063
                    0x00000000
                    0x00000000
                    0x00403068
                    0x0040306b
                    0x00000000
                    0x00000000
                    0x00000000
                    0x00402f4f
                    0x00402f54
                    0x00402f59
                    0x00402f5d
                    0x00402f64
                    0x00402f69
                    0x00402f6b
                    0x00402f6d
                    0x00402f6d
                    0x00402f71
                    0x00402f76
                    0x00402f78
                    0x004030a2
                    0x00403099
                    0x00000000
                    0x00403099
                    0x00402f7e
                    0x00402f85
                    0x00403001
                    0x00403005
                    0x00403009
                    0x0040300e
                    0x00000000
                    0x00403005
                    0x00402f8e
                    0x00402f93
                    0x00402f96
                    0x00402f9b
                    0x00000000
                    0x00000000
                    0x00402f9d
                    0x00402fa4
                    0x00000000
                    0x00000000
                    0x00402fa6
                    0x00402fad
                    0x00000000
                    0x00000000
                    0x00402faf
                    0x00402fb6
                    0x00000000
                    0x00000000
                    0x00402fb8
                    0x00402fbf
                    0x00000000
                    0x00000000
                    0x00402fc1
                    0x00402fc7
                    0x00402fd0
                    0x00402fd6
                    0x00402fd9
                    0x00402fdb
                    0x00402fe1
                    0x00000000
                    0x00000000
                    0x00402fe7
                    0x00402feb
                    0x00402ff3
                    0x00402ff3
                    0x00402ff6
                    0x00402ff6
                    0x00402ff9
                    0x00402ffb
                    0x00402ffd
                    0x00402ffd
                    0x00000000
                    0x00402ffb
                    0x00402fed
                    0x00402ff1
                    0x00000000
                    0x00000000
                    0x00000000
                    0x0040300f
                    0x0040300f
                    0x00403015
                    0x00403021
                    0x00403021
                    0x00403024
                    0x0040302a
                    0x0040302c
                    0x0040302c
                    0x00403034
                    0x00403034
                    0x00000000
                    0x00403034

                    APIs
                    • GetTickCount.KERNEL32 ref: 00402ED2
                    • GetModuleFileNameW.KERNEL32(00000000,C:\Users\user\Desktop\Ordene 501527,pdf.exe,00000400,?,00000006,00000008,0000000A), ref: 00402EEE
                      • Part of subcall function 00405D51: GetFileAttributesW.KERNELBASE(?,00402F01,C:\Users\user\Desktop\Ordene 501527,pdf.exe,80000000,00000003,?,00000006,00000008,0000000A), ref: 00405D55
                      • Part of subcall function 00405D51: CreateFileW.KERNELBASE(?,?,00000001,00000000,?,00000001,00000000,?,00000006,00000008,0000000A), ref: 00405D77
                    • GetFileSize.KERNEL32(00000000,00000000,007B7000,00000000,C:\Users\user\Desktop,C:\Users\user\Desktop,C:\Users\user\Desktop\Ordene 501527,pdf.exe,C:\Users\user\Desktop\Ordene 501527,pdf.exe,80000000,00000003,?,00000006,00000008,0000000A), ref: 00402F3A
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.668679627.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000000.00000002.668672686.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.668695651.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.668709908.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.669360772.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.669367484.0000000000782000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.669373527.0000000000786000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.669383228.0000000000789000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.669410918.00000000007A4000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.669416138.00000000007A6000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.669434006.00000000007B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.669445400.00000000007C4000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.669547952.0000000000804000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_400000_Ordene 501527,pdf.jbxd
                    Similarity
                    • API ID: File$AttributesCountCreateModuleNameSizeTick
                    • String ID: "C:\Users\user\Desktop\Ordene 501527,pdf.exe" $C:\Users\user\AppData\Local\Temp\$C:\Users\user\Desktop$C:\Users\user\Desktop\Ordene 501527,pdf.exe$Error launching installer$Inst$Installer integrity check has failed. Common causes includeincomplete download and damaged media. Contact theinstaller's author $Null$soft$vy
                    • API String ID: 4283519449-424810234
                    • Opcode ID: 5b59a3334938b1ada53fb21aa8cc17301929ac982103e349ce86a46566e051fd
                    • Instruction ID: 5e1ca327f74bc56913369b9b8f7861415b50b435560b28898b8d4eae658a22e8
                    • Opcode Fuzzy Hash: 5b59a3334938b1ada53fb21aa8cc17301929ac982103e349ce86a46566e051fd
                    • Instruction Fuzzy Hash: BC51F171901209AFDB20AF65DD85B9E7EA8EB4035AF10803BF505B62D5CB7C8E418B5D
                    Uniqueness

                    Uniqueness Score: -1.00%

                    Control-flow Graph

                    • Executed
                    • Not Executed
                    control_flow_graph 700 406281-40628c 701 40628e-40629d 700->701 702 40629f-4062b5 700->702 701->702 703 4062bb-4062c8 702->703 704 4064cd-4064d3 702->704 703->704 705 4062ce-4062d5 703->705 706 4064d9-4064e4 704->706 707 4062da-4062e7 704->707 705->704 708 4064e6-4064ea call 40625f 706->708 709 4064ef-4064f0 706->709 707->706 710 4062ed-4062f9 707->710 708->709 712 4064ba 710->712 713 4062ff-40633d 710->713 716 4064c8-4064cb 712->716 717 4064bc-4064c6 712->717 714 406343-40634e 713->714 715 40645d-406461 713->715 718 406350-406355 714->718 719 406367 714->719 720 406463-406469 715->720 721 406494-406498 715->721 716->704 717->704 718->719 727 406357-40635a 718->727 724 40636e-406375 719->724 722 406479-406485 call 40625f 720->722 723 40646b-406477 call 4061a6 720->723 725 4064a7-4064b8 lstrlenW 721->725 726 40649a-4064a2 call 406281 721->726 737 40648a-406490 722->737 723->737 729 406377-406379 724->729 730 40637a-40637c 724->730 725->704 726->725 727->719 733 40635c-40635f 727->733 729->730 735 4063b7-4063ba 730->735 736 40637e-4063a5 call 40612d 730->736 733->719 738 406361-406365 733->738 741 4063ca-4063cd 735->741 742 4063bc-4063c8 GetSystemDirectoryW 735->742 748 406445-406448 736->748 749 4063ab-4063b2 call 406281 736->749 737->725 740 406492 737->740 738->724 744 406455-40645b call 4064f3 740->744 746 406438-40643a 741->746 747 4063cf-4063dd GetWindowsDirectoryW 741->747 745 40643c-406440 742->745 744->725 745->744 751 406442 745->751 746->745 750 4063df-4063e9 746->750 747->746 748->744 754 40644a-406450 lstrcatW 748->754 749->745 756 406403-406419 SHGetSpecialFolderLocation 750->756 757 4063eb-4063ee 750->757 751->748 754->744 759 406434 756->759 760 40641b-406432 SHGetPathFromIDListW CoTaskMemFree 756->760 757->756 758 4063f0-4063f7 757->758 762 4063ff-406401 758->762 759->746 760->745 760->759 762->745 762->756
                    C-Code - Quality: 72%
                    			E00406281(void* __ebx, void* __edi, void* __esi, signed int _a4, signed int _a8) {
                    				signed int _v8;
                    				struct _ITEMIDLIST* _v12;
                    				signed int _v16;
                    				signed int _v20;
                    				signed int _v24;
                    				signed int _v28;
                    				signed int _t43;
                    				WCHAR* _t44;
                    				signed char _t46;
                    				signed int _t47;
                    				signed int _t48;
                    				short _t58;
                    				short _t60;
                    				short _t62;
                    				void* _t70;
                    				signed int _t76;
                    				void* _t82;
                    				signed char _t83;
                    				short _t86;
                    				signed int _t96;
                    				void* _t102;
                    				short _t103;
                    				signed int _t106;
                    				signed int _t108;
                    				void* _t109;
                    				WCHAR* _t110;
                    				void* _t112;
                    
                    				_t109 = __esi;
                    				_t102 = __edi;
                    				_t70 = __ebx;
                    				_t43 = _a8;
                    				if(_t43 < 0) {
                    					_t43 =  *( *0x7a79fc - 4 + _t43 * 4);
                    				}
                    				_push(_t70);
                    				_push(_t109);
                    				_push(_t102);
                    				_t96 =  *0x7a8a78 + _t43 * 2;
                    				_t44 = 0x7a69c0;
                    				_t110 = 0x7a69c0;
                    				if(_a4 >= 0x7a69c0 && _a4 - 0x7a69c0 >> 1 < 0x800) {
                    					_t110 = _a4;
                    					_a4 = _a4 & 0x00000000;
                    				}
                    				while(1) {
                    					_t103 =  *_t96;
                    					if(_t103 == 0) {
                    						break;
                    					}
                    					__eflags = (_t110 - _t44 & 0xfffffffe) - 0x800;
                    					if((_t110 - _t44 & 0xfffffffe) >= 0x800) {
                    						break;
                    					}
                    					_t82 = 2;
                    					_t96 = _t96 + _t82;
                    					__eflags = _t103 - 4;
                    					_a8 = _t96;
                    					if(__eflags >= 0) {
                    						if(__eflags != 0) {
                    							 *_t110 = _t103;
                    							_t110 = _t110 + _t82;
                    							__eflags = _t110;
                    						} else {
                    							 *_t110 =  *_t96;
                    							_t110 = _t110 + _t82;
                    							_t96 = _t96 + _t82;
                    						}
                    						continue;
                    					}
                    					_t83 =  *((intOrPtr*)(_t96 + 1));
                    					_t46 =  *_t96;
                    					_t47 = _t46 & 0x000000ff;
                    					_v8 = (_t83 & 0x0000007f) << 0x00000007 | _t46 & 0x0000007f;
                    					_a8 = _a8 + 2;
                    					_v28 = _t47 | 0x00008000;
                    					_v24 = _t47;
                    					_t76 = _t83 & 0x000000ff;
                    					_v16 = _t76;
                    					__eflags = _t103 - 2;
                    					_v20 = _t76 | 0x00008000;
                    					if(_t103 != 2) {
                    						__eflags = _t103 - 3;
                    						if(_t103 != 3) {
                    							__eflags = _t103 - 1;
                    							if(_t103 == 1) {
                    								__eflags = (_t47 | 0xffffffff) - _v8;
                    								E00406281(_t76, _t103, _t110, _t110, (_t47 | 0xffffffff) - _v8);
                    							}
                    							L43:
                    							_t48 = lstrlenW(_t110);
                    							_t96 = _a8;
                    							_t110 =  &(_t110[_t48]);
                    							_t44 = 0x7a69c0;
                    							continue;
                    						}
                    						_t106 = _v8;
                    						__eflags = _t106 - 0x1d;
                    						if(_t106 != 0x1d) {
                    							__eflags = (_t106 << 0xb) + 0x7a9000;
                    							E0040625F(_t110, (_t106 << 0xb) + 0x7a9000);
                    						} else {
                    							E004061A6(_t110,  *0x7a8a28);
                    						}
                    						__eflags = _t106 + 0xffffffeb - 7;
                    						if(_t106 + 0xffffffeb < 7) {
                    							L34:
                    							E004064F3(_t110);
                    						}
                    						goto L43;
                    					}
                    					_t86 =  *0x7a8a2c;
                    					__eflags = _t86;
                    					_t108 = 2;
                    					if(_t86 >= 0) {
                    						L13:
                    						_v8 = 1;
                    						L14:
                    						__eflags =  *0x7a8ac4;
                    						if( *0x7a8ac4 != 0) {
                    							_t108 = 4;
                    						}
                    						__eflags = _t47;
                    						if(__eflags >= 0) {
                    							__eflags = _t47 - 0x25;
                    							if(_t47 != 0x25) {
                    								__eflags = _t47 - 0x24;
                    								if(_t47 == 0x24) {
                    									GetWindowsDirectoryW(_t110, 0x400);
                    									_t108 = 0;
                    								}
                    								while(1) {
                    									__eflags = _t108;
                    									if(_t108 == 0) {
                    										goto L30;
                    									}
                    									_t58 =  *0x7a8a24;
                    									_t108 = _t108 - 1;
                    									__eflags = _t58;
                    									if(_t58 == 0) {
                    										L26:
                    										_t60 = SHGetSpecialFolderLocation( *0x7a8a28,  *(_t112 + _t108 * 4 - 0x18),  &_v12);
                    										__eflags = _t60;
                    										if(_t60 != 0) {
                    											L28:
                    											 *_t110 =  *_t110 & 0x00000000;
                    											__eflags =  *_t110;
                    											continue;
                    										}
                    										__imp__SHGetPathFromIDListW(_v12, _t110);
                    										__imp__CoTaskMemFree(_v12);
                    										__eflags = _t60;
                    										if(_t60 != 0) {
                    											goto L30;
                    										}
                    										goto L28;
                    									}
                    									__eflags = _v8;
                    									if(_v8 == 0) {
                    										goto L26;
                    									}
                    									_t62 =  *_t58( *0x7a8a28,  *(_t112 + _t108 * 4 - 0x18), 0, 0, _t110); // executed
                    									__eflags = _t62;
                    									if(_t62 == 0) {
                    										goto L30;
                    									}
                    									goto L26;
                    								}
                    								goto L30;
                    							}
                    							GetSystemDirectoryW(_t110, 0x400);
                    							goto L30;
                    						} else {
                    							E0040612D( *0x7a8a78, __eflags, 0x80000002, L"Software\\Microsoft\\Windows\\CurrentVersion",  *0x7a8a78 + (_t47 & 0x0000003f) * 2, _t110, _t47 & 0x00000040);
                    							__eflags =  *_t110;
                    							if( *_t110 != 0) {
                    								L32:
                    								__eflags = _t76 - 0x1a;
                    								if(_t76 == 0x1a) {
                    									lstrcatW(_t110, L"\\Microsoft\\Internet Explorer\\Quick Launch");
                    								}
                    								goto L34;
                    							}
                    							E00406281(_t76, _t108, _t110, _t110, _t76);
                    							L30:
                    							__eflags =  *_t110;
                    							if( *_t110 == 0) {
                    								goto L34;
                    							}
                    							_t76 = _v16;
                    							goto L32;
                    						}
                    					}
                    					__eflags = _t86 - 0x5a04;
                    					if(_t86 == 0x5a04) {
                    						goto L13;
                    					}
                    					__eflags = _t76 - 0x23;
                    					if(_t76 == 0x23) {
                    						goto L13;
                    					}
                    					__eflags = _t76 - 0x2e;
                    					if(_t76 == 0x2e) {
                    						goto L13;
                    					} else {
                    						_v8 = _v8 & 0x00000000;
                    						goto L14;
                    					}
                    				}
                    				 *_t110 =  *_t110 & 0x00000000;
                    				if(_a4 == 0) {
                    					return _t44;
                    				}
                    				return E0040625F(_a4, _t44);
                    			}






























                    0x00406281
                    0x00406281
                    0x00406281
                    0x00406287
                    0x0040628c
                    0x0040629d
                    0x0040629d
                    0x004062a5
                    0x004062a6
                    0x004062a7
                    0x004062a8
                    0x004062ab
                    0x004062b3
                    0x004062b5
                    0x004062ce
                    0x004062d1
                    0x004062d1
                    0x004064cd
                    0x004064cd
                    0x004064d3
                    0x00000000
                    0x00000000
                    0x004062e1
                    0x004062e7
                    0x00000000
                    0x00000000
                    0x004062ef
                    0x004062f0
                    0x004062f2
                    0x004062f6
                    0x004062f9
                    0x004064ba
                    0x004064c8
                    0x004064cb
                    0x004064cb
                    0x004064bc
                    0x004064bf
                    0x004064c2
                    0x004064c4
                    0x004064c4
                    0x00000000
                    0x004064ba
                    0x004062ff
                    0x00406302
                    0x00406311
                    0x00406318
                    0x00406322
                    0x00406326
                    0x00406329
                    0x0040632c
                    0x00406331
                    0x00406336
                    0x0040633a
                    0x0040633d
                    0x0040645d
                    0x00406461
                    0x00406494
                    0x00406498
                    0x0040649d
                    0x004064a2
                    0x004064a2
                    0x004064a7
                    0x004064a8
                    0x004064ad
                    0x004064b0
                    0x004064b3
                    0x00000000
                    0x004064b3
                    0x00406463
                    0x00406466
                    0x00406469
                    0x0040647e
                    0x00406485
                    0x0040646b
                    0x00406472
                    0x00406472
                    0x0040648d
                    0x00406490
                    0x00406455
                    0x00406456
                    0x00406456
                    0x00000000
                    0x00406490
                    0x00406343
                    0x0040634b
                    0x0040634d
                    0x0040634e
                    0x00406367
                    0x00406367
                    0x0040636e
                    0x0040636e
                    0x00406375
                    0x00406379
                    0x00406379
                    0x0040637a
                    0x0040637c
                    0x004063b7
                    0x004063ba
                    0x004063ca
                    0x004063cd
                    0x004063d5
                    0x004063db
                    0x004063db
                    0x00406438
                    0x00406438
                    0x0040643a
                    0x00000000
                    0x00000000
                    0x004063df
                    0x004063e6
                    0x004063e7
                    0x004063e9
                    0x00406403
                    0x00406411
                    0x00406417
                    0x00406419
                    0x00406434
                    0x00406434
                    0x00406434
                    0x00000000
                    0x00406434
                    0x0040641f
                    0x0040642a
                    0x00406430
                    0x00406432
                    0x00000000
                    0x00000000
                    0x00000000
                    0x00406432
                    0x004063eb
                    0x004063ee
                    0x00000000
                    0x00000000
                    0x004063fd
                    0x004063ff
                    0x00406401
                    0x00000000
                    0x00000000
                    0x00000000
                    0x00406401
                    0x00000000
                    0x00406438
                    0x004063c2
                    0x00000000
                    0x0040637e
                    0x0040639c
                    0x004063a1
                    0x004063a5
                    0x00406445
                    0x00406445
                    0x00406448
                    0x00406450
                    0x00406450
                    0x00000000
                    0x00406448
                    0x004063ad
                    0x0040643c
                    0x0040643c
                    0x00406440
                    0x00000000
                    0x00000000
                    0x00406442
                    0x00000000
                    0x00406442
                    0x0040637c
                    0x00406350
                    0x00406355
                    0x00000000
                    0x00000000
                    0x00406357
                    0x0040635a
                    0x00000000
                    0x00000000
                    0x0040635c
                    0x0040635f
                    0x00000000
                    0x00406361
                    0x00406361
                    0x00000000
                    0x00406361
                    0x0040635f
                    0x004064d9
                    0x004064e4
                    0x004064f0
                    0x004064f0
                    0x00000000

                    APIs
                    • GetSystemDirectoryW.KERNEL32(Call,00000400), ref: 004063C2
                    • GetWindowsDirectoryW.KERNEL32(Call,00000400,00000000,007A0F00,?,004052FA,007A0F00,00000000), ref: 004063D5
                    • SHGetSpecialFolderLocation.SHELL32(004052FA,007924D8,00000000,007A0F00,?,004052FA,007A0F00,00000000), ref: 00406411
                    • SHGetPathFromIDListW.SHELL32(007924D8,Call), ref: 0040641F
                    • CoTaskMemFree.OLE32(007924D8), ref: 0040642A
                    • lstrcatW.KERNEL32(Call,\Microsoft\Internet Explorer\Quick Launch), ref: 00406450
                    • lstrlenW.KERNEL32(Call,00000000,007A0F00,?,004052FA,007A0F00,00000000), ref: 004064A8
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.668679627.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000000.00000002.668672686.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.668695651.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.668709908.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.669360772.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.669367484.0000000000782000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.669373527.0000000000786000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.669383228.0000000000789000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.669410918.00000000007A4000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.669416138.00000000007A6000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.669434006.00000000007B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.669445400.00000000007C4000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.669547952.0000000000804000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_400000_Ordene 501527,pdf.jbxd
                    Similarity
                    • API ID: Directory$FolderFreeFromListLocationPathSpecialSystemTaskWindowslstrcatlstrlen
                    • String ID: Call$Software\Microsoft\Windows\CurrentVersion$\Microsoft\Internet Explorer\Quick Launch
                    • API String ID: 717251189-1230650788
                    • Opcode ID: 890eb65aa38ad62bbc062fa9763307f13bf9a84b93246a35c735a8ee9e53aa4d
                    • Instruction ID: 53892de15873aface2ea8104bec8e4e448d1085f61c5dcff38edd77b46373637
                    • Opcode Fuzzy Hash: 890eb65aa38ad62bbc062fa9763307f13bf9a84b93246a35c735a8ee9e53aa4d
                    • Instruction Fuzzy Hash: AA610371A00111AADF249F64DC40ABE37A5BF55324F12813FE547B62D0DB3D89A2CB5D
                    Uniqueness

                    Uniqueness Score: -1.00%

                    Control-flow Graph

                    C-Code - Quality: 61%
                    			E0040176F(FILETIME* __ebx, void* __eflags) {
                    				void* __edi;
                    				void* _t35;
                    				void* _t43;
                    				void* _t45;
                    				FILETIME* _t51;
                    				FILETIME* _t64;
                    				void* _t66;
                    				signed int _t72;
                    				FILETIME* _t73;
                    				FILETIME* _t77;
                    				signed int _t79;
                    				void* _t81;
                    				void* _t82;
                    				WCHAR* _t84;
                    				void* _t86;
                    
                    				_t77 = __ebx;
                    				 *(_t86 - 8) = E00402C37(0x31);
                    				 *(_t86 + 8) =  *(_t86 - 0x28) & 0x00000007;
                    				_t35 = E00405BA7( *(_t86 - 8));
                    				_push( *(_t86 - 8));
                    				_t84 = L"Call";
                    				if(_t35 == 0) {
                    					lstrcatW(E00405B30(E0040625F(_t84, L"C:\\Users\\alfons\\AppData\\Roaming\\Microsoft\\Windows\\Start Menu\\Misundes\\Caesural4\\Kvalitative209")), ??);
                    				} else {
                    					E0040625F();
                    				}
                    				E004064F3(_t84);
                    				while(1) {
                    					__eflags =  *(_t86 + 8) - 3;
                    					if( *(_t86 + 8) >= 3) {
                    						_t66 = E004065A2(_t84);
                    						_t79 = 0;
                    						__eflags = _t66 - _t77;
                    						if(_t66 != _t77) {
                    							_t73 = _t66 + 0x14;
                    							__eflags = _t73;
                    							_t79 = CompareFileTime(_t73, _t86 - 0x1c);
                    						}
                    						asm("sbb eax, eax");
                    						_t72 =  ~(( *(_t86 + 8) + 0xfffffffd | 0x80000000) & _t79) + 1;
                    						__eflags = _t72;
                    						 *(_t86 + 8) = _t72;
                    					}
                    					__eflags =  *(_t86 + 8) - _t77;
                    					if( *(_t86 + 8) == _t77) {
                    						E00405D2C(_t84);
                    					}
                    					__eflags =  *(_t86 + 8) - 1;
                    					_t43 = E00405D51(_t84, 0x40000000, (0 |  *(_t86 + 8) != 0x00000001) + 1);
                    					__eflags = _t43 - 0xffffffff;
                    					 *(_t86 - 0x30) = _t43;
                    					if(_t43 != 0xffffffff) {
                    						break;
                    					}
                    					__eflags =  *(_t86 + 8) - _t77;
                    					if( *(_t86 + 8) != _t77) {
                    						E004052C3(0xffffffe2,  *(_t86 - 8));
                    						__eflags =  *(_t86 + 8) - 2;
                    						if(__eflags == 0) {
                    							 *((intOrPtr*)(_t86 - 4)) = 1;
                    						}
                    						L31:
                    						 *0x7a8ac8 =  *0x7a8ac8 +  *((intOrPtr*)(_t86 - 4));
                    						__eflags =  *0x7a8ac8;
                    						goto L32;
                    					} else {
                    						E0040625F("C:\Users\alfons\AppData\Local\Temp\nshB62A.tmp", _t81);
                    						E0040625F(_t81, _t84);
                    						E00406281(_t77, _t81, _t84, "C:\Users\alfons\AppData\Local\Temp\nshB62A.tmp\System.dll",  *((intOrPtr*)(_t86 - 0x14)));
                    						E0040625F(_t81, "C:\Users\alfons\AppData\Local\Temp\nshB62A.tmp");
                    						_t64 = E004058C1("C:\Users\alfons\AppData\Local\Temp\nshB62A.tmp\System.dll",  *(_t86 - 0x28) >> 3) - 4;
                    						__eflags = _t64;
                    						if(_t64 == 0) {
                    							continue;
                    						} else {
                    							__eflags = _t64 == 1;
                    							if(_t64 == 1) {
                    								 *0x7a8ac8 =  &( *0x7a8ac8->dwLowDateTime);
                    								L32:
                    								_t51 = 0;
                    								__eflags = 0;
                    							} else {
                    								_push(_t84);
                    								_push(0xfffffffa);
                    								E004052C3();
                    								L29:
                    								_t51 = 0x7fffffff;
                    							}
                    						}
                    					}
                    					L33:
                    					return _t51;
                    				}
                    				E004052C3(0xffffffea,  *(_t86 - 8)); // executed
                    				 *0x7a8af4 =  *0x7a8af4 + 1;
                    				_push(_t77);
                    				_push(_t77);
                    				_push( *(_t86 - 0x30));
                    				_push( *((intOrPtr*)(_t86 - 0x20)));
                    				_t45 = E004030FA(); // executed
                    				 *0x7a8af4 =  *0x7a8af4 - 1;
                    				__eflags =  *(_t86 - 0x1c) - 0xffffffff;
                    				_t82 = _t45;
                    				if( *(_t86 - 0x1c) != 0xffffffff) {
                    					L22:
                    					SetFileTime( *(_t86 - 0x30), _t86 - 0x1c, _t77, _t86 - 0x1c); // executed
                    				} else {
                    					__eflags =  *((intOrPtr*)(_t86 - 0x18)) - 0xffffffff;
                    					if( *((intOrPtr*)(_t86 - 0x18)) != 0xffffffff) {
                    						goto L22;
                    					}
                    				}
                    				FindCloseChangeNotification( *(_t86 - 0x30)); // executed
                    				__eflags = _t82 - _t77;
                    				if(_t82 >= _t77) {
                    					goto L31;
                    				} else {
                    					__eflags = _t82 - 0xfffffffe;
                    					if(_t82 != 0xfffffffe) {
                    						E00406281(_t77, _t82, _t84, _t84, 0xffffffee);
                    					} else {
                    						E00406281(_t77, _t82, _t84, _t84, 0xffffffe9);
                    						lstrcatW(_t84,  *(_t86 - 8));
                    					}
                    					_push(0x200010);
                    					_push(_t84);
                    					E004058C1();
                    					goto L29;
                    				}
                    				goto L33;
                    			}


















                    0x0040176f
                    0x00401776
                    0x00401782
                    0x00401785
                    0x0040178a
                    0x0040178d
                    0x00401794
                    0x004017b0
                    0x00401796
                    0x00401797
                    0x00401797
                    0x004017b6
                    0x004017bb
                    0x004017bb
                    0x004017bf
                    0x004017c2
                    0x004017c7
                    0x004017c9
                    0x004017cb
                    0x004017d0
                    0x004017d0
                    0x004017db
                    0x004017db
                    0x004017ec
                    0x004017ee
                    0x004017ee
                    0x004017ef
                    0x004017ef
                    0x004017f2
                    0x004017f5
                    0x004017f8
                    0x004017f8
                    0x004017ff
                    0x0040180e
                    0x00401813
                    0x00401816
                    0x00401819
                    0x00000000
                    0x00000000
                    0x0040181b
                    0x0040181e
                    0x00401874
                    0x00401879
                    0x004015b6
                    0x00402885
                    0x00402885
                    0x00402abf
                    0x00402ac2
                    0x00402ac2
                    0x00000000
                    0x00401820
                    0x00401826
                    0x0040182d
                    0x0040183a
                    0x00401845
                    0x0040185b
                    0x0040185b
                    0x0040185e
                    0x00000000
                    0x00401864
                    0x00401864
                    0x00401865
                    0x00401882
                    0x00402ac8
                    0x00402ac8
                    0x00402ac8
                    0x00401867
                    0x00401867
                    0x00401868
                    0x00401493
                    0x004022f1
                    0x004022f1
                    0x004022f1
                    0x00401865
                    0x0040185e
                    0x00402aca
                    0x00402ace
                    0x00402ace
                    0x00401892
                    0x00401897
                    0x0040189d
                    0x0040189e
                    0x0040189f
                    0x004018a2
                    0x004018a5
                    0x004018aa
                    0x004018b0
                    0x004018b4
                    0x004018b6
                    0x004018be
                    0x004018ca
                    0x004018b8
                    0x004018b8
                    0x004018bc
                    0x00000000
                    0x00000000
                    0x004018bc
                    0x004018d3
                    0x004018d9
                    0x004018db
                    0x00000000
                    0x004018e1
                    0x004018e1
                    0x004018e4
                    0x004018fc
                    0x004018e6
                    0x004018e9
                    0x004018f2
                    0x004018f2
                    0x00401901
                    0x00401906
                    0x004022ec
                    0x00000000
                    0x004022ec
                    0x00000000

                    APIs
                    • lstrcatW.KERNEL32(00000000,00000000), ref: 004017B0
                    • CompareFileTime.KERNEL32(-00000014,?,Call,Call,00000000,00000000,Call,C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Misundes\Caesural4\Kvalitative209,?,?,00000031), ref: 004017D5
                      • Part of subcall function 0040625F: lstrcpynW.KERNEL32(?,?,00000400,00403421,007A7A20,NSIS Error,?,00000006,00000008,0000000A), ref: 0040626C
                      • Part of subcall function 004052C3: lstrlenW.KERNEL32(007A0F00,00000000,007924D8,76DDEA30,?,?,?,?,?,?,?,?,?,0040323B,00000000,?), ref: 004052FB
                      • Part of subcall function 004052C3: lstrlenW.KERNEL32(0040323B,007A0F00,00000000,007924D8,76DDEA30,?,?,?,?,?,?,?,?,?,0040323B,00000000), ref: 0040530B
                      • Part of subcall function 004052C3: lstrcatW.KERNEL32(007A0F00,0040323B), ref: 0040531E
                      • Part of subcall function 004052C3: SetWindowTextW.USER32(007A0F00,007A0F00), ref: 00405330
                      • Part of subcall function 004052C3: SendMessageW.USER32(?,00001004,00000000,00000000), ref: 00405356
                      • Part of subcall function 004052C3: SendMessageW.USER32(?,0000104D,00000000,00000001), ref: 00405370
                      • Part of subcall function 004052C3: SendMessageW.USER32(?,00001013,?,00000000), ref: 0040537E
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.668679627.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000000.00000002.668672686.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.668695651.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.668709908.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.669360772.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.669367484.0000000000782000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.669373527.0000000000786000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.669383228.0000000000789000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.669410918.00000000007A4000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.669416138.00000000007A6000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.669434006.00000000007B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.669445400.00000000007C4000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.669547952.0000000000804000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_400000_Ordene 501527,pdf.jbxd
                    Similarity
                    • API ID: MessageSend$lstrcatlstrlen$CompareFileTextTimeWindowlstrcpyn
                    • String ID: C:\Users\user\AppData\Local\Temp\nshB62A.tmp$C:\Users\user\AppData\Local\Temp\nshB62A.tmp\System.dll$C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Misundes\Caesural4\Kvalitative209$Call
                    • API String ID: 1941528284-211837723
                    • Opcode ID: 52826698266eb0b2882f0967405a7229f30578bd88d16948a4f64c345e669d82
                    • Instruction ID: f7ad0716a47908c9ff001062aeffa45098cd3b08a1486a00dbbe40ca2a302bdd
                    • Opcode Fuzzy Hash: 52826698266eb0b2882f0967405a7229f30578bd88d16948a4f64c345e669d82
                    • Instruction Fuzzy Hash: 56419671910515BECF117BA5CD85DAF3A75EF41329B20823FF412B11E2CA3C8A529A6E
                    Uniqueness

                    Uniqueness Score: -1.00%

                    Control-flow Graph

                    • Executed
                    • Not Executed
                    control_flow_graph 829 4052c3-4052d8 830 4052de-4052ef 829->830 831 40538f-405393 829->831 832 4052f1-4052f5 call 406281 830->832 833 4052fa-405306 lstrlenW 830->833 832->833 834 405323-405327 833->834 835 405308-405318 lstrlenW 833->835 838 405336-40533a 834->838 839 405329-405330 SetWindowTextW 834->839 835->831 837 40531a-40531e lstrcatW 835->837 837->834 840 405380-405382 838->840 841 40533c-40537e SendMessageW * 3 838->841 839->838 840->831 842 405384-405387 840->842 841->840 842->831
                    C-Code - Quality: 100%
                    			E004052C3(signed int _a4, WCHAR* _a8) {
                    				struct HWND__* _v8;
                    				signed int _v12;
                    				WCHAR* _v32;
                    				long _v44;
                    				int _v48;
                    				void* _v52;
                    				void* __ebx;
                    				void* __edi;
                    				void* __esi;
                    				WCHAR* _t27;
                    				signed int _t28;
                    				long _t29;
                    				signed int _t37;
                    				signed int _t38;
                    
                    				_t27 =  *0x7a7a04;
                    				_v8 = _t27;
                    				if(_t27 != 0) {
                    					_t37 =  *0x7a8af4;
                    					_v12 = _t37;
                    					_t38 = _t37 & 0x00000001;
                    					if(_t38 == 0) {
                    						E00406281(_t38, 0, 0x7a0f00, 0x7a0f00, _a4);
                    					}
                    					_t27 = lstrlenW(0x7a0f00);
                    					_a4 = _t27;
                    					if(_a8 == 0) {
                    						L6:
                    						if((_v12 & 0x00000004) == 0) {
                    							_t27 = SetWindowTextW( *0x7a79e8, 0x7a0f00); // executed
                    						}
                    						if((_v12 & 0x00000002) == 0) {
                    							_v32 = 0x7a0f00;
                    							_v52 = 1;
                    							_t29 = SendMessageW(_v8, 0x1004, 0, 0); // executed
                    							_v44 = 0;
                    							_v48 = _t29 - _t38;
                    							SendMessageW(_v8, 0x104d - _t38, 0,  &_v52); // executed
                    							_t27 = SendMessageW(_v8, 0x1013, _v48, 0); // executed
                    						}
                    						if(_t38 != 0) {
                    							_t28 = _a4;
                    							0x7a0f00[_t28] = 0;
                    							return _t28;
                    						}
                    					} else {
                    						_t27 = lstrlenW(_a8) + _a4;
                    						if(_t27 < 0x1000) {
                    							_t27 = lstrcatW(0x7a0f00, _a8);
                    							goto L6;
                    						}
                    					}
                    				}
                    				return _t27;
                    			}

















                    0x004052c9
                    0x004052d3
                    0x004052d8
                    0x004052de
                    0x004052e9
                    0x004052ec
                    0x004052ef
                    0x004052f5
                    0x004052f5
                    0x004052fb
                    0x00405303
                    0x00405306
                    0x00405323
                    0x00405327
                    0x00405330
                    0x00405330
                    0x0040533a
                    0x00405343
                    0x0040534f
                    0x00405356
                    0x0040535a
                    0x0040535d
                    0x00405370
                    0x0040537e
                    0x0040537e
                    0x00405382
                    0x00405384
                    0x00405387
                    0x00000000
                    0x00405387
                    0x00405308
                    0x00405310
                    0x00405318
                    0x0040531e
                    0x00000000
                    0x0040531e
                    0x00405318
                    0x00405306
                    0x00405393

                    APIs
                    • lstrlenW.KERNEL32(007A0F00,00000000,007924D8,76DDEA30,?,?,?,?,?,?,?,?,?,0040323B,00000000,?), ref: 004052FB
                    • lstrlenW.KERNEL32(0040323B,007A0F00,00000000,007924D8,76DDEA30,?,?,?,?,?,?,?,?,?,0040323B,00000000), ref: 0040530B
                    • lstrcatW.KERNEL32(007A0F00,0040323B), ref: 0040531E
                    • SetWindowTextW.USER32(007A0F00,007A0F00), ref: 00405330
                    • SendMessageW.USER32(?,00001004,00000000,00000000), ref: 00405356
                    • SendMessageW.USER32(?,0000104D,00000000,00000001), ref: 00405370
                    • SendMessageW.USER32(?,00001013,?,00000000), ref: 0040537E
                    Memory Dump Source
                    • Source File: 00000000.00000002.668679627.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000000.00000002.668672686.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.668695651.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.668709908.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.669360772.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.669367484.0000000000782000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.669373527.0000000000786000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.669383228.0000000000789000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.669410918.00000000007A4000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.669416138.00000000007A6000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.669434006.00000000007B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.669445400.00000000007C4000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.669547952.0000000000804000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_400000_Ordene 501527,pdf.jbxd
                    Similarity
                    • API ID: MessageSend$lstrlen$TextWindowlstrcat
                    • String ID:
                    • API String ID: 2531174081-0
                    • Opcode ID: e3da8a659d26e469f7364c86854a8c7d89336f5590f3b6c2a9e79e9323d9dea2
                    • Instruction ID: 54fc0906511a0d38b77c2dbc449d7618901aa97d03555d0a48212fe36839b6ac
                    • Opcode Fuzzy Hash: e3da8a659d26e469f7364c86854a8c7d89336f5590f3b6c2a9e79e9323d9dea2
                    • Instruction Fuzzy Hash: A9218C71900618BACF11AFA6DD84EDFBF74EF85350F10807AF905B22A0C7794A40CBA8
                    Uniqueness

                    Uniqueness Score: -1.00%

                    Control-flow Graph

                    • Executed
                    • Not Executed
                    control_flow_graph 843 4065c9-4065e9 GetSystemDirectoryW 844 4065eb 843->844 845 4065ed-4065ef 843->845 844->845 846 406600-406602 845->846 847 4065f1-4065fa 845->847 849 406603-406636 wsprintfW LoadLibraryExW 846->849 847->846 848 4065fc-4065fe 847->848 848->849
                    C-Code - Quality: 100%
                    			E004065C9(intOrPtr _a4) {
                    				short _v576;
                    				signed int _t13;
                    				struct HINSTANCE__* _t17;
                    				signed int _t19;
                    				void* _t24;
                    
                    				_t13 = GetSystemDirectoryW( &_v576, 0x104);
                    				if(_t13 > 0x104) {
                    					_t13 = 0;
                    				}
                    				if(_t13 == 0 ||  *((short*)(_t24 + _t13 * 2 - 0x23e)) == 0x5c) {
                    					_t19 = 1;
                    				} else {
                    					_t19 = 0;
                    				}
                    				wsprintfW(_t24 + _t13 * 2 - 0x23c, L"%s%S.dll", 0x40a014 + _t19 * 2, _a4);
                    				_t17 = LoadLibraryExW( &_v576, 0, 8); // executed
                    				return _t17;
                    			}








                    0x004065e0
                    0x004065e9
                    0x004065eb
                    0x004065eb
                    0x004065ef
                    0x00406602
                    0x004065fc
                    0x004065fc
                    0x004065fc
                    0x0040661b
                    0x0040662f
                    0x00406636

                    APIs
                    • GetSystemDirectoryW.KERNEL32(?,00000104), ref: 004065E0
                    • wsprintfW.USER32 ref: 0040661B
                    • LoadLibraryExW.KERNELBASE(?,00000000,00000008), ref: 0040662F
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.668679627.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000000.00000002.668672686.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.668695651.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.668709908.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.669360772.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.669367484.0000000000782000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.669373527.0000000000786000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.669383228.0000000000789000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.669410918.00000000007A4000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.669416138.00000000007A6000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.669434006.00000000007B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.669445400.00000000007C4000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.669547952.0000000000804000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_400000_Ordene 501527,pdf.jbxd
                    Similarity
                    • API ID: DirectoryLibraryLoadSystemwsprintf
                    • String ID: %s%S.dll$UXTHEME$\
                    • API String ID: 2200240437-1946221925
                    • Opcode ID: fcd04411c5a1f64f7e9219edfc5ac0d332aa1f587fd7b062781a7321f30925af
                    • Instruction ID: 20a568d0c0fc1602bd6380e0cb5a56c4d8b7367864d21650c92abf75bc562668
                    • Opcode Fuzzy Hash: fcd04411c5a1f64f7e9219edfc5ac0d332aa1f587fd7b062781a7321f30925af
                    • Instruction Fuzzy Hash: E5F0F670500219AADB14AB64ED0DF9B366CAB00304F10447AA646F11D1EBB8DA24CBA8
                    Uniqueness

                    Uniqueness Score: -1.00%

                    Control-flow Graph

                    • Executed
                    • Not Executed
                    control_flow_graph 850 4030fa-403111 851 403113 850->851 852 40311a-403123 850->852 851->852 853 403125 852->853 854 40312c-403131 852->854 853->854 855 403141-40314e call 4032f2 854->855 856 403133-40313c call 403308 854->856 860 4032e0 855->860 861 403154-403158 855->861 856->855 862 4032e2-4032e3 860->862 863 40328b-40328d 861->863 864 40315e-403184 GetTickCount 861->864 865 4032eb-4032ef 862->865 868 4032cd-4032d0 863->868 869 40328f-403292 863->869 866 4032e8 864->866 867 40318a-403192 864->867 866->865 871 403194 867->871 872 403197-4031a5 call 4032f2 867->872 873 4032d2 868->873 874 4032d5-4032de call 4032f2 868->874 869->866 870 403294 869->870 875 403297-40329d 870->875 871->872 872->860 884 4031ab-4031b4 872->884 873->874 874->860 882 4032e5 874->882 878 4032a1-4032af call 4032f2 875->878 879 40329f 875->879 878->860 887 4032b1-4032bd call 405e03 878->887 879->878 882->866 886 4031ba-4031da call 40679a 884->886 892 4031e0-4031f3 GetTickCount 886->892 893 403283-403285 886->893 894 403287-403289 887->894 895 4032bf-4032c9 887->895 896 4031f5-4031fd 892->896 897 40323e-403240 892->897 893->862 894->862 895->875 900 4032cb 895->900 901 403205-403236 MulDiv wsprintfW call 4052c3 896->901 902 4031ff-403203 896->902 898 403242-403246 897->898 899 403277-40327b 897->899 903 403248-40324f call 405e03 898->903 904 40325d-403268 898->904 899->867 905 403281 899->905 900->866 907 40323b 901->907 902->897 902->901 910 403254-403256 903->910 909 40326b-40326f 904->909 905->866 907->897 909->886 911 403275 909->911 910->894 912 403258-40325b 910->912 911->866 912->909
                    C-Code - Quality: 95%
                    			E004030FA(int _a4, intOrPtr _a8, intOrPtr _a12, int _a16, signed char _a19) {
                    				signed int _v8;
                    				int _v12;
                    				intOrPtr _v16;
                    				long _v20;
                    				intOrPtr _v24;
                    				short _v152;
                    				void* _t65;
                    				long _t70;
                    				intOrPtr _t74;
                    				long _t75;
                    				intOrPtr _t76;
                    				void* _t77;
                    				int _t87;
                    				intOrPtr _t91;
                    				intOrPtr _t94;
                    				long _t95;
                    				signed int _t96;
                    				int _t97;
                    				int _t98;
                    				intOrPtr _t99;
                    				void* _t100;
                    				void* _t101;
                    
                    				_t96 = _a16;
                    				_t91 = _a12;
                    				_v12 = _t96;
                    				if(_t91 == 0) {
                    					_v12 = 0x8000;
                    				}
                    				_v8 = _v8 & 0x00000000;
                    				_v16 = _t91;
                    				if(_t91 == 0) {
                    					_v16 = 0x78f6d8;
                    				}
                    				_t62 = _a4;
                    				if(_a4 >= 0) {
                    					E00403308( *0x7a8a98 + _t62);
                    				}
                    				if(E004032F2( &_a16, 4) == 0) {
                    					L41:
                    					_push(0xfffffffd);
                    					goto L42;
                    				} else {
                    					if((_a19 & 0x00000080) == 0) {
                    						if(_t91 != 0) {
                    							if(_a16 < _t96) {
                    								_t96 = _a16;
                    							}
                    							if(E004032F2(_t91, _t96) != 0) {
                    								_v8 = _t96;
                    								L44:
                    								return _v8;
                    							} else {
                    								goto L41;
                    							}
                    						}
                    						if(_a16 <= _t91) {
                    							goto L44;
                    						}
                    						_t87 = _v12;
                    						while(1) {
                    							_t97 = _a16;
                    							if(_a16 >= _t87) {
                    								_t97 = _t87;
                    							}
                    							if(E004032F2(0x78b6d8, _t97) == 0) {
                    								goto L41;
                    							}
                    							if(E00405E03(_a8, 0x78b6d8, _t97) == 0) {
                    								L28:
                    								_push(0xfffffffe);
                    								L42:
                    								_pop(_t65);
                    								return _t65;
                    							}
                    							_v8 = _v8 + _t97;
                    							_a16 = _a16 - _t97;
                    							if(_a16 > 0) {
                    								continue;
                    							}
                    							goto L44;
                    						}
                    						goto L41;
                    					}
                    					_t70 = GetTickCount();
                    					 *0x40ce38 =  *0x40ce38 & 0x00000000;
                    					_t14 =  &_a16;
                    					 *_t14 = _a16 & 0x7fffffff;
                    					_v20 = _t70;
                    					 *0x40ce20 = 0xb;
                    					_a4 = _a16;
                    					if( *_t14 <= 0) {
                    						goto L44;
                    					} else {
                    						goto L9;
                    					}
                    					while(1) {
                    						L9:
                    						_t98 = 0x4000;
                    						if(_a16 < 0x4000) {
                    							_t98 = _a16;
                    						}
                    						if(E004032F2(0x78b6d8, _t98) == 0) {
                    							goto L41;
                    						}
                    						_a16 = _a16 - _t98;
                    						 *0x40ce10 = 0x78b6d8;
                    						 *0x40ce14 = _t98;
                    						while(1) {
                    							_t94 = _v16;
                    							 *0x40ce18 = _t94;
                    							 *0x40ce1c = _v12;
                    							_t74 = E0040679A(0x40ce10);
                    							_v24 = _t74;
                    							if(_t74 < 0) {
                    								break;
                    							}
                    							_t99 =  *0x40ce18; // 0x7924d8
                    							_t100 = _t99 - _t94;
                    							_t75 = GetTickCount();
                    							_t95 = _t75;
                    							if(( *0x7a8af4 & 0x00000001) != 0 && (_t75 - _v20 > 0xc8 || _a16 == 0)) {
                    								wsprintfW( &_v152, L"... %d%%", MulDiv(_a4 - _a16, 0x64, _a4));
                    								_t101 = _t101 + 0xc;
                    								E004052C3(0,  &_v152); // executed
                    								_v20 = _t95;
                    							}
                    							if(_t100 == 0) {
                    								if(_a16 > 0) {
                    									goto L9;
                    								}
                    								goto L44;
                    							} else {
                    								if(_a12 != 0) {
                    									_t76 =  *0x40ce18; // 0x7924d8
                    									_v8 = _v8 + _t100;
                    									_v12 = _v12 - _t100;
                    									_v16 = _t76;
                    									L23:
                    									if(_v24 != 4) {
                    										continue;
                    									}
                    									goto L44;
                    								}
                    								_t77 = E00405E03(_a8, _v16, _t100); // executed
                    								if(_t77 == 0) {
                    									goto L28;
                    								}
                    								_v8 = _v8 + _t100;
                    								goto L23;
                    							}
                    						}
                    						_push(0xfffffffc);
                    						goto L42;
                    					}
                    					goto L41;
                    				}
                    			}

























                    0x00403105
                    0x00403109
                    0x0040310c
                    0x00403111
                    0x00403113
                    0x00403113
                    0x0040311a
                    0x0040311e
                    0x00403123
                    0x00403125
                    0x00403125
                    0x0040312c
                    0x00403131
                    0x0040313c
                    0x0040313c
                    0x0040314e
                    0x004032e0
                    0x004032e0
                    0x00000000
                    0x00403154
                    0x00403158
                    0x0040328d
                    0x004032d0
                    0x004032d2
                    0x004032d2
                    0x004032de
                    0x004032e5
                    0x004032e8
                    0x00000000
                    0x00000000
                    0x00000000
                    0x00000000
                    0x004032de
                    0x00403292
                    0x00000000
                    0x00000000
                    0x00403294
                    0x00403297
                    0x0040329a
                    0x0040329d
                    0x0040329f
                    0x0040329f
                    0x004032af
                    0x00000000
                    0x00000000
                    0x004032bd
                    0x00403287
                    0x00403287
                    0x004032e2
                    0x004032e2
                    0x00000000
                    0x004032e2
                    0x004032bf
                    0x004032c2
                    0x004032c9
                    0x00000000
                    0x00000000
                    0x00000000
                    0x004032cb
                    0x00000000
                    0x00403297
                    0x00403164
                    0x00403166
                    0x0040316d
                    0x0040316d
                    0x00403174
                    0x0040317a
                    0x00403181
                    0x00403184
                    0x00000000
                    0x00000000
                    0x00000000
                    0x00000000
                    0x0040318a
                    0x0040318a
                    0x0040318a
                    0x00403192
                    0x00403194
                    0x00403194
                    0x004031a5
                    0x00000000
                    0x00000000
                    0x004031ab
                    0x004031ae
                    0x004031b4
                    0x004031ba
                    0x004031ba
                    0x004031c5
                    0x004031cb
                    0x004031d0
                    0x004031d7
                    0x004031da
                    0x00000000
                    0x00000000
                    0x004031e0
                    0x004031e6
                    0x004031e8
                    0x004031f1
                    0x004031f3
                    0x00403224
                    0x0040322a
                    0x00403236
                    0x0040323b
                    0x0040323b
                    0x00403240
                    0x0040327b
                    0x00000000
                    0x00000000
                    0x00000000
                    0x00403242
                    0x00403246
                    0x0040325d
                    0x00403262
                    0x00403265
                    0x00403268
                    0x0040326b
                    0x0040326f
                    0x00000000
                    0x00000000
                    0x00000000
                    0x00403275
                    0x0040324f
                    0x00403256
                    0x00000000
                    0x00000000
                    0x00403258
                    0x00000000
                    0x00403258
                    0x00403240
                    0x00403283
                    0x00000000
                    0x00403283
                    0x00000000
                    0x0040318a

                    APIs
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.668679627.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000000.00000002.668672686.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.668695651.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.668709908.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.669360772.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.669367484.0000000000782000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.669373527.0000000000786000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.669383228.0000000000789000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.669410918.00000000007A4000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.669416138.00000000007A6000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.669434006.00000000007B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.669445400.00000000007C4000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.669547952.0000000000804000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_400000_Ordene 501527,pdf.jbxd
                    Similarity
                    • API ID: CountTick$wsprintf
                    • String ID: ... %d%%
                    • API String ID: 551687249-2449383134
                    • Opcode ID: 5d95faed883021d29135786fab1021639b0595a9b4acb09984627cea9783b19b
                    • Instruction ID: 4304c27296c3acdf0d2a87061290089073c1970791b1d07264e817265a7bbb17
                    • Opcode Fuzzy Hash: 5d95faed883021d29135786fab1021639b0595a9b4acb09984627cea9783b19b
                    • Instruction Fuzzy Hash: 3C516C31801219EBCB10DF65DA45A9F7BA8AF45766F1442BFE810B72C0C7788F51CBA9
                    Uniqueness

                    Uniqueness Score: -1.00%

                    Control-flow Graph

                    • Executed
                    • Not Executed
                    control_flow_graph 913 405792-4057dd CreateDirectoryW 914 4057e3-4057f0 GetLastError 913->914 915 4057df-4057e1 913->915 916 40580a-40580c 914->916 917 4057f2-405806 SetFileSecurityW 914->917 915->916 917->915 918 405808 GetLastError 917->918 918->916
                    C-Code - Quality: 100%
                    			E00405792(WCHAR* _a4) {
                    				struct _SECURITY_ATTRIBUTES _v16;
                    				struct _SECURITY_DESCRIPTOR _v36;
                    				int _t22;
                    				long _t23;
                    
                    				_v36.Sbz1 = _v36.Sbz1 & 0x00000000;
                    				_v36.Owner = 0x4083f0;
                    				_v36.Group = 0x4083f0;
                    				_v36.Sacl = _v36.Sacl & 0x00000000;
                    				_v16.bInheritHandle = _v16.bInheritHandle & 0x00000000;
                    				_v16.lpSecurityDescriptor =  &_v36;
                    				_v36.Revision = 1;
                    				_v36.Control = 4;
                    				_v36.Dacl = 0x4083e0;
                    				_v16.nLength = 0xc;
                    				_t22 = CreateDirectoryW(_a4,  &_v16); // executed
                    				if(_t22 != 0) {
                    					L1:
                    					return 0;
                    				}
                    				_t23 = GetLastError();
                    				if(_t23 == 0xb7) {
                    					if(SetFileSecurityW(_a4, 0x80000007,  &_v36) != 0) {
                    						goto L1;
                    					}
                    					return GetLastError();
                    				}
                    				return _t23;
                    			}







                    0x0040579d
                    0x004057a1
                    0x004057a4
                    0x004057aa
                    0x004057ae
                    0x004057b2
                    0x004057ba
                    0x004057c1
                    0x004057c7
                    0x004057ce
                    0x004057d5
                    0x004057dd
                    0x004057df
                    0x00000000
                    0x004057df
                    0x004057e9
                    0x004057f0
                    0x00405806
                    0x00000000
                    0x00000000
                    0x00000000
                    0x00405808
                    0x0040580c

                    APIs
                    • CreateDirectoryW.KERNELBASE(?,?,00000000), ref: 004057D5
                    • GetLastError.KERNEL32 ref: 004057E9
                    • SetFileSecurityW.ADVAPI32(?,80000007,00000001), ref: 004057FE
                    • GetLastError.KERNEL32 ref: 00405808
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.668679627.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000000.00000002.668672686.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.668695651.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.668709908.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.669360772.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.669367484.0000000000782000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.669373527.0000000000786000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.669383228.0000000000789000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.669410918.00000000007A4000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.669416138.00000000007A6000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.669434006.00000000007B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.669445400.00000000007C4000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.669547952.0000000000804000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_400000_Ordene 501527,pdf.jbxd
                    Similarity
                    • API ID: ErrorLast$CreateDirectoryFileSecurity
                    • String ID: C:\Users\user\Desktop
                    • API String ID: 3449924974-1246513382
                    • Opcode ID: c7775b55854fc79259119bfc4daa9494171cd7cf58f96f816c013ac7f64a11dc
                    • Instruction ID: 488e367ac99084f0472557c0a26963b348c4b9c4a011ef6404f7c6369f031e52
                    • Opcode Fuzzy Hash: c7775b55854fc79259119bfc4daa9494171cd7cf58f96f816c013ac7f64a11dc
                    • Instruction Fuzzy Hash: 03011A71C00619DADF009FA1C9447EFBBB4EF14354F00803AD945B6281D7789618CFE9
                    Uniqueness

                    Uniqueness Score: -1.00%

                    Control-flow Graph

                    • Executed
                    • Not Executed
                    control_flow_graph 919 405d80-405d8c 920 405d8d-405dc1 GetTickCount GetTempFileNameW 919->920 921 405dd0-405dd2 920->921 922 405dc3-405dc5 920->922 924 405dca-405dcd 921->924 922->920 923 405dc7 922->923 923->924
                    C-Code - Quality: 100%
                    			E00405D80(void* __ecx, WCHAR* _a4, WCHAR* _a8) {
                    				intOrPtr _v8;
                    				short _v12;
                    				short _t12;
                    				intOrPtr _t13;
                    				signed int _t14;
                    				WCHAR* _t17;
                    				signed int _t19;
                    				signed short _t23;
                    				WCHAR* _t26;
                    
                    				_t26 = _a4;
                    				_t23 = 0x64;
                    				while(1) {
                    					_t12 =  *L"nsa"; // 0x73006e
                    					_t23 = _t23 - 1;
                    					_v12 = _t12;
                    					_t13 =  *0x40a55c; // 0x61
                    					_v8 = _t13;
                    					_t14 = GetTickCount();
                    					_t19 = 0x1a;
                    					_v8 = _v8 + _t14 % _t19;
                    					_t17 = GetTempFileNameW(_a8,  &_v12, 0, _t26); // executed
                    					if(_t17 != 0) {
                    						break;
                    					}
                    					if(_t23 != 0) {
                    						continue;
                    					} else {
                    						 *_t26 =  *_t26 & _t23;
                    					}
                    					L4:
                    					return _t17;
                    				}
                    				_t17 = _t26;
                    				goto L4;
                    			}












                    0x00405d86
                    0x00405d8c
                    0x00405d8d
                    0x00405d8d
                    0x00405d92
                    0x00405d93
                    0x00405d96
                    0x00405d9b
                    0x00405d9e
                    0x00405da8
                    0x00405db5
                    0x00405db9
                    0x00405dc1
                    0x00000000
                    0x00000000
                    0x00405dc5
                    0x00000000
                    0x00405dc7
                    0x00405dc7
                    0x00405dc7
                    0x00405dca
                    0x00405dcd
                    0x00405dcd
                    0x00405dd0
                    0x00000000

                    APIs
                    • GetTickCount.KERNEL32 ref: 00405D9E
                    • GetTempFileNameW.KERNELBASE(?,?,00000000,?,?,?,"C:\Users\user\Desktop\Ordene 501527,pdf.exe" ,0040334E,1033,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,76DDFAA0,0040359C), ref: 00405DB9
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.668679627.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000000.00000002.668672686.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.668695651.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.668709908.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.669360772.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.669367484.0000000000782000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.669373527.0000000000786000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.669383228.0000000000789000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.669410918.00000000007A4000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.669416138.00000000007A6000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.669434006.00000000007B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.669445400.00000000007C4000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.669547952.0000000000804000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_400000_Ordene 501527,pdf.jbxd
                    Similarity
                    • API ID: CountFileNameTempTick
                    • String ID: "C:\Users\user\Desktop\Ordene 501527,pdf.exe" $C:\Users\user\AppData\Local\Temp\$nsa
                    • API String ID: 1716503409-3995566126
                    • Opcode ID: 579317ece081e1c49d3b274132234632dc0f80c8b4471fc5797a0d742f25062f
                    • Instruction ID: 49388a817ab8929663d32c184486222aab3b5007cea287540e7d96a1fedb5290
                    • Opcode Fuzzy Hash: 579317ece081e1c49d3b274132234632dc0f80c8b4471fc5797a0d742f25062f
                    • Instruction Fuzzy Hash: 56F01D76600304FBEB009F69DD09E9BBBA9EF95750F11807BE900A6290E6B099548B64
                    Uniqueness

                    Uniqueness Score: -1.00%

                    Control-flow Graph

                    • Executed
                    • Not Executed
                    control_flow_graph 925 10001759-10001795 call 10001b18 929 100018a6-100018a8 925->929 930 1000179b-1000179f 925->930 931 100017a1-100017a7 call 10002286 930->931 932 100017a8-100017b5 call 100022d0 930->932 931->932 937 100017e5-100017ec 932->937 938 100017b7-100017bc 932->938 939 1000180c-10001810 937->939 940 100017ee-1000180a call 100024a4 call 100015b4 call 10001272 GlobalFree 937->940 941 100017d7-100017da 938->941 942 100017be-100017bf 938->942 943 10001812-1000184c call 100015b4 call 100024a4 939->943 944 1000184e-10001854 call 100024a4 939->944 965 10001855-10001859 940->965 941->937 945 100017dc-100017dd call 10002b57 941->945 947 100017c1-100017c2 942->947 948 100017c7-100017c8 call 1000289c 942->948 943->965 944->965 958 100017e2 945->958 953 100017c4-100017c5 947->953 954 100017cf-100017d5 call 10002640 947->954 961 100017cd 948->961 953->937 953->948 964 100017e4 954->964 958->964 961->958 964->937 968 10001896-1000189d 965->968 969 1000185b-10001869 call 10002467 965->969 968->929 971 1000189f-100018a0 GlobalFree 968->971 975 10001881-10001888 969->975 976 1000186b-1000186e 969->976 971->929 975->968 977 1000188a-10001895 call 1000153d 975->977 976->975 978 10001870-10001878 976->978 977->968 978->975 980 1000187a-1000187b FreeLibrary 978->980 980->975
                    C-Code - Quality: 92%
                    			E10001759(void* __edx, void* __edi, void* __esi, intOrPtr _a8, intOrPtr _a12, intOrPtr _a16, intOrPtr _a20) {
                    				void _v36;
                    				struct HINSTANCE__* _t34;
                    				void* _t36;
                    				intOrPtr _t38;
                    				void* _t44;
                    				void* _t45;
                    				void* _t46;
                    				void* _t50;
                    				intOrPtr _t53;
                    				signed int _t57;
                    				signed int _t61;
                    				void* _t65;
                    				void* _t66;
                    				void* _t70;
                    				void* _t74;
                    
                    				_t74 = __esi;
                    				_t66 = __edi;
                    				_t65 = __edx;
                    				 *0x1000406c = _a8;
                    				 *0x10004070 = _a16;
                    				 *0x10004074 = _a12;
                    				 *((intOrPtr*)(_a20 + 0xc))( *0x10004048, E100015B1);
                    				_push(1); // executed
                    				_t34 = E10001B18(); // executed
                    				_t50 = _t34;
                    				if(_t50 == 0) {
                    					L28:
                    					return _t34;
                    				} else {
                    					if( *((intOrPtr*)(_t50 + 4)) != 1) {
                    						E10002286(_t50);
                    					}
                    					_push(_t50);
                    					E100022D0(_t65);
                    					_t53 =  *((intOrPtr*)(_t50 + 4));
                    					if(_t53 == 0xffffffff) {
                    						L14:
                    						if(( *(_t50 + 0x1010) & 0x00000004) == 0) {
                    							if( *((intOrPtr*)(_t50 + 4)) == 0) {
                    								_t34 = E100024A4(_t50);
                    							} else {
                    								_push(_t74);
                    								_push(_t66);
                    								_t12 = _t50 + 0x1018; // 0x1018
                    								_t57 = 8;
                    								memcpy( &_v36, _t12, _t57 << 2);
                    								_t38 = E100015B4(_t50);
                    								_t15 = _t50 + 0x1018; // 0x1018
                    								_t70 = _t15;
                    								 *((intOrPtr*)(_t50 + 0x1020)) = _t38;
                    								 *_t70 = 4;
                    								E100024A4(_t50);
                    								_t61 = 8;
                    								_t34 = memcpy(_t70,  &_v36, _t61 << 2);
                    							}
                    						} else {
                    							E100024A4(_t50);
                    							_t34 = GlobalFree(E10001272(E100015B4(_t50)));
                    						}
                    						if( *((intOrPtr*)(_t50 + 4)) != 1) {
                    							_t34 = E10002467(_t50);
                    							if(( *(_t50 + 0x1010) & 0x00000040) != 0 &&  *_t50 == 1) {
                    								_t34 =  *(_t50 + 0x1008);
                    								if(_t34 != 0) {
                    									_t34 = FreeLibrary(_t34);
                    								}
                    							}
                    							if(( *(_t50 + 0x1010) & 0x00000020) != 0) {
                    								_t34 = E1000153D( *0x10004068);
                    							}
                    						}
                    						if(( *(_t50 + 0x1010) & 0x00000002) != 0) {
                    							goto L28;
                    						} else {
                    							_t36 = GlobalFree(_t50); // executed
                    							return _t36;
                    						}
                    					}
                    					_t44 =  *_t50;
                    					if(_t44 == 0) {
                    						if(_t53 != 1) {
                    							goto L14;
                    						}
                    						E10002B57(_t50);
                    						L12:
                    						_t50 = _t44;
                    						L13:
                    						goto L14;
                    					}
                    					_t45 = _t44 - 1;
                    					if(_t45 == 0) {
                    						L8:
                    						_t44 = E1000289C(_t53, _t50); // executed
                    						goto L12;
                    					}
                    					_t46 = _t45 - 1;
                    					if(_t46 == 0) {
                    						E10002640(_t50);
                    						goto L13;
                    					}
                    					if(_t46 != 1) {
                    						goto L14;
                    					}
                    					goto L8;
                    				}
                    			}


















                    0x10001759
                    0x10001759
                    0x10001759
                    0x10001763
                    0x1000176b
                    0x10001778
                    0x10001786
                    0x10001789
                    0x1000178b
                    0x10001790
                    0x10001795
                    0x100018a8
                    0x100018a8
                    0x1000179b
                    0x1000179f
                    0x100017a2
                    0x100017a7
                    0x100017a8
                    0x100017a9
                    0x100017af
                    0x100017b5
                    0x100017e5
                    0x100017ec
                    0x10001810
                    0x1000184f
                    0x10001812
                    0x10001812
                    0x10001813
                    0x10001816
                    0x1000181c
                    0x10001820
                    0x10001823
                    0x10001828
                    0x10001828
                    0x1000182f
                    0x10001835
                    0x1000183b
                    0x10001847
                    0x10001848
                    0x1000184b
                    0x100017ee
                    0x100017ef
                    0x10001804
                    0x10001804
                    0x10001859
                    0x1000185c
                    0x10001869
                    0x10001870
                    0x10001878
                    0x1000187b
                    0x1000187b
                    0x10001878
                    0x10001888
                    0x10001890
                    0x10001895
                    0x10001888
                    0x1000189d
                    0x00000000
                    0x1000189f
                    0x100018a0
                    0x00000000
                    0x100018a0
                    0x1000189d
                    0x100017b9
                    0x100017bc
                    0x100017da
                    0x00000000
                    0x00000000
                    0x100017dd
                    0x100017e2
                    0x100017e2
                    0x100017e4
                    0x00000000
                    0x100017e4
                    0x100017be
                    0x100017bf
                    0x100017c7
                    0x100017c8
                    0x00000000
                    0x100017c8
                    0x100017c1
                    0x100017c2
                    0x100017d0
                    0x00000000
                    0x100017d0
                    0x100017c5
                    0x00000000
                    0x00000000
                    0x00000000
                    0x100017c5

                    APIs
                      • Part of subcall function 10001B18: GlobalFree.KERNEL32 ref: 10001D83
                      • Part of subcall function 10001B18: GlobalFree.KERNEL32 ref: 10001D88
                      • Part of subcall function 10001B18: GlobalFree.KERNEL32 ref: 10001D8D
                    • GlobalFree.KERNEL32 ref: 10001804
                    • FreeLibrary.KERNEL32(?), ref: 1000187B
                    • GlobalFree.KERNEL32 ref: 100018A0
                      • Part of subcall function 10002286: GlobalAlloc.KERNEL32(00000040,8BC3C95B), ref: 100022B8
                      • Part of subcall function 10002640: GlobalAlloc.KERNEL32(00000040,?,?,?,00000000,?,?,?,?,100017D5,00000000), ref: 100026B2
                      • Part of subcall function 100015B4: lstrcpyW.KERNEL32 ref: 100015CD
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.669799652.0000000010001000.00000020.00000001.01000000.00000007.sdmp, Offset: 10000000, based on PE: true
                    • Associated: 00000000.00000002.669792729.0000000010000000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000000.00000002.669803934.0000000010003000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000000.00000002.669815812.0000000010005000.00000002.00000001.01000000.00000007.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_10000000_Ordene 501527,pdf.jbxd
                    Similarity
                    • API ID: Global$Free$Alloc$Librarylstrcpy
                    • String ID:
                    • API String ID: 1791698881-3916222277
                    • Opcode ID: 80a71440bbdc6676df6433b68331a89e098fd0a61e7fd3645cfd834030fcbe9d
                    • Instruction ID: 65685ba44f5e0dd4e22f20931bb662b0f8110762eb821eef9687284fed8b6370
                    • Opcode Fuzzy Hash: 80a71440bbdc6676df6433b68331a89e098fd0a61e7fd3645cfd834030fcbe9d
                    • Instruction Fuzzy Hash: 4A31AC75804241AAFB14DF649CC9BDA37E8FF043D4F158065FA0AAA08FDFB4A984C761
                    Uniqueness

                    Uniqueness Score: -1.00%

                    C-Code - Quality: 86%
                    			E004015C1(short __ebx, void* __eflags) {
                    				void* _t17;
                    				int _t23;
                    				void* _t25;
                    				signed char _t26;
                    				short _t28;
                    				short _t31;
                    				short* _t34;
                    				void* _t36;
                    
                    				_t28 = __ebx;
                    				 *(_t36 + 8) = E00402C37(0xfffffff0);
                    				_t17 = E00405BDB(_t16);
                    				_t32 = _t17;
                    				if(_t17 != __ebx) {
                    					do {
                    						_t34 = E00405B5D(_t32, 0x5c);
                    						_t31 =  *_t34;
                    						 *_t34 = _t28;
                    						if(_t31 != _t28) {
                    							L5:
                    							_t25 = E0040580F( *(_t36 + 8));
                    						} else {
                    							_t42 =  *((intOrPtr*)(_t36 - 0x20)) - _t28;
                    							if( *((intOrPtr*)(_t36 - 0x20)) == _t28 || E0040582C(_t42) == 0) {
                    								goto L5;
                    							} else {
                    								_t25 = E00405792( *(_t36 + 8)); // executed
                    							}
                    						}
                    						if(_t25 != _t28) {
                    							if(_t25 != 0xb7) {
                    								L9:
                    								 *((intOrPtr*)(_t36 - 4)) =  *((intOrPtr*)(_t36 - 4)) + 1;
                    							} else {
                    								_t26 = GetFileAttributesW( *(_t36 + 8)); // executed
                    								if((_t26 & 0x00000010) == 0) {
                    									goto L9;
                    								}
                    							}
                    						}
                    						 *_t34 = _t31;
                    						_t32 = _t34 + 2;
                    					} while (_t31 != _t28);
                    				}
                    				if( *((intOrPtr*)(_t36 - 0x24)) == _t28) {
                    					_push(0xfffffff5);
                    					E00401423();
                    				} else {
                    					E00401423(0xffffffe6);
                    					E0040625F(L"C:\\Users\\alfons\\AppData\\Roaming\\Microsoft\\Windows\\Start Menu\\Misundes\\Caesural4\\Kvalitative209",  *(_t36 + 8));
                    					_t23 = SetCurrentDirectoryW( *(_t36 + 8)); // executed
                    					if(_t23 == 0) {
                    						 *((intOrPtr*)(_t36 - 4)) =  *((intOrPtr*)(_t36 - 4)) + 1;
                    					}
                    				}
                    				 *0x7a8ac8 =  *0x7a8ac8 +  *((intOrPtr*)(_t36 - 4));
                    				return 0;
                    			}











                    0x004015c1
                    0x004015c9
                    0x004015cc
                    0x004015d1
                    0x004015d5
                    0x004015d7
                    0x004015df
                    0x004015e1
                    0x004015e4
                    0x004015ea
                    0x00401604
                    0x00401607
                    0x004015ec
                    0x004015ec
                    0x004015ef
                    0x00000000
                    0x004015fa
                    0x004015fd
                    0x004015fd
                    0x004015ef
                    0x0040160e
                    0x00401615
                    0x00401624
                    0x00401624
                    0x00401617
                    0x0040161a
                    0x00401622
                    0x00000000
                    0x00000000
                    0x00401622
                    0x00401615
                    0x00401627
                    0x0040162b
                    0x0040162c
                    0x004015d7
                    0x00401634
                    0x00401663
                    0x00402245
                    0x00401636
                    0x00401638
                    0x00401645
                    0x0040164d
                    0x00401655
                    0x0040165b
                    0x0040165b
                    0x00401655
                    0x00402ac2
                    0x00402ace

                    APIs
                      • Part of subcall function 00405BDB: CharNextW.USER32(?,?,C:\Users\user\AppData\Local\Temp\nshB62A.tmp,?,00405C4F,C:\Users\user\AppData\Local\Temp\nshB62A.tmp,C:\Users\user\AppData\Local\Temp\nshB62A.tmp,?,?,76DDFAA0,0040598D,?,C:\Users\user\AppData\Local\Temp\,76DDFAA0,00000000), ref: 00405BE9
                      • Part of subcall function 00405BDB: CharNextW.USER32(00000000), ref: 00405BEE
                      • Part of subcall function 00405BDB: CharNextW.USER32(00000000), ref: 00405C06
                    • GetFileAttributesW.KERNELBASE(?,?,00000000,0000005C,00000000,000000F0), ref: 0040161A
                      • Part of subcall function 00405792: CreateDirectoryW.KERNELBASE(?,?,00000000), ref: 004057D5
                    • SetCurrentDirectoryW.KERNELBASE(?,C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Misundes\Caesural4\Kvalitative209,?,00000000,000000F0), ref: 0040164D
                    Strings
                    • C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Misundes\Caesural4\Kvalitative209, xrefs: 00401640
                    Memory Dump Source
                    • Source File: 00000000.00000002.668679627.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000000.00000002.668672686.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.668695651.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.668709908.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.669360772.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.669367484.0000000000782000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.669373527.0000000000786000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.669383228.0000000000789000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.669410918.00000000007A4000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.669416138.00000000007A6000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.669434006.00000000007B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.669445400.00000000007C4000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.669547952.0000000000804000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_400000_Ordene 501527,pdf.jbxd
                    Similarity
                    • API ID: CharNext$Directory$AttributesCreateCurrentFile
                    • String ID: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Misundes\Caesural4\Kvalitative209
                    • API String ID: 1892508949-301568489
                    • Opcode ID: 7d4554b979ffd765b2e8b5bfa394c7866456bd1af6c8b75b7db1e6138cb2a8eb
                    • Instruction ID: a664f1efeb726e69a6ab8af553608a028f51c0b4cf1c5e7724f5d8b0eae84205
                    • Opcode Fuzzy Hash: 7d4554b979ffd765b2e8b5bfa394c7866456bd1af6c8b75b7db1e6138cb2a8eb
                    • Instruction Fuzzy Hash: 9311BE31504504EBCF317FA0CD4159F36A0EF15368B28493BEA45B22F2DB3E4D519A5E
                    Uniqueness

                    Uniqueness Score: -1.00%

                    C-Code - Quality: 60%
                    			E0040202C(void* __ebx, void* __eflags) {
                    				struct HINSTANCE__* _t23;
                    				struct HINSTANCE__* _t31;
                    				void* _t32;
                    				void* _t34;
                    				WCHAR* _t37;
                    				intOrPtr* _t38;
                    				void* _t39;
                    
                    				_t32 = __ebx;
                    				asm("sbb eax, 0x7a8af8");
                    				 *(_t39 - 4) = 1;
                    				if(__eflags < 0) {
                    					_push(0xffffffe7);
                    					L15:
                    					E00401423();
                    					L16:
                    					 *0x7a8ac8 =  *0x7a8ac8 +  *(_t39 - 4);
                    					return 0;
                    				}
                    				_t37 = E00402C37(0xfffffff0);
                    				 *((intOrPtr*)(_t39 - 0x3c)) = E00402C37(1);
                    				if( *((intOrPtr*)(_t39 - 0x18)) == __ebx) {
                    					L3:
                    					_t23 = LoadLibraryExW(_t37, _t32, 8); // executed
                    					 *(_t39 + 8) = _t23;
                    					if(_t23 == _t32) {
                    						_push(0xfffffff6);
                    						goto L15;
                    					}
                    					L4:
                    					_t38 = E004066A8( *(_t39 + 8),  *((intOrPtr*)(_t39 - 0x3c)));
                    					if(_t38 == _t32) {
                    						E004052C3(0xfffffff7,  *((intOrPtr*)(_t39 - 0x3c)));
                    					} else {
                    						 *(_t39 - 4) = _t32;
                    						if( *((intOrPtr*)(_t39 - 0x20)) == _t32) {
                    							 *_t38( *((intOrPtr*)(_t39 - 8)), 0x400, _t34, 0x40cdac, 0x40a000); // executed
                    						} else {
                    							E00401423( *((intOrPtr*)(_t39 - 0x20)));
                    							if( *_t38() != 0) {
                    								 *(_t39 - 4) = 1;
                    							}
                    						}
                    					}
                    					if( *((intOrPtr*)(_t39 - 0x1c)) == _t32 && E0040390D( *(_t39 + 8)) != 0) {
                    						FreeLibrary( *(_t39 + 8));
                    					}
                    					goto L16;
                    				}
                    				_t31 = GetModuleHandleW(_t37); // executed
                    				 *(_t39 + 8) = _t31;
                    				if(_t31 != __ebx) {
                    					goto L4;
                    				}
                    				goto L3;
                    			}










                    0x0040202c
                    0x0040202c
                    0x00402031
                    0x00402038
                    0x004020f7
                    0x00402245
                    0x00402245
                    0x00402abf
                    0x00402ac2
                    0x00402ace
                    0x00402ace
                    0x00402047
                    0x00402051
                    0x00402054
                    0x00402064
                    0x00402068
                    0x00402070
                    0x00402073
                    0x004020f0
                    0x00000000
                    0x004020f0
                    0x00402075
                    0x00402080
                    0x00402084
                    0x004020c4
                    0x00402086
                    0x00402089
                    0x0040208c
                    0x004020b8
                    0x0040208e
                    0x00402091
                    0x0040209a
                    0x0040209c
                    0x0040209c
                    0x0040209a
                    0x0040208c
                    0x004020cc
                    0x004020e5
                    0x004020e5
                    0x00000000
                    0x004020cc
                    0x00402057
                    0x0040205f
                    0x00402062
                    0x00000000
                    0x00000000
                    0x00000000

                    APIs
                    • GetModuleHandleW.KERNELBASE(00000000,00000001,000000F0), ref: 00402057
                      • Part of subcall function 004052C3: lstrlenW.KERNEL32(007A0F00,00000000,007924D8,76DDEA30,?,?,?,?,?,?,?,?,?,0040323B,00000000,?), ref: 004052FB
                      • Part of subcall function 004052C3: lstrlenW.KERNEL32(0040323B,007A0F00,00000000,007924D8,76DDEA30,?,?,?,?,?,?,?,?,?,0040323B,00000000), ref: 0040530B
                      • Part of subcall function 004052C3: lstrcatW.KERNEL32(007A0F00,0040323B), ref: 0040531E
                      • Part of subcall function 004052C3: SetWindowTextW.USER32(007A0F00,007A0F00), ref: 00405330
                      • Part of subcall function 004052C3: SendMessageW.USER32(?,00001004,00000000,00000000), ref: 00405356
                      • Part of subcall function 004052C3: SendMessageW.USER32(?,0000104D,00000000,00000001), ref: 00405370
                      • Part of subcall function 004052C3: SendMessageW.USER32(?,00001013,?,00000000), ref: 0040537E
                    • LoadLibraryExW.KERNELBASE(00000000,?,00000008,00000001,000000F0), ref: 00402068
                    • FreeLibrary.KERNEL32(?,?,000000F7,?,?,00000008,00000001,000000F0), ref: 004020E5
                    Memory Dump Source
                    • Source File: 00000000.00000002.668679627.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000000.00000002.668672686.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.668695651.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.668709908.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.669360772.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.669367484.0000000000782000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.669373527.0000000000786000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.669383228.0000000000789000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.669410918.00000000007A4000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.669416138.00000000007A6000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.669434006.00000000007B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.669445400.00000000007C4000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.669547952.0000000000804000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_400000_Ordene 501527,pdf.jbxd
                    Similarity
                    • API ID: MessageSend$Librarylstrlen$FreeHandleLoadModuleTextWindowlstrcat
                    • String ID:
                    • API String ID: 334405425-0
                    • Opcode ID: b22375b706d82d5995265669168614387d240c458e2bab379ea584522fd16410
                    • Instruction ID: 33d9dd4ae41202a81bff1c9b27653e69474f3e4813fbbe5d8a50aab7b73a9ae0
                    • Opcode Fuzzy Hash: b22375b706d82d5995265669168614387d240c458e2bab379ea584522fd16410
                    • Instruction Fuzzy Hash: 1E21B371900208AACF20AFA5CE4CA9E7970AF05354F64813BF511B11E1DBBD4951DA5E
                    Uniqueness

                    Uniqueness Score: -1.00%

                    C-Code - Quality: 16%
                    			E1000289C(void* __ecx, intOrPtr _a4) {
                    				signed int _v8;
                    				void* _t31;
                    				void* _t32;
                    				int _t36;
                    				void* _t40;
                    				void* _t49;
                    				void* _t54;
                    				void* _t58;
                    				signed int _t65;
                    				void* _t70;
                    				void* _t79;
                    				intOrPtr _t81;
                    				signed int _t88;
                    				intOrPtr _t90;
                    				intOrPtr _t91;
                    				void* _t92;
                    				void* _t94;
                    				void* _t100;
                    				void* _t101;
                    				void* _t102;
                    				void* _t103;
                    				intOrPtr _t106;
                    				intOrPtr _t107;
                    
                    				if( *0x10004050 != 0 && E1000281E(_a4) == 0) {
                    					 *0x10004054 = _t106;
                    					if( *0x1000404c != 0) {
                    						_t106 =  *0x1000404c;
                    					} else {
                    						E10002DE0(E10002818(), __ecx);
                    						 *0x1000404c = _t106;
                    					}
                    				}
                    				_t31 = E1000285A(_a4);
                    				_t107 = _t106 + 4;
                    				if(_t31 <= 0) {
                    					L9:
                    					_t32 = E1000284E();
                    					_t81 = _a4;
                    					_t90 =  *0x10004058;
                    					 *((intOrPtr*)(_t32 + _t81)) = _t90;
                    					 *0x10004058 = _t81;
                    					E10002848();
                    					_t36 = ReadFile(??, ??, ??, ??, ??); // executed
                    					 *0x10004034 = _t36;
                    					 *0x10004038 = _t90;
                    					if( *0x10004050 != 0 && E1000281E( *0x10004058) == 0) {
                    						 *0x1000404c = _t107;
                    						_t107 =  *0x10004054;
                    					}
                    					_t91 =  *0x10004058;
                    					_a4 = _t91;
                    					 *0x10004058 =  *((intOrPtr*)(E1000284E() + _t91));
                    					_t40 = E1000282C(_t91);
                    					_pop(_t92);
                    					if(_t40 != 0) {
                    						_t49 = E1000285A(_t92);
                    						if(_t49 > 0) {
                    							_push(_t49);
                    							_push(E10002865() + _a4 + _v8);
                    							_push(E1000286F());
                    							if( *0x10004050 <= 0 || E1000281E(_a4) != 0) {
                    								_pop(_t101);
                    								_pop(_t54);
                    								if( *((intOrPtr*)(_t101 + _t54)) == 2) {
                    								}
                    								asm("loop 0xfffffff5");
                    							} else {
                    								_pop(_t102);
                    								_pop(_t58);
                    								 *0x1000404c =  *0x1000404c +  *(_t102 + _t58) * 4;
                    								asm("loop 0xffffffeb");
                    							}
                    						}
                    					}
                    					if( *0x10004058 == 0) {
                    						 *0x1000404c = 0;
                    					}
                    					_t94 = _a4 + E10002865();
                    					 *(E10002873() + _t94) =  *0x10004034;
                    					 *((intOrPtr*)(E10002877() + _t94)) =  *0x10004038;
                    					E10002887(_a4);
                    					if(E1000283A() != 0) {
                    						 *0x10004068 = GetLastError();
                    					}
                    					return _a4;
                    				}
                    				_push(E10002865() + _a4);
                    				_t65 = E1000286B();
                    				_v8 = _t65;
                    				_t88 = _t31;
                    				_push(_t77 + _t65 * _t88);
                    				_t79 = E10002877();
                    				_t100 = E10002873();
                    				_t103 = E1000286F();
                    				_t70 = _t88;
                    				if( *((intOrPtr*)(_t103 + _t70)) == 2) {
                    					_push( *((intOrPtr*)(_t79 + _t70)));
                    				}
                    				_push( *((intOrPtr*)(_t100 + _t70)));
                    				asm("loop 0xfffffff1");
                    				goto L9;
                    			}


























                    0x100028ac
                    0x100028bd
                    0x100028ca
                    0x100028de
                    0x100028cc
                    0x100028d1
                    0x100028d6
                    0x100028d6
                    0x100028ca
                    0x100028e7
                    0x100028ec
                    0x100028f2
                    0x10002936
                    0x10002936
                    0x1000293b
                    0x10002940
                    0x10002946
                    0x10002948
                    0x1000294e
                    0x1000295b
                    0x1000295d
                    0x10002962
                    0x1000296f
                    0x10002982
                    0x10002988
                    0x1000298e
                    0x1000298f
                    0x10002995
                    0x100029a1
                    0x100029a7
                    0x100029af
                    0x100029b0
                    0x100029b3
                    0x100029be
                    0x100029c0
                    0x100029cc
                    0x100029d2
                    0x100029da
                    0x10002a06
                    0x10002a07
                    0x10002a0d
                    0x10002a0d
                    0x10002a14
                    0x100029ea
                    0x100029ea
                    0x100029eb
                    0x100029f9
                    0x10002a02
                    0x10002a02
                    0x100029da
                    0x100029be
                    0x10002a1d
                    0x10002a1f
                    0x10002a1f
                    0x10002a31
                    0x10002a3e
                    0x10002a4c
                    0x10002a52
                    0x10002a60
                    0x10002a68
                    0x10002a68
                    0x10002a76
                    0x10002a76
                    0x100028fd
                    0x100028fe
                    0x10002903
                    0x10002907
                    0x1000290c
                    0x10002920
                    0x10002921
                    0x10002922
                    0x10002924
                    0x10002929
                    0x1000292b
                    0x1000292b
                    0x1000292e
                    0x10002934
                    0x00000000

                    APIs
                    Memory Dump Source
                    • Source File: 00000000.00000002.669799652.0000000010001000.00000020.00000001.01000000.00000007.sdmp, Offset: 10000000, based on PE: true
                    • Associated: 00000000.00000002.669792729.0000000010000000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000000.00000002.669803934.0000000010003000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000000.00000002.669815812.0000000010005000.00000002.00000001.01000000.00000007.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_10000000_Ordene 501527,pdf.jbxd
                    Similarity
                    • API ID: ErrorFileLastRead
                    • String ID:
                    • API String ID: 1948546556-0
                    • Opcode ID: 34874d5dbfeecf70d049f007544d8fe97316615c6b6b2225bbceacac8e3d04ae
                    • Instruction ID: 6dfa44c8e371a7ac1a486a55eff0af4ad814c9ea0d06d7514663fdd8c294557a
                    • Opcode Fuzzy Hash: 34874d5dbfeecf70d049f007544d8fe97316615c6b6b2225bbceacac8e3d04ae
                    • Instruction Fuzzy Hash: 4E51B4B9905211DFFB20DFA4DCC675937A8EB443D4F22C42AEA04E726DCE34A990CB55
                    Uniqueness

                    Uniqueness Score: -1.00%

                    C-Code - Quality: 69%
                    			E00401389(signed int _a4) {
                    				intOrPtr* _t6;
                    				void* _t8;
                    				void* _t10;
                    				signed int _t11;
                    				void* _t12;
                    				signed int _t16;
                    				signed int _t17;
                    				void* _t18;
                    
                    				_t17 = _a4;
                    				while(_t17 >= 0) {
                    					_t6 = _t17 * 0x1c +  *0x7a8a70;
                    					if( *_t6 == 1) {
                    						break;
                    					}
                    					_push(_t6); // executed
                    					_t8 = E00401434(); // executed
                    					if(_t8 == 0x7fffffff) {
                    						return 0x7fffffff;
                    					}
                    					_t10 = E0040136D(_t8);
                    					if(_t10 != 0) {
                    						_t11 = _t10 - 1;
                    						_t16 = _t17;
                    						_t17 = _t11;
                    						_t12 = _t11 - _t16;
                    					} else {
                    						_t12 = _t10 + 1;
                    						_t17 = _t17 + 1;
                    					}
                    					if( *((intOrPtr*)(_t18 + 0xc)) != 0) {
                    						 *0x7a7a0c =  *0x7a7a0c + _t12;
                    						SendMessageW( *(_t18 + 0x18), 0x402, MulDiv( *0x7a7a0c, 0x7530,  *0x7a79f4), 0); // executed
                    					}
                    				}
                    				return 0;
                    			}











                    0x0040138a
                    0x004013fa
                    0x0040139b
                    0x004013a0
                    0x00000000
                    0x00000000
                    0x004013a2
                    0x004013a3
                    0x004013ad
                    0x00000000
                    0x00401404
                    0x004013b0
                    0x004013b7
                    0x004013bd
                    0x004013be
                    0x004013c0
                    0x004013c2
                    0x004013b9
                    0x004013b9
                    0x004013ba
                    0x004013ba
                    0x004013c9
                    0x004013cb
                    0x004013f4
                    0x004013f4
                    0x004013c9
                    0x00000000

                    APIs
                    • MulDiv.KERNEL32(00007530,00000000,00000000), ref: 004013E4
                    • SendMessageW.USER32(00000402,00000402,00000000), ref: 004013F4
                    Memory Dump Source
                    • Source File: 00000000.00000002.668679627.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000000.00000002.668672686.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.668695651.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.668709908.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.669360772.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.669367484.0000000000782000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.669373527.0000000000786000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.669383228.0000000000789000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.669410918.00000000007A4000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.669416138.00000000007A6000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.669434006.00000000007B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.669445400.00000000007C4000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.669547952.0000000000804000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_400000_Ordene 501527,pdf.jbxd
                    Similarity
                    • API ID: MessageSend
                    • String ID:
                    • API String ID: 3850602802-0
                    • Opcode ID: 1be36e7ffb4e60f8615e9040eadbbc0b6b8dcead5e0d66e97d35916fbcf3aab6
                    • Instruction ID: 2a828f8333626ea4f8ae47897e76cf54d119540c9549312051f7543085d76b41
                    • Opcode Fuzzy Hash: 1be36e7ffb4e60f8615e9040eadbbc0b6b8dcead5e0d66e97d35916fbcf3aab6
                    • Instruction Fuzzy Hash: 9101D132624210ABE7095B789D04B6A3698E751315F10C63BB851F66F1DA7C8C429B4D
                    Uniqueness

                    Uniqueness Score: -1.00%

                    C-Code - Quality: 50%
                    			E00405396(signed int __eax) {
                    				intOrPtr _v0;
                    				intOrPtr _t10;
                    				intOrPtr _t11;
                    				intOrPtr* _t12;
                    
                    				_t11 =  *0x7a8a68;
                    				_t10 =  *0x7a8a6c;
                    				__imp__OleInitialize(0); // executed
                    				 *0x7a8af8 =  *0x7a8af8 | __eax;
                    				E00404240(0);
                    				if(_t10 != 0) {
                    					_t12 = _t11 + 0xc;
                    					while(1) {
                    						_t10 = _t10 - 1;
                    						if(( *(_t12 - 4) & 0x00000001) != 0 && E00401389( *_t12, _v0) != 0) {
                    							break;
                    						}
                    						_t12 = _t12 + 0x818;
                    						if(_t10 != 0) {
                    							continue;
                    						} else {
                    						}
                    						goto L7;
                    					}
                    					 *0x7a8acc =  *0x7a8acc + 1;
                    				}
                    				L7:
                    				E00404240(0x404);
                    				__imp__OleUninitialize();
                    				return  *0x7a8acc;
                    			}







                    0x00405397
                    0x0040539e
                    0x004053a6
                    0x004053ac
                    0x004053b4
                    0x004053bb
                    0x004053bd
                    0x004053c0
                    0x004053c0
                    0x004053c5
                    0x00000000
                    0x00000000
                    0x004053d6
                    0x004053de
                    0x00000000
                    0x00000000
                    0x004053e0
                    0x00000000
                    0x004053de
                    0x004053e2
                    0x004053e2
                    0x004053e8
                    0x004053ed
                    0x004053f2
                    0x004053ff

                    APIs
                    • OleInitialize.OLE32(00000000), ref: 004053A6
                      • Part of subcall function 00404240: SendMessageW.USER32(?,00000000,00000000,00000000), ref: 00404252
                    • OleUninitialize.OLE32(00000404,00000000), ref: 004053F2
                    Memory Dump Source
                    • Source File: 00000000.00000002.668679627.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000000.00000002.668672686.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.668695651.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.668709908.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.669360772.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.669367484.0000000000782000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.669373527.0000000000786000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.669383228.0000000000789000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.669410918.00000000007A4000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.669416138.00000000007A6000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.669434006.00000000007B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.669445400.00000000007C4000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.669547952.0000000000804000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_400000_Ordene 501527,pdf.jbxd
                    Similarity
                    • API ID: InitializeMessageSendUninitialize
                    • String ID:
                    • API String ID: 2896919175-0
                    • Opcode ID: eb004f3e04176b30b1f6360ce73cefd8828b3f4ed4c91d6893fd451d60ffce12
                    • Instruction ID: c3261378fe92050371c3dbae818411ed5f88961a95d29e8fb701918c5022a603
                    • Opcode Fuzzy Hash: eb004f3e04176b30b1f6360ce73cefd8828b3f4ed4c91d6893fd451d60ffce12
                    • Instruction Fuzzy Hash: 46F090B39006008BD3415B54AD02B17B7A4EBD1384F15C03FEF84A22E0DBB948418B5E
                    Uniqueness

                    Uniqueness Score: -1.00%

                    APIs
                    • ShowWindow.USER32(00000000,00000000), ref: 00401E61
                    • EnableWindow.USER32(00000000,00000000), ref: 00401E6C
                    Memory Dump Source
                    • Source File: 00000000.00000002.668679627.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000000.00000002.668672686.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.668695651.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.668709908.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.669360772.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.669367484.0000000000782000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.669373527.0000000000786000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.669383228.0000000000789000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.669410918.00000000007A4000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.669416138.00000000007A6000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.669434006.00000000007B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.669445400.00000000007C4000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.669547952.0000000000804000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_400000_Ordene 501527,pdf.jbxd
                    Similarity
                    • API ID: Window$EnableShow
                    • String ID:
                    • API String ID: 1136574915-0
                    • Opcode ID: 4e9a0fa256caef5faa048a361c79beed22e28114dd25cd2078b9e89ede71755a
                    • Instruction ID: 8bed64cdced8f5e888a37b1465862a95800e92f45c41cc099ab710eb89ed01f5
                    • Opcode Fuzzy Hash: 4e9a0fa256caef5faa048a361c79beed22e28114dd25cd2078b9e89ede71755a
                    • Instruction Fuzzy Hash: ABE09272E082008FD7549BA5AA4946D77B0EB84354720803FE112F11C1DA7848418F59
                    Uniqueness

                    Uniqueness Score: -1.00%

                    C-Code - Quality: 100%
                    			E00406639(signed int _a4) {
                    				struct HINSTANCE__* _t5;
                    				signed int _t10;
                    
                    				_t10 = _a4 << 3;
                    				_t8 =  *(_t10 + 0x40a3e0);
                    				_t5 = GetModuleHandleA( *(_t10 + 0x40a3e0));
                    				if(_t5 != 0) {
                    					L2:
                    					return GetProcAddress(_t5,  *(_t10 + 0x40a3e4));
                    				}
                    				_t5 = E004065C9(_t8); // executed
                    				if(_t5 == 0) {
                    					return 0;
                    				}
                    				goto L2;
                    			}





                    0x00406641
                    0x00406644
                    0x0040664b
                    0x00406653
                    0x0040665f
                    0x00000000
                    0x00406666
                    0x00406656
                    0x0040665d
                    0x00000000
                    0x0040666e
                    0x00000000

                    APIs
                    • GetModuleHandleA.KERNEL32(?,00000020,?,004033C2,0000000A), ref: 0040664B
                    • GetProcAddress.KERNEL32(00000000,?), ref: 00406666
                      • Part of subcall function 004065C9: GetSystemDirectoryW.KERNEL32(?,00000104), ref: 004065E0
                      • Part of subcall function 004065C9: wsprintfW.USER32 ref: 0040661B
                      • Part of subcall function 004065C9: LoadLibraryExW.KERNELBASE(?,00000000,00000008), ref: 0040662F
                    Memory Dump Source
                    • Source File: 00000000.00000002.668679627.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000000.00000002.668672686.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.668695651.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.668709908.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.669360772.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.669367484.0000000000782000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.669373527.0000000000786000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.669383228.0000000000789000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.669410918.00000000007A4000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.669416138.00000000007A6000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.669434006.00000000007B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.669445400.00000000007C4000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.669547952.0000000000804000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_400000_Ordene 501527,pdf.jbxd
                    Similarity
                    • API ID: AddressDirectoryHandleLibraryLoadModuleProcSystemwsprintf
                    • String ID:
                    • API String ID: 2547128583-0
                    • Opcode ID: 67dc6ca41c2bc7bd5b2f809cbb82f8f2c1b847e00e9086bd1828883d4f03c685
                    • Instruction ID: 7f6190fd0785004a6ee8fc72a27bac991e5bdadb2fb285410322192917ba6648
                    • Opcode Fuzzy Hash: 67dc6ca41c2bc7bd5b2f809cbb82f8f2c1b847e00e9086bd1828883d4f03c685
                    • Instruction Fuzzy Hash: AFE02C322042016AC2009A30AE40C3B33A89A88310303883FFA02F2081EB398C31AAAD
                    Uniqueness

                    Uniqueness Score: -1.00%

                    C-Code - Quality: 68%
                    			E00405D51(WCHAR* _a4, long _a8, long _a12) {
                    				signed int _t5;
                    				void* _t6;
                    
                    				_t5 = GetFileAttributesW(_a4); // executed
                    				asm("sbb ecx, ecx");
                    				_t6 = CreateFileW(_a4, _a8, 1, 0, _a12,  ~(_t5 + 1) & _t5, 0); // executed
                    				return _t6;
                    			}





                    0x00405d55
                    0x00405d62
                    0x00405d77
                    0x00405d7d

                    APIs
                    • GetFileAttributesW.KERNELBASE(?,00402F01,C:\Users\user\Desktop\Ordene 501527,pdf.exe,80000000,00000003,?,00000006,00000008,0000000A), ref: 00405D55
                    • CreateFileW.KERNELBASE(?,?,00000001,00000000,?,00000001,00000000,?,00000006,00000008,0000000A), ref: 00405D77
                    Memory Dump Source
                    • Source File: 00000000.00000002.668679627.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000000.00000002.668672686.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.668695651.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.668709908.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.669360772.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.669367484.0000000000782000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.669373527.0000000000786000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.669383228.0000000000789000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.669410918.00000000007A4000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.669416138.00000000007A6000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.669434006.00000000007B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.669445400.00000000007C4000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.669547952.0000000000804000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_400000_Ordene 501527,pdf.jbxd
                    Similarity
                    • API ID: File$AttributesCreate
                    • String ID:
                    • API String ID: 415043291-0
                    • Opcode ID: e3266cf20b616526e148e4639a7b0fb2c73eec3b674a7d239963b130731368bc
                    • Instruction ID: 684cdbd871a87963be1dc25f749e3f1c2e3aca1a790447dc63e6e481d8426dbe
                    • Opcode Fuzzy Hash: e3266cf20b616526e148e4639a7b0fb2c73eec3b674a7d239963b130731368bc
                    • Instruction Fuzzy Hash: 5DD09E31254301AFEF098F20DE16F2EBBA2EB84B05F11552CB786940E0DA7158199B15
                    Uniqueness

                    Uniqueness Score: -1.00%

                    C-Code - Quality: 100%
                    			E00405D2C(WCHAR* _a4) {
                    				signed char _t3;
                    				signed char _t7;
                    
                    				_t3 = GetFileAttributesW(_a4); // executed
                    				_t7 = _t3;
                    				if(_t7 != 0xffffffff) {
                    					SetFileAttributesW(_a4, _t3 & 0x000000fe);
                    				}
                    				return _t7;
                    			}





                    0x00405d31
                    0x00405d37
                    0x00405d3c
                    0x00405d45
                    0x00405d45
                    0x00405d4e

                    APIs
                    • GetFileAttributesW.KERNELBASE(?,?,00405931,?,?,00000000,00405B07,?,?,?,?), ref: 00405D31
                    • SetFileAttributesW.KERNEL32(?,00000000), ref: 00405D45
                    Memory Dump Source
                    • Source File: 00000000.00000002.668679627.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000000.00000002.668672686.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.668695651.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.668709908.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.669360772.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.669367484.0000000000782000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.669373527.0000000000786000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.669383228.0000000000789000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.669410918.00000000007A4000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.669416138.00000000007A6000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.669434006.00000000007B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.669445400.00000000007C4000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.669547952.0000000000804000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_400000_Ordene 501527,pdf.jbxd
                    Similarity
                    • API ID: AttributesFile
                    • String ID:
                    • API String ID: 3188754299-0
                    • Opcode ID: abb1859115452ae29e15aed1e23886b2a100c548e8c413493f0cbd9ae974b18a
                    • Instruction ID: 706934cb3b0fb70b74806e5ec6ddb1c8dfd6769152cd575e6ec3c276ff28a2a3
                    • Opcode Fuzzy Hash: abb1859115452ae29e15aed1e23886b2a100c548e8c413493f0cbd9ae974b18a
                    • Instruction Fuzzy Hash: 85D01272504420AFD6512738EF0C89BBF95DB543717028B36FAE9A22F0CB304C568A98
                    Uniqueness

                    Uniqueness Score: -1.00%

                    C-Code - Quality: 100%
                    			E0040580F(WCHAR* _a4) {
                    				int _t2;
                    
                    				_t2 = CreateDirectoryW(_a4, 0); // executed
                    				if(_t2 == 0) {
                    					return GetLastError();
                    				}
                    				return 0;
                    			}




                    0x00405815
                    0x0040581d
                    0x00000000
                    0x00405823
                    0x00000000

                    APIs
                    • CreateDirectoryW.KERNELBASE(?,00000000,00403343,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,76DDFAA0,0040359C,?,00000006,00000008,0000000A), ref: 00405815
                    • GetLastError.KERNEL32(?,00000006,00000008,0000000A), ref: 00405823
                    Memory Dump Source
                    • Source File: 00000000.00000002.668679627.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000000.00000002.668672686.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.668695651.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.668709908.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.669360772.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.669367484.0000000000782000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.669373527.0000000000786000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.669383228.0000000000789000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.669410918.00000000007A4000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.669416138.00000000007A6000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.669434006.00000000007B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.669445400.00000000007C4000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.669547952.0000000000804000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_400000_Ordene 501527,pdf.jbxd
                    Similarity
                    • API ID: CreateDirectoryErrorLast
                    • String ID:
                    • API String ID: 1375471231-0
                    • Opcode ID: 5aaa147db34fee021f71137ce00f1128120fffe197b4e0338bd4cd09c611a0b2
                    • Instruction ID: 364d0df367319b35fd7f444a265edab083d6b2b9b53b3b0e5bc7a719fbea1b4c
                    • Opcode Fuzzy Hash: 5aaa147db34fee021f71137ce00f1128120fffe197b4e0338bd4cd09c611a0b2
                    • Instruction Fuzzy Hash: 29C08C312105019AC7002F20EF08B173E50AB20380F058839E546E00E0CE348064D96D
                    Uniqueness

                    Uniqueness Score: -1.00%

                    C-Code - Quality: 100%
                    			E00405E03(void* _a4, void* _a8, long _a12) {
                    				int _t7;
                    				long _t11;
                    
                    				_t11 = _a12;
                    				_t7 = WriteFile(_a4, _a8, _t11,  &_a12, 0); // executed
                    				if(_t7 == 0 || _t11 != _a12) {
                    					return 0;
                    				} else {
                    					return 1;
                    				}
                    			}





                    0x00405e07
                    0x00405e17
                    0x00405e1f
                    0x00000000
                    0x00405e26
                    0x00000000
                    0x00405e28

                    APIs
                    • WriteFile.KERNELBASE(00000000,00000000,00000004,00000004,00000000,?,?,004032BB,000000FF,0078B6D8,?,0078B6D8,?,?,00000004,00000000), ref: 00405E17
                    Memory Dump Source
                    • Source File: 00000000.00000002.668679627.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000000.00000002.668672686.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.668695651.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.668709908.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.669360772.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.669367484.0000000000782000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.669373527.0000000000786000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.669383228.0000000000789000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.669410918.00000000007A4000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.669416138.00000000007A6000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.669434006.00000000007B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.669445400.00000000007C4000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.669547952.0000000000804000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_400000_Ordene 501527,pdf.jbxd
                    Similarity
                    • API ID: FileWrite
                    • String ID:
                    • API String ID: 3934441357-0
                    • Opcode ID: 02dc4867d73beddbae7b6aa94ca18310df5187db1130d79069d379e72bcbc858
                    • Instruction ID: c8204e3b8f5822b3fc4a752f4075b10d4d5d267c9e9767057f3313d1a75d1f26
                    • Opcode Fuzzy Hash: 02dc4867d73beddbae7b6aa94ca18310df5187db1130d79069d379e72bcbc858
                    • Instruction Fuzzy Hash: 38E0E632510559ABDF116F55DC00AEB775CFB05360F004436FD55E7150D671E9219BE4
                    Uniqueness

                    Uniqueness Score: -1.00%

                    C-Code - Quality: 100%
                    			E00405DD4(void* _a4, void* _a8, long _a12) {
                    				int _t7;
                    				long _t11;
                    
                    				_t11 = _a12;
                    				_t7 = ReadFile(_a4, _a8, _t11,  &_a12, 0); // executed
                    				if(_t7 == 0 || _t11 != _a12) {
                    					return 0;
                    				} else {
                    					return 1;
                    				}
                    			}





                    0x00405dd8
                    0x00405de8
                    0x00405df0
                    0x00000000
                    0x00405df7
                    0x00000000
                    0x00405df9

                    APIs
                    • ReadFile.KERNELBASE(00000000,00000000,00000004,00000004,00000000,?,?,00403305,00000000,00000000,0040314C,?,00000004,00000000,00000000,00000000), ref: 00405DE8
                    Memory Dump Source
                    • Source File: 00000000.00000002.668679627.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000000.00000002.668672686.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.668695651.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.668709908.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.669360772.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.669367484.0000000000782000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.669373527.0000000000786000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.669383228.0000000000789000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.669410918.00000000007A4000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.669416138.00000000007A6000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.669434006.00000000007B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.669445400.00000000007C4000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.669547952.0000000000804000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_400000_Ordene 501527,pdf.jbxd
                    Similarity
                    • API ID: FileRead
                    • String ID:
                    • API String ID: 2738559852-0
                    • Opcode ID: 7739e01b11ed9e02f3c754170f73e593db9a2046c62570b976e55369a775b70d
                    • Instruction ID: b9e836fab2427aaa168680a15f0f0ce7fefe47de654f12bfd99ea101fd6ea48b
                    • Opcode Fuzzy Hash: 7739e01b11ed9e02f3c754170f73e593db9a2046c62570b976e55369a775b70d
                    • Instruction Fuzzy Hash: 7DE0EC3222425EABDF509E559C04EEB7B6DEF05360F048837FD15E7160D631E921ABA8
                    Uniqueness

                    Uniqueness Score: -1.00%

                    C-Code - Quality: 100%
                    			_entry_(intOrPtr _a4, intOrPtr _a8) {
                    
                    				 *0x10004048 = _a4;
                    				if(_a8 == 1) {
                    					VirtualProtect(0x1000405c, 4, 0x40, 0x1000404c); // executed
                    					 *0x1000405c = 0xc2;
                    					 *0x1000404c = 0;
                    					 *0x10004054 = 0;
                    					 *0x10004068 = 0;
                    					 *0x10004058 = 0;
                    					 *0x10004050 = 0;
                    					 *0x10004060 = 0;
                    					 *0x1000405e = 0;
                    				}
                    				return 1;
                    			}



                    0x100027cb
                    0x100027d0
                    0x100027e0
                    0x100027e8
                    0x100027ef
                    0x100027f4
                    0x100027f9
                    0x100027fe
                    0x10002803
                    0x10002808
                    0x1000280d
                    0x1000280d
                    0x10002815

                    APIs
                    • VirtualProtect.KERNELBASE(1000405C,00000004,00000040,1000404C), ref: 100027E0
                    Memory Dump Source
                    • Source File: 00000000.00000002.669799652.0000000010001000.00000020.00000001.01000000.00000007.sdmp, Offset: 10000000, based on PE: true
                    • Associated: 00000000.00000002.669792729.0000000010000000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000000.00000002.669803934.0000000010003000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000000.00000002.669815812.0000000010005000.00000002.00000001.01000000.00000007.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_10000000_Ordene 501527,pdf.jbxd
                    Similarity
                    • API ID: ProtectVirtual
                    • String ID:
                    • API String ID: 544645111-0
                    • Opcode ID: 872da592a6d7a810a82f92163ecc1a118f8c9402d7722bf40bb7f7edf15a1654
                    • Instruction ID: 43a77b614ff4017466e57d7f63f0e44ab05d53355a3bca00642047650885b550
                    • Opcode Fuzzy Hash: 872da592a6d7a810a82f92163ecc1a118f8c9402d7722bf40bb7f7edf15a1654
                    • Instruction Fuzzy Hash: C5F0A5F15057A0DEF350DF688C847063BE4E3583C4B03852AE368F6269EB344454DF19
                    Uniqueness

                    Uniqueness Score: -1.00%

                    C-Code - Quality: 100%
                    			E00404240(int _a4) {
                    				struct HWND__* _t2;
                    				long _t3;
                    
                    				_t2 =  *0x7a79f8;
                    				if(_t2 != 0) {
                    					_t3 = SendMessageW(_t2, _a4, 0, 0); // executed
                    					return _t3;
                    				}
                    				return _t2;
                    			}





                    0x00404240
                    0x00404247
                    0x00404252
                    0x00000000
                    0x00404252
                    0x00404258

                    APIs
                    • SendMessageW.USER32(?,00000000,00000000,00000000), ref: 00404252
                    Memory Dump Source
                    • Source File: 00000000.00000002.668679627.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000000.00000002.668672686.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.668695651.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.668709908.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.669360772.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.669367484.0000000000782000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.669373527.0000000000786000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.669383228.0000000000789000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.669410918.00000000007A4000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.669416138.00000000007A6000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.669434006.00000000007B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.669445400.00000000007C4000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.669547952.0000000000804000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_400000_Ordene 501527,pdf.jbxd
                    Similarity
                    • API ID: MessageSend
                    • String ID:
                    • API String ID: 3850602802-0
                    • Opcode ID: cb0b7ebd38eb4799b8f4196fcc58e5a20f32a56ef1c2a101366cf6dcdfe2cd36
                    • Instruction ID: 05de0a4d5a0d3ad16659c86bea74b86f68b6b4ad9b47f793b7e3caf381fa8301
                    • Opcode Fuzzy Hash: cb0b7ebd38eb4799b8f4196fcc58e5a20f32a56ef1c2a101366cf6dcdfe2cd36
                    • Instruction Fuzzy Hash: 10C09BB17843017BDE109B509D49F0777585BE0741F15857D7350F50E0C674E450D61D
                    Uniqueness

                    Uniqueness Score: -1.00%

                    C-Code - Quality: 100%
                    			E00403308(long _a4) {
                    				long _t2;
                    
                    				_t2 = SetFilePointer( *0x40a018, _a4, 0, 0); // executed
                    				return _t2;
                    			}




                    0x00403316
                    0x0040331c

                    APIs
                    • SetFilePointer.KERNELBASE(?,00000000,00000000,00403088,?,?,00000006,00000008,0000000A), ref: 00403316
                    Memory Dump Source
                    • Source File: 00000000.00000002.668679627.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000000.00000002.668672686.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.668695651.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.668709908.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.669360772.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.669367484.0000000000782000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.669373527.0000000000786000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.669383228.0000000000789000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.669410918.00000000007A4000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.669416138.00000000007A6000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.669434006.00000000007B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.669445400.00000000007C4000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.669547952.0000000000804000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_400000_Ordene 501527,pdf.jbxd
                    Similarity
                    • API ID: FilePointer
                    • String ID:
                    • API String ID: 973152223-0
                    • Opcode ID: d5a77a7b91dde00220c09aa0a832f43c90240fc94845358d4caa889c1b96a79f
                    • Instruction ID: c7266a3154837caca095f11e7777f6dda2278cbf6cff4ee7664d3894fc3aa091
                    • Opcode Fuzzy Hash: d5a77a7b91dde00220c09aa0a832f43c90240fc94845358d4caa889c1b96a79f
                    • Instruction Fuzzy Hash: ECB01271240300BFDA214F00DF09F057B21AB90700F10C034B348380F086711035EB0D
                    Uniqueness

                    Uniqueness Score: -1.00%

                    C-Code - Quality: 100%
                    			E00404229(int _a4) {
                    				long _t2;
                    
                    				_t2 = SendMessageW( *0x7a8a28, 0x28, _a4, 1); // executed
                    				return _t2;
                    			}




                    0x00404237
                    0x0040423d

                    APIs
                    • SendMessageW.USER32(00000028,?,00000001,00404054), ref: 00404237
                    Memory Dump Source
                    • Source File: 00000000.00000002.668679627.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000000.00000002.668672686.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.668695651.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.668709908.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.669360772.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.669367484.0000000000782000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.669373527.0000000000786000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.669383228.0000000000789000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.669410918.00000000007A4000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.669416138.00000000007A6000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.669434006.00000000007B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.669445400.00000000007C4000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.669547952.0000000000804000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_400000_Ordene 501527,pdf.jbxd
                    Similarity
                    • API ID: MessageSend
                    • String ID:
                    • API String ID: 3850602802-0
                    • Opcode ID: f360a53124e97c409135d1b53ccadec94ff58fec8389da7a5f3de8c8d06ef766
                    • Instruction ID: 5dee82f2d739acac93035fb571c052082ac1606baee7bb158d490297d0aa81d3
                    • Opcode Fuzzy Hash: f360a53124e97c409135d1b53ccadec94ff58fec8389da7a5f3de8c8d06ef766
                    • Instruction Fuzzy Hash: 99B09236190A00AADE614B40DE49F457A62A7A8701F00C029B240640B0CAB200A0DB09
                    Uniqueness

                    Uniqueness Score: -1.00%

                    C-Code - Quality: 100%
                    			E00404216(int _a4) {
                    				int _t2;
                    
                    				_t2 = EnableWindow( *0x7a1f1c, _a4); // executed
                    				return _t2;
                    			}




                    0x00404220
                    0x00404226

                    APIs
                    • KiUserCallbackDispatcher.NTDLL(?,00403FED), ref: 00404220
                    Memory Dump Source
                    • Source File: 00000000.00000002.668679627.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000000.00000002.668672686.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.668695651.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.668709908.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.669360772.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.669367484.0000000000782000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.669373527.0000000000786000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.669383228.0000000000789000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.669410918.00000000007A4000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.669416138.00000000007A6000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.669434006.00000000007B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.669445400.00000000007C4000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.669547952.0000000000804000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_400000_Ordene 501527,pdf.jbxd
                    Similarity
                    • API ID: CallbackDispatcherUser
                    • String ID:
                    • API String ID: 2492992576-0
                    • Opcode ID: efc6552eadcfffb9f020cd3683497eb6feb0237cfd1954b00ec8dcd11a4bd103
                    • Instruction ID: 2198674f4dd135e02f2a8ae7056ebba5a8e761495b22eeaea90ee2a366c7106d
                    • Opcode Fuzzy Hash: efc6552eadcfffb9f020cd3683497eb6feb0237cfd1954b00ec8dcd11a4bd103
                    • Instruction Fuzzy Hash: 0AA002754455409FDF015B50EF048057A61B7E5741B61C469A25551074C7354461EB19
                    Uniqueness

                    Uniqueness Score: -1.00%

                    C-Code - Quality: 100%
                    			E004014D7(intOrPtr __edx) {
                    				long _t3;
                    				void* _t7;
                    				intOrPtr _t10;
                    				void* _t13;
                    
                    				_t10 = __edx;
                    				_t3 = E00402C15(_t7);
                    				 *((intOrPtr*)(_t13 - 0x4c)) = _t10;
                    				if(_t3 <= 1) {
                    					_t3 = 1;
                    				}
                    				Sleep(_t3); // executed
                    				 *0x7a8ac8 =  *0x7a8ac8 +  *((intOrPtr*)(_t13 - 4));
                    				return 0;
                    			}







                    0x004014d7
                    0x004014d8
                    0x004014e1
                    0x004014e4
                    0x004014e8
                    0x004014e8
                    0x004014ea
                    0x00402ac2
                    0x00402ace

                    APIs
                    • Sleep.KERNELBASE(00000000), ref: 004014EA
                    Memory Dump Source
                    • Source File: 00000000.00000002.668679627.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000000.00000002.668672686.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.668695651.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.668709908.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.669360772.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.669367484.0000000000782000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.669373527.0000000000786000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.669383228.0000000000789000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.669410918.00000000007A4000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.669416138.00000000007A6000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.669434006.00000000007B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.669445400.00000000007C4000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.669547952.0000000000804000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_400000_Ordene 501527,pdf.jbxd
                    Similarity
                    • API ID: Sleep
                    • String ID:
                    • API String ID: 3472027048-0
                    • Opcode ID: b72f52a4772dabdbb64cda62986184e6614cc3c9a6ca15c4228e7df8649fbb6e
                    • Instruction ID: 60c51cdf203b7668da04ee58929e20464c42dbb9de841c6a7bf479dbf053ce01
                    • Opcode Fuzzy Hash: b72f52a4772dabdbb64cda62986184e6614cc3c9a6ca15c4228e7df8649fbb6e
                    • Instruction Fuzzy Hash: 99D05E73A141008BD750EBB8BE8945E73A8E7813193208837E102E1191E97888528A1D
                    Uniqueness

                    Uniqueness Score: -1.00%

                    C-Code - Quality: 96%
                    			E00404C3F(struct HWND__* _a4, int _a8, signed int _a12, int _a16) {
                    				struct HWND__* _v8;
                    				struct HWND__* _v12;
                    				signed int _v16;
                    				signed int _v20;
                    				intOrPtr _v24;
                    				signed char* _v28;
                    				long _v32;
                    				signed int _v40;
                    				int _v44;
                    				signed int* _v56;
                    				signed char* _v60;
                    				signed int _v64;
                    				long _v68;
                    				void* _v72;
                    				intOrPtr _v76;
                    				intOrPtr _v80;
                    				void* _v84;
                    				void* __ebx;
                    				void* __edi;
                    				void* __esi;
                    				signed int _t192;
                    				intOrPtr _t195;
                    				long _t201;
                    				signed int _t205;
                    				signed int _t216;
                    				void* _t219;
                    				void* _t220;
                    				int _t226;
                    				signed int _t231;
                    				signed int _t232;
                    				signed int _t233;
                    				signed int _t239;
                    				signed int _t241;
                    				signed char _t242;
                    				signed char _t248;
                    				void* _t252;
                    				void* _t254;
                    				signed char* _t270;
                    				signed char _t271;
                    				long _t276;
                    				int _t282;
                    				signed int _t283;
                    				long _t284;
                    				signed int _t287;
                    				signed int _t294;
                    				signed char* _t302;
                    				struct HWND__* _t306;
                    				int _t307;
                    				signed int* _t308;
                    				int _t309;
                    				long _t310;
                    				signed int _t311;
                    				void* _t313;
                    				long _t314;
                    				int _t315;
                    				signed int _t316;
                    				void* _t318;
                    
                    				_t306 = _a4;
                    				_v12 = GetDlgItem(_t306, 0x3f9);
                    				_v8 = GetDlgItem(_t306, 0x408);
                    				_t318 = SendMessageW;
                    				_v20 =  *0x7a8a68;
                    				_t282 = 0;
                    				_v24 =  *0x7a8a34 + 0x94;
                    				if(_a8 != 0x110) {
                    					L23:
                    					if(_a8 != 0x405) {
                    						_t285 = _a16;
                    					} else {
                    						_a12 = _t282;
                    						_t285 = 1;
                    						_a8 = 0x40f;
                    						_a16 = 1;
                    					}
                    					if(_a8 == 0x4e || _a8 == 0x413) {
                    						_v16 = _t285;
                    						if(_a8 == 0x413 ||  *((intOrPtr*)(_t285 + 4)) == 0x408) {
                    							if(( *0x7a8a3d & 0x00000002) != 0) {
                    								L41:
                    								if(_v16 != _t282) {
                    									_t231 = _v16;
                    									if( *((intOrPtr*)(_t231 + 8)) == 0xfffffe3d) {
                    										SendMessageW(_v8, 0x419, _t282,  *(_t231 + 0x5c));
                    									}
                    									_t232 = _v16;
                    									if( *((intOrPtr*)(_t232 + 8)) == 0xfffffe39) {
                    										_t285 = _v20;
                    										_t233 =  *(_t232 + 0x5c);
                    										if( *((intOrPtr*)(_t232 + 0xc)) != 2) {
                    											 *(_t233 * 0x818 + _t285 + 8) =  *(_t233 * 0x818 + _t285 + 8) & 0xffffffdf;
                    										} else {
                    											 *(_t233 * 0x818 + _t285 + 8) =  *(_t233 * 0x818 + _t285 + 8) | 0x00000020;
                    										}
                    									}
                    								}
                    								goto L48;
                    							}
                    							if(_a8 == 0x413) {
                    								L33:
                    								_t285 = 0 | _a8 != 0x00000413;
                    								_t239 = E00404B8D(_v8, _a8 != 0x413);
                    								_t311 = _t239;
                    								if(_t311 >= _t282) {
                    									_t88 = _v20 + 8; // 0x8
                    									_t285 = _t239 * 0x818 + _t88;
                    									_t241 =  *_t285;
                    									if((_t241 & 0x00000010) == 0) {
                    										if((_t241 & 0x00000040) == 0) {
                    											_t242 = _t241 ^ 0x00000001;
                    										} else {
                    											_t248 = _t241 ^ 0x00000080;
                    											if(_t248 >= 0) {
                    												_t242 = _t248 & 0x000000fe;
                    											} else {
                    												_t242 = _t248 | 0x00000001;
                    											}
                    										}
                    										 *_t285 = _t242;
                    										E0040117D(_t311);
                    										_a12 = _t311 + 1;
                    										_a16 =  !( *0x7a8a3c) >> 0x00000008 & 0x00000001;
                    										_a8 = 0x40f;
                    									}
                    								}
                    								goto L41;
                    							}
                    							_t285 = _a16;
                    							if( *((intOrPtr*)(_a16 + 8)) != 0xfffffffe) {
                    								goto L41;
                    							}
                    							goto L33;
                    						} else {
                    							goto L48;
                    						}
                    					} else {
                    						L48:
                    						if(_a8 != 0x111) {
                    							L56:
                    							if(_a8 == 0x200) {
                    								SendMessageW(_v8, 0x200, _t282, _t282);
                    							}
                    							if(_a8 == 0x40b) {
                    								_t219 =  *0x7a1f04;
                    								if(_t219 != _t282) {
                    									ImageList_Destroy(_t219);
                    								}
                    								_t220 =  *0x7a1f18;
                    								if(_t220 != _t282) {
                    									GlobalFree(_t220);
                    								}
                    								 *0x7a1f04 = _t282;
                    								 *0x7a1f18 = _t282;
                    								 *0x7a8aa0 = _t282;
                    							}
                    							if(_a8 != 0x40f) {
                    								L88:
                    								if(_a8 == 0x420 && ( *0x7a8a3d & 0x00000001) != 0) {
                    									_t307 = (0 | _a16 == 0x00000020) << 3;
                    									ShowWindow(_v8, _t307);
                    									ShowWindow(GetDlgItem(_a4, 0x3fe), _t307);
                    								}
                    								goto L91;
                    							} else {
                    								E004011EF(_t285, _t282, _t282);
                    								_t192 = _a12;
                    								if(_t192 != _t282) {
                    									if(_t192 != 0xffffffff) {
                    										_t192 = _t192 - 1;
                    									}
                    									_push(_t192);
                    									_push(8);
                    									E00404C0D();
                    								}
                    								if(_a16 == _t282) {
                    									L75:
                    									E004011EF(_t285, _t282, _t282);
                    									_v32 =  *0x7a1f18;
                    									_t195 =  *0x7a8a68;
                    									_v60 = 0xf030;
                    									_v20 = _t282;
                    									if( *0x7a8a6c <= _t282) {
                    										L86:
                    										InvalidateRect(_v8, _t282, 1);
                    										if( *((intOrPtr*)( *0x7a79fc + 0x10)) != _t282) {
                    											E00404B48(0x3ff, 0xfffffffb, E00404B60(5));
                    										}
                    										goto L88;
                    									}
                    									_t308 = _t195 + 8;
                    									do {
                    										_t201 =  *((intOrPtr*)(_v32 + _v20 * 4));
                    										if(_t201 != _t282) {
                    											_t287 =  *_t308;
                    											_v68 = _t201;
                    											_v72 = 8;
                    											if((_t287 & 0x00000001) != 0) {
                    												_v72 = 9;
                    												_v56 =  &(_t308[4]);
                    												_t308[0] = _t308[0] & 0x000000fe;
                    											}
                    											if((_t287 & 0x00000040) == 0) {
                    												_t205 = (_t287 & 0x00000001) + 1;
                    												if((_t287 & 0x00000010) != 0) {
                    													_t205 = _t205 + 3;
                    												}
                    											} else {
                    												_t205 = 3;
                    											}
                    											_v64 = (_t205 << 0x0000000b | _t287 & 0x00000008) + (_t205 << 0x0000000b | _t287 & 0x00000008) | _t287 & 0x00000020;
                    											SendMessageW(_v8, 0x1102, (_t287 >> 0x00000005 & 0x00000001) + 1, _v68);
                    											SendMessageW(_v8, 0x113f, _t282,  &_v72);
                    										}
                    										_v20 = _v20 + 1;
                    										_t308 =  &(_t308[0x206]);
                    									} while (_v20 <  *0x7a8a6c);
                    									goto L86;
                    								} else {
                    									_t309 = E004012E2( *0x7a1f18);
                    									E00401299(_t309);
                    									_t216 = 0;
                    									_t285 = 0;
                    									if(_t309 <= _t282) {
                    										L74:
                    										SendMessageW(_v12, 0x14e, _t285, _t282);
                    										_a16 = _t309;
                    										_a8 = 0x420;
                    										goto L75;
                    									} else {
                    										goto L71;
                    									}
                    									do {
                    										L71:
                    										if( *((intOrPtr*)(_v24 + _t216 * 4)) != _t282) {
                    											_t285 = _t285 + 1;
                    										}
                    										_t216 = _t216 + 1;
                    									} while (_t216 < _t309);
                    									goto L74;
                    								}
                    							}
                    						}
                    						if(_a12 != 0x3f9 || _a12 >> 0x10 != 1) {
                    							goto L91;
                    						} else {
                    							_t226 = SendMessageW(_v12, 0x147, _t282, _t282);
                    							if(_t226 == 0xffffffff) {
                    								goto L91;
                    							}
                    							_t310 = SendMessageW(_v12, 0x150, _t226, _t282);
                    							if(_t310 == 0xffffffff ||  *((intOrPtr*)(_v24 + _t310 * 4)) == _t282) {
                    								_t310 = 0x20;
                    							}
                    							E00401299(_t310);
                    							SendMessageW(_a4, 0x420, _t282, _t310);
                    							_a12 = _a12 | 0xffffffff;
                    							_a16 = _t282;
                    							_a8 = 0x40f;
                    							goto L56;
                    						}
                    					}
                    				} else {
                    					_v32 = 0;
                    					_v16 = 2;
                    					 *0x7a8aa0 = _t306;
                    					 *0x7a1f18 = GlobalAlloc(0x40,  *0x7a8a6c << 2);
                    					_t252 = LoadBitmapW( *0x7a8a20, 0x6e);
                    					 *0x7a1f0c =  *0x7a1f0c | 0xffffffff;
                    					_t313 = _t252;
                    					 *0x7a1f14 = SetWindowLongW(_v8, 0xfffffffc, E00405237);
                    					_t254 = ImageList_Create(0x10, 0x10, 0x21, 6, 0);
                    					 *0x7a1f04 = _t254;
                    					ImageList_AddMasked(_t254, _t313, 0xff00ff);
                    					SendMessageW(_v8, 0x1109, 2,  *0x7a1f04);
                    					if(SendMessageW(_v8, 0x111c, 0, 0) < 0x10) {
                    						SendMessageW(_v8, 0x111b, 0x10, 0);
                    					}
                    					DeleteObject(_t313);
                    					_t314 = 0;
                    					do {
                    						_t260 =  *((intOrPtr*)(_v24 + _t314 * 4));
                    						if( *((intOrPtr*)(_v24 + _t314 * 4)) != _t282) {
                    							if(_t314 != 0x20) {
                    								_v16 = _t282;
                    							}
                    							SendMessageW(_v12, 0x151, SendMessageW(_v12, 0x143, _t282, E00406281(_t282, _t314, _t318, _t282, _t260)), _t314);
                    						}
                    						_t314 = _t314 + 1;
                    					} while (_t314 < 0x21);
                    					_t315 = _a16;
                    					_t283 = _v16;
                    					_push( *((intOrPtr*)(_t315 + 0x30 + _t283 * 4)));
                    					_push(0x15);
                    					E004041F4(_a4);
                    					_push( *((intOrPtr*)(_t315 + 0x34 + _t283 * 4)));
                    					_push(0x16);
                    					E004041F4(_a4);
                    					_t316 = 0;
                    					_t284 = 0;
                    					if( *0x7a8a6c <= 0) {
                    						L19:
                    						SetWindowLongW(_v8, 0xfffffff0, GetWindowLongW(_v8, 0xfffffff0) & 0x000000fb);
                    						goto L20;
                    					} else {
                    						_t302 = _v20 + 8;
                    						_v28 = _t302;
                    						do {
                    							_t270 =  &(_t302[0x10]);
                    							if( *_t270 != 0) {
                    								_v60 = _t270;
                    								_t271 =  *_t302;
                    								_t294 = 0x20;
                    								_v84 = _t284;
                    								_v80 = 0xffff0002;
                    								_v76 = 0xd;
                    								_v64 = _t294;
                    								_v40 = _t316;
                    								_v68 = _t271 & _t294;
                    								if((_t271 & 0x00000002) == 0) {
                    									if((_t271 & 0x00000004) == 0) {
                    										 *( *0x7a1f18 + _t316 * 4) = SendMessageW(_v8, 0x1132, 0,  &_v84);
                    									} else {
                    										_t284 = SendMessageW(_v8, 0x110a, 3, _t284);
                    									}
                    								} else {
                    									_v76 = 0x4d;
                    									_v44 = 1;
                    									_t276 = SendMessageW(_v8, 0x1132, 0,  &_v84);
                    									_v32 = 1;
                    									 *( *0x7a1f18 + _t316 * 4) = _t276;
                    									_t284 =  *( *0x7a1f18 + _t316 * 4);
                    								}
                    							}
                    							_t316 = _t316 + 1;
                    							_t302 =  &(_v28[0x818]);
                    							_v28 = _t302;
                    						} while (_t316 <  *0x7a8a6c);
                    						if(_v32 != 0) {
                    							L20:
                    							if(_v16 != 0) {
                    								E00404229(_v8);
                    								_t282 = 0;
                    								goto L23;
                    							} else {
                    								ShowWindow(_v12, 5);
                    								E00404229(_v12);
                    								L91:
                    								return E0040425B(_a8, _a12, _a16);
                    							}
                    						}
                    						goto L19;
                    					}
                    				}
                    			}




























































                    0x00404c4e
                    0x00404c5f
                    0x00404c64
                    0x00404c6c
                    0x00404c72
                    0x00404c7a
                    0x00404c88
                    0x00404c8b
                    0x00404eac
                    0x00404eb3
                    0x00404ec7
                    0x00404eb5
                    0x00404eb7
                    0x00404eba
                    0x00404ebb
                    0x00404ec2
                    0x00404ec2
                    0x00404ed3
                    0x00404ee1
                    0x00404ee4
                    0x00404efa
                    0x00404f6f
                    0x00404f72
                    0x00404f74
                    0x00404f7e
                    0x00404f8c
                    0x00404f8c
                    0x00404f8e
                    0x00404f98
                    0x00404f9e
                    0x00404fa1
                    0x00404fa4
                    0x00404fbf
                    0x00404fa6
                    0x00404fb0
                    0x00404fb0
                    0x00404fa4
                    0x00404f98
                    0x00000000
                    0x00404f72
                    0x00404eff
                    0x00404f0a
                    0x00404f0f
                    0x00404f16
                    0x00404f1b
                    0x00404f1f
                    0x00404f2a
                    0x00404f2a
                    0x00404f2e
                    0x00404f32
                    0x00404f36
                    0x00404f49
                    0x00404f38
                    0x00404f38
                    0x00404f3f
                    0x00404f45
                    0x00404f41
                    0x00404f41
                    0x00404f41
                    0x00404f3f
                    0x00404f4d
                    0x00404f4f
                    0x00404f62
                    0x00404f65
                    0x00404f68
                    0x00404f68
                    0x00404f32
                    0x00000000
                    0x00404f1f
                    0x00404f01
                    0x00404f08
                    0x00000000
                    0x00000000
                    0x00000000
                    0x00000000
                    0x00000000
                    0x00000000
                    0x00404fc2
                    0x00404fc2
                    0x00404fc9
                    0x0040503a
                    0x00405042
                    0x0040504a
                    0x0040504a
                    0x00405053
                    0x00405055
                    0x0040505c
                    0x0040505f
                    0x0040505f
                    0x00405065
                    0x0040506c
                    0x0040506f
                    0x0040506f
                    0x00405075
                    0x0040507b
                    0x00405081
                    0x00405081
                    0x0040508e
                    0x004051e4
                    0x004051eb
                    0x00405208
                    0x0040520e
                    0x00405220
                    0x00405220
                    0x00000000
                    0x00405094
                    0x00405096
                    0x0040509b
                    0x004050a0
                    0x004050a5
                    0x004050a7
                    0x004050a7
                    0x004050a8
                    0x004050a9
                    0x004050ab
                    0x004050ab
                    0x004050b3
                    0x004050f4
                    0x004050f6
                    0x00405106
                    0x00405109
                    0x0040510e
                    0x00405115
                    0x00405118
                    0x004051ba
                    0x004051c0
                    0x004051ce
                    0x004051df
                    0x004051df
                    0x00000000
                    0x004051ce
                    0x0040511e
                    0x00405121
                    0x00405127
                    0x0040512c
                    0x0040512e
                    0x00405130
                    0x00405136
                    0x0040513d
                    0x00405142
                    0x00405149
                    0x0040514c
                    0x0040514c
                    0x00405153
                    0x0040515f
                    0x00405163
                    0x00405165
                    0x00405165
                    0x00405155
                    0x00405157
                    0x00405157
                    0x00405185
                    0x00405191
                    0x004051a0
                    0x004051a0
                    0x004051a2
                    0x004051a5
                    0x004051ae
                    0x00000000
                    0x004050b5
                    0x004050c0
                    0x004050c3
                    0x004050c8
                    0x004050ca
                    0x004050ce
                    0x004050de
                    0x004050e8
                    0x004050ea
                    0x004050ed
                    0x00000000
                    0x00000000
                    0x00000000
                    0x00000000
                    0x004050d0
                    0x004050d0
                    0x004050d6
                    0x004050d8
                    0x004050d8
                    0x004050d9
                    0x004050da
                    0x00000000
                    0x004050d0
                    0x004050b3
                    0x0040508e
                    0x00404fd1
                    0x00000000
                    0x00404fe7
                    0x00404ff1
                    0x00404ff6
                    0x00000000
                    0x00000000
                    0x00405008
                    0x0040500d
                    0x00405019
                    0x00405019
                    0x0040501b
                    0x0040502a
                    0x0040502c
                    0x00405030
                    0x00405033
                    0x00000000
                    0x00405033
                    0x00404fd1
                    0x00404c91
                    0x00404c96
                    0x00404c9f
                    0x00404ca6
                    0x00404cb4
                    0x00404cbf
                    0x00404cc5
                    0x00404cd3
                    0x00404ce7
                    0x00404cec
                    0x00404cf9
                    0x00404cfe
                    0x00404d14
                    0x00404d25
                    0x00404d32
                    0x00404d32
                    0x00404d35
                    0x00404d3b
                    0x00404d3d
                    0x00404d40
                    0x00404d45
                    0x00404d4a
                    0x00404d4c
                    0x00404d4c
                    0x00404d6c
                    0x00404d6c
                    0x00404d6e
                    0x00404d6f
                    0x00404d74
                    0x00404d77
                    0x00404d7a
                    0x00404d7e
                    0x00404d83
                    0x00404d88
                    0x00404d8c
                    0x00404d91
                    0x00404d96
                    0x00404d98
                    0x00404da0
                    0x00404e6b
                    0x00404e7e
                    0x00000000
                    0x00404da6
                    0x00404da9
                    0x00404dac
                    0x00404daf
                    0x00404daf
                    0x00404db6
                    0x00404dbc
                    0x00404dbf
                    0x00404dc5
                    0x00404dc6
                    0x00404dcb
                    0x00404dd4
                    0x00404ddb
                    0x00404dde
                    0x00404de1
                    0x00404de4
                    0x00404e20
                    0x00404e49
                    0x00404e22
                    0x00404e2f
                    0x00404e2f
                    0x00404de6
                    0x00404de9
                    0x00404df8
                    0x00404e02
                    0x00404e0a
                    0x00404e11
                    0x00404e19
                    0x00404e19
                    0x00404de4
                    0x00404e4f
                    0x00404e50
                    0x00404e5c
                    0x00404e5c
                    0x00404e69
                    0x00404e84
                    0x00404e88
                    0x00404ea5
                    0x00404eaa
                    0x00000000
                    0x00404e8a
                    0x00404e8f
                    0x00404e98
                    0x00405222
                    0x00405234
                    0x00405234
                    0x00404e88
                    0x00000000
                    0x00404e69
                    0x00404da0

                    APIs
                    • GetDlgItem.USER32 ref: 00404C57
                    • GetDlgItem.USER32 ref: 00404C62
                    • GlobalAlloc.KERNEL32(00000040,?), ref: 00404CAC
                    • LoadBitmapW.USER32 ref: 00404CBF
                    • SetWindowLongW.USER32(?,000000FC,00405237), ref: 00404CD8
                    • ImageList_Create.COMCTL32(00000010,00000010,00000021,00000006,00000000), ref: 00404CEC
                    • ImageList_AddMasked.COMCTL32(00000000,00000000,00FF00FF), ref: 00404CFE
                    • SendMessageW.USER32(?,00001109,00000002), ref: 00404D14
                    • SendMessageW.USER32(?,0000111C,00000000,00000000), ref: 00404D20
                    • SendMessageW.USER32(?,0000111B,00000010,00000000), ref: 00404D32
                    • DeleteObject.GDI32(00000000), ref: 00404D35
                    • SendMessageW.USER32(?,00000143,00000000,00000000), ref: 00404D60
                    • SendMessageW.USER32(?,00000151,00000000,00000000), ref: 00404D6C
                    • SendMessageW.USER32(?,00001132,00000000,?), ref: 00404E02
                    • SendMessageW.USER32(?,0000110A,00000003,00000000), ref: 00404E2D
                    • SendMessageW.USER32(?,00001132,00000000,?), ref: 00404E41
                    • GetWindowLongW.USER32(?,000000F0), ref: 00404E70
                    • SetWindowLongW.USER32(?,000000F0,00000000), ref: 00404E7E
                    • ShowWindow.USER32(?,00000005), ref: 00404E8F
                    • SendMessageW.USER32(?,00000419,00000000,?), ref: 00404F8C
                    • SendMessageW.USER32(?,00000147,00000000,00000000), ref: 00404FF1
                    • SendMessageW.USER32(?,00000150,00000000,00000000), ref: 00405006
                    • SendMessageW.USER32(?,00000420,00000000,00000020), ref: 0040502A
                    • SendMessageW.USER32(?,00000200,00000000,00000000), ref: 0040504A
                    • ImageList_Destroy.COMCTL32(?), ref: 0040505F
                    • GlobalFree.KERNEL32 ref: 0040506F
                    • SendMessageW.USER32(?,0000014E,00000000,00000000), ref: 004050E8
                    • SendMessageW.USER32(?,00001102,?,?), ref: 00405191
                    • SendMessageW.USER32(?,0000113F,00000000,00000008), ref: 004051A0
                    • InvalidateRect.USER32(?,00000000,00000001), ref: 004051C0
                    • ShowWindow.USER32(?,00000000), ref: 0040520E
                    • GetDlgItem.USER32 ref: 00405219
                    • ShowWindow.USER32(00000000), ref: 00405220
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.668679627.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000000.00000002.668672686.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.668695651.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.668709908.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.669360772.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.669367484.0000000000782000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.669373527.0000000000786000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.669383228.0000000000789000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.669410918.00000000007A4000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.669416138.00000000007A6000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.669434006.00000000007B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.669445400.00000000007C4000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.669547952.0000000000804000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_400000_Ordene 501527,pdf.jbxd
                    Similarity
                    • API ID: MessageSend$Window$ImageItemList_LongShow$Global$AllocBitmapCreateDeleteDestroyFreeInvalidateLoadMaskedObjectRect
                    • String ID: $M$N
                    • API String ID: 1638840714-813528018
                    • Opcode ID: 553d519729d397de5e5254fbdeaeb8528e4d7a101528c67cd33a07c071a9245a
                    • Instruction ID: 12ef5a05c60c6c20dcbbeb1066bc3531ea5280fcb44ea9637735f2a88fa268fa
                    • Opcode Fuzzy Hash: 553d519729d397de5e5254fbdeaeb8528e4d7a101528c67cd33a07c071a9245a
                    • Instruction Fuzzy Hash: 670260B0900209EFEB109F64DD85AAE7BB5FB85314F10817AF610BA2E1DB799D41CF58
                    Uniqueness

                    Uniqueness Score: -1.00%

                    C-Code - Quality: 78%
                    			E004046C3(unsigned int __edx, struct HWND__* _a4, intOrPtr _a8, unsigned int _a12, intOrPtr _a16) {
                    				signed int _v8;
                    				signed int _v12;
                    				long _v16;
                    				long _v20;
                    				long _v24;
                    				char _v28;
                    				intOrPtr _v32;
                    				long _v36;
                    				char _v40;
                    				unsigned int _v44;
                    				signed int _v48;
                    				WCHAR* _v56;
                    				intOrPtr _v60;
                    				intOrPtr _v64;
                    				intOrPtr _v68;
                    				WCHAR* _v72;
                    				void _v76;
                    				struct HWND__* _v80;
                    				void* __ebx;
                    				void* __edi;
                    				void* __esi;
                    				intOrPtr _t82;
                    				long _t87;
                    				short* _t89;
                    				void* _t95;
                    				signed int _t96;
                    				int _t109;
                    				signed short _t114;
                    				signed int _t118;
                    				struct HWND__** _t122;
                    				intOrPtr* _t138;
                    				WCHAR* _t146;
                    				unsigned int _t150;
                    				signed int _t152;
                    				unsigned int _t156;
                    				signed int _t158;
                    				signed int* _t159;
                    				signed int* _t160;
                    				struct HWND__* _t166;
                    				struct HWND__* _t167;
                    				int _t169;
                    				unsigned int _t197;
                    
                    				_t156 = __edx;
                    				_t82 =  *0x7a0ef8; // 0xb899cc
                    				_v32 = _t82;
                    				_t146 = ( *(_t82 + 0x3c) << 0xb) + 0x7a9000;
                    				_v12 =  *((intOrPtr*)(_t82 + 0x38));
                    				if(_a8 == 0x40b) {
                    					E004058A5(0x3fb, _t146);
                    					E004064F3(_t146);
                    				}
                    				_t167 = _a4;
                    				if(_a8 != 0x110) {
                    					L8:
                    					if(_a8 != 0x111) {
                    						L20:
                    						if(_a8 == 0x40f) {
                    							L22:
                    							_v8 = _v8 & 0x00000000;
                    							_v12 = _v12 & 0x00000000;
                    							E004058A5(0x3fb, _t146);
                    							if(E00405C38(_t186, _t146) == 0) {
                    								_v8 = 1;
                    							}
                    							E0040625F(0x79fef0, _t146);
                    							_t87 = E00406639(1);
                    							_v16 = _t87;
                    							if(_t87 == 0) {
                    								L30:
                    								E0040625F(0x79fef0, _t146);
                    								_t89 = E00405BDB(0x79fef0);
                    								_t158 = 0;
                    								if(_t89 != 0) {
                    									 *_t89 = 0;
                    								}
                    								if(GetDiskFreeSpaceW(0x79fef0,  &_v20,  &_v24,  &_v16,  &_v36) == 0) {
                    									goto L35;
                    								} else {
                    									_t169 = 0x400;
                    									_t109 = MulDiv(_v20 * _v24, _v16, 0x400);
                    									asm("cdq");
                    									_v48 = _t109;
                    									_v44 = _t156;
                    									_v12 = 1;
                    									goto L36;
                    								}
                    							} else {
                    								_t159 = 0;
                    								if(0 == 0x79fef0) {
                    									goto L30;
                    								} else {
                    									goto L26;
                    								}
                    								while(1) {
                    									L26:
                    									_t114 = _v16(0x79fef0,  &_v48,  &_v28,  &_v40);
                    									if(_t114 != 0) {
                    										break;
                    									}
                    									if(_t159 != 0) {
                    										 *_t159 =  *_t159 & _t114;
                    									}
                    									_t160 = E00405B7C(0x79fef0);
                    									 *_t160 =  *_t160 & 0x00000000;
                    									_t159 = _t160;
                    									 *_t159 = 0x5c;
                    									if(_t159 != 0x79fef0) {
                    										continue;
                    									} else {
                    										goto L30;
                    									}
                    								}
                    								_t150 = _v44;
                    								_v48 = (_t150 << 0x00000020 | _v48) >> 0xa;
                    								_v44 = _t150 >> 0xa;
                    								_v12 = 1;
                    								_t158 = 0;
                    								__eflags = 0;
                    								L35:
                    								_t169 = 0x400;
                    								L36:
                    								_t95 = E00404B60(5);
                    								if(_v12 != _t158) {
                    									_t197 = _v44;
                    									if(_t197 <= 0 && (_t197 < 0 || _v48 < _t95)) {
                    										_v8 = 2;
                    									}
                    								}
                    								if( *((intOrPtr*)( *0x7a79fc + 0x10)) != _t158) {
                    									E00404B48(0x3ff, 0xfffffffb, _t95);
                    									if(_v12 == _t158) {
                    										SetDlgItemTextW(_a4, _t169, 0x79fee0);
                    									} else {
                    										E00404A7F(_t169, 0xfffffffc, _v48, _v44);
                    									}
                    								}
                    								_t96 = _v8;
                    								 *0x7a8ae4 = _t96;
                    								if(_t96 == _t158) {
                    									_v8 = E0040140B(7);
                    								}
                    								if(( *(_v32 + 0x14) & _t169) != 0) {
                    									_v8 = _t158;
                    								}
                    								E00404216(0 | _v8 == _t158);
                    								if(_v8 == _t158 &&  *0x7a1f10 == _t158) {
                    									E0040461C();
                    								}
                    								 *0x7a1f10 = _t158;
                    								goto L53;
                    							}
                    						}
                    						_t186 = _a8 - 0x405;
                    						if(_a8 != 0x405) {
                    							goto L53;
                    						}
                    						goto L22;
                    					}
                    					_t118 = _a12 & 0x0000ffff;
                    					if(_t118 != 0x3fb) {
                    						L12:
                    						if(_t118 == 0x3e9) {
                    							_t152 = 7;
                    							memset( &_v76, 0, _t152 << 2);
                    							_v80 = _t167;
                    							_v72 = 0x7a1f20;
                    							_v60 = E00404A19;
                    							_v56 = _t146;
                    							_v68 = E00406281(_t146, 0x7a1f20, _t167, 0x7a06f8, _v12);
                    							_t122 =  &_v80;
                    							_v64 = 0x41;
                    							__imp__SHBrowseForFolderW(_t122);
                    							if(_t122 == 0) {
                    								_a8 = 0x40f;
                    							} else {
                    								__imp__CoTaskMemFree(_t122);
                    								E00405B30(_t146);
                    								_t125 =  *((intOrPtr*)( *0x7a8a34 + 0x11c));
                    								if( *((intOrPtr*)( *0x7a8a34 + 0x11c)) != 0 && _t146 == L"C:\\Users\\alfons\\AppData\\Roaming\\Microsoft\\Windows\\Start Menu\\Misundes\\Caesural4") {
                    									E00406281(_t146, 0x7a1f20, _t167, 0, _t125);
                    									if(lstrcmpiW(0x7a69c0, 0x7a1f20) != 0) {
                    										lstrcatW(_t146, 0x7a69c0);
                    									}
                    								}
                    								 *0x7a1f10 =  *0x7a1f10 + 1;
                    								SetDlgItemTextW(_t167, 0x3fb, _t146);
                    							}
                    						}
                    						goto L20;
                    					}
                    					if(_a12 >> 0x10 != 0x300) {
                    						goto L53;
                    					}
                    					_a8 = 0x40f;
                    					goto L12;
                    				} else {
                    					_t166 = GetDlgItem(_t167, 0x3fb);
                    					if(E00405BA7(_t146) != 0 && E00405BDB(_t146) == 0) {
                    						E00405B30(_t146);
                    					}
                    					 *0x7a79f8 = _t167;
                    					SetWindowTextW(_t166, _t146);
                    					_push( *((intOrPtr*)(_a16 + 0x34)));
                    					_push(1);
                    					E004041F4(_t167);
                    					_push( *((intOrPtr*)(_a16 + 0x30)));
                    					_push(0x14);
                    					E004041F4(_t167);
                    					E00404229(_t166);
                    					_t138 = E00406639(7);
                    					if(_t138 == 0) {
                    						L53:
                    						return E0040425B(_a8, _a12, _a16);
                    					} else {
                    						 *_t138(_t166, 1);
                    						goto L8;
                    					}
                    				}
                    			}













































                    0x004046c3
                    0x004046c9
                    0x004046cf
                    0x004046dc
                    0x004046ea
                    0x004046ed
                    0x004046f5
                    0x004046fb
                    0x004046fb
                    0x00404707
                    0x0040470a
                    0x00404778
                    0x0040477f
                    0x00404856
                    0x0040485d
                    0x0040486c
                    0x0040486c
                    0x00404870
                    0x0040487a
                    0x00404887
                    0x00404889
                    0x00404889
                    0x00404897
                    0x0040489e
                    0x004048a5
                    0x004048a8
                    0x004048e4
                    0x004048e6
                    0x004048ec
                    0x004048f1
                    0x004048f5
                    0x004048f7
                    0x004048f7
                    0x00404913
                    0x00000000
                    0x00404915
                    0x00404918
                    0x00404926
                    0x0040492c
                    0x0040492d
                    0x00404930
                    0x00404933
                    0x00000000
                    0x00404933
                    0x004048aa
                    0x004048ac
                    0x004048b0
                    0x00000000
                    0x00000000
                    0x00000000
                    0x00000000
                    0x004048b2
                    0x004048b2
                    0x004048bf
                    0x004048c4
                    0x00000000
                    0x00000000
                    0x004048c8
                    0x004048ca
                    0x004048ca
                    0x004048d3
                    0x004048d5
                    0x004048da
                    0x004048dd
                    0x004048e2
                    0x00000000
                    0x00000000
                    0x00000000
                    0x00000000
                    0x004048e2
                    0x0040493f
                    0x00404949
                    0x0040494c
                    0x0040494f
                    0x00404956
                    0x00404956
                    0x00404958
                    0x00404958
                    0x0040495d
                    0x0040495f
                    0x00404967
                    0x0040496e
                    0x00404970
                    0x0040497b
                    0x0040497b
                    0x00404970
                    0x0040498b
                    0x00404995
                    0x0040499d
                    0x004049b8
                    0x0040499f
                    0x004049a8
                    0x004049a8
                    0x0040499d
                    0x004049bd
                    0x004049c2
                    0x004049c7
                    0x004049d0
                    0x004049d0
                    0x004049d9
                    0x004049db
                    0x004049db
                    0x004049e7
                    0x004049ef
                    0x004049f9
                    0x004049f9
                    0x004049fe
                    0x00000000
                    0x004049fe
                    0x004048a8
                    0x0040485f
                    0x00404866
                    0x00000000
                    0x00000000
                    0x00000000
                    0x00404866
                    0x00404785
                    0x0040478e
                    0x004047a8
                    0x004047ad
                    0x004047b7
                    0x004047be
                    0x004047ca
                    0x004047cd
                    0x004047d0
                    0x004047d7
                    0x004047df
                    0x004047e2
                    0x004047e6
                    0x004047ed
                    0x004047f5
                    0x0040484f
                    0x004047f7
                    0x004047f8
                    0x004047ff
                    0x00404809
                    0x00404811
                    0x0040481e
                    0x00404832
                    0x00404836
                    0x00404836
                    0x00404832
                    0x0040483b
                    0x00404848
                    0x00404848
                    0x004047f5
                    0x00000000
                    0x004047ad
                    0x0040479b
                    0x00000000
                    0x00000000
                    0x004047a1
                    0x00000000
                    0x0040470c
                    0x00404719
                    0x00404722
                    0x0040472f
                    0x0040472f
                    0x00404736
                    0x0040473c
                    0x00404745
                    0x00404748
                    0x0040474b
                    0x00404753
                    0x00404756
                    0x00404759
                    0x0040475f
                    0x00404766
                    0x0040476d
                    0x00404a04
                    0x00404a16
                    0x00404773
                    0x00404776
                    0x00000000
                    0x00404776
                    0x0040476d

                    APIs
                    • GetDlgItem.USER32 ref: 00404712
                    • SetWindowTextW.USER32(00000000,?), ref: 0040473C
                    • SHBrowseForFolderW.SHELL32(?), ref: 004047ED
                    • CoTaskMemFree.OLE32(00000000), ref: 004047F8
                    • lstrcmpiW.KERNEL32(Call,007A1F20,00000000,?,?), ref: 0040482A
                    • lstrcatW.KERNEL32(?,Call), ref: 00404836
                    • SetDlgItemTextW.USER32 ref: 00404848
                      • Part of subcall function 004058A5: GetDlgItemTextW.USER32 ref: 004058B8
                      • Part of subcall function 004064F3: CharNextW.USER32(?,*?|<>/":,00000000,00000000,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,"C:\Users\user\Desktop\Ordene 501527,pdf.exe" ,0040332B,C:\Users\user\AppData\Local\Temp\,76DDFAA0,0040359C,?,00000006,00000008,0000000A), ref: 00406556
                      • Part of subcall function 004064F3: CharNextW.USER32(?,?,?,00000000,?,00000006,00000008,0000000A), ref: 00406565
                      • Part of subcall function 004064F3: CharNextW.USER32(?,00000000,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,"C:\Users\user\Desktop\Ordene 501527,pdf.exe" ,0040332B,C:\Users\user\AppData\Local\Temp\,76DDFAA0,0040359C,?,00000006,00000008,0000000A), ref: 0040656A
                      • Part of subcall function 004064F3: CharPrevW.USER32(?,?,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,"C:\Users\user\Desktop\Ordene 501527,pdf.exe" ,0040332B,C:\Users\user\AppData\Local\Temp\,76DDFAA0,0040359C,?,00000006,00000008,0000000A), ref: 0040657D
                    • GetDiskFreeSpaceW.KERNEL32(0079FEF0,?,?,0000040F,?,0079FEF0,0079FEF0,?,00000001,0079FEF0,?,?,000003FB,?), ref: 0040490B
                    • MulDiv.KERNEL32(?,0000040F,00000400), ref: 00404926
                      • Part of subcall function 00404A7F: lstrlenW.KERNEL32(007A1F20,007A1F20,?,%u.%u%s%s,00000005,00000000,00000000,?,000000DC,00000000,?,000000DF,00000000,00000400,?), ref: 00404B20
                      • Part of subcall function 00404A7F: wsprintfW.USER32 ref: 00404B29
                      • Part of subcall function 00404A7F: SetDlgItemTextW.USER32 ref: 00404B3C
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.668679627.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000000.00000002.668672686.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.668695651.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.668709908.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.669360772.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.669367484.0000000000782000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.669373527.0000000000786000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.669383228.0000000000789000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.669410918.00000000007A4000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.669416138.00000000007A6000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.669434006.00000000007B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.669445400.00000000007C4000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.669547952.0000000000804000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_400000_Ordene 501527,pdf.jbxd
                    Similarity
                    • API ID: CharItemText$Next$Free$BrowseDiskFolderPrevSpaceTaskWindowlstrcatlstrcmpilstrlenwsprintf
                    • String ID: A$C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Misundes\Caesural4$Call
                    • API String ID: 2624150263-1425269780
                    • Opcode ID: e9882f7b0ef9537cf38941fce864badccbf8f2673c206fa21d953f132ce6087b
                    • Instruction ID: 1a43a6be4abc44de482ff05cd7d85368efa207dbef88ee5e6ca465c7332a2ce1
                    • Opcode Fuzzy Hash: e9882f7b0ef9537cf38941fce864badccbf8f2673c206fa21d953f132ce6087b
                    • Instruction Fuzzy Hash: B0A1AEF1900209ABDB11AFA5CD45AAFB7B8EF84314F10843BF611B62D1DB7C99418B69
                    Uniqueness

                    Uniqueness Score: -1.00%

                    C-Code - Quality: 67%
                    			E004020FE() {
                    				signed int _t52;
                    				void* _t56;
                    				intOrPtr* _t60;
                    				intOrPtr _t61;
                    				intOrPtr* _t62;
                    				intOrPtr* _t64;
                    				intOrPtr* _t66;
                    				intOrPtr* _t68;
                    				intOrPtr* _t70;
                    				intOrPtr* _t72;
                    				intOrPtr* _t74;
                    				intOrPtr* _t76;
                    				intOrPtr* _t78;
                    				intOrPtr* _t80;
                    				void* _t83;
                    				intOrPtr* _t91;
                    				signed int _t101;
                    				signed int _t105;
                    				void* _t107;
                    
                    				 *((intOrPtr*)(_t107 - 0x4c)) = E00402C37(0xfffffff0);
                    				 *((intOrPtr*)(_t107 - 0x3c)) = E00402C37(0xffffffdf);
                    				 *((intOrPtr*)(_t107 - 8)) = E00402C37(2);
                    				 *((intOrPtr*)(_t107 - 0x48)) = E00402C37(0xffffffcd);
                    				 *((intOrPtr*)(_t107 - 0xc)) = E00402C37(0x45);
                    				_t52 =  *(_t107 - 0x18);
                    				 *(_t107 - 0x44) = _t52 & 0x00000fff;
                    				_t101 = _t52 & 0x00008000;
                    				_t105 = _t52 >> 0x0000000c & 0x00000007;
                    				 *(_t107 - 0x38) = _t52 >> 0x00000010 & 0x0000ffff;
                    				if(E00405BA7( *((intOrPtr*)(_t107 - 0x3c))) == 0) {
                    					E00402C37(0x21);
                    				}
                    				_t56 = _t107 + 8;
                    				__imp__CoCreateInstance(0x4084dc, _t83, 1, 0x4084cc, _t56);
                    				if(_t56 < _t83) {
                    					L14:
                    					 *((intOrPtr*)(_t107 - 4)) = 1;
                    					_push(0xfffffff0);
                    				} else {
                    					_t60 =  *((intOrPtr*)(_t107 + 8));
                    					_t61 =  *((intOrPtr*)( *_t60))(_t60, 0x4084ec, _t107 - 0x30);
                    					 *((intOrPtr*)(_t107 - 0x10)) = _t61;
                    					if(_t61 >= _t83) {
                    						_t64 =  *((intOrPtr*)(_t107 + 8));
                    						 *((intOrPtr*)(_t107 - 0x10)) =  *((intOrPtr*)( *_t64 + 0x50))(_t64,  *((intOrPtr*)(_t107 - 0x3c)));
                    						if(_t101 == _t83) {
                    							_t80 =  *((intOrPtr*)(_t107 + 8));
                    							 *((intOrPtr*)( *_t80 + 0x24))(_t80, L"C:\\Users\\alfons\\AppData\\Roaming\\Microsoft\\Windows\\Start Menu\\Misundes\\Caesural4\\Kvalitative209");
                    						}
                    						if(_t105 != _t83) {
                    							_t78 =  *((intOrPtr*)(_t107 + 8));
                    							 *((intOrPtr*)( *_t78 + 0x3c))(_t78, _t105);
                    						}
                    						_t66 =  *((intOrPtr*)(_t107 + 8));
                    						 *((intOrPtr*)( *_t66 + 0x34))(_t66,  *(_t107 - 0x38));
                    						_t91 =  *((intOrPtr*)(_t107 - 0x48));
                    						if( *_t91 != _t83) {
                    							_t76 =  *((intOrPtr*)(_t107 + 8));
                    							 *((intOrPtr*)( *_t76 + 0x44))(_t76, _t91,  *(_t107 - 0x44));
                    						}
                    						_t68 =  *((intOrPtr*)(_t107 + 8));
                    						 *((intOrPtr*)( *_t68 + 0x2c))(_t68,  *((intOrPtr*)(_t107 - 8)));
                    						_t70 =  *((intOrPtr*)(_t107 + 8));
                    						 *((intOrPtr*)( *_t70 + 0x1c))(_t70,  *((intOrPtr*)(_t107 - 0xc)));
                    						if( *((intOrPtr*)(_t107 - 0x10)) >= _t83) {
                    							_t74 =  *((intOrPtr*)(_t107 - 0x30));
                    							 *((intOrPtr*)(_t107 - 0x10)) =  *((intOrPtr*)( *_t74 + 0x18))(_t74,  *((intOrPtr*)(_t107 - 0x4c)), 1);
                    						}
                    						_t72 =  *((intOrPtr*)(_t107 - 0x30));
                    						 *((intOrPtr*)( *_t72 + 8))(_t72);
                    					}
                    					_t62 =  *((intOrPtr*)(_t107 + 8));
                    					 *((intOrPtr*)( *_t62 + 8))(_t62);
                    					if( *((intOrPtr*)(_t107 - 0x10)) >= _t83) {
                    						_push(0xfffffff4);
                    					} else {
                    						goto L14;
                    					}
                    				}
                    				E00401423();
                    				 *0x7a8ac8 =  *0x7a8ac8 +  *((intOrPtr*)(_t107 - 4));
                    				return 0;
                    			}






















                    0x00402107
                    0x00402111
                    0x0040211b
                    0x00402125
                    0x00402130
                    0x00402133
                    0x0040214d
                    0x00402150
                    0x00402156
                    0x00402159
                    0x00402163
                    0x00402167
                    0x00402167
                    0x0040216c
                    0x0040217d
                    0x00402185
                    0x0040223c
                    0x0040223c
                    0x00402243
                    0x0040218b
                    0x0040218b
                    0x0040219a
                    0x0040219e
                    0x004021a1
                    0x004021a7
                    0x004021b5
                    0x004021b8
                    0x004021ba
                    0x004021c5
                    0x004021c5
                    0x004021ca
                    0x004021cc
                    0x004021d3
                    0x004021d3
                    0x004021d6
                    0x004021df
                    0x004021e2
                    0x004021e8
                    0x004021ea
                    0x004021f4
                    0x004021f4
                    0x004021f7
                    0x00402200
                    0x00402203
                    0x0040220c
                    0x00402212
                    0x00402214
                    0x00402222
                    0x00402222
                    0x00402225
                    0x0040222b
                    0x0040222b
                    0x0040222e
                    0x00402234
                    0x0040223a
                    0x0040224f
                    0x00000000
                    0x00000000
                    0x00000000
                    0x0040223a
                    0x00402245
                    0x00402ac2
                    0x00402ace

                    APIs
                    • CoCreateInstance.OLE32(004084DC,?,00000001,004084CC,?,?,00000045,000000CD,00000002,000000DF,000000F0), ref: 0040217D
                    Strings
                    • C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Misundes\Caesural4\Kvalitative209, xrefs: 004021BD
                    Memory Dump Source
                    • Source File: 00000000.00000002.668679627.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000000.00000002.668672686.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.668695651.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.668709908.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.669360772.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.669367484.0000000000782000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.669373527.0000000000786000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.669383228.0000000000789000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.669410918.00000000007A4000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.669416138.00000000007A6000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.669434006.00000000007B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.669445400.00000000007C4000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.669547952.0000000000804000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_400000_Ordene 501527,pdf.jbxd
                    Similarity
                    • API ID: CreateInstance
                    • String ID: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Misundes\Caesural4\Kvalitative209
                    • API String ID: 542301482-301568489
                    • Opcode ID: 5d02da331e717d4bd24b1140cd69b5d60dabff81ac92efc8c05a4b18c16e4ded
                    • Instruction ID: 12128347f435f69461b39f0114e3e01667000ffa0243525f0bda7dd6f9c1772f
                    • Opcode Fuzzy Hash: 5d02da331e717d4bd24b1140cd69b5d60dabff81ac92efc8c05a4b18c16e4ded
                    • Instruction Fuzzy Hash: BF4139B5A00208AFCB10DFE4C988AAEBBB5FF48314F20457AF515EB2D1DB799941CB44
                    Uniqueness

                    Uniqueness Score: -1.00%

                    C-Code - Quality: 39%
                    			E00402862(short __ebx, short* __esi) {
                    				void* _t21;
                    
                    				if(FindFirstFileW(E00402C37(2), _t21 - 0x2d4) != 0xffffffff) {
                    					E004061A6( *((intOrPtr*)(_t21 - 0xc)), _t8);
                    					_push(_t21 - 0x2a8);
                    					_push(__esi);
                    					E0040625F();
                    				} else {
                    					 *((short*)( *((intOrPtr*)(_t21 - 0xc)))) = __ebx;
                    					 *__esi = __ebx;
                    					 *((intOrPtr*)(_t21 - 4)) = 1;
                    				}
                    				 *0x7a8ac8 =  *0x7a8ac8 +  *((intOrPtr*)(_t21 - 4));
                    				return 0;
                    			}




                    0x0040287a
                    0x00402895
                    0x004028a0
                    0x004028a1
                    0x004029db
                    0x0040287c
                    0x0040287f
                    0x00402882
                    0x00402885
                    0x00402885
                    0x00402ac2
                    0x00402ace

                    APIs
                    • FindFirstFileW.KERNEL32(00000000,?,00000002), ref: 00402871
                    Memory Dump Source
                    • Source File: 00000000.00000002.668679627.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000000.00000002.668672686.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.668695651.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.668709908.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.669360772.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.669367484.0000000000782000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.669373527.0000000000786000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.669383228.0000000000789000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.669410918.00000000007A4000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.669416138.00000000007A6000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.669434006.00000000007B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.669445400.00000000007C4000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.669547952.0000000000804000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_400000_Ordene 501527,pdf.jbxd
                    Similarity
                    • API ID: FileFindFirst
                    • String ID:
                    • API String ID: 1974802433-0
                    • Opcode ID: 045abd903db1813207f14bef19d87b65732d00bc27e8df11d95e2df8592133f2
                    • Instruction ID: cb5017da262a82374af33b7b9c4435bd67f431664fd16e1eaa48b990974d77dd
                    • Opcode Fuzzy Hash: 045abd903db1813207f14bef19d87b65732d00bc27e8df11d95e2df8592133f2
                    • Instruction Fuzzy Hash: 88F08C71A04104AFDB10EBA4DE49AADB378EF10314F2046BBF501F21D1DBB84E819B2A
                    Uniqueness

                    Uniqueness Score: -1.00%

                    C-Code - Quality: 93%
                    			E00404391(struct HWND__* _a4, int _a8, unsigned int _a12, WCHAR* _a16) {
                    				intOrPtr _v8;
                    				int _v12;
                    				void* _v16;
                    				struct HWND__* _t56;
                    				intOrPtr _t69;
                    				signed int _t75;
                    				signed short* _t76;
                    				signed short* _t78;
                    				long _t92;
                    				int _t103;
                    				signed int _t108;
                    				signed int _t110;
                    				intOrPtr _t113;
                    				WCHAR* _t114;
                    				signed int* _t116;
                    				WCHAR* _t117;
                    				struct HWND__* _t118;
                    
                    				if(_a8 != 0x110) {
                    					__eflags = _a8 - 0x111;
                    					if(_a8 != 0x111) {
                    						L13:
                    						__eflags = _a8 - 0x4e;
                    						if(_a8 != 0x4e) {
                    							__eflags = _a8 - 0x40b;
                    							if(_a8 == 0x40b) {
                    								 *0x79feec =  *0x79feec + 1;
                    								__eflags =  *0x79feec;
                    							}
                    							L27:
                    							_t114 = _a16;
                    							L28:
                    							return E0040425B(_a8, _a12, _t114);
                    						}
                    						_t56 = GetDlgItem(_a4, 0x3e8);
                    						_t114 = _a16;
                    						__eflags =  *((intOrPtr*)(_t114 + 8)) - 0x70b;
                    						if( *((intOrPtr*)(_t114 + 8)) == 0x70b) {
                    							__eflags =  *((intOrPtr*)(_t114 + 0xc)) - 0x201;
                    							if( *((intOrPtr*)(_t114 + 0xc)) == 0x201) {
                    								_t103 =  *((intOrPtr*)(_t114 + 0x1c));
                    								_t113 =  *((intOrPtr*)(_t114 + 0x18));
                    								_v12 = _t103;
                    								__eflags = _t103 - _t113 - 0x800;
                    								_v16 = _t113;
                    								_v8 = 0x7a69c0;
                    								if(_t103 - _t113 < 0x800) {
                    									SendMessageW(_t56, 0x44b, 0,  &_v16);
                    									SetCursor(LoadCursorW(0, 0x7f02));
                    									_push(1);
                    									E00404640(_a4, _v8);
                    									SetCursor(LoadCursorW(0, 0x7f00));
                    									_t114 = _a16;
                    								}
                    							}
                    						}
                    						__eflags =  *((intOrPtr*)(_t114 + 8)) - 0x700;
                    						if( *((intOrPtr*)(_t114 + 8)) != 0x700) {
                    							goto L28;
                    						} else {
                    							__eflags =  *((intOrPtr*)(_t114 + 0xc)) - 0x100;
                    							if( *((intOrPtr*)(_t114 + 0xc)) != 0x100) {
                    								goto L28;
                    							}
                    							__eflags =  *((intOrPtr*)(_t114 + 0x10)) - 0xd;
                    							if( *((intOrPtr*)(_t114 + 0x10)) == 0xd) {
                    								SendMessageW( *0x7a8a28, 0x111, 1, 0);
                    							}
                    							__eflags =  *((intOrPtr*)(_t114 + 0x10)) - 0x1b;
                    							if( *((intOrPtr*)(_t114 + 0x10)) == 0x1b) {
                    								SendMessageW( *0x7a8a28, 0x10, 0, 0);
                    							}
                    							return 1;
                    						}
                    					}
                    					__eflags = _a12 >> 0x10;
                    					if(_a12 >> 0x10 != 0) {
                    						goto L27;
                    					}
                    					__eflags =  *0x79feec; // 0x0
                    					if(__eflags != 0) {
                    						goto L27;
                    					}
                    					_t69 =  *0x7a0ef8; // 0xb899cc
                    					_t29 = _t69 + 0x14; // 0xb899e0
                    					_t116 = _t29;
                    					__eflags =  *_t116 & 0x00000020;
                    					if(( *_t116 & 0x00000020) == 0) {
                    						goto L27;
                    					}
                    					_t108 =  *_t116 & 0xfffffffe | SendMessageW(GetDlgItem(_a4, 0x40a), 0xf0, 0, 0) & 0x00000001;
                    					__eflags = _t108;
                    					 *_t116 = _t108;
                    					E00404216(SendMessageW(GetDlgItem(_a4, 0x40a), 0xf0, 0, 0) & 0x00000001);
                    					E0040461C();
                    					goto L13;
                    				} else {
                    					_t117 = _a16;
                    					_t75 =  *(_t117 + 0x30);
                    					if(_t75 < 0) {
                    						_t75 =  *( *0x7a79fc - 4 + _t75 * 4);
                    					}
                    					_t76 =  *0x7a8a78 + _t75 * 2;
                    					_t110 =  *_t76 & 0x0000ffff;
                    					_a8 = _t110;
                    					_t78 =  &(_t76[1]);
                    					_a16 = _t78;
                    					_v16 = _t78;
                    					_v12 = 0;
                    					_v8 = E00404342;
                    					if(_t110 != 2) {
                    						_v8 = E00404308;
                    					}
                    					_push( *((intOrPtr*)(_t117 + 0x34)));
                    					_push(0x22);
                    					E004041F4(_a4);
                    					_push( *((intOrPtr*)(_t117 + 0x38)));
                    					_push(0x23);
                    					E004041F4(_a4);
                    					CheckDlgButton(_a4, (0 | ( !( *(_t117 + 0x14)) >> 0x00000005 & 0x00000001 |  *(_t117 + 0x14) & 0x00000001) == 0x00000000) + 0x40a, 1);
                    					E00404216( !( *(_t117 + 0x14)) >> 0x00000005 & 0x00000001 |  *(_t117 + 0x14) & 0x00000001);
                    					_t118 = GetDlgItem(_a4, 0x3e8);
                    					E00404229(_t118);
                    					SendMessageW(_t118, 0x45b, 1, 0);
                    					_t92 =  *( *0x7a8a34 + 0x68);
                    					if(_t92 < 0) {
                    						_t92 = GetSysColor( ~_t92);
                    					}
                    					SendMessageW(_t118, 0x443, 0, _t92);
                    					SendMessageW(_t118, 0x445, 0, 0x4010000);
                    					SendMessageW(_t118, 0x435, 0, lstrlenW(_a16));
                    					 *0x79feec = 0;
                    					SendMessageW(_t118, 0x449, _a8,  &_v16);
                    					 *0x79feec = 0;
                    					return 0;
                    				}
                    			}




















                    0x004043a3
                    0x004044c3
                    0x004044d0
                    0x0040452d
                    0x0040452d
                    0x00404531
                    0x004045f7
                    0x004045fe
                    0x00404600
                    0x00404600
                    0x00404600
                    0x00404606
                    0x00404606
                    0x00404609
                    0x00000000
                    0x00404610
                    0x0040453f
                    0x00404545
                    0x00404548
                    0x0040454f
                    0x00404551
                    0x00404558
                    0x0040455a
                    0x0040455d
                    0x00404560
                    0x00404565
                    0x0040456b
                    0x0040456e
                    0x00404575
                    0x00404582
                    0x00404593
                    0x00404599
                    0x004045a1
                    0x004045af
                    0x004045b5
                    0x004045b5
                    0x00404575
                    0x00404558
                    0x004045b8
                    0x004045bf
                    0x00000000
                    0x004045c1
                    0x004045c1
                    0x004045c8
                    0x00000000
                    0x00000000
                    0x004045ca
                    0x004045ce
                    0x004045de
                    0x004045de
                    0x004045e0
                    0x004045e4
                    0x004045f0
                    0x004045f0
                    0x00000000
                    0x004045f4
                    0x004045bf
                    0x004044d8
                    0x004044db
                    0x00000000
                    0x00000000
                    0x004044e1
                    0x004044e7
                    0x00000000
                    0x00000000
                    0x004044ed
                    0x004044f2
                    0x004044f2
                    0x004044f5
                    0x004044f8
                    0x00000000
                    0x00000000
                    0x0040451f
                    0x0040451f
                    0x00404521
                    0x00404523
                    0x00404528
                    0x00000000
                    0x004043a9
                    0x004043a9
                    0x004043ac
                    0x004043b1
                    0x004043c2
                    0x004043c2
                    0x004043ca
                    0x004043cd
                    0x004043d1
                    0x004043d4
                    0x004043d8
                    0x004043db
                    0x004043de
                    0x004043e1
                    0x004043e8
                    0x004043ea
                    0x004043ea
                    0x004043f4
                    0x00404401
                    0x0040440b
                    0x00404410
                    0x00404413
                    0x00404418
                    0x0040442f
                    0x00404436
                    0x00404449
                    0x0040444c
                    0x00404460
                    0x00404467
                    0x0040446c
                    0x00404471
                    0x00404471
                    0x0040447f
                    0x0040448d
                    0x0040449f
                    0x004044a4
                    0x004044b4
                    0x004044b6
                    0x00000000
                    0x004044bc

                    APIs
                    • CheckDlgButton.USER32(?,-0000040A,00000001), ref: 0040442F
                    • GetDlgItem.USER32 ref: 00404443
                    • SendMessageW.USER32(00000000,0000045B,00000001,00000000), ref: 00404460
                    • GetSysColor.USER32(?), ref: 00404471
                    • SendMessageW.USER32(00000000,00000443,00000000,?), ref: 0040447F
                    • SendMessageW.USER32(00000000,00000445,00000000,04010000), ref: 0040448D
                    • lstrlenW.KERNEL32(?), ref: 00404492
                    • SendMessageW.USER32(00000000,00000435,00000000,00000000), ref: 0040449F
                    • SendMessageW.USER32(00000000,00000449,00000110,00000110), ref: 004044B4
                    • GetDlgItem.USER32 ref: 0040450D
                    • SendMessageW.USER32(00000000), ref: 00404514
                    • GetDlgItem.USER32 ref: 0040453F
                    • SendMessageW.USER32(00000000,0000044B,00000000,00000201), ref: 00404582
                    • LoadCursorW.USER32(00000000,00007F02), ref: 00404590
                    • SetCursor.USER32(00000000), ref: 00404593
                    • LoadCursorW.USER32(00000000,00007F00), ref: 004045AC
                    • SetCursor.USER32(00000000), ref: 004045AF
                    • SendMessageW.USER32(00000111,00000001,00000000), ref: 004045DE
                    • SendMessageW.USER32(00000010,00000000,00000000), ref: 004045F0
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.668679627.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000000.00000002.668672686.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.668695651.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.668709908.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.669360772.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.669367484.0000000000782000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.669373527.0000000000786000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.669383228.0000000000789000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.669410918.00000000007A4000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.669416138.00000000007A6000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.669434006.00000000007B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.669445400.00000000007C4000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.669547952.0000000000804000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_400000_Ordene 501527,pdf.jbxd
                    Similarity
                    • API ID: MessageSend$Cursor$Item$Load$ButtonCheckColorlstrlen
                    • String ID: Call$N
                    • API String ID: 3103080414-3438112850
                    • Opcode ID: 631cabfc39bdc86844b6c5ef759f4df1482c42644a70fa64dc4549b5ea516eb1
                    • Instruction ID: 51cb052740ae368b0964ded38bc47e0fd82963d20e12a5d8f79ead0afd290bbe
                    • Opcode Fuzzy Hash: 631cabfc39bdc86844b6c5ef759f4df1482c42644a70fa64dc4549b5ea516eb1
                    • Instruction Fuzzy Hash: 636190B1900209BFDB10DF60DD45AAA7B69FB85344F00853AF705B61E0DB7DA951CF98
                    Uniqueness

                    Uniqueness Score: -1.00%

                    C-Code - Quality: 90%
                    			E00401000(struct HWND__* _a4, void* _a8, signed int _a12, void* _a16) {
                    				struct tagLOGBRUSH _v16;
                    				struct tagRECT _v32;
                    				struct tagPAINTSTRUCT _v96;
                    				struct HDC__* _t70;
                    				struct HBRUSH__* _t87;
                    				struct HFONT__* _t94;
                    				long _t102;
                    				signed int _t126;
                    				struct HDC__* _t128;
                    				intOrPtr _t130;
                    
                    				if(_a8 == 0xf) {
                    					_t130 =  *0x7a8a34;
                    					_t70 = BeginPaint(_a4,  &_v96);
                    					_v16.lbStyle = _v16.lbStyle & 0x00000000;
                    					_a8 = _t70;
                    					GetClientRect(_a4,  &_v32);
                    					_t126 = _v32.bottom;
                    					_v32.bottom = _v32.bottom & 0x00000000;
                    					while(_v32.top < _t126) {
                    						_a12 = _t126 - _v32.top;
                    						asm("cdq");
                    						asm("cdq");
                    						asm("cdq");
                    						_v16.lbColor = 0 << 0x00000008 | (( *(_t130 + 0x50) & 0x000000ff) * _a12 + ( *(_t130 + 0x54) & 0x000000ff) * _v32.top) / _t126 & 0x000000ff;
                    						_t87 = CreateBrushIndirect( &_v16);
                    						_v32.bottom = _v32.bottom + 4;
                    						_a16 = _t87;
                    						FillRect(_a8,  &_v32, _t87);
                    						DeleteObject(_a16);
                    						_v32.top = _v32.top + 4;
                    					}
                    					if( *(_t130 + 0x58) != 0xffffffff) {
                    						_t94 = CreateFontIndirectW( *(_t130 + 0x34));
                    						_a16 = _t94;
                    						if(_t94 != 0) {
                    							_t128 = _a8;
                    							_v32.left = 0x10;
                    							_v32.top = 8;
                    							SetBkMode(_t128, 1);
                    							SetTextColor(_t128,  *(_t130 + 0x58));
                    							_a8 = SelectObject(_t128, _a16);
                    							DrawTextW(_t128, 0x7a7a20, 0xffffffff,  &_v32, 0x820);
                    							SelectObject(_t128, _a8);
                    							DeleteObject(_a16);
                    						}
                    					}
                    					EndPaint(_a4,  &_v96);
                    					return 0;
                    				}
                    				_t102 = _a16;
                    				if(_a8 == 0x46) {
                    					 *(_t102 + 0x18) =  *(_t102 + 0x18) | 0x00000010;
                    					 *((intOrPtr*)(_t102 + 4)) =  *0x7a8a28;
                    				}
                    				return DefWindowProcW(_a4, _a8, _a12, _t102);
                    			}













                    0x0040100a
                    0x00401039
                    0x00401047
                    0x0040104d
                    0x00401051
                    0x0040105b
                    0x00401061
                    0x00401064
                    0x004010f3
                    0x00401089
                    0x0040108c
                    0x004010a6
                    0x004010bd
                    0x004010cc
                    0x004010cf
                    0x004010d5
                    0x004010d9
                    0x004010e4
                    0x004010ed
                    0x004010ef
                    0x004010ef
                    0x00401100
                    0x00401105
                    0x0040110d
                    0x00401110
                    0x00401112
                    0x00401118
                    0x0040111f
                    0x00401126
                    0x00401130
                    0x00401142
                    0x00401156
                    0x00401160
                    0x00401165
                    0x00401165
                    0x00401110
                    0x0040116e
                    0x00000000
                    0x00401178
                    0x00401010
                    0x00401013
                    0x00401015
                    0x0040101f
                    0x0040101f
                    0x00000000

                    APIs
                    • DefWindowProcW.USER32(?,00000046,?,?), ref: 0040102C
                    • BeginPaint.USER32(?,?), ref: 00401047
                    • GetClientRect.USER32 ref: 0040105B
                    • CreateBrushIndirect.GDI32(00000000), ref: 004010CF
                    • FillRect.USER32 ref: 004010E4
                    • DeleteObject.GDI32(?), ref: 004010ED
                    • CreateFontIndirectW.GDI32(?), ref: 00401105
                    • SetBkMode.GDI32(00000000,00000001), ref: 00401126
                    • SetTextColor.GDI32(00000000,000000FF), ref: 00401130
                    • SelectObject.GDI32(00000000,?), ref: 00401140
                    • DrawTextW.USER32(00000000,007A7A20,000000FF,00000010,00000820), ref: 00401156
                    • SelectObject.GDI32(00000000,00000000), ref: 00401160
                    • DeleteObject.GDI32(?), ref: 00401165
                    • EndPaint.USER32(?,?), ref: 0040116E
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.668679627.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000000.00000002.668672686.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.668695651.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.668709908.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.669360772.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.669367484.0000000000782000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.669373527.0000000000786000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.669383228.0000000000789000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.669410918.00000000007A4000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.669416138.00000000007A6000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.669434006.00000000007B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.669445400.00000000007C4000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.669547952.0000000000804000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_400000_Ordene 501527,pdf.jbxd
                    Similarity
                    • API ID: Object$CreateDeleteIndirectPaintRectSelectText$BeginBrushClientColorDrawFillFontModeProcWindow
                    • String ID: F
                    • API String ID: 941294808-1304234792
                    • Opcode ID: 218f2c87b148b58c94c6785b51cf5afc075c1faf60bc5df3e6f759b2377d660f
                    • Instruction ID: 0958fbfe94b1809001ec2c76305b3cf500f7264b01c73c256976ee1787a3906e
                    • Opcode Fuzzy Hash: 218f2c87b148b58c94c6785b51cf5afc075c1faf60bc5df3e6f759b2377d660f
                    • Instruction Fuzzy Hash: B1418C71800209AFCF058F95DE459AF7BB9FF45310F00842AF591AA1A0CB38D954DFA4
                    Uniqueness

                    Uniqueness Score: -1.00%

                    C-Code - Quality: 100%
                    			E00405EAB(void* __ecx) {
                    				void* __ebx;
                    				void* __edi;
                    				void* __esi;
                    				long _t12;
                    				long _t24;
                    				char* _t31;
                    				int _t37;
                    				void* _t38;
                    				intOrPtr* _t39;
                    				long _t42;
                    				WCHAR* _t44;
                    				void* _t46;
                    				void* _t48;
                    				void* _t49;
                    				void* _t52;
                    				void* _t53;
                    
                    				_t38 = __ecx;
                    				_t44 =  *(_t52 + 0x14);
                    				 *0x7a55c0 = 0x55004e;
                    				 *0x7a55c4 = 0x4c;
                    				if(_t44 == 0) {
                    					L3:
                    					_t12 = GetShortPathNameW( *(_t52 + 0x1c), 0x7a5dc0, 0x400);
                    					if(_t12 != 0 && _t12 <= 0x400) {
                    						_t37 = wsprintfA(0x7a51c0, "%ls=%ls\r\n", 0x7a55c0, 0x7a5dc0);
                    						_t53 = _t52 + 0x10;
                    						E00406281(_t37, 0x400, 0x7a5dc0, 0x7a5dc0,  *((intOrPtr*)( *0x7a8a34 + 0x128)));
                    						_t12 = E00405D51(0x7a5dc0, 0xc0000000, 4);
                    						_t48 = _t12;
                    						 *(_t53 + 0x18) = _t48;
                    						if(_t48 != 0xffffffff) {
                    							_t42 = GetFileSize(_t48, 0);
                    							_t6 = _t37 + 0xa; // 0xa
                    							_t46 = GlobalAlloc(0x40, _t42 + _t6);
                    							if(_t46 == 0 || E00405DD4(_t48, _t46, _t42) == 0) {
                    								L18:
                    								return CloseHandle(_t48);
                    							} else {
                    								if(E00405CB6(_t38, _t46, "[Rename]\r\n") != 0) {
                    									_t49 = E00405CB6(_t38, _t21 + 0xa, "\n[");
                    									if(_t49 == 0) {
                    										_t48 =  *(_t53 + 0x18);
                    										L16:
                    										_t24 = _t42;
                    										L17:
                    										E00405D0C(_t24 + _t46, 0x7a51c0, _t37);
                    										SetFilePointer(_t48, 0, 0, 0);
                    										E00405E03(_t48, _t46, _t42 + _t37);
                    										GlobalFree(_t46);
                    										goto L18;
                    									}
                    									_t39 = _t46 + _t42;
                    									_t31 = _t39 + _t37;
                    									while(_t39 > _t49) {
                    										 *_t31 =  *_t39;
                    										_t31 = _t31 - 1;
                    										_t39 = _t39 - 1;
                    									}
                    									_t24 = _t49 - _t46 + 1;
                    									_t48 =  *(_t53 + 0x18);
                    									goto L17;
                    								}
                    								lstrcpyA(_t46 + _t42, "[Rename]\r\n");
                    								_t42 = _t42 + 0xa;
                    								goto L16;
                    							}
                    						}
                    					}
                    				} else {
                    					CloseHandle(E00405D51(_t44, 0, 1));
                    					_t12 = GetShortPathNameW(_t44, 0x7a55c0, 0x400);
                    					if(_t12 != 0 && _t12 <= 0x400) {
                    						goto L3;
                    					}
                    				}
                    				return _t12;
                    			}



















                    0x00405eab
                    0x00405eb4
                    0x00405ebb
                    0x00405ec5
                    0x00405ed9
                    0x00405f01
                    0x00405f0c
                    0x00405f10
                    0x00405f30
                    0x00405f37
                    0x00405f41
                    0x00405f4e
                    0x00405f53
                    0x00405f58
                    0x00405f5c
                    0x00405f6b
                    0x00405f6d
                    0x00405f7a
                    0x00405f7e
                    0x00406019
                    0x00000000
                    0x00405f94
                    0x00405fa1
                    0x00405fc5
                    0x00405fc9
                    0x00405fe8
                    0x00405fec
                    0x00405fec
                    0x00405fee
                    0x00405ff7
                    0x00406002
                    0x0040600d
                    0x00406013
                    0x00000000
                    0x00406013
                    0x00405fcb
                    0x00405fce
                    0x00405fd9
                    0x00405fd5
                    0x00405fd7
                    0x00405fd8
                    0x00405fd8
                    0x00405fe0
                    0x00405fe2
                    0x00000000
                    0x00405fe2
                    0x00405fac
                    0x00405fb2
                    0x00000000
                    0x00405fb2
                    0x00405f7e
                    0x00405f5c
                    0x00405edb
                    0x00405ee6
                    0x00405eef
                    0x00405ef3
                    0x00000000
                    0x00000000
                    0x00405ef3
                    0x00406024

                    APIs
                    • CloseHandle.KERNEL32(00000000,?,00000000,00000001,?,00000000,?,?,00406046,?,?), ref: 00405EE6
                    • GetShortPathNameW.KERNEL32 ref: 00405EEF
                      • Part of subcall function 00405CB6: lstrlenA.KERNEL32(00000000,00000000,00000000,00000000,?,00000000,00405F9F,00000000,[Rename],00000000,00000000,00000000,?,?,?,?), ref: 00405CC6
                      • Part of subcall function 00405CB6: lstrlenA.KERNEL32(00000000,?,00000000,00405F9F,00000000,[Rename],00000000,00000000,00000000,?,?,?,?), ref: 00405CF8
                    • GetShortPathNameW.KERNEL32 ref: 00405F0C
                    • wsprintfA.USER32 ref: 00405F2A
                    • GetFileSize.KERNEL32(00000000,00000000,007A5DC0,C0000000,00000004,007A5DC0,?,?,?,?,?), ref: 00405F65
                    • GlobalAlloc.KERNEL32(00000040,0000000A,?,?,?,?), ref: 00405F74
                    • lstrcpyA.KERNEL32(00000000,[Rename],00000000,[Rename],00000000,00000000,00000000,?,?,?,?), ref: 00405FAC
                    • SetFilePointer.KERNEL32(0040A560,00000000,00000000,00000000,00000000,007A51C0,00000000,-0000000A,0040A560,00000000,[Rename],00000000,00000000,00000000), ref: 00406002
                    • GlobalFree.KERNEL32 ref: 00406013
                    • CloseHandle.KERNEL32(00000000,?,?,?,?), ref: 0040601A
                      • Part of subcall function 00405D51: GetFileAttributesW.KERNELBASE(?,00402F01,C:\Users\user\Desktop\Ordene 501527,pdf.exe,80000000,00000003,?,00000006,00000008,0000000A), ref: 00405D55
                      • Part of subcall function 00405D51: CreateFileW.KERNELBASE(?,?,00000001,00000000,?,00000001,00000000,?,00000006,00000008,0000000A), ref: 00405D77
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.668679627.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000000.00000002.668672686.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.668695651.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.668709908.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.669360772.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.669367484.0000000000782000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.669373527.0000000000786000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.669383228.0000000000789000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.669410918.00000000007A4000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.669416138.00000000007A6000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.669434006.00000000007B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.669445400.00000000007C4000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.669547952.0000000000804000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_400000_Ordene 501527,pdf.jbxd
                    Similarity
                    • API ID: File$CloseGlobalHandleNamePathShortlstrlen$AllocAttributesCreateFreePointerSizelstrcpywsprintf
                    • String ID: %ls=%ls$[Rename]
                    • API String ID: 2171350718-461813615
                    • Opcode ID: 9234885be5e57950de04a4ffe204c7f94bcd269eedac1ba9c5005a2d30df1b06
                    • Instruction ID: 89c32d2153287748ec41ed641a28e9b16702ce233dbd70bd77460b6709aa78c6
                    • Opcode Fuzzy Hash: 9234885be5e57950de04a4ffe204c7f94bcd269eedac1ba9c5005a2d30df1b06
                    • Instruction Fuzzy Hash: F8312871601B05BBD220AB619D48F6B3A9CEF85744F14003EFA42F62D2DA7CD8118ABD
                    Uniqueness

                    Uniqueness Score: -1.00%

                    C-Code - Quality: 89%
                    			E100024A4(intOrPtr* _a4) {
                    				intOrPtr _v4;
                    				intOrPtr* _t24;
                    				void* _t26;
                    				intOrPtr _t27;
                    				signed int _t35;
                    				void* _t39;
                    				intOrPtr _t40;
                    				void* _t43;
                    
                    				_t39 = E1000121B();
                    				_t24 = _a4;
                    				_t40 =  *((intOrPtr*)(_t24 + 0x1014));
                    				_v4 = _t40;
                    				_t43 = (_t40 + 0x81 << 5) + _t24;
                    				do {
                    					if( *((intOrPtr*)(_t43 - 4)) != 0xffffffff) {
                    					}
                    					_t35 =  *(_t43 - 8);
                    					if(_t35 <= 7) {
                    						switch( *((intOrPtr*)(_t35 * 4 +  &M100025B4))) {
                    							case 0:
                    								 *_t39 =  *_t39 & 0x00000000;
                    								goto L15;
                    							case 1:
                    								_push( *__eax);
                    								goto L13;
                    							case 2:
                    								__eax = E10001470(__edx,  *__eax,  *((intOrPtr*)(__eax + 4)), __edi);
                    								goto L14;
                    							case 3:
                    								__ecx =  *0x1000406c;
                    								__edx = __ecx - 1;
                    								__eax = MultiByteToWideChar(0, 0,  *__eax, __ecx, __edi, __edx);
                    								__eax =  *0x1000406c;
                    								 *(__edi + __eax * 2 - 2) =  *(__edi + __eax * 2 - 2) & 0x00000000;
                    								goto L15;
                    							case 4:
                    								__eax = lstrcpynW(__edi,  *__eax,  *0x1000406c);
                    								goto L15;
                    							case 5:
                    								_push( *0x1000406c);
                    								_push(__edi);
                    								_push( *__eax);
                    								" {]w@u]w"();
                    								goto L15;
                    							case 6:
                    								_push( *__esi);
                    								L13:
                    								__eax = wsprintfW(__edi, __ebp);
                    								L14:
                    								__esp = __esp + 0xc;
                    								goto L15;
                    						}
                    					}
                    					L15:
                    					_t26 =  *(_t43 + 0x14);
                    					if(_t26 != 0 && ( *_a4 != 2 ||  *((intOrPtr*)(_t43 - 4)) > 0)) {
                    						GlobalFree(_t26);
                    					}
                    					_t27 =  *((intOrPtr*)(_t43 + 0xc));
                    					if(_t27 != 0) {
                    						if(_t27 != 0xffffffff) {
                    							if(_t27 > 0) {
                    								E100012E1(_t27 - 1, _t39);
                    								goto L24;
                    							}
                    						} else {
                    							E10001272(_t39);
                    							L24:
                    						}
                    					}
                    					_v4 = _v4 - 1;
                    					_t43 = _t43 - 0x20;
                    				} while (_v4 >= 0);
                    				return GlobalFree(_t39);
                    			}











                    0x100024ae
                    0x100024b0
                    0x100024bf
                    0x100024c5
                    0x100024d2
                    0x100024d4
                    0x100024d8
                    0x100024d8
                    0x100024e0
                    0x100024e6
                    0x100024e8
                    0x00000000
                    0x100024ef
                    0x00000000
                    0x00000000
                    0x100024f5
                    0x00000000
                    0x00000000
                    0x100024ff
                    0x00000000
                    0x00000000
                    0x10002506
                    0x1000250c
                    0x10002518
                    0x1000251e
                    0x10002523
                    0x00000000
                    0x00000000
                    0x10002545
                    0x00000000
                    0x00000000
                    0x1000252b
                    0x10002531
                    0x10002532
                    0x10002534
                    0x00000000
                    0x00000000
                    0x1000254d
                    0x1000254f
                    0x10002551
                    0x10002553
                    0x10002553
                    0x00000000
                    0x00000000
                    0x100024e8
                    0x10002556
                    0x10002556
                    0x1000255b
                    0x1000256d
                    0x1000256d
                    0x10002573
                    0x10002578
                    0x1000257d
                    0x10002589
                    0x1000258e
                    0x00000000
                    0x10002593
                    0x1000257f
                    0x10002580
                    0x10002594
                    0x10002594
                    0x1000257d
                    0x10002595
                    0x10002599
                    0x1000259c
                    0x100025b3

                    APIs
                      • Part of subcall function 1000121B: GlobalAlloc.KERNEL32(00000040,?,1000123B,?,100012DF,00000019,100011BE,-000000A0), ref: 10001225
                    • GlobalFree.KERNEL32 ref: 1000256D
                    • GlobalFree.KERNEL32 ref: 100025A8
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.669799652.0000000010001000.00000020.00000001.01000000.00000007.sdmp, Offset: 10000000, based on PE: true
                    • Associated: 00000000.00000002.669792729.0000000010000000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000000.00000002.669803934.0000000010003000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000000.00000002.669815812.0000000010005000.00000002.00000001.01000000.00000007.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_10000000_Ordene 501527,pdf.jbxd
                    Similarity
                    • API ID: Global$Free$Alloc
                    • String ID: {]w@u]w
                    • API String ID: 1780285237-2172857112
                    • Opcode ID: e72053471c67904cbc9fe51406c75cdd0d1e7ae72e07fb5691a107031e3f1593
                    • Instruction ID: 149f0ffe7112dafd64944f245e56057b96fa329c468151baa91e3d773918aa42
                    • Opcode Fuzzy Hash: e72053471c67904cbc9fe51406c75cdd0d1e7ae72e07fb5691a107031e3f1593
                    • Instruction Fuzzy Hash: 1031AF71504651EFF721CF14CCA8E2B7BB8FB853D2F114119F940961A8C7719851DB69
                    Uniqueness

                    Uniqueness Score: -1.00%

                    C-Code - Quality: 91%
                    			E004064F3(WCHAR* _a4) {
                    				short _t5;
                    				short _t7;
                    				WCHAR* _t19;
                    				WCHAR* _t20;
                    				WCHAR* _t21;
                    
                    				_t20 = _a4;
                    				if( *_t20 == 0x5c && _t20[1] == 0x5c && _t20[2] == 0x3f && _t20[3] == 0x5c) {
                    					_t20 =  &(_t20[4]);
                    				}
                    				if( *_t20 != 0 && E00405BA7(_t20) != 0) {
                    					_t20 =  &(_t20[2]);
                    				}
                    				_t5 =  *_t20;
                    				_t21 = _t20;
                    				_t19 = _t20;
                    				if(_t5 != 0) {
                    					do {
                    						if(_t5 > 0x1f &&  *((short*)(E00405B5D(L"*?|<>/\":", _t5))) == 0) {
                    							E00405D0C(_t19, _t20, CharNextW(_t20) - _t20 >> 1);
                    							_t19 = CharNextW(_t19);
                    						}
                    						_t20 = CharNextW(_t20);
                    						_t5 =  *_t20;
                    					} while (_t5 != 0);
                    				}
                    				 *_t19 =  *_t19 & 0x00000000;
                    				while(1) {
                    					_push(_t19);
                    					_push(_t21);
                    					_t19 = CharPrevW();
                    					_t7 =  *_t19;
                    					if(_t7 != 0x20 && _t7 != 0x5c) {
                    						break;
                    					}
                    					 *_t19 =  *_t19 & 0x00000000;
                    					if(_t21 < _t19) {
                    						continue;
                    					}
                    					break;
                    				}
                    				return _t7;
                    			}








                    0x004064f5
                    0x004064fe
                    0x00406515
                    0x00406515
                    0x0040651c
                    0x00406528
                    0x00406528
                    0x0040652b
                    0x0040652e
                    0x00406533
                    0x00406535
                    0x0040653e
                    0x00406542
                    0x0040655f
                    0x00406567
                    0x00406567
                    0x0040656c
                    0x0040656e
                    0x00406571
                    0x00406576
                    0x00406577
                    0x0040657b
                    0x0040657b
                    0x0040657c
                    0x00406583
                    0x00406585
                    0x0040658c
                    0x00000000
                    0x00000000
                    0x00406594
                    0x0040659a
                    0x00000000
                    0x00000000
                    0x00000000
                    0x0040659a
                    0x0040659f

                    APIs
                    • CharNextW.USER32(?,*?|<>/":,00000000,00000000,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,"C:\Users\user\Desktop\Ordene 501527,pdf.exe" ,0040332B,C:\Users\user\AppData\Local\Temp\,76DDFAA0,0040359C,?,00000006,00000008,0000000A), ref: 00406556
                    • CharNextW.USER32(?,?,?,00000000,?,00000006,00000008,0000000A), ref: 00406565
                    • CharNextW.USER32(?,00000000,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,"C:\Users\user\Desktop\Ordene 501527,pdf.exe" ,0040332B,C:\Users\user\AppData\Local\Temp\,76DDFAA0,0040359C,?,00000006,00000008,0000000A), ref: 0040656A
                    • CharPrevW.USER32(?,?,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,"C:\Users\user\Desktop\Ordene 501527,pdf.exe" ,0040332B,C:\Users\user\AppData\Local\Temp\,76DDFAA0,0040359C,?,00000006,00000008,0000000A), ref: 0040657D
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.668679627.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000000.00000002.668672686.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.668695651.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.668709908.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.669360772.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.669367484.0000000000782000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.669373527.0000000000786000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.669383228.0000000000789000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.669410918.00000000007A4000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.669416138.00000000007A6000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.669434006.00000000007B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.669445400.00000000007C4000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.669547952.0000000000804000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_400000_Ordene 501527,pdf.jbxd
                    Similarity
                    • API ID: Char$Next$Prev
                    • String ID: "C:\Users\user\Desktop\Ordene 501527,pdf.exe" $*?|<>/":$C:\Users\user\AppData\Local\Temp\
                    • API String ID: 589700163-618693888
                    • Opcode ID: dac06de1e1615827748cce9690c43cbd9586789469f0d882438918906e4257c7
                    • Instruction ID: b8c3cbf5b75eb2b2499c9cde9ef872d51aef5c2750dc7b0313243111e00abff4
                    • Opcode Fuzzy Hash: dac06de1e1615827748cce9690c43cbd9586789469f0d882438918906e4257c7
                    • Instruction Fuzzy Hash: 9B11C85580021275DB303B14BC40ABBA6F8EF59754F52403FE985732C8E77C5C9286BD
                    Uniqueness

                    Uniqueness Score: -1.00%

                    C-Code - Quality: 100%
                    			E0040425B(intOrPtr _a4, struct HDC__* _a8, struct HWND__* _a12) {
                    				struct tagLOGBRUSH _v16;
                    				long _t35;
                    				long _t37;
                    				void* _t40;
                    				long* _t49;
                    
                    				if(_a4 + 0xfffffecd > 5) {
                    					L15:
                    					return 0;
                    				}
                    				_t49 = GetWindowLongW(_a12, 0xffffffeb);
                    				if(_t49 == 0) {
                    					goto L15;
                    				}
                    				_t35 =  *_t49;
                    				if((_t49[5] & 0x00000002) != 0) {
                    					_t35 = GetSysColor(_t35);
                    				}
                    				if((_t49[5] & 0x00000001) != 0) {
                    					SetTextColor(_a8, _t35);
                    				}
                    				SetBkMode(_a8, _t49[4]);
                    				_t37 = _t49[1];
                    				_v16.lbColor = _t37;
                    				if((_t49[5] & 0x00000008) != 0) {
                    					_t37 = GetSysColor(_t37);
                    					_v16.lbColor = _t37;
                    				}
                    				if((_t49[5] & 0x00000004) != 0) {
                    					SetBkColor(_a8, _t37);
                    				}
                    				if((_t49[5] & 0x00000010) != 0) {
                    					_v16.lbStyle = _t49[2];
                    					_t40 = _t49[3];
                    					if(_t40 != 0) {
                    						DeleteObject(_t40);
                    					}
                    					_t49[3] = CreateBrushIndirect( &_v16);
                    				}
                    				return _t49[3];
                    			}








                    0x0040426d
                    0x00404301
                    0x00000000
                    0x00404301
                    0x0040427e
                    0x00404282
                    0x00000000
                    0x00000000
                    0x00404288
                    0x00404291
                    0x00404294
                    0x00404294
                    0x0040429a
                    0x004042a0
                    0x004042a0
                    0x004042ac
                    0x004042b2
                    0x004042b9
                    0x004042bc
                    0x004042bf
                    0x004042c1
                    0x004042c1
                    0x004042c9
                    0x004042cf
                    0x004042cf
                    0x004042d9
                    0x004042de
                    0x004042e1
                    0x004042e6
                    0x004042e9
                    0x004042e9
                    0x004042f9
                    0x004042f9
                    0x00000000

                    APIs
                    • GetWindowLongW.USER32(?,000000EB), ref: 00404278
                    • GetSysColor.USER32(00000000), ref: 00404294
                    • SetTextColor.GDI32(?,00000000), ref: 004042A0
                    • SetBkMode.GDI32(?,?), ref: 004042AC
                    • GetSysColor.USER32(?), ref: 004042BF
                    • SetBkColor.GDI32(?,?), ref: 004042CF
                    • DeleteObject.GDI32(?), ref: 004042E9
                    • CreateBrushIndirect.GDI32(?), ref: 004042F3
                    Memory Dump Source
                    • Source File: 00000000.00000002.668679627.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000000.00000002.668672686.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.668695651.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.668709908.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.669360772.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.669367484.0000000000782000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.669373527.0000000000786000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.669383228.0000000000789000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.669410918.00000000007A4000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.669416138.00000000007A6000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.669434006.00000000007B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.669445400.00000000007C4000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.669547952.0000000000804000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_400000_Ordene 501527,pdf.jbxd
                    Similarity
                    • API ID: Color$BrushCreateDeleteIndirectLongModeObjectTextWindow
                    • String ID:
                    • API String ID: 2320649405-0
                    • Opcode ID: d93bb5df8f2b76ccefaad0a5d1bb7d3eec77da1dbbaa67d130298efb7d8eee66
                    • Instruction ID: 89996262c0d64ac0fda19422125f93b67266a0f1ca122a9c1e6306c3a20023a3
                    • Opcode Fuzzy Hash: d93bb5df8f2b76ccefaad0a5d1bb7d3eec77da1dbbaa67d130298efb7d8eee66
                    • Instruction Fuzzy Hash: 34219271500704ABCB209F68DE08B4BBBF8AF41714B048A6DFD92A22A0C734D904CB54
                    Uniqueness

                    Uniqueness Score: -1.00%

                    C-Code - Quality: 83%
                    			E00402644(intOrPtr __ebx, intOrPtr __edx, void* __esi) {
                    				intOrPtr _t65;
                    				intOrPtr _t66;
                    				intOrPtr _t72;
                    				void* _t76;
                    				void* _t79;
                    
                    				_t72 = __edx;
                    				 *((intOrPtr*)(_t76 - 8)) = __ebx;
                    				_t65 = 2;
                    				 *((intOrPtr*)(_t76 - 0x48)) = _t65;
                    				_t66 = E00402C15(_t65);
                    				_t79 = _t66 - 1;
                    				 *((intOrPtr*)(_t76 - 0x4c)) = _t72;
                    				 *((intOrPtr*)(_t76 - 0x3c)) = _t66;
                    				if(_t79 < 0) {
                    					L36:
                    					 *0x7a8ac8 =  *0x7a8ac8 +  *(_t76 - 4);
                    				} else {
                    					__ecx = 0x3ff;
                    					if(__eax > 0x3ff) {
                    						 *(__ebp - 0x3c) = 0x3ff;
                    					}
                    					if( *__esi == __bx) {
                    						L34:
                    						__ecx =  *(__ebp - 0xc);
                    						__eax =  *(__ebp - 8);
                    						 *( *(__ebp - 0xc) +  *(__ebp - 8) * 2) = __bx;
                    						if(_t79 == 0) {
                    							 *(_t76 - 4) = 1;
                    						}
                    						goto L36;
                    					} else {
                    						 *(__ebp - 0x30) = __ebx;
                    						 *(__ebp - 0x10) = E004061BF(__ecx, __esi);
                    						if( *(__ebp - 0x3c) > __ebx) {
                    							do {
                    								if( *((intOrPtr*)(__ebp - 0x2c)) != 0x39) {
                    									if( *((intOrPtr*)(__ebp - 0x1c)) != __ebx ||  *(__ebp - 8) != __ebx || E00405E32( *(__ebp - 0x10), __ebx) >= 0) {
                    										__eax = __ebp - 0x44;
                    										if(E00405DD4( *(__ebp - 0x10), __ebp - 0x44, 2) == 0) {
                    											goto L34;
                    										} else {
                    											goto L21;
                    										}
                    									} else {
                    										goto L34;
                    									}
                    								} else {
                    									__eax = __ebp - 0x38;
                    									_push(__ebx);
                    									_push(__ebp - 0x38);
                    									__eax = 2;
                    									__ebp - 0x38 -  *((intOrPtr*)(__ebp - 0x1c)) = __ebp + 0xa;
                    									__eax = ReadFile( *(__ebp - 0x10), __ebp + 0xa, __ebp - 0x38 -  *((intOrPtr*)(__ebp - 0x1c)), ??, ??);
                    									if(__eax == 0) {
                    										goto L34;
                    									} else {
                    										__ecx =  *(__ebp - 0x38);
                    										if(__ecx == __ebx) {
                    											goto L34;
                    										} else {
                    											__ax =  *(__ebp + 0xa) & 0x000000ff;
                    											 *(__ebp - 0x48) = __ecx;
                    											 *(__ebp - 0x44) = __eax;
                    											if( *((intOrPtr*)(__ebp - 0x1c)) != __ebx) {
                    												L28:
                    												__ax & 0x0000ffff = E004061A6( *(__ebp - 0xc), __ax & 0x0000ffff);
                    											} else {
                    												__ebp - 0x44 = __ebp + 0xa;
                    												if(MultiByteToWideChar(__ebx, 8, __ebp + 0xa, __ecx, __ebp - 0x44, 1) != 0) {
                    													L21:
                    													__eax =  *(__ebp - 0x44);
                    												} else {
                    													__esi =  *(__ebp - 0x48);
                    													__esi =  ~( *(__ebp - 0x48));
                    													while(1) {
                    														_t22 = __ebp - 0x38;
                    														 *_t22 =  *(__ebp - 0x38) - 1;
                    														__eax = 0xfffd;
                    														 *(__ebp - 0x44) = 0xfffd;
                    														if( *_t22 == 0) {
                    															goto L22;
                    														}
                    														 *(__ebp - 0x48) =  *(__ebp - 0x48) - 1;
                    														__esi = __esi + 1;
                    														SetFilePointer( *(__ebp - 0x10), __esi, __ebx, 1) = __ebp - 0x44;
                    														__eax = __ebp + 0xa;
                    														if(MultiByteToWideChar(__ebx, 8, __ebp + 0xa,  *(__ebp - 0x38), __ebp - 0x44, 1) == 0) {
                    															continue;
                    														} else {
                    															goto L21;
                    														}
                    														goto L22;
                    													}
                    												}
                    												L22:
                    												if( *((intOrPtr*)(__ebp - 0x1c)) != __ebx) {
                    													goto L28;
                    												} else {
                    													if( *(__ebp - 0x30) == 0xd ||  *(__ebp - 0x30) == 0xa) {
                    														if( *(__ebp - 0x30) == __ax || __ax != 0xd && __ax != 0xa) {
                    															 *(__ebp - 0x48) =  ~( *(__ebp - 0x48));
                    															__eax = SetFilePointer( *(__ebp - 0x10),  ~( *(__ebp - 0x48)), __ebx, 1);
                    														} else {
                    															__ecx =  *(__ebp - 0xc);
                    															__edx =  *(__ebp - 8);
                    															 *(__ebp - 8) =  *(__ebp - 8) + 1;
                    															 *( *(__ebp - 0xc) +  *(__ebp - 8) * 2) = __ax;
                    														}
                    														goto L34;
                    													} else {
                    														__ecx =  *(__ebp - 0xc);
                    														__edx =  *(__ebp - 8);
                    														 *(__ebp - 8) =  *(__ebp - 8) + 1;
                    														 *( *(__ebp - 0xc) +  *(__ebp - 8) * 2) = __ax;
                    														 *(__ebp - 0x30) = __eax;
                    														if(__ax == __bx) {
                    															goto L34;
                    														} else {
                    															goto L26;
                    														}
                    													}
                    												}
                    											}
                    										}
                    									}
                    								}
                    								goto L37;
                    								L26:
                    								__eax =  *(__ebp - 8);
                    							} while ( *(__ebp - 8) <  *(__ebp - 0x3c));
                    						}
                    						goto L34;
                    					}
                    				}
                    				L37:
                    				return 0;
                    			}








                    0x00402644
                    0x00402646
                    0x00402649
                    0x0040264b
                    0x0040264e
                    0x00402653
                    0x00402657
                    0x0040265a
                    0x0040265d
                    0x00402abf
                    0x00402ac2
                    0x00402663
                    0x00402663
                    0x0040266a
                    0x0040266c
                    0x0040266c
                    0x00402672
                    0x004027d6
                    0x004027d6
                    0x004027d9
                    0x004027de
                    0x004015b6
                    0x00402885
                    0x00402885
                    0x00000000
                    0x00402678
                    0x00402679
                    0x00402684
                    0x00402687
                    0x00402693
                    0x00402697
                    0x0040272f
                    0x00402747
                    0x00402757
                    0x00000000
                    0x00000000
                    0x00000000
                    0x00000000
                    0x00000000
                    0x00000000
                    0x00000000
                    0x0040269d
                    0x0040269d
                    0x004026a0
                    0x004026a1
                    0x004026a4
                    0x004026a9
                    0x004026b0
                    0x004026b8
                    0x00000000
                    0x004026be
                    0x004026be
                    0x004026c3
                    0x00000000
                    0x004026c9
                    0x004026c9
                    0x004026d1
                    0x004026d4
                    0x004026d7
                    0x00402792
                    0x00402799
                    0x004026dd
                    0x004026e3
                    0x004026ef
                    0x00402759
                    0x00402759
                    0x004026f1
                    0x004026f1
                    0x004026f4
                    0x004026f6
                    0x004026f6
                    0x004026f6
                    0x004026f9
                    0x004026fe
                    0x00402701
                    0x00000000
                    0x00000000
                    0x00402703
                    0x00402706
                    0x00402714
                    0x0040271a
                    0x00402728
                    0x00000000
                    0x0040272a
                    0x00000000
                    0x0040272a
                    0x00000000
                    0x00402728
                    0x004026f6
                    0x0040275c
                    0x0040275f
                    0x00000000
                    0x00402761
                    0x00402766
                    0x004027a7
                    0x004027c9
                    0x004027d0
                    0x004027b5
                    0x004027b5
                    0x004027b8
                    0x004027bb
                    0x004027be
                    0x004027be
                    0x00000000
                    0x0040276f
                    0x0040276f
                    0x00402772
                    0x00402775
                    0x0040277b
                    0x0040277f
                    0x00402782
                    0x00000000
                    0x00000000
                    0x00000000
                    0x00000000
                    0x00402782
                    0x00402766
                    0x0040275f
                    0x004026d7
                    0x004026c3
                    0x004026b8
                    0x00000000
                    0x00402784
                    0x00402784
                    0x00402787
                    0x00402790
                    0x00000000
                    0x00402687
                    0x00402672
                    0x00402ac8
                    0x00402ace

                    APIs
                    • ReadFile.KERNEL32(?,?,?,?), ref: 004026B0
                    • MultiByteToWideChar.KERNEL32(?,00000008,?,?,?,00000001), ref: 004026EB
                    • SetFilePointer.KERNEL32(?,?,?,00000001,?,00000008,?,?,?,00000001), ref: 0040270E
                    • MultiByteToWideChar.KERNEL32(?,00000008,?,00000000,?,00000001,?,00000001,?,00000008,?,?,?,00000001), ref: 00402724
                      • Part of subcall function 00405E32: SetFilePointer.KERNEL32(?,00000000,00000000,00000001), ref: 00405E48
                    • SetFilePointer.KERNEL32(?,?,?,00000001,?,?,00000002), ref: 004027D0
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.668679627.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000000.00000002.668672686.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.668695651.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.668709908.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.669360772.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.669367484.0000000000782000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.669373527.0000000000786000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.669383228.0000000000789000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.669410918.00000000007A4000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.669416138.00000000007A6000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.669434006.00000000007B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.669445400.00000000007C4000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.669547952.0000000000804000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_400000_Ordene 501527,pdf.jbxd
                    Similarity
                    • API ID: File$Pointer$ByteCharMultiWide$Read
                    • String ID: 9
                    • API String ID: 163830602-2366072709
                    • Opcode ID: bbfadd1fb82cd2902055e903a3e488c979ded5586cb93e8eb0be3a96e306ad52
                    • Instruction ID: 9be2b0b37b52d723af7ab0687330b4cdc43bee68c69c879290400e1721267ab5
                    • Opcode Fuzzy Hash: bbfadd1fb82cd2902055e903a3e488c979ded5586cb93e8eb0be3a96e306ad52
                    • Instruction Fuzzy Hash: BA51F675D00219AADF20DFA5DA88AAEB779FF04304F10443BE511F72D0DBB89982CB58
                    Uniqueness

                    Uniqueness Score: -1.00%

                    C-Code - Quality: 85%
                    			E100022D0(void* __edx) {
                    				void* _t37;
                    				signed int _t38;
                    				void* _t39;
                    				void* _t41;
                    				signed int* _t42;
                    				signed int* _t51;
                    				void* _t52;
                    				void* _t54;
                    
                    				 *(_t54 + 0x10) = 0 |  *((intOrPtr*)( *((intOrPtr*)(_t54 + 8)) + 0x1014)) > 0x00000000;
                    				while(1) {
                    					_t9 =  *((intOrPtr*)(_t54 + 0x18)) + 0x1018; // 0x1018
                    					_t51 = ( *(_t54 + 0x10) << 5) + _t9;
                    					_t52 = _t51[6];
                    					if(_t52 == 0) {
                    						goto L9;
                    					}
                    					_t41 = 0x1a;
                    					if(_t52 == _t41) {
                    						goto L9;
                    					}
                    					if(_t52 != 0xffffffff) {
                    						if(_t52 <= 0 || _t52 > 0x19) {
                    							_t51[6] = _t41;
                    							goto L12;
                    						} else {
                    							_t37 = E100012BA(_t52 - 1);
                    							L10:
                    							goto L11;
                    						}
                    					} else {
                    						_t37 = E10001243();
                    						L11:
                    						_t52 = _t37;
                    						L12:
                    						_t13 =  &(_t51[2]); // 0x1020
                    						_t42 = _t13;
                    						if(_t51[1] != 0xffffffff) {
                    						}
                    						_t38 =  *_t51;
                    						_t51[7] = 0;
                    						if(_t38 > 7) {
                    							L27:
                    							_t39 = GlobalFree(_t52);
                    							if( *(_t54 + 0x10) == 0) {
                    								return _t39;
                    							}
                    							if( *(_t54 + 0x10) !=  *((intOrPtr*)( *((intOrPtr*)(_t54 + 0x18)) + 0x1014))) {
                    								 *(_t54 + 0x10) =  *(_t54 + 0x10) + 1;
                    							} else {
                    								 *(_t54 + 0x10) =  *(_t54 + 0x10) & 0x00000000;
                    							}
                    							continue;
                    						} else {
                    							switch( *((intOrPtr*)(_t38 * 4 +  &M10002447))) {
                    								case 0:
                    									 *_t42 = 0;
                    									goto L27;
                    								case 1:
                    									__eax = E10001311(__ebp);
                    									goto L21;
                    								case 2:
                    									 *__edi = E10001311(__ebp);
                    									__edi[1] = __edx;
                    									goto L27;
                    								case 3:
                    									__eax = GlobalAlloc(0x40,  *0x1000406c);
                    									 *(__esi + 0x1c) = __eax;
                    									__edx = 0;
                    									 *__edi = __eax;
                    									__eax = WideCharToMultiByte(0, 0, __ebp,  *0x1000406c, __eax,  *0x1000406c, 0, 0);
                    									goto L27;
                    								case 4:
                    									__eax = E1000122C(__ebp);
                    									 *(__esi + 0x1c) = __eax;
                    									L21:
                    									 *__edi = __eax;
                    									goto L27;
                    								case 5:
                    									__eax = GlobalAlloc(0x40, 0x10);
                    									_push(__eax);
                    									 *(__esi + 0x1c) = __eax;
                    									_push(__ebp);
                    									 *__edi = __eax;
                    									__imp__CLSIDFromString();
                    									goto L27;
                    								case 6:
                    									if( *__ebp != __cx) {
                    										__eax = E10001311(__ebp);
                    										 *__ebx = __eax;
                    									}
                    									goto L27;
                    								case 7:
                    									 *(__esi + 0x18) =  *(__esi + 0x18) - 1;
                    									( *(__esi + 0x18) - 1) *  *0x1000406c =  *0x10004074 + ( *(__esi + 0x18) - 1) *  *0x1000406c * 2 + 0x18;
                    									 *__ebx =  *0x10004074 + ( *(__esi + 0x18) - 1) *  *0x1000406c * 2 + 0x18;
                    									asm("cdq");
                    									__eax = E10001470(__edx,  *0x10004074 + ( *(__esi + 0x18) - 1) *  *0x1000406c * 2 + 0x18, __edx,  *0x10004074 + ( *(__esi + 0x18) - 1) *  *0x1000406c * 2);
                    									goto L27;
                    							}
                    						}
                    					}
                    					L9:
                    					_t37 = E1000122C(0x10004044);
                    					goto L10;
                    				}
                    			}











                    0x100022e4
                    0x100022e8
                    0x100022f3
                    0x100022f3
                    0x100022fa
                    0x100022ff
                    0x00000000
                    0x00000000
                    0x10002303
                    0x10002306
                    0x00000000
                    0x00000000
                    0x1000230b
                    0x10002316
                    0x10002326
                    0x00000000
                    0x1000231d
                    0x1000231f
                    0x10002335
                    0x00000000
                    0x10002335
                    0x1000230d
                    0x1000230d
                    0x10002336
                    0x10002336
                    0x10002338
                    0x1000233c
                    0x1000233c
                    0x1000233f
                    0x1000233f
                    0x10002347
                    0x1000234e
                    0x10002351
                    0x10002410
                    0x10002411
                    0x1000241c
                    0x10002446
                    0x10002446
                    0x1000242c
                    0x10002438
                    0x1000242e
                    0x1000242e
                    0x1000242e
                    0x00000000
                    0x10002357
                    0x10002357
                    0x00000000
                    0x1000235e
                    0x00000000
                    0x00000000
                    0x10002366
                    0x00000000
                    0x00000000
                    0x10002374
                    0x10002376
                    0x00000000
                    0x00000000
                    0x10002397
                    0x1000239d
                    0x100023a0
                    0x100023a2
                    0x100023b2
                    0x00000000
                    0x00000000
                    0x1000237f
                    0x10002384
                    0x10002387
                    0x10002388
                    0x00000000
                    0x00000000
                    0x100023be
                    0x100023c4
                    0x100023c5
                    0x100023c8
                    0x100023c9
                    0x100023cb
                    0x00000000
                    0x00000000
                    0x100023d7
                    0x100023da
                    0x100023e6
                    0x100023e8
                    0x00000000
                    0x00000000
                    0x100023f4
                    0x10002400
                    0x10002403
                    0x10002405
                    0x10002408
                    0x00000000
                    0x00000000
                    0x10002357
                    0x10002351
                    0x1000232b
                    0x10002330
                    0x00000000
                    0x10002330

                    APIs
                    • GlobalFree.KERNEL32 ref: 10002411
                      • Part of subcall function 1000122C: lstrcpynW.KERNEL32(00000000,?,100012DF,00000019,100011BE,-000000A0), ref: 1000123C
                    • GlobalAlloc.KERNEL32(00000040), ref: 10002397
                    • WideCharToMultiByte.KERNEL32(00000000,00000000,?,?,00000000,?,00000000,00000000), ref: 100023B2
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.669799652.0000000010001000.00000020.00000001.01000000.00000007.sdmp, Offset: 10000000, based on PE: true
                    • Associated: 00000000.00000002.669792729.0000000010000000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000000.00000002.669803934.0000000010003000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000000.00000002.669815812.0000000010005000.00000002.00000001.01000000.00000007.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_10000000_Ordene 501527,pdf.jbxd
                    Similarity
                    • API ID: Global$AllocByteCharFreeMultiWidelstrcpyn
                    • String ID: @u]w
                    • API String ID: 4216380887-689891868
                    • Opcode ID: 40c1fda0fc222d3deaf0be0606799ffba2a33d40f74f168943dcfaeb9bc9158e
                    • Instruction ID: e010a8171ff36a63e9221139458dc5df23460d7ee6f57f6168b5e09891e1807c
                    • Opcode Fuzzy Hash: 40c1fda0fc222d3deaf0be0606799ffba2a33d40f74f168943dcfaeb9bc9158e
                    • Instruction Fuzzy Hash: 9141D2B4408305EFF324DF24C880A6AB7F8FB843D4B11892DF94687199DB34BA94CB65
                    Uniqueness

                    Uniqueness Score: -1.00%

                    C-Code - Quality: 100%
                    			E00404B8D(struct HWND__* _a4, intOrPtr _a8) {
                    				long _v8;
                    				signed char _v12;
                    				unsigned int _v16;
                    				void* _v20;
                    				intOrPtr _v24;
                    				long _v56;
                    				void* _v60;
                    				long _t15;
                    				unsigned int _t19;
                    				signed int _t25;
                    				struct HWND__* _t28;
                    
                    				_t28 = _a4;
                    				_t15 = SendMessageW(_t28, 0x110a, 9, 0);
                    				if(_a8 == 0) {
                    					L4:
                    					_v56 = _t15;
                    					_v60 = 4;
                    					SendMessageW(_t28, 0x113e, 0,  &_v60);
                    					return _v24;
                    				}
                    				_t19 = GetMessagePos();
                    				_v16 = _t19 >> 0x10;
                    				_v20 = _t19;
                    				ScreenToClient(_t28,  &_v20);
                    				_t25 = SendMessageW(_t28, 0x1111, 0,  &_v20);
                    				if((_v12 & 0x00000066) != 0) {
                    					_t15 = _v8;
                    					goto L4;
                    				}
                    				return _t25 | 0xffffffff;
                    			}














                    0x00404b9b
                    0x00404ba8
                    0x00404bae
                    0x00404bec
                    0x00404bec
                    0x00404bfb
                    0x00404c02
                    0x00000000
                    0x00404c04
                    0x00404bb0
                    0x00404bbf
                    0x00404bc7
                    0x00404bca
                    0x00404bdc
                    0x00404be2
                    0x00404be9
                    0x00000000
                    0x00404be9
                    0x00000000

                    APIs
                    • SendMessageW.USER32(?,0000110A,00000009,00000000), ref: 00404BA8
                    • GetMessagePos.USER32 ref: 00404BB0
                    • ScreenToClient.USER32 ref: 00404BCA
                    • SendMessageW.USER32(?,00001111,00000000,?), ref: 00404BDC
                    • SendMessageW.USER32(?,0000113E,00000000,?), ref: 00404C02
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.668679627.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000000.00000002.668672686.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.668695651.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.668709908.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.669360772.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.669367484.0000000000782000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.669373527.0000000000786000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.669383228.0000000000789000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.669410918.00000000007A4000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.669416138.00000000007A6000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.669434006.00000000007B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.669445400.00000000007C4000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.669547952.0000000000804000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_400000_Ordene 501527,pdf.jbxd
                    Similarity
                    • API ID: Message$Send$ClientScreen
                    • String ID: f
                    • API String ID: 41195575-1993550816
                    • Opcode ID: e2d2d6aa42d138b4bf43a857dc2fb8cfa63f2fbdf5f441295addbf44c9bf4daa
                    • Instruction ID: 1a768e81d1a3c698b7e3ef6d626f5858b2063c99cedd32227338619671f62d57
                    • Opcode Fuzzy Hash: e2d2d6aa42d138b4bf43a857dc2fb8cfa63f2fbdf5f441295addbf44c9bf4daa
                    • Instruction Fuzzy Hash: 18015E7190021CBADB00DB95DD85FFEBBBCAF95715F10412BBA50BA1D0C7B4AA058BA4
                    Uniqueness

                    Uniqueness Score: -1.00%

                    C-Code - Quality: 100%
                    			E00402DD7(struct HWND__* _a4, intOrPtr _a8) {
                    				short _v132;
                    				int _t11;
                    				int _t20;
                    
                    				if(_a8 == 0x110) {
                    					SetTimer(_a4, 1, 0xfa, 0);
                    					_a8 = 0x113;
                    				}
                    				if(_a8 == 0x113) {
                    					_t20 =  *0x78b6d4; // 0x8fd55
                    					_t11 =  *0x7976dc; // 0x91a80
                    					if(_t20 >= _t11) {
                    						_t20 = _t11;
                    					}
                    					wsprintfW( &_v132, L"verifying installer: %d%%", MulDiv(_t20, 0x64, _t11));
                    					SetWindowTextW(_a4,  &_v132);
                    					SetDlgItemTextW(_a4, 0x406,  &_v132);
                    				}
                    				return 0;
                    			}






                    0x00402de7
                    0x00402df5
                    0x00402dfb
                    0x00402dfb
                    0x00402e09
                    0x00402e0b
                    0x00402e11
                    0x00402e18
                    0x00402e1a
                    0x00402e1a
                    0x00402e30
                    0x00402e40
                    0x00402e52
                    0x00402e52
                    0x00402e5a

                    APIs
                    • SetTimer.USER32(?,00000001,000000FA,00000000), ref: 00402DF5
                    • MulDiv.KERNEL32(0008FD55,00000064,00091A80), ref: 00402E20
                    • wsprintfW.USER32 ref: 00402E30
                    • SetWindowTextW.USER32(?,?), ref: 00402E40
                    • SetDlgItemTextW.USER32 ref: 00402E52
                    Strings
                    • verifying installer: %d%%, xrefs: 00402E2A
                    Memory Dump Source
                    • Source File: 00000000.00000002.668679627.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000000.00000002.668672686.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.668695651.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.668709908.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.669360772.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.669367484.0000000000782000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.669373527.0000000000786000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.669383228.0000000000789000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.669410918.00000000007A4000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.669416138.00000000007A6000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.669434006.00000000007B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.669445400.00000000007C4000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.669547952.0000000000804000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_400000_Ordene 501527,pdf.jbxd
                    Similarity
                    • API ID: Text$ItemTimerWindowwsprintf
                    • String ID: verifying installer: %d%%
                    • API String ID: 1451636040-82062127
                    • Opcode ID: dbbbfae8d01556434cd8b9f8079c14b742463200277d1f2e5f02c0c8f6c1ad5d
                    • Instruction ID: c563a075df83d92fb310a5016e42997ab7e5782e6b78b1479044c0af3efb3f55
                    • Opcode Fuzzy Hash: dbbbfae8d01556434cd8b9f8079c14b742463200277d1f2e5f02c0c8f6c1ad5d
                    • Instruction Fuzzy Hash: DE01677064020CBFDF149F50DD49FAA3B68AB00304F108039FA06F51D0DBB98965CF59
                    Uniqueness

                    Uniqueness Score: -1.00%

                    C-Code - Quality: 37%
                    			E004028A7(void* __ebx) {
                    				void* _t26;
                    				long _t31;
                    				void* _t45;
                    				void* _t49;
                    				void* _t51;
                    				void* _t54;
                    				void* _t55;
                    				void* _t56;
                    
                    				_t45 = __ebx;
                    				 *((intOrPtr*)(_t56 - 0x30)) = 0xfffffd66;
                    				_t50 = E00402C37(0xfffffff0);
                    				 *(_t56 - 0x38) = _t23;
                    				if(E00405BA7(_t50) == 0) {
                    					E00402C37(0xffffffed);
                    				}
                    				E00405D2C(_t50);
                    				_t26 = E00405D51(_t50, 0x40000000, 2);
                    				 *(_t56 + 8) = _t26;
                    				if(_t26 != 0xffffffff) {
                    					_t31 =  *0x7a8a38;
                    					 *(_t56 - 0x3c) = _t31;
                    					_t49 = GlobalAlloc(0x40, _t31);
                    					if(_t49 != _t45) {
                    						E00403308(_t45);
                    						E004032F2(_t49,  *(_t56 - 0x3c));
                    						_t54 = GlobalAlloc(0x40,  *(_t56 - 0x20));
                    						 *(_t56 - 0x4c) = _t54;
                    						if(_t54 != _t45) {
                    							_push( *(_t56 - 0x20));
                    							_push(_t54);
                    							_push(_t45);
                    							_push( *((intOrPtr*)(_t56 - 0x24)));
                    							E004030FA();
                    							while( *_t54 != _t45) {
                    								_t47 =  *_t54;
                    								_t55 = _t54 + 8;
                    								 *(_t56 - 0x34) =  *_t54;
                    								E00405D0C( *((intOrPtr*)(_t54 + 4)) + _t49, _t55, _t47);
                    								_t54 = _t55 +  *(_t56 - 0x34);
                    							}
                    							GlobalFree( *(_t56 - 0x4c));
                    						}
                    						E00405E03( *(_t56 + 8), _t49,  *(_t56 - 0x3c));
                    						GlobalFree(_t49);
                    						_push(_t45);
                    						_push(_t45);
                    						_push( *(_t56 + 8));
                    						_push(0xffffffff);
                    						 *((intOrPtr*)(_t56 - 0x30)) = E004030FA();
                    					}
                    					CloseHandle( *(_t56 + 8));
                    				}
                    				_t51 = 0xfffffff3;
                    				if( *((intOrPtr*)(_t56 - 0x30)) < _t45) {
                    					_t51 = 0xffffffef;
                    					DeleteFileW( *(_t56 - 0x38));
                    					 *((intOrPtr*)(_t56 - 4)) = 1;
                    				}
                    				_push(_t51);
                    				E00401423();
                    				 *0x7a8ac8 =  *0x7a8ac8 +  *((intOrPtr*)(_t56 - 4));
                    				return 0;
                    			}











                    0x004028a7
                    0x004028a9
                    0x004028b5
                    0x004028b8
                    0x004028c2
                    0x004028c6
                    0x004028c6
                    0x004028cc
                    0x004028d9
                    0x004028e1
                    0x004028e4
                    0x004028ea
                    0x004028f8
                    0x004028fd
                    0x00402901
                    0x00402904
                    0x0040290d
                    0x00402919
                    0x0040291d
                    0x00402920
                    0x00402922
                    0x00402925
                    0x00402926
                    0x00402927
                    0x0040292a
                    0x00402949
                    0x00402931
                    0x00402936
                    0x0040293e
                    0x00402941
                    0x00402946
                    0x00402946
                    0x00402950
                    0x00402950
                    0x0040295d
                    0x00402963
                    0x00402969
                    0x0040296a
                    0x0040296b
                    0x0040296e
                    0x00402975
                    0x00402975
                    0x0040297b
                    0x0040297b
                    0x00402986
                    0x00402987
                    0x0040298b
                    0x0040298f
                    0x00402995
                    0x00402995
                    0x0040299c
                    0x00402245
                    0x00402ac2
                    0x00402ace

                    APIs
                    • GlobalAlloc.KERNEL32(00000040,?,00000000,40000000,00000002,00000000,00000000), ref: 004028FB
                    • GlobalAlloc.KERNEL32(00000040,?,00000000,?), ref: 00402917
                    • GlobalFree.KERNEL32 ref: 00402950
                    • GlobalFree.KERNEL32 ref: 00402963
                    • CloseHandle.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,000000F0), ref: 0040297B
                    • DeleteFileW.KERNEL32(?,00000000,40000000,00000002,00000000,00000000), ref: 0040298F
                    Memory Dump Source
                    • Source File: 00000000.00000002.668679627.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000000.00000002.668672686.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.668695651.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.668709908.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.669360772.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.669367484.0000000000782000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.669373527.0000000000786000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.669383228.0000000000789000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.669410918.00000000007A4000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.669416138.00000000007A6000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.669434006.00000000007B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.669445400.00000000007C4000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.669547952.0000000000804000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_400000_Ordene 501527,pdf.jbxd
                    Similarity
                    • API ID: Global$AllocFree$CloseDeleteFileHandle
                    • String ID:
                    • API String ID: 2667972263-0
                    • Opcode ID: 58f2fc8793bde8efa303179fcda2349daebee9d6d847e8c5c8a4aefd4b201075
                    • Instruction ID: bbedb4fc7ab5ed61472c20f64d7886a30c327f5f8cbd10d414b970b30e546654
                    • Opcode Fuzzy Hash: 58f2fc8793bde8efa303179fcda2349daebee9d6d847e8c5c8a4aefd4b201075
                    • Instruction Fuzzy Hash: E021DDB1800128BBCF206FA5DE49D9E7E79EF08364F10423AF960762E0CB394D418F98
                    Uniqueness

                    Uniqueness Score: -1.00%

                    C-Code - Quality: 88%
                    			E00402592(int __ebx, void* __edx, intOrPtr* __esi) {
                    				signed int _t14;
                    				int _t17;
                    				int _t24;
                    				signed int _t29;
                    				intOrPtr* _t32;
                    				void* _t34;
                    				void* _t35;
                    				void* _t38;
                    				signed int _t40;
                    
                    				_t32 = __esi;
                    				_t24 = __ebx;
                    				_t14 =  *(_t35 - 0x20);
                    				_t38 = __edx - 0x38;
                    				 *(_t35 - 0x4c) = _t14;
                    				_t27 = 0 | _t38 == 0x00000000;
                    				_t29 = _t38 == 0;
                    				if(_t14 == __ebx) {
                    					if(__edx != 0x38) {
                    						_t17 = lstrlenW(E00402C37(0x11)) + _t16;
                    					} else {
                    						E00402C37(0x21);
                    						WideCharToMultiByte(__ebx, __ebx, "C:\Users\alfons\AppData\Local\Temp\nshB62A.tmp", 0xffffffff, "C:\Users\alfons\AppData\Local\Temp\nshB62A.tmp\System.dll", 0x400, __ebx, __ebx);
                    						_t17 = lstrlenA("C:\Users\alfons\AppData\Local\Temp\nshB62A.tmp\System.dll");
                    					}
                    				} else {
                    					E00402C15(1);
                    					 *0x40ada8 = __ax;
                    					 *((intOrPtr*)(__ebp - 0x3c)) = __edx;
                    				}
                    				 *(_t35 + 8) = _t17;
                    				if( *_t32 == _t24) {
                    					L13:
                    					 *((intOrPtr*)(_t35 - 4)) = 1;
                    				} else {
                    					_t34 = E004061BF(_t27, _t32);
                    					if((_t29 |  *(_t35 - 0x4c)) != 0 ||  *((intOrPtr*)(_t35 - 0x1c)) == _t24 || E00405E32(_t34, _t34) >= 0) {
                    						_t14 = E00405E03(_t34, "C:\Users\alfons\AppData\Local\Temp\nshB62A.tmp\System.dll",  *(_t35 + 8));
                    						_t40 = _t14;
                    						if(_t40 == 0) {
                    							goto L13;
                    						}
                    					} else {
                    						goto L13;
                    					}
                    				}
                    				 *0x7a8ac8 =  *0x7a8ac8 +  *((intOrPtr*)(_t35 - 4));
                    				return 0;
                    			}












                    0x00402592
                    0x00402592
                    0x00402592
                    0x00402597
                    0x0040259a
                    0x0040259d
                    0x004025a2
                    0x004025a4
                    0x004025c4
                    0x00402602
                    0x004025c6
                    0x004025c8
                    0x004025e2
                    0x004025ed
                    0x004025ed
                    0x004025a6
                    0x004025a8
                    0x004025ad
                    0x004025bb
                    0x004025be
                    0x00402607
                    0x0040260a
                    0x00402885
                    0x00402885
                    0x00402610
                    0x00402619
                    0x0040261b
                    0x0040263a
                    0x004015b4
                    0x004015b6
                    0x00000000
                    0x004015bc
                    0x00000000
                    0x00000000
                    0x00000000
                    0x0040261b
                    0x00402ac2
                    0x00402ace

                    APIs
                    • WideCharToMultiByte.KERNEL32(?,?,C:\Users\user\AppData\Local\Temp\nshB62A.tmp,000000FF,C:\Users\user\AppData\Local\Temp\nshB62A.tmp\System.dll,00000400,?,?,00000021), ref: 004025E2
                    • lstrlenA.KERNEL32(C:\Users\user\AppData\Local\Temp\nshB62A.tmp\System.dll,?,?,C:\Users\user\AppData\Local\Temp\nshB62A.tmp,000000FF,C:\Users\user\AppData\Local\Temp\nshB62A.tmp\System.dll,00000400,?,?,00000021), ref: 004025ED
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.668679627.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000000.00000002.668672686.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.668695651.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.668709908.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.669360772.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.669367484.0000000000782000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.669373527.0000000000786000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.669383228.0000000000789000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.669410918.00000000007A4000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.669416138.00000000007A6000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.669434006.00000000007B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.669445400.00000000007C4000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.669547952.0000000000804000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_400000_Ordene 501527,pdf.jbxd
                    Similarity
                    • API ID: ByteCharMultiWidelstrlen
                    • String ID: C:\Users\user\AppData\Local\Temp\nshB62A.tmp$C:\Users\user\AppData\Local\Temp\nshB62A.tmp\System.dll
                    • API String ID: 3109718747-1958328104
                    • Opcode ID: 48a1f6dd2c0e117bc3ae60c346feda4b24ea52fc0ff5a075c6b1cd163f45ae2b
                    • Instruction ID: aeea25b17c56a12648c97371da72875efc2076f5b2bafbb971aab2720b62453c
                    • Opcode Fuzzy Hash: 48a1f6dd2c0e117bc3ae60c346feda4b24ea52fc0ff5a075c6b1cd163f45ae2b
                    • Instruction Fuzzy Hash: B5115B72A00200BECB106FB18E8D99F7664AF95389F20843FF502F22C1DAFC49425B5E
                    Uniqueness

                    Uniqueness Score: -1.00%

                    C-Code - Quality: 97%
                    			E100018A9(signed int __edx, void* __eflags, void* _a8, void* _a16) {
                    				void* _v8;
                    				signed int _v12;
                    				signed int _v20;
                    				signed int _v24;
                    				char _v76;
                    				void* _t43;
                    				signed int _t44;
                    				signed int _t59;
                    				void _t63;
                    				signed int _t64;
                    				signed int _t65;
                    				signed int _t67;
                    				signed int _t68;
                    				signed int _t70;
                    				signed int _t71;
                    				void* _t76;
                    				void* _t77;
                    				void* _t78;
                    				void* _t79;
                    				void* _t80;
                    				signed int _t84;
                    				signed int _t86;
                    				signed int _t89;
                    				void* _t100;
                    
                    				_t84 = __edx;
                    				 *0x1000406c = _a8;
                    				_t59 = 0;
                    				 *0x10004070 = _a16;
                    				_v12 = 0;
                    				_v8 = E10001243();
                    				_t89 = E10001311(_t41);
                    				_t86 = _t84;
                    				_t43 = E10001243();
                    				_t63 =  *_t43;
                    				_a8 = _t43;
                    				if(_t63 != 0x7e && _t63 != 0x21) {
                    					_a16 = E10001243();
                    					_t59 = E10001311(_t56);
                    					_v12 = _t84;
                    					GlobalFree(_a16);
                    					_t43 = _a8;
                    				}
                    				_t64 =  *_t43 & 0x0000ffff;
                    				_t100 = _t64 - 0x2f;
                    				if(_t100 > 0) {
                    					_t65 = _t64 - 0x3c;
                    					__eflags = _t65;
                    					if(_t65 == 0) {
                    						__eflags =  *((short*)(_t43 + 2)) - 0x3c;
                    						if( *((short*)(_t43 + 2)) != 0x3c) {
                    							__eflags = _t86 - _v12;
                    							if(__eflags > 0) {
                    								L54:
                    								_t44 = 0;
                    								__eflags = 0;
                    								L55:
                    								asm("cdq");
                    								L56:
                    								_t89 = _t44;
                    								L57:
                    								_t86 = _t84;
                    								L58:
                    								E10001470(_t84, _t89, _t86,  &_v76);
                    								E10001272( &_v76);
                    								GlobalFree(_v8);
                    								return GlobalFree(_a8);
                    							}
                    							if(__eflags < 0) {
                    								L47:
                    								__eflags = 0;
                    								L48:
                    								_t44 = 1;
                    								goto L55;
                    							}
                    							__eflags = _t89 - _t59;
                    							if(_t89 < _t59) {
                    								goto L47;
                    							}
                    							goto L54;
                    						}
                    						_t84 = _t86;
                    						_t44 = E10002D90(_t89, _t59, _t84);
                    						goto L56;
                    					}
                    					_t67 = _t65 - 1;
                    					__eflags = _t67;
                    					if(_t67 == 0) {
                    						__eflags = _t89 - _t59;
                    						if(_t89 != _t59) {
                    							goto L54;
                    						}
                    						__eflags = _t86 - _v12;
                    						if(_t86 != _v12) {
                    							goto L54;
                    						}
                    						goto L47;
                    					}
                    					_t68 = _t67 - 1;
                    					__eflags = _t68;
                    					if(_t68 == 0) {
                    						__eflags =  *((short*)(_t43 + 2)) - 0x3e;
                    						if( *((short*)(_t43 + 2)) != 0x3e) {
                    							__eflags = _t86 - _v12;
                    							if(__eflags < 0) {
                    								goto L54;
                    							}
                    							if(__eflags > 0) {
                    								goto L47;
                    							}
                    							__eflags = _t89 - _t59;
                    							if(_t89 <= _t59) {
                    								goto L54;
                    							}
                    							goto L47;
                    						}
                    						_t84 = _t86;
                    						_t44 = E10002DB0(_t89, _t59, _t84);
                    						goto L56;
                    					}
                    					_t70 = _t68 - 0x20;
                    					__eflags = _t70;
                    					if(_t70 == 0) {
                    						_t89 = _t89 ^ _t59;
                    						_t86 = _t86 ^ _v12;
                    						goto L58;
                    					}
                    					_t71 = _t70 - 0x1e;
                    					__eflags = _t71;
                    					if(_t71 == 0) {
                    						__eflags =  *((short*)(_t43 + 2)) - 0x7c;
                    						if( *((short*)(_t43 + 2)) != 0x7c) {
                    							_t89 = _t89 | _t59;
                    							_t86 = _t86 | _v12;
                    							goto L58;
                    						}
                    						__eflags = _t89 | _t86;
                    						if((_t89 | _t86) != 0) {
                    							goto L47;
                    						}
                    						__eflags = _t59 | _v12;
                    						if((_t59 | _v12) != 0) {
                    							goto L47;
                    						}
                    						goto L54;
                    					}
                    					__eflags = _t71 == 0;
                    					if(_t71 == 0) {
                    						_t89 =  !_t89;
                    						_t86 =  !_t86;
                    					}
                    					goto L58;
                    				}
                    				if(_t100 == 0) {
                    					L21:
                    					__eflags = _t59 | _v12;
                    					if((_t59 | _v12) != 0) {
                    						_v24 = E10002C20(_t89, _t86, _t59, _v12);
                    						_v20 = _t84;
                    						_t89 = E10002CD0(_t89, _t86, _t59, _v12);
                    						_t43 = _a8;
                    					} else {
                    						_v24 = _v24 & 0x00000000;
                    						_v20 = _v20 & 0x00000000;
                    						_t84 = _t86;
                    					}
                    					__eflags =  *_t43 - 0x2f;
                    					if( *_t43 != 0x2f) {
                    						goto L57;
                    					} else {
                    						_t89 = _v24;
                    						_t86 = _v20;
                    						goto L58;
                    					}
                    				}
                    				_t76 = _t64 - 0x21;
                    				if(_t76 == 0) {
                    					_t44 = 0;
                    					__eflags = _t89 | _t86;
                    					if((_t89 | _t86) != 0) {
                    						goto L55;
                    					}
                    					goto L48;
                    				}
                    				_t77 = _t76 - 4;
                    				if(_t77 == 0) {
                    					goto L21;
                    				}
                    				_t78 = _t77 - 1;
                    				if(_t78 == 0) {
                    					__eflags =  *((short*)(_t43 + 2)) - 0x26;
                    					if( *((short*)(_t43 + 2)) != 0x26) {
                    						_t89 = _t89 & _t59;
                    						_t86 = _t86 & _v12;
                    						goto L58;
                    					}
                    					__eflags = _t89 | _t86;
                    					if((_t89 | _t86) == 0) {
                    						goto L54;
                    					}
                    					__eflags = _t59 | _v12;
                    					if((_t59 | _v12) == 0) {
                    						goto L54;
                    					}
                    					goto L47;
                    				}
                    				_t79 = _t78 - 4;
                    				if(_t79 == 0) {
                    					_t44 = E10002BE0(_t89, _t86, _t59, _v12);
                    					goto L56;
                    				} else {
                    					_t80 = _t79 - 1;
                    					if(_t80 == 0) {
                    						_t89 = _t89 + _t59;
                    						asm("adc edi, [ebp-0x8]");
                    					} else {
                    						if(_t80 == 0) {
                    							_t89 = _t89 - _t59;
                    							asm("sbb edi, [ebp-0x8]");
                    						}
                    					}
                    					goto L58;
                    				}
                    			}



























                    0x100018a9
                    0x100018b3
                    0x100018bc
                    0x100018bf
                    0x100018c4
                    0x100018cd
                    0x100018d6
                    0x100018d8
                    0x100018da
                    0x100018df
                    0x100018e2
                    0x100018e9
                    0x100018f7
                    0x10001900
                    0x10001905
                    0x10001908
                    0x1000190e
                    0x1000190e
                    0x10001911
                    0x10001914
                    0x10001917
                    0x100019df
                    0x100019df
                    0x100019e2
                    0x10001a4d
                    0x10001a52
                    0x10001a61
                    0x10001a64
                    0x10001a6c
                    0x10001a6c
                    0x10001a6c
                    0x10001a6e
                    0x10001a6e
                    0x10001a6f
                    0x10001a6f
                    0x10001a71
                    0x10001a71
                    0x10001a73
                    0x10001a79
                    0x10001a82
                    0x10001a93
                    0x10001a9e
                    0x10001a9e
                    0x10001a66
                    0x10001a48
                    0x10001a48
                    0x10001a4a
                    0x10001a4a
                    0x00000000
                    0x10001a4a
                    0x10001a68
                    0x10001a6a
                    0x00000000
                    0x00000000
                    0x00000000
                    0x10001a6a
                    0x10001a56
                    0x10001a5a
                    0x00000000
                    0x10001a5a
                    0x100019e4
                    0x100019e4
                    0x100019e5
                    0x10001a3f
                    0x10001a41
                    0x00000000
                    0x00000000
                    0x10001a43
                    0x10001a46
                    0x00000000
                    0x00000000
                    0x00000000
                    0x10001a46
                    0x100019e7
                    0x100019e7
                    0x100019e8
                    0x10001a1e
                    0x10001a23
                    0x10001a32
                    0x10001a35
                    0x00000000
                    0x00000000
                    0x10001a37
                    0x00000000
                    0x00000000
                    0x10001a39
                    0x10001a3b
                    0x00000000
                    0x00000000
                    0x00000000
                    0x10001a3d
                    0x10001a27
                    0x10001a2b
                    0x00000000
                    0x10001a2b
                    0x100019ea
                    0x100019ea
                    0x100019ed
                    0x10001a17
                    0x10001a19
                    0x00000000
                    0x10001a19
                    0x100019ef
                    0x100019ef
                    0x100019f2
                    0x100019fe
                    0x10001a03
                    0x10001a10
                    0x10001a12
                    0x00000000
                    0x10001a12
                    0x10001a05
                    0x10001a07
                    0x00000000
                    0x00000000
                    0x10001a09
                    0x10001a0c
                    0x00000000
                    0x00000000
                    0x00000000
                    0x10001a0e
                    0x100019f5
                    0x100019f6
                    0x100019f8
                    0x100019fa
                    0x100019fa
                    0x00000000
                    0x100019f6
                    0x1000191d
                    0x10001996
                    0x10001998
                    0x1000199b
                    0x100019b7
                    0x100019ba
                    0x100019c5
                    0x100019c7
                    0x1000199d
                    0x1000199d
                    0x100019a1
                    0x100019a5
                    0x100019a5
                    0x100019ca
                    0x100019ce
                    0x00000000
                    0x100019d4
                    0x100019d4
                    0x100019d7
                    0x00000000
                    0x100019d7
                    0x100019ce
                    0x1000191f
                    0x10001922
                    0x10001987
                    0x10001989
                    0x1000198b
                    0x00000000
                    0x00000000
                    0x00000000
                    0x10001991
                    0x10001924
                    0x10001927
                    0x00000000
                    0x00000000
                    0x10001929
                    0x1000192a
                    0x10001960
                    0x10001965
                    0x1000197d
                    0x1000197f
                    0x00000000
                    0x1000197f
                    0x10001967
                    0x10001969
                    0x00000000
                    0x00000000
                    0x1000196f
                    0x10001972
                    0x00000000
                    0x00000000
                    0x00000000
                    0x10001978
                    0x1000192c
                    0x1000192f
                    0x10001956
                    0x00000000
                    0x10001931
                    0x10001931
                    0x10001932
                    0x10001946
                    0x10001948
                    0x10001934
                    0x10001936
                    0x1000193c
                    0x1000193e
                    0x1000193e
                    0x10001936
                    0x00000000
                    0x10001932

                    APIs
                    Memory Dump Source
                    • Source File: 00000000.00000002.669799652.0000000010001000.00000020.00000001.01000000.00000007.sdmp, Offset: 10000000, based on PE: true
                    • Associated: 00000000.00000002.669792729.0000000010000000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000000.00000002.669803934.0000000010003000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000000.00000002.669815812.0000000010005000.00000002.00000001.01000000.00000007.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_10000000_Ordene 501527,pdf.jbxd
                    Similarity
                    • API ID: FreeGlobal
                    • String ID:
                    • API String ID: 2979337801-0
                    • Opcode ID: fe7133a2f93821227e3a7e703367dd144469a15fe8ff947d0f1e508e715dc704
                    • Instruction ID: 56de187798276af1e94fdae5c91d23c4da0ac5596926d43ddda2a484f8c4ba85
                    • Opcode Fuzzy Hash: fe7133a2f93821227e3a7e703367dd144469a15fe8ff947d0f1e508e715dc704
                    • Instruction Fuzzy Hash: 82511336E06115ABFB14DFA488908EEBBF5FF863D0F16406AE801B315DD6706F809792
                    Uniqueness

                    Uniqueness Score: -1.00%

                    C-Code - Quality: 73%
                    			E00401DB3(intOrPtr __edx) {
                    				void* __esi;
                    				int _t9;
                    				signed char _t15;
                    				struct HFONT__* _t18;
                    				intOrPtr _t30;
                    				struct HDC__* _t31;
                    				void* _t33;
                    				void* _t35;
                    
                    				_t30 = __edx;
                    				_t31 = GetDC( *(_t35 - 8));
                    				_t9 = E00402C15(2);
                    				 *((intOrPtr*)(_t35 - 0x4c)) = _t30;
                    				0x40cdb0->lfHeight =  ~(MulDiv(_t9, GetDeviceCaps(_t31, 0x5a), 0x48));
                    				ReleaseDC( *(_t35 - 8), _t31);
                    				 *0x40cdc0 = E00402C15(3);
                    				_t15 =  *((intOrPtr*)(_t35 - 0x18));
                    				 *((intOrPtr*)(_t35 - 0x4c)) = _t30;
                    				 *0x40cdc7 = 1;
                    				 *0x40cdc4 = _t15 & 0x00000001;
                    				 *0x40cdc5 = _t15 & 0x00000002;
                    				 *0x40cdc6 = _t15 & 0x00000004;
                    				E00406281(_t9, _t31, _t33, 0x40cdcc,  *((intOrPtr*)(_t35 - 0x24)));
                    				_t18 = CreateFontIndirectW(0x40cdb0);
                    				_push(_t18);
                    				_push(_t33);
                    				E004061A6();
                    				 *0x7a8ac8 =  *0x7a8ac8 +  *((intOrPtr*)(_t35 - 4));
                    				return 0;
                    			}











                    0x00401db3
                    0x00401dbe
                    0x00401dc0
                    0x00401dcd
                    0x00401de4
                    0x00401de9
                    0x00401df6
                    0x00401dfb
                    0x00401dff
                    0x00401e0a
                    0x00401e11
                    0x00401e23
                    0x00401e29
                    0x00401e2e
                    0x00401e38
                    0x0040258c
                    0x0040156d
                    0x00402a65
                    0x00402ac2
                    0x00402ace

                    APIs
                    • GetDC.USER32(?), ref: 00401DB6
                    • GetDeviceCaps.GDI32(00000000,0000005A), ref: 00401DD0
                    • MulDiv.KERNEL32(00000000,00000000), ref: 00401DD8
                    • ReleaseDC.USER32 ref: 00401DE9
                    • CreateFontIndirectW.GDI32(0040CDB0), ref: 00401E38
                    Memory Dump Source
                    • Source File: 00000000.00000002.668679627.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000000.00000002.668672686.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.668695651.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.668709908.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.669360772.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.669367484.0000000000782000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.669373527.0000000000786000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.669383228.0000000000789000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.669410918.00000000007A4000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.669416138.00000000007A6000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.669434006.00000000007B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.669445400.00000000007C4000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.669547952.0000000000804000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_400000_Ordene 501527,pdf.jbxd
                    Similarity
                    • API ID: CapsCreateDeviceFontIndirectRelease
                    • String ID:
                    • API String ID: 3808545654-0
                    • Opcode ID: 32b3ac885727d1e190cdd40c39b4cdf091ab3af3085104150676e708dd364a64
                    • Instruction ID: 4d28dda0b40ea0953a32cffe00044d8590db675546aa8caf17c1304664b83f42
                    • Opcode Fuzzy Hash: 32b3ac885727d1e190cdd40c39b4cdf091ab3af3085104150676e708dd364a64
                    • Instruction Fuzzy Hash: 78017572954241EFE7006BB0AF8AB9A7FB4AF55301F10497EF241B71E2CA7800458F2D
                    Uniqueness

                    Uniqueness Score: -1.00%

                    C-Code - Quality: 100%
                    			E100015FF(struct HINSTANCE__* _a4, short* _a8) {
                    				_Unknown_base(*)()* _t7;
                    				void* _t10;
                    				int _t14;
                    
                    				_t14 = WideCharToMultiByte(0, 0, _a8, 0xffffffff, 0, 0, 0, 0);
                    				_t10 = GlobalAlloc(0x40, _t14);
                    				WideCharToMultiByte(0, 0, _a8, 0xffffffff, _t10, _t14, 0, 0);
                    				_t7 = GetProcAddress(_a4, _t10);
                    				GlobalFree(_t10);
                    				return _t7;
                    			}






                    0x10001619
                    0x10001625
                    0x10001632
                    0x10001639
                    0x10001642
                    0x1000164e

                    APIs
                    • WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,000000FF,00000000,00000000,00000000,00000000,00000808,00000000,?,00000000,10002148,?,00000808), ref: 10001617
                    • GlobalAlloc.KERNEL32(00000040,00000000,?,00000000,10002148,?,00000808), ref: 1000161E
                    • WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,000000FF,00000000,00000000,00000000,00000000,?,00000000,10002148,?,00000808), ref: 10001632
                    • GetProcAddress.KERNEL32(10002148,00000000), ref: 10001639
                    • GlobalFree.KERNEL32 ref: 10001642
                    Memory Dump Source
                    • Source File: 00000000.00000002.669799652.0000000010001000.00000020.00000001.01000000.00000007.sdmp, Offset: 10000000, based on PE: true
                    • Associated: 00000000.00000002.669792729.0000000010000000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000000.00000002.669803934.0000000010003000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000000.00000002.669815812.0000000010005000.00000002.00000001.01000000.00000007.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_10000000_Ordene 501527,pdf.jbxd
                    Similarity
                    • API ID: ByteCharGlobalMultiWide$AddressAllocFreeProc
                    • String ID:
                    • API String ID: 1148316912-0
                    • Opcode ID: 06a7266b7a9176b24ef6afb6e544002b11bc6a2d13ae022cf9eb1808419c0062
                    • Instruction ID: 7647a3e7d8fb005f6fbf822ef0874fdc4783f8eaf5d0662476f5196d1f8db515
                    • Opcode Fuzzy Hash: 06a7266b7a9176b24ef6afb6e544002b11bc6a2d13ae022cf9eb1808419c0062
                    • Instruction Fuzzy Hash: 7CF098722071387BE62117A78C8CD9BBF9CDF8B2F5B114215F628921A4C6619D019BF1
                    Uniqueness

                    Uniqueness Score: -1.00%

                    C-Code - Quality: 100%
                    			E00401D57() {
                    				void* _t18;
                    				struct HINSTANCE__* _t22;
                    				struct HWND__* _t25;
                    				void* _t27;
                    
                    				_t25 = GetDlgItem( *(_t27 - 8),  *(_t27 - 0x24));
                    				GetClientRect(_t25, _t27 - 0x58);
                    				_t18 = SendMessageW(_t25, 0x172, _t22, LoadImageW(_t22, E00402C37(_t22), _t22,  *(_t27 - 0x50) *  *(_t27 - 0x20),  *(_t27 - 0x4c) *  *(_t27 - 0x20), 0x10));
                    				if(_t18 != _t22) {
                    					DeleteObject(_t18);
                    				}
                    				 *0x7a8ac8 =  *0x7a8ac8 +  *((intOrPtr*)(_t27 - 4));
                    				return 0;
                    			}







                    0x00401d63
                    0x00401d6a
                    0x00401d99
                    0x00401da1
                    0x00401da8
                    0x00401da8
                    0x00402ac2
                    0x00402ace

                    APIs
                    • GetDlgItem.USER32 ref: 00401D5D
                    • GetClientRect.USER32 ref: 00401D6A
                    • LoadImageW.USER32 ref: 00401D8B
                    • SendMessageW.USER32(00000000,00000172,?,00000000), ref: 00401D99
                    • DeleteObject.GDI32(00000000), ref: 00401DA8
                    Memory Dump Source
                    • Source File: 00000000.00000002.668679627.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000000.00000002.668672686.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.668695651.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.668709908.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.669360772.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.669367484.0000000000782000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.669373527.0000000000786000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.669383228.0000000000789000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.669410918.00000000007A4000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.669416138.00000000007A6000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.669434006.00000000007B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.669445400.00000000007C4000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.669547952.0000000000804000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_400000_Ordene 501527,pdf.jbxd
                    Similarity
                    • API ID: ClientDeleteImageItemLoadMessageObjectRectSend
                    • String ID:
                    • API String ID: 1849352358-0
                    • Opcode ID: cc728061620f20d5e0d37b1369d565f8e4f09e4f85e9af9718940329eea21767
                    • Instruction ID: d6b80873b4a6bbd9af873cfa92cf23dd081e8a17906ab7f6c0372a94bb23d9f5
                    • Opcode Fuzzy Hash: cc728061620f20d5e0d37b1369d565f8e4f09e4f85e9af9718940329eea21767
                    • Instruction Fuzzy Hash: 03F0ECB2604518AFDB41DBE4DE88CEEB7BCEB48341B14446AF641F6191CA789D118B68
                    Uniqueness

                    Uniqueness Score: -1.00%

                    C-Code - Quality: 77%
                    			E00404A7F(int _a4, intOrPtr _a8, signed int _a12, signed int _a16) {
                    				char _v68;
                    				char _v132;
                    				void* __ebx;
                    				void* __edi;
                    				void* __esi;
                    				signed int _t23;
                    				signed int _t24;
                    				void* _t31;
                    				void* _t33;
                    				void* _t34;
                    				void* _t44;
                    				signed int _t46;
                    				signed int _t50;
                    				signed int _t52;
                    				signed int _t53;
                    				signed int _t55;
                    
                    				_t23 = _a16;
                    				_t53 = _a12;
                    				_t44 = 0xffffffdc;
                    				if(_t23 == 0) {
                    					_push(0x14);
                    					_pop(0);
                    					_t24 = _t53;
                    					if(_t53 < 0x100000) {
                    						_push(0xa);
                    						_pop(0);
                    						_t44 = 0xffffffdd;
                    					}
                    					if(_t53 < 0x400) {
                    						_t44 = 0xffffffde;
                    					}
                    					if(_t53 < 0xffff3333) {
                    						_t52 = 0x14;
                    						asm("cdq");
                    						_t24 = 1 / _t52 + _t53;
                    					}
                    					_t25 = _t24 & 0x00ffffff;
                    					_t55 = _t24 >> 0;
                    					_t46 = 0xa;
                    					_t50 = ((_t24 & 0x00ffffff) + _t25 * 4 + (_t24 & 0x00ffffff) + _t25 * 4 >> 0) % _t46;
                    				} else {
                    					_t55 = (_t23 << 0x00000020 | _t53) >> 0x14;
                    					_t50 = 0;
                    				}
                    				_t31 = E00406281(_t44, _t50, _t55,  &_v68, 0xffffffdf);
                    				_t33 = E00406281(_t44, _t50, _t55,  &_v132, _t44);
                    				_t34 = E00406281(_t44, _t50, 0x7a1f20, 0x7a1f20, _a8);
                    				wsprintfW(_t34 + lstrlenW(0x7a1f20) * 2, L"%u.%u%s%s", _t55, _t50, _t33, _t31);
                    				return SetDlgItemTextW( *0x7a79f8, _a4, 0x7a1f20);
                    			}



















                    0x00404a88
                    0x00404a8d
                    0x00404a95
                    0x00404a96
                    0x00404aa3
                    0x00404aab
                    0x00404aac
                    0x00404aae
                    0x00404ab0
                    0x00404ab2
                    0x00404ab5
                    0x00404ab5
                    0x00404abc
                    0x00404ac2
                    0x00404ac2
                    0x00404ac9
                    0x00404ad0
                    0x00404ad3
                    0x00404ad6
                    0x00404ad6
                    0x00404ada
                    0x00404aea
                    0x00404aec
                    0x00404aef
                    0x00404a98
                    0x00404a98
                    0x00404a9f
                    0x00404a9f
                    0x00404af7
                    0x00404b02
                    0x00404b18
                    0x00404b29
                    0x00404b45

                    APIs
                    • lstrlenW.KERNEL32(007A1F20,007A1F20,?,%u.%u%s%s,00000005,00000000,00000000,?,000000DC,00000000,?,000000DF,00000000,00000400,?), ref: 00404B20
                    • wsprintfW.USER32 ref: 00404B29
                    • SetDlgItemTextW.USER32 ref: 00404B3C
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.668679627.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000000.00000002.668672686.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.668695651.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.668709908.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.669360772.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.669367484.0000000000782000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.669373527.0000000000786000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.669383228.0000000000789000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.669410918.00000000007A4000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.669416138.00000000007A6000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.669434006.00000000007B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.669445400.00000000007C4000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.669547952.0000000000804000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_400000_Ordene 501527,pdf.jbxd
                    Similarity
                    • API ID: ItemTextlstrlenwsprintf
                    • String ID: %u.%u%s%s
                    • API String ID: 3540041739-3551169577
                    • Opcode ID: 921f56d8c577ebeda8e7a29d3bc6ea839f85b3a3b7952d16a54f9d6d67acb9aa
                    • Instruction ID: e59333b35207274dfa12745fa15a0a2b1e84881af2dc0bba7fa0e94120285970
                    • Opcode Fuzzy Hash: 921f56d8c577ebeda8e7a29d3bc6ea839f85b3a3b7952d16a54f9d6d67acb9aa
                    • Instruction Fuzzy Hash: AD11EB73A441283BDB00A66D9C45E9E3298DB85374F250237FE26F21D1DD78C82286E8
                    Uniqueness

                    Uniqueness Score: -1.00%

                    C-Code - Quality: 59%
                    			E00401C19(intOrPtr __edx) {
                    				int _t29;
                    				long _t30;
                    				signed int _t32;
                    				WCHAR* _t35;
                    				long _t36;
                    				int _t41;
                    				signed int _t42;
                    				int _t46;
                    				int _t56;
                    				intOrPtr _t57;
                    				struct HWND__* _t61;
                    				void* _t64;
                    
                    				_t57 = __edx;
                    				_t29 = E00402C15(3);
                    				 *((intOrPtr*)(_t64 - 0x4c)) = _t57;
                    				 *(_t64 - 0x10) = _t29;
                    				_t30 = E00402C15(4);
                    				 *((intOrPtr*)(_t64 - 0x4c)) = _t57;
                    				 *(_t64 + 8) = _t30;
                    				if(( *(_t64 - 0x14) & 0x00000001) != 0) {
                    					 *((intOrPtr*)(__ebp - 0x10)) = E00402C37(0x33);
                    				}
                    				__eflags =  *(_t64 - 0x14) & 0x00000002;
                    				if(( *(_t64 - 0x14) & 0x00000002) != 0) {
                    					 *(_t64 + 8) = E00402C37(0x44);
                    				}
                    				__eflags =  *((intOrPtr*)(_t64 - 0x2c)) - 0x21;
                    				_push(1);
                    				if(__eflags != 0) {
                    					_t59 = E00402C37();
                    					_t32 = E00402C37();
                    					asm("sbb ecx, ecx");
                    					asm("sbb eax, eax");
                    					_t35 =  ~( *_t31) & _t59;
                    					__eflags = _t35;
                    					_t36 = FindWindowExW( *(_t64 - 0x10),  *(_t64 + 8), _t35,  ~( *_t32) & _t32);
                    					goto L10;
                    				} else {
                    					_t61 = E00402C15();
                    					 *((intOrPtr*)(_t64 - 0x4c)) = _t57;
                    					_t41 = E00402C15(2);
                    					 *((intOrPtr*)(_t64 - 0x4c)) = _t57;
                    					_t56 =  *(_t64 - 0x14) >> 2;
                    					if(__eflags == 0) {
                    						_t36 = SendMessageW(_t61, _t41,  *(_t64 - 0x10),  *(_t64 + 8));
                    						L10:
                    						 *(_t64 - 0x30) = _t36;
                    					} else {
                    						_t42 = SendMessageTimeoutW(_t61, _t41,  *(_t64 - 0x10),  *(_t64 + 8), _t46, _t56, _t64 - 0x30);
                    						asm("sbb eax, eax");
                    						 *((intOrPtr*)(_t64 - 4)) =  ~_t42 + 1;
                    					}
                    				}
                    				__eflags =  *((intOrPtr*)(_t64 - 0x28)) - _t46;
                    				if( *((intOrPtr*)(_t64 - 0x28)) >= _t46) {
                    					_push( *(_t64 - 0x30));
                    					E004061A6();
                    				}
                    				 *0x7a8ac8 =  *0x7a8ac8 +  *((intOrPtr*)(_t64 - 4));
                    				return 0;
                    			}















                    0x00401c19
                    0x00401c1b
                    0x00401c22
                    0x00401c25
                    0x00401c28
                    0x00401c32
                    0x00401c36
                    0x00401c39
                    0x00401c42
                    0x00401c42
                    0x00401c45
                    0x00401c49
                    0x00401c52
                    0x00401c52
                    0x00401c55
                    0x00401c59
                    0x00401c5b
                    0x00401cb0
                    0x00401cb2
                    0x00401cbd
                    0x00401cc7
                    0x00401cca
                    0x00401cca
                    0x00401cd3
                    0x00000000
                    0x00401c5d
                    0x00401c64
                    0x00401c66
                    0x00401c69
                    0x00401c6f
                    0x00401c76
                    0x00401c79
                    0x00401ca1
                    0x00401cd9
                    0x00401cd9
                    0x00401c7b
                    0x00401c89
                    0x00401c91
                    0x00401c94
                    0x00401c94
                    0x00401c79
                    0x00401cdc
                    0x00401cdf
                    0x00401ce5
                    0x00402a65
                    0x00402a65
                    0x00402ac2
                    0x00402ace

                    APIs
                    • SendMessageTimeoutW.USER32 ref: 00401C89
                    • SendMessageW.USER32(00000000,00000000,?,?), ref: 00401CA1
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.668679627.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000000.00000002.668672686.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.668695651.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.668709908.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.669360772.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.669367484.0000000000782000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.669373527.0000000000786000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.669383228.0000000000789000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.669410918.00000000007A4000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.669416138.00000000007A6000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.669434006.00000000007B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.669445400.00000000007C4000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.669547952.0000000000804000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_400000_Ordene 501527,pdf.jbxd
                    Similarity
                    • API ID: MessageSend$Timeout
                    • String ID: !
                    • API String ID: 1777923405-2657877971
                    • Opcode ID: 5919f67f2777536d9952f6f89c1533c84c042fad2d025a3d60f84bb0beff1c10
                    • Instruction ID: 77761fc61529e842a28ee3ca09cff7144389c8643cc82091ff338806125a9860
                    • Opcode Fuzzy Hash: 5919f67f2777536d9952f6f89c1533c84c042fad2d025a3d60f84bb0beff1c10
                    • Instruction Fuzzy Hash: 9121C1B1948209AEEF05AFA5CE4AABE7BB4EF84308F14443EF502F61D0D7B84541DB18
                    Uniqueness

                    Uniqueness Score: -1.00%

                    C-Code - Quality: 83%
                    			E004023DE(void* __eax, int __ebx, intOrPtr __edx) {
                    				void* _t20;
                    				void* _t21;
                    				int _t24;
                    				int _t30;
                    				intOrPtr _t33;
                    				void* _t34;
                    				intOrPtr _t37;
                    				void* _t39;
                    				void* _t42;
                    
                    				_t33 = __edx;
                    				_t30 = __ebx;
                    				_t37 =  *((intOrPtr*)(_t39 - 0x18));
                    				_t34 = __eax;
                    				 *(_t39 - 0x4c) =  *(_t39 - 0x14);
                    				 *(_t39 - 0x3c) = E00402C37(2);
                    				_t20 = E00402C37(0x11);
                    				 *(_t39 - 4) = 1;
                    				_t21 = E00402CC7(_t42, _t34, _t20, 2);
                    				 *(_t39 + 8) = _t21;
                    				if(_t21 != __ebx) {
                    					_t24 = 0;
                    					if(_t37 == 1) {
                    						E00402C37(0x23);
                    						_t24 = lstrlenW(0x40b5a8) + _t29 + 2;
                    					}
                    					if(_t37 == 4) {
                    						 *0x40b5a8 = E00402C15(3);
                    						 *((intOrPtr*)(_t39 - 0x30)) = _t33;
                    						_t24 = _t37;
                    					}
                    					if(_t37 == 3) {
                    						_t24 = E004030FA( *((intOrPtr*)(_t39 - 0x1c)), _t30, 0x40b5a8, 0x1800);
                    					}
                    					if(RegSetValueExW( *(_t39 + 8),  *(_t39 - 0x3c), _t30,  *(_t39 - 0x4c), 0x40b5a8, _t24) == 0) {
                    						 *(_t39 - 4) = _t30;
                    					}
                    					_push( *(_t39 + 8));
                    					RegCloseKey();
                    				}
                    				 *0x7a8ac8 =  *0x7a8ac8 +  *(_t39 - 4);
                    				return 0;
                    			}












                    0x004023de
                    0x004023de
                    0x004023de
                    0x004023e1
                    0x004023e8
                    0x004023f2
                    0x004023f5
                    0x004023fe
                    0x00402405
                    0x0040240c
                    0x0040240f
                    0x00402415
                    0x0040241f
                    0x00402423
                    0x0040242e
                    0x0040242e
                    0x00402435
                    0x0040243f
                    0x00402445
                    0x00402448
                    0x00402448
                    0x0040244c
                    0x00402458
                    0x00402458
                    0x00402471
                    0x00402473
                    0x00402473
                    0x00402476
                    0x00402551
                    0x00402551
                    0x00402ac2
                    0x00402ace

                    APIs
                    • lstrlenW.KERNEL32(C:\Users\user\AppData\Local\Temp\nshB62A.tmp,00000023,00000011,00000002), ref: 00402429
                    • RegSetValueExW.ADVAPI32(?,?,?,?,C:\Users\user\AppData\Local\Temp\nshB62A.tmp,00000000,00000011,00000002), ref: 00402469
                    • RegCloseKey.ADVAPI32(?,?,?,C:\Users\user\AppData\Local\Temp\nshB62A.tmp,00000000,00000011,00000002), ref: 00402551
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.668679627.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000000.00000002.668672686.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.668695651.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.668709908.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.669360772.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.669367484.0000000000782000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.669373527.0000000000786000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.669383228.0000000000789000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.669410918.00000000007A4000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.669416138.00000000007A6000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.669434006.00000000007B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.669445400.00000000007C4000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.669547952.0000000000804000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_400000_Ordene 501527,pdf.jbxd
                    Similarity
                    • API ID: CloseValuelstrlen
                    • String ID: C:\Users\user\AppData\Local\Temp\nshB62A.tmp
                    • API String ID: 2655323295-1725162748
                    • Opcode ID: 1b80f635f5b6e32c73cc9f25b0265119b1197f5afe6efbee3545c409ded7f5e6
                    • Instruction ID: 065199c4180da03f85bcad36feea8d83242cacde3b0560515a804f641c4ac6e3
                    • Opcode Fuzzy Hash: 1b80f635f5b6e32c73cc9f25b0265119b1197f5afe6efbee3545c409ded7f5e6
                    • Instruction Fuzzy Hash: 21119371E00108BEEB10AFA5DE49EAEBAB4EB54354F11803BF504F71D1DBB84D419B58
                    Uniqueness

                    Uniqueness Score: -1.00%

                    C-Code - Quality: 100%
                    			E00405BDB(WCHAR* _a4) {
                    				WCHAR* _t5;
                    				short* _t7;
                    				WCHAR* _t10;
                    				short _t11;
                    				WCHAR* _t12;
                    				void* _t14;
                    
                    				_t12 = _a4;
                    				_t10 = CharNextW(_t12);
                    				_t5 = CharNextW(_t10);
                    				_t11 =  *_t12;
                    				if(_t11 == 0 ||  *_t10 != 0x3a || _t10[1] != 0x5c) {
                    					if(_t11 != 0x5c || _t12[1] != _t11) {
                    						L10:
                    						return 0;
                    					} else {
                    						_t14 = 2;
                    						while(1) {
                    							_t14 = _t14 - 1;
                    							_t7 = E00405B5D(_t5, 0x5c);
                    							if( *_t7 == 0) {
                    								goto L10;
                    							}
                    							_t5 = _t7 + 2;
                    							if(_t14 != 0) {
                    								continue;
                    							}
                    							return _t5;
                    						}
                    						goto L10;
                    					}
                    				} else {
                    					return CharNextW(_t5);
                    				}
                    			}









                    0x00405be4
                    0x00405beb
                    0x00405bee
                    0x00405bf0
                    0x00405bf6
                    0x00405c0e
                    0x00405c30
                    0x00000000
                    0x00405c16
                    0x00405c18
                    0x00405c19
                    0x00405c1c
                    0x00405c1d
                    0x00405c26
                    0x00000000
                    0x00000000
                    0x00405c29
                    0x00405c2c
                    0x00000000
                    0x00000000
                    0x00000000
                    0x00405c2c
                    0x00000000
                    0x00405c19
                    0x00405c05
                    0x00000000
                    0x00405c06

                    APIs
                    • CharNextW.USER32(?,?,C:\Users\user\AppData\Local\Temp\nshB62A.tmp,?,00405C4F,C:\Users\user\AppData\Local\Temp\nshB62A.tmp,C:\Users\user\AppData\Local\Temp\nshB62A.tmp,?,?,76DDFAA0,0040598D,?,C:\Users\user\AppData\Local\Temp\,76DDFAA0,00000000), ref: 00405BE9
                    • CharNextW.USER32(00000000), ref: 00405BEE
                    • CharNextW.USER32(00000000), ref: 00405C06
                    Strings
                    • C:\Users\user\AppData\Local\Temp\nshB62A.tmp, xrefs: 00405BDC
                    Memory Dump Source
                    • Source File: 00000000.00000002.668679627.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000000.00000002.668672686.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.668695651.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.668709908.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.669360772.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.669367484.0000000000782000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.669373527.0000000000786000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.669383228.0000000000789000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.669410918.00000000007A4000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.669416138.00000000007A6000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.669434006.00000000007B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.669445400.00000000007C4000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.669547952.0000000000804000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_400000_Ordene 501527,pdf.jbxd
                    Similarity
                    • API ID: CharNext
                    • String ID: C:\Users\user\AppData\Local\Temp\nshB62A.tmp
                    • API String ID: 3213498283-1725162748
                    • Opcode ID: aebd7a4b5de8b759b0e4f0e56dc0d79cfb69ab96c88f82fda94e21a8a16d65f8
                    • Instruction ID: 1410c8af8588119ed7c7bec0a33194e6879e2746ee2e5cb83f2c5ed70d44d846
                    • Opcode Fuzzy Hash: aebd7a4b5de8b759b0e4f0e56dc0d79cfb69ab96c88f82fda94e21a8a16d65f8
                    • Instruction Fuzzy Hash: 26F09022918B2D95FF3177584C55E7766B8EB55760B00803BE641B72C0D3F85C818EAA
                    Uniqueness

                    Uniqueness Score: -1.00%

                    C-Code - Quality: 58%
                    			E00405B30(WCHAR* _a4) {
                    				WCHAR* _t9;
                    
                    				_t9 = _a4;
                    				_push( &(_t9[lstrlenW(_t9)]));
                    				_push(_t9);
                    				if( *(CharPrevW()) != 0x5c) {
                    					lstrcatW(_t9, 0x40a014);
                    				}
                    				return _t9;
                    			}




                    0x00405b31
                    0x00405b3e
                    0x00405b3f
                    0x00405b4a
                    0x00405b52
                    0x00405b52
                    0x00405b5a

                    APIs
                    • lstrlenW.KERNEL32(?,C:\Users\user\AppData\Local\Temp\,0040333D,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,76DDFAA0,0040359C,?,00000006,00000008,0000000A), ref: 00405B36
                    • CharPrevW.USER32(?,00000000,?,C:\Users\user\AppData\Local\Temp\,0040333D,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,76DDFAA0,0040359C,?,00000006,00000008,0000000A), ref: 00405B40
                    • lstrcatW.KERNEL32(?,0040A014), ref: 00405B52
                    Strings
                    • C:\Users\user\AppData\Local\Temp\, xrefs: 00405B30
                    Memory Dump Source
                    • Source File: 00000000.00000002.668679627.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000000.00000002.668672686.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.668695651.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.668709908.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.669360772.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.669367484.0000000000782000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.669373527.0000000000786000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.669383228.0000000000789000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.669410918.00000000007A4000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.669416138.00000000007A6000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.669434006.00000000007B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.669445400.00000000007C4000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.669547952.0000000000804000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_400000_Ordene 501527,pdf.jbxd
                    Similarity
                    • API ID: CharPrevlstrcatlstrlen
                    • String ID: C:\Users\user\AppData\Local\Temp\
                    • API String ID: 2659869361-823278215
                    • Opcode ID: 2d89e3346713fcbf25affea4869717dbbf7bb0cb650dc976aff6b925dbbb9e25
                    • Instruction ID: 96ba7b99f7925edb235d18d004fc1fe51c5fb87b1b333c4bf7b8a2937e57358f
                    • Opcode Fuzzy Hash: 2d89e3346713fcbf25affea4869717dbbf7bb0cb650dc976aff6b925dbbb9e25
                    • Instruction Fuzzy Hash: 44D05E21101924AAC1117B448C04EDF72ACAE45344342007AF241B30A1CB78295286FD
                    Uniqueness

                    Uniqueness Score: -1.00%

                    C-Code - Quality: 84%
                    			E00402D2A(void* __eflags, void* _a4, short* _a8, signed int _a12) {
                    				void* _v8;
                    				short _v532;
                    				void* _t19;
                    				signed int _t26;
                    				intOrPtr* _t28;
                    				signed int _t33;
                    				signed int _t34;
                    				signed int _t35;
                    
                    				_t34 = _a12;
                    				_t35 = _t34 & 0x00000300;
                    				_t33 = _t34 & 0x00000001;
                    				_t19 = E004060CC(__eflags, _a4, _a8, _t35 | 0x00000008,  &_v8);
                    				if(_t19 == 0) {
                    					while(RegEnumKeyW(_v8, 0,  &_v532, 0x105) == 0) {
                    						__eflags = _t33;
                    						if(__eflags != 0) {
                    							RegCloseKey(_v8);
                    							return 1;
                    						}
                    						_t26 = E00402D2A(__eflags, _v8,  &_v532, _a12);
                    						__eflags = _t26;
                    						if(_t26 != 0) {
                    							break;
                    						}
                    					}
                    					RegCloseKey(_v8);
                    					_t28 = E00406639(3);
                    					if(_t28 == 0) {
                    						return RegDeleteKeyW(_a4, _a8);
                    					}
                    					return  *_t28(_a4, _a8, _t35, 0);
                    				}
                    				return _t19;
                    			}











                    0x00402d35
                    0x00402d3e
                    0x00402d47
                    0x00402d53
                    0x00402d5a
                    0x00402d7e
                    0x00402d64
                    0x00402d66
                    0x00402db9
                    0x00000000
                    0x00402dc1
                    0x00402d75
                    0x00402d7a
                    0x00402d7c
                    0x00000000
                    0x00000000
                    0x00402d7c
                    0x00402d98
                    0x00402da0
                    0x00402da7
                    0x00000000
                    0x00402dca
                    0x00000000
                    0x00402db2
                    0x00402dd4

                    APIs
                    • RegEnumKeyW.ADVAPI32(?,00000000,?,00000105), ref: 00402D8F
                    • RegCloseKey.ADVAPI32(?), ref: 00402D98
                    • RegCloseKey.ADVAPI32(?), ref: 00402DB9
                    Memory Dump Source
                    • Source File: 00000000.00000002.668679627.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000000.00000002.668672686.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.668695651.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.668709908.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.669360772.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.669367484.0000000000782000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.669373527.0000000000786000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.669383228.0000000000789000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.669410918.00000000007A4000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.669416138.00000000007A6000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.669434006.00000000007B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.669445400.00000000007C4000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.669547952.0000000000804000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_400000_Ordene 501527,pdf.jbxd
                    Similarity
                    • API ID: Close$Enum
                    • String ID:
                    • API String ID: 464197530-0
                    • Opcode ID: 820009e43a9071b4c2fbcc767f02e7592704dcbe5a8c35a15d570ca0c02c344c
                    • Instruction ID: 13ce92619e22af03a8d5f803c99d3fa2c3d1cb872fac5522cbaad6f830247a1d
                    • Opcode Fuzzy Hash: 820009e43a9071b4c2fbcc767f02e7592704dcbe5a8c35a15d570ca0c02c344c
                    • Instruction Fuzzy Hash: 94116A32540509FBEF129F90CE09BEE7B69EF58350F110036B905B60E0E7B5DE21AB68
                    Uniqueness

                    Uniqueness Score: -1.00%

                    C-Code - Quality: 100%
                    			E00402E5D(intOrPtr _a4) {
                    				long _t2;
                    				struct HWND__* _t3;
                    				struct HWND__* _t6;
                    
                    				if(_a4 == 0) {
                    					__eflags =  *0x7976d8; // 0x0
                    					if(__eflags == 0) {
                    						_t2 = GetTickCount();
                    						__eflags = _t2 -  *0x7a8a30;
                    						if(_t2 >  *0x7a8a30) {
                    							_t3 = CreateDialogParamW( *0x7a8a20, 0x6f, 0, E00402DD7, 0);
                    							 *0x7976d8 = _t3;
                    							return ShowWindow(_t3, 5);
                    						}
                    						return _t2;
                    					} else {
                    						return E00406675(0);
                    					}
                    				} else {
                    					_t6 =  *0x7976d8; // 0x0
                    					if(_t6 != 0) {
                    						_t6 = DestroyWindow(_t6);
                    					}
                    					 *0x7976d8 = 0;
                    					return _t6;
                    				}
                    			}






                    0x00402e64
                    0x00402e7e
                    0x00402e84
                    0x00402e8e
                    0x00402e94
                    0x00402e9a
                    0x00402eab
                    0x00402eb4
                    0x00000000
                    0x00402eb9
                    0x00402ec0
                    0x00402e86
                    0x00402e8d
                    0x00402e8d
                    0x00402e66
                    0x00402e66
                    0x00402e6d
                    0x00402e70
                    0x00402e70
                    0x00402e76
                    0x00402e7d
                    0x00402e7d

                    APIs
                    • DestroyWindow.USER32(00000000,00000000,0040303D,00000001,?,00000006,00000008,0000000A), ref: 00402E70
                    • GetTickCount.KERNEL32 ref: 00402E8E
                    • CreateDialogParamW.USER32 ref: 00402EAB
                    • ShowWindow.USER32(00000000,00000005,?,00000006,00000008,0000000A), ref: 00402EB9
                    Memory Dump Source
                    • Source File: 00000000.00000002.668679627.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000000.00000002.668672686.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.668695651.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.668709908.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.669360772.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.669367484.0000000000782000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.669373527.0000000000786000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.669383228.0000000000789000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.669410918.00000000007A4000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.669416138.00000000007A6000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.669434006.00000000007B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.669445400.00000000007C4000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.669547952.0000000000804000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_400000_Ordene 501527,pdf.jbxd
                    Similarity
                    • API ID: Window$CountCreateDestroyDialogParamShowTick
                    • String ID:
                    • API String ID: 2102729457-0
                    • Opcode ID: fb346d16a057b98ea5efc0227cce21c5f766e4cb6d5f8b71d3ef2c60fce90910
                    • Instruction ID: 7afe0c5cdde3553510745d2e994aff72f2021582eecc7c7a9da0eee8c5fdd21f
                    • Opcode Fuzzy Hash: fb346d16a057b98ea5efc0227cce21c5f766e4cb6d5f8b71d3ef2c60fce90910
                    • Instruction Fuzzy Hash: B3F05E30966A21EBC6616B24FE8C99B7B64AB44B41B15887BF041B11B8DA784891CBDC
                    Uniqueness

                    Uniqueness Score: -1.00%

                    C-Code - Quality: 53%
                    			E00405C38(void* __eflags, intOrPtr _a4) {
                    				int _t11;
                    				signed char* _t12;
                    				intOrPtr _t18;
                    				intOrPtr* _t21;
                    				signed int _t23;
                    
                    				E0040625F(0x7a4728, _a4);
                    				_t21 = E00405BDB(0x7a4728);
                    				if(_t21 != 0) {
                    					E004064F3(_t21);
                    					if(( *0x7a8a3c & 0x00000080) == 0) {
                    						L5:
                    						_t23 = _t21 - 0x7a4728 >> 1;
                    						while(1) {
                    							_t11 = lstrlenW(0x7a4728);
                    							_push(0x7a4728);
                    							if(_t11 <= _t23) {
                    								break;
                    							}
                    							_t12 = E004065A2();
                    							if(_t12 == 0 || ( *_t12 & 0x00000010) != 0) {
                    								E00405B7C(0x7a4728);
                    								continue;
                    							} else {
                    								goto L1;
                    							}
                    						}
                    						E00405B30();
                    						return 0 | GetFileAttributesW(??) != 0xffffffff;
                    					}
                    					_t18 =  *_t21;
                    					if(_t18 == 0 || _t18 == 0x5c) {
                    						goto L1;
                    					} else {
                    						goto L5;
                    					}
                    				}
                    				L1:
                    				return 0;
                    			}








                    0x00405c44
                    0x00405c4f
                    0x00405c53
                    0x00405c5a
                    0x00405c66
                    0x00405c76
                    0x00405c78
                    0x00405c90
                    0x00405c91
                    0x00405c98
                    0x00405c99
                    0x00000000
                    0x00000000
                    0x00405c7c
                    0x00405c83
                    0x00405c8b
                    0x00000000
                    0x00000000
                    0x00000000
                    0x00000000
                    0x00405c83
                    0x00405c9b
                    0x00000000
                    0x00405caf
                    0x00405c68
                    0x00405c6e
                    0x00000000
                    0x00000000
                    0x00000000
                    0x00000000
                    0x00405c6e
                    0x00405c55
                    0x00000000

                    APIs
                      • Part of subcall function 0040625F: lstrcpynW.KERNEL32(?,?,00000400,00403421,007A7A20,NSIS Error,?,00000006,00000008,0000000A), ref: 0040626C
                      • Part of subcall function 00405BDB: CharNextW.USER32(?,?,C:\Users\user\AppData\Local\Temp\nshB62A.tmp,?,00405C4F,C:\Users\user\AppData\Local\Temp\nshB62A.tmp,C:\Users\user\AppData\Local\Temp\nshB62A.tmp,?,?,76DDFAA0,0040598D,?,C:\Users\user\AppData\Local\Temp\,76DDFAA0,00000000), ref: 00405BE9
                      • Part of subcall function 00405BDB: CharNextW.USER32(00000000), ref: 00405BEE
                      • Part of subcall function 00405BDB: CharNextW.USER32(00000000), ref: 00405C06
                    • lstrlenW.KERNEL32(C:\Users\user\AppData\Local\Temp\nshB62A.tmp,00000000,C:\Users\user\AppData\Local\Temp\nshB62A.tmp,C:\Users\user\AppData\Local\Temp\nshB62A.tmp,?,?,76DDFAA0,0040598D,?,C:\Users\user\AppData\Local\Temp\,76DDFAA0,00000000), ref: 00405C91
                    • GetFileAttributesW.KERNEL32(C:\Users\user\AppData\Local\Temp\nshB62A.tmp,C:\Users\user\AppData\Local\Temp\nshB62A.tmp,C:\Users\user\AppData\Local\Temp\nshB62A.tmp,C:\Users\user\AppData\Local\Temp\nshB62A.tmp,C:\Users\user\AppData\Local\Temp\nshB62A.tmp,C:\Users\user\AppData\Local\Temp\nshB62A.tmp,00000000,C:\Users\user\AppData\Local\Temp\nshB62A.tmp,C:\Users\user\AppData\Local\Temp\nshB62A.tmp,?,?,76DDFAA0,0040598D,?,C:\Users\user\AppData\Local\Temp\,76DDFAA0), ref: 00405CA1
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.668679627.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000000.00000002.668672686.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.668695651.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.668709908.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.669360772.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.669367484.0000000000782000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.669373527.0000000000786000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.669383228.0000000000789000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.669410918.00000000007A4000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.669416138.00000000007A6000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.669434006.00000000007B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.669445400.00000000007C4000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.669547952.0000000000804000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_400000_Ordene 501527,pdf.jbxd
                    Similarity
                    • API ID: CharNext$AttributesFilelstrcpynlstrlen
                    • String ID: C:\Users\user\AppData\Local\Temp\nshB62A.tmp
                    • API String ID: 3248276644-1725162748
                    • Opcode ID: 2fc0a06e40463135d25c9bc8da77120e69662948dae603a13584a31230773222
                    • Instruction ID: 07588a96ba491492048338639ced47dd8f75e02a3aa2c86f807570fea5ede87b
                    • Opcode Fuzzy Hash: 2fc0a06e40463135d25c9bc8da77120e69662948dae603a13584a31230773222
                    • Instruction Fuzzy Hash: 3FF0D125008F1115E72233361D49EAF2664CE96360B1A023FF952B12D1DB3C99939C6E
                    Uniqueness

                    Uniqueness Score: -1.00%

                    C-Code - Quality: 89%
                    			E00405237(struct HWND__* _a4, int _a8, int _a12, long _a16) {
                    				int _t15;
                    				long _t16;
                    
                    				_t15 = _a8;
                    				if(_t15 != 0x102) {
                    					if(_t15 != 0x200) {
                    						_t16 = _a16;
                    						L7:
                    						if(_t15 == 0x419 &&  *0x7a1f0c != _t16) {
                    							_push(_t16);
                    							_push(6);
                    							 *0x7a1f0c = _t16;
                    							E00404C0D();
                    						}
                    						L11:
                    						return CallWindowProcW( *0x7a1f14, _a4, _t15, _a12, _t16);
                    					}
                    					if(IsWindowVisible(_a4) == 0) {
                    						L10:
                    						_t16 = _a16;
                    						goto L11;
                    					}
                    					_t16 = E00404B8D(_a4, 1);
                    					_t15 = 0x419;
                    					goto L7;
                    				}
                    				if(_a12 != 0x20) {
                    					goto L10;
                    				}
                    				E00404240(0x413);
                    				return 0;
                    			}





                    0x0040523b
                    0x00405245
                    0x00405261
                    0x00405283
                    0x00405286
                    0x0040528c
                    0x00405296
                    0x00405297
                    0x00405299
                    0x0040529f
                    0x0040529f
                    0x004052a9
                    0x00000000
                    0x004052b7
                    0x0040526e
                    0x004052a6
                    0x004052a6
                    0x00000000
                    0x004052a6
                    0x0040527a
                    0x0040527c
                    0x00000000
                    0x0040527c
                    0x0040524b
                    0x00000000
                    0x00000000
                    0x00405252
                    0x00000000

                    APIs
                    • IsWindowVisible.USER32(?), ref: 00405266
                    • CallWindowProcW.USER32(?,?,?,?), ref: 004052B7
                      • Part of subcall function 00404240: SendMessageW.USER32(?,00000000,00000000,00000000), ref: 00404252
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.668679627.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000000.00000002.668672686.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.668695651.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.668709908.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.669360772.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.669367484.0000000000782000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.669373527.0000000000786000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.669383228.0000000000789000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.669410918.00000000007A4000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.669416138.00000000007A6000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.669434006.00000000007B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.669445400.00000000007C4000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.669547952.0000000000804000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_400000_Ordene 501527,pdf.jbxd
                    Similarity
                    • API ID: Window$CallMessageProcSendVisible
                    • String ID:
                    • API String ID: 3748168415-3916222277
                    • Opcode ID: 03dbe0d26460962354df2622affe4a7f19e46f8d18e7fde011b494353cd470c5
                    • Instruction ID: 5e04443d83733b215e2c60cf409d87083b19ce8acf9f2344b17a5e906d0b9b78
                    • Opcode Fuzzy Hash: 03dbe0d26460962354df2622affe4a7f19e46f8d18e7fde011b494353cd470c5
                    • Instruction Fuzzy Hash: E7017C31500608AFEF209F52DD81AAB3725EF95755F10407FFA00B61D0D73E9C919E69
                    Uniqueness

                    Uniqueness Score: -1.00%

                    C-Code - Quality: 90%
                    			E0040612D(void* __ecx, void* __eflags, intOrPtr _a4, int _a8, short* _a12, char* _a16, signed int _a20) {
                    				int _v8;
                    				long _t21;
                    				long _t24;
                    				char* _t30;
                    
                    				asm("sbb eax, eax");
                    				_v8 = 0x800;
                    				_t21 = E004060CC(__eflags, _a4, _a8,  ~_a20 & 0x00000100 | 0x00020019,  &_a20);
                    				_t30 = _a16;
                    				if(_t21 != 0) {
                    					L4:
                    					 *_t30 =  *_t30 & 0x00000000;
                    				} else {
                    					_t24 = RegQueryValueExW(_a20, _a12, 0,  &_a8, _t30,  &_v8);
                    					_t21 = RegCloseKey(_a20);
                    					_t30[0x7fe] = _t30[0x7fe] & 0x00000000;
                    					if(_t24 != 0 || _a8 != 1 && _a8 != 2) {
                    						goto L4;
                    					}
                    				}
                    				return _t21;
                    			}







                    0x0040613b
                    0x0040613d
                    0x00406155
                    0x0040615a
                    0x0040615f
                    0x0040619d
                    0x0040619d
                    0x00406161
                    0x00406173
                    0x0040617e
                    0x00406184
                    0x0040618f
                    0x00000000
                    0x00000000
                    0x0040618f
                    0x004061a3

                    APIs
                    • RegQueryValueExW.ADVAPI32(?,?,00000000,00000000,?,00000800,00000002,007A0F00,00000000,?,?,Call,?,?,004063A1,80000002), ref: 00406173
                    • RegCloseKey.ADVAPI32(?,?,004063A1,80000002,Software\Microsoft\Windows\CurrentVersion,Call,Call,Call,00000000,007A0F00), ref: 0040617E
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.668679627.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000000.00000002.668672686.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.668695651.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.668709908.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.669360772.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.669367484.0000000000782000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.669373527.0000000000786000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.669383228.0000000000789000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.669410918.00000000007A4000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.669416138.00000000007A6000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.669434006.00000000007B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.669445400.00000000007C4000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.669547952.0000000000804000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_400000_Ordene 501527,pdf.jbxd
                    Similarity
                    • API ID: CloseQueryValue
                    • String ID: Call
                    • API String ID: 3356406503-1824292864
                    • Opcode ID: c86c14991d827863ed80974af0b6eb11eee99485bcf286d774b2a77da772c934
                    • Instruction ID: 844fa4e459781eb8e351c6656b051d01f86af1f9d8b6039d3a5e8c643dc5dfc4
                    • Opcode Fuzzy Hash: c86c14991d827863ed80974af0b6eb11eee99485bcf286d774b2a77da772c934
                    • Instruction Fuzzy Hash: E1015A72500209EAEF218F51CD0AEDB3BA8EF54360F01803AF91AA6191D778D964CBA4
                    Uniqueness

                    Uniqueness Score: -1.00%

                    C-Code - Quality: 100%
                    			E00405844(WCHAR* _a4) {
                    				struct _PROCESS_INFORMATION _v20;
                    				int _t7;
                    
                    				0x7a4f28->cb = 0x44;
                    				_t7 = CreateProcessW(0, _a4, 0, 0, 0, 0x4000000, 0, 0, 0x7a4f28,  &_v20);
                    				if(_t7 != 0) {
                    					CloseHandle(_v20.hThread);
                    					return _v20.hProcess;
                    				}
                    				return _t7;
                    			}





                    0x0040584d
                    0x0040586d
                    0x00405875
                    0x0040587a
                    0x00000000
                    0x00405880
                    0x00405884

                    APIs
                    Strings
                    • Error launching installer, xrefs: 00405857
                    Memory Dump Source
                    • Source File: 00000000.00000002.668679627.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000000.00000002.668672686.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.668695651.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.668709908.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.669360772.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.669367484.0000000000782000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.669373527.0000000000786000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.669383228.0000000000789000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.669410918.00000000007A4000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.669416138.00000000007A6000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.669434006.00000000007B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.669445400.00000000007C4000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.669547952.0000000000804000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_400000_Ordene 501527,pdf.jbxd
                    Similarity
                    • API ID: CloseCreateHandleProcess
                    • String ID: Error launching installer
                    • API String ID: 3712363035-66219284
                    • Opcode ID: c1804180a416b962a28ecbb96a8e49de5f878aa0b2aa8e9b50c45ca8c4f376c1
                    • Instruction ID: aeed2aac7dae16331184000a6a76f50175ec0d5b09d6907c0601aa480b830b3a
                    • Opcode Fuzzy Hash: c1804180a416b962a28ecbb96a8e49de5f878aa0b2aa8e9b50c45ca8c4f376c1
                    • Instruction Fuzzy Hash: A0E0BFF5500209BFEB009F64ED05E7B76ACEB54645F018525BD50F2190D67999148A78
                    Uniqueness

                    Uniqueness Score: -1.00%

                    C-Code - Quality: 100%
                    			E004038D8() {
                    				void* _t2;
                    				void* _t3;
                    				void* _t6;
                    				void* _t8;
                    
                    				_t8 =  *0x79fee4; // 0xb9b310
                    				_t3 = E004038BD(_t2, 0);
                    				if(_t8 != 0) {
                    					do {
                    						_t6 = _t8;
                    						_t8 =  *_t8;
                    						FreeLibrary( *(_t6 + 8));
                    						_t3 = GlobalFree(_t6);
                    					} while (_t8 != 0);
                    				}
                    				 *0x79fee4 =  *0x79fee4 & 0x00000000;
                    				return _t3;
                    			}







                    0x004038d9
                    0x004038e1
                    0x004038e8
                    0x004038eb
                    0x004038eb
                    0x004038ed
                    0x004038f2
                    0x004038f9
                    0x004038ff
                    0x00403903
                    0x00403904
                    0x0040390c

                    APIs
                    • FreeLibrary.KERNEL32(?,C:\Users\user\AppData\Local\Temp\,00000000,76DDFAA0,004038B0,004036C6,00000006,?,00000006,00000008,0000000A), ref: 004038F2
                    • GlobalFree.KERNEL32 ref: 004038F9
                    Strings
                    • C:\Users\user\AppData\Local\Temp\, xrefs: 004038EA
                    Memory Dump Source
                    • Source File: 00000000.00000002.668679627.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000000.00000002.668672686.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.668695651.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.668709908.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.669360772.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.669367484.0000000000782000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.669373527.0000000000786000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.669383228.0000000000789000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.669410918.00000000007A4000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.669416138.00000000007A6000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.669434006.00000000007B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.669445400.00000000007C4000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.669547952.0000000000804000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_400000_Ordene 501527,pdf.jbxd
                    Similarity
                    • API ID: Free$GlobalLibrary
                    • String ID: C:\Users\user\AppData\Local\Temp\
                    • API String ID: 1100898210-823278215
                    • Opcode ID: 4b08b810d440714d2b51308f6ef11deb4a674dc1e9eb6c71d827c8d8e3b91fd9
                    • Instruction ID: 0fbf8731d8bad765cb9f744f6f02bb9fbed9ce401ee6a58d62f233990fc3ff23
                    • Opcode Fuzzy Hash: 4b08b810d440714d2b51308f6ef11deb4a674dc1e9eb6c71d827c8d8e3b91fd9
                    • Instruction Fuzzy Hash: 31E01D334011205BC6115F55FD0475A77685F44B36F15407BF9847717147B45C535BD8
                    Uniqueness

                    Uniqueness Score: -1.00%

                    C-Code - Quality: 77%
                    			E00405B7C(WCHAR* _a4) {
                    				WCHAR* _t5;
                    				WCHAR* _t7;
                    
                    				_t7 = _a4;
                    				_t5 =  &(_t7[lstrlenW(_t7)]);
                    				while( *_t5 != 0x5c) {
                    					_push(_t5);
                    					_push(_t7);
                    					_t5 = CharPrevW();
                    					if(_t5 > _t7) {
                    						continue;
                    					}
                    					break;
                    				}
                    				 *_t5 =  *_t5 & 0x00000000;
                    				return  &(_t5[1]);
                    			}





                    0x00405b7d
                    0x00405b87
                    0x00405b8a
                    0x00405b90
                    0x00405b91
                    0x00405b92
                    0x00405b9a
                    0x00000000
                    0x00000000
                    0x00000000
                    0x00405b9a
                    0x00405b9c
                    0x00405ba4

                    APIs
                    • lstrlenW.KERNEL32(?,C:\Users\user\Desktop,00402F2D,C:\Users\user\Desktop,C:\Users\user\Desktop,C:\Users\user\Desktop\Ordene 501527,pdf.exe,C:\Users\user\Desktop\Ordene 501527,pdf.exe,80000000,00000003,?,00000006,00000008,0000000A), ref: 00405B82
                    • CharPrevW.USER32(?,00000000,?,C:\Users\user\Desktop,00402F2D,C:\Users\user\Desktop,C:\Users\user\Desktop,C:\Users\user\Desktop\Ordene 501527,pdf.exe,C:\Users\user\Desktop\Ordene 501527,pdf.exe,80000000,00000003,?,00000006,00000008,0000000A), ref: 00405B92
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.668679627.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000000.00000002.668672686.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.668695651.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.668709908.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.669360772.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.669367484.0000000000782000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.669373527.0000000000786000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.669383228.0000000000789000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.669410918.00000000007A4000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.669416138.00000000007A6000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.669434006.00000000007B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.669445400.00000000007C4000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.669547952.0000000000804000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_400000_Ordene 501527,pdf.jbxd
                    Similarity
                    • API ID: CharPrevlstrlen
                    • String ID: C:\Users\user\Desktop
                    • API String ID: 2709904686-1246513382
                    • Opcode ID: ce420ed133ef401578f7edf27e8b1e41d4059e21aeef7803f585746dd391eaaa
                    • Instruction ID: 52ec536bf7c92ef41efc45dde312f484f3c591b0d09bb1e57af7322ca826a5e1
                    • Opcode Fuzzy Hash: ce420ed133ef401578f7edf27e8b1e41d4059e21aeef7803f585746dd391eaaa
                    • Instruction Fuzzy Hash: 85D05EB24009209AD3126704DC00DAF77B8EF11310746446AE840A6166D7787C818AAC
                    Uniqueness

                    Uniqueness Score: -1.00%

                    C-Code - Quality: 100%
                    			E100010E1(signed int _a8, intOrPtr _a12, intOrPtr _a16, intOrPtr _a20) {
                    				void* _v0;
                    				void* _t17;
                    				signed int _t19;
                    				void* _t20;
                    				void* _t24;
                    				void* _t26;
                    				void* _t30;
                    				void* _t36;
                    				void* _t38;
                    				void* _t39;
                    				signed int _t41;
                    				void* _t42;
                    				void* _t51;
                    				void* _t52;
                    				signed short* _t54;
                    				void* _t56;
                    				void* _t59;
                    				void* _t61;
                    
                    				 *0x1000406c = _a8;
                    				 *0x10004070 = _a16;
                    				 *0x10004074 = _a12;
                    				 *((intOrPtr*)(_a20 + 0xc))( *0x10004048, E100015B1, _t51, _t56);
                    				_t41 =  *0x1000406c +  *0x1000406c * 4 << 3;
                    				_t17 = E10001243();
                    				_v0 = _t17;
                    				_t52 = _t17;
                    				if( *_t17 == 0) {
                    					L16:
                    					return GlobalFree(_t17);
                    				} else {
                    					do {
                    						_t19 =  *_t52 & 0x0000ffff;
                    						_t42 = 2;
                    						_t54 = _t52 + _t42;
                    						_t61 = _t19 - 0x6c;
                    						if(_t61 > 0) {
                    							_t20 = _t19 - 0x70;
                    							if(_t20 == 0) {
                    								L12:
                    								_t52 = _t54 + _t42;
                    								_t24 = E10001272(E100012BA(( *_t54 & 0x0000ffff) - 0x30));
                    								L13:
                    								GlobalFree(_t24);
                    								goto L14;
                    							}
                    							_t26 = _t20 - _t42;
                    							if(_t26 == 0) {
                    								L10:
                    								_t52 =  &(_t54[1]);
                    								_t24 = E100012E1(( *_t54 & 0x0000ffff) - 0x30, E10001243());
                    								goto L13;
                    							}
                    							L7:
                    							if(_t26 == 1) {
                    								_t30 = GlobalAlloc(0x40, _t41 + 4);
                    								 *_t30 =  *0x10004040;
                    								 *0x10004040 = _t30;
                    								E10001563(_t30 + 4,  *0x10004074, _t41);
                    								_t59 = _t59 + 0xc;
                    							}
                    							goto L14;
                    						}
                    						if(_t61 == 0) {
                    							L17:
                    							_t33 =  *0x10004040;
                    							if( *0x10004040 != 0) {
                    								E10001563( *0x10004074, _t33 + 4, _t41);
                    								_t59 = _t59 + 0xc;
                    								_t36 =  *0x10004040;
                    								GlobalFree(_t36);
                    								 *0x10004040 =  *_t36;
                    							}
                    							goto L14;
                    						}
                    						_t38 = _t19 - 0x4c;
                    						if(_t38 == 0) {
                    							goto L17;
                    						}
                    						_t39 = _t38 - 4;
                    						if(_t39 == 0) {
                    							 *_t54 =  *_t54 + 0xa;
                    							goto L12;
                    						}
                    						_t26 = _t39 - _t42;
                    						if(_t26 == 0) {
                    							 *_t54 =  *_t54 + 0xa;
                    							goto L10;
                    						}
                    						goto L7;
                    						L14:
                    					} while ( *_t52 != 0);
                    					_t17 = _v0;
                    					goto L16;
                    				}
                    			}





















                    0x100010e6
                    0x100010f0
                    0x100010ff
                    0x1000110e
                    0x10001119
                    0x1000111c
                    0x1000112b
                    0x1000112f
                    0x10001131
                    0x100011d8
                    0x100011de
                    0x10001137
                    0x10001138
                    0x10001138
                    0x1000113d
                    0x1000113e
                    0x10001140
                    0x10001143
                    0x1000120d
                    0x10001210
                    0x100011b0
                    0x100011b6
                    0x100011bf
                    0x100011c4
                    0x100011c7
                    0x00000000
                    0x100011c7
                    0x10001212
                    0x10001214
                    0x10001196
                    0x1000119d
                    0x100011a5
                    0x00000000
                    0x100011a5
                    0x10001161
                    0x10001162
                    0x1000116a
                    0x10001177
                    0x1000117f
                    0x10001188
                    0x1000118d
                    0x1000118d
                    0x00000000
                    0x10001162
                    0x10001149
                    0x100011df
                    0x100011df
                    0x100011e6
                    0x100011f3
                    0x100011f8
                    0x100011fb
                    0x10001203
                    0x10001205
                    0x10001205
                    0x00000000
                    0x100011e6
                    0x1000114f
                    0x10001152
                    0x00000000
                    0x00000000
                    0x10001158
                    0x1000115b
                    0x100011ac
                    0x00000000
                    0x100011ac
                    0x1000115d
                    0x1000115f
                    0x10001192
                    0x00000000
                    0x10001192
                    0x00000000
                    0x100011c9
                    0x100011c9
                    0x100011d3
                    0x00000000
                    0x100011d7

                    APIs
                    Memory Dump Source
                    • Source File: 00000000.00000002.669799652.0000000010001000.00000020.00000001.01000000.00000007.sdmp, Offset: 10000000, based on PE: true
                    • Associated: 00000000.00000002.669792729.0000000010000000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000000.00000002.669803934.0000000010003000.00000002.00000001.01000000.00000007.sdmpDownload File
                    • Associated: 00000000.00000002.669815812.0000000010005000.00000002.00000001.01000000.00000007.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_10000000_Ordene 501527,pdf.jbxd
                    Similarity
                    • API ID: Global$Free$Alloc
                    • String ID:
                    • API String ID: 1780285237-0
                    • Opcode ID: 9cbcb91a2cf1141c01d88779e182a67407fb9f9860b92084c2da8ef292891df1
                    • Instruction ID: f345eba8489605592ce73ef35c78e6b42925bf5f5eceaf1f60f0973e38c56604
                    • Opcode Fuzzy Hash: 9cbcb91a2cf1141c01d88779e182a67407fb9f9860b92084c2da8ef292891df1
                    • Instruction Fuzzy Hash: AE318FF6904211DBF314CF64DC859EA77E8EB853D0B12452AFB45E726CEB34E8018765
                    Uniqueness

                    Uniqueness Score: -1.00%

                    C-Code - Quality: 100%
                    			E00405CB6(void* __ecx, CHAR* _a4, CHAR* _a8) {
                    				int _v8;
                    				int _t12;
                    				int _t14;
                    				int _t15;
                    				CHAR* _t17;
                    				CHAR* _t27;
                    
                    				_t12 = lstrlenA(_a8);
                    				_t27 = _a4;
                    				_v8 = _t12;
                    				while(lstrlenA(_t27) >= _v8) {
                    					_t14 = _v8;
                    					 *(_t14 + _t27) =  *(_t14 + _t27) & 0x00000000;
                    					_t15 = lstrcmpiA(_t27, _a8);
                    					_t27[_v8] =  *(_t14 + _t27);
                    					if(_t15 == 0) {
                    						_t17 = _t27;
                    					} else {
                    						_t27 = CharNextA(_t27);
                    						continue;
                    					}
                    					L5:
                    					return _t17;
                    				}
                    				_t17 = 0;
                    				goto L5;
                    			}









                    0x00405cc6
                    0x00405cc8
                    0x00405ccb
                    0x00405cf7
                    0x00405cd0
                    0x00405cd9
                    0x00405cde
                    0x00405ce9
                    0x00405cec
                    0x00405d08
                    0x00405cee
                    0x00405cf5
                    0x00000000
                    0x00405cf5
                    0x00405d01
                    0x00405d05
                    0x00405d05
                    0x00405cff
                    0x00000000

                    APIs
                    • lstrlenA.KERNEL32(00000000,00000000,00000000,00000000,?,00000000,00405F9F,00000000,[Rename],00000000,00000000,00000000,?,?,?,?), ref: 00405CC6
                    • lstrcmpiA.KERNEL32(00000000,00000000,?,00000000,00405F9F,00000000,[Rename],00000000,00000000,00000000,?,?,?,?), ref: 00405CDE
                    • CharNextA.USER32(00000000,?,00000000,00405F9F,00000000,[Rename],00000000,00000000,00000000,?,?,?,?), ref: 00405CEF
                    • lstrlenA.KERNEL32(00000000,?,00000000,00405F9F,00000000,[Rename],00000000,00000000,00000000,?,?,?,?), ref: 00405CF8
                    Memory Dump Source
                    • Source File: 00000000.00000002.668679627.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000000.00000002.668672686.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.668695651.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.668709908.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.669360772.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.669367484.0000000000782000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.669373527.0000000000786000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.669383228.0000000000789000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.669410918.00000000007A4000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.669416138.00000000007A6000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.669434006.00000000007B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.669445400.00000000007C4000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.669547952.0000000000804000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_400000_Ordene 501527,pdf.jbxd
                    Similarity
                    • API ID: lstrlen$CharNextlstrcmpi
                    • String ID:
                    • API String ID: 190613189-0
                    • Opcode ID: 6db5b03da17fe1faae21ad7e2c869b7ed7bb68520138c246bcc2ad94f2104a67
                    • Instruction ID: 3ccce89ec89fcd17ace6fe24ed26798b8253689363ac01c92f586b0f3661b096
                    • Opcode Fuzzy Hash: 6db5b03da17fe1faae21ad7e2c869b7ed7bb68520138c246bcc2ad94f2104a67
                    • Instruction Fuzzy Hash: 81F0F631204958FFC7029FA8DD04D9FBBA8EF16354B2540BAE840F7211D634EE01ABA8
                    Uniqueness

                    Uniqueness Score: -1.00%